@@ -63,7 +63,7 @@ The flow of an authentication in the 2.0 system is fairly simple:
63
63
#. This dictionary of information is then URL-encoded.
64
64
#. The resulting URL-encoded string is padded with spaces to an even
65
65
16 bytes, and is then AES-SIV encrypted with a shared key and a 16
66
- byte nonce (v4 uses ChaCha20_Poly1305 with standard size key and nonce,
66
+ byte nonce (v4 uses XChaCha20_Poly1305 with standard size key and nonce,
67
67
but v3 is the preferred version). This key is stored in the main website system and
68
68
indexed by the site id, and it is stored in the settings of the
69
69
community website somewhere. Since this key is what protects the
@@ -78,7 +78,7 @@ The flow of an authentication in the 2.0 system is fairly simple:
78
78
#. The community website detects that this is a redirected authentication
79
79
response, and starts processing it specifically.
80
80
#. Using the shared key, the data is decrypted (while first being base64
81
- decoded, of course). Since authenticated encryption using AES-SIV or ChaCha20_Poly1305
81
+ decoded, of course). Since authenticated encryption using AES-SIV or XChaCha20_Poly1305
82
82
is used, this step will fail if there has been any tampering with the
83
83
data.
84
84
#. The resulting string is urldecoded - and if any errors occur in the
@@ -123,7 +123,7 @@ encryption algorithms.
123
123
124
124
v2 uses standard AES without authentication. This version is *deprecated *.
125
125
v3 uses AES-SIV authenticated encryption. This is the *recommended * vcersion.
126
- v4 uses ChaCha20_Poly1305 authenticated encryption, for platforms that don't
126
+ v4 uses XChaCha20_Poly1305 authenticated encryption, for platforms that don't
127
127
support AES-SIV.
128
128
129
129
0 commit comments