[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] Re: #1209 [Tor - Tor client]: crypto.c:322 _crypto_new_pk_env_rsa: Assertion rsa failed; aborting.



#1209: crypto.c:322 _crypto_new_pk_env_rsa: Assertion rsa failed; aborting.
---------------------------+------------------------------------------------
 Reporter:  Safari         |         Type:  defect          
   Status:  closed         |     Priority:  minor           
Milestone:                 |    Component:  Tor - Tor client
  Version:  0.2.2.6-alpha  |   Resolution:  worksforme      
 Keywords:                 |       Parent:                  
---------------------------+------------------------------------------------
Changes (by nickm):

  * status:  new => closed
  * resolution:  None => worksforme


Comment:

 So there are only a few call-sites for _crypto_new_pk_env_rsa().  The only
 one right now that doesn't check for a NULL value of the argument before
 calling it is crypto_pk_copy_full().   This was also true in Tor
 0.2.2.6-alpha, where the bug occurred.

 I've updated the crypto_pk_copy_full function (as of git commit 8e1bf98)
 so that if copying the key fails, it will log any errors that openssl
 generates.  Unfortunately, the key-copying logic in openssl uses the ASN1
 machinery so heavily that I'm really not able to look at changes between
 openssl 20091229 and now to see if any of them might have been
 responsible.

 Closing this bug as 'worksforme' for now since it hasn't come back; please
 let us know  if it ever comes back, especially if you can get the message
 generated by the next Tor version.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/1209#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online