mirror of
https://github.com/irungentoo/toxcore.git
synced 2024-03-22 13:30:51 +08:00
changed friends list to friend list
This commit is contained in:
parent
2a49086e8f
commit
be1cd7da57
|
@ -9,10 +9,10 @@ The generated public key is set as the client_id of the peer.
|
||||||
Adding a friend
|
Adding a friend
|
||||||
---------------
|
---------------
|
||||||
|
|
||||||
Alice adds Bob to her friends list by adding his 32 byte public key (client_id) to her friends list.
|
Alice adds Bob to her friend list by adding his 32 byte public key (client_id) to her friend list.
|
||||||
2 cases:
|
2 cases:
|
||||||
case 1: Alice adds the public key of Bob, then Bob waits for Alice to attempt to connect to him.
|
case 1: Alice adds the public key of Bob, then Bob waits for Alice to attempt to connect to him.
|
||||||
case 2: Bob and Alice add their respective public keys to their friends list at the same time.
|
case 2: Bob and Alice add their respective public keys to their friend lists at the same time.
|
||||||
|
|
||||||
case 1:
|
case 1:
|
||||||
Alice sends an onion data (see: Prevent_tracking.txt) packet to Bob with the encrypted part containing the friend request like so:
|
Alice sends an onion data (see: Prevent_tracking.txt) packet to Bob with the encrypted part containing the friend request like so:
|
||||||
|
@ -27,12 +27,12 @@ For more info on the nospam see: Spam_Prevention.txt
|
||||||
Bob receives the request and decrypts the message using the function crypto_box_open()
|
Bob receives the request and decrypts the message using the function crypto_box_open()
|
||||||
|
|
||||||
If the message decrypts successfully:
|
If the message decrypts successfully:
|
||||||
If Alice is already in Bob's friends list: case 2
|
If Alice is already in Bob's friend list: case 2
|
||||||
If Alice is not in Bob's friends list and the nospam is good: Bob is prompt to add Alice and is shown the message from her.
|
If Alice is not in Bob's friend list and the nospam is good: Bob is prompt to add Alice and is shown the message from her.
|
||||||
If Bob accepts Alice friend request he adds her public key to his friends list.
|
If Bob accepts Alice friend request he adds her public key to his friend list.
|
||||||
|
|
||||||
case 2:
|
case 2:
|
||||||
Bob and Alice both have the others public key in their friends list, they are ready for the next step: Connecting to an already added friend
|
Bob and Alice both have the others public key in their friend list, they are ready for the next step: Connecting to an already added friend
|
||||||
|
|
||||||
In the next step only crypto_box() is used for encryption and only crypto_box_open() for decryption (just like in the last step.)
|
In the next step only crypto_box() is used for encryption and only crypto_box_open() for decryption (just like in the last step.)
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue
Block a user