2 This file is part of GNUnet.
3 (C) 2001-2011 Christian Grothoff (and other contributing authors)
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 2, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
22 * @author Nathan Evans
25 * @brief Common type definitions for the network size estimation
31 #include "gnunet_common.h"
33 #define DEBUG_NSE GNUNET_YES
37 * Network size estimate sent from the service
38 * to clients. Contains the current size estimate
39 * (or 0 if none has been calculated) and the
40 * standard deviation of known estimates.
43 struct GNUNET_NSE_ClientMessage
46 * Type: GNUNET_MESSAGE_TYPE_NSE_UPDATE
48 struct GNUNET_MessageHeader header;
51 * The current estimated network size.
56 * The standard deviation (rounded down
57 * to the nearest integer) of size
64 * Network size estimate reply; sent when "this"
65 * peer's timer has run out before receiving a
66 * valid reply from another peer.
68 * FIXME: Is this the right way to do this?
69 * I think we need to include both the public
70 * key and the timestamp signed by the private
71 * key. This way a recipient
72 * can verify that the peer at least generated
73 * the public/private key pair, and that the
74 * timestamp matches what the current peer
75 * believes it should be. The receiving peer
76 * would then check whether the XOR of the peer
77 * identity and the timestamp is within a
78 * reasonable range of the current time
79 * (+/- N seconds). If a closer message which
80 * also verifies hasn't been received (or this
81 * message is a duplicate), the peer
82 * calculates the size estimate and forwards
83 * the request to all other peers.
85 * Hmm... Is it enought to *just* send the peer
86 * identity? Obviously this is smaller, but it
87 * doesn't allow us to verify that the
88 * public/private key pair were generated, right?
90 struct GNUNET_NSE_FloodMessage
93 * Type: GNUNET_MESSAGE_TYPE_NSE_P2P_FLOOD
95 struct GNUNET_MessageHeader header;
98 * Magic header code(?)
103 * Number of matching bits between the hash
104 * of timestamp and the initiator's public
110 * The current timestamp value (which all
111 * peers should agree on).
113 struct GNUNET_TIME_AbsoluteNBO timestamp;
116 * Public key of the originator.
118 struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pkey;
121 * FIXME: use, document.
123 uint32_t proof_of_work;
126 * FIXME: use, document.
128 struct GNUNET_CRYPTO_RsaSignature signature;