Fix a possible segmentation fault during key upgrades.

read_rsa_public_key() was bailing out early if the given node already has an Ed25519 key, and
returned true even though c->rsa was NULL. The early bailout code isn't necessary anymore, so just
remove it.
This commit is contained in:
Guus Sliepen 2015-04-24 23:43:19 +02:00
parent 2059814238
commit ea1e815223

View file

@ -148,9 +148,6 @@ bool read_ecdsa_public_key(connection_t *c) {
#ifndef DISABLE_LEGACY
bool read_rsa_public_key(connection_t *c) {
if(ecdsa_active(c->ecdsa))
return true;
FILE *fp;
char *fname;
char *n;