List another place router identity keys are used.

This commit is contained in:
Robert Ransom 2010-12-13 22:42:11 -08:00
parent 021e4ac07e
commit 9776ba7fa4

View File

@ -283,6 +283,8 @@ Created: 12 December 2010
algorithm. The identity key itself is used: algorithm. The identity key itself is used:
- To sign the router descriptors - To sign the router descriptors
- To sign link-key certificates - To sign link-key certificates
- To determine the least significant bits of circuit IDs used on a
Tor instance's links (see tor-spec §5.1)
The fingerprint is used: The fingerprint is used:
- To identify a router identity key in EXTEND cells - To identify a router identity key in EXTEND cells