commit b66f02a30569705c0630881d14be0d404f1c8fe1
Author: Damian Johnson <[email protected]>
Date:   Sun Jul 2 09:18:51 2017 -0700

    Mark onion_key_crosscert_digest() as private
    
    Oops, this method clearly is intended to just help support digest
    verification.
---
 stem/descriptor/server_descriptor.py | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/stem/descriptor/server_descriptor.py 
b/stem/descriptor/server_descriptor.py
index 351a7ff..8c11b6c 100644
--- a/stem/descriptor/server_descriptor.py
+++ b/stem/descriptor/server_descriptor.py
@@ -796,8 +796,8 @@ class RelayDescriptor(ServerDescriptor):
         if self.onion_key_crosscert:
           onion_key_crosscert_digest = 
self._digest_for_signature(self.onion_key, self.onion_key_crosscert)
 
-          if onion_key_crosscert_digest != self.onion_key_crosscert_digest():
-            raise ValueError('Decrypted onion-key-crosscert digest does not 
match local digest (calculated: %s, local: %s)' % (onion_key_crosscert_digest, 
self.onion_key_crosscert_digest()))
+          if onion_key_crosscert_digest != self._onion_key_crosscert_digest():
+            raise ValueError('Decrypted onion-key-crosscert digest does not 
match local digest (calculated: %s, local: %s)' % (onion_key_crosscert_digest, 
self._onion_key_crosscert_digest()))
 
       if stem.prereq._is_pynacl_available() and self.certificate:
         self.certificate.validate(self)
@@ -885,7 +885,7 @@ class RelayDescriptor(ServerDescriptor):
     return RouterStatusEntryV3.create(attr)
 
   @lru_cache()
-  def onion_key_crosscert_digest(self):
+  def _onion_key_crosscert_digest(self):
     """
     Provides the digest of the onion-key-crosscert data. This consists of the
     RSA identity key sha1 and ed25519 identity key.



_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits

Reply via email to