[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [tor/master] Implement proposal 228: cross-certification with onion keys



commit a2f317913fc48975381696cc381d5f78e25e92b6
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date:   Thu May 28 10:41:43 2015 -0400

    Implement proposal 228: cross-certification with onion keys
    
    Routers now use TAP and ntor onion keys to sign their identity keys,
    and put these signatures in their descriptors.  That allows other
    parties to be confident that the onion keys are indeed controlled by
    the router that generated the descriptor.
---
 src/or/router.c |    2 ++
 1 file changed, 2 insertions(+)

diff --git a/src/or/router.c b/src/or/router.c
index 2087a25..97c2b83 100644
--- a/src/or/router.c
+++ b/src/or/router.c
@@ -2628,6 +2628,8 @@ router_dump_router_to_string(routerinfo_t *router,
   tor_free(identity_pkey);
   tor_free(extra_or_address);
   tor_free(ed_cert_line);
+  tor_free(rsa_tap_cc_line);
+  tor_free(ntor_cc_line);
 
   return output;
 }



_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits