You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: 04-Protocol-Security.md
+4-4
Original file line number
Diff line number
Diff line change
@@ -92,8 +92,8 @@ The following functions will also be referenced:
92
92
93
93
*`generateKey()`: generates and returns a fresh `secp256k1` keypair
94
94
* Where the object returned by `generateKey` has two attributes:
95
-
*`.pub`, which returns an abstract object representing the public key
96
-
*`.priv`, which represents the private key used to generate the public key
95
+
*`.public_key`, which returns an abstract object representing the public key
96
+
*`.private_key`, which represents the private key used to generate the public key
97
97
* Where the object also has a single method:
98
98
*`.serializeImplicit()` that outputs a 32-byte serialization of the X-coordinate of EC point (implicit Y-coordinate)
99
99
@@ -102,7 +102,7 @@ The following functions will also be referenced:
102
102
*`HMAC-HASH(key, data)`
103
103
* Applies HMAC defined in `RFC 2104`<sup>[5](#reference-5)
104
104
105
-
*`HKDF(salt, input_key_material, num_output)`: a function defined in `RFC 5869`<sup>[6](#reference-6)</sup>, evaluated with a zero-length `info` field:
105
+
*`HKDF(chaining_key, input_key_material, num_output)`: a function defined in `RFC 5869`<sup>[6](#reference-6)</sup>, evaluated with a zero-length `info` field:
@@ -164,7 +164,7 @@ Prior to starting first round of NX-handshake, both initiator and responder init
164
164
Initiator generates ephemeral keypair and sends the public key to the responder:
165
165
166
166
1. initializes empty output buffer
167
-
2. generates ephemeral keypair `e`, appeends`e.public_key` to the buffer (32 bytes plaintext public key)
167
+
2. generates ephemeral keypair `e`, appends`e.public_key` to the buffer (32 bytes plaintext public key)
168
168
3. calls `MixHash(e.public_key)`
169
169
4. calls `EncryptAndHash()` with empty payload and appends the ciphertext to the buffer (note that *k* is empty at this point, so this effectively reduces down to `MixHash()` on empty data)
170
170
5. submits the buffer for sending to the responder in the following format
0 commit comments