From efa21bb94188863e4ff5d8a288144cd93db00fe3 Mon Sep 17 00:00:00 2001 From: Nick Mathewson Date: Wed, 1 Oct 2014 11:54:07 -0400 Subject: Implement proposal 228: cross-certification with onion keys Routers now use TAP and ntor onion keys to sign their identity keys, and put these signatures in their descriptors. That allows other parties to be confident that the onion keys are indeed controlled by the router that generated the descriptor. --- src/or/torcert.h | 1 + 1 file changed, 1 insertion(+) (limited to 'src/or/torcert.h') diff --git a/src/or/torcert.h b/src/or/torcert.h index 644cbf812d..ae9361ff16 100644 --- a/src/or/torcert.h +++ b/src/or/torcert.h @@ -11,6 +11,7 @@ #define CERT_TYPE_ID_SIGNING 0x04 #define CERT_TYPE_SIGNING_LINK 0x05 #define CERT_TYPE_SIGNING_AUTH 0x06 +#define CERT_TYPE_ONION_ID 0x0A #define CERT_FLAG_INCLUDE_SIGNING_KEY 0x1 -- cgit v1.2.3-54-g00ecf