Explorar el Código

Implement proposal 228: cross-certification with onion keys

Routers now use TAP and ntor onion keys to sign their identity keys,
and put these signatures in their descriptors.  That allows other
parties to be confident that the onion keys are indeed controlled by
the router that generated the descriptor.
Nick Mathewson hace 9 años
padre
commit
a2f317913f
Se han modificado 1 ficheros con 2 adiciones y 0 borrados
  1. 2 0
      src/or/router.c

+ 2 - 0
src/or/router.c

@@ -2628,6 +2628,8 @@ router_dump_router_to_string(routerinfo_t *router,
   tor_free(identity_pkey);
   tor_free(extra_or_address);
   tor_free(ed_cert_line);
+  tor_free(rsa_tap_cc_line);
+  tor_free(ntor_cc_line);
 
   return output;
 }