diff options
author | Nick Mathewson <nickm@torproject.org> | 2008-02-08 21:13:12 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2008-02-08 21:13:12 +0000 |
commit | de827f89df460e5920239a14addd1dd264b76bb5 (patch) | |
tree | 9e3dd40f12b8c6847c433fcfb53080bd5b00ac26 /src/or/router.c | |
parent | 809227a121136d4c48ea09ad96aef5ecb9eb15eb (diff) | |
download | tor-de827f89df460e5920239a14addd1dd264b76bb5.tar.gz tor-de827f89df460e5920239a14addd1dd264b76bb5.zip |
r14062@tombo: nickm | 2008-02-08 15:17:07 -0500
Change DNs in x509 certificates to be harder to fingerprint. Raise common code. Refactor random hostname generation into crypto.c
svn:r13429
Diffstat (limited to 'src/or/router.c')
-rw-r--r-- | src/or/router.c | 7 |
1 files changed, 2 insertions, 5 deletions
diff --git a/src/or/router.c b/src/or/router.c index e9e78d9e0a..6388d244e2 100644 --- a/src/or/router.c +++ b/src/or/router.c @@ -403,9 +403,7 @@ init_keys(void) } set_identity_key(prkey); /* Create a TLS context; default the client nickname to "client". */ - if (tor_tls_context_new(get_identity_key(), - options->Nickname ? options->Nickname : "client", - MAX_SSL_KEY_LIFETIME) < 0) { + if (tor_tls_context_new(get_identity_key(), MAX_SSL_KEY_LIFETIME) < 0) { log_err(LD_GENERAL,"Error creating TLS context for Tor client."); return -1; } @@ -483,8 +481,7 @@ init_keys(void) tor_free(keydir); /* 3. Initialize link key and TLS context. */ - if (tor_tls_context_new(get_identity_key(), options->Nickname, - MAX_SSL_KEY_LIFETIME) < 0) { + if (tor_tls_context_new(get_identity_key(), MAX_SSL_KEY_LIFETIME) < 0) { log_err(LD_GENERAL,"Error initializing TLS context"); return -1; } |