diff --git a/rfc/0013_Duniter_Encrypted_Wallet_Import_Format.md b/rfc/0013_Duniter_Encrypted_Wallet_Import_Format.md index f917dc2f7c747841dd0c43a7eb7e6aea2f520d4f..d98560b04d6ea49c578312bde5132ff3a96fb2ad 100644 --- a/rfc/0013_Duniter_Encrypted_Wallet_Import_Format.md +++ b/rfc/0013_Duniter_Encrypted_Wallet_Import_Format.md @@ -45,12 +45,12 @@ This base64 string encodes a sequence of bytes whose structure is defined below. Symmetric encryption algorithm : aes256 -aes256 key : scrypt of user passphrase with the following parameters: -Seed generated from scrypt with the following parameters: -password: passphrase -salt: sha256("dewif" ++ passphrase) -N : 4096 -r: 16 +aes256 key : scrypt of user passphrase with the following parameters: +Seed generated from scrypt with the following parameters: +password: passphrase +salt: sha256("dewif" ++ passphrase) +N : 4096 +r: 16 p: 1 Encrypted datas : @@ -63,11 +63,11 @@ The public key serves as a checksum. To check that the `.dewif` file is not corr Example 1: -Seed generated from scrypt with the following parameters: -password: "password" -salt: "salt" -N : 4096 -r: 16 +Seed generated from scrypt with the following parameters: +password: "password" +salt: "salt" +N : 4096 +r: 16 p: 1 ```txt @@ -84,12 +84,12 @@ DEWIF base 64 string (with zeroing aes key): Symmetric encryption algorithm : aes256 -aes256 key : scrypt of user passphrase with the following parameters: -Seed generated from scrypt with the following parameters: -password: passphrase -salt: sha256("dewif" ++ passphrase) -N : 4096 -r: 16 +aes256 key : scrypt of user passphrase with the following parameters: +Seed generated from scrypt with the following parameters: +password: passphrase +salt: sha256("dewif" ++ passphrase) +N : 4096 +r: 16 p: 1 Encrypted datas :