Line | Source | Count |
1 | | - |
2 | | - |
3 | | - |
4 | | - |
5 | | - |
6 | | - |
7 | | - |
8 | | - |
9 | | - |
10 | | - |
11 | | - |
12 | | - |
13 | | - |
14 | | - |
15 | | - |
16 | | - |
17 | | - |
18 | | - |
19 | | - |
20 | | - |
21 | | - |
22 | | - |
23 | | - |
24 | | - |
25 | | - |
26 | | - |
27 | | - |
28 | | - |
29 | | - |
30 | | - |
31 | | - |
32 | | - |
33 | | - |
34 | | - |
35 | | - |
36 | | - |
37 | | - |
38 | | - |
39 | | - |
40 | | - |
41 | | - |
42 | | - |
43 | | - |
44 | | - |
45 | | - |
46 | | - |
47 | | - |
48 | | - |
49 | | - |
50 | | - |
51 | | - |
52 | | - |
53 | | - |
54 | | - |
55 | | - |
56 | | - |
57 | | - |
58 | | - |
59 | | - |
60 | | - |
61 | #include <stdio.h> | - |
62 | | - |
63 | #include <openssl/opensslconf.h> | - |
64 | | - |
65 | #include <openssl/err.h> | - |
66 | #include <openssl/rsa.h> | - |
67 | | - |
68 | | - |
69 | #ifndef OPENSSL_NO_ERR | - |
70 | | - |
71 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_RSA,func,0) | - |
72 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_RSA,0,reason) | - |
73 | | - |
74 | static ERR_STRING_DATA RSA_str_functs[] = { | - |
75 | {ERR_FUNC(0xfff), "CRYPTO_internal"}, | - |
76 | {0, NULL} | - |
77 | }; | - |
78 | | - |
79 | static ERR_STRING_DATA RSA_str_reasons[] = { | - |
80 | {ERR_REASON(RSA_R_ALGORITHM_MISMATCH) , "algorithm mismatch"}, | - |
81 | {ERR_REASON(RSA_R_BAD_E_VALUE) , "bad e value"}, | - |
82 | {ERR_REASON(RSA_R_BAD_FIXED_HEADER_DECRYPT), "bad fixed header decrypt"}, | - |
83 | {ERR_REASON(RSA_R_BAD_PAD_BYTE_COUNT) , "bad pad byte count"}, | - |
84 | {ERR_REASON(RSA_R_BAD_SIGNATURE) , "bad signature"}, | - |
85 | {ERR_REASON(RSA_R_BLOCK_TYPE_IS_NOT_01) , "block type is not 01"}, | - |
86 | {ERR_REASON(RSA_R_BLOCK_TYPE_IS_NOT_02) , "block type is not 02"}, | - |
87 | {ERR_REASON(RSA_R_DATA_GREATER_THAN_MOD_LEN), "data greater than mod len"}, | - |
88 | {ERR_REASON(RSA_R_DATA_TOO_LARGE) , "data too large"}, | - |
89 | {ERR_REASON(RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE), "data too large for key size"}, | - |
90 | {ERR_REASON(RSA_R_DATA_TOO_LARGE_FOR_MODULUS), "data too large for modulus"}, | - |
91 | {ERR_REASON(RSA_R_DATA_TOO_SMALL) , "data too small"}, | - |
92 | {ERR_REASON(RSA_R_DATA_TOO_SMALL_FOR_KEY_SIZE), "data too small for key size"}, | - |
93 | {ERR_REASON(RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY), "digest too big for rsa key"}, | - |
94 | {ERR_REASON(RSA_R_DMP1_NOT_CONGRUENT_TO_D), "dmp1 not congruent to d"}, | - |
95 | {ERR_REASON(RSA_R_DMQ1_NOT_CONGRUENT_TO_D), "dmq1 not congruent to d"}, | - |
96 | {ERR_REASON(RSA_R_D_E_NOT_CONGRUENT_TO_1), "d e not congruent to 1"}, | - |
97 | {ERR_REASON(RSA_R_FIRST_OCTET_INVALID) , "first octet invalid"}, | - |
98 | {ERR_REASON(RSA_R_ILLEGAL_OR_UNSUPPORTED_PADDING_MODE), "illegal or unsupported padding mode"}, | - |
99 | {ERR_REASON(RSA_R_INVALID_DIGEST_LENGTH) , "invalid digest length"}, | - |
100 | {ERR_REASON(RSA_R_INVALID_HEADER) , "invalid header"}, | - |
101 | {ERR_REASON(RSA_R_INVALID_KEYBITS) , "invalid keybits"}, | - |
102 | {ERR_REASON(RSA_R_INVALID_MESSAGE_LENGTH), "invalid message length"}, | - |
103 | {ERR_REASON(RSA_R_INVALID_MGF1_MD) , "invalid mgf1 md"}, | - |
104 | {ERR_REASON(RSA_R_INVALID_PADDING) , "invalid padding"}, | - |
105 | {ERR_REASON(RSA_R_INVALID_PADDING_MODE) , "invalid padding mode"}, | - |
106 | {ERR_REASON(RSA_R_INVALID_PSS_PARAMETERS), "invalid pss parameters"}, | - |
107 | {ERR_REASON(RSA_R_INVALID_PSS_SALTLEN) , "invalid pss saltlen"}, | - |
108 | {ERR_REASON(RSA_R_INVALID_SALT_LENGTH) , "invalid salt length"}, | - |
109 | {ERR_REASON(RSA_R_INVALID_TRAILER) , "invalid trailer"}, | - |
110 | {ERR_REASON(RSA_R_INVALID_X931_DIGEST) , "invalid x931 digest"}, | - |
111 | {ERR_REASON(RSA_R_IQMP_NOT_INVERSE_OF_Q) , "iqmp not inverse of q"}, | - |
112 | {ERR_REASON(RSA_R_KEY_SIZE_TOO_SMALL) , "key size too small"}, | - |
113 | {ERR_REASON(RSA_R_LAST_OCTET_INVALID) , "last octet invalid"}, | - |
114 | {ERR_REASON(RSA_R_MODULUS_TOO_LARGE) , "modulus too large"}, | - |
115 | {ERR_REASON(RSA_R_NON_FIPS_RSA_METHOD) , "non fips rsa method"}, | - |
116 | {ERR_REASON(RSA_R_NO_PUBLIC_EXPONENT) , "no public exponent"}, | - |
117 | {ERR_REASON(RSA_R_NULL_BEFORE_BLOCK_MISSING), "null before block missing"}, | - |
118 | {ERR_REASON(RSA_R_N_DOES_NOT_EQUAL_P_Q) , "n does not equal p q"}, | - |
119 | {ERR_REASON(RSA_R_OAEP_DECODING_ERROR) , "oaep decoding error"}, | - |
120 | {ERR_REASON(RSA_R_OPERATION_NOT_ALLOWED_IN_FIPS_MODE), "operation not allowed in fips mode"}, | - |
121 | {ERR_REASON(RSA_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE), "operation not supported for this keytype"}, | - |
122 | {ERR_REASON(RSA_R_PADDING_CHECK_FAILED) , "padding check failed"}, | - |
123 | {ERR_REASON(RSA_R_P_NOT_PRIME) , "p not prime"}, | - |
124 | {ERR_REASON(RSA_R_Q_NOT_PRIME) , "q not prime"}, | - |
125 | {ERR_REASON(RSA_R_RSA_OPERATIONS_NOT_SUPPORTED), "rsa operations not supported"}, | - |
126 | {ERR_REASON(RSA_R_SLEN_CHECK_FAILED) , "salt length check failed"}, | - |
127 | {ERR_REASON(RSA_R_SLEN_RECOVERY_FAILED) , "salt length recovery failed"}, | - |
128 | {ERR_REASON(RSA_R_SSLV3_ROLLBACK_ATTACK) , "sslv3 rollback attack"}, | - |
129 | {ERR_REASON(RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD), "the asn1 object identifier is not known for this md"}, | - |
130 | {ERR_REASON(RSA_R_UNKNOWN_ALGORITHM_TYPE), "unknown algorithm type"}, | - |
131 | {ERR_REASON(RSA_R_UNKNOWN_MASK_DIGEST) , "unknown mask digest"}, | - |
132 | {ERR_REASON(RSA_R_UNKNOWN_PADDING_TYPE) , "unknown padding type"}, | - |
133 | {ERR_REASON(RSA_R_UNKNOWN_PSS_DIGEST) , "unknown pss digest"}, | - |
134 | {ERR_REASON(RSA_R_UNSUPPORTED_MASK_ALGORITHM), "unsupported mask algorithm"}, | - |
135 | {ERR_REASON(RSA_R_UNSUPPORTED_MASK_PARAMETER), "unsupported mask parameter"}, | - |
136 | {ERR_REASON(RSA_R_UNSUPPORTED_SIGNATURE_TYPE), "unsupported signature type"}, | - |
137 | {ERR_REASON(RSA_R_VALUE_MISSING) , "value missing"}, | - |
138 | {ERR_REASON(RSA_R_WRONG_SIGNATURE_LENGTH), "wrong signature length"}, | - |
139 | {0, NULL} | - |
140 | }; | - |
141 | | - |
142 | #endif | - |
143 | | - |
144 | void | - |
145 | ERR_load_RSA_strings(void) | - |
146 | { | - |
147 | #ifndef OPENSSL_NO_ERR | - |
148 | if (ERR_func_error_string(RSA_str_functs[0].error) == NULL) {TRUE | evaluated 290 times by 31 testsEvaluated by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| FALSE | never evaluated |
| 0-290 |
149 | ERR_load_strings(0, RSA_str_functs); | - |
150 | ERR_load_strings(0, RSA_str_reasons); | - |
151 | }executed 290 times by 31 tests: end of block Executed by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
152 | #endif | - |
153 | }executed 290 times by 31 tests: end of block Executed by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
| | |