that makes this paragraph extraneous

svn:r5749
This commit is contained in:
Roger Dingledine 2006-01-07 02:07:42 +00:00
parent 4c64138d71
commit aa9bb3adad

View File

@ -282,11 +282,6 @@ when do we rotate which keys (tls, link, etc)?
is used to encrypt the stream of data going from the OP to the OR, and
Kb is used to encrypt the stream of data going from the OR to the OP.
The fast-setup case uses the same formula, except that X|Y is used
in place of g^xy in determining K. That is,
K = SHA1(X|Y | [00]) | SHA1(X|Y | [01]) | ... SHA1(X|Y| | [04])
The values KH, Kf, Kb, Df, and Db are established and used as before.
4.3. Creating circuits
When creating a circuit through the network, the circuit creator