Note: This bug is displayed in read-only format because
the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
---Problem Description---
opencryptoki erroneously returns error when reading its token data from disk.
---Steps to Reproduce---
Using a testcase from opencryptoki's testsuite, tok_obj:
$ PKCS11_USER_PIN=1234 ./tok_obj -slot 0
1. Create a token object
2. Count token objects
3. Verify contents of the first token object
4. Destroy all token objects
5. Initialize Token
6. Set USER PIN
7. Get Token Info
9. Exit
Selection:
At the prompt, enter 1, then 4. 4 will fail with CKR_FUNCTION_FAILED
Userspace rpm: opencryptoki-libs
Hi Redhat,
This bug was discovered during feature verification for opencryptoki. Please
apply the attached patches, which will fix the issue. The RH feature is
bugzilla 632765.
Thanks,
Kent
1. Server architecture(s) (please list all effected) (x86/POWER6/Z/etc.): All
2. Server type (9117-MMA/HS20/s390/etc.): N/A
3. Other components involved (ixgbe/java/emulex/etc.): opencryptoki
4. Does the server have the latest GA firmware? N/A
5. Has the problem been shown to occur on more than one system? Yes
6. Collect "sosreport" from machine problem was found on, and attach to bug. N/A
7. What is the latest official distro build on which this bug has been seen? RHEL 6.1 snap 4
------- Comment From yoder1.com 2011-04-25 12:47 EDT-------
The upshot of this bug is that it is a data corruption issue -- data stored by opencryptoki cannot be re-loaded correctly after an application shuts down.
Changing the severity to ship issue.
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.
http://rhn.redhat.com/errata/RHBA-2011-0661.html
---Problem Description--- opencryptoki erroneously returns error when reading its token data from disk. ---Steps to Reproduce--- Using a testcase from opencryptoki's testsuite, tok_obj: $ PKCS11_USER_PIN=1234 ./tok_obj -slot 0 1. Create a token object 2. Count token objects 3. Verify contents of the first token object 4. Destroy all token objects 5. Initialize Token 6. Set USER PIN 7. Get Token Info 9. Exit Selection: At the prompt, enter 1, then 4. 4 will fail with CKR_FUNCTION_FAILED Userspace rpm: opencryptoki-libs Hi Redhat, This bug was discovered during feature verification for opencryptoki. Please apply the attached patches, which will fix the issue. The RH feature is bugzilla 632765. Thanks, Kent 1. Server architecture(s) (please list all effected) (x86/POWER6/Z/etc.): All 2. Server type (9117-MMA/HS20/s390/etc.): N/A 3. Other components involved (ixgbe/java/emulex/etc.): opencryptoki 4. Does the server have the latest GA firmware? N/A 5. Has the problem been shown to occur on more than one system? Yes 6. Collect "sosreport" from machine problem was found on, and attach to bug. N/A 7. What is the latest official distro build on which this bug has been seen? RHEL 6.1 snap 4