@@ -57,8 +57,9 @@ clients will try to use the default key to decrypt secrets.
57
57
Clients MUST ensure that the key is trusted before using it to encrypt secrets.
58
58
One way to do that is to have the client that creates the key sign the key
59
59
description (as signed JSON) using the user's master cross-signing key.
60
- Another way to do that is to prompt the user to enter the passphrase and ensure
61
- that the generated private key correponds to the public key.
60
+ Another way to do that is to prompt the user to enter the passphrase used to
61
+ generate the encryption key and ensure that the generated private key
62
+ corresponds to the public key.
62
63
63
64
#### Secret storage
64
65
@@ -79,6 +80,8 @@ Example:
79
80
80
81
Some secret is encrypted using keys with ID ` key_id_1 ` and ` key_id_2 ` :
81
82
83
+ ` org.example.some.secret ` :
84
+
82
85
``` json
83
86
{
84
87
"encrypted" : {
@@ -95,6 +98,28 @@ Some secret is encrypted using keys with ID `key_id_1` and `key_id_2`:
95
98
}
96
99
```
97
100
101
+ and the key descriptions for the keys would be:
102
+
103
+ ` m.secret_storage.key.key_id_1 ` :
104
+
105
+ ``` json
106
+ {
107
+ "name" : " Some key" ,
108
+ "algorithm" : " m.secret_storage.v1.curve25519-aes-sha2" ,
109
+ // ... other properties according to algorithm
110
+ }
111
+ ```
112
+
113
+ ` m.secret_storage.key.key_id_2 ` :
114
+
115
+ ``` json
116
+ {
117
+ "name" : " Some other key" ,
118
+ "algorithm" : " m.secret_storage.v1.curve25519-aes-sha2" ,
119
+ // ... other properties according to algorithm
120
+ }
121
+ ```
122
+
98
123
#### Encryption algorithms
99
124
100
125
##### ` m.secret_storage.v1.curve25519-aes-sha2 `
0 commit comments