Selaa lähdekoodia

List another place router identity keys are used.

Robert Ransom 15 vuotta sitten
vanhempi
commit
9776ba7fa4
1 muutettua tiedostoa jossa 2 lisäystä ja 0 poistoa
  1. 2 0
      doc/spec/proposals/ideas/xxx-crypto-migration.txt

+ 2 - 0
doc/spec/proposals/ideas/xxx-crypto-migration.txt

@@ -283,6 +283,8 @@ Created: 12 December 2010
   algorithm.  The identity key itself is used:
     - To sign the router descriptors
     - To sign link-key certificates
+    - To determine the least significant bits of circuit IDs used on a
+      Tor instance's links (see tor-spec §5.1)
 
   The fingerprint is used:
     - To identify a router identity key in EXTEND cells