Allow signed data to include other hashes later.

Previously, we insisted that a valid signature must be a signature of
the expected digest.  Now we accept anything that starts with the
expected digest.  This lets us include another digest later.
This commit is contained in:
Nick Mathewson 2009-09-14 12:02:49 -04:00
parent 15f4e9600c
commit c5f7f04aff

View File

@ -1028,7 +1028,7 @@ check_signature_token(const char *digest,
signed_digest = tor_malloc(tok->object_size);
if (crypto_pk_public_checksig(pkey, signed_digest, tok->object_body,
tok->object_size)
!= digest_len) {
< digest_len) {
log_warn(LD_DIR, "Error reading %s: invalid signature.", doctype);
tor_free(signed_digest);
return -1;