diff options
author | Nick Mathewson <nickm@torproject.org> | 2004-05-12 19:30:28 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2004-05-12 19:30:28 +0000 |
commit | 9c3fba5c3bd654d42f8f539e7e8d3caa17861ea0 (patch) | |
tree | 8be34d36a5953a36925b92b9326ccb281873dfee /src/or/onion.c | |
parent | f1bc7af9f54bb4b563ffa024b1e32a6acacef26f (diff) | |
download | tor-9c3fba5c3bd654d42f8f539e7e8d3caa17861ea0.tar.gz tor-9c3fba5c3bd654d42f8f539e7e8d3caa17861ea0.zip |
Not every RSA decrypt should warn on failure.
svn:r1853
Diffstat (limited to 'src/or/onion.c')
-rw-r--r-- | src/or/onion.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/or/onion.c b/src/or/onion.c index fa496421c0..adaab58c48 100644 --- a/src/or/onion.c +++ b/src/or/onion.c @@ -728,12 +728,12 @@ onion_skin_server_handshake(char *onion_skin, /* ONIONSKIN_CHALLENGE_LEN bytes * break; len = crypto_pk_private_hybrid_decrypt(k, onion_skin, ONIONSKIN_CHALLENGE_LEN, - challenge, PK_PKCS1_OAEP_PADDING); + challenge, PK_PKCS1_OAEP_PADDING,0); if (len>0) break; } if (len<0) { - log_fn(LOG_WARN, "Couldn't decrypt onionskin"); + log_fn(LOG_WARN, "Couldn't decrypt onionskin: client may be using old onion key"); goto err; } else if (len != DH_KEY_LEN) { log_fn(LOG_WARN, "Unexpected onionskin length after decryption: %d", |