Use correct digest length when checking a received key.
This commit is contained in:
parent
76b41ba20d
commit
113458c286
1 changed files with 1 additions and 1 deletions
|
@ -261,7 +261,7 @@ bool send_challenge(connection_t *c) {
|
||||||
bool challenge_h(connection_t *c, char *request) {
|
bool challenge_h(connection_t *c, char *request) {
|
||||||
char buffer[MAX_STRING_SIZE];
|
char buffer[MAX_STRING_SIZE];
|
||||||
size_t len = rsa_size(&myself->connection->rsa);
|
size_t len = rsa_size(&myself->connection->rsa);
|
||||||
size_t digestlen = digest_length(&c->outdigest);
|
size_t digestlen = digest_length(&c->indigest);
|
||||||
char digest[digestlen];
|
char digest[digestlen];
|
||||||
|
|
||||||
if(sscanf(request, "%*d " MAX_STRING, buffer) != 1) {
|
if(sscanf(request, "%*d " MAX_STRING, buffer) != 1) {
|
||||||
|
|
Loading…
Reference in a new issue