Precautions against using the PRNG uninitialized: RAND_bytes() now
returns int (1 = ok, 0 = not seeded). New function RAND_add() is the same as RAND_seed() but takes an estimate of the entropy as an additional argument.
This commit is contained in:
@@ -205,7 +205,6 @@ static ERR_STRING_DATA SSL_str_reasons[]=
|
||||
{SSL_R_BAD_AUTHENTICATION_TYPE ,"bad authentication type"},
|
||||
{SSL_R_BAD_CHANGE_CIPHER_SPEC ,"bad change cipher spec"},
|
||||
{SSL_R_BAD_CHECKSUM ,"bad checksum"},
|
||||
{SSL_R_BAD_HELLO_REQUEST ,"bad hello request"},
|
||||
{SSL_R_BAD_DATA_RETURNED_BY_CALLBACK ,"bad data returned by callback"},
|
||||
{SSL_R_BAD_DECOMPRESSION ,"bad decompression"},
|
||||
{SSL_R_BAD_DH_G_LENGTH ,"bad dh g length"},
|
||||
@@ -213,6 +212,7 @@ static ERR_STRING_DATA SSL_str_reasons[]=
|
||||
{SSL_R_BAD_DH_P_LENGTH ,"bad dh p length"},
|
||||
{SSL_R_BAD_DIGEST_LENGTH ,"bad digest length"},
|
||||
{SSL_R_BAD_DSA_SIGNATURE ,"bad dsa signature"},
|
||||
{SSL_R_BAD_HELLO_REQUEST ,"bad hello request"},
|
||||
{SSL_R_BAD_LENGTH ,"bad length"},
|
||||
{SSL_R_BAD_MAC_DECODE ,"bad mac decode"},
|
||||
{SSL_R_BAD_MESSAGE_TYPE ,"bad message type"},
|
||||
|
Reference in New Issue
Block a user