Fix a possible segmentation fault during key upgrades.
authorGuus Sliepen <guus@tinc-vpn.org>
Fri, 24 Apr 2015 21:43:19 +0000 (23:43 +0200)
committerGuus Sliepen <guus@tinc-vpn.org>
Fri, 24 Apr 2015 21:43:19 +0000 (23:43 +0200)
read_rsa_public_key() was bailing out early if the given node already has an Ed25519 key, and
returned true even though c->rsa was NULL. The early bailout code isn't necessary anymore, so just
remove it.

src/net_setup.c

index c4f01b5..3c66c13 100644 (file)
@@ -148,9 +148,6 @@ bool read_ecdsa_public_key(connection_t *c) {
 
 #ifndef DISABLE_LEGACY
 bool read_rsa_public_key(connection_t *c) {
-       if(ecdsa_active(c->ecdsa))
-               return true;
-
        FILE *fp;
        char *fname;
        char *n;