when clients do --list-fingerprint, it's misleading to

give them one, because it will never be the same again


svn:r2800
This commit is contained in:
Roger Dingledine 2004-11-11 13:24:10 +00:00
parent 6252cba522
commit fde595feb7

View File

@ -1040,6 +1040,11 @@ static void do_list_fingerprint(void)
char buf[FINGERPRINT_LEN+1]; char buf[FINGERPRINT_LEN+1];
crypto_pk_env_t *k; crypto_pk_env_t *k;
const char *nickname = get_options()->Nickname; const char *nickname = get_options()->Nickname;
if(!server_mode(get_options())) {
printf("Clients don't have long-term identity keys. Exiting.");
return;
}
tor_assert(nickname);
if (init_keys() < 0) { if (init_keys() < 0) {
log_fn(LOG_ERR,"Error initializing keys; exiting"); log_fn(LOG_ERR,"Error initializing keys; exiting");
return; return;
@ -1052,7 +1057,7 @@ static void do_list_fingerprint(void)
log_fn(LOG_ERR, "Error computing fingerprint"); log_fn(LOG_ERR, "Error computing fingerprint");
return; return;
} }
printf("%s %s\n", nickname?nickname:"client", buf); printf("%s %s\n", nickname, buf);
} }
/** Entry point for password hashing: take the desired password from /** Entry point for password hashing: take the desired password from