Use correct digest length when checking a received key.
[oweals/tinc.git] / src / protocol_auth.c
index 8d4dfb939eb881824e3cdd96e739f4c5190a4aca..ca9e86b8a293d704331ac4eb9554d4d45673a45a 100644 (file)
@@ -261,7 +261,7 @@ bool send_challenge(connection_t *c) {
 bool challenge_h(connection_t *c, char *request) {
        char buffer[MAX_STRING_SIZE];
        size_t len = rsa_size(&myself->connection->rsa);
-       size_t digestlen = digest_length(&c->outdigest);
+       size_t digestlen = digest_length(&c->indigest);
        char digest[digestlen];
 
        if(sscanf(request, "%*d " MAX_STRING, buffer) != 1) {