Apply suggestions from code review
Co-authored-by: Travis Ralston <travpc@gmail.com>
This commit is contained in:
parent
de1a468630
commit
1638d2f32e
1 changed files with 6 additions and 3 deletions
|
@ -416,7 +416,7 @@ In general, verification operates as follows:
|
|||
methods that Alice's client supports. (Note that "Alice" and "Bob" may in
|
||||
fact be the same user, in the case where a user is verifying their own
|
||||
devices.)
|
||||
- Bob's client prompts Bob to accepts the key verification. When Bob accepts
|
||||
- Bob's client prompts Bob to accept the key verification. When Bob accepts
|
||||
the verification, Bob's client sends an `m.key.verification.ready` event.
|
||||
This event indicates the verification methods, corresponding to the
|
||||
verification methods supported by Alice's client, that Bob's client supports.
|
||||
|
@ -424,7 +424,9 @@ In general, verification operates as follows:
|
|||
methods supported by both devices to use for verification. When Alice or Bob
|
||||
selects a verification method, their device begins the verification by
|
||||
sending an `m.key.verification.start` event, indicating the selected
|
||||
verification method.
|
||||
verification method. Note that if there is only one verification method in
|
||||
common between the devices then the receiver's device (Bob) can auto-select
|
||||
it.
|
||||
- Alice and Bob complete the verification as defined by the selected
|
||||
verification method. This could involve their clients exchanging messages,
|
||||
Alice and Bob exchanging information out-of-band, and/or Alice and Bob
|
||||
|
@ -490,7 +492,8 @@ ensure that encryption does not hinder the verification. For example, if the
|
|||
verification messages are encrypted, clients must ensure that all the
|
||||
recipient's unverified devices receive the keys necessary to decrypt the
|
||||
messages, even if they would normally not be given the keys to decrypt messages
|
||||
in the room. Alternatively, verification messages may be sent unencrypted.
|
||||
in the room. Alternatively, verification messages may be sent unencrypted,
|
||||
though this is not encouraged.
|
||||
|
||||
Upon receipt of Alice's `m.key.verification.request` message, if Bob's device
|
||||
does not understand any of the methods, it should not cancel the request as one
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue