Skip to content

Commit 8c32cce

Browse files
committed
Fix some typos and inconsistent attributes definitions
1 parent a89c73c commit 8c32cce

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

04-Protocol-Security.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -92,8 +92,8 @@ The following functions will also be referenced:
9292

9393
* `generateKey()`: generates and returns a fresh `secp256k1` keypair
9494
* Where the object returned by `generateKey` has two attributes:
95-
* `.pub`, which returns an abstract object representing the public key
96-
* `.priv`, which represents the private key used to generate the public key
95+
* `.public_key`, which returns an abstract object representing the public key
96+
* `.private_key`, which represents the private key used to generate the public key
9797
* Where the object also has a single method:
9898
* `.serializeImplicit()` that outputs a 32-byte serialization of the X-coordinate of EC point (implicit Y-coordinate)
9999

@@ -102,7 +102,7 @@ The following functions will also be referenced:
102102
* `HMAC-HASH(key, data)`
103103
* Applies HMAC defined in `RFC 2104`<sup>[5](#reference-5)
104104

105-
* `HKDF(salt, input_key_material, num_output)`: a function defined in `RFC 5869`<sup>[6](#reference-6)</sup>, evaluated with a zero-length `info` field:
105+
* `HKDF(chaining_key, input_key_material, num_output)`: a function defined in `RFC 5869`<sup>[6](#reference-6)</sup>, evaluated with a zero-length `info` field:
106106
* Sets `temp_key = HMAC-HASH(chaining_key, input_key_material)`
107107
* Sets `output1 = HMAC-HASH(temp_key, byte(0x01))`
108108
* Sets `output2 = HMAC-HASH(temp_key, output1 || byte(0x02))`
@@ -164,7 +164,7 @@ Prior to starting first round of NX-handshake, both initiator and responder init
164164
Initiator generates ephemeral keypair and sends the public key to the responder:
165165

166166
1. initializes empty output buffer
167-
2. generates ephemeral keypair `e`, appeends `e.public_key` to the buffer (32 bytes plaintext public key)
167+
2. generates ephemeral keypair `e`, appends `e.public_key` to the buffer (32 bytes plaintext public key)
168168
3. calls `MixHash(e.public_key)`
169169
4. calls `EncryptAndHash()` with empty payload and appends the ciphertext to the buffer (note that *k* is empty at this point, so this effectively reduces down to `MixHash()` on empty data)
170170
5. submits the buffer for sending to the responder in the following format

0 commit comments

Comments
 (0)