mirror of
https://github.com/nostr-protocol/nips.git
synced 2024-11-09 22:09:06 -05:00
fix typo 44.md
This commit is contained in:
parent
3e05545952
commit
2409f821a4
4
44.md
4
44.md
|
@ -161,7 +161,7 @@ validation rules, refer to BIP-340.
|
||||||
### Implementation pseudocode
|
### Implementation pseudocode
|
||||||
|
|
||||||
The following is a collection of python-like pseudocode functions which implement the above primitives,
|
The following is a collection of python-like pseudocode functions which implement the above primitives,
|
||||||
intended to guide impelmenters. A collection of implementations in different languages is available at https://github.com/paulmillr/nip44.
|
intended to guide implementers. A collection of implementations in different languages is available at https://github.com/paulmillr/nip44.
|
||||||
|
|
||||||
```py
|
```py
|
||||||
# Calculates length of the padded byte array.
|
# Calculates length of the padded byte array.
|
||||||
|
@ -286,7 +286,7 @@ Example of a test vector from the file:
|
||||||
The file also contains intermediate values. A quick guidance with regards to its usage:
|
The file also contains intermediate values. A quick guidance with regards to its usage:
|
||||||
|
|
||||||
- `valid.get_conversation_key`: calculate conversation_key from secret key sec1 and public key pub2
|
- `valid.get_conversation_key`: calculate conversation_key from secret key sec1 and public key pub2
|
||||||
- `valid.get_message_keys`: calculate chacha_key, chacha_nocne, hmac_key from conversation_key and nonce
|
- `valid.get_message_keys`: calculate chacha_key, chacha_nonce, hmac_key from conversation_key and nonce
|
||||||
- `valid.calc_padded_len`: take unpadded length (first value), calculate padded length (second value)
|
- `valid.calc_padded_len`: take unpadded length (first value), calculate padded length (second value)
|
||||||
- `valid.encrypt_decrypt`: emulate real conversation. Calculate pub2 from sec2, verify conversation_key from (sec1, pub2), encrypt, verify payload, then calculate pub1 from sec1, verify conversation_key from (sec2, pub1), decrypt, verify plaintext.
|
- `valid.encrypt_decrypt`: emulate real conversation. Calculate pub2 from sec2, verify conversation_key from (sec1, pub2), encrypt, verify payload, then calculate pub1 from sec1, verify conversation_key from (sec2, pub1), decrypt, verify plaintext.
|
||||||
- `valid.encrypt_decrypt_long_msg`: same as previous step, but instead of a full plaintext and payload, their checksum is provided.
|
- `valid.encrypt_decrypt_long_msg`: same as previous step, but instead of a full plaintext and payload, their checksum is provided.
|
||||||
|
|
Loading…
Reference in New Issue
Block a user