summaryrefslogtreecommitdiff
path: root/src/common
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2016-09-11 17:54:12 -0400
committerNick Mathewson <nickm@torproject.org>2016-11-03 08:40:10 -0400
commit70e7d28b3edebd1e288e68ba7c7c17acd4d91b2d (patch)
tree2961ec2efbc94f636e10343961bf4acc19235ad5 /src/common
parent805e97a4336f07e366937f7ce4da0733fa4884c1 (diff)
downloadtor-70e7d28b3edebd1e288e68ba7c7c17acd4d91b2d.tar.gz
tor-70e7d28b3edebd1e288e68ba7c7c17acd4d91b2d.zip
Generate our x509 certificates using sha256, not sha1.
All supported Tors (0.2.4+) require versions of openssl that can handle this. Now that our link certificates are RSA2048, this might actually help vs fingerprinting a little.
Diffstat (limited to 'src/common')
-rw-r--r--src/common/tortls.c3
1 files changed, 2 insertions, 1 deletions
diff --git a/src/common/tortls.c b/src/common/tortls.c
index 0315398946..eb24411a78 100644
--- a/src/common/tortls.c
+++ b/src/common/tortls.c
@@ -523,7 +523,8 @@ MOCK_IMPL(STATIC X509 *,
goto error;
if (!X509_set_pubkey(x509, pkey))
goto error;
- if (!X509_sign(x509, sign_pkey, EVP_sha1()))
+
+ if (!X509_sign(x509, sign_pkey, EVP_sha256()))
goto error;
goto done;