diff options
author | Bart Polot <bart@net.in.tum.de> | 2015-04-27 19:14:13 +0000 |
---|---|---|
committer | Bart Polot <bart@net.in.tum.de> | 2015-04-27 19:14:13 +0000 |
commit | 9e037307576cb21d9f04b9686d7c41cf4c5e37b0 (patch) | |
tree | 96cc5db9ae345f1595db61ce59bb2ad5bfab99d5 /src/cadet/cadet_protocol.h | |
parent | 3e019a9daf7d01f2ee1fdcc2009be2f017e0244c (diff) | |
download | gnunet-9e037307576cb21d9f04b9686d7c41cf4c5e37b0.tar.gz gnunet-9e037307576cb21d9f04b9686d7c41cf4c5e37b0.zip |
- refactor kx handling
Diffstat (limited to 'src/cadet/cadet_protocol.h')
-rw-r--r-- | src/cadet/cadet_protocol.h | 21 |
1 files changed, 21 insertions, 0 deletions
diff --git a/src/cadet/cadet_protocol.h b/src/cadet/cadet_protocol.h index dc91af304..1c0a1a89f 100644 --- a/src/cadet/cadet_protocol.h +++ b/src/cadet/cadet_protocol.h | |||
@@ -72,6 +72,7 @@ struct GNUNET_CADET_ConnectionCreate | |||
72 | /* struct GNUNET_PeerIdentity peers[path_length]; */ | 72 | /* struct GNUNET_PeerIdentity peers[path_length]; */ |
73 | }; | 73 | }; |
74 | 74 | ||
75 | |||
75 | /** | 76 | /** |
76 | * Message for ack'ing a connection | 77 | * Message for ack'ing a connection |
77 | */ | 78 | */ |
@@ -109,6 +110,26 @@ struct GNUNET_CADET_KX | |||
109 | }; | 110 | }; |
110 | 111 | ||
111 | 112 | ||
113 | |||
114 | /** | ||
115 | * Message for encapsulation of a Key eXchange message in a connection. | ||
116 | */ | ||
117 | struct GNUNET_CADET_AX_KX | ||
118 | { | ||
119 | /** | ||
120 | * Type: GNUNET_MESSAGE_TYPE_CADET_AX_KX. | ||
121 | */ | ||
122 | struct GNUNET_MessageHeader header; | ||
123 | |||
124 | /** | ||
125 | * Ephemeral public ECC key (always for NIST P-521) encoded in a format | ||
126 | * suitable for network transmission as created using 'gcry_sexp_sprint'. | ||
127 | */ | ||
128 | struct GNUNET_CRYPTO_EcdhePublicKey ephemeral_key; | ||
129 | |||
130 | }; | ||
131 | |||
132 | |||
112 | /** | 133 | /** |
113 | * Message transmitted with the signed ephemeral key of a peer. The | 134 | * Message transmitted with the signed ephemeral key of a peer. The |
114 | * session key is then derived from the two ephemeral keys (ECDHE). | 135 | * session key is then derived from the two ephemeral keys (ECDHE). |