diff --git a/changelogs/client_server/newsfragments/1734.clarification b/changelogs/client_server/newsfragments/1734.clarification new file mode 100644 index 00000000..32d9bb51 --- /dev/null +++ b/changelogs/client_server/newsfragments/1734.clarification @@ -0,0 +1 @@ +Clarify the format of account data objects for secret storage. diff --git a/content/client-server-api/modules/secrets.md b/content/client-server-api/modules/secrets.md index e222b814..e94f361a 100644 --- a/content/client-server-api/modules/secrets.md +++ b/content/client-server-api/modules/secrets.md @@ -84,7 +84,7 @@ When storing a key, clients SHOULD: differences in AES-CTR implementations), and use this as the AES initialization vector (IV). -3. Encrypt a message consisting of 32 byutes of 0, using AES-CTR-256 using the +3. Encrypt a message consisting of 32 bytes of 0, using AES-CTR-256 using the AES key and IV generated above. 4. Pass the raw encrypted data through HMAC-SHA-256 using the MAC key