Don't hardcode server signature length

This commit is contained in:
Cameron Gutman 2023-11-29 23:04:44 -06:00
parent a2f470ddeb
commit bbc89011d4

View File

@ -172,7 +172,7 @@
NSData* serverSecretResp = [Utils hexToBytes:[secretResp getStringTag:@"pairingsecret"]];
NSData* serverSecret = [serverSecretResp subdataWithRange:NSMakeRange(0, 16)];
NSData* serverSignature = [serverSecretResp subdataWithRange:NSMakeRange(16, 256)];
NSData* serverSignature = [serverSecretResp subdataWithRange:NSMakeRange(16, serverSecretResp.length - 16)];
if (![cryptoMan verifySignature:serverSecret withSignature:serverSignature andCert:[Utils hexToBytes:plainCert]]) {
[self finishPairing:bgId forResponse:secretResp withFallbackError:@"Server certificate invalid"];