From 30a6ffb3330a4ce39d12906a7dda5c4d9ed91dc3 Mon Sep 17 00:00:00 2001 From: Colin Percival Date: Thu, 28 Sep 2006 13:06:23 +0000 Subject: Correct multiple vulnerabilities in crypto(3). Limit the size of public keys used in order to protect applications from a denial of service via insane key sizes. Security: FreeBSD-SA-06:23.openssl Approved by: so (cperciva) --- crypto/openssl/crypto/rsa/rsa_err.c | 1 + 1 file changed, 1 insertion(+) (limited to 'crypto/openssl/crypto/rsa/rsa_err.c') diff --git a/crypto/openssl/crypto/rsa/rsa_err.c b/crypto/openssl/crypto/rsa/rsa_err.c index a7766c3b762e..8221a921e7b3 100644 --- a/crypto/openssl/crypto/rsa/rsa_err.c +++ b/crypto/openssl/crypto/rsa/rsa_err.c @@ -116,6 +116,7 @@ static ERR_STRING_DATA RSA_str_reasons[]= {RSA_R_INVALID_MESSAGE_LENGTH ,"invalid message length"}, {RSA_R_IQMP_NOT_INVERSE_OF_Q ,"iqmp not inverse of q"}, {RSA_R_KEY_SIZE_TOO_SMALL ,"key size too small"}, +{RSA_R_MODULUS_TOO_LARGE ,"modulus too large"}, {RSA_R_NULL_BEFORE_BLOCK_MISSING ,"null before block missing"}, {RSA_R_N_DOES_NOT_EQUAL_P_Q ,"n does not equal p q"}, {RSA_R_OAEP_DECODING_ERROR ,"oaep decoding error"}, -- cgit v1.2.3