|
@@ -407,7 +407,7 @@ bool Peer::validateAndSetNetworkMembershipCertificate(const RuntimeEnvironment *
|
|
|
|
|
|
// Check signature, log and return if cert is invalid
|
|
|
if (com.signedBy() != Network::controllerFor(nwid)) {
|
|
|
- TRACE("rejected network membership certificate for %.16llx signed by %s: signer not a controller of this network",(unsigned long long)_id,cert.signedBy().toString().c_str());
|
|
|
+ TRACE("rejected network membership certificate for %.16llx signed by %s: signer not a controller of this network",(unsigned long long)_id,com.signedBy().toString().c_str());
|
|
|
return false; // invalid signer
|
|
|
}
|
|
|
|
|
@@ -416,7 +416,7 @@ bool Peer::validateAndSetNetworkMembershipCertificate(const RuntimeEnvironment *
|
|
|
// We are the controller: RR->identity.address() == controller() == cert.signedBy()
|
|
|
// So, verify that we signed th cert ourself
|
|
|
if (!com.verify(RR->identity)) {
|
|
|
- TRACE("rejected network membership certificate for %.16llx self signed by %s: signature check failed",(unsigned long long)_id,cert.signedBy().toString().c_str());
|
|
|
+ TRACE("rejected network membership certificate for %.16llx self signed by %s: signature check failed",(unsigned long long)_id,com.signedBy().toString().c_str());
|
|
|
return false; // invalid signature
|
|
|
}
|
|
|
|
|
@@ -432,7 +432,7 @@ bool Peer::validateAndSetNetworkMembershipCertificate(const RuntimeEnvironment *
|
|
|
}
|
|
|
|
|
|
if (!com.verify(signer->identity())) {
|
|
|
- TRACE("rejected network membership certificate for %.16llx signed by %s: signature check failed",(unsigned long long)_id,cert.signedBy().toString().c_str());
|
|
|
+ TRACE("rejected network membership certificate for %.16llx signed by %s: signature check failed",(unsigned long long)_id,com.signedBy().toString().c_str());
|
|
|
return false; // invalid signature
|
|
|
}
|
|
|
}
|