[tor-bugs] #5170 [Tor Client]: crypto_pk_get_digest (et al.?) use i2d_RSAPublicKey obsoletely
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Sat Feb 18 16:03:50 UTC 2012
#5170: crypto_pk_get_digest (et al.?) use i2d_RSAPublicKey obsoletely
------------------------+---------------------------------------------------
Reporter: rransom | Owner:
Type: defect | Status: new
Priority: trivial | Milestone:
Component: Tor Client | Version:
Keywords: easy | Parent:
Points: | Actualpoints:
------------------------+---------------------------------------------------
`i2d_RSAPublicKey` now supports (in OpenSSL 0.9.7 or later, so in all
OpenSSL versions we support) allocating its own output buffer (using
`OPENSSL_malloc`). Is this feature worth using in `crypto_pk_get_digest`
(and some other functions which call `i2d_RSAPublicKey` twice to allocate
a ''temporary'' buffer)?
(See the `i2d_X509(3ssl)` man page.)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5170>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list