| Line | Source | Count |
| 1 | | - |
| 2 | | - |
| 3 | | - |
| 4 | | - |
| 5 | | - |
| 6 | | - |
| 7 | | - |
| 8 | | - |
| 9 | | - |
| 10 | | - |
| 11 | | - |
| 12 | | - |
| 13 | | - |
| 14 | | - |
| 15 | | - |
| 16 | | - |
| 17 | | - |
| 18 | | - |
| 19 | | - |
| 20 | | - |
| 21 | | - |
| 22 | | - |
| 23 | | - |
| 24 | | - |
| 25 | | - |
| 26 | | - |
| 27 | | - |
| 28 | | - |
| 29 | | - |
| 30 | | - |
| 31 | | - |
| 32 | | - |
| 33 | | - |
| 34 | | - |
| 35 | | - |
| 36 | | - |
| 37 | | - |
| 38 | | - |
| 39 | | - |
| 40 | | - |
| 41 | | - |
| 42 | | - |
| 43 | | - |
| 44 | | - |
| 45 | | - |
| 46 | | - |
| 47 | | - |
| 48 | | - |
| 49 | | - |
| 50 | | - |
| 51 | | - |
| 52 | | - |
| 53 | | - |
| 54 | | - |
| 55 | | - |
| 56 | | - |
| 57 | | - |
| 58 | | - |
| 59 | | - |
| 60 | | - |
| 61 | #include <stdio.h> | - |
| 62 | | - |
| 63 | #include <openssl/opensslconf.h> | - |
| 64 | | - |
| 65 | #include <openssl/err.h> | - |
| 66 | #include <openssl/rsa.h> | - |
| 67 | | - |
| 68 | | - |
| 69 | #ifndef OPENSSL_NO_ERR | - |
| 70 | | - |
| 71 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_RSA,func,0) | - |
| 72 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_RSA,0,reason) | - |
| 73 | | - |
| 74 | static ERR_STRING_DATA RSA_str_functs[] = { | - |
| 75 | {ERR_FUNC(0xfff), "CRYPTO_internal"}, | - |
| 76 | {0, NULL} | - |
| 77 | }; | - |
| 78 | | - |
| 79 | static ERR_STRING_DATA RSA_str_reasons[] = { | - |
| 80 | {ERR_REASON(RSA_R_ALGORITHM_MISMATCH) , "algorithm mismatch"}, | - |
| 81 | {ERR_REASON(RSA_R_BAD_E_VALUE) , "bad e value"}, | - |
| 82 | {ERR_REASON(RSA_R_BAD_FIXED_HEADER_DECRYPT), "bad fixed header decrypt"}, | - |
| 83 | {ERR_REASON(RSA_R_BAD_PAD_BYTE_COUNT) , "bad pad byte count"}, | - |
| 84 | {ERR_REASON(RSA_R_BAD_SIGNATURE) , "bad signature"}, | - |
| 85 | {ERR_REASON(RSA_R_BLOCK_TYPE_IS_NOT_01) , "block type is not 01"}, | - |
| 86 | {ERR_REASON(RSA_R_BLOCK_TYPE_IS_NOT_02) , "block type is not 02"}, | - |
| 87 | {ERR_REASON(RSA_R_DATA_GREATER_THAN_MOD_LEN), "data greater than mod len"}, | - |
| 88 | {ERR_REASON(RSA_R_DATA_TOO_LARGE) , "data too large"}, | - |
| 89 | {ERR_REASON(RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE), "data too large for key size"}, | - |
| 90 | {ERR_REASON(RSA_R_DATA_TOO_LARGE_FOR_MODULUS), "data too large for modulus"}, | - |
| 91 | {ERR_REASON(RSA_R_DATA_TOO_SMALL) , "data too small"}, | - |
| 92 | {ERR_REASON(RSA_R_DATA_TOO_SMALL_FOR_KEY_SIZE), "data too small for key size"}, | - |
| 93 | {ERR_REASON(RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY), "digest too big for rsa key"}, | - |
| 94 | {ERR_REASON(RSA_R_DMP1_NOT_CONGRUENT_TO_D), "dmp1 not congruent to d"}, | - |
| 95 | {ERR_REASON(RSA_R_DMQ1_NOT_CONGRUENT_TO_D), "dmq1 not congruent to d"}, | - |
| 96 | {ERR_REASON(RSA_R_D_E_NOT_CONGRUENT_TO_1), "d e not congruent to 1"}, | - |
| 97 | {ERR_REASON(RSA_R_FIRST_OCTET_INVALID) , "first octet invalid"}, | - |
| 98 | {ERR_REASON(RSA_R_ILLEGAL_OR_UNSUPPORTED_PADDING_MODE), "illegal or unsupported padding mode"}, | - |
| 99 | {ERR_REASON(RSA_R_INVALID_DIGEST_LENGTH) , "invalid digest length"}, | - |
| 100 | {ERR_REASON(RSA_R_INVALID_HEADER) , "invalid header"}, | - |
| 101 | {ERR_REASON(RSA_R_INVALID_KEYBITS) , "invalid keybits"}, | - |
| 102 | {ERR_REASON(RSA_R_INVALID_MESSAGE_LENGTH), "invalid message length"}, | - |
| 103 | {ERR_REASON(RSA_R_INVALID_MGF1_MD) , "invalid mgf1 md"}, | - |
| 104 | {ERR_REASON(RSA_R_INVALID_PADDING) , "invalid padding"}, | - |
| 105 | {ERR_REASON(RSA_R_INVALID_PADDING_MODE) , "invalid padding mode"}, | - |
| 106 | {ERR_REASON(RSA_R_INVALID_PSS_PARAMETERS), "invalid pss parameters"}, | - |
| 107 | {ERR_REASON(RSA_R_INVALID_PSS_SALTLEN) , "invalid pss saltlen"}, | - |
| 108 | {ERR_REASON(RSA_R_INVALID_SALT_LENGTH) , "invalid salt length"}, | - |
| 109 | {ERR_REASON(RSA_R_INVALID_TRAILER) , "invalid trailer"}, | - |
| 110 | {ERR_REASON(RSA_R_INVALID_X931_DIGEST) , "invalid x931 digest"}, | - |
| 111 | {ERR_REASON(RSA_R_IQMP_NOT_INVERSE_OF_Q) , "iqmp not inverse of q"}, | - |
| 112 | {ERR_REASON(RSA_R_KEY_SIZE_TOO_SMALL) , "key size too small"}, | - |
| 113 | {ERR_REASON(RSA_R_LAST_OCTET_INVALID) , "last octet invalid"}, | - |
| 114 | {ERR_REASON(RSA_R_MODULUS_TOO_LARGE) , "modulus too large"}, | - |
| 115 | {ERR_REASON(RSA_R_NON_FIPS_RSA_METHOD) , "non fips rsa method"}, | - |
| 116 | {ERR_REASON(RSA_R_NO_PUBLIC_EXPONENT) , "no public exponent"}, | - |
| 117 | {ERR_REASON(RSA_R_NULL_BEFORE_BLOCK_MISSING), "null before block missing"}, | - |
| 118 | {ERR_REASON(RSA_R_N_DOES_NOT_EQUAL_P_Q) , "n does not equal p q"}, | - |
| 119 | {ERR_REASON(RSA_R_OAEP_DECODING_ERROR) , "oaep decoding error"}, | - |
| 120 | {ERR_REASON(RSA_R_OPERATION_NOT_ALLOWED_IN_FIPS_MODE), "operation not allowed in fips mode"}, | - |
| 121 | {ERR_REASON(RSA_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE), "operation not supported for this keytype"}, | - |
| 122 | {ERR_REASON(RSA_R_PADDING_CHECK_FAILED) , "padding check failed"}, | - |
| 123 | {ERR_REASON(RSA_R_P_NOT_PRIME) , "p not prime"}, | - |
| 124 | {ERR_REASON(RSA_R_Q_NOT_PRIME) , "q not prime"}, | - |
| 125 | {ERR_REASON(RSA_R_RSA_OPERATIONS_NOT_SUPPORTED), "rsa operations not supported"}, | - |
| 126 | {ERR_REASON(RSA_R_SLEN_CHECK_FAILED) , "salt length check failed"}, | - |
| 127 | {ERR_REASON(RSA_R_SLEN_RECOVERY_FAILED) , "salt length recovery failed"}, | - |
| 128 | {ERR_REASON(RSA_R_SSLV3_ROLLBACK_ATTACK) , "sslv3 rollback attack"}, | - |
| 129 | {ERR_REASON(RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD), "the asn1 object identifier is not known for this md"}, | - |
| 130 | {ERR_REASON(RSA_R_UNKNOWN_ALGORITHM_TYPE), "unknown algorithm type"}, | - |
| 131 | {ERR_REASON(RSA_R_UNKNOWN_MASK_DIGEST) , "unknown mask digest"}, | - |
| 132 | {ERR_REASON(RSA_R_UNKNOWN_PADDING_TYPE) , "unknown padding type"}, | - |
| 133 | {ERR_REASON(RSA_R_UNKNOWN_PSS_DIGEST) , "unknown pss digest"}, | - |
| 134 | {ERR_REASON(RSA_R_UNSUPPORTED_MASK_ALGORITHM), "unsupported mask algorithm"}, | - |
| 135 | {ERR_REASON(RSA_R_UNSUPPORTED_MASK_PARAMETER), "unsupported mask parameter"}, | - |
| 136 | {ERR_REASON(RSA_R_UNSUPPORTED_SIGNATURE_TYPE), "unsupported signature type"}, | - |
| 137 | {ERR_REASON(RSA_R_VALUE_MISSING) , "value missing"}, | - |
| 138 | {ERR_REASON(RSA_R_WRONG_SIGNATURE_LENGTH), "wrong signature length"}, | - |
| 139 | {0, NULL} | - |
| 140 | }; | - |
| 141 | | - |
| 142 | #endif | - |
| 143 | | - |
| 144 | void | - |
| 145 | ERR_load_RSA_strings(void) | - |
| 146 | { | - |
| 147 | #ifndef OPENSSL_NO_ERR | - |
| 148 | if (ERR_func_error_string(RSA_str_functs[0].error) == NULL) {| TRUE | evaluated 290 times by 31 testsEvaluated by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| | FALSE | never evaluated |
| 0-290 |
| 149 | ERR_load_strings(0, RSA_str_functs); | - |
| 150 | ERR_load_strings(0, RSA_str_reasons); | - |
| 151 | }executed 290 times by 31 tests: end of blockExecuted by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
| 152 | #endif | - |
| 153 | }executed 290 times by 31 tests: end of blockExecuted by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
| | |