diff options
author | Nick Mathewson <nickm@torproject.org> | 2017-07-24 14:32:59 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2017-07-24 14:34:53 -0400 |
commit | 6c8c9731915a796c8a1bc11f376793459db1200f (patch) | |
tree | 2df0e14503b35d2b70e0ca4ae08d115d81ffb3db /src/or/rendclient.c | |
parent | db1664e5932ae0435b23c2ca92e74f3a5c64c1f8 (diff) | |
download | tor-6c8c9731915a796c8a1bc11f376793459db1200f.tar.gz tor-6c8c9731915a796c8a1bc11f376793459db1200f.zip |
Rename the hybrid_encrypt/decrypt functions; label them as dangerous
We need to keep these around for TAP and old-style hidden services,
but they're obsolete, and we shouldn't encourage anyone to use them.
So I've added "obsolete" to their names, and a comment explaining
what the problem is.
Closes ticket 23026.
Diffstat (limited to 'src/or/rendclient.c')
-rw-r--r-- | src/or/rendclient.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/or/rendclient.c b/src/or/rendclient.c index 441c371bac..e47e1ef639 100644 --- a/src/or/rendclient.c +++ b/src/or/rendclient.c @@ -286,9 +286,9 @@ rend_client_send_introduction(origin_circuit_t *introcirc, goto perm_err; } - /*XXX maybe give crypto_pk_public_hybrid_encrypt a max_len arg, + /*XXX maybe give crypto_pk_obsolete_public_hybrid_encrypt a max_len arg, * to avoid buffer overflows? */ - r = crypto_pk_public_hybrid_encrypt(intro_key, payload+DIGEST_LEN, + r = crypto_pk_obsolete_public_hybrid_encrypt(intro_key, payload+DIGEST_LEN, sizeof(payload)-DIGEST_LEN, tmp, (int)(dh_offset+DH_KEY_LEN), |