diff options
author | markster <markster@f38db490-d61c-443f-a65b-d21fe96a405b> | 2004-08-15 01:01:34 +0000 |
---|---|---|
committer | markster <markster@f38db490-d61c-443f-a65b-d21fe96a405b> | 2004-08-15 01:01:34 +0000 |
commit | d25e7b73cdc35c79930a28e961867594470beb7c (patch) | |
tree | 3b67e03f8ae600a7aac67329200d4ab000ecede1 /res/res_crypto.c | |
parent | 0be30f736da175c984323e545f26a71aa9d07e89 (diff) |
Fix little oops on sizeof()
git-svn-id: http://svn.digium.com/svn/asterisk/trunk@3609 f38db490-d61c-443f-a65b-d21fe96a405b
Diffstat (limited to 'res/res_crypto.c')
-rwxr-xr-x | res/res_crypto.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/res/res_crypto.c b/res/res_crypto.c index 205a8c5ce..9da1c48b1 100755 --- a/res/res_crypto.c +++ b/res/res_crypto.c @@ -299,7 +299,7 @@ static char *binary(int y, int len) int ast_sign_bin(struct ast_key *key, char *msg, int msglen, unsigned char *dsig) { unsigned char digest[20]; - int siglen = sizeof(dsig); + int siglen = 128; int res; if (key->ktype != AST_KEY_PRIVATE) { @@ -318,8 +318,8 @@ int ast_sign_bin(struct ast_key *key, char *msg, int msglen, unsigned char *dsig return -1; } - if (siglen != sizeof(dsig)) { - ast_log(LOG_WARNING, "Unexpected signature length %d, expecting %d\n", (int)siglen, (int)sizeof(dsig)); + if (siglen != 128) { + ast_log(LOG_WARNING, "Unexpected signature length %d, expecting %d\n", (int)siglen, (int)128); return -1; } @@ -356,7 +356,7 @@ int ast_check_signature_bin(struct ast_key *key, char *msg, int msglen, unsigned SHA1((unsigned char *)msg, msglen, digest); /* Verify signature */ - res = RSA_verify(NID_sha1, digest, sizeof(digest), dsig, sizeof(dsig), key->rsa); + res = RSA_verify(NID_sha1, digest, sizeof(digest), dsig, 128, key->rsa); if (!res) { ast_log(LOG_DEBUG, "Key failed verification\n"); |