Fix a possible segmentation fault during key upgrades.
read_rsa_public_key() was bailing out early if the given node already has an Ed25519 key, and returned true even though c->rsa was NULL. The early bailout code isn't necessary anymore, so just remove it.
This commit is contained in:
parent
2059814238
commit
ea1e815223
1 changed files with 0 additions and 3 deletions
|
@ -148,9 +148,6 @@ bool read_ecdsa_public_key(connection_t *c) {
|
|||
|
||||
#ifndef DISABLE_LEGACY
|
||||
bool read_rsa_public_key(connection_t *c) {
|
||||
if(ecdsa_active(c->ecdsa))
|
||||
return true;
|
||||
|
||||
FILE *fp;
|
||||
char *fname;
|
||||
char *n;
|
||||
|
|
Loading…
Reference in a new issue