keynesis_core/noise/pattern/
mod.rs

1/*!
2# Noise Handshake patterns
3
4Here are implemented a few of the handshakes available from the noise protocol.
5The naming convention of these patterns matches the one defined in the
6[Noise Specification].
7
8all of these handshakes expect the participants to authenticate. This means that
9We should always be able to authenticate messages between the participants.
10
11Each of these handshakes comes with pros and cons. Before using any of these you
12should look at the [Noise Explorer] to understand the signification of the handshakes
13how you can leverage that.
14
15[Noise Specification]: http://noiseprotocol.org/noise.html
16[Noise Explorer]: https://noiseexplorer.com/patterns/
17*/
18pub mod ik;
19pub mod ix;
20pub mod n;
21pub mod x;
22pub mod xx;
23
24pub use self::{ik::IK, ix::IX, n::N, x::X, xx::XX};