Line | Source | Count |
1 | | - |
2 | | - |
3 | | - |
4 | | - |
5 | | - |
6 | | - |
7 | | - |
8 | | - |
9 | | - |
10 | | - |
11 | | - |
12 | | - |
13 | | - |
14 | | - |
15 | | - |
16 | | - |
17 | | - |
18 | | - |
19 | | - |
20 | | - |
21 | | - |
22 | | - |
23 | | - |
24 | | - |
25 | | - |
26 | | - |
27 | | - |
28 | | - |
29 | | - |
30 | | - |
31 | | - |
32 | | - |
33 | | - |
34 | | - |
35 | | - |
36 | | - |
37 | | - |
38 | | - |
39 | | - |
40 | | - |
41 | | - |
42 | | - |
43 | | - |
44 | | - |
45 | | - |
46 | | - |
47 | | - |
48 | | - |
49 | | - |
50 | | - |
51 | | - |
52 | | - |
53 | | - |
54 | | - |
55 | | - |
56 | | - |
57 | | - |
58 | | - |
59 | | - |
60 | | - |
61 | #include <stdio.h> | - |
62 | | - |
63 | #include <openssl/opensslconf.h> | - |
64 | | - |
65 | #include <openssl/err.h> | - |
66 | #include <openssl/evp.h> | - |
67 | | - |
68 | | - |
69 | #ifndef OPENSSL_NO_ERR | - |
70 | | - |
71 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_EVP,func,0) | - |
72 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_EVP,0,reason) | - |
73 | | - |
74 | static ERR_STRING_DATA EVP_str_functs[] = { | - |
75 | {ERR_FUNC(0xfff), "CRYPTO_internal"}, | - |
76 | {0, NULL} | - |
77 | }; | - |
78 | | - |
79 | static ERR_STRING_DATA EVP_str_reasons[] = { | - |
80 | {ERR_REASON(EVP_R_AES_IV_SETUP_FAILED) , "aes iv setup failed"}, | - |
81 | {ERR_REASON(EVP_R_AES_KEY_SETUP_FAILED) , "aes key setup failed"}, | - |
82 | {ERR_REASON(EVP_R_ASN1_LIB) , "asn1 lib"}, | - |
83 | {ERR_REASON(EVP_R_BAD_BLOCK_LENGTH) , "bad block length"}, | - |
84 | {ERR_REASON(EVP_R_BAD_DECRYPT) , "bad decrypt"}, | - |
85 | {ERR_REASON(EVP_R_BAD_KEY_LENGTH) , "bad key length"}, | - |
86 | {ERR_REASON(EVP_R_BN_DECODE_ERROR) , "bn decode error"}, | - |
87 | {ERR_REASON(EVP_R_BN_PUBKEY_ERROR) , "bn pubkey error"}, | - |
88 | {ERR_REASON(EVP_R_BUFFER_TOO_SMALL) , "buffer too small"}, | - |
89 | {ERR_REASON(EVP_R_CAMELLIA_KEY_SETUP_FAILED), "camellia key setup failed"}, | - |
90 | {ERR_REASON(EVP_R_CIPHER_PARAMETER_ERROR), "cipher parameter error"}, | - |
91 | {ERR_REASON(EVP_R_COMMAND_NOT_SUPPORTED) , "command not supported"}, | - |
92 | {ERR_REASON(EVP_R_CTRL_NOT_IMPLEMENTED) , "ctrl not implemented"}, | - |
93 | {ERR_REASON(EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED), "ctrl operation not implemented"}, | - |
94 | {ERR_REASON(EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH), "data not multiple of block length"}, | - |
95 | {ERR_REASON(EVP_R_DECODE_ERROR) , "decode error"}, | - |
96 | {ERR_REASON(EVP_R_DIFFERENT_KEY_TYPES) , "different key types"}, | - |
97 | {ERR_REASON(EVP_R_DIFFERENT_PARAMETERS) , "different parameters"}, | - |
98 | {ERR_REASON(EVP_R_DISABLED_FOR_FIPS) , "disabled for fips"}, | - |
99 | {ERR_REASON(EVP_R_ENCODE_ERROR) , "encode error"}, | - |
100 | {ERR_REASON(EVP_R_ERROR_LOADING_SECTION) , "error loading section"}, | - |
101 | {ERR_REASON(EVP_R_ERROR_SETTING_FIPS_MODE), "error setting fips mode"}, | - |
102 | {ERR_REASON(EVP_R_EVP_PBE_CIPHERINIT_ERROR), "evp pbe cipherinit error"}, | - |
103 | {ERR_REASON(EVP_R_EXPECTING_AN_RSA_KEY) , "expecting an rsa key"}, | - |
104 | {ERR_REASON(EVP_R_EXPECTING_A_DH_KEY) , "expecting a dh key"}, | - |
105 | {ERR_REASON(EVP_R_EXPECTING_A_DSA_KEY) , "expecting a dsa key"}, | - |
106 | {ERR_REASON(EVP_R_EXPECTING_A_ECDSA_KEY) , "expecting a ecdsa key"}, | - |
107 | {ERR_REASON(EVP_R_EXPECTING_A_EC_KEY) , "expecting a ec key"}, | - |
108 | {ERR_REASON(EVP_R_FIPS_MODE_NOT_SUPPORTED), "fips mode not supported"}, | - |
109 | {ERR_REASON(EVP_R_INITIALIZATION_ERROR) , "initialization error"}, | - |
110 | {ERR_REASON(EVP_R_INPUT_NOT_INITIALIZED) , "input not initialized"}, | - |
111 | {ERR_REASON(EVP_R_INVALID_DIGEST) , "invalid digest"}, | - |
112 | {ERR_REASON(EVP_R_INVALID_FIPS_MODE) , "invalid fips mode"}, | - |
113 | {ERR_REASON(EVP_R_INVALID_KEY_LENGTH) , "invalid key length"}, | - |
114 | {ERR_REASON(EVP_R_INVALID_OPERATION) , "invalid operation"}, | - |
115 | {ERR_REASON(EVP_R_IV_TOO_LARGE) , "iv too large"}, | - |
116 | {ERR_REASON(EVP_R_KEYGEN_FAILURE) , "keygen failure"}, | - |
117 | {ERR_REASON(EVP_R_MESSAGE_DIGEST_IS_NULL), "message digest is null"}, | - |
118 | {ERR_REASON(EVP_R_METHOD_NOT_SUPPORTED) , "method not supported"}, | - |
119 | {ERR_REASON(EVP_R_MISSING_PARAMETERS) , "missing parameters"}, | - |
120 | {ERR_REASON(EVP_R_NO_CIPHER_SET) , "no cipher set"}, | - |
121 | {ERR_REASON(EVP_R_NO_DEFAULT_DIGEST) , "no default digest"}, | - |
122 | {ERR_REASON(EVP_R_NO_DIGEST_SET) , "no digest set"}, | - |
123 | {ERR_REASON(EVP_R_NO_DSA_PARAMETERS) , "no dsa parameters"}, | - |
124 | {ERR_REASON(EVP_R_NO_KEY_SET) , "no key set"}, | - |
125 | {ERR_REASON(EVP_R_NO_OPERATION_SET) , "no operation set"}, | - |
126 | {ERR_REASON(EVP_R_NO_SIGN_FUNCTION_CONFIGURED), "no sign function configured"}, | - |
127 | {ERR_REASON(EVP_R_NO_VERIFY_FUNCTION_CONFIGURED), "no verify function configured"}, | - |
128 | {ERR_REASON(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE), "operation not supported for this keytype"}, | - |
129 | {ERR_REASON(EVP_R_OPERATON_NOT_INITIALIZED), "operaton not initialized"}, | - |
130 | {ERR_REASON(EVP_R_OUTPUT_ALIASES_INPUT) , "output aliases input"}, | - |
131 | {ERR_REASON(EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE), "pkcs8 unknown broken type"}, | - |
132 | {ERR_REASON(EVP_R_PRIVATE_KEY_DECODE_ERROR), "private key decode error"}, | - |
133 | {ERR_REASON(EVP_R_PRIVATE_KEY_ENCODE_ERROR), "private key encode error"}, | - |
134 | {ERR_REASON(EVP_R_PUBLIC_KEY_NOT_RSA) , "public key not rsa"}, | - |
135 | {ERR_REASON(EVP_R_TAG_TOO_LARGE) , "tag too large"}, | - |
136 | {ERR_REASON(EVP_R_TOO_LARGE) , "too large"}, | - |
137 | {ERR_REASON(EVP_R_UNKNOWN_CIPHER) , "unknown cipher"}, | - |
138 | {ERR_REASON(EVP_R_UNKNOWN_DIGEST) , "unknown digest"}, | - |
139 | {ERR_REASON(EVP_R_UNKNOWN_OPTION) , "unknown option"}, | - |
140 | {ERR_REASON(EVP_R_UNKNOWN_PBE_ALGORITHM) , "unknown pbe algorithm"}, | - |
141 | {ERR_REASON(EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS), "unsuported number of rounds"}, | - |
142 | {ERR_REASON(EVP_R_UNSUPPORTED_ALGORITHM) , "unsupported algorithm"}, | - |
143 | {ERR_REASON(EVP_R_UNSUPPORTED_CIPHER) , "unsupported cipher"}, | - |
144 | {ERR_REASON(EVP_R_UNSUPPORTED_KEYLENGTH) , "unsupported keylength"}, | - |
145 | {ERR_REASON(EVP_R_UNSUPPORTED_KEY_DERIVATION_FUNCTION), "unsupported key derivation function"}, | - |
146 | {ERR_REASON(EVP_R_UNSUPPORTED_KEY_SIZE) , "unsupported key size"}, | - |
147 | {ERR_REASON(EVP_R_UNSUPPORTED_PRF) , "unsupported prf"}, | - |
148 | {ERR_REASON(EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM), "unsupported private key algorithm"}, | - |
149 | {ERR_REASON(EVP_R_UNSUPPORTED_SALT_TYPE) , "unsupported salt type"}, | - |
150 | {ERR_REASON(EVP_R_WRONG_FINAL_BLOCK_LENGTH), "wrong final block length"}, | - |
151 | {ERR_REASON(EVP_R_WRONG_PUBLIC_KEY_TYPE) , "wrong public key type"}, | - |
152 | {0, NULL} | - |
153 | }; | - |
154 | | - |
155 | #endif | - |
156 | | - |
157 | void | - |
158 | ERR_load_EVP_strings(void) | - |
159 | { | - |
160 | #ifndef OPENSSL_NO_ERR | - |
161 | if (ERR_func_error_string(EVP_str_functs[0].error) == NULL) {TRUE | evaluated 290 times by 31 testsEvaluated by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| FALSE | never evaluated |
| 0-290 |
162 | ERR_load_strings(0, EVP_str_functs); | - |
163 | ERR_load_strings(0, EVP_str_reasons); | - |
164 | }executed 290 times by 31 tests: end of block Executed by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
165 | #endif | - |
166 | }executed 290 times by 31 tests: end of block Executed by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
| | |