changed friends list to friend list

This commit is contained in:
Jeppler 2015-09-02 00:03:51 +02:00
parent 2a49086e8f
commit be1cd7da57

View File

@ -9,10 +9,10 @@ The generated public key is set as the client_id of the peer.
Adding a friend Adding a friend
--------------- ---------------
Alice adds Bob to her friends list by adding his 32 byte public key (client_id) to her friends list. Alice adds Bob to her friend list by adding his 32 byte public key (client_id) to her friend list.
2 cases: 2 cases:
case 1: Alice adds the public key of Bob, then Bob waits for Alice to attempt to connect to him. case 1: Alice adds the public key of Bob, then Bob waits for Alice to attempt to connect to him.
case 2: Bob and Alice add their respective public keys to their friends list at the same time. case 2: Bob and Alice add their respective public keys to their friend lists at the same time.
case 1: case 1:
Alice sends an onion data (see: Prevent_tracking.txt) packet to Bob with the encrypted part containing the friend request like so: Alice sends an onion data (see: Prevent_tracking.txt) packet to Bob with the encrypted part containing the friend request like so:
@ -27,12 +27,12 @@ For more info on the nospam see: Spam_Prevention.txt
Bob receives the request and decrypts the message using the function crypto_box_open() Bob receives the request and decrypts the message using the function crypto_box_open()
If the message decrypts successfully: If the message decrypts successfully:
If Alice is already in Bob's friends list: case 2 If Alice is already in Bob's friend list: case 2
If Alice is not in Bob's friends list and the nospam is good: Bob is prompt to add Alice and is shown the message from her. If Alice is not in Bob's friend list and the nospam is good: Bob is prompt to add Alice and is shown the message from her.
If Bob accepts Alice friend request he adds her public key to his friends list. If Bob accepts Alice friend request he adds her public key to his friend list.
case 2: case 2:
Bob and Alice both have the others public key in their friends list, they are ready for the next step: Connecting to an already added friend Bob and Alice both have the others public key in their friend list, they are ready for the next step: Connecting to an already added friend
In the next step only crypto_box() is used for encryption and only crypto_box_open() for decryption (just like in the last step.) In the next step only crypto_box() is used for encryption and only crypto_box_open() for decryption (just like in the last step.)