summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2006-01-07 02:07:42 +0000
committerRoger Dingledine <arma@torproject.org>2006-01-07 02:07:42 +0000
commitaa9bb3adad1af2cdb93e38c5e01837d078534fe6 (patch)
tree80d5c829afc7f4ecbc3e853eb740d77cf4ab2b7c
parent4c64138d71fe45879ff7df396c76b6d8ca3ee27c (diff)
downloadtor-aa9bb3adad1af2cdb93e38c5e01837d078534fe6.tar.gz
tor-aa9bb3adad1af2cdb93e38c5e01837d078534fe6.zip
that makes this paragraph extraneous
svn:r5749
-rw-r--r--doc/tor-spec.txt5
1 files changed, 0 insertions, 5 deletions
diff --git a/doc/tor-spec.txt b/doc/tor-spec.txt
index 70a215e40a..0fbf6dd888 100644
--- a/doc/tor-spec.txt
+++ b/doc/tor-spec.txt
@@ -282,11 +282,6 @@ when do we rotate which keys (tls, link, etc)?
is used to encrypt the stream of data going from the OP to the OR, and
Kb is used to encrypt the stream of data going from the OR to the OP.
- The fast-setup case uses the same formula, except that X|Y is used
- in place of g^xy in determining K. That is,
- K = SHA1(X|Y | [00]) | SHA1(X|Y | [01]) | ... SHA1(X|Y| | [04])
- The values KH, Kf, Kb, Df, and Db are established and used as before.
-
4.3. Creating circuits
When creating a circuit through the network, the circuit creator