add links
This commit is contained in:
parent
76bf60a12f
commit
f76ff36545
1 changed files with 7 additions and 7 deletions
|
@ -436,20 +436,20 @@ In general, verification operates as follows:
|
|||
|
||||
- Alice requests a key verification with Bob by sending a key verification
|
||||
request event. If the verification is being requested in a room, this will
|
||||
be an event with type `m.room.message` and `msgtype`
|
||||
`m.key.verification.request`; if the verification is being requested using
|
||||
be an event with type [`m.room.message` and `msgtype:
|
||||
m.key.verification.request`](#mroommessagemkeyverificationrequest); if the verification is being requested using
|
||||
to-device messaging, this will be an event with type
|
||||
`m.key.verification.request`. This event indicates the verification methods
|
||||
[`m.key.verification.request`](#mkeyverificationrequest). This event indicates the verification methods
|
||||
that Alice's client supports. (Note that "Alice" and "Bob" may in fact be the
|
||||
same user, in the case where a user is verifying their own devices.)
|
||||
- Bob's client prompts Bob to accept the key verification. When Bob accepts
|
||||
the verification, Bob's client sends an `m.key.verification.ready` event.
|
||||
the verification, Bob's client sends an [`m.key.verification.ready`](#mkeyverificationready) event.
|
||||
This event indicates the verification methods, corresponding to the
|
||||
verification methods supported by Alice's client, that Bob's client supports.
|
||||
- Alice's or Bob's devices allow their users to select one of the verification
|
||||
methods supported by both devices to use for verification. When Alice or Bob
|
||||
selects a verification method, their device begins the verification by
|
||||
sending an `m.key.verification.start` event, indicating the selected
|
||||
sending an [`m.key.verification.start`](#mkeyverificationstart) event, indicating the selected
|
||||
verification method. Note that if there is only one verification method in
|
||||
common between the devices then the receiver's device (Bob) can auto-select
|
||||
it.
|
||||
|
@ -457,11 +457,11 @@ In general, verification operates as follows:
|
|||
verification method. This could involve their clients exchanging messages,
|
||||
Alice and Bob exchanging information out-of-band, and/or Alice and Bob
|
||||
interacting with their devices.
|
||||
- Alice's and Bob's clients send `m.key.verification.done` events to indicate
|
||||
- Alice's and Bob's clients send [`m.key.verification.done`](#mkeyverificationdone) events to indicate
|
||||
that the verification was successful.
|
||||
|
||||
Verifications can be cancelled by either device at any time by sending an
|
||||
`m.key.verification.cancel` event with a `code` field that indicates the reason
|
||||
[`m.key.verification.cancel`](#mkeyverificationcancel) event with a `code` field that indicates the reason
|
||||
it was cancelled.
|
||||
|
||||
When using to-device messages, Alice may not know which of Bob's devices to
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue