@@ -63,7 +63,7 @@ The flow of an authentication in the 2.0 system is fairly simple:
6363#. This dictionary of information is then URL-encoded.
6464#. The resulting URL-encoded string is padded with spaces to an even
6565 16 bytes, and is then AES-SIV encrypted with a shared key and a 16
66- byte nonce (v4 uses ChaCha20_Poly1305 with standard size key and nonce,
66+ byte nonce (v4 uses XChaCha20_Poly1305 with standard size key and nonce,
6767 but v3 is the preferred version). This key is stored in the main website system and
6868 indexed by the site id, and it is stored in the settings of the
6969 community website somewhere. Since this key is what protects the
@@ -78,7 +78,7 @@ The flow of an authentication in the 2.0 system is fairly simple:
7878#. The community website detects that this is a redirected authentication
7979 response, and starts processing it specifically.
8080#. Using the shared key, the data is decrypted (while first being base64
81- decoded, of course). Since authenticated encryption using AES-SIV or ChaCha20_Poly1305
81+ decoded, of course). Since authenticated encryption using AES-SIV or XChaCha20_Poly1305
8282 is used, this step will fail if there has been any tampering with the
8383 data.
8484#. The resulting string is urldecoded - and if any errors occur in the
@@ -123,7 +123,7 @@ encryption algorithms.
123123
124124v2 uses standard AES without authentication. This version is *deprecated *.
125125v3 uses AES-SIV authenticated encryption. This is the *recommended * vcersion.
126- v4 uses ChaCha20_Poly1305 authenticated encryption, for platforms that don't
126+ v4 uses XChaCha20_Poly1305 authenticated encryption, for platforms that don't
127127 support AES-SIV.
128128
129129
0 commit comments