From cd884c764b2e8c5b1127829706de59a71b362b4c Mon Sep 17 00:00:00 2001 From: Robert Ransom Date: Mon, 17 Sep 2012 10:23:23 -0400 Subject: Fix documentation for crypto_pk_cmp_keys Now that crypto_pk_cmp_keys might return the result of tor_memcmp, there is no guarantee that it will only return -1, 0, or 1. (It currently does only return -1, 0, or 1, but that's a lucky accident due to details of the current implementation of tor_memcmp and the particular input given to it.) Fortunately, none of crypto_pk_cmp_keys's callers rely on this behaviour, so changing its documentation is sufficient. --- src/common/crypto.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'src/common/crypto.c') diff --git a/src/common/crypto.c b/src/common/crypto.c index 283b00575d..5cab058436 100644 --- a/src/common/crypto.c +++ b/src/common/crypto.c @@ -748,9 +748,9 @@ crypto_pk_public_exponent_ok(crypto_pk_t *env) return BN_is_word(env->key->e, 65537); } -/** Compare the public-key components of a and b. Return -1 if a\b. A NULL key is considered to be less than - * all non-NULL keys, and equal to itself. +/** Compare the public-key components of a and b. Return less than 0 + * if a\b. A NULL key is + * considered to be less than all non-NULL keys, and equal to itself. * * Note that this may leak information about the keys through timing. */ -- cgit v1.2.3-54-g00ecf