OpenCoverage

rsa_err.c

Absolute File Name:/home/opencoverage/opencoverage/guest-scripts/libressl/src/crypto/rsa/rsa_err.c
Switch to Source codePreprocessed file
LineSourceCount
1-
2-
3-
4-
5-
6-
7-
8-
9-
10static ERR_STRING_DATA RSA_str_functs[] = {-
11 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0xfff)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "CRYPTO_internal"},-
12 {0, -
13 ((void *)0)-
14 }-
15};-
16-
17static ERR_STRING_DATA RSA_str_reasons[] = {-
18 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)100)&0xfffL))) , "algorithm mismatch"},-
19 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)101)&0xfffL))) , "bad e value"},-
20 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)102)&0xfffL))), "bad fixed header decrypt"},-
21 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)103)&0xfffL))) , "bad pad byte count"},-
22 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)104)&0xfffL))) , "bad signature"},-
23 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)106)&0xfffL))) , "block type is not 01"},-
24 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)107)&0xfffL))) , "block type is not 02"},-
25 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)108)&0xfffL))), "data greater than mod len"},-
26 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)109)&0xfffL))) , "data too large"},-
27 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)110)&0xfffL))), "data too large for key size"},-
28 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)132)&0xfffL))), "data too large for modulus"},-
29 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)111)&0xfffL))) , "data too small"},-
30 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)122)&0xfffL))), "data too small for key size"},-
31 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)112)&0xfffL))), "digest too big for rsa key"},-
32 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)124)&0xfffL))), "dmp1 not congruent to d"},-
33 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)125)&0xfffL))), "dmq1 not congruent to d"},-
34 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)123)&0xfffL))), "d e not congruent to 1"},-
35 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)133)&0xfffL))) , "first octet invalid"},-
36 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)144)&0xfffL))), "illegal or unsupported padding mode"},-
37 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)143)&0xfffL))) , "invalid digest length"},-
38 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)137)&0xfffL))) , "invalid header"},-
39 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)145)&0xfffL))) , "invalid keybits"},-
40 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)131)&0xfffL))), "invalid message length"},-
41 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)156)&0xfffL))) , "invalid mgf1 md"},-
42 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)138)&0xfffL))) , "invalid padding"},-
43 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)141)&0xfffL))) , "invalid padding mode"},-
44 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)149)&0xfffL))), "invalid pss parameters"},-
45 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)146)&0xfffL))) , "invalid pss saltlen"},-
46 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)150)&0xfffL))) , "invalid salt length"},-
47 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)139)&0xfffL))) , "invalid trailer"},-
48 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)142)&0xfffL))) , "invalid x931 digest"},-
49 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)126)&0xfffL))) , "iqmp not inverse of q"},-
50 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)120)&0xfffL))) , "key size too small"},-
51 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)134)&0xfffL))) , "last octet invalid"},-
52 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)105)&0xfffL))) , "modulus too large"},-
53 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)157)&0xfffL))) , "non fips rsa method"},-
54 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)140)&0xfffL))) , "no public exponent"},-
55 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)113)&0xfffL))), "null before block missing"},-
56 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)127)&0xfffL))) , "n does not equal p q"},-
57 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)121)&0xfffL))) , "oaep decoding error"},-
58 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)158)&0xfffL))), "operation not allowed in fips mode"},-
59 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)148)&0xfffL))), "operation not supported for this keytype"},-
60 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)114)&0xfffL))) , "padding check failed"},-
61 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)128)&0xfffL))) , "p not prime"},-
62 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)129)&0xfffL))) , "q not prime"},-
63 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)130)&0xfffL))), "rsa operations not supported"},-
64 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)136)&0xfffL))) , "salt length check failed"},-
65 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)135)&0xfffL))) , "salt length recovery failed"},-
66 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)115)&0xfffL))) , "sslv3 rollback attack"},-
67 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)116)&0xfffL))), "the asn1 object identifier is not known for this md"},-
68 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)117)&0xfffL))), "unknown algorithm type"},-
69 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)151)&0xfffL))) , "unknown mask digest"},-
70 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)118)&0xfffL))) , "unknown padding type"},-
71 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)152)&0xfffL))) , "unknown pss digest"},-
72 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)153)&0xfffL))), "unsupported mask algorithm"},-
73 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)154)&0xfffL))), "unsupported mask parameter"},-
74 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)155)&0xfffL))), "unsupported signature type"},-
75 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)147)&0xfffL))) , "value missing"},-
76 {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)119)&0xfffL))), "wrong signature length"},-
77 {0, -
78 ((void *)0)-
79 }-
80};-
81-
82-
83-
84void-
85ERR_load_RSA_strings(void)-
86{-
87-
88 if (ERR_func_error_string(RSA_str_functs[0].error) ==
ERR_func_error...== ((void *)0)Description
TRUEevaluated 290 times by 31 tests
Evaluated by:
  • asn1test
  • base64test
  • bnaddsub
  • bntest
  • cipher_list
  • cipherstest
  • clienttest
  • configtest
  • dhtest
  • dsatest
  • ecdhtest
  • ecdsatest
  • ectest
  • enginetest
  • evptest
  • exptest
  • gost2814789t
  • keypairtest
  • libcrypto.so.44.0.1
  • mont
  • pbkdf2
  • pkcs7test
  • rsa_test
  • servertest
  • ssl_versions
  • ...
FALSEnever evaluated
0-290
89 ((void *)0)
ERR_func_error...== ((void *)0)Description
TRUEevaluated 290 times by 31 tests
Evaluated by:
  • asn1test
  • base64test
  • bnaddsub
  • bntest
  • cipher_list
  • cipherstest
  • clienttest
  • configtest
  • dhtest
  • dsatest
  • ecdhtest
  • ecdsatest
  • ectest
  • enginetest
  • evptest
  • exptest
  • gost2814789t
  • keypairtest
  • libcrypto.so.44.0.1
  • mont
  • pbkdf2
  • pkcs7test
  • rsa_test
  • servertest
  • ssl_versions
  • ...
FALSEnever evaluated
0-290
90 ) {-
91 ERR_load_strings(0, RSA_str_functs);-
92 ERR_load_strings(0, RSA_str_reasons);-
93 }
executed 290 times by 31 tests: end of block
Executed by:
  • asn1test
  • base64test
  • bnaddsub
  • bntest
  • cipher_list
  • cipherstest
  • clienttest
  • configtest
  • dhtest
  • dsatest
  • ecdhtest
  • ecdsatest
  • ectest
  • enginetest
  • evptest
  • exptest
  • gost2814789t
  • keypairtest
  • libcrypto.so.44.0.1
  • mont
  • pbkdf2
  • pkcs7test
  • rsa_test
  • servertest
  • ssl_versions
  • ...
290
94-
95}
executed 290 times by 31 tests: end of block
Executed by:
  • asn1test
  • base64test
  • bnaddsub
  • bntest
  • cipher_list
  • cipherstest
  • clienttest
  • configtest
  • dhtest
  • dsatest
  • ecdhtest
  • ecdsatest
  • ectest
  • enginetest
  • evptest
  • exptest
  • gost2814789t
  • keypairtest
  • libcrypto.so.44.0.1
  • mont
  • pbkdf2
  • pkcs7test
  • rsa_test
  • servertest
  • ssl_versions
  • ...
290
Switch to Source codePreprocessed file

Generated by Squish Coco 4.2.2