d12f2ba55e
cryptography.io wants RSA_R_BLOCK_TYPE_IS_NOT_02, only used by the ancient RSA_padding_check_SSLv23 function. Define it but never emit it. Additionally, it's rather finicky about RSA_R_TOO_LARGE* errors. We merged them in BoringSSL because having RSA_R_TOO_LARGE, RSA_R_TOO_LARGE_FOR_MODULUS, and RSA_R_TOO_LARGE_FOR_KEY_SIZE is a little silly. But since we don't expect well-behaved code to condition on error codes anyway, perhaps that wasn't worth it. Split them back up. Looking through OpenSSL, there is a vague semantic difference: RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY - Specifically emitted if a digest is too big for PKCS#1 signing with this key. RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE - You asked me to sign or encrypt a digest/plaintext, but it's too big for this key. RSA_R_DATA_TOO_LARGE_FOR_MODULUS - You gave me an RSA ciphertext or signature and it is not fully reduced modulo N. -OR- The padding functions produced something that isn't reduced, but I believe this is unreachable outside of RSA_NO_PADDING. RSA_R_DATA_TOO_LARGE - Some low-level padding function was told to copy a digest/plaintext into some buffer, but the buffer was too small. I think this is basically unreachable. -OR- You asked me to verify a PSS signature, but I didn't need to bother because the digest/salt parameters you picked were too big. Update-Note: This depends on cl/196566462. Change-Id: I2e539e075eff8bfcd52ccde365e975ebcee72567 Reviewed-on: https://boringssl-review.googlesource.com/28547 Reviewed-by: Adam Langley <agl@google.com>
50 lines
1.4 KiB
Plaintext
50 lines
1.4 KiB
Plaintext
RSA,100,BAD_ENCODING
|
|
RSA,101,BAD_E_VALUE
|
|
RSA,102,BAD_FIXED_HEADER_DECRYPT
|
|
RSA,103,BAD_PAD_BYTE_COUNT
|
|
RSA,104,BAD_RSA_PARAMETERS
|
|
RSA,105,BAD_SIGNATURE
|
|
RSA,106,BAD_VERSION
|
|
RSA,107,BLOCK_TYPE_IS_NOT_01
|
|
RSA,148,BLOCK_TYPE_IS_NOT_02
|
|
RSA,108,BN_NOT_INITIALIZED
|
|
RSA,109,CANNOT_RECOVER_MULTI_PRIME_KEY
|
|
RSA,110,CRT_PARAMS_ALREADY_GIVEN
|
|
RSA,111,CRT_VALUES_INCORRECT
|
|
RSA,112,DATA_LEN_NOT_EQUAL_TO_MOD_LEN
|
|
RSA,113,DATA_TOO_LARGE
|
|
RSA,114,DATA_TOO_LARGE_FOR_KEY_SIZE
|
|
RSA,115,DATA_TOO_LARGE_FOR_MODULUS
|
|
RSA,116,DATA_TOO_SMALL
|
|
RSA,117,DATA_TOO_SMALL_FOR_KEY_SIZE
|
|
RSA,118,DIGEST_TOO_BIG_FOR_RSA_KEY
|
|
RSA,119,D_E_NOT_CONGRUENT_TO_1
|
|
RSA,147,D_OUT_OF_RANGE
|
|
RSA,120,EMPTY_PUBLIC_KEY
|
|
RSA,121,ENCODE_ERROR
|
|
RSA,122,FIRST_OCTET_INVALID
|
|
RSA,123,INCONSISTENT_SET_OF_CRT_VALUES
|
|
RSA,124,INTERNAL_ERROR
|
|
RSA,125,INVALID_MESSAGE_LENGTH
|
|
RSA,126,KEY_SIZE_TOO_SMALL
|
|
RSA,127,LAST_OCTET_INVALID
|
|
RSA,128,MODULUS_TOO_LARGE
|
|
RSA,129,MUST_HAVE_AT_LEAST_TWO_PRIMES
|
|
RSA,130,NO_PUBLIC_EXPONENT
|
|
RSA,131,NULL_BEFORE_BLOCK_MISSING
|
|
RSA,132,N_NOT_EQUAL_P_Q
|
|
RSA,133,OAEP_DECODING_ERROR
|
|
RSA,134,ONLY_ONE_OF_P_Q_GIVEN
|
|
RSA,135,OUTPUT_BUFFER_TOO_SMALL
|
|
RSA,136,PADDING_CHECK_FAILED
|
|
RSA,137,PKCS_DECODING_ERROR
|
|
RSA,146,PUBLIC_KEY_VALIDATION_FAILED
|
|
RSA,138,SLEN_CHECK_FAILED
|
|
RSA,139,SLEN_RECOVERY_FAILED
|
|
RSA,140,TOO_LONG
|
|
RSA,141,TOO_MANY_ITERATIONS
|
|
RSA,142,UNKNOWN_ALGORITHM_TYPE
|
|
RSA,143,UNKNOWN_PADDING_TYPE
|
|
RSA,144,VALUE_MISSING
|
|
RSA,145,WRONG_SIGNATURE_LENGTH
|