Line | Source | Count |
1 | | - |
2 | | - |
3 | | - |
4 | | - |
5 | | - |
6 | | - |
7 | | - |
8 | static ERR_STRING_DATA GOST_str_functs[]= { | - |
9 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0xfff)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "CRYPTO_internal"}, | - |
10 | {0, | - |
11 | ((void *)0) | - |
12 | } | - |
13 | }; | - |
14 | | - |
15 | static ERR_STRING_DATA GOST_str_reasons[]= | - |
16 | { | - |
17 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)104)&0xfffL))),"bad key parameters format"}, | - |
18 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)105)&0xfffL))),"bad pkey parameters format"}, | - |
19 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)106)&0xfffL))),"cannot pack ephemeral key"}, | - |
20 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)107)&0xfffL))) ,"ctrl call failed"}, | - |
21 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)108)&0xfffL))),"error computing shared key"}, | - |
22 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)109)&0xfffL))),"error parsing key transport info"}, | - |
23 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)110)&0xfffL))),"incompatible algorithms"}, | - |
24 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)111)&0xfffL))),"incompatible peer key"}, | - |
25 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)100)&0xfffL))) ,"invalid digest type"}, | - |
26 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)103)&0xfffL))) ,"invalid iv length"}, | - |
27 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)101)&0xfffL))),"invalid mac key length"}, | - |
28 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)112)&0xfffL))),"key is not initialized"}, | - |
29 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)113)&0xfffL))),"key parameters missing"}, | - |
30 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)102)&0xfffL))) ,"mac key not set"}, | - |
31 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)115)&0xfffL))) ,"no parameters set"}, | - |
32 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)116)&0xfffL))) ,"no peer key"}, | - |
33 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)117)&0xfffL))),"no private part of non ephemeral keypair"}, | - |
34 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)118)&0xfffL))) ,"public key undefined"}, | - |
35 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)120)&0xfffL))),"random number generator failed"}, | - |
36 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)121)&0xfffL))) ,"signature mismatch"}, | - |
37 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)122)&0xfffL))),"signature parts greater than q"}, | - |
38 | {(((((unsigned long)50)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)123)&0xfffL))) ,"ukm not set"}, | - |
39 | {0, | - |
40 | ((void *)0) | - |
41 | } | - |
42 | }; | - |
43 | | - |
44 | | - |
45 | | - |
46 | void ERR_load_GOST_strings(void) | - |
47 | { | - |
48 | | - |
49 | | - |
50 | if (ERR_func_error_string(GOST_str_functs[0].error) == TRUE | evaluated 290 times by 31 testsEvaluated by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| FALSE | never evaluated |
| 0-290 |
51 | ((void *)0)TRUE | evaluated 290 times by 31 testsEvaluated by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| FALSE | never evaluated |
| 0-290 |
52 | ) | - |
53 | { | - |
54 | ERR_load_strings(0,GOST_str_functs); | - |
55 | ERR_load_strings(0,GOST_str_reasons); | - |
56 | }executed 290 times by 31 tests: end of block Executed by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
57 | | - |
58 | }executed 290 times by 31 tests: end of block Executed by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
| | |