[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #5170 [Tor Client]: crypto_pk_get_digest (et al.?) use i2d_RSAPublicKey obsoletely
#5170: crypto_pk_get_digest (et al.?) use i2d_RSAPublicKey obsoletely
------------------------+---------------------------------------------------
Reporter: rransom | Owner:
Type: defect | Status: new
Priority: trivial | Milestone:
Component: Tor Client | Version:
Keywords: easy | Parent:
Points: | Actualpoints:
------------------------+---------------------------------------------------
`i2d_RSAPublicKey` now supports (in OpenSSL 0.9.7 or later, so in all
OpenSSL versions we support) allocating its own output buffer (using
`OPENSSL_malloc`). Is this feature worth using in `crypto_pk_get_digest`
(and some other functions which call `i2d_RSAPublicKey` twice to allocate
a ''temporary'' buffer)?
(See the `i2d_X509(3ssl)` man page.)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5170>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs