OpenCoverage

evp_err.c

Absolute File Name:/home/opencoverage/opencoverage/guest-scripts/libressl/src/crypto/evp/evp_err.c
Source codeSwitch to Preprocessed file
LineSourceCount
1/* $OpenBSD: evp_err.c,v 1.22 2017/01/29 17:49:23 beck Exp $ */-
2/* ====================================================================-
3 * Copyright (c) 1999-2011 The OpenSSL Project. All rights reserved.-
4 *-
5 * Redistribution and use in source and binary forms, with or without-
6 * modification, are permitted provided that the following conditions-
7 * are met:-
8 *-
9 * 1. Redistributions of source code must retain the above copyright-
10 * notice, this list of conditions and the following disclaimer.-
11 *-
12 * 2. Redistributions in binary form must reproduce the above copyright-
13 * notice, this list of conditions and the following disclaimer in-
14 * the documentation and/or other materials provided with the-
15 * distribution.-
16 *-
17 * 3. All advertising materials mentioning features or use of this-
18 * software must display the following acknowledgment:-
19 * "This product includes software developed by the OpenSSL Project-
20 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"-
21 *-
22 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to-
23 * endorse or promote products derived from this software without-
24 * prior written permission. For written permission, please contact-
25 * openssl-core@OpenSSL.org.-
26 *-
27 * 5. Products derived from this software may not be called "OpenSSL"-
28 * nor may "OpenSSL" appear in their names without prior written-
29 * permission of the OpenSSL Project.-
30 *-
31 * 6. Redistributions of any form whatsoever must retain the following-
32 * acknowledgment:-
33 * "This product includes software developed by the OpenSSL Project-
34 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"-
35 *-
36 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY-
37 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE-
38 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR-
39 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR-
40 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,-
41 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT-
42 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;-
43 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)-
44 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,-
45 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)-
46 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED-
47 * OF THE POSSIBILITY OF SUCH DAMAGE.-
48 * ====================================================================-
49 *-
50 * This product includes cryptographic software written by Eric Young-
51 * (eay@cryptsoft.com). This product includes software written by Tim-
52 * Hudson (tjh@cryptsoft.com).-
53 *-
54 */-
55-
56/* NOTE: this file was auto generated by the mkerr.pl script: any changes-
57 * made to it will be overwritten when the script next updates this file,-
58 * only reason strings will be preserved.-
59 */-
60-
61#include <stdio.h>-
62-
63#include <openssl/opensslconf.h>-
64-
65#include <openssl/err.h>-
66#include <openssl/evp.h>-
67-
68/* BEGIN ERROR CODES */-
69#ifndef OPENSSL_NO_ERR-
70-
71#define ERR_FUNC(func) ERR_PACK(ERR_LIB_EVP,func,0)-
72#define ERR_REASON(reason) ERR_PACK(ERR_LIB_EVP,0,reason)-
73-
74static ERR_STRING_DATA EVP_str_functs[] = {-
75 {ERR_FUNC(0xfff), "CRYPTO_internal"},-
76 {0, NULL}-
77};-
78-
79static ERR_STRING_DATA EVP_str_reasons[] = {-
80 {ERR_REASON(EVP_R_AES_IV_SETUP_FAILED) , "aes iv setup failed"},-
81 {ERR_REASON(EVP_R_AES_KEY_SETUP_FAILED) , "aes key setup failed"},-
82 {ERR_REASON(EVP_R_ASN1_LIB) , "asn1 lib"},-
83 {ERR_REASON(EVP_R_BAD_BLOCK_LENGTH) , "bad block length"},-
84 {ERR_REASON(EVP_R_BAD_DECRYPT) , "bad decrypt"},-
85 {ERR_REASON(EVP_R_BAD_KEY_LENGTH) , "bad key length"},-
86 {ERR_REASON(EVP_R_BN_DECODE_ERROR) , "bn decode error"},-
87 {ERR_REASON(EVP_R_BN_PUBKEY_ERROR) , "bn pubkey error"},-
88 {ERR_REASON(EVP_R_BUFFER_TOO_SMALL) , "buffer too small"},-
89 {ERR_REASON(EVP_R_CAMELLIA_KEY_SETUP_FAILED), "camellia key setup failed"},-
90 {ERR_REASON(EVP_R_CIPHER_PARAMETER_ERROR), "cipher parameter error"},-
91 {ERR_REASON(EVP_R_COMMAND_NOT_SUPPORTED) , "command not supported"},-
92 {ERR_REASON(EVP_R_CTRL_NOT_IMPLEMENTED) , "ctrl not implemented"},-
93 {ERR_REASON(EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED), "ctrl operation not implemented"},-
94 {ERR_REASON(EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH), "data not multiple of block length"},-
95 {ERR_REASON(EVP_R_DECODE_ERROR) , "decode error"},-
96 {ERR_REASON(EVP_R_DIFFERENT_KEY_TYPES) , "different key types"},-
97 {ERR_REASON(EVP_R_DIFFERENT_PARAMETERS) , "different parameters"},-
98 {ERR_REASON(EVP_R_DISABLED_FOR_FIPS) , "disabled for fips"},-
99 {ERR_REASON(EVP_R_ENCODE_ERROR) , "encode error"},-
100 {ERR_REASON(EVP_R_ERROR_LOADING_SECTION) , "error loading section"},-
101 {ERR_REASON(EVP_R_ERROR_SETTING_FIPS_MODE), "error setting fips mode"},-
102 {ERR_REASON(EVP_R_EVP_PBE_CIPHERINIT_ERROR), "evp pbe cipherinit error"},-
103 {ERR_REASON(EVP_R_EXPECTING_AN_RSA_KEY) , "expecting an rsa key"},-
104 {ERR_REASON(EVP_R_EXPECTING_A_DH_KEY) , "expecting a dh key"},-
105 {ERR_REASON(EVP_R_EXPECTING_A_DSA_KEY) , "expecting a dsa key"},-
106 {ERR_REASON(EVP_R_EXPECTING_A_ECDSA_KEY) , "expecting a ecdsa key"},-
107 {ERR_REASON(EVP_R_EXPECTING_A_EC_KEY) , "expecting a ec key"},-
108 {ERR_REASON(EVP_R_FIPS_MODE_NOT_SUPPORTED), "fips mode not supported"},-
109 {ERR_REASON(EVP_R_INITIALIZATION_ERROR) , "initialization error"},-
110 {ERR_REASON(EVP_R_INPUT_NOT_INITIALIZED) , "input not initialized"},-
111 {ERR_REASON(EVP_R_INVALID_DIGEST) , "invalid digest"},-
112 {ERR_REASON(EVP_R_INVALID_FIPS_MODE) , "invalid fips mode"},-
113 {ERR_REASON(EVP_R_INVALID_KEY_LENGTH) , "invalid key length"},-
114 {ERR_REASON(EVP_R_INVALID_OPERATION) , "invalid operation"},-
115 {ERR_REASON(EVP_R_IV_TOO_LARGE) , "iv too large"},-
116 {ERR_REASON(EVP_R_KEYGEN_FAILURE) , "keygen failure"},-
117 {ERR_REASON(EVP_R_MESSAGE_DIGEST_IS_NULL), "message digest is null"},-
118 {ERR_REASON(EVP_R_METHOD_NOT_SUPPORTED) , "method not supported"},-
119 {ERR_REASON(EVP_R_MISSING_PARAMETERS) , "missing parameters"},-
120 {ERR_REASON(EVP_R_NO_CIPHER_SET) , "no cipher set"},-
121 {ERR_REASON(EVP_R_NO_DEFAULT_DIGEST) , "no default digest"},-
122 {ERR_REASON(EVP_R_NO_DIGEST_SET) , "no digest set"},-
123 {ERR_REASON(EVP_R_NO_DSA_PARAMETERS) , "no dsa parameters"},-
124 {ERR_REASON(EVP_R_NO_KEY_SET) , "no key set"},-
125 {ERR_REASON(EVP_R_NO_OPERATION_SET) , "no operation set"},-
126 {ERR_REASON(EVP_R_NO_SIGN_FUNCTION_CONFIGURED), "no sign function configured"},-
127 {ERR_REASON(EVP_R_NO_VERIFY_FUNCTION_CONFIGURED), "no verify function configured"},-
128 {ERR_REASON(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE), "operation not supported for this keytype"},-
129 {ERR_REASON(EVP_R_OPERATON_NOT_INITIALIZED), "operaton not initialized"},-
130 {ERR_REASON(EVP_R_OUTPUT_ALIASES_INPUT) , "output aliases input"},-
131 {ERR_REASON(EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE), "pkcs8 unknown broken type"},-
132 {ERR_REASON(EVP_R_PRIVATE_KEY_DECODE_ERROR), "private key decode error"},-
133 {ERR_REASON(EVP_R_PRIVATE_KEY_ENCODE_ERROR), "private key encode error"},-
134 {ERR_REASON(EVP_R_PUBLIC_KEY_NOT_RSA) , "public key not rsa"},-
135 {ERR_REASON(EVP_R_TAG_TOO_LARGE) , "tag too large"},-
136 {ERR_REASON(EVP_R_TOO_LARGE) , "too large"},-
137 {ERR_REASON(EVP_R_UNKNOWN_CIPHER) , "unknown cipher"},-
138 {ERR_REASON(EVP_R_UNKNOWN_DIGEST) , "unknown digest"},-
139 {ERR_REASON(EVP_R_UNKNOWN_OPTION) , "unknown option"},-
140 {ERR_REASON(EVP_R_UNKNOWN_PBE_ALGORITHM) , "unknown pbe algorithm"},-
141 {ERR_REASON(EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS), "unsuported number of rounds"},-
142 {ERR_REASON(EVP_R_UNSUPPORTED_ALGORITHM) , "unsupported algorithm"},-
143 {ERR_REASON(EVP_R_UNSUPPORTED_CIPHER) , "unsupported cipher"},-
144 {ERR_REASON(EVP_R_UNSUPPORTED_KEYLENGTH) , "unsupported keylength"},-
145 {ERR_REASON(EVP_R_UNSUPPORTED_KEY_DERIVATION_FUNCTION), "unsupported key derivation function"},-
146 {ERR_REASON(EVP_R_UNSUPPORTED_KEY_SIZE) , "unsupported key size"},-
147 {ERR_REASON(EVP_R_UNSUPPORTED_PRF) , "unsupported prf"},-
148 {ERR_REASON(EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM), "unsupported private key algorithm"},-
149 {ERR_REASON(EVP_R_UNSUPPORTED_SALT_TYPE) , "unsupported salt type"},-
150 {ERR_REASON(EVP_R_WRONG_FINAL_BLOCK_LENGTH), "wrong final block length"},-
151 {ERR_REASON(EVP_R_WRONG_PUBLIC_KEY_TYPE) , "wrong public key type"},-
152 {0, NULL}-
153};-
154-
155#endif-
156-
157void-
158ERR_load_EVP_strings(void)-
159{-
160#ifndef OPENSSL_NO_ERR-
161 if (ERR_func_error_string(EVP_str_functs[0].error) == NULL) {
ERR_func_error...== ((void *)0)Description
TRUEevaluated 290 times by 31 tests
Evaluated by:
  • asn1test
  • base64test
  • bnaddsub
  • bntest
  • cipher_list
  • cipherstest
  • clienttest
  • configtest
  • dhtest
  • dsatest
  • ecdhtest
  • ecdsatest
  • ectest
  • enginetest
  • evptest
  • exptest
  • gost2814789t
  • keypairtest
  • libcrypto.so.44.0.1
  • mont
  • pbkdf2
  • pkcs7test
  • rsa_test
  • servertest
  • ssl_versions
  • ...
FALSEnever evaluated
0-290
162 ERR_load_strings(0, EVP_str_functs);-
163 ERR_load_strings(0, EVP_str_reasons);-
164 }
executed 290 times by 31 tests: end of block
Executed by:
  • asn1test
  • base64test
  • bnaddsub
  • bntest
  • cipher_list
  • cipherstest
  • clienttest
  • configtest
  • dhtest
  • dsatest
  • ecdhtest
  • ecdsatest
  • ectest
  • enginetest
  • evptest
  • exptest
  • gost2814789t
  • keypairtest
  • libcrypto.so.44.0.1
  • mont
  • pbkdf2
  • pkcs7test
  • rsa_test
  • servertest
  • ssl_versions
  • ...
290
165#endif-
166}
executed 290 times by 31 tests: end of block
Executed by:
  • asn1test
  • base64test
  • bnaddsub
  • bntest
  • cipher_list
  • cipherstest
  • clienttest
  • configtest
  • dhtest
  • dsatest
  • ecdhtest
  • ecdsatest
  • ectest
  • enginetest
  • evptest
  • exptest
  • gost2814789t
  • keypairtest
  • libcrypto.so.44.0.1
  • mont
  • pbkdf2
  • pkcs7test
  • rsa_test
  • servertest
  • ssl_versions
  • ...
290
Source codeSwitch to Preprocessed file

Generated by Squish Coco 4.2.2