Line | Source | Count |
1 | | - |
2 | | - |
3 | | - |
4 | | - |
5 | | - |
6 | | - |
7 | | - |
8 | | - |
9 | | - |
10 | static ERR_STRING_DATA RSA_str_functs[] = { | - |
11 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0xfff)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "CRYPTO_internal"}, | - |
12 | {0, | - |
13 | ((void *)0) | - |
14 | } | - |
15 | }; | - |
16 | | - |
17 | static ERR_STRING_DATA RSA_str_reasons[] = { | - |
18 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)100)&0xfffL))) , "algorithm mismatch"}, | - |
19 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)101)&0xfffL))) , "bad e value"}, | - |
20 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)102)&0xfffL))), "bad fixed header decrypt"}, | - |
21 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)103)&0xfffL))) , "bad pad byte count"}, | - |
22 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)104)&0xfffL))) , "bad signature"}, | - |
23 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)106)&0xfffL))) , "block type is not 01"}, | - |
24 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)107)&0xfffL))) , "block type is not 02"}, | - |
25 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)108)&0xfffL))), "data greater than mod len"}, | - |
26 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)109)&0xfffL))) , "data too large"}, | - |
27 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)110)&0xfffL))), "data too large for key size"}, | - |
28 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)132)&0xfffL))), "data too large for modulus"}, | - |
29 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)111)&0xfffL))) , "data too small"}, | - |
30 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)122)&0xfffL))), "data too small for key size"}, | - |
31 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)112)&0xfffL))), "digest too big for rsa key"}, | - |
32 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)124)&0xfffL))), "dmp1 not congruent to d"}, | - |
33 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)125)&0xfffL))), "dmq1 not congruent to d"}, | - |
34 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)123)&0xfffL))), "d e not congruent to 1"}, | - |
35 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)133)&0xfffL))) , "first octet invalid"}, | - |
36 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)144)&0xfffL))), "illegal or unsupported padding mode"}, | - |
37 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)143)&0xfffL))) , "invalid digest length"}, | - |
38 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)137)&0xfffL))) , "invalid header"}, | - |
39 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)145)&0xfffL))) , "invalid keybits"}, | - |
40 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)131)&0xfffL))), "invalid message length"}, | - |
41 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)156)&0xfffL))) , "invalid mgf1 md"}, | - |
42 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)138)&0xfffL))) , "invalid padding"}, | - |
43 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)141)&0xfffL))) , "invalid padding mode"}, | - |
44 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)149)&0xfffL))), "invalid pss parameters"}, | - |
45 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)146)&0xfffL))) , "invalid pss saltlen"}, | - |
46 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)150)&0xfffL))) , "invalid salt length"}, | - |
47 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)139)&0xfffL))) , "invalid trailer"}, | - |
48 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)142)&0xfffL))) , "invalid x931 digest"}, | - |
49 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)126)&0xfffL))) , "iqmp not inverse of q"}, | - |
50 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)120)&0xfffL))) , "key size too small"}, | - |
51 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)134)&0xfffL))) , "last octet invalid"}, | - |
52 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)105)&0xfffL))) , "modulus too large"}, | - |
53 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)157)&0xfffL))) , "non fips rsa method"}, | - |
54 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)140)&0xfffL))) , "no public exponent"}, | - |
55 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)113)&0xfffL))), "null before block missing"}, | - |
56 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)127)&0xfffL))) , "n does not equal p q"}, | - |
57 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)121)&0xfffL))) , "oaep decoding error"}, | - |
58 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)158)&0xfffL))), "operation not allowed in fips mode"}, | - |
59 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)148)&0xfffL))), "operation not supported for this keytype"}, | - |
60 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)114)&0xfffL))) , "padding check failed"}, | - |
61 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)128)&0xfffL))) , "p not prime"}, | - |
62 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)129)&0xfffL))) , "q not prime"}, | - |
63 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)130)&0xfffL))), "rsa operations not supported"}, | - |
64 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)136)&0xfffL))) , "salt length check failed"}, | - |
65 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)135)&0xfffL))) , "salt length recovery failed"}, | - |
66 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)115)&0xfffL))) , "sslv3 rollback attack"}, | - |
67 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)116)&0xfffL))), "the asn1 object identifier is not known for this md"}, | - |
68 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)117)&0xfffL))), "unknown algorithm type"}, | - |
69 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)151)&0xfffL))) , "unknown mask digest"}, | - |
70 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)118)&0xfffL))) , "unknown padding type"}, | - |
71 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)152)&0xfffL))) , "unknown pss digest"}, | - |
72 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)153)&0xfffL))), "unsupported mask algorithm"}, | - |
73 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)154)&0xfffL))), "unsupported mask parameter"}, | - |
74 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)155)&0xfffL))), "unsupported signature type"}, | - |
75 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)147)&0xfffL))) , "value missing"}, | - |
76 | {(((((unsigned long)4)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)119)&0xfffL))), "wrong signature length"}, | - |
77 | {0, | - |
78 | ((void *)0) | - |
79 | } | - |
80 | }; | - |
81 | | - |
82 | | - |
83 | | - |
84 | void | - |
85 | ERR_load_RSA_strings(void) | - |
86 | { | - |
87 | | - |
88 | if (ERR_func_error_string(RSA_str_functs[0].error) == TRUE | evaluated 290 times by 31 testsEvaluated by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| FALSE | never evaluated |
| 0-290 |
89 | ((void *)0)TRUE | evaluated 290 times by 31 testsEvaluated by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| FALSE | never evaluated |
| 0-290 |
90 | ) { | - |
91 | ERR_load_strings(0, RSA_str_functs); | - |
92 | ERR_load_strings(0, RSA_str_reasons); | - |
93 | }executed 290 times by 31 tests: end of block Executed by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
94 | | - |
95 | }executed 290 times by 31 tests: end of block Executed by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
| | |