@@ -100,7 +100,7 @@ We take the account key, *as a string*, and we use HMAC function to derive filen
...
@@ -100,7 +100,7 @@ We take the account key, *as a string*, and we use HMAC function to derive filen
* The second half is used as a key for further encryption, as a byte sequence.
* The second half is used as a key for further encryption, as a byte sequence.
* We are using aes-256-gcm algorithm for encryption.
* We are using `AES-256-GCM` algorithm for encryption.
* Random 12 bytes are generated as a IV
* Random 12 bytes are generated as a IV
* GCM is used with the full 128-bit tag
* GCM is used with the full 128-bit tag
...
@@ -176,7 +176,7 @@ For the "stress test" wallet, defined in SLIP-0014, and its first account (with
...
@@ -176,7 +176,7 @@ For the "stress test" wallet, defined in SLIP-0014, and its first account (with
###Deriving filename, decoding
###Deriving filename, decoding
Example code for decryption is in [3_decrypt.py](slip-0015/3_decrypt.py). First and only argument is the account key from previous step. The file has to be in a current working directory (in myTREZOR, we use ~/Dropbox/Apps/TREZOR/ for saving the files).
Example code for decryption is in [3_decrypt.py](slip-0015/3_decrypt.py). First and only argument is the account key from previous step. The file has to be in a current working directory (in myTREZOR, we use `~/Dropbox/Apps/TREZOR/` for saving the files).
With the key `v5kCxSKLTsnwmgPBeaRyFDWeG9zXouF34L72763zjLrS4LWy8`, filename `08108c3a46882bb71a5df59f4962e02f89a63efb1cf5f32ded94694528be6cec.mtdt` and the data (in hex)
With the key `v5kCxSKLTsnwmgPBeaRyFDWeG9zXouF34L72763zjLrS4LWy8`, filename `08108c3a46882bb71a5df59f4962e02f89a63efb1cf5f32ded94694528be6cec.mtdt` and the data (in hex)