summaryrefslogtreecommitdiffstats
path: root/crypto/bn/bn_err.c
diff options
context:
space:
mode:
authorBodo Möller <bodo@openssl.org>2001-02-08 12:14:51 +0000
committerBodo Möller <bodo@openssl.org>2001-02-08 12:14:51 +0000
commit35ed8cb8b6655606c2be31d44be942f6724ba405 (patch)
tree23cb17587c9eba1277d885d28d70e39e6a319af0 /crypto/bn/bn_err.c
parent7edc5ed90a55ecaf94ded491c99cfe930da9ba2a (diff)
Integrate my implementation of a countermeasure against
Bleichenbacher's DSA attack. With this implementation, the expected number of iterations never exceeds 2. New semantics for BN_rand_range(): BN_rand_range(r, min, range) now generates r such that min <= r < min+range. (Previously, BN_rand_range(r, min, max) generated r such that min <= r < max. It is more convenient to have the range; also the previous prototype was misleading because max was larger than the actual maximum.)
Diffstat (limited to 'crypto/bn/bn_err.c')
-rw-r--r--crypto/bn/bn_err.c2
1 files changed, 2 insertions, 0 deletions
diff --git a/crypto/bn/bn_err.c b/crypto/bn/bn_err.c
index d7f0493f47..c713e1f154 100644
--- a/crypto/bn/bn_err.c
+++ b/crypto/bn/bn_err.c
@@ -87,6 +87,7 @@ static ERR_STRING_DATA BN_str_functs[]=
{ERR_PACK(0,BN_F_BN_MPI2BN,0), "BN_mpi2bn"},
{ERR_PACK(0,BN_F_BN_NEW,0), "BN_new"},
{ERR_PACK(0,BN_F_BN_RAND,0), "BN_rand"},
+{ERR_PACK(0,BN_F_BN_RAND_RANGE,0), "BN_rand_range"},
{ERR_PACK(0,BN_F_BN_USUB,0), "BN_usub"},
{0,NULL}
};
@@ -102,6 +103,7 @@ static ERR_STRING_DATA BN_str_reasons[]=
{BN_R_EXPAND_ON_STATIC_BIGNUM_DATA ,"expand on static bignum data"},
{BN_R_INPUT_NOT_REDUCED ,"input not reduced"},
{BN_R_INVALID_LENGTH ,"invalid length"},
+{BN_R_INVALID_RANGE ,"invalid range"},
{BN_R_NOT_A_SQUARE ,"not a square"},
{BN_R_NOT_INITIALIZED ,"not initialized"},
{BN_R_NO_INVERSE ,"no inverse"},