summaryrefslogtreecommitdiff
path: root/src/or/or.h
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2013-11-14 09:37:41 -0500
committerNick Mathewson <nickm@torproject.org>2013-11-14 09:37:41 -0500
commitf6e07c158f3d161e570e34ab6f4ca75f351df3a6 (patch)
treec7fa2e2e3c43da750fd798ef166bdd08c2d6ff00 /src/or/or.h
parenta82b18f2168ce19e0637740fed5746d6daac4e3a (diff)
downloadtor-f6e07c158f3d161e570e34ab6f4ca75f351df3a6.tar.gz
tor-f6e07c158f3d161e570e34ab6f4ca75f351df3a6.zip
Make the dir-key-crosscert element required
In proposal 157, we added a cross-certification element for directory authority certificates. We implemented it in 0.2.1.9-alpha. All Tor directory authorities now generate it. Here, as planned, make it required, so that we can finally close proposal 157. The biggest change in the code is in the unit test data, where some old hardcoded certs that we made long ago have become no longer valid and now need to be replaced.
Diffstat (limited to 'src/or/or.h')
-rw-r--r--src/or/or.h3
1 files changed, 0 insertions, 3 deletions
diff --git a/src/or/or.h b/src/or/or.h
index eff5a6d2b4..d819a5c9ed 100644
--- a/src/or/or.h
+++ b/src/or/or.h
@@ -2586,9 +2586,6 @@ typedef struct authority_cert_t {
uint32_t addr;
/** This authority's directory port. */
uint16_t dir_port;
- /** True iff this certificate was cross-certified by signing the identity
- * key with the signing key. */
- uint8_t is_cross_certified;
} authority_cert_t;
/** Bitfield enum type listing types of information that directory authorities