- cl->hischallenge[0] &= 0x7F; /* Somehow if the first byte is more than 0xD0 or something like that, decryption fails... */
-cp
- if(debug_lvl >= DEBUG_SCARY_THINGS)
- {
- bin2hex(cl->hischallenge, buffer, len);
- buffer[len*2] = '\0';
- syslog(LOG_DEBUG, _("Generated random challenge (unencrypted): %s"), buffer);
- }
-
- /* Encrypt the random data */
-
- if(RSA_public_encrypt(len, cl->hischallenge, buffer, cl->rsa_key, RSA_NO_PADDING) != len) /* NO_PADDING because the message size equals the RSA key size and it is totally random */
- {
- syslog(LOG_ERR, _("Error during encryption of challenge for %s (%s)"), cl->name, cl->hostname);
- free(buffer);
- return -1;
- }