| Line | Source | Count |
| 1 | | - |
| 2 | | - |
| 3 | | - |
| 4 | | - |
| 5 | | - |
| 6 | | - |
| 7 | | - |
| 8 | | - |
| 9 | | - |
| 10 | static ERR_STRING_DATA TS_str_functs[] = { | - |
| 11 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0xfff)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "CRYPTO_internal"}, | - |
| 12 | {0, | - |
| 13 | ((void *)0) | - |
| 14 | } | - |
| 15 | }; | - |
| 16 | | - |
| 17 | static ERR_STRING_DATA TS_str_reasons[]= { | - |
| 18 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)132)&0xfffL))) , "bad pkcs7 type"}, | - |
| 19 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)133)&0xfffL))) , "bad type"}, | - |
| 20 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)100)&0xfffL))), "certificate verify error"}, | - |
| 21 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)127)&0xfffL))) , "could not set engine"}, | - |
| 22 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)115)&0xfffL))) , "could not set time"}, | - |
| 23 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)128)&0xfffL))) , "d2i ts resp int failed"}, | - |
| 24 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)134)&0xfffL))) , "detached content"}, | - |
| 25 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)116)&0xfffL))), "ess add signing cert error"}, | - |
| 26 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)101)&0xfffL))), "ess signing certificate error"}, | - |
| 27 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)102)&0xfffL))) , "invalid null pointer"}, | - |
| 28 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)117)&0xfffL))), "invalid signer certificate purpose"}, | - |
| 29 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)103)&0xfffL))), "message imprint mismatch"}, | - |
| 30 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)104)&0xfffL))) , "nonce mismatch"}, | - |
| 31 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)105)&0xfffL))) , "nonce not returned"}, | - |
| 32 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)106)&0xfffL))) , "no content"}, | - |
| 33 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)107)&0xfffL))) , "no time stamp token"}, | - |
| 34 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)118)&0xfffL))), "pkcs7 add signature error"}, | - |
| 35 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)119)&0xfffL))), "pkcs7 add signed attr error"}, | - |
| 36 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)129)&0xfffL))), "pkcs7 to ts tst info failed"}, | - |
| 37 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)108)&0xfffL))) , "policy mismatch"}, | - |
| 38 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)120)&0xfffL))), "private key does not match certificate"}, | - |
| 39 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)121)&0xfffL))) , "response setup error"}, | - |
| 40 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)109)&0xfffL))) , "signature failure"}, | - |
| 41 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)110)&0xfffL))), "there must be one signer"}, | - |
| 42 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)122)&0xfffL))) , "time syscall error"}, | - |
| 43 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)130)&0xfffL))) , "token not present"}, | - |
| 44 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)131)&0xfffL))) , "token present"}, | - |
| 45 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)111)&0xfffL))) , "tsa name mismatch"}, | - |
| 46 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)112)&0xfffL))) , "tsa untrusted"}, | - |
| 47 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)123)&0xfffL))) , "tst info setup error"}, | - |
| 48 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)124)&0xfffL))) , "ts datasign"}, | - |
| 49 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)125)&0xfffL))) , "unacceptable policy"}, | - |
| 50 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)126)&0xfffL))), "unsupported md algorithm"}, | - |
| 51 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)113)&0xfffL))) , "unsupported version"}, | - |
| 52 | {(((((unsigned long)47)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)114)&0xfffL))) , "wrong content type"}, | - |
| 53 | {0, | - |
| 54 | ((void *)0) | - |
| 55 | } | - |
| 56 | }; | - |
| 57 | | - |
| 58 | | - |
| 59 | | - |
| 60 | void | - |
| 61 | ERR_load_TS_strings(void) | - |
| 62 | { | - |
| 63 | | - |
| 64 | if (ERR_func_error_string(TS_str_functs[0].error) == | TRUE | evaluated 290 times by 31 testsEvaluated by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| | FALSE | never evaluated |
| 0-290 |
| 65 | ((void *)0)| TRUE | evaluated 290 times by 31 testsEvaluated by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| | FALSE | never evaluated |
| 0-290 |
| 66 | ) { | - |
| 67 | ERR_load_strings(0, TS_str_functs); | - |
| 68 | ERR_load_strings(0, TS_str_reasons); | - |
| 69 | }executed 290 times by 31 tests: end of blockExecuted by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
| 70 | | - |
| 71 | }executed 290 times by 31 tests: end of blockExecuted by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
| | |