diff options
author | Bodo Möller <bodo@openssl.org> | 2001-02-08 12:14:51 +0000 |
---|---|---|
committer | Bodo Möller <bodo@openssl.org> | 2001-02-08 12:14:51 +0000 |
commit | 35ed8cb8b6655606c2be31d44be942f6724ba405 (patch) | |
tree | 23cb17587c9eba1277d885d28d70e39e6a319af0 /crypto/bn/bn_err.c | |
parent | 7edc5ed90a55ecaf94ded491c99cfe930da9ba2a (diff) |
Integrate my implementation of a countermeasure against
Bleichenbacher's DSA attack. With this implementation, the expected
number of iterations never exceeds 2.
New semantics for BN_rand_range():
BN_rand_range(r, min, range) now generates r such that
min <= r < min+range.
(Previously, BN_rand_range(r, min, max) generated r such that
min <= r < max.
It is more convenient to have the range; also the previous
prototype was misleading because max was larger than
the actual maximum.)
Diffstat (limited to 'crypto/bn/bn_err.c')
-rw-r--r-- | crypto/bn/bn_err.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/crypto/bn/bn_err.c b/crypto/bn/bn_err.c index d7f0493f47..c713e1f154 100644 --- a/crypto/bn/bn_err.c +++ b/crypto/bn/bn_err.c @@ -87,6 +87,7 @@ static ERR_STRING_DATA BN_str_functs[]= {ERR_PACK(0,BN_F_BN_MPI2BN,0), "BN_mpi2bn"}, {ERR_PACK(0,BN_F_BN_NEW,0), "BN_new"}, {ERR_PACK(0,BN_F_BN_RAND,0), "BN_rand"}, +{ERR_PACK(0,BN_F_BN_RAND_RANGE,0), "BN_rand_range"}, {ERR_PACK(0,BN_F_BN_USUB,0), "BN_usub"}, {0,NULL} }; @@ -102,6 +103,7 @@ static ERR_STRING_DATA BN_str_reasons[]= {BN_R_EXPAND_ON_STATIC_BIGNUM_DATA ,"expand on static bignum data"}, {BN_R_INPUT_NOT_REDUCED ,"input not reduced"}, {BN_R_INVALID_LENGTH ,"invalid length"}, +{BN_R_INVALID_RANGE ,"invalid range"}, {BN_R_NOT_A_SQUARE ,"not a square"}, {BN_R_NOT_INITIALIZED ,"not initialized"}, {BN_R_NO_INVERSE ,"no inverse"}, |