| Line | Source | Count |
| 1 | | - |
| 2 | | - |
| 3 | | - |
| 4 | | - |
| 5 | | - |
| 6 | | - |
| 7 | | - |
| 8 | | - |
| 9 | | - |
| 10 | static ERR_STRING_DATA EVP_str_functs[] = { | - |
| 11 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0xfff)&0xfffL)<<12L)| ((((unsigned long)0)&0xfffL))), "CRYPTO_internal"}, | - |
| 12 | {0, | - |
| 13 | ((void *)0) | - |
| 14 | } | - |
| 15 | }; | - |
| 16 | | - |
| 17 | static ERR_STRING_DATA EVP_str_reasons[] = { | - |
| 18 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)162)&0xfffL))) , "aes iv setup failed"}, | - |
| 19 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)143)&0xfffL))) , "aes key setup failed"}, | - |
| 20 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)140)&0xfffL))) , "asn1 lib"}, | - |
| 21 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)136)&0xfffL))) , "bad block length"}, | - |
| 22 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)100)&0xfffL))) , "bad decrypt"}, | - |
| 23 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)137)&0xfffL))) , "bad key length"}, | - |
| 24 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)112)&0xfffL))) , "bn decode error"}, | - |
| 25 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)113)&0xfffL))) , "bn pubkey error"}, | - |
| 26 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)155)&0xfffL))) , "buffer too small"}, | - |
| 27 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)157)&0xfffL))), "camellia key setup failed"}, | - |
| 28 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)122)&0xfffL))), "cipher parameter error"}, | - |
| 29 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)147)&0xfffL))) , "command not supported"}, | - |
| 30 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)132)&0xfffL))) , "ctrl not implemented"}, | - |
| 31 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)133)&0xfffL))), "ctrl operation not implemented"}, | - |
| 32 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)138)&0xfffL))), "data not multiple of block length"}, | - |
| 33 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)114)&0xfffL))) , "decode error"}, | - |
| 34 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)101)&0xfffL))) , "different key types"}, | - |
| 35 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)153)&0xfffL))) , "different parameters"}, | - |
| 36 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)163)&0xfffL))) , "disabled for fips"}, | - |
| 37 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)115)&0xfffL))) , "encode error"}, | - |
| 38 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)165)&0xfffL))) , "error loading section"}, | - |
| 39 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)166)&0xfffL))), "error setting fips mode"}, | - |
| 40 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)119)&0xfffL))), "evp pbe cipherinit error"}, | - |
| 41 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)127)&0xfffL))) , "expecting an rsa key"}, | - |
| 42 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)128)&0xfffL))) , "expecting a dh key"}, | - |
| 43 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)129)&0xfffL))) , "expecting a dsa key"}, | - |
| 44 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)141)&0xfffL))) , "expecting a ecdsa key"}, | - |
| 45 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)142)&0xfffL))) , "expecting a ec key"}, | - |
| 46 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)167)&0xfffL))), "fips mode not supported"}, | - |
| 47 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)134)&0xfffL))) , "initialization error"}, | - |
| 48 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)111)&0xfffL))) , "input not initialized"}, | - |
| 49 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)152)&0xfffL))) , "invalid digest"}, | - |
| 50 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)168)&0xfffL))) , "invalid fips mode"}, | - |
| 51 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)130)&0xfffL))) , "invalid key length"}, | - |
| 52 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)148)&0xfffL))) , "invalid operation"}, | - |
| 53 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)102)&0xfffL))) , "iv too large"}, | - |
| 54 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)120)&0xfffL))) , "keygen failure"}, | - |
| 55 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)159)&0xfffL))), "message digest is null"}, | - |
| 56 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)144)&0xfffL))) , "method not supported"}, | - |
| 57 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)103)&0xfffL))) , "missing parameters"}, | - |
| 58 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)131)&0xfffL))) , "no cipher set"}, | - |
| 59 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)158)&0xfffL))) , "no default digest"}, | - |
| 60 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)139)&0xfffL))) , "no digest set"}, | - |
| 61 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)116)&0xfffL))) , "no dsa parameters"}, | - |
| 62 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)154)&0xfffL))) , "no key set"}, | - |
| 63 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)149)&0xfffL))) , "no operation set"}, | - |
| 64 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)104)&0xfffL))), "no sign function configured"}, | - |
| 65 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)105)&0xfffL))), "no verify function configured"}, | - |
| 66 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)150)&0xfffL))), "operation not supported for this keytype"}, | - |
| 67 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)151)&0xfffL))), "operaton not initialized"}, | - |
| 68 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)172)&0xfffL))) , "output aliases input"}, | - |
| 69 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)117)&0xfffL))), "pkcs8 unknown broken type"}, | - |
| 70 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)145)&0xfffL))), "private key decode error"}, | - |
| 71 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)146)&0xfffL))), "private key encode error"}, | - |
| 72 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)106)&0xfffL))) , "public key not rsa"}, | - |
| 73 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)171)&0xfffL))) , "tag too large"}, | - |
| 74 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)164)&0xfffL))) , "too large"}, | - |
| 75 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)160)&0xfffL))) , "unknown cipher"}, | - |
| 76 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)161)&0xfffL))) , "unknown digest"}, | - |
| 77 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)169)&0xfffL))) , "unknown option"}, | - |
| 78 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)121)&0xfffL))) , "unknown pbe algorithm"}, | - |
| 79 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)135)&0xfffL))), "unsuported number of rounds"}, | - |
| 80 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)156)&0xfffL))) , "unsupported algorithm"}, | - |
| 81 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)107)&0xfffL))) , "unsupported cipher"}, | - |
| 82 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)123)&0xfffL))) , "unsupported keylength"}, | - |
| 83 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)124)&0xfffL))), "unsupported key derivation function"}, | - |
| 84 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)108)&0xfffL))) , "unsupported key size"}, | - |
| 85 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)125)&0xfffL))) , "unsupported prf"}, | - |
| 86 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)118)&0xfffL))), "unsupported private key algorithm"}, | - |
| 87 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)126)&0xfffL))) , "unsupported salt type"}, | - |
| 88 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)109)&0xfffL))), "wrong final block length"}, | - |
| 89 | {(((((unsigned long)6)&0xffL)<<24L)| ((((unsigned long)0)&0xfffL)<<12L)| ((((unsigned long)110)&0xfffL))) , "wrong public key type"}, | - |
| 90 | {0, | - |
| 91 | ((void *)0) | - |
| 92 | } | - |
| 93 | }; | - |
| 94 | | - |
| 95 | | - |
| 96 | | - |
| 97 | void | - |
| 98 | ERR_load_EVP_strings(void) | - |
| 99 | { | - |
| 100 | | - |
| 101 | if (ERR_func_error_string(EVP_str_functs[0].error) == | TRUE | evaluated 290 times by 31 testsEvaluated by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| | FALSE | never evaluated |
| 0-290 |
| 102 | ((void *)0)| TRUE | evaluated 290 times by 31 testsEvaluated by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| | FALSE | never evaluated |
| 0-290 |
| 103 | ) { | - |
| 104 | ERR_load_strings(0, EVP_str_functs); | - |
| 105 | ERR_load_strings(0, EVP_str_reasons); | - |
| 106 | }executed 290 times by 31 tests: end of blockExecuted by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
| 107 | | - |
| 108 | }executed 290 times by 31 tests: end of blockExecuted by:- asn1test
- base64test
- bnaddsub
- bntest
- cipher_list
- cipherstest
- clienttest
- configtest
- dhtest
- dsatest
- ecdhtest
- ecdsatest
- ectest
- enginetest
- evptest
- exptest
- gost2814789t
- keypairtest
- libcrypto.so.44.0.1
- mont
- pbkdf2
- pkcs7test
- rsa_test
- servertest
- ssl_versions
- ...
| 290 |
| | |