From 2409f821a43fb42e40fdf0f348da6bb6855c2211 Mon Sep 17 00:00:00 2001 From: shuoer86 <129674997+shuoer86@users.noreply.github.com> Date: Sat, 6 Jan 2024 09:47:07 +0800 Subject: [PATCH] fix typo 44.md --- 44.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/44.md b/44.md index 0efa482..f3071ea 100644 --- a/44.md +++ b/44.md @@ -161,7 +161,7 @@ validation rules, refer to BIP-340. ### Implementation pseudocode The following is a collection of python-like pseudocode functions which implement the above primitives, -intended to guide impelmenters. A collection of implementations in different languages is available at https://github.com/paulmillr/nip44. +intended to guide implementers. A collection of implementations in different languages is available at https://github.com/paulmillr/nip44. ```py # Calculates length of the padded byte array. @@ -286,7 +286,7 @@ Example of a test vector from the file: The file also contains intermediate values. A quick guidance with regards to its usage: - `valid.get_conversation_key`: calculate conversation_key from secret key sec1 and public key pub2 -- `valid.get_message_keys`: calculate chacha_key, chacha_nocne, hmac_key from conversation_key and nonce +- `valid.get_message_keys`: calculate chacha_key, chacha_nonce, hmac_key from conversation_key and nonce - `valid.calc_padded_len`: take unpadded length (first value), calculate padded length (second value) - `valid.encrypt_decrypt`: emulate real conversation. Calculate pub2 from sec2, verify conversation_key from (sec1, pub2), encrypt, verify payload, then calculate pub1 from sec1, verify conversation_key from (sec2, pub1), decrypt, verify plaintext. - `valid.encrypt_decrypt_long_msg`: same as previous step, but instead of a full plaintext and payload, their checksum is provided.