summaryrefslogtreecommitdiff
path: root/src/or/rendservice.c
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2011-01-24 16:03:14 -0500
committerNick Mathewson <nickm@torproject.org>2011-01-24 16:50:11 -0500
commit5ed73e3807d90dd0a3a2e5542f98a0a58374a066 (patch)
tree7cd2519566d26786ae866f3c516e2b9a40643a6b /src/or/rendservice.c
parent13e9a2b19d4a65d9761256ac72f754c35c371b0b (diff)
downloadtor-5ed73e3807d90dd0a3a2e5542f98a0a58374a066.tar.gz
tor-5ed73e3807d90dd0a3a2e5542f98a0a58374a066.zip
Make the DH parameter we use for TLS match the one from Apache's mod_ssl
Our regular DH parameters that we use for circuit and rendezvous crypto are unchanged. This is yet another small step on the path of protocol fingerprinting resistance.
Diffstat (limited to 'src/or/rendservice.c')
-rw-r--r--src/or/rendservice.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/or/rendservice.c b/src/or/rendservice.c
index f1480e0b7f..45039822f8 100644
--- a/src/or/rendservice.c
+++ b/src/or/rendservice.c
@@ -1100,7 +1100,7 @@ rend_service_introduce(origin_circuit_t *circuit, const uint8_t *request,
}
/* Try DH handshake... */
- dh = crypto_dh_new();
+ dh = crypto_dh_new(DH_TYPE_REND);
if (!dh || crypto_dh_generate_public(dh)<0) {
log_warn(LD_BUG,"Internal error: couldn't build DH state "
"or generate public key.");