@@ -161,7 +161,7 @@ def jm_single() -> AttributeDict:
161161# by default, the tor control connection used cookie auth, which assumes
162162# the tor node to be running on a shared filesystem.
163163# to authenticate to the tor control port using HashedControlPassword instead:
164- #tor_control_hashedpassword =xxx
164+ #tor_control_password =xxx
165165
166166# the host/port actually serving the hidden service
167167# (note the *virtual port*, that the client uses,
@@ -457,7 +457,7 @@ def jm_single() -> AttributeDict:
457457# by default, the tor control connection used cookie auth, which assumes
458458# the tor node to be running on a shared filesystem.
459459# to authenticate to the tor control port using HashedControlPassword instead:
460- #tor_control_hashedpassword =xxx
460+ #tor_control_password =xxx
461461
462462# the host/port actually serving the hidden service
463463# (note the *virtual port*, that the client uses,
@@ -542,7 +542,7 @@ def get_mchannels(mode: str = "TAKER") -> list:
542542 onion_fields = [("type" , str ), ("directory_nodes" , str ), ("regtest_count" , str ),
543543 ("socks5_host" , str ), ("socks5_port" , int ),
544544 ("tor_control_host" , str ), ("tor_control_port" , int ),
545- ("tor_control_hashedpassword " , str ),
545+ ("tor_control_password " , str ),
546546 ("onion_serving_host" , str ), ("onion_serving_port" , int ),
547547 ("hidden_service_dir" , str )]
548548
0 commit comments