@@ -181,11 +181,11 @@ As explained before, these messages are sent to set up the connection:
181
181
----------------------------------------------------------------------------------------------------
182
182
| Initiator Responder |
183
183
| |
184
- | x, ellswift_X = ellswift_create(initiating=True) |
184
+ | x, ellswift_X = ellswift_create() |
185
185
| |
186
186
| --- ellswift_X + initiator_garbage (initiator_garbage_len bytes; max 4095) ---> |
187
187
| |
188
- | y, ellswift_Y = ellswift_create(initiating=False) |
188
+ | y, ellswift_Y = ellswift_create() |
189
189
| ecdh_secret = v2_ecdh( |
190
190
| y, ellswift_X, ellswift_Y, initiating=False) |
191
191
| v2_initialize(initiator, ecdh_secret, initiating=False) |
@@ -333,7 +333,7 @@ To establish a v2 encrypted connection, the initiator generates an ephemeral sec
333
333
334
334
<pre>
335
335
def initiate_v2_handshake(peer, garbage_len):
336
- peer.privkey_ours, peer.ellswift_ours = ellswift_create(initiating=True )
336
+ peer.privkey_ours, peer.ellswift_ours = ellswift_create()
337
337
peer.sent_garbage = rand_bytes(garbage_len)
338
338
send(peer, peer.ellswift_ours + peer.sent_garbage)
339
339
</pre>
@@ -350,7 +350,7 @@ def respond_v2_handshake(peer, garbage_len):
350
350
while len(peer.received_prefix) < 12:
351
351
peer.received_prefix += receive(peer, 1)
352
352
if peer.received_prefix[-1] != V1_PREFIX[len(peer.received_prefix) - 1 ]:
353
- peer.privkey_ours, peer.ellswift_ours = ellswift_create(initiating=False )
353
+ peer.privkey_ours, peer.ellswift_ours = ellswift_create()
354
354
peer.sent_garbage = rand_bytes(garbage_len)
355
355
send(peer, ellswift_Y + peer.sent_garbage)
356
356
return
0 commit comments