aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2015-05-28 10:41:43 -0400
committerNick Mathewson <nickm@torproject.org>2015-05-28 10:41:43 -0400
commita2f317913fc48975381696cc381d5f78e25e92b6 (patch)
tree1abb2179b0a34d050dabb4ab7ba77e6f0035d904
parentefa21bb94188863e4ff5d8a288144cd93db00fe3 (diff)
downloadtor-a2f317913fc48975381696cc381d5f78e25e92b6.tar.gz
tor-a2f317913fc48975381696cc381d5f78e25e92b6.zip
Implement proposal 228: cross-certification with onion keys
Routers now use TAP and ntor onion keys to sign their identity keys, and put these signatures in their descriptors. That allows other parties to be confident that the onion keys are indeed controlled by the router that generated the descriptor.
-rw-r--r--src/or/router.c2
1 files changed, 2 insertions, 0 deletions
diff --git a/src/or/router.c b/src/or/router.c
index 2087a25fca..97c2b8398d 100644
--- a/src/or/router.c
+++ b/src/or/router.c
@@ -2628,6 +2628,8 @@ router_dump_router_to_string(routerinfo_t *router,
tor_free(identity_pkey);
tor_free(extra_or_address);
tor_free(ed_cert_line);
+ tor_free(rsa_tap_cc_line);
+ tor_free(ntor_cc_line);
return output;
}