From 0a3300fb7f8cb29e06802fce1085ba1ffb0669ce Mon Sep 17 00:00:00 2001 From: librelois <elois@ifee.fr> Date: Sun, 23 Feb 2020 20:27:31 +0100 Subject: [PATCH] [DEWIF] text ventilation --- ..._Duniter_Encrypted_Wallet_Import_Format.md | 34 +++++++++---------- 1 file changed, 17 insertions(+), 17 deletions(-) diff --git a/rfc/0013_Duniter_Encrypted_Wallet_Import_Format.md b/rfc/0013_Duniter_Encrypted_Wallet_Import_Format.md index f917dc2..d98560b 100644 --- a/rfc/0013_Duniter_Encrypted_Wallet_Import_Format.md +++ b/rfc/0013_Duniter_Encrypted_Wallet_Import_Format.md @@ -45,12 +45,12 @@ This base64 string encodes a sequence of bytes whose structure is defined below. Symmetric encryption algorithm : aes256 -aes256 key : scrypt of user passphrase with the following parameters: -Seed generated from scrypt with the following parameters: -password: passphrase -salt: sha256("dewif" ++ passphrase) -N : 4096 -r: 16 +aes256 key : scrypt of user passphrase with the following parameters: +Seed generated from scrypt with the following parameters: +password: passphrase +salt: sha256("dewif" ++ passphrase) +N : 4096 +r: 16 p: 1 Encrypted datas : @@ -63,11 +63,11 @@ The public key serves as a checksum. To check that the `.dewif` file is not corr Example 1: -Seed generated from scrypt with the following parameters: -password: "password" -salt: "salt" -N : 4096 -r: 16 +Seed generated from scrypt with the following parameters: +password: "password" +salt: "salt" +N : 4096 +r: 16 p: 1 ```txt @@ -84,12 +84,12 @@ DEWIF base 64 string (with zeroing aes key): Symmetric encryption algorithm : aes256 -aes256 key : scrypt of user passphrase with the following parameters: -Seed generated from scrypt with the following parameters: -password: passphrase -salt: sha256("dewif" ++ passphrase) -N : 4096 -r: 16 +aes256 key : scrypt of user passphrase with the following parameters: +Seed generated from scrypt with the following parameters: +password: passphrase +salt: sha256("dewif" ++ passphrase) +N : 4096 +r: 16 p: 1 Encrypted datas : -- GitLab