diff options
author | Nick Mathewson <nickm@torproject.org> | 2011-01-24 16:03:14 -0500 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2011-01-24 16:50:11 -0500 |
commit | 5ed73e3807d90dd0a3a2e5542f98a0a58374a066 (patch) | |
tree | 7cd2519566d26786ae866f3c516e2b9a40643a6b /src/test | |
parent | 13e9a2b19d4a65d9761256ac72f754c35c371b0b (diff) | |
download | tor-5ed73e3807d90dd0a3a2e5542f98a0a58374a066.tar tor-5ed73e3807d90dd0a3a2e5542f98a0a58374a066.tar.gz |
Make the DH parameter we use for TLS match the one from Apache's mod_ssl
Our regular DH parameters that we use for circuit and rendezvous
crypto are unchanged. This is yet another small step on the path of
protocol fingerprinting resistance.
Diffstat (limited to 'src/test')
-rw-r--r-- | src/test/test_crypto.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/test/test_crypto.c b/src/test/test_crypto.c index 8093c9c89..6ea7f295e 100644 --- a/src/test/test_crypto.c +++ b/src/test/test_crypto.c @@ -12,8 +12,8 @@ static void test_crypto_dh(void) { - crypto_dh_env_t *dh1 = crypto_dh_new(); - crypto_dh_env_t *dh2 = crypto_dh_new(); + crypto_dh_env_t *dh1 = crypto_dh_new(DH_TYPE_CIRCUIT); + crypto_dh_env_t *dh2 = crypto_dh_new(DH_TYPE_CIRCUIT); char p1[DH_BYTES]; char p2[DH_BYTES]; char s1[DH_BYTES]; |