OpenCoverage

evp_err.c

Absolute File Name:/home/opencoverage/opencoverage/guest-scripts/libressl/src/crypto/evp/evp_err.c
Switch to Source codePreprocessed file
LineSourceCount
1-
2-
3-
4-
5-
6-
7-
8-
9-
10static ERR_STRING_DATA EVP_str_functs[] = {-
11 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0xfff)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "CRYPTO_internal"},-
12 {0, -
13 ((void *)0)-
14 }-
15};-
16-
17static ERR_STRING_DATA EVP_str_reasons[] = {-
18 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)162)&0xfffL))) , "aes iv setup failed"},-
19 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)143)&0xfffL))) , "aes key setup failed"},-
20 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)140)&0xfffL))) , "asn1 lib"},-
21 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)136)&0xfffL))) , "bad block length"},-
22 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)100)&0xfffL))) , "bad decrypt"},-
23 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)137)&0xfffL))) , "bad key length"},-
24 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)112)&0xfffL))) , "bn decode error"},-
25 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)113)&0xfffL))) , "bn pubkey error"},-
26 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)155)&0xfffL))) , "buffer too small"},-
27 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)157)&0xfffL))), "camellia key setup failed"},-
28 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)122)&0xfffL))), "cipher parameter error"},-
29 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)147)&0xfffL))) , "command not supported"},-
30 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)132)&0xfffL))) , "ctrl not implemented"},-
31 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)133)&0xfffL))), "ctrl operation not implemented"},-
32 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)138)&0xfffL))), "data not multiple of block length"},-
33 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)114)&0xfffL))) , "decode error"},-
34 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)101)&0xfffL))) , "different key types"},-
35 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)153)&0xfffL))) , "different parameters"},-
36 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)163)&0xfffL))) , "disabled for fips"},-
37 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)115)&0xfffL))) , "encode error"},-
38 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)165)&0xfffL))) , "error loading section"},-
39 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)166)&0xfffL))), "error setting fips mode"},-
40 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)119)&0xfffL))), "evp pbe cipherinit error"},-
41 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)127)&0xfffL))) , "expecting an rsa key"},-
42 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)128)&0xfffL))) , "expecting a dh key"},-
43 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)129)&0xfffL))) , "expecting a dsa key"},-
44 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)141)&0xfffL))) , "expecting a ecdsa key"},-
45 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)142)&0xfffL))) , "expecting a ec key"},-
46 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)167)&0xfffL))), "fips mode not supported"},-
47 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)134)&0xfffL))) , "initialization error"},-
48 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)111)&0xfffL))) , "input not initialized"},-
49 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)152)&0xfffL))) , "invalid digest"},-
50 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)168)&0xfffL))) , "invalid fips mode"},-
51 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)130)&0xfffL))) , "invalid key length"},-
52 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)148)&0xfffL))) , "invalid operation"},-
53 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)102)&0xfffL))) , "iv too large"},-
54 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)120)&0xfffL))) , "keygen failure"},-
55 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)159)&0xfffL))), "message digest is null"},-
56 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)144)&0xfffL))) , "method not supported"},-
57 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)103)&0xfffL))) , "missing parameters"},-
58 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)131)&0xfffL))) , "no cipher set"},-
59 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)158)&0xfffL))) , "no default digest"},-
60 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)139)&0xfffL))) , "no digest set"},-
61 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)116)&0xfffL))) , "no dsa parameters"},-
62 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)154)&0xfffL))) , "no key set"},-
63 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)149)&0xfffL))) , "no operation set"},-
64 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)104)&0xfffL))), "no sign function configured"},-
65 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)105)&0xfffL))), "no verify function configured"},-
66 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)150)&0xfffL))), "operation not supported for this keytype"},-
67 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)151)&0xfffL))), "operaton not initialized"},-
68 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)172)&0xfffL))) , "output aliases input"},-
69 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)117)&0xfffL))), "pkcs8 unknown broken type"},-
70 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)145)&0xfffL))), "private key decode error"},-
71 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)146)&0xfffL))), "private key encode error"},-
72 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)106)&0xfffL))) , "public key not rsa"},-
73 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)171)&0xfffL))) , "tag too large"},-
74 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)164)&0xfffL))) , "too large"},-
75 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)160)&0xfffL))) , "unknown cipher"},-
76 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)161)&0xfffL))) , "unknown digest"},-
77 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)169)&0xfffL))) , "unknown option"},-
78 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)121)&0xfffL))) , "unknown pbe algorithm"},-
79 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)135)&0xfffL))), "unsuported number of rounds"},-
80 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)156)&0xfffL))) , "unsupported algorithm"},-
81 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)107)&0xfffL))) , "unsupported cipher"},-
82 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)123)&0xfffL))) , "unsupported keylength"},-
83 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)124)&0xfffL))), "unsupported key derivation function"},-
84 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)108)&0xfffL))) , "unsupported key size"},-
85 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)125)&0xfffL))) , "unsupported prf"},-
86 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)118)&0xfffL))), "unsupported private key algorithm"},-
87 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)126)&0xfffL))) , "unsupported salt type"},-
88 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)109)&0xfffL))), "wrong final block length"},-
89 {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)110)&0xfffL))) , "wrong public key type"},-
90 {0, -
91 ((void *)0)-
92 }-
93};-
94-
95-
96-
97void-
98ERR_load_EVP_strings(void)-
99{-
100-
101 if (ERR_func_error_string(EVP_str_functs[0].error) ==
ERR_func_error...== ((void *)0)Description
TRUEevaluated 290 times by 31 tests
Evaluated by:
  • asn1test
  • base64test
  • bnaddsub
  • bntest
  • cipher_list
  • cipherstest
  • clienttest
  • configtest
  • dhtest
  • dsatest
  • ecdhtest
  • ecdsatest
  • ectest
  • enginetest
  • evptest
  • exptest
  • gost2814789t
  • keypairtest
  • libcrypto.so.44.0.1
  • mont
  • pbkdf2
  • pkcs7test
  • rsa_test
  • servertest
  • ssl_versions
  • ...
FALSEnever evaluated
0-290
102 ((void *)0)
ERR_func_error...== ((void *)0)Description
TRUEevaluated 290 times by 31 tests
Evaluated by:
  • asn1test
  • base64test
  • bnaddsub
  • bntest
  • cipher_list
  • cipherstest
  • clienttest
  • configtest
  • dhtest
  • dsatest
  • ecdhtest
  • ecdsatest
  • ectest
  • enginetest
  • evptest
  • exptest
  • gost2814789t
  • keypairtest
  • libcrypto.so.44.0.1
  • mont
  • pbkdf2
  • pkcs7test
  • rsa_test
  • servertest
  • ssl_versions
  • ...
FALSEnever evaluated
0-290
103 ) {-
104 ERR_load_strings(0, EVP_str_functs);-
105 ERR_load_strings(0, EVP_str_reasons);-
106 }
executed 290 times by 31 tests: end of block
Executed by:
  • asn1test
  • base64test
  • bnaddsub
  • bntest
  • cipher_list
  • cipherstest
  • clienttest
  • configtest
  • dhtest
  • dsatest
  • ecdhtest
  • ecdsatest
  • ectest
  • enginetest
  • evptest
  • exptest
  • gost2814789t
  • keypairtest
  • libcrypto.so.44.0.1
  • mont
  • pbkdf2
  • pkcs7test
  • rsa_test
  • servertest
  • ssl_versions
  • ...
290
107-
108}
executed 290 times by 31 tests: end of block
Executed by:
  • asn1test
  • base64test
  • bnaddsub
  • bntest
  • cipher_list
  • cipherstest
  • clienttest
  • configtest
  • dhtest
  • dsatest
  • ecdhtest
  • ecdsatest
  • ectest
  • enginetest
  • evptest
  • exptest
  • gost2814789t
  • keypairtest
  • libcrypto.so.44.0.1
  • mont
  • pbkdf2
  • pkcs7test
  • rsa_test
  • servertest
  • ssl_versions
  • ...
290
Switch to Source codePreprocessed file

Generated by Squish Coco 4.2.2