Lets try always supplying the AES keys to Packet dearmor() and see if that prevents the coma problem.
This commit is contained in:
parent
7c2066c258
commit
147945d20f
2 changed files with 6 additions and 3 deletions
|
@ -67,7 +67,7 @@ bool IncomingPacket::tryDecode(const RuntimeEnvironment *RR,void *tPtr,int32_t f
|
|||
const SharedPtr<Peer> peer(RR->topology->getPeer(tPtr,sourceAddress));
|
||||
if (peer) {
|
||||
if (!trusted) {
|
||||
if (!dearmor(peer->key(), peer->aesKeysIfSupported())) {
|
||||
if (!dearmor(peer->key(), peer->aesKeys())) {
|
||||
RR->t->incomingPacketMessageAuthenticationFailure(tPtr,_path,packetId(),sourceAddress,hops(),"invalid MAC");
|
||||
peer->recordIncomingInvalidPacket(_path);
|
||||
return true;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue