diff options
author | Shane Lontis <shane.lontis@oracle.com> | 2019-09-14 01:27:49 +0200 |
---|---|---|
committer | Shane Lontis <shane.lontis@oracle.com> | 2019-09-14 01:27:49 +0200 |
commit | 3a9f26f3308c5b3e59ec0e589310fd137b0399f6 (patch) | |
tree | 7eee906072dbc4679fbb2007ab8bf14f4ee91637 /crypto/err/openssl.txt | |
parent | Fix S390X bad size_t that causes memory trash in legacy ciphers (diff) | |
download | openssl-3a9f26f3308c5b3e59ec0e589310fd137b0399f6.tar.xz openssl-3a9f26f3308c5b3e59ec0e589310fd137b0399f6.zip |
Add aes_xts cipher to providers
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/9327)
Diffstat (limited to 'crypto/err/openssl.txt')
-rw-r--r-- | crypto/err/openssl.txt | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/crypto/err/openssl.txt b/crypto/err/openssl.txt index f74659c599..700f1da20f 100644 --- a/crypto/err/openssl.txt +++ b/crypto/err/openssl.txt @@ -2706,6 +2706,8 @@ PROV_R_UNSUPPORTED_MAC_TYPE:137:unsupported mac type PROV_R_VALUE_ERROR:138:value error PROV_R_WRONG_FINAL_BLOCK_LENGTH:107:wrong final block length PROV_R_WRONG_OUTPUT_BUFFER_SIZE:139:wrong output buffer size +PROV_R_XTS_DATA_UNIT_IS_TOO_LARGE:148:xts data unit is too large +PROV_R_XTS_DUPLICATED_KEYS:149:xts duplicated keys RAND_R_ADDITIONAL_INPUT_TOO_LONG:102:additional input too long RAND_R_ALREADY_INSTANTIATED:103:already instantiated RAND_R_ARGUMENT_OUT_OF_RANGE:105:argument out of range |