|
|
@ -662,7 +662,7 @@ void TorController::protocolinfo_cb(TorControlConnection& _conn, const TorContro |
|
|
|
// _conn.Command("AUTHENTICATE " + HexStr(status_cookie.second), boost::bind(&TorController::auth_cb, this, _1, _2));
|
|
|
|
// _conn.Command("AUTHENTICATE " + HexStr(status_cookie.second), boost::bind(&TorController::auth_cb, this, _1, _2));
|
|
|
|
cookie = std::vector<uint8_t>(status_cookie.second.begin(), status_cookie.second.end()); |
|
|
|
cookie = std::vector<uint8_t>(status_cookie.second.begin(), status_cookie.second.end()); |
|
|
|
clientNonce = std::vector<uint8_t>(TOR_NONCE_SIZE, 0); |
|
|
|
clientNonce = std::vector<uint8_t>(TOR_NONCE_SIZE, 0); |
|
|
|
GetRandBytes(&clientNonce[0], TOR_NONCE_SIZE); |
|
|
|
GetRandBytes(clientNonce.data(), TOR_NONCE_SIZE); |
|
|
|
_conn.Command("AUTHCHALLENGE SAFECOOKIE " + HexStr(clientNonce), boost::bind(&TorController::authchallenge_cb, this, _1, _2)); |
|
|
|
_conn.Command("AUTHCHALLENGE SAFECOOKIE " + HexStr(clientNonce), boost::bind(&TorController::authchallenge_cb, this, _1, _2)); |
|
|
|
} else { |
|
|
|
} else { |
|
|
|
if (status_cookie.first) { |
|
|
|
if (status_cookie.first) { |
|
|
|