浏览代码

correct the key material paragraph

svn:r5748
Roger Dingledine 20 年之前
父节点
当前提交
4c64138d71
共有 1 个文件被更改,包括 6 次插入6 次删除
  1. 6 6
      doc/tor-spec.txt

+ 6 - 6
doc/tor-spec.txt

@@ -268,12 +268,12 @@ when do we rotate which keys (tls, link, etc)?
    If CREATE_FAST is used, the client and server base their key material on
    If CREATE_FAST is used, the client and server base their key material on
    K0=X|Y.
    K0=X|Y.
 
 
-   From the base key material g^xy, they compute derivative key material as
-   follows.  Next, the server computes 100 bytes of key data as K = SHA1(K0
-   | [00]) | SHA1(K0 | [01]) | ... SHA1(K0 | [04]) where "00" is a single
-   octet whose value is zero, [01] is a single octet whose value is one, etc.
-   The first 20 bytes of K form KH, bytes 21-40 form the forward digest Df,
-   41-60 form the backward digest Db, 61-76 form Kf, and 77-92 form Kb.
+   From the base key material K0, they compute 100 bytes of derivative
+   key data as K = SHA1(K0 | [00]) | SHA1(K0 | [01]) | ... SHA1(K0 |
+   [04]) where "00" is a single octet whose value is zero, [01] is a
+   single octet whose value is one, etc.  The first 20 bytes of K form
+   KH, bytes 21-40 form the forward digest Df, 41-60 form the backward
+   digest Db, 61-76 form Kf, and 77-92 form Kb.
 
 
    KH is used in the handshake response to demonstrate knowledge of the
    KH is used in the handshake response to demonstrate knowledge of the
    computed shared key. Df is used to seed the integrity-checking hash
    computed shared key. Df is used to seed the integrity-checking hash