From 113458c2864ec8c046ab7d63ff1b417252c8e4df Mon Sep 17 00:00:00 2001
From: Guus Sliepen <guus@tinc-vpn.org>
Date: Fri, 30 Apr 2010 23:11:48 +0200
Subject: [PATCH] Use correct digest length when checking a received key.

---
 src/protocol_auth.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/src/protocol_auth.c b/src/protocol_auth.c
index 8d4dfb93..ca9e86b8 100644
--- a/src/protocol_auth.c
+++ b/src/protocol_auth.c
@@ -261,7 +261,7 @@ bool send_challenge(connection_t *c) {
 bool challenge_h(connection_t *c, char *request) {
 	char buffer[MAX_STRING_SIZE];
 	size_t len = rsa_size(&myself->connection->rsa);
-	size_t digestlen = digest_length(&c->outdigest);
+	size_t digestlen = digest_length(&c->indigest);
 	char digest[digestlen];
 
 	if(sscanf(request, "%*d " MAX_STRING, buffer) != 1) {
-- 
2.39.5