summaryrefslogtreecommitdiff
path: root/anastasis.rst
diff options
context:
space:
mode:
authorDennis Neufeld <dennis.neufeld@students.bfh.ch>2019-10-13 21:03:33 +0200
committerDennis Neufeld <dennis.neufeld@students.bfh.ch>2019-10-13 21:03:33 +0200
commite2778f49fd30ca396b3145f9472f07ec5192c7aa (patch)
treef01fdcd18965763e5d26c96287a7cf7883e5a618 /anastasis.rst
parent51892bcaf29f0b18ab7044e17f4bf1ea9903c4ae (diff)
downloaddocs-e2778f49fd30ca396b3145f9472f07ec5192c7aa.tar.gz
docs-e2778f49fd30ca396b3145f9472f07ec5192c7aa.tar.bz2
docs-e2778f49fd30ca396b3145f9472f07ec5192c7aa.zip
Some small changes
Diffstat (limited to 'anastasis.rst')
-rw-r--r--anastasis.rst10
1 files changed, 5 insertions, 5 deletions
diff --git a/anastasis.rst b/anastasis.rst
index a40aabb..26a0e67 100644
--- a/anastasis.rst
+++ b/anastasis.rst
@@ -377,7 +377,7 @@ Receiving Terms of Service
**Response:**
- Returns a `EscrowTermsOfServiceResponse`_.
+ Returns an `EscrowTermsOfServiceResponse`_.
.. _EscrowTermsOfServiceResponse:
.. ts:def:: EscrowTermsOfServiceResponse
@@ -477,7 +477,7 @@ public key using the Crockford base32-encoding.
code in case the resource matches the provided Etag.
:status 200 OK:
- The escrow provider responds with an `EncryptedRecoveryDocument`_ object.
+ The escrow provider responds with an EncryptedRecoveryDocument_ object.
:status 304 Not modified:
The client requested the same ressource it already knows.
:status 400 Bad request:
@@ -564,7 +564,7 @@ public key using the Crockford base32-encoding.
aes_gcm_tag: [16]; //bytearray
// Variable-size encrypted recovery document. After decryption,
- // this contains a gzip compressed JSON-encoded RecoveryDocument_.
+ // this contains a gzip compressed JSON-encoded `RecoveryDocument`.
// The nonce of the HKDF for this encryption must include the
// string "ERD".
encrypted_compressed_recovery_document: []; //bytearray of undefined length
@@ -757,8 +757,8 @@ charge per truth operation using GNU Taler.
aes_gcm_tag_i: [16]; //bytearray
// Encrypted key-share in base32 encoding.
- // After decryption, this yields a KeyShare_. Note that
- // the KeyShare_ MUST be encoded as a fixed-size binary
+ // After decryption, this yields a `KeyShare`. Note that
+ // the `KeyShare` MUST be encoded as a fixed-size binary
// block (instead of in JSON encoding).
//
// HKDF for the key generation must include the