[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #19979 [Core Tor/Tor]: Use OpenSSL 1.1.0 HKDF in Tor when available.
#19979: Use OpenSSL 1.1.0 HKDF in Tor when available.
-----------------------------+------------------------------
Reporter: nickm | Owner:
Type: enhancement | Status: new
Priority: Medium | Milestone: Tor: 0.2.???
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: openssl110 easy | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-----------------------------+------------------------------
Comment (by icanhasaccount):
Replying to [ticket:19979 nickm]:
> OpenSSL 1.1.0 now includes HKDF support. We should consider using their
implementation instead of ours when it's available.
I had a quick look at this today - the implementation in openssl seems to
fail (
error:0F073041:common libcrypto routines:CRYPTO_memdup:malloc failure)
when the key length is zero (Its one of the tests for the current
implementation in test_crypto.c).
I tried to upload a test but trac thinks its spam ><
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/19979#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs