Absolute File Name: | /home/opencoverage/opencoverage/guest-scripts/openssl/src/crypto/evp/evp_err.c |
Switch to Source code | Preprocessed file |
Line | Source | Count | ||||||
---|---|---|---|---|---|---|---|---|
1 | - | |||||||
2 | - | |||||||
3 | - | |||||||
4 | static const ERR_STRING_DATA EVP_str_functs[] = { | - | ||||||
5 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(165) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aesni_init_key"}, | - | ||||||
6 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(196) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aes_gcm_ctrl"}, | - | ||||||
7 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(207) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aes_gcm_tls_cipher"}, | - | ||||||
8 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(133) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aes_init_key"}, | - | ||||||
9 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(169) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aes_ocb_cipher"}, | - | ||||||
10 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(178) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aes_t4_init_key"}, | - | ||||||
11 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(170) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aes_wrap_cipher"}, | - | ||||||
12 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(177) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "alg_module_init"}, | - | ||||||
13 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(175) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aria_ccm_init_key"}, | - | ||||||
14 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(197) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aria_gcm_ctrl"}, | - | ||||||
15 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(176) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aria_gcm_init_key"}, | - | ||||||
16 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(185) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aria_init_key"}, | - | ||||||
17 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(198) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "b64_new"}, | - | ||||||
18 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(159) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "camellia_init_key"}, | - | ||||||
19 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(182) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
20 | "chacha20_poly1305_ctrl"}, | - | ||||||
21 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(179) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "cmll_t4_init_key"}, | - | ||||||
22 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(171) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
23 | "des_ede3_wrap_cipher"}, | - | ||||||
24 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(161) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "do_sigver_init"}, | - | ||||||
25 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(199) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "enc_new"}, | - | ||||||
26 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(123) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_CipherInit_ex"}, | - | ||||||
27 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(204) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
28 | "EVP_CIPHER_asn1_to_param"}, | - | ||||||
29 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(163) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
30 | "EVP_CIPHER_CTX_copy"}, | - | ||||||
31 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(124) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
32 | "EVP_CIPHER_CTX_ctrl"}, | - | ||||||
33 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(122) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
34 | "EVP_CIPHER_CTX_set_key_length"}, | - | ||||||
35 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(205) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
36 | "EVP_CIPHER_param_to_asn1"}, | - | ||||||
37 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(101) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
38 | "EVP_DecryptFinal_ex"}, | - | ||||||
39 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(166) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_DecryptUpdate"}, | - | ||||||
40 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(174) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_DigestFinalXOF"}, | - | ||||||
41 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(128) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_DigestInit_ex"}, | - | ||||||
42 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(127) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
43 | "EVP_EncryptFinal_ex"}, | - | ||||||
44 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(167) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_EncryptUpdate"}, | - | ||||||
45 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(110) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_MD_CTX_copy_ex"}, | - | ||||||
46 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(162) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_MD_size"}, | - | ||||||
47 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(102) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_OpenInit"}, | - | ||||||
48 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(115) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PBE_alg_add"}, | - | ||||||
49 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(160) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
50 | "EVP_PBE_alg_add_type"}, | - | ||||||
51 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(116) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PBE_CipherInit"}, | - | ||||||
52 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(181) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PBE_scrypt"}, | - | ||||||
53 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(111) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKCS82PKEY"}, | - | ||||||
54 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(113) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY2PKCS8"}, | - | ||||||
55 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(188) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_asn1_add0"}, | - | ||||||
56 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(186) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_check"}, | - | ||||||
57 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(103) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
58 | "EVP_PKEY_copy_parameters"}, | - | ||||||
59 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(137) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_CTX_ctrl"}, | - | ||||||
60 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(150) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
61 | "EVP_PKEY_CTX_ctrl_str"}, | - | ||||||
62 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(156) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_CTX_dup"}, | - | ||||||
63 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(168) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_CTX_md"}, | - | ||||||
64 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(104) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_decrypt"}, | - | ||||||
65 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(138) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
66 | "EVP_PKEY_decrypt_init"}, | - | ||||||
67 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(151) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
68 | "EVP_PKEY_decrypt_old"}, | - | ||||||
69 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(153) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_derive"}, | - | ||||||
70 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(154) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
71 | "EVP_PKEY_derive_init"}, | - | ||||||
72 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(155) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
73 | "EVP_PKEY_derive_set_peer"}, | - | ||||||
74 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(105) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_encrypt"}, | - | ||||||
75 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(139) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
76 | "EVP_PKEY_encrypt_init"}, | - | ||||||
77 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(152) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
78 | "EVP_PKEY_encrypt_old"}, | - | ||||||
79 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(119) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_get0_DH"}, | - | ||||||
80 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(120) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_get0_DSA"}, | - | ||||||
81 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(131) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
82 | "EVP_PKEY_get0_EC_KEY"}, | - | ||||||
83 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(183) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_get0_hmac"}, | - | ||||||
84 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(184) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
85 | "EVP_PKEY_get0_poly1305"}, | - | ||||||
86 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(121) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_get0_RSA"}, | - | ||||||
87 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(172) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
88 | "EVP_PKEY_get0_siphash"}, | - | ||||||
89 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(202) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
90 | "EVP_PKEY_get_raw_private_key"}, | - | ||||||
91 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(203) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
92 | "EVP_PKEY_get_raw_public_key"}, | - | ||||||
93 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(146) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_keygen"}, | - | ||||||
94 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(147) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
95 | "EVP_PKEY_keygen_init"}, | - | ||||||
96 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(194) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_meth_add0"}, | - | ||||||
97 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(195) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_meth_new"}, | - | ||||||
98 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(106) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_new"}, | - | ||||||
99 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(193) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
100 | "EVP_PKEY_new_CMAC_key"}, | - | ||||||
101 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(191) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
102 | "EVP_PKEY_new_raw_private_key"}, | - | ||||||
103 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(192) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
104 | "EVP_PKEY_new_raw_public_key"}, | - | ||||||
105 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(148) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_paramgen"}, | - | ||||||
106 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(149) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
107 | "EVP_PKEY_paramgen_init"}, | - | ||||||
108 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(189) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
109 | "EVP_PKEY_param_check"}, | - | ||||||
110 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(190) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
111 | "EVP_PKEY_public_check"}, | - | ||||||
112 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(187) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
113 | "EVP_PKEY_set1_engine"}, | - | ||||||
114 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(206) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
115 | "EVP_PKEY_set_alias_type"}, | - | ||||||
116 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(140) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_sign"}, | - | ||||||
117 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(141) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_sign_init"}, | - | ||||||
118 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(142) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_verify"}, | - | ||||||
119 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(143) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
120 | "EVP_PKEY_verify_init"}, | - | ||||||
121 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(144) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
122 | "EVP_PKEY_verify_recover"}, | - | ||||||
123 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(145) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
124 | "EVP_PKEY_verify_recover_init"}, | - | ||||||
125 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(107) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_SignFinal"}, | - | ||||||
126 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(108) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_VerifyFinal"}, | - | ||||||
127 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(157) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "int_ctx_new"}, | - | ||||||
128 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(200) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "ok_new"}, | - | ||||||
129 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(117) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "PKCS5_PBE_keyivgen"}, | - | ||||||
130 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(118) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
131 | "PKCS5_v2_PBE_keyivgen"}, | - | ||||||
132 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(164) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
133 | "PKCS5_v2_PBKDF2_keyivgen"}, | - | ||||||
134 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(180) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
135 | "PKCS5_v2_scrypt_keyivgen"}, | - | ||||||
136 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(158) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "pkey_set_type"}, | - | ||||||
137 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(109) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "rc2_magic_to_meth"}, | - | ||||||
138 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(125) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "rc5_ctrl"}, | - | ||||||
139 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(201) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "s390x_aes_gcm_ctrl"}, | - | ||||||
140 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(208) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
141 | "s390x_aes_gcm_tls_cipher"}, | - | ||||||
142 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(173) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "update"}, | - | ||||||
143 | {0, | - | ||||||
144 | ((void *)0) | - | ||||||
145 | } | - | ||||||
146 | }; | - | ||||||
147 | - | |||||||
148 | static const ERR_STRING_DATA EVP_str_reasons[] = { | - | ||||||
149 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(143) & 0xFFF) ) ), | - | ||||||
150 | "aes key setup failed"}, | - | ||||||
151 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(176) & 0xFFF) ) ), | - | ||||||
152 | "aria key setup failed"}, | - | ||||||
153 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(100) & 0xFFF) ) ), "bad decrypt"}, | - | ||||||
154 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(155) & 0xFFF) ) ), "buffer too small"}, | - | ||||||
155 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(157) & 0xFFF) ) ), | - | ||||||
156 | "camellia key setup failed"}, | - | ||||||
157 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(122) & 0xFFF) ) ), | - | ||||||
158 | "cipher parameter error"}, | - | ||||||
159 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(147) & 0xFFF) ) ), | - | ||||||
160 | "command not supported"}, | - | ||||||
161 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(173) & 0xFFF) ) ), "copy error"}, | - | ||||||
162 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(132) & 0xFFF) ) ), | - | ||||||
163 | "ctrl not implemented"}, | - | ||||||
164 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(133) & 0xFFF) ) ), | - | ||||||
165 | "ctrl operation not implemented"}, | - | ||||||
166 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(138) & 0xFFF) ) ), | - | ||||||
167 | "data not multiple of block length"}, | - | ||||||
168 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(114) & 0xFFF) ) ), "decode error"}, | - | ||||||
169 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(101) & 0xFFF) ) ), | - | ||||||
170 | "different key types"}, | - | ||||||
171 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(153) & 0xFFF) ) ), | - | ||||||
172 | "different parameters"}, | - | ||||||
173 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(165) & 0xFFF) ) ), | - | ||||||
174 | "error loading section"}, | - | ||||||
175 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(166) & 0xFFF) ) ), | - | ||||||
176 | "error setting fips mode"}, | - | ||||||
177 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(174) & 0xFFF) ) ), | - | ||||||
178 | "expecting an hmac key"}, | - | ||||||
179 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(127) & 0xFFF) ) ), | - | ||||||
180 | "expecting an rsa key"}, | - | ||||||
181 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(128) & 0xFFF) ) ), "expecting a dh key"}, | - | ||||||
182 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(129) & 0xFFF) ) ), | - | ||||||
183 | "expecting a dsa key"}, | - | ||||||
184 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(142) & 0xFFF) ) ), "expecting a ec key"}, | - | ||||||
185 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(164) & 0xFFF) ) ), | - | ||||||
186 | "expecting a poly1305 key"}, | - | ||||||
187 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(175) & 0xFFF) ) ), | - | ||||||
188 | "expecting a siphash key"}, | - | ||||||
189 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(167) & 0xFFF) ) ), | - | ||||||
190 | "fips mode not supported"}, | - | ||||||
191 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(182) & 0xFFF) ) ), "get raw key failed"}, | - | ||||||
192 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(171) & 0xFFF) ) ), | - | ||||||
193 | "illegal scrypt parameters"}, | - | ||||||
194 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(134) & 0xFFF) ) ), | - | ||||||
195 | "initialization error"}, | - | ||||||
196 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(111) & 0xFFF) ) ), | - | ||||||
197 | "input not initialized"}, | - | ||||||
198 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(152) & 0xFFF) ) ), "invalid digest"}, | - | ||||||
199 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(168) & 0xFFF) ) ), "invalid fips mode"}, | - | ||||||
200 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(163) & 0xFFF) ) ), "invalid key"}, | - | ||||||
201 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(130) & 0xFFF) ) ), "invalid key length"}, | - | ||||||
202 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(148) & 0xFFF) ) ), "invalid operation"}, | - | ||||||
203 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(120) & 0xFFF) ) ), "keygen failure"}, | - | ||||||
204 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(180) & 0xFFF) ) ), "key setup failed"}, | - | ||||||
205 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(172) & 0xFFF) ) ), | - | ||||||
206 | "memory limit exceeded"}, | - | ||||||
207 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(159) & 0xFFF) ) ), | - | ||||||
208 | "message digest is null"}, | - | ||||||
209 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(144) & 0xFFF) ) ), | - | ||||||
210 | "method not supported"}, | - | ||||||
211 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(103) & 0xFFF) ) ), "missing parameters"}, | - | ||||||
212 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(178) & 0xFFF) ) ), | - | ||||||
213 | "not XOF or invalid length"}, | - | ||||||
214 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(131) & 0xFFF) ) ), "no cipher set"}, | - | ||||||
215 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(158) & 0xFFF) ) ), "no default digest"}, | - | ||||||
216 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(139) & 0xFFF) ) ), "no digest set"}, | - | ||||||
217 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(154) & 0xFFF) ) ), "no key set"}, | - | ||||||
218 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(149) & 0xFFF) ) ), "no operation set"}, | - | ||||||
219 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(177) & 0xFFF) ) ), | - | ||||||
220 | "only oneshot supported"}, | - | ||||||
221 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(150) & 0xFFF) ) ), | - | ||||||
222 | "operation not supported for this keytype"}, | - | ||||||
223 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(151) & 0xFFF) ) ), | - | ||||||
224 | "operaton not initialized"}, | - | ||||||
225 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(162) & 0xFFF) ) ), | - | ||||||
226 | "partially overlapping buffers"}, | - | ||||||
227 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(181) & 0xFFF) ) ), "pbkdf2 error"}, | - | ||||||
228 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(179) & 0xFFF) ) ), | - | ||||||
229 | "pkey application asn1 method already registered"}, | - | ||||||
230 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(145) & 0xFFF) ) ), | - | ||||||
231 | "private key decode error"}, | - | ||||||
232 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(146) & 0xFFF) ) ), | - | ||||||
233 | "private key encode error"}, | - | ||||||
234 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(106) & 0xFFF) ) ), "public key not rsa"}, | - | ||||||
235 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(183) & 0xFFF) ) ), "too many records"}, | - | ||||||
236 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(160) & 0xFFF) ) ), "unknown cipher"}, | - | ||||||
237 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(161) & 0xFFF) ) ), "unknown digest"}, | - | ||||||
238 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(169) & 0xFFF) ) ), "unknown option"}, | - | ||||||
239 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(121) & 0xFFF) ) ), | - | ||||||
240 | "unknown pbe algorithm"}, | - | ||||||
241 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(156) & 0xFFF) ) ), | - | ||||||
242 | "unsupported algorithm"}, | - | ||||||
243 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(107) & 0xFFF) ) ), "unsupported cipher"}, | - | ||||||
244 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(123) & 0xFFF) ) ), | - | ||||||
245 | "unsupported keylength"}, | - | ||||||
246 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(124) & 0xFFF) ) ), | - | ||||||
247 | "unsupported key derivation function"}, | - | ||||||
248 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(108) & 0xFFF) ) ), | - | ||||||
249 | "unsupported key size"}, | - | ||||||
250 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(135) & 0xFFF) ) ), | - | ||||||
251 | "unsupported number of rounds"}, | - | ||||||
252 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(125) & 0xFFF) ) ), "unsupported prf"}, | - | ||||||
253 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(118) & 0xFFF) ) ), | - | ||||||
254 | "unsupported private key algorithm"}, | - | ||||||
255 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(126) & 0xFFF) ) ), | - | ||||||
256 | "unsupported salt type"}, | - | ||||||
257 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(170) & 0xFFF) ) ), | - | ||||||
258 | "wrap mode not allowed"}, | - | ||||||
259 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(109) & 0xFFF) ) ), | - | ||||||
260 | "wrong final block length"}, | - | ||||||
261 | {0, | - | ||||||
262 | ((void *)0) | - | ||||||
263 | } | - | ||||||
264 | }; | - | ||||||
265 | - | |||||||
266 | - | |||||||
267 | - | |||||||
268 | int ERR_load_EVP_strings(void) | - | ||||||
269 | { | - | ||||||
270 | - | |||||||
271 | if (ERR_func_error_string(EVP_str_functs[0].error) ==
| 0-2074 | ||||||
272 | ((void *)0)
| 0-2074 | ||||||
273 | ) { | - | ||||||
274 | ERR_load_strings_const(EVP_str_functs); | - | ||||||
275 | ERR_load_strings_const(EVP_str_reasons); | - | ||||||
276 | } executed 2074 times by 11 tests: end of block Executed by:
| 2074 | ||||||
277 | - | |||||||
278 | return executed 2074 times by 11 tests: 1;return 1; Executed by:
executed 2074 times by 11 tests: return 1; Executed by:
| 2074 | ||||||
279 | } | - | ||||||
Switch to Source code | Preprocessed file |