@@ -100,15 +100,15 @@ Rotation key signing keys: Pre-contact keys (`ML-DSA-87`) to sign Ephemeral keys
100100
101101Client sends
102102```
103- POST /authentication/init
103+ [ POST] /authentication/init
104104```
105105with payload that consists of ` user ` 's base64-encoded public key (and ` user_id ` if re-authenticating).
106106
107107Server responds with a base64-encoded random challenge.
108108
109109` Client ` decodes challenge, signs it with his ` Dilithium ` private key.
110110
111- ` Client ` sends signature to ``` POST /authentication/verify ``` .
111+ ` Client ` sends signature to ``` [ POST] /authentication/verify``` .
112112
113113Server * verifies* signature:
114114
@@ -136,10 +136,9 @@ Server does not store any contact relationships, all verification state is local
136136` Alice ` composes human-language question & normalized answer.
137137
138138` Alice ` sends:
139- ```
140- POST /smp/initiate
141- ```
142139``` json
140+ [POST ] /smp/initiate
141+
143142{
144143 "question" : " What cafe did we meet at last time?" ,
145144 "nonce" : " 32 random bytes that are base64 encoded" , # rA
@@ -166,10 +165,9 @@ proof_1 = HMAC(secret, message, sha3_512)
166165```
167166
168167Bob sends:
169- ```
170- POST /smp/step_2
171- ```
172168``` json
169+ [POST ] /smp/step_2
170+
173171{
174172 "proof" : " proof_1 hex encoded" ,
175173 "nonce" : " rB base64 encoded" ,
@@ -189,10 +187,10 @@ message = rB + rA + fpB
189187proof_2 = HMAC(secret, message, sha3_512)
190188```
191189` Alice ` sends:
192- ```
193- POST /smp/step_3
194- ```
195190``` json
191+ [POST ] /smp/step_3
192+
193+
196194{
197195 "proof" : " proof_2 hex encoded" ,
198196 "recipient_id" : " Bob's 16 digits user ID"
0 commit comments