summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJeppler <jeremias.eppler@mailbox.org>2015-09-02 00:03:51 +0200
committerEniz Vukovic <eniz_vukovic@hotmail.com>2015-10-23 22:54:22 +0200
commit4afe6a295e26daed2f817355924a6e26aada5452 (patch)
tree35bf70a2df4807fbbe134f5a831db035e578a7fc
parentea06bf8e573ccd244576af30c4ea360046f4d275 (diff)
changed friends list to friend list
-rw-r--r--docs/updates/Crypto.md12
1 files changed, 6 insertions, 6 deletions
diff --git a/docs/updates/Crypto.md b/docs/updates/Crypto.md
index cdefec30..bfb01034 100644
--- a/docs/updates/Crypto.md
+++ b/docs/updates/Crypto.md
@@ -9,10 +9,10 @@ The generated public key is set as the client_id of the peer.
9Adding a friend 9Adding a friend
10--------------- 10---------------
11 11
12Alice adds Bob to her friends list by adding his 32 byte public key (client_id) to her friends list. 12Alice adds Bob to her friend list by adding his 32 byte public key (client_id) to her friend list.
132 cases: 132 cases:
14case 1: Alice adds the public key of Bob, then Bob waits for Alice to attempt to connect to him. 14case 1: Alice adds the public key of Bob, then Bob waits for Alice to attempt to connect to him.
15case 2: Bob and Alice add their respective public keys to their friends list at the same time. 15case 2: Bob and Alice add their respective public keys to their friend lists at the same time.
16 16
17case 1: 17case 1:
18Alice sends an onion data (see: Prevent_tracking.txt) packet to Bob with the encrypted part containing the friend request like so: 18Alice sends an onion data (see: Prevent_tracking.txt) packet to Bob with the encrypted part containing the friend request like so:
@@ -27,12 +27,12 @@ For more info on the nospam see: Spam_Prevention.txt
27Bob receives the request and decrypts the message using the function crypto_box_open() 27Bob receives the request and decrypts the message using the function crypto_box_open()
28 28
29If the message decrypts successfully: 29If the message decrypts successfully:
30If Alice is already in Bob's friends list: case 2 30If Alice is already in Bob's friend list: case 2
31If Alice is not in Bob's friends list and the nospam is good: Bob is prompt to add Alice and is shown the message from her. 31If Alice is not in Bob's friend list and the nospam is good: Bob is prompt to add Alice and is shown the message from her.
32If Bob accepts Alice friend request he adds her public key to his friends list. 32If Bob accepts Alice friend request he adds her public key to his friend list.
33 33
34case 2: 34case 2:
35Bob and Alice both have the others public key in their friends list, they are ready for the next step: Connecting to an already added friend 35Bob and Alice both have the others public key in their friend list, they are ready for the next step: Connecting to an already added friend
36 36
37In the next step only crypto_box() is used for encryption and only crypto_box_open() for decryption (just like in the last step.) 37In the next step only crypto_box() is used for encryption and only crypto_box_open() for decryption (just like in the last step.)
38 38