From b79aa05e3babdbab92c6356f6e51f7bb43c41576 Mon Sep 17 00:00:00 2001 From: "Mark J. Cox" Date: Tue, 5 Sep 2006 08:58:03 +0000 Subject: Avoid PKCS #1 v1.5 signature attack discovered by Daniel Bleichenbacher (CVE-2006-4339) Submitted by: Ben Laurie, Google Security Team Reviewed by: bmoeller, mjc, shenson --- crypto/rsa/rsa_err.c | 1 + 1 file changed, 1 insertion(+) (limited to 'crypto/rsa/rsa_err.c') diff --git a/crypto/rsa/rsa_err.c b/crypto/rsa/rsa_err.c index 163b143a73..1a7f8b7719 100644 --- a/crypto/rsa/rsa_err.c +++ b/crypto/rsa/rsa_err.c @@ -160,6 +160,7 @@ static ERR_STRING_DATA RSA_str_reasons[]= {ERR_REASON(RSA_R_N_DOES_NOT_EQUAL_P_Q) ,"n does not equal p q"}, {ERR_REASON(RSA_R_OAEP_DECODING_ERROR) ,"oaep decoding error"}, {ERR_REASON(RSA_R_PADDING_CHECK_FAILED) ,"padding check failed"}, +{ERR_REASON(RSA_R_PKCS1_PADDING_TOO_SHORT),"pkcs1 padding too short"}, {ERR_REASON(RSA_R_P_NOT_PRIME) ,"p not prime"}, {ERR_REASON(RSA_R_Q_NOT_PRIME) ,"q not prime"}, {ERR_REASON(RSA_R_RSA_OPERATIONS_NOT_SUPPORTED),"rsa operations not supported"}, -- cgit v1.2.3