[tor-commits] [tor/master] Fix documentation for crypto_pk_cmp_keys

nickm at torproject.org nickm at torproject.org
Mon Sep 17 15:05:32 UTC 2012


commit cd884c764b2e8c5b1127829706de59a71b362b4c
Author: Robert Ransom <rransom.8774 at gmail.com>
Date:   Mon Sep 17 10:23:23 2012 -0400

    Fix documentation for crypto_pk_cmp_keys
    
    Now that crypto_pk_cmp_keys might return the result of tor_memcmp, there
    is no guarantee that it will only return -1, 0, or 1.  (It currently does
    only return -1, 0, or 1, but that's a lucky accident due to details of the
    current implementation of tor_memcmp and the particular input given to it.)
    
    Fortunately, none of crypto_pk_cmp_keys's callers rely on this behaviour,
    so changing its documentation is sufficient.
---
 src/common/crypto.c |    6 +++---
 1 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/src/common/crypto.c b/src/common/crypto.c
index 283b005..5cab058 100644
--- a/src/common/crypto.c
+++ b/src/common/crypto.c
@@ -748,9 +748,9 @@ crypto_pk_public_exponent_ok(crypto_pk_t *env)
   return BN_is_word(env->key->e, 65537);
 }
 
-/** Compare the public-key components of a and b.  Return -1 if a\<b,
- * 0 if a==b, and 1 if a\>b.  A NULL key is considered to be less than
- * all non-NULL keys, and equal to itself.
+/** Compare the public-key components of a and b.  Return less than 0
+ * if a\<b, 0 if a==b, and greater than 0 if a\>b.  A NULL key is
+ * considered to be less than all non-NULL keys, and equal to itself.
  *
  * Note that this may leak information about the keys through timing.
  */





More information about the tor-commits mailing list