Red Hat Bugzilla – Bug 1115177
attrcrypt_generate_key calls slapd_pk11_TokenKeyGenWithFlags with improper macro
Last modified: 2015-03-05 04:35:37 EST
This bug is created as a clone of upstream ticket: https://fedorahosted.org/389/ticket/47832 Thanks to Bob Relyea for finding out that we are passing an improper macro to slapd_pk11_TokenKeyGenWithFlags. It has to be: {{{ diff --git a/ldap/servers/slapd/back-ldbm/ldbm_attrcrypt.c b/ldap/servers/slapd/back-ldbm/ldbm_attrcrypt.c index f4a5d1a..41856d5 100644 --- a/ldap/servers/slapd/back-ldbm/ldbm_attrcrypt.c +++ b/ldap/servers/slapd/back-ldbm/ldbm_attrcrypt.c @@ -344,7 +344,7 @@ attrcrypt_generate_key(attrcrypt_cipher_state *acs,PK11SymKey **symmetric_key) 0 /*param*/, acs->ace->key_size, NULL /*keyid*/, - CKA_DECRYPT/*op*/, + CKF_DECRYPT/*op*/, CKF_ENCRYPT/*attr*/, NULL); if (new_symmetric_key) { }}}
SSL ACL run 100% (8/8) SSL GER run 100% (6/6) SSL Password storage run 100% (7/7) SSL BOB run 100% (6/6) SSL CLU run 100% (5/5) SSL Import run 100% (3/3) SSL VLV run 100% (7/7) SSL authentication run 100% (5/5) SSL connection run 100% (3/3) SSL cleanup 100% (1/1) SSL error test startup 100% (1/1) Hence marking as VERIFIED.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHSA-2015-0416.html