From aa9bb3adad1af2cdb93e38c5e01837d078534fe6 Mon Sep 17 00:00:00 2001 From: Roger Dingledine Date: Sat, 7 Jan 2006 02:07:42 +0000 Subject: that makes this paragraph extraneous svn:r5749 --- doc/tor-spec.txt | 5 ----- 1 file changed, 5 deletions(-) (limited to 'doc') diff --git a/doc/tor-spec.txt b/doc/tor-spec.txt index 70a215e40a..0fbf6dd888 100644 --- a/doc/tor-spec.txt +++ b/doc/tor-spec.txt @@ -282,11 +282,6 @@ when do we rotate which keys (tls, link, etc)? is used to encrypt the stream of data going from the OP to the OR, and Kb is used to encrypt the stream of data going from the OR to the OP. - The fast-setup case uses the same formula, except that X|Y is used - in place of g^xy in determining K. That is, - K = SHA1(X|Y | [00]) | SHA1(X|Y | [01]) | ... SHA1(X|Y| | [04]) - The values KH, Kf, Kb, Df, and Db are established and used as before. - 4.3. Creating circuits When creating a circuit through the network, the circuit creator -- cgit v1.2.3-54-g00ecf