소스 검색

List another place router identity keys are used.

Robert Ransom 15 년 전
부모
커밋
9776ba7fa4
1개의 변경된 파일2개의 추가작업 그리고 0개의 파일을 삭제
  1. 2 0
      doc/spec/proposals/ideas/xxx-crypto-migration.txt

+ 2 - 0
doc/spec/proposals/ideas/xxx-crypto-migration.txt

@@ -283,6 +283,8 @@ Created: 12 December 2010
   algorithm.  The identity key itself is used:
   algorithm.  The identity key itself is used:
     - To sign the router descriptors
     - To sign the router descriptors
     - To sign link-key certificates
     - To sign link-key certificates
+    - To determine the least significant bits of circuit IDs used on a
+      Tor instance's links (see tor-spec §5.1)
 
 
   The fingerprint is used:
   The fingerprint is used:
     - To identify a router identity key in EXTEND cells
     - To identify a router identity key in EXTEND cells