commit ec9d88e5a219e4661aab05af56c78947c46cda99 Author: Nick Mathewson nickm@torproject.org Date: Mon Nov 18 13:26:58 2013 -0500
Tweak #10162 documentation a bit --- changes/prop157-require | 2 +- src/or/routerparse.c | 2 -- 2 files changed, 1 insertion(+), 3 deletions(-)
diff --git a/changes/prop157-require b/changes/prop157-require index 0c35f64..f04806d 100644 --- a/changes/prop157-require +++ b/changes/prop157-require @@ -2,4 +2,4 @@ - Clients now reject any directory authority certificates lacking a dir-key-crosscert element. These have been included since 0.2.1.9-alpha, so there's no real reason for them to be optional - any longer. Completes proposal 157. \ No newline at end of file + any longer. Completes proposal 157. diff --git a/src/or/routerparse.c b/src/or/routerparse.c index 8691752..6d83715 100644 --- a/src/or/routerparse.c +++ b/src/or/routerparse.c @@ -1737,8 +1737,6 @@ authority_cert_parse_from_string(const char *s, const char **end_of_string) }
tok = find_by_keyword(tokens, K_DIR_KEY_CROSSCERT); - /* XXXX Once all authorities generate cross-certified certificates, - * make this field mandatory. */ if (check_signature_token(cert->cache_info.identity_digest, DIGEST_LEN, tok,
tor-commits@lists.torproject.org