diff options
author | Nick Mathewson <nickm@torproject.org> | 2009-09-14 12:02:49 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2009-10-15 15:17:12 -0400 |
commit | c5f7f04aff850e8e3fad28e93e6300447625fdbb (patch) | |
tree | 1fac80ab23960b968cbc773c5f00d88c0f1570d6 /src/or/routerparse.c | |
parent | 15f4e9600cb8bb127bcf7004691fe9c59eb7505e (diff) | |
download | tor-c5f7f04aff850e8e3fad28e93e6300447625fdbb.tar.gz tor-c5f7f04aff850e8e3fad28e93e6300447625fdbb.zip |
Allow signed data to include other hashes later.
Previously, we insisted that a valid signature must be a signature of
the expected digest. Now we accept anything that starts with the
expected digest. This lets us include another digest later.
Diffstat (limited to 'src/or/routerparse.c')
-rw-r--r-- | src/or/routerparse.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/or/routerparse.c b/src/or/routerparse.c index f6d6dc9a14..bfcf20b09c 100644 --- a/src/or/routerparse.c +++ b/src/or/routerparse.c @@ -1028,7 +1028,7 @@ check_signature_token(const char *digest, signed_digest = tor_malloc(tok->object_size); if (crypto_pk_public_checksig(pkey, signed_digest, tok->object_body, tok->object_size) - != digest_len) { + < digest_len) { log_warn(LD_DIR, "Error reading %s: invalid signature.", doctype); tor_free(signed_digest); return -1; |