Skip to content
GitLab
Menu
Projects
Groups
Snippets
/
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
Menu
Open sidebar
David Goulet
Tor
Commits
ea6c4f63
Commit
ea6c4f63
authored
Dec 09, 2003
by
Roger Dingledine
Browse files
our circuit symmetric key (for aes) is 127 bits, not 128 bits.
we accept that. svn:r892
parent
48e42e93
Changes
1
Hide whitespace changes
Inline
Side-by-side
src/or/onion.c
View file @
ea6c4f63
...
...
@@ -575,13 +575,13 @@ onion_skin_create(crypto_pk_env_t *dest_router_key,
if
(
crypto_rand
(
16
,
pubkey
))
goto
err
;
/*
XXXX
You can't just run around RSA-encrypting any bitstream: if it's
*
greater than the RSA key, then OpenSSL will happily encrypt,
*
and later decrypt to the wrong value. So we set the first bit
*
of 'pubkey' to 0. This means that our symmetric key is really only
*
127 bits long, but since it shouldn't be necessary to encrypt
*
DH public keys values in the first place, we should be fine.
/* You can't just run around RSA-encrypting any bitstream: if it's
* greater than the RSA key, then OpenSSL will happily encrypt,
* and later decrypt to the wrong value. So we set the first bit
* of 'pubkey' to 0. This means that our symmetric key is really only
* 127 bits long, but since it shouldn't be necessary to encrypt
* DH public keys values in the first place, we should be fine.
*/
pubkey
[
0
]
&=
0x7f
;
...
...
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment