gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[GNUnet-SVN] [taler-api] branch master updated: document actual behavior


From: gnunet
Subject: [GNUnet-SVN] [taler-api] branch master updated: document actual behavior of final #4840 /keys cherry picking implementation
Date: Sun, 17 Sep 2017 16:52:15 +0200

This is an automated email from the git hooks/post-receive script.

grothoff pushed a commit to branch master
in repository api.

The following commit(s) were added to refs/heads/master by this push:
     new 78d100c  document actual behavior of final #4840 /keys cherry picking 
implementation
78d100c is described below

commit 78d100c64adb00908fab0d242f4676d30e3c3bdf
Author: Christian Grothoff <address@hidden>
AuthorDate: Sun Sep 17 16:52:00 2017 +0200

    document actual behavior of final #4840 /keys cherry picking implementation
---
 api-exchange.rst | 8 +++++---
 1 file changed, 5 insertions(+), 3 deletions(-)

diff --git a/api-exchange.rst b/api-exchange.rst
index 54f07b2..575832c 100644
--- a/api-exchange.rst
+++ b/api-exchange.rst
@@ -48,7 +48,7 @@ possibly by using HTTPS.
 
   **Request:**
 
-  :query last_issue_date: optional argument specifying the last value of the 
"list_issue_date" of a "/keys" response that is already known to the client. 
Allows the exchange to only return keys that have changed since that timestamp. 
 The given value must be an unsigned 64-bit integer.
+  :query last_issue_date: optional argument specifying the maximum value of 
any of the "stamp_start" members of the denomination keys of a "/keys" response 
that is already known to the client. Allows the exchange to only return keys 
that have changed since that timestamp.  The given value must be an unsigned 
64-bit integer representing seconds after 1970.
 
   **Response:**
 
@@ -94,13 +94,15 @@ possibly by using HTTPS.
       // is sabotaging end-user anonymity by giving disjoint denomination keys 
to
       // different users.  If a exchange were to do this, this signature 
allows the
       // clients to demonstrate to the public that the exchange is dishonest.
-      eddsa_sig: EddsaSignature;
+      // Only returned if "last_issue_date" was not specified (or not used for 
some
+      // reason and thus the full set of current keys was returned).
+      eddsa_sig?: EddsaSignature;
 
       // Public EdDSA key of the exchange that was used to generate the 
signature.
       // Should match one of the exchange's signing keys from /keys.  It is 
given
       // explicitly as the client might otherwise be confused by clock skew as 
to
       // which signing key was used.
-      eddsa_pub: EddsaPublicKey;
+      eddsa_pub?: EddsaPublicKey;
     }
 
   .. _tsref-type-Denom:

-- 
To stop receiving notification emails like this one, please contact
address@hidden



reply via email to

[Prev in Thread] Current Thread [Next in Thread]