From: Guus Sliepen Date: Fri, 30 Apr 2010 21:11:48 +0000 (+0200) Subject: Use correct digest length when checking a received key. X-Git-Tag: release-1.1pre1~72 X-Git-Url: https://www.tinc-vpn.org/git/browse?p=tinc;a=commitdiff_plain;h=113458c2864ec8c046ab7d63ff1b417252c8e4df Use correct digest length when checking a received key. --- diff --git a/src/protocol_auth.c b/src/protocol_auth.c index 8d4dfb93..ca9e86b8 100644 --- a/src/protocol_auth.c +++ b/src/protocol_auth.c @@ -261,7 +261,7 @@ bool send_challenge(connection_t *c) { bool challenge_h(connection_t *c, char *request) { char buffer[MAX_STRING_SIZE]; size_t len = rsa_size(&myself->connection->rsa); - size_t digestlen = digest_length(&c->outdigest); + size_t digestlen = digest_length(&c->indigest); char digest[digestlen]; if(sscanf(request, "%*d " MAX_STRING, buffer) != 1) {