Update content/client-server-api/modules/end_to_end_encryption.md

Co-authored-by: Travis Ralston <travpc@gmail.com>
pull/977/head
Hubert Chathi 4 years ago committed by Richard van der Hoff
parent c3a234843b
commit 7a960375cc

@ -585,7 +585,7 @@ The process between Alice and Bob verifying each other would be:
2. Alice and Bob begin a key verification using the key verification 2. Alice and Bob begin a key verification using the key verification
framework as described above. framework as described above.
3. Alice's device sends Bob's device an `m.key.verification.start` 3. Alice's device sends Bob's device an `m.key.verification.start`
message. Alice's client ensures it has a copy of Bob's device key. message. Alice's device ensures it has a copy of Bob's device key.
4. Bob's device receives the message and selects a key agreement 4. Bob's device receives the message and selects a key agreement
protocol, hash algorithm, message authentication code, and SAS protocol, hash algorithm, message authentication code, and SAS
method supported by Alice's device. method supported by Alice's device.

Loading…
Cancel
Save