Explorar o código

Implement proposal 228: cross-certification with onion keys

Routers now use TAP and ntor onion keys to sign their identity keys,
and put these signatures in their descriptors.  That allows other
parties to be confident that the onion keys are indeed controlled by
the router that generated the descriptor.
Nick Mathewson %!s(int64=9) %!d(string=hai) anos
pai
achega
a2f317913f
Modificáronse 1 ficheiros con 2 adicións e 0 borrados
  1. 2 0
      src/or/router.c

+ 2 - 0
src/or/router.c

@@ -2628,6 +2628,8 @@ router_dump_router_to_string(routerinfo_t *router,
   tor_free(identity_pkey);
   tor_free(extra_or_address);
   tor_free(ed_cert_line);
+  tor_free(rsa_tap_cc_line);
+  tor_free(ntor_cc_line);
 
   return output;
 }