mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-24 04:13:28 +01:00
Trivial bugfixes found during TROVE investigation.
This commit is contained in:
parent
1c688ba925
commit
c940b7cf13
@ -1275,7 +1275,7 @@ hs_client_decode_descriptor(const char *desc_str,
|
||||
uint8_t subcredential[DIGEST256_LEN];
|
||||
ed25519_public_key_t blinded_pubkey;
|
||||
hs_client_service_authorization_t *client_auth = NULL;
|
||||
curve25519_secret_key_t *client_auht_sk = NULL;
|
||||
curve25519_secret_key_t *client_auth_sk = NULL;
|
||||
|
||||
tor_assert(desc_str);
|
||||
tor_assert(service_identity_pk);
|
||||
@ -1284,7 +1284,7 @@ hs_client_decode_descriptor(const char *desc_str,
|
||||
/* Check if we have a client authorization for this service in the map. */
|
||||
client_auth = find_client_auth(service_identity_pk);
|
||||
if (client_auth) {
|
||||
client_auht_sk = &client_auth->enc_seckey;
|
||||
client_auth_sk = &client_auth->enc_seckey;
|
||||
}
|
||||
|
||||
/* Create subcredential for this HS so that we can decrypt */
|
||||
@ -1297,7 +1297,7 @@ hs_client_decode_descriptor(const char *desc_str,
|
||||
|
||||
/* Parse descriptor */
|
||||
ret = hs_desc_decode_descriptor(desc_str, subcredential,
|
||||
client_auht_sk, desc);
|
||||
client_auth_sk, desc);
|
||||
memwipe(subcredential, 0, sizeof(subcredential));
|
||||
if (ret < 0) {
|
||||
goto err;
|
||||
|
@ -795,7 +795,7 @@ ed25519_point_is_identity_element(const uint8_t *point)
|
||||
int
|
||||
ed25519_validate_pubkey(const ed25519_public_key_t *pubkey)
|
||||
{
|
||||
uint8_t result[32] = {9};
|
||||
uint8_t result[32] = {0};
|
||||
|
||||
/* First check that we were not given the identity element */
|
||||
if (ed25519_point_is_identity_element(pubkey->pubkey)) {
|
||||
|
Loading…
Reference in New Issue
Block a user