[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #5170 [Tor Client]: crypto_pk_get_digest (et al.?) use i2d_RSAPublicKey obsoletely



#5170: crypto_pk_get_digest (et al.?) use i2d_RSAPublicKey obsoletely
------------------------+---------------------------------------------------
 Reporter:  rransom     |          Owner:     
     Type:  defect      |         Status:  new
 Priority:  trivial     |      Milestone:     
Component:  Tor Client  |        Version:     
 Keywords:  easy        |         Parent:     
   Points:              |   Actualpoints:     
------------------------+---------------------------------------------------
 `i2d_RSAPublicKey` now supports (in OpenSSL 0.9.7 or later, so in all
 OpenSSL versions we support) allocating its own output buffer (using
 `OPENSSL_malloc`).  Is this feature worth using in `crypto_pk_get_digest`
 (and some other functions which call `i2d_RSAPublicKey` twice to allocate
 a ''temporary'' buffer)?

 (See the `i2d_X509(3ssl)` man page.)

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5170>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs