tor/src
Nick Mathewson efa21bb941 Implement proposal 228: cross-certification with onion keys
Routers now use TAP and ntor onion keys to sign their identity keys,
and put these signatures in their descriptors.  That allows other
parties to be confident that the onion keys are indeed controlled by
the router that generated the descriptor.
2015-05-28 10:40:57 -04:00
..
common Implement proposal 228: cross-certification with onion keys 2015-05-28 10:40:57 -04:00
config Merge remote-tracking branch 'origin/maint-0.2.5' 2015-01-23 08:53:21 -05:00
ext Have tinytest tolerate systems where char has > 8 bytes 2015-02-17 08:40:55 -05:00
or Implement proposal 228: cross-certification with onion keys 2015-05-28 10:40:57 -04:00
test Implement proposal 228: cross-certification with onion keys 2015-05-28 10:40:57 -04:00
tools Tweak tor-resolve docs and logs 2015-01-28 10:11:08 -05:00
trunnel prop220: Implement certificates and key storage/creation 2015-05-28 10:40:56 -04:00
win32 Bump master to 0.2.7 2015-02-24 10:31:05 -05:00
include.am Use trunnel for crypto_pwbox encoding/decoding. 2014-09-25 11:58:14 -04:00