summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2003-12-09 01:04:40 +0000
committerRoger Dingledine <arma@torproject.org>2003-12-09 01:04:40 +0000
commitea6c4f6348fba6b365f3fb479f2953ad4f30d393 (patch)
treed358a1c6906e772b9bccebc514582fce2b49c9f8
parent48e42e9346209271f02fa6027919e261491340a4 (diff)
downloadtor-ea6c4f6348fba6b365f3fb479f2953ad4f30d393.tar.gz
tor-ea6c4f6348fba6b365f3fb479f2953ad4f30d393.zip
our circuit symmetric key (for aes) is 127 bits, not 128 bits.
we accept that. svn:r892
-rw-r--r--src/or/onion.c14
1 files changed, 7 insertions, 7 deletions
diff --git a/src/or/onion.c b/src/or/onion.c
index 51dd1d0465..ca4f678f89 100644
--- a/src/or/onion.c
+++ b/src/or/onion.c
@@ -575,13 +575,13 @@ onion_skin_create(crypto_pk_env_t *dest_router_key,
if (crypto_rand(16, pubkey))
goto err;
-
- /* XXXX You can't just run around RSA-encrypting any bitstream: if it's
- * greater than the RSA key, then OpenSSL will happily encrypt,
- * and later decrypt to the wrong value. So we set the first bit
- * of 'pubkey' to 0. This means that our symmetric key is really only
- * 127 bits long, but since it shouldn't be necessary to encrypt
- * DH public keys values in the first place, we should be fine.
+
+ /* You can't just run around RSA-encrypting any bitstream: if it's
+ * greater than the RSA key, then OpenSSL will happily encrypt,
+ * and later decrypt to the wrong value. So we set the first bit
+ * of 'pubkey' to 0. This means that our symmetric key is really only
+ * 127 bits long, but since it shouldn't be necessary to encrypt
+ * DH public keys values in the first place, we should be fine.
*/
pubkey[0] &= 0x7f;