Просмотр исходного кода

Implement proposal 228: cross-certification with onion keys

Routers now use TAP and ntor onion keys to sign their identity keys,
and put these signatures in their descriptors.  That allows other
parties to be confident that the onion keys are indeed controlled by
the router that generated the descriptor.
Nick Mathewson 10 лет назад
Родитель
Сommit
a2f317913f
1 измененных файлов с 2 добавлено и 0 удалено
  1. 2 0
      src/or/router.c

+ 2 - 0
src/or/router.c

@@ -2628,6 +2628,8 @@ router_dump_router_to_string(routerinfo_t *router,
   tor_free(identity_pkey);
   tor_free(extra_or_address);
   tor_free(ed_cert_line);
+  tor_free(rsa_tap_cc_line);
+  tor_free(ntor_cc_line);
 
   return output;
 }