|  | @@ -274,7 +274,7 @@ tor_tls_create_certificate(crypto_pk_env_t *rsa,
 | 
	
		
			
				|  |  |    if ((nid = OBJ_txt2nid("organizationName")) == NID_undef)
 | 
	
		
			
				|  |  |      goto error;
 | 
	
		
			
				|  |  |    if (!(X509_NAME_add_entry_by_NID(name, nid, MBSTRING_ASC,
 | 
	
		
			
				|  |  | -                                   (unsigned char*)"Tor", -1, -1, 0)))
 | 
	
		
			
				|  |  | +                                   (unsigned char*)"t o r", -1, -1, 0)))
 | 
	
		
			
				|  |  |      goto error;
 | 
	
		
			
				|  |  |    if ((nid = OBJ_txt2nid("commonName")) == NID_undef) goto error;
 | 
	
		
			
				|  |  |    if (!(X509_NAME_add_entry_by_NID(name, nid, MBSTRING_ASC,
 | 
	
	
		
			
				|  | @@ -288,7 +288,7 @@ tor_tls_create_certificate(crypto_pk_env_t *rsa,
 | 
	
		
			
				|  |  |    if ((nid = OBJ_txt2nid("organizationName")) == NID_undef)
 | 
	
		
			
				|  |  |      goto error;
 | 
	
		
			
				|  |  |    if (!(X509_NAME_add_entry_by_NID(name_issuer, nid, MBSTRING_ASC,
 | 
	
		
			
				|  |  | -                                   (unsigned char*)"Tor", -1, -1, 0)))
 | 
	
		
			
				|  |  | +                                   (unsigned char*)"t o r", -1, -1, 0)))
 | 
	
		
			
				|  |  |      goto error;
 | 
	
		
			
				|  |  |    if ((nid = OBJ_txt2nid("commonName")) == NID_undef) goto error;
 | 
	
		
			
				|  |  |    if (!(X509_NAME_add_entry_by_NID(name_issuer, nid, MBSTRING_ASC,
 | 
	
	
		
			
				|  | @@ -361,7 +361,7 @@ tor_tls_context_new(crypto_pk_env_t *identity, const char *nickname,
 | 
	
		
			
				|  |  |    char nn2[128];
 | 
	
		
			
				|  |  |    if (!nickname)
 | 
	
		
			
				|  |  |      nickname = "null";
 | 
	
		
			
				|  |  | -  tor_snprintf(nn2, sizeof(nn2), "%s <identity>", nickname);
 | 
	
		
			
				|  |  | +  tor_snprintf(nn2, sizeof(nn2), "%s <signing>", nickname);
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |    tor_tls_init();
 | 
	
		
			
				|  |  |  
 |