From 113458c2864ec8c046ab7d63ff1b417252c8e4df Mon Sep 17 00:00:00 2001 From: Guus Sliepen Date: Fri, 30 Apr 2010 23:11:48 +0200 Subject: [PATCH] Use correct digest length when checking a received key. --- src/protocol_auth.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/protocol_auth.c b/src/protocol_auth.c index 8d4dfb93..ca9e86b8 100644 --- a/src/protocol_auth.c +++ b/src/protocol_auth.c @@ -261,7 +261,7 @@ bool send_challenge(connection_t *c) { bool challenge_h(connection_t *c, char *request) { char buffer[MAX_STRING_SIZE]; size_t len = rsa_size(&myself->connection->rsa); - size_t digestlen = digest_length(&c->outdigest); + size_t digestlen = digest_length(&c->indigest); char digest[digestlen]; if(sscanf(request, "%*d " MAX_STRING, buffer) != 1) { -- 2.39.5