Use correct digest length when checking a received key.
authorGuus Sliepen <guus@tinc-vpn.org>
Fri, 30 Apr 2010 21:11:48 +0000 (23:11 +0200)
committerGuus Sliepen <guus@tinc-vpn.org>
Fri, 30 Apr 2010 21:11:48 +0000 (23:11 +0200)
src/protocol_auth.c

index 8d4dfb939eb881824e3cdd96e739f4c5190a4aca..ca9e86b8a293d704331ac4eb9554d4d45673a45a 100644 (file)
@@ -261,7 +261,7 @@ bool send_challenge(connection_t *c) {
 bool challenge_h(connection_t *c, char *request) {
        char buffer[MAX_STRING_SIZE];
        size_t len = rsa_size(&myself->connection->rsa);
-       size_t digestlen = digest_length(&c->outdigest);
+       size_t digestlen = digest_length(&c->indigest);
        char digest[digestlen];
 
        if(sscanf(request, "%*d " MAX_STRING, buffer) != 1) {