| Absolute File Name: | /home/opencoverage/opencoverage/guest-scripts/openssl/src/crypto/evp/evp_err.c |
| Switch to Source code | Preprocessed file |
| Line | Source | Count | ||||||
|---|---|---|---|---|---|---|---|---|
| 1 | - | |||||||
| 2 | - | |||||||
| 3 | - | |||||||
| 4 | static const ERR_STRING_DATA EVP_str_functs[] = { | - | ||||||
| 5 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(165) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aesni_init_key"}, | - | ||||||
| 6 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(196) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aes_gcm_ctrl"}, | - | ||||||
| 7 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(207) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aes_gcm_tls_cipher"}, | - | ||||||
| 8 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(133) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aes_init_key"}, | - | ||||||
| 9 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(169) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aes_ocb_cipher"}, | - | ||||||
| 10 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(178) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aes_t4_init_key"}, | - | ||||||
| 11 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(170) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aes_wrap_cipher"}, | - | ||||||
| 12 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(177) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "alg_module_init"}, | - | ||||||
| 13 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(175) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aria_ccm_init_key"}, | - | ||||||
| 14 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(197) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aria_gcm_ctrl"}, | - | ||||||
| 15 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(176) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aria_gcm_init_key"}, | - | ||||||
| 16 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(185) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "aria_init_key"}, | - | ||||||
| 17 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(198) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "b64_new"}, | - | ||||||
| 18 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(159) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "camellia_init_key"}, | - | ||||||
| 19 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(182) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 20 | "chacha20_poly1305_ctrl"}, | - | ||||||
| 21 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(179) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "cmll_t4_init_key"}, | - | ||||||
| 22 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(171) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 23 | "des_ede3_wrap_cipher"}, | - | ||||||
| 24 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(161) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "do_sigver_init"}, | - | ||||||
| 25 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(199) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "enc_new"}, | - | ||||||
| 26 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(123) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_CipherInit_ex"}, | - | ||||||
| 27 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(204) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 28 | "EVP_CIPHER_asn1_to_param"}, | - | ||||||
| 29 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(163) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 30 | "EVP_CIPHER_CTX_copy"}, | - | ||||||
| 31 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(124) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 32 | "EVP_CIPHER_CTX_ctrl"}, | - | ||||||
| 33 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(122) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 34 | "EVP_CIPHER_CTX_set_key_length"}, | - | ||||||
| 35 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(205) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 36 | "EVP_CIPHER_param_to_asn1"}, | - | ||||||
| 37 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(101) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 38 | "EVP_DecryptFinal_ex"}, | - | ||||||
| 39 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(166) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_DecryptUpdate"}, | - | ||||||
| 40 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(174) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_DigestFinalXOF"}, | - | ||||||
| 41 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(128) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_DigestInit_ex"}, | - | ||||||
| 42 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(127) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 43 | "EVP_EncryptFinal_ex"}, | - | ||||||
| 44 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(167) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_EncryptUpdate"}, | - | ||||||
| 45 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(110) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_MD_CTX_copy_ex"}, | - | ||||||
| 46 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(162) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_MD_size"}, | - | ||||||
| 47 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(102) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_OpenInit"}, | - | ||||||
| 48 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(115) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PBE_alg_add"}, | - | ||||||
| 49 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(160) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 50 | "EVP_PBE_alg_add_type"}, | - | ||||||
| 51 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(116) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PBE_CipherInit"}, | - | ||||||
| 52 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(181) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PBE_scrypt"}, | - | ||||||
| 53 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(111) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKCS82PKEY"}, | - | ||||||
| 54 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(113) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY2PKCS8"}, | - | ||||||
| 55 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(188) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_asn1_add0"}, | - | ||||||
| 56 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(186) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_check"}, | - | ||||||
| 57 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(103) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 58 | "EVP_PKEY_copy_parameters"}, | - | ||||||
| 59 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(137) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_CTX_ctrl"}, | - | ||||||
| 60 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(150) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 61 | "EVP_PKEY_CTX_ctrl_str"}, | - | ||||||
| 62 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(156) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_CTX_dup"}, | - | ||||||
| 63 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(168) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_CTX_md"}, | - | ||||||
| 64 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(104) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_decrypt"}, | - | ||||||
| 65 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(138) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 66 | "EVP_PKEY_decrypt_init"}, | - | ||||||
| 67 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(151) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 68 | "EVP_PKEY_decrypt_old"}, | - | ||||||
| 69 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(153) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_derive"}, | - | ||||||
| 70 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(154) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 71 | "EVP_PKEY_derive_init"}, | - | ||||||
| 72 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(155) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 73 | "EVP_PKEY_derive_set_peer"}, | - | ||||||
| 74 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(105) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_encrypt"}, | - | ||||||
| 75 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(139) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 76 | "EVP_PKEY_encrypt_init"}, | - | ||||||
| 77 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(152) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 78 | "EVP_PKEY_encrypt_old"}, | - | ||||||
| 79 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(119) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_get0_DH"}, | - | ||||||
| 80 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(120) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_get0_DSA"}, | - | ||||||
| 81 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(131) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 82 | "EVP_PKEY_get0_EC_KEY"}, | - | ||||||
| 83 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(183) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_get0_hmac"}, | - | ||||||
| 84 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(184) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 85 | "EVP_PKEY_get0_poly1305"}, | - | ||||||
| 86 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(121) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_get0_RSA"}, | - | ||||||
| 87 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(172) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 88 | "EVP_PKEY_get0_siphash"}, | - | ||||||
| 89 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(202) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 90 | "EVP_PKEY_get_raw_private_key"}, | - | ||||||
| 91 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(203) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 92 | "EVP_PKEY_get_raw_public_key"}, | - | ||||||
| 93 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(146) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_keygen"}, | - | ||||||
| 94 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(147) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 95 | "EVP_PKEY_keygen_init"}, | - | ||||||
| 96 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(194) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_meth_add0"}, | - | ||||||
| 97 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(195) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_meth_new"}, | - | ||||||
| 98 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(106) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_new"}, | - | ||||||
| 99 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(193) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 100 | "EVP_PKEY_new_CMAC_key"}, | - | ||||||
| 101 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(191) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 102 | "EVP_PKEY_new_raw_private_key"}, | - | ||||||
| 103 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(192) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 104 | "EVP_PKEY_new_raw_public_key"}, | - | ||||||
| 105 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(148) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_paramgen"}, | - | ||||||
| 106 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(149) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 107 | "EVP_PKEY_paramgen_init"}, | - | ||||||
| 108 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(189) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 109 | "EVP_PKEY_param_check"}, | - | ||||||
| 110 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(190) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 111 | "EVP_PKEY_public_check"}, | - | ||||||
| 112 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(187) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 113 | "EVP_PKEY_set1_engine"}, | - | ||||||
| 114 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(206) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 115 | "EVP_PKEY_set_alias_type"}, | - | ||||||
| 116 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(140) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_sign"}, | - | ||||||
| 117 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(141) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_sign_init"}, | - | ||||||
| 118 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(142) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_PKEY_verify"}, | - | ||||||
| 119 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(143) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 120 | "EVP_PKEY_verify_init"}, | - | ||||||
| 121 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(144) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 122 | "EVP_PKEY_verify_recover"}, | - | ||||||
| 123 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(145) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 124 | "EVP_PKEY_verify_recover_init"}, | - | ||||||
| 125 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(107) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_SignFinal"}, | - | ||||||
| 126 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(108) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "EVP_VerifyFinal"}, | - | ||||||
| 127 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(157) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "int_ctx_new"}, | - | ||||||
| 128 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(200) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "ok_new"}, | - | ||||||
| 129 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(117) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "PKCS5_PBE_keyivgen"}, | - | ||||||
| 130 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(118) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 131 | "PKCS5_v2_PBE_keyivgen"}, | - | ||||||
| 132 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(164) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 133 | "PKCS5_v2_PBKDF2_keyivgen"}, | - | ||||||
| 134 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(180) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 135 | "PKCS5_v2_scrypt_keyivgen"}, | - | ||||||
| 136 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(158) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "pkey_set_type"}, | - | ||||||
| 137 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(109) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "rc2_magic_to_meth"}, | - | ||||||
| 138 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(125) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "rc5_ctrl"}, | - | ||||||
| 139 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(201) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "s390x_aes_gcm_ctrl"}, | - | ||||||
| 140 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(208) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), | - | ||||||
| 141 | "s390x_aes_gcm_tls_cipher"}, | - | ||||||
| 142 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(173) & 0xFFF) << 12L) | (((unsigned int)(0) & 0xFFF) ) ), "update"}, | - | ||||||
| 143 | {0, | - | ||||||
| 144 | ((void *)0) | - | ||||||
| 145 | } | - | ||||||
| 146 | }; | - | ||||||
| 147 | - | |||||||
| 148 | static const ERR_STRING_DATA EVP_str_reasons[] = { | - | ||||||
| 149 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(143) & 0xFFF) ) ), | - | ||||||
| 150 | "aes key setup failed"}, | - | ||||||
| 151 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(176) & 0xFFF) ) ), | - | ||||||
| 152 | "aria key setup failed"}, | - | ||||||
| 153 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(100) & 0xFFF) ) ), "bad decrypt"}, | - | ||||||
| 154 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(155) & 0xFFF) ) ), "buffer too small"}, | - | ||||||
| 155 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(157) & 0xFFF) ) ), | - | ||||||
| 156 | "camellia key setup failed"}, | - | ||||||
| 157 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(122) & 0xFFF) ) ), | - | ||||||
| 158 | "cipher parameter error"}, | - | ||||||
| 159 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(147) & 0xFFF) ) ), | - | ||||||
| 160 | "command not supported"}, | - | ||||||
| 161 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(173) & 0xFFF) ) ), "copy error"}, | - | ||||||
| 162 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(132) & 0xFFF) ) ), | - | ||||||
| 163 | "ctrl not implemented"}, | - | ||||||
| 164 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(133) & 0xFFF) ) ), | - | ||||||
| 165 | "ctrl operation not implemented"}, | - | ||||||
| 166 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(138) & 0xFFF) ) ), | - | ||||||
| 167 | "data not multiple of block length"}, | - | ||||||
| 168 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(114) & 0xFFF) ) ), "decode error"}, | - | ||||||
| 169 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(101) & 0xFFF) ) ), | - | ||||||
| 170 | "different key types"}, | - | ||||||
| 171 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(153) & 0xFFF) ) ), | - | ||||||
| 172 | "different parameters"}, | - | ||||||
| 173 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(165) & 0xFFF) ) ), | - | ||||||
| 174 | "error loading section"}, | - | ||||||
| 175 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(166) & 0xFFF) ) ), | - | ||||||
| 176 | "error setting fips mode"}, | - | ||||||
| 177 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(174) & 0xFFF) ) ), | - | ||||||
| 178 | "expecting an hmac key"}, | - | ||||||
| 179 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(127) & 0xFFF) ) ), | - | ||||||
| 180 | "expecting an rsa key"}, | - | ||||||
| 181 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(128) & 0xFFF) ) ), "expecting a dh key"}, | - | ||||||
| 182 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(129) & 0xFFF) ) ), | - | ||||||
| 183 | "expecting a dsa key"}, | - | ||||||
| 184 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(142) & 0xFFF) ) ), "expecting a ec key"}, | - | ||||||
| 185 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(164) & 0xFFF) ) ), | - | ||||||
| 186 | "expecting a poly1305 key"}, | - | ||||||
| 187 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(175) & 0xFFF) ) ), | - | ||||||
| 188 | "expecting a siphash key"}, | - | ||||||
| 189 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(167) & 0xFFF) ) ), | - | ||||||
| 190 | "fips mode not supported"}, | - | ||||||
| 191 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(182) & 0xFFF) ) ), "get raw key failed"}, | - | ||||||
| 192 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(171) & 0xFFF) ) ), | - | ||||||
| 193 | "illegal scrypt parameters"}, | - | ||||||
| 194 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(134) & 0xFFF) ) ), | - | ||||||
| 195 | "initialization error"}, | - | ||||||
| 196 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(111) & 0xFFF) ) ), | - | ||||||
| 197 | "input not initialized"}, | - | ||||||
| 198 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(152) & 0xFFF) ) ), "invalid digest"}, | - | ||||||
| 199 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(168) & 0xFFF) ) ), "invalid fips mode"}, | - | ||||||
| 200 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(163) & 0xFFF) ) ), "invalid key"}, | - | ||||||
| 201 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(130) & 0xFFF) ) ), "invalid key length"}, | - | ||||||
| 202 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(148) & 0xFFF) ) ), "invalid operation"}, | - | ||||||
| 203 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(120) & 0xFFF) ) ), "keygen failure"}, | - | ||||||
| 204 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(180) & 0xFFF) ) ), "key setup failed"}, | - | ||||||
| 205 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(172) & 0xFFF) ) ), | - | ||||||
| 206 | "memory limit exceeded"}, | - | ||||||
| 207 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(159) & 0xFFF) ) ), | - | ||||||
| 208 | "message digest is null"}, | - | ||||||
| 209 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(144) & 0xFFF) ) ), | - | ||||||
| 210 | "method not supported"}, | - | ||||||
| 211 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(103) & 0xFFF) ) ), "missing parameters"}, | - | ||||||
| 212 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(178) & 0xFFF) ) ), | - | ||||||
| 213 | "not XOF or invalid length"}, | - | ||||||
| 214 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(131) & 0xFFF) ) ), "no cipher set"}, | - | ||||||
| 215 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(158) & 0xFFF) ) ), "no default digest"}, | - | ||||||
| 216 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(139) & 0xFFF) ) ), "no digest set"}, | - | ||||||
| 217 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(154) & 0xFFF) ) ), "no key set"}, | - | ||||||
| 218 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(149) & 0xFFF) ) ), "no operation set"}, | - | ||||||
| 219 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(177) & 0xFFF) ) ), | - | ||||||
| 220 | "only oneshot supported"}, | - | ||||||
| 221 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(150) & 0xFFF) ) ), | - | ||||||
| 222 | "operation not supported for this keytype"}, | - | ||||||
| 223 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(151) & 0xFFF) ) ), | - | ||||||
| 224 | "operaton not initialized"}, | - | ||||||
| 225 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(162) & 0xFFF) ) ), | - | ||||||
| 226 | "partially overlapping buffers"}, | - | ||||||
| 227 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(181) & 0xFFF) ) ), "pbkdf2 error"}, | - | ||||||
| 228 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(179) & 0xFFF) ) ), | - | ||||||
| 229 | "pkey application asn1 method already registered"}, | - | ||||||
| 230 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(145) & 0xFFF) ) ), | - | ||||||
| 231 | "private key decode error"}, | - | ||||||
| 232 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(146) & 0xFFF) ) ), | - | ||||||
| 233 | "private key encode error"}, | - | ||||||
| 234 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(106) & 0xFFF) ) ), "public key not rsa"}, | - | ||||||
| 235 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(183) & 0xFFF) ) ), "too many records"}, | - | ||||||
| 236 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(160) & 0xFFF) ) ), "unknown cipher"}, | - | ||||||
| 237 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(161) & 0xFFF) ) ), "unknown digest"}, | - | ||||||
| 238 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(169) & 0xFFF) ) ), "unknown option"}, | - | ||||||
| 239 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(121) & 0xFFF) ) ), | - | ||||||
| 240 | "unknown pbe algorithm"}, | - | ||||||
| 241 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(156) & 0xFFF) ) ), | - | ||||||
| 242 | "unsupported algorithm"}, | - | ||||||
| 243 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(107) & 0xFFF) ) ), "unsupported cipher"}, | - | ||||||
| 244 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(123) & 0xFFF) ) ), | - | ||||||
| 245 | "unsupported keylength"}, | - | ||||||
| 246 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(124) & 0xFFF) ) ), | - | ||||||
| 247 | "unsupported key derivation function"}, | - | ||||||
| 248 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(108) & 0xFFF) ) ), | - | ||||||
| 249 | "unsupported key size"}, | - | ||||||
| 250 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(135) & 0xFFF) ) ), | - | ||||||
| 251 | "unsupported number of rounds"}, | - | ||||||
| 252 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(125) & 0xFFF) ) ), "unsupported prf"}, | - | ||||||
| 253 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(118) & 0xFFF) ) ), | - | ||||||
| 254 | "unsupported private key algorithm"}, | - | ||||||
| 255 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(126) & 0xFFF) ) ), | - | ||||||
| 256 | "unsupported salt type"}, | - | ||||||
| 257 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(170) & 0xFFF) ) ), | - | ||||||
| 258 | "wrap mode not allowed"}, | - | ||||||
| 259 | {( (((unsigned int)(6) & 0x0FF) << 24L) | (((unsigned int)(0) & 0xFFF) << 12L) | (((unsigned int)(109) & 0xFFF) ) ), | - | ||||||
| 260 | "wrong final block length"}, | - | ||||||
| 261 | {0, | - | ||||||
| 262 | ((void *)0) | - | ||||||
| 263 | } | - | ||||||
| 264 | }; | - | ||||||
| 265 | - | |||||||
| 266 | - | |||||||
| 267 | - | |||||||
| 268 | int ERR_load_EVP_strings(void) | - | ||||||
| 269 | { | - | ||||||
| 270 | - | |||||||
| 271 | if (ERR_func_error_string(EVP_str_functs[0].error) ==
| 0-2074 | ||||||
| 272 | ((void *)0)
| 0-2074 | ||||||
| 273 | ) { | - | ||||||
| 274 | ERR_load_strings_const(EVP_str_functs); | - | ||||||
| 275 | ERR_load_strings_const(EVP_str_reasons); | - | ||||||
| 276 | } executed 2074 times by 11 tests: end of blockExecuted by:
| 2074 | ||||||
| 277 | - | |||||||
| 278 | return executed 2074 times by 11 tests: 1;return 1;Executed by:
executed 2074 times by 11 tests: return 1;Executed by:
| 2074 | ||||||
| 279 | } | - | ||||||
| Switch to Source code | Preprocessed file |