summaryrefslogtreecommitdiffstats
path: root/crypto/rsa/rsa_err.c
diff options
context:
space:
mode:
authorBodo Möller <bodo@openssl.org>2006-09-28 15:45:34 +0200
committerBodo Möller <bodo@openssl.org>2006-09-28 15:45:34 +0200
commit5e3225cc44ebdce3a88d04a627e975b3e76a6f9a (patch)
tree40fc0efbaf2e75215453e71a5b6b8b326d3bee0f /crypto/rsa/rsa_err.c
parentinclude 0.9.8d and 0.9.7l information (diff)
downloadopenssl-5e3225cc44ebdce3a88d04a627e975b3e76a6f9a.tar.xz
openssl-5e3225cc44ebdce3a88d04a627e975b3e76a6f9a.zip
Introduce limits to prevent malicious keys being able to
cause a denial of service. (CVE-2006-2940) [Steve Henson, Bodo Moeller]
Diffstat (limited to 'crypto/rsa/rsa_err.c')
-rw-r--r--crypto/rsa/rsa_err.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/crypto/rsa/rsa_err.c b/crypto/rsa/rsa_err.c
index 163b143a73..c844aeb911 100644
--- a/crypto/rsa/rsa_err.c
+++ b/crypto/rsa/rsa_err.c
@@ -155,6 +155,7 @@ static ERR_STRING_DATA RSA_str_reasons[]=
{ERR_REASON(RSA_R_IQMP_NOT_INVERSE_OF_Q) ,"iqmp not inverse of q"},
{ERR_REASON(RSA_R_KEY_SIZE_TOO_SMALL) ,"key size too small"},
{ERR_REASON(RSA_R_LAST_OCTET_INVALID) ,"last octet invalid"},
+{ERR_REASON(RSA_R_MODULUS_TOO_LARGE) ,"modulus too large"},
{ERR_REASON(RSA_R_NO_PUBLIC_EXPONENT) ,"no public exponent"},
{ERR_REASON(RSA_R_NULL_BEFORE_BLOCK_MISSING),"null before block missing"},
{ERR_REASON(RSA_R_N_DOES_NOT_EQUAL_P_Q) ,"n does not equal p q"},