You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: README.md
+20-20
Original file line number
Diff line number
Diff line change
@@ -63,7 +63,7 @@ const (
63
63
```
64
64
65
65
66
-
[[Return to contents]](#Contents)
66
+
67
67
68
68
```v
69
69
const (
@@ -75,7 +75,7 @@ const (
75
75
76
76
This const for Curve25519 based curve
77
77
78
-
[[Return to contents]](#Contents)
78
+
79
79
80
80
## x25519
81
81
```v
@@ -88,7 +88,7 @@ The functions take a scalar and a u-coordinate as inputs and produce a u-coordin
88
88
Although the functions work internally with integers, the inputs and outputs are 32-byte strings (for X25519) scalar can be generated at random, for example with `crypto.rand` and point should
89
89
be either base_point or the output of another `x25519` call.
90
90
91
-
[[Return to contents]](#Contents)
91
+
92
92
93
93
## Curve
94
94
```v
@@ -110,7 +110,7 @@ Basically, Curve is a TLS 1.3 NamedGroup.
public_key is accessor for `privatekey.pubk` public key part, its does check if matching public key part or initializes PublicKey if not. Initialization is does under `sync.do_with_param`
193
193
to make sure its that a function is executed only once.
0 commit comments