diff options
author | Jeppler <jeremias.eppler@mailbox.org> | 2015-09-01 21:42:20 +0200 |
---|---|---|
committer | Jeppler <jeremias.eppler@mailbox.org> | 2015-09-01 21:42:20 +0200 |
commit | 060a8fb9fd7d6db798ab470c830a6f03a08b7f64 (patch) | |
tree | 7efa15cbcb833b298c89e00a99a81cfcab054a95 /docs/updates/Crypto.md | |
parent | 2ab3b14731061cc04d3ccc50a35093c11d018298 (diff) |
small typo change
bob -> Bob
Bobs -> Bob's
fixed some wired sentences
Diffstat (limited to 'docs/updates/Crypto.md')
-rw-r--r-- | docs/updates/Crypto.md | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/docs/updates/Crypto.md b/docs/updates/Crypto.md index cee03f0a..87cdb71d 100644 --- a/docs/updates/Crypto.md +++ b/docs/updates/Crypto.md | |||
@@ -9,27 +9,27 @@ The generated public key is set as the client_id of the peer. | |||
9 | Adding a friend | 9 | Adding a friend |
10 | --------------- | 10 | --------------- |
11 | 11 | ||
12 | Alice adds bob to her friends list by adding his 32 byte public key (client_id) to her friends list. | 12 | Alice adds Bob to her friends list by adding his 32 byte public key (client_id) to her friends list. |
13 | 2 cases: | 13 | 2 cases: |
14 | case 1: Alice adds Bobs public key and bob waits for Alice to attempt to connect to him. | 14 | case 1: Alice adds the public key Bob, then Bob waits for Alice to attempt to connect to him. |
15 | case 2: Bob and Alice add their respective public keys to their friends list at the same time. | 15 | case 2: Bob and Alice add their respective public keys to their friends list at the same time. |
16 | 16 | ||
17 | case 1: | 17 | case 1: |
18 | Alice sends a onion data (see: Prevent_tracking.txt) packet to bob with the encrypted part containing the friends request like so: | 18 | Alice sends an onion data (see: Prevent_tracking.txt) packet to Bob with the encrypted part containing the friend request like so: |
19 | ``` | 19 | ``` |
20 | [char with a value of 32][nospam number (4 bytes)][Message] | 20 | [char with a value of 32][nospam number (4 bytes)][Message] |
21 | ``` | 21 | ``` |
22 | 22 | ||
23 | Ex message: hello bob it's me alice -_- add me pl0x. | 23 | Ex message: hello Bob it's me Alice -_- add me pl0x. |
24 | 24 | ||
25 | For more info on the nospam see: Spam_Prevention.txt | 25 | For more info on the nospam see: Spam_Prevention.txt |
26 | 26 | ||
27 | Bob receives the request and decrypts the message using the function crypto_box_open() | 27 | Bob receives the request and decrypts the message using the function crypto_box_open() |
28 | 28 | ||
29 | If the message decrypts successfully: | 29 | If the message decrypts successfully: |
30 | If Alice is already in Bobs friends list: case 2 | 30 | If Alice is already in Bob's friends list: case 2 |
31 | If Alice is not in Bob's friends list and the nospam is good: Bob is prompt to add Alice and is shown the message from her. | 31 | If Alice is not in Bob's friends list and the nospam is good: Bob is prompt to add Alice and is shown the message from her. |
32 | If Bobs accepts Alice's friends request he adds her public key to his friends list. | 32 | If Bob accepts Alice friend request he adds her public key to his friends list. |
33 | 33 | ||
34 | case 2: | 34 | case 2: |
35 | Bob and Alice both have the others public key in their friends list, they are ready for the next step: Connecting to an already added friend | 35 | Bob and Alice both have the others public key in their friends list, they are ready for the next step: Connecting to an already added friend |
@@ -46,9 +46,9 @@ Crypto request packets | |||
46 | -------------------------------------- | 46 | -------------------------------------- |
47 | 47 | ||
48 | ``` | 48 | ``` |
49 | [char with a value of 32][Bob's (The reciever's) Public key (client_id) (32 bytes))][Alice's (The sender's) Public key (client_id) (32 bytes)][Random nonce (24 bytes)][Encrypted message] | 49 | [char with a value of 32][Bob (The reciever's) Public key (client_id) (32 bytes))][Alice's (The sender's) Public key (client_id) (32 bytes)][Random nonce (24 bytes)][Encrypted message] |
50 | ``` | 50 | ``` |
51 | 51 | ||
52 | The encrypted message is encrypted with crypto_box() (using Bobs public key, Alice's private key and the nonce (randomly generated 24 bytes)) and is a message from Alice in which she tells Bob who she is. | 52 | The encrypted message is encrypted with crypto_box() (using Bob's public key, Alice's private key and the nonce (randomly generated 24 bytes)) and is a message from Alice in which she tells Bob who she is. |
53 | 53 | ||
54 | Each node can route the request to the receiver if they are connected to him. This is to bypass bad NATs. | 54 | Each node can route the request to the receiver if they are connected to him. This is to bypass bad NATs. |