summaryrefslogtreecommitdiff
path: root/src/or/onion.c
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2004-05-12 19:30:28 +0000
committerNick Mathewson <nickm@torproject.org>2004-05-12 19:30:28 +0000
commit9c3fba5c3bd654d42f8f539e7e8d3caa17861ea0 (patch)
tree8be34d36a5953a36925b92b9326ccb281873dfee /src/or/onion.c
parentf1bc7af9f54bb4b563ffa024b1e32a6acacef26f (diff)
downloadtor-9c3fba5c3bd654d42f8f539e7e8d3caa17861ea0.tar.gz
tor-9c3fba5c3bd654d42f8f539e7e8d3caa17861ea0.zip
Not every RSA decrypt should warn on failure.
svn:r1853
Diffstat (limited to 'src/or/onion.c')
-rw-r--r--src/or/onion.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/src/or/onion.c b/src/or/onion.c
index fa496421c0..adaab58c48 100644
--- a/src/or/onion.c
+++ b/src/or/onion.c
@@ -728,12 +728,12 @@ onion_skin_server_handshake(char *onion_skin, /* ONIONSKIN_CHALLENGE_LEN bytes *
break;
len = crypto_pk_private_hybrid_decrypt(k,
onion_skin, ONIONSKIN_CHALLENGE_LEN,
- challenge, PK_PKCS1_OAEP_PADDING);
+ challenge, PK_PKCS1_OAEP_PADDING,0);
if (len>0)
break;
}
if (len<0) {
- log_fn(LOG_WARN, "Couldn't decrypt onionskin");
+ log_fn(LOG_WARN, "Couldn't decrypt onionskin: client may be using old onion key");
goto err;
} else if (len != DH_KEY_LEN) {
log_fn(LOG_WARN, "Unexpected onionskin length after decryption: %d",