From 38260aabccd008a94d8ba304315e709ba7741043 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?K=C3=A9vin=20Commaille?= <76261501+zecakeh@users.noreply.github.com> Date: Tue, 27 Feb 2024 23:47:16 +0100 Subject: [PATCH] Fix typo in secrets module (#1734) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * Fix typo in secrets module Introduced in #1695. Signed-off-by: Kévin Commaille * Add changelog Signed-off-by: Kévin Commaille --------- Signed-off-by: Kévin Commaille --- changelogs/client_server/newsfragments/1734.clarification | 1 + content/client-server-api/modules/secrets.md | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-) create mode 100644 changelogs/client_server/newsfragments/1734.clarification diff --git a/changelogs/client_server/newsfragments/1734.clarification b/changelogs/client_server/newsfragments/1734.clarification new file mode 100644 index 00000000..32d9bb51 --- /dev/null +++ b/changelogs/client_server/newsfragments/1734.clarification @@ -0,0 +1 @@ +Clarify the format of account data objects for secret storage. diff --git a/content/client-server-api/modules/secrets.md b/content/client-server-api/modules/secrets.md index e222b814..e94f361a 100644 --- a/content/client-server-api/modules/secrets.md +++ b/content/client-server-api/modules/secrets.md @@ -84,7 +84,7 @@ When storing a key, clients SHOULD: differences in AES-CTR implementations), and use this as the AES initialization vector (IV). -3. Encrypt a message consisting of 32 byutes of 0, using AES-CTR-256 using the +3. Encrypt a message consisting of 32 bytes of 0, using AES-CTR-256 using the AES key and IV generated above. 4. Pass the raw encrypted data through HMAC-SHA-256 using the MAC key