add more code usage

parent fba5141f
...@@ -100,7 +100,7 @@ We take the account key, *as a string*, and we use HMAC function to derive filen ...@@ -100,7 +100,7 @@ We take the account key, *as a string*, and we use HMAC function to derive filen
* The second half is used as a key for further encryption, as a byte sequence. * The second half is used as a key for further encryption, as a byte sequence.
* We are using aes-256-gcm algorithm for encryption. * We are using `AES-256-GCM` algorithm for encryption.
* Random 12 bytes are generated as a IV * Random 12 bytes are generated as a IV
* GCM is used with the full 128-bit tag * GCM is used with the full 128-bit tag
...@@ -176,7 +176,7 @@ For the "stress test" wallet, defined in SLIP-0014, and its first account (with ...@@ -176,7 +176,7 @@ For the "stress test" wallet, defined in SLIP-0014, and its first account (with
###Deriving filename, decoding ###Deriving filename, decoding
Example code for decryption is in [3_decrypt.py](slip-0015/3_decrypt.py). First and only argument is the account key from previous step. The file has to be in a current working directory (in myTREZOR, we use ~/Dropbox/Apps/TREZOR/ for saving the files). Example code for decryption is in [3_decrypt.py](slip-0015/3_decrypt.py). First and only argument is the account key from previous step. The file has to be in a current working directory (in myTREZOR, we use `~/Dropbox/Apps/TREZOR/` for saving the files).
With the key `v5kCxSKLTsnwmgPBeaRyFDWeG9zXouF34L72763zjLrS4LWy8`, filename `08108c3a46882bb71a5df59f4962e02f89a63efb1cf5f32ded94694528be6cec.mtdt` and the data (in hex) With the key `v5kCxSKLTsnwmgPBeaRyFDWeG9zXouF34L72763zjLrS4LWy8`, filename `08108c3a46882bb71a5df59f4962e02f89a63efb1cf5f32ded94694528be6cec.mtdt` and the data (in hex)
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment