Line | Source | Count |
1 | | - |
2 | | - |
3 | | - |
4 | | - |
5 | | - |
6 | | - |
7 | | - |
8 | | - |
9 | | - |
10 | static ERR_STRING_DATA PKCS12_str_functs[]= { | - |
11 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)129)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PARSE_BAG"}, | - |
12 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)103)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PARSE_BAGS"}, | - |
13 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)100)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_ADD_FRIENDLYNAME"}, | - |
14 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)127)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_add_friendlyname_asc"}, | - |
15 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)102)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_add_friendlyname_uni"}, | - |
16 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)104)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_add_localkeyid"}, | - |
17 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)105)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_create"}, | - |
18 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)107)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_gen_mac"}, | - |
19 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)109)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_init"}, | - |
20 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)106)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_item_decrypt_d2i"}, | - |
21 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)108)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_item_i2d_encrypt"}, | - |
22 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)117)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_item_pack_safebag"}, | - |
23 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)110)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_key_gen_asc"}, | - |
24 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)111)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_key_gen_uni"}, | - |
25 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)112)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_MAKE_KEYBAG"}, | - |
26 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)113)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_MAKE_SHKEYBAG"}, | - |
27 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)128)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_newpass"}, | - |
28 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)114)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_pack_p7data"}, | - |
29 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)115)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_pack_p7encdata"}, | - |
30 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)118)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_parse"}, | - |
31 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)119)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_pbe_crypt"}, | - |
32 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)120)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_PBE_keyivgen"}, | - |
33 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)122)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_setup_mac"}, | - |
34 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)123)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_set_mac"}, | - |
35 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)130)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_unpack_authsafes"}, | - |
36 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)131)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_unpack_p7data"}, | - |
37 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)126)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS12_verify_mac"}, | - |
38 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)124)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS8_add_keyusage"}, | - |
39 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)125)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "PKCS8_encrypt"}, | - |
40 | {0, | - |
41 | ((void *)0) | - |
42 | } | - |
43 | }; | - |
44 | | - |
45 | static ERR_STRING_DATA PKCS12_str_reasons[]= { | - |
46 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)100)&0xfffL))), "cant pack structure"}, | - |
47 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)121)&0xfffL))), "content type not data"}, | - |
48 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)101)&0xfffL))) , "decode error"}, | - |
49 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)102)&0xfffL))) , "encode error"}, | - |
50 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)103)&0xfffL))) , "encrypt error"}, | - |
51 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)120)&0xfffL))), "error setting encrypted data type"}, | - |
52 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)104)&0xfffL))), "invalid null argument"}, | - |
53 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)105)&0xfffL))), "invalid null pkcs12 pointer"}, | - |
54 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)106)&0xfffL))) , "iv gen error"}, | - |
55 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)107)&0xfffL))) , "key gen error"}, | - |
56 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)108)&0xfffL))) , "mac absent"}, | - |
57 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)109)&0xfffL))), "mac generation error"}, | - |
58 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)110)&0xfffL))) , "mac setup error"}, | - |
59 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)111)&0xfffL))), "mac string set error"}, | - |
60 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)112)&0xfffL))) , "mac verify error"}, | - |
61 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)113)&0xfffL))) , "mac verify failure"}, | - |
62 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)114)&0xfffL))) , "parse error"}, | - |
63 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)115)&0xfffL))), "pkcs12 algor cipherinit error"}, | - |
64 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)116)&0xfffL))), "pkcs12 cipherfinal error"}, | - |
65 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)117)&0xfffL))), "pkcs12 pbe crypt error"}, | - |
66 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)118)&0xfffL))), "unknown digest algorithm"}, | - |
67 | {(((((unsigned long)35)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)119)&0xfffL))), "unsupported pkcs12 mode"}, | - |
68 | {0, | - |
69 | ((void *)0) | - |
70 | } | - |
71 | }; | - |
72 | | - |
73 | | - |
74 | | - |
75 | void | - |
76 | ERR_load_PKCS12_strings(void) | - |
77 | { | - |
78 | | - |
79 | if (ERR_func_error_string(PKCS12_str_functs[0].error) == TRUE | evaluated 290 times by 31 testsEvaluated by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| FALSE | never evaluated |
| 0-290 |
80 | ((void *)0)TRUE | evaluated 290 times by 31 testsEvaluated by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| FALSE | never evaluated |
| 0-290 |
81 | ) { | - |
82 | ERR_load_strings(0, PKCS12_str_functs); | - |
83 | ERR_load_strings(0, PKCS12_str_reasons); | - |
84 | }executed 290 times by 31 tests: end of block Executed by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
85 | | - |
86 | }executed 290 times by 31 tests: end of block Executed by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
| | |