| Line | Source | Count |
| 1 | | - |
| 2 | | - |
| 3 | | - |
| 4 | | - |
| 5 | | - |
| 6 | | - |
| 7 | | - |
| 8 | | - |
| 9 | | - |
| 10 | | - |
| 11 | | - |
| 12 | | - |
| 13 | | - |
| 14 | | - |
| 15 | | - |
| 16 | | - |
| 17 | | - |
| 18 | | - |
| 19 | | - |
| 20 | | - |
| 21 | | - |
| 22 | | - |
| 23 | | - |
| 24 | | - |
| 25 | | - |
| 26 | | - |
| 27 | | - |
| 28 | | - |
| 29 | | - |
| 30 | | - |
| 31 | | - |
| 32 | | - |
| 33 | | - |
| 34 | | - |
| 35 | | - |
| 36 | | - |
| 37 | | - |
| 38 | | - |
| 39 | | - |
| 40 | | - |
| 41 | | - |
| 42 | | - |
| 43 | | - |
| 44 | | - |
| 45 | | - |
| 46 | | - |
| 47 | | - |
| 48 | | - |
| 49 | | - |
| 50 | | - |
| 51 | | - |
| 52 | | - |
| 53 | | - |
| 54 | | - |
| 55 | | - |
| 56 | | - |
| 57 | | - |
| 58 | | - |
| 59 | | - |
| 60 | | - |
| 61 | #include <stdio.h> | - |
| 62 | | - |
| 63 | #include <openssl/opensslconf.h> | - |
| 64 | | - |
| 65 | #include <openssl/err.h> | - |
| 66 | #include <openssl/evp.h> | - |
| 67 | | - |
| 68 | | - |
| 69 | #ifndef OPENSSL_NO_ERR | - |
| 70 | | - |
| 71 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_EVP,func,0) | - |
| 72 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_EVP,0,reason) | - |
| 73 | | - |
| 74 | static ERR_STRING_DATA EVP_str_functs[] = { | - |
| 75 | {ERR_FUNC(0xfff), "CRYPTO_internal"}, | - |
| 76 | {0, NULL} | - |
| 77 | }; | - |
| 78 | | - |
| 79 | static ERR_STRING_DATA EVP_str_reasons[] = { | - |
| 80 | {ERR_REASON(EVP_R_AES_IV_SETUP_FAILED) , "aes iv setup failed"}, | - |
| 81 | {ERR_REASON(EVP_R_AES_KEY_SETUP_FAILED) , "aes key setup failed"}, | - |
| 82 | {ERR_REASON(EVP_R_ASN1_LIB) , "asn1 lib"}, | - |
| 83 | {ERR_REASON(EVP_R_BAD_BLOCK_LENGTH) , "bad block length"}, | - |
| 84 | {ERR_REASON(EVP_R_BAD_DECRYPT) , "bad decrypt"}, | - |
| 85 | {ERR_REASON(EVP_R_BAD_KEY_LENGTH) , "bad key length"}, | - |
| 86 | {ERR_REASON(EVP_R_BN_DECODE_ERROR) , "bn decode error"}, | - |
| 87 | {ERR_REASON(EVP_R_BN_PUBKEY_ERROR) , "bn pubkey error"}, | - |
| 88 | {ERR_REASON(EVP_R_BUFFER_TOO_SMALL) , "buffer too small"}, | - |
| 89 | {ERR_REASON(EVP_R_CAMELLIA_KEY_SETUP_FAILED), "camellia key setup failed"}, | - |
| 90 | {ERR_REASON(EVP_R_CIPHER_PARAMETER_ERROR), "cipher parameter error"}, | - |
| 91 | {ERR_REASON(EVP_R_COMMAND_NOT_SUPPORTED) , "command not supported"}, | - |
| 92 | {ERR_REASON(EVP_R_CTRL_NOT_IMPLEMENTED) , "ctrl not implemented"}, | - |
| 93 | {ERR_REASON(EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED), "ctrl operation not implemented"}, | - |
| 94 | {ERR_REASON(EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH), "data not multiple of block length"}, | - |
| 95 | {ERR_REASON(EVP_R_DECODE_ERROR) , "decode error"}, | - |
| 96 | {ERR_REASON(EVP_R_DIFFERENT_KEY_TYPES) , "different key types"}, | - |
| 97 | {ERR_REASON(EVP_R_DIFFERENT_PARAMETERS) , "different parameters"}, | - |
| 98 | {ERR_REASON(EVP_R_DISABLED_FOR_FIPS) , "disabled for fips"}, | - |
| 99 | {ERR_REASON(EVP_R_ENCODE_ERROR) , "encode error"}, | - |
| 100 | {ERR_REASON(EVP_R_ERROR_LOADING_SECTION) , "error loading section"}, | - |
| 101 | {ERR_REASON(EVP_R_ERROR_SETTING_FIPS_MODE), "error setting fips mode"}, | - |
| 102 | {ERR_REASON(EVP_R_EVP_PBE_CIPHERINIT_ERROR), "evp pbe cipherinit error"}, | - |
| 103 | {ERR_REASON(EVP_R_EXPECTING_AN_RSA_KEY) , "expecting an rsa key"}, | - |
| 104 | {ERR_REASON(EVP_R_EXPECTING_A_DH_KEY) , "expecting a dh key"}, | - |
| 105 | {ERR_REASON(EVP_R_EXPECTING_A_DSA_KEY) , "expecting a dsa key"}, | - |
| 106 | {ERR_REASON(EVP_R_EXPECTING_A_ECDSA_KEY) , "expecting a ecdsa key"}, | - |
| 107 | {ERR_REASON(EVP_R_EXPECTING_A_EC_KEY) , "expecting a ec key"}, | - |
| 108 | {ERR_REASON(EVP_R_FIPS_MODE_NOT_SUPPORTED), "fips mode not supported"}, | - |
| 109 | {ERR_REASON(EVP_R_INITIALIZATION_ERROR) , "initialization error"}, | - |
| 110 | {ERR_REASON(EVP_R_INPUT_NOT_INITIALIZED) , "input not initialized"}, | - |
| 111 | {ERR_REASON(EVP_R_INVALID_DIGEST) , "invalid digest"}, | - |
| 112 | {ERR_REASON(EVP_R_INVALID_FIPS_MODE) , "invalid fips mode"}, | - |
| 113 | {ERR_REASON(EVP_R_INVALID_KEY_LENGTH) , "invalid key length"}, | - |
| 114 | {ERR_REASON(EVP_R_INVALID_OPERATION) , "invalid operation"}, | - |
| 115 | {ERR_REASON(EVP_R_IV_TOO_LARGE) , "iv too large"}, | - |
| 116 | {ERR_REASON(EVP_R_KEYGEN_FAILURE) , "keygen failure"}, | - |
| 117 | {ERR_REASON(EVP_R_MESSAGE_DIGEST_IS_NULL), "message digest is null"}, | - |
| 118 | {ERR_REASON(EVP_R_METHOD_NOT_SUPPORTED) , "method not supported"}, | - |
| 119 | {ERR_REASON(EVP_R_MISSING_PARAMETERS) , "missing parameters"}, | - |
| 120 | {ERR_REASON(EVP_R_NO_CIPHER_SET) , "no cipher set"}, | - |
| 121 | {ERR_REASON(EVP_R_NO_DEFAULT_DIGEST) , "no default digest"}, | - |
| 122 | {ERR_REASON(EVP_R_NO_DIGEST_SET) , "no digest set"}, | - |
| 123 | {ERR_REASON(EVP_R_NO_DSA_PARAMETERS) , "no dsa parameters"}, | - |
| 124 | {ERR_REASON(EVP_R_NO_KEY_SET) , "no key set"}, | - |
| 125 | {ERR_REASON(EVP_R_NO_OPERATION_SET) , "no operation set"}, | - |
| 126 | {ERR_REASON(EVP_R_NO_SIGN_FUNCTION_CONFIGURED), "no sign function configured"}, | - |
| 127 | {ERR_REASON(EVP_R_NO_VERIFY_FUNCTION_CONFIGURED), "no verify function configured"}, | - |
| 128 | {ERR_REASON(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE), "operation not supported for this keytype"}, | - |
| 129 | {ERR_REASON(EVP_R_OPERATON_NOT_INITIALIZED), "operaton not initialized"}, | - |
| 130 | {ERR_REASON(EVP_R_OUTPUT_ALIASES_INPUT) , "output aliases input"}, | - |
| 131 | {ERR_REASON(EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE), "pkcs8 unknown broken type"}, | - |
| 132 | {ERR_REASON(EVP_R_PRIVATE_KEY_DECODE_ERROR), "private key decode error"}, | - |
| 133 | {ERR_REASON(EVP_R_PRIVATE_KEY_ENCODE_ERROR), "private key encode error"}, | - |
| 134 | {ERR_REASON(EVP_R_PUBLIC_KEY_NOT_RSA) , "public key not rsa"}, | - |
| 135 | {ERR_REASON(EVP_R_TAG_TOO_LARGE) , "tag too large"}, | - |
| 136 | {ERR_REASON(EVP_R_TOO_LARGE) , "too large"}, | - |
| 137 | {ERR_REASON(EVP_R_UNKNOWN_CIPHER) , "unknown cipher"}, | - |
| 138 | {ERR_REASON(EVP_R_UNKNOWN_DIGEST) , "unknown digest"}, | - |
| 139 | {ERR_REASON(EVP_R_UNKNOWN_OPTION) , "unknown option"}, | - |
| 140 | {ERR_REASON(EVP_R_UNKNOWN_PBE_ALGORITHM) , "unknown pbe algorithm"}, | - |
| 141 | {ERR_REASON(EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS), "unsuported number of rounds"}, | - |
| 142 | {ERR_REASON(EVP_R_UNSUPPORTED_ALGORITHM) , "unsupported algorithm"}, | - |
| 143 | {ERR_REASON(EVP_R_UNSUPPORTED_CIPHER) , "unsupported cipher"}, | - |
| 144 | {ERR_REASON(EVP_R_UNSUPPORTED_KEYLENGTH) , "unsupported keylength"}, | - |
| 145 | {ERR_REASON(EVP_R_UNSUPPORTED_KEY_DERIVATION_FUNCTION), "unsupported key derivation function"}, | - |
| 146 | {ERR_REASON(EVP_R_UNSUPPORTED_KEY_SIZE) , "unsupported key size"}, | - |
| 147 | {ERR_REASON(EVP_R_UNSUPPORTED_PRF) , "unsupported prf"}, | - |
| 148 | {ERR_REASON(EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM), "unsupported private key algorithm"}, | - |
| 149 | {ERR_REASON(EVP_R_UNSUPPORTED_SALT_TYPE) , "unsupported salt type"}, | - |
| 150 | {ERR_REASON(EVP_R_WRONG_FINAL_BLOCK_LENGTH), "wrong final block length"}, | - |
| 151 | {ERR_REASON(EVP_R_WRONG_PUBLIC_KEY_TYPE) , "wrong public key type"}, | - |
| 152 | {0, NULL} | - |
| 153 | }; | - |
| 154 | | - |
| 155 | #endif | - |
| 156 | | - |
| 157 | void | - |
| 158 | ERR_load_EVP_strings(void) | - |
| 159 | { | - |
| 160 | #ifndef OPENSSL_NO_ERR | - |
| 161 | if (ERR_func_error_string(EVP_str_functs[0].error) == NULL) {| TRUE | evaluated 290 times by 31 testsEvaluated by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| | FALSE | never evaluated |
| 0-290 |
| 162 | ERR_load_strings(0, EVP_str_functs); | - |
| 163 | ERR_load_strings(0, EVP_str_reasons); | - |
| 164 | }executed 290 times by 31 tests: end of blockExecuted by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
| 165 | #endif | - |
| 166 | }executed 290 times by 31 tests: end of blockExecuted by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
| | |