From: Nick Mathewson Date: Thu, 28 May 2015 14:41:43 +0000 (-0400) Subject: Implement proposal 228: cross-certification with onion keys X-Git-Tag: tor-0.2.7.2-alpha~137^2~22 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=a2f317913fc48975381696cc381d5f78e25e92b6;p=thirdparty%2Ftor.git Implement proposal 228: cross-certification with onion keys Routers now use TAP and ntor onion keys to sign their identity keys, and put these signatures in their descriptors. That allows other parties to be confident that the onion keys are indeed controlled by the router that generated the descriptor. --- diff --git a/src/or/router.c b/src/or/router.c index 2087a25fca..97c2b8398d 100644 --- a/src/or/router.c +++ b/src/or/router.c @@ -2628,6 +2628,8 @@ router_dump_router_to_string(routerinfo_t *router, tor_free(identity_pkey); tor_free(extra_or_address); tor_free(ed_cert_line); + tor_free(rsa_tap_cc_line); + tor_free(ntor_cc_line); return output; }