diff options
author | Annie Yousar <a.yousar@informatik.hu-berlin.de> | 2014-09-08 16:50:03 -0400 |
---|---|---|
committer | Rich Salz <rsalz@openssl.org> | 2014-11-20 13:45:25 -0500 |
commit | c56a50b229932d2cef651d931b71a8cbffb029da (patch) | |
tree | 2c0064de0702bf68aa169c0c1b83c6b97a429086 /CHANGES | |
parent | 14d3b76be88ec68cda613186bb62415c7a17e573 (diff) |
RT2679: Fix error if keysize too short
In keygen, return KEY_SIZE_TOO_SMALL not INVALID_KEYBITS.
** I also increased the minimum from 256 to 512, which is now
documented in CHANGES file. **
Reviewed-by: Matt Caswell <matt@openssl.org>
Diffstat (limited to 'CHANGES')
-rw-r--r-- | CHANGES | 4 |
1 files changed, 4 insertions, 0 deletions
@@ -4,6 +4,10 @@ Changes between 1.0.2 and 1.1.0 [xx XXX xxxx] + *) Increased the minimal RSA keysize from 256 to 512 bits [Rich Salz], + done while fixing the error code for the key-too-small case. + [Annie Yousar <a.yousar@informatik.hu-berlin.de>] + *) Experimental support for a new, fast, unbiased prime candidate generator, bn_probable_prime_dh_coprime(). Not currently used by any prime generator. [Felix Laurie von Massenbach <felix@erbridge.co.uk>] |