]> git.ipfire.org Git - thirdparty/tor.git/commit
Implement proposal 228: cross-certification with onion keys
authorNick Mathewson <nickm@torproject.org>
Wed, 1 Oct 2014 15:54:07 +0000 (11:54 -0400)
committerNick Mathewson <nickm@torproject.org>
Thu, 28 May 2015 14:40:57 +0000 (10:40 -0400)
commitefa21bb94188863e4ff5d8a288144cd93db00fe3
tree34cc8c4bd847477e4b57773f48c0d298ef15d3ef
parentfe5d2477aabbf06c940c33a266d6ebb3a7b19fe1
Implement proposal 228: cross-certification with onion keys

Routers now use TAP and ntor onion keys to sign their identity keys,
and put these signatures in their descriptors.  That allows other
parties to be confident that the onion keys are indeed controlled by
the router that generated the descriptor.
14 files changed:
src/common/crypto.c
src/common/crypto.h
src/or/or.h
src/or/router.c
src/or/router.h
src/or/routerkeys.c
src/or/routerkeys.h
src/or/routerlist.c
src/or/routerlist.h
src/or/routerparse.c
src/or/routerparse.h
src/or/torcert.h
src/test/test_dir.c
src/test/test_routerkeys.c