This has apparently been broken for quite some time...I guess
`peer_crypt_target` doesn't get much CPU anymore.
Ok(len) => len,
Err(_) => return,
};
Ok(len) => len,
Err(_) => return,
};
- buf.copy_from_slice(&get_slice!(len as usize + 16));
+ buf[..len as usize + 16].copy_from_slice(&get_slice!(len as usize + 16));
match crypter.decrypt_message(&mut buf[..len as usize + 16]) {
Ok(_) => {},
Err(_) => return,
match crypter.decrypt_message(&mut buf[..len as usize + 16]) {
Ok(_) => {},
Err(_) => return,