summaryrefslogtreecommitdiff
path: root/docs
diff options
context:
space:
mode:
authorJeppler <jeremias.eppler@mailbox.org>2015-09-01 21:42:20 +0200
committerJeppler <jeremias.eppler@mailbox.org>2015-09-01 21:42:20 +0200
commit060a8fb9fd7d6db798ab470c830a6f03a08b7f64 (patch)
tree7efa15cbcb833b298c89e00a99a81cfcab054a95 /docs
parent2ab3b14731061cc04d3ccc50a35093c11d018298 (diff)
small typo change
bob -> Bob Bobs -> Bob's fixed some wired sentences
Diffstat (limited to 'docs')
-rw-r--r--docs/updates/Crypto.md16
1 files changed, 8 insertions, 8 deletions
diff --git a/docs/updates/Crypto.md b/docs/updates/Crypto.md
index cee03f0a..87cdb71d 100644
--- a/docs/updates/Crypto.md
+++ b/docs/updates/Crypto.md
@@ -9,27 +9,27 @@ The generated public key is set as the client_id of the peer.
9Adding a friend 9Adding a friend
10--------------- 10---------------
11 11
12Alice adds bob to her friends list by adding his 32 byte public key (client_id) to her friends list. 12Alice adds Bob to her friends list by adding his 32 byte public key (client_id) to her friends list.
132 cases: 132 cases:
14case 1: Alice adds Bobs public key and bob waits for Alice to attempt to connect to him. 14case 1: Alice adds the public key Bob, then Bob waits for Alice to attempt to connect to him.
15case 2: Bob and Alice add their respective public keys to their friends list at the same time. 15case 2: Bob and Alice add their respective public keys to their friends list at the same time.
16 16
17case 1: 17case 1:
18Alice sends a onion data (see: Prevent_tracking.txt) packet to bob with the encrypted part containing the friends request like so: 18Alice sends an onion data (see: Prevent_tracking.txt) packet to Bob with the encrypted part containing the friend request like so:
19``` 19```
20[char with a value of 32][nospam number (4 bytes)][Message] 20[char with a value of 32][nospam number (4 bytes)][Message]
21``` 21```
22 22
23Ex message: hello bob it's me alice -_- add me pl0x. 23Ex message: hello Bob it's me Alice -_- add me pl0x.
24 24
25For more info on the nospam see: Spam_Prevention.txt 25For more info on the nospam see: Spam_Prevention.txt
26 26
27Bob receives the request and decrypts the message using the function crypto_box_open() 27Bob receives the request and decrypts the message using the function crypto_box_open()
28 28
29If the message decrypts successfully: 29If the message decrypts successfully:
30If Alice is already in Bobs friends list: case 2 30If Alice is already in Bob's friends list: case 2
31If Alice is not in Bob's friends list and the nospam is good: Bob is prompt to add Alice and is shown the message from her. 31If Alice is not in Bob's friends list and the nospam is good: Bob is prompt to add Alice and is shown the message from her.
32If Bobs accepts Alice's friends request he adds her public key to his friends list. 32If Bob accepts Alice friend request he adds her public key to his friends list.
33 33
34case 2: 34case 2:
35Bob and Alice both have the others public key in their friends list, they are ready for the next step: Connecting to an already added friend 35Bob and Alice both have the others public key in their friends list, they are ready for the next step: Connecting to an already added friend
@@ -46,9 +46,9 @@ Crypto request packets
46-------------------------------------- 46--------------------------------------
47 47
48``` 48```
49[char with a value of 32][Bob's (The reciever's) Public key (client_id) (32 bytes))][Alice's (The sender's) Public key (client_id) (32 bytes)][Random nonce (24 bytes)][Encrypted message] 49[char with a value of 32][Bob (The reciever's) Public key (client_id) (32 bytes))][Alice's (The sender's) Public key (client_id) (32 bytes)][Random nonce (24 bytes)][Encrypted message]
50``` 50```
51 51
52The encrypted message is encrypted with crypto_box() (using Bobs public key, Alice's private key and the nonce (randomly generated 24 bytes)) and is a message from Alice in which she tells Bob who she is. 52The encrypted message is encrypted with crypto_box() (using Bob's public key, Alice's private key and the nonce (randomly generated 24 bytes)) and is a message from Alice in which she tells Bob who she is.
53 53
54Each node can route the request to the receiver if they are connected to him. This is to bypass bad NATs. 54Each node can route the request to the receiver if they are connected to him. This is to bypass bad NATs.