aboutsummaryrefslogtreecommitdiffstats
path: root/res
diff options
context:
space:
mode:
authormarkster <markster@f38db490-d61c-443f-a65b-d21fe96a405b>2004-08-15 01:01:34 +0000
committermarkster <markster@f38db490-d61c-443f-a65b-d21fe96a405b>2004-08-15 01:01:34 +0000
commitd25e7b73cdc35c79930a28e961867594470beb7c (patch)
tree3b67e03f8ae600a7aac67329200d4ab000ecede1 /res
parent0be30f736da175c984323e545f26a71aa9d07e89 (diff)
Fix little oops on sizeof()
git-svn-id: http://svn.digium.com/svn/asterisk/trunk@3609 f38db490-d61c-443f-a65b-d21fe96a405b
Diffstat (limited to 'res')
-rwxr-xr-xres/res_crypto.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/res/res_crypto.c b/res/res_crypto.c
index 205a8c5ce..9da1c48b1 100755
--- a/res/res_crypto.c
+++ b/res/res_crypto.c
@@ -299,7 +299,7 @@ static char *binary(int y, int len)
int ast_sign_bin(struct ast_key *key, char *msg, int msglen, unsigned char *dsig)
{
unsigned char digest[20];
- int siglen = sizeof(dsig);
+ int siglen = 128;
int res;
if (key->ktype != AST_KEY_PRIVATE) {
@@ -318,8 +318,8 @@ int ast_sign_bin(struct ast_key *key, char *msg, int msglen, unsigned char *dsig
return -1;
}
- if (siglen != sizeof(dsig)) {
- ast_log(LOG_WARNING, "Unexpected signature length %d, expecting %d\n", (int)siglen, (int)sizeof(dsig));
+ if (siglen != 128) {
+ ast_log(LOG_WARNING, "Unexpected signature length %d, expecting %d\n", (int)siglen, (int)128);
return -1;
}
@@ -356,7 +356,7 @@ int ast_check_signature_bin(struct ast_key *key, char *msg, int msglen, unsigned
SHA1((unsigned char *)msg, msglen, digest);
/* Verify signature */
- res = RSA_verify(NID_sha1, digest, sizeof(digest), dsig, sizeof(dsig), key->rsa);
+ res = RSA_verify(NID_sha1, digest, sizeof(digest), dsig, 128, key->rsa);
if (!res) {
ast_log(LOG_DEBUG, "Key failed verification\n");