generate_ed_link_cert(options, now, new_signing_key > 0)) {
log_warn(LD_OR, "Problem reloading Ed25519 keys; still using old keys.");
}
- const networkstatus_t *ns = networkstatus_get_latest_consensus();
- if (load_family_id_keys(options, ns)) {
+ if (load_family_id_keys(options,
+ networkstatus_get_latest_consensus())) {
log_warn(LD_OR, "Problem reloading family ID keys; "
"still using old keys.");
}
STATIC void
router_announce_bridge_status_page(void)
{
+#ifdef ENABLE_MODULE_RELAY
char fingerprint[FINGERPRINT_LEN + 1];
if (crypto_pk_get_hashed_fingerprint(get_server_identity_key(),
log_notice(LD_GENERAL, "You can check the status of your bridge relay at "
"https://bridges.torproject.org/status?id=%s",
fingerprint);
+#endif
}
/** Compute fingerprint (or hashed fingerprint if hashed is 1) and write
((void)(options), (void)(now), (void)(force), 0)
#define should_make_new_ed_keys(options, now) \
((void)(options), (void)(now), 0)
+#define warn_about_family_id_config(options,ns) \
+ ((void)(options), (void)(ns))
+#define get_current_family_id_keys() \
+ (smartlist_new())
// These can get removed once router.c becomes relay-only.
static inline struct tor_cert_st *
(puts("Not available: Tor has been compiled without relay support"), 0)
#define load_family_id_keys(x,y) \
(puts("Not available: Tor has been compiled without relay support"), 0)
+#define create_family_id_key(x) \
+ (puts("Not available: Tor has been compiled without relay support"), -1)
#endif /* defined(HAVE_MODULE_RELAY) */