Line | Source | Count |
1 | | - |
2 | | - |
3 | | - |
4 | | - |
5 | | - |
6 | | - |
7 | | - |
8 | | - |
9 | | - |
10 | static ERR_STRING_DATA PKCS7_str_functs[]= { | - |
11 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)120)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "B64_READ_PKCS7"}, | - |
12 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)121)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "B64_WRITE_PKCS7"}, | - |
13 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)136)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "DO_PKCS7_SIGNED_ATTRIB"}, | - |
14 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)140)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "i2d_PKCS7_bio_stream"}, | - |
15 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)135)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_add0_attrib_signing_time"}, | - |
16 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)118)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_add_attrib_smimecap"}, | - |
17 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)100)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_add_certificate"}, | - |
18 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)101)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_add_crl"}, | - |
19 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)102)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_add_recipient_info"}, | - |
20 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)131)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_add_signature"}, | - |
21 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)103)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_add_signer"}, | - |
22 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)125)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_BIO_ADD_DIGEST"}, | - |
23 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)138)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_COPY_EXISTING_DIGEST"}, | - |
24 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)104)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_ctrl"}, | - |
25 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)112)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_dataDecode"}, | - |
26 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)128)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_dataFinal"}, | - |
27 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)105)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_dataInit"}, | - |
28 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)106)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_DATASIGN"}, | - |
29 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)107)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_dataVerify"}, | - |
30 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)114)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_decrypt"}, | - |
31 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)133)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_DECRYPT_RINFO"}, | - |
32 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)132)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_ENCODE_RINFO"}, | - |
33 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)115)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_encrypt"}, | - |
34 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)134)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_final"}, | - |
35 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)127)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_FIND_DIGEST"}, | - |
36 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)124)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_get0_signers"}, | - |
37 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)130)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_RECIP_INFO_set"}, | - |
38 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)108)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_set_cipher"}, | - |
39 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)109)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_set_content"}, | - |
40 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)126)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_set_digest"}, | - |
41 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)110)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_set_type"}, | - |
42 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)116)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_sign"}, | - |
43 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)113)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_signatureVerify"}, | - |
44 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)129)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_SIGNER_INFO_set"}, | - |
45 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)139)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_SIGNER_INFO_sign"}, | - |
46 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)137)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_sign_add_signer"}, | - |
47 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)119)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_simple_smimecap"}, | - |
48 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)117)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS7_verify"}, | - |
49 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)122)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "SMIME_read_PKCS7"}, | - |
50 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)123)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "SMIME_text"}, | - |
51 | {0, | - |
52 | ((void *)0) | - |
53 | } | - |
54 | }; | - |
55 | | - |
56 | static ERR_STRING_DATA PKCS7_str_reasons[]= { | - |
57 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)117)&0xfffL))), "certificate verify error"}, | - |
58 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)144)&0xfffL))), "cipher has no object identifier"}, | - |
59 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)116)&0xfffL))), "cipher not initialized"}, | - |
60 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)118)&0xfffL))), "content and data present"}, | - |
61 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)152)&0xfffL))) , "ctrl error"}, | - |
62 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)130)&0xfffL))) , "decode error"}, | - |
63 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)100)&0xfffL))), "decrypted key is wrong length"}, | - |
64 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)119)&0xfffL))) , "decrypt error"}, | - |
65 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)101)&0xfffL))) , "digest failure"}, | - |
66 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)149)&0xfffL))), "encryption ctrl failure"}, | - |
67 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)150)&0xfffL))), "encryption not supported for this key type"}, | - |
68 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)120)&0xfffL))), "error adding recipient"}, | - |
69 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)121)&0xfffL))), "error setting cipher"}, | - |
70 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)131)&0xfffL))) , "invalid mime type"}, | - |
71 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)143)&0xfffL))), "invalid null pointer"}, | - |
72 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)132)&0xfffL))), "mime no content type"}, | - |
73 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)133)&0xfffL))) , "mime parse error"}, | - |
74 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)134)&0xfffL))), "mime sig parse error"}, | - |
75 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)103)&0xfffL))), "missing ceripend info"}, | - |
76 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)122)&0xfffL))) , "no content"}, | - |
77 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)135)&0xfffL))) , "no content type"}, | - |
78 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)151)&0xfffL))) , "no default digest"}, | - |
79 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)154)&0xfffL))), "no matching digest type found"}, | - |
80 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)136)&0xfffL))), "no multipart body failure"}, | - |
81 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)137)&0xfffL))), "no multipart boundary"}, | - |
82 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)115)&0xfffL))), "no recipient matches certificate"}, | - |
83 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)146)&0xfffL))), "no recipient matches key"}, | - |
84 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)123)&0xfffL))), "no signatures on data"}, | - |
85 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)142)&0xfffL))) , "no signers"}, | - |
86 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)138)&0xfffL))) , "no sig content type"}, | - |
87 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)104)&0xfffL))), "operation not supported on this type"}, | - |
88 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)124)&0xfffL))), "pkcs7 add signature error"}, | - |
89 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)153)&0xfffL))), "pkcs7 add signer error"}, | - |
90 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)126)&0xfffL))) , "pkcs7 datafinal"}, | - |
91 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)125)&0xfffL))), "pkcs7 datafinal error"}, | - |
92 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)145)&0xfffL))) , "pkcs7 datasign"}, | - |
93 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)139)&0xfffL))) , "pkcs7 parse error"}, | - |
94 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)140)&0xfffL))), "pkcs7 sig parse error"}, | - |
95 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)127)&0xfffL))), "private key does not match certificate"}, | - |
96 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)105)&0xfffL))) , "signature failure"}, | - |
97 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)128)&0xfffL))), "signer certificate not found"}, | - |
98 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)147)&0xfffL))), "signing ctrl failure"}, | - |
99 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)148)&0xfffL))), "signing not supported for this key type"}, | - |
100 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)141)&0xfffL))), "sig invalid mime type"}, | - |
101 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)129)&0xfffL))) , "smime text error"}, | - |
102 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)106)&0xfffL))), "unable to find certificate"}, | - |
103 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)107)&0xfffL))), "unable to find mem bio"}, | - |
104 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)108)&0xfffL))), "unable to find message digest"}, | - |
105 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)109)&0xfffL))) , "unknown digest type"}, | - |
106 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)110)&0xfffL))) , "unknown operation"}, | - |
107 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)111)&0xfffL))), "unsupported cipher type"}, | - |
108 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)112)&0xfffL))), "unsupported content type"}, | - |
109 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)113)&0xfffL))) , "wrong content type"}, | - |
110 | {(((((unsigned long)33)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)114)&0xfffL))) , "wrong pkcs7 type"}, | - |
111 | {0, | - |
112 | ((void *)0) | - |
113 | } | - |
114 | }; | - |
115 | | - |
116 | | - |
117 | | - |
118 | void | - |
119 | ERR_load_PKCS7_strings(void) | - |
120 | { | - |
121 | | - |
122 | if (ERR_func_error_string(PKCS7_str_functs[0].error) == TRUE | evaluated 290 times by 31 testsEvaluated by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| FALSE | never evaluated |
| 0-290 |
123 | ((void *)0)TRUE | evaluated 290 times by 31 testsEvaluated by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| FALSE | never evaluated |
| 0-290 |
124 | ) { | - |
125 | ERR_load_strings(0, PKCS7_str_functs); | - |
126 | ERR_load_strings(0, PKCS7_str_reasons); | - |
127 | }executed 290 times by 31 tests: end of block Executed by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
128 | | - |
129 | }executed 290 times by 31 tests: end of block Executed by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
| | |