The fingerprint calculation was using PKIX encoding instead of the required PKCS1 DER encoding for RSA public keys. This affected both the relay identity resource and obfs4 node ID derivation. - Use x509.MarshalPKCS1PublicKey instead of x509.MarshalPKIXPublicKey - Add test case with known fingerprint vector to prevent regression - Update both generateFingerprints and deriveNodeIdFromRsaKey functions fixes #2 |
||
|---|---|---|
| .. | ||
| provider.go | ||
| provider_test.go | ||
| tor_family_identity_resource.go | ||
| tor_family_identity_resource_serialization_test.go | ||
| tor_family_identity_resource_test.go | ||
| tor_obfs4_bridge_line_data_source.go | ||
| tor_obfs4_bridge_line_data_source_test.go | ||
| tor_obfs4_state_resource.go | ||
| tor_obfs4_state_resource_test.go | ||
| tor_relay_identity_ed25519_resource.go | ||
| tor_relay_identity_ed25519_resource_test.go | ||
| tor_relay_identity_rsa_resource.go | ||
| tor_relay_identity_rsa_resource_test.go | ||