fix minor typo in tor-spec

svn:r977
This commit is contained in:
Roger Dingledine 2004-01-07 22:56:06 +00:00
parent 933d531f15
commit e244ab7c72

View File

@ -158,7 +158,7 @@ EVEN LATER:
Once the handshake between the OP and an OR is completed, both
servers can now calculate g^xy with ordinary DH. From the base key
material g^xy, they compute derivate key material as follows.
material g^xy, they compute derivative key material as follows.
First, the server represents g^xy as a big-endian unsigned integer.
Next, the server computes 60 bytes of key data as K = SHA1(g^xy |
[00]) | SHA1(g^xy | [01]) | SHA1(g^xy | [02]) where "00" is a single