xref: /dragonfly/crypto/libressl/crypto/evp/evp_err.c (revision cca6fc52)
1 /* $OpenBSD: evp_err.c,v 1.26 2020/04/27 19:31:02 tb Exp $ */
2 /* ====================================================================
3  * Copyright (c) 1999-2011 The OpenSSL Project.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  *
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  *
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in
14  *    the documentation and/or other materials provided with the
15  *    distribution.
16  *
17  * 3. All advertising materials mentioning features or use of this
18  *    software must display the following acknowledgment:
19  *    "This product includes software developed by the OpenSSL Project
20  *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
21  *
22  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
23  *    endorse or promote products derived from this software without
24  *    prior written permission. For written permission, please contact
25  *    openssl-core@OpenSSL.org.
26  *
27  * 5. Products derived from this software may not be called "OpenSSL"
28  *    nor may "OpenSSL" appear in their names without prior written
29  *    permission of the OpenSSL Project.
30  *
31  * 6. Redistributions of any form whatsoever must retain the following
32  *    acknowledgment:
33  *    "This product includes software developed by the OpenSSL Project
34  *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
35  *
36  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
37  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
38  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
39  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
40  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
41  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
42  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
43  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
44  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
45  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
46  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
47  * OF THE POSSIBILITY OF SUCH DAMAGE.
48  * ====================================================================
49  *
50  * This product includes cryptographic software written by Eric Young
51  * (eay@cryptsoft.com).  This product includes software written by Tim
52  * Hudson (tjh@cryptsoft.com).
53  *
54  */
55 
56 /* NOTE: this file was auto generated by the mkerr.pl script: any changes
57  * made to it will be overwritten when the script next updates this file,
58  * only reason strings will be preserved.
59  */
60 
61 #include <stdio.h>
62 
63 #include <openssl/opensslconf.h>
64 
65 #include <openssl/err.h>
66 #include <openssl/evp.h>
67 
68 /* BEGIN ERROR CODES */
69 #ifndef OPENSSL_NO_ERR
70 
71 #define ERR_FUNC(func) ERR_PACK(ERR_LIB_EVP,func,0)
72 #define ERR_REASON(reason) ERR_PACK(ERR_LIB_EVP,0,reason)
73 
74 static ERR_STRING_DATA EVP_str_functs[] = {
75 	{ERR_FUNC(0xfff), "CRYPTO_internal"},
76 	{0, NULL}
77 };
78 
79 static ERR_STRING_DATA EVP_str_reasons[] = {
80 	{ERR_REASON(EVP_R_AES_IV_SETUP_FAILED)   , "aes iv setup failed"},
81 	{ERR_REASON(EVP_R_AES_KEY_SETUP_FAILED)  , "aes key setup failed"},
82 	{ERR_REASON(EVP_R_ASN1_LIB)              , "asn1 lib"},
83 	{ERR_REASON(EVP_R_BAD_BLOCK_LENGTH)      , "bad block length"},
84 	{ERR_REASON(EVP_R_BAD_DECRYPT)           , "bad decrypt"},
85 	{ERR_REASON(EVP_R_BAD_KEY_LENGTH)        , "bad key length"},
86 	{ERR_REASON(EVP_R_BN_DECODE_ERROR)       , "bn decode error"},
87 	{ERR_REASON(EVP_R_BN_PUBKEY_ERROR)       , "bn pubkey error"},
88 	{ERR_REASON(EVP_R_BUFFER_TOO_SMALL)      , "buffer too small"},
89 	{ERR_REASON(EVP_R_CAMELLIA_KEY_SETUP_FAILED), "camellia key setup failed"},
90 	{ERR_REASON(EVP_R_CIPHER_PARAMETER_ERROR), "cipher parameter error"},
91 	{ERR_REASON(EVP_R_COMMAND_NOT_SUPPORTED) , "command not supported"},
92 	{ERR_REASON(EVP_R_CTRL_NOT_IMPLEMENTED)  , "ctrl not implemented"},
93 	{ERR_REASON(EVP_R_CTRL_OPERATION_NOT_IMPLEMENTED), "ctrl operation not implemented"},
94 	{ERR_REASON(EVP_R_DATA_NOT_MULTIPLE_OF_BLOCK_LENGTH), "data not multiple of block length"},
95 	{ERR_REASON(EVP_R_DECODE_ERROR)          , "decode error"},
96 	{ERR_REASON(EVP_R_DIFFERENT_KEY_TYPES)   , "different key types"},
97 	{ERR_REASON(EVP_R_DIFFERENT_PARAMETERS)  , "different parameters"},
98 	{ERR_REASON(EVP_R_DISABLED_FOR_FIPS)     , "disabled for fips"},
99 	{ERR_REASON(EVP_R_ENCODE_ERROR)          , "encode error"},
100 	{ERR_REASON(EVP_R_ERROR_LOADING_SECTION) , "error loading section"},
101 	{ERR_REASON(EVP_R_ERROR_SETTING_FIPS_MODE), "error setting fips mode"},
102 	{ERR_REASON(EVP_R_EVP_PBE_CIPHERINIT_ERROR), "evp pbe cipherinit error"},
103 	{ERR_REASON(EVP_R_EXPECTING_AN_HMAC_KEY), "expecting an hmac key"},
104 	{ERR_REASON(EVP_R_EXPECTING_AN_RSA_KEY)  , "expecting an rsa key"},
105 	{ERR_REASON(EVP_R_EXPECTING_A_DH_KEY)    , "expecting a dh key"},
106 	{ERR_REASON(EVP_R_EXPECTING_A_DSA_KEY)   , "expecting a dsa key"},
107 	{ERR_REASON(EVP_R_EXPECTING_A_ECDSA_KEY) , "expecting a ecdsa key"},
108 	{ERR_REASON(EVP_R_EXPECTING_A_EC_KEY)    , "expecting a ec key"},
109 	{ERR_REASON(EVP_R_FIPS_MODE_NOT_SUPPORTED), "fips mode not supported"},
110 	{ERR_REASON(EVP_R_INITIALIZATION_ERROR)  , "initialization error"},
111 	{ERR_REASON(EVP_R_INPUT_NOT_INITIALIZED) , "input not initialized"},
112 	{ERR_REASON(EVP_R_INVALID_DIGEST)        , "invalid digest"},
113 	{ERR_REASON(EVP_R_INVALID_FIPS_MODE)     , "invalid fips mode"},
114 	{ERR_REASON(EVP_R_INVALID_IV_LENGTH)     , "invalid iv length"},
115 	{ERR_REASON(EVP_R_INVALID_KEY_LENGTH)    , "invalid key length"},
116 	{ERR_REASON(EVP_R_INVALID_OPERATION)     , "invalid operation"},
117 	{ERR_REASON(EVP_R_IV_TOO_LARGE)          , "iv too large"},
118 	{ERR_REASON(EVP_R_KEYGEN_FAILURE)        , "keygen failure"},
119 	{ERR_REASON(EVP_R_MESSAGE_DIGEST_IS_NULL), "message digest is null"},
120 	{ERR_REASON(EVP_R_METHOD_NOT_SUPPORTED)  , "method not supported"},
121 	{ERR_REASON(EVP_R_MISSING_PARAMETERS)    , "missing parameters"},
122 	{ERR_REASON(EVP_R_NO_CIPHER_SET)         , "no cipher set"},
123 	{ERR_REASON(EVP_R_NO_DEFAULT_DIGEST)     , "no default digest"},
124 	{ERR_REASON(EVP_R_NO_DIGEST_SET)         , "no digest set"},
125 	{ERR_REASON(EVP_R_NO_DSA_PARAMETERS)     , "no dsa parameters"},
126 	{ERR_REASON(EVP_R_NO_KEY_SET)            , "no key set"},
127 	{ERR_REASON(EVP_R_NO_OPERATION_SET)      , "no operation set"},
128 	{ERR_REASON(EVP_R_NO_SIGN_FUNCTION_CONFIGURED), "no sign function configured"},
129 	{ERR_REASON(EVP_R_NO_VERIFY_FUNCTION_CONFIGURED), "no verify function configured"},
130 	{ERR_REASON(EVP_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE), "operation not supported for this keytype"},
131 	{ERR_REASON(EVP_R_OPERATON_NOT_INITIALIZED), "operaton not initialized"},
132 	{ERR_REASON(EVP_R_OUTPUT_ALIASES_INPUT)  , "output aliases input"},
133 	{ERR_REASON(EVP_R_PKCS8_UNKNOWN_BROKEN_TYPE), "pkcs8 unknown broken type"},
134 	{ERR_REASON(EVP_R_PRIVATE_KEY_DECODE_ERROR), "private key decode error"},
135 	{ERR_REASON(EVP_R_PRIVATE_KEY_ENCODE_ERROR), "private key encode error"},
136 	{ERR_REASON(EVP_R_PUBLIC_KEY_NOT_RSA)    , "public key not rsa"},
137 	{ERR_REASON(EVP_R_TAG_TOO_LARGE)         , "tag too large"},
138 	{ERR_REASON(EVP_R_TOO_LARGE)             , "too large"},
139 	{ERR_REASON(EVP_R_UNKNOWN_CIPHER)        , "unknown cipher"},
140 	{ERR_REASON(EVP_R_UNKNOWN_DIGEST)        , "unknown digest"},
141 	{ERR_REASON(EVP_R_UNKNOWN_OPTION)        , "unknown option"},
142 	{ERR_REASON(EVP_R_UNKNOWN_PBE_ALGORITHM) , "unknown pbe algorithm"},
143 	{ERR_REASON(EVP_R_UNSUPORTED_NUMBER_OF_ROUNDS), "unsuported number of rounds"},
144 	{ERR_REASON(EVP_R_UNSUPPORTED_ALGORITHM) , "unsupported algorithm"},
145 	{ERR_REASON(EVP_R_UNSUPPORTED_CIPHER)    , "unsupported cipher"},
146 	{ERR_REASON(EVP_R_UNSUPPORTED_KEYLENGTH) , "unsupported keylength"},
147 	{ERR_REASON(EVP_R_UNSUPPORTED_KEY_DERIVATION_FUNCTION), "unsupported key derivation function"},
148 	{ERR_REASON(EVP_R_UNSUPPORTED_KEY_SIZE)  , "unsupported key size"},
149 	{ERR_REASON(EVP_R_UNSUPPORTED_PRF)       , "unsupported prf"},
150 	{ERR_REASON(EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM), "unsupported private key algorithm"},
151 	{ERR_REASON(EVP_R_UNSUPPORTED_SALT_TYPE) , "unsupported salt type"},
152 	{ERR_REASON(EVP_R_WRAP_MODE_NOT_ALLOWED), "wrap mode not allowed"},
153 	{ERR_REASON(EVP_R_WRONG_FINAL_BLOCK_LENGTH), "wrong final block length"},
154 	{ERR_REASON(EVP_R_WRONG_PUBLIC_KEY_TYPE) , "wrong public key type"},
155 	{0, NULL}
156 };
157 
158 #endif
159 
160 void
161 ERR_load_EVP_strings(void)
162 {
163 #ifndef OPENSSL_NO_ERR
164 	if (ERR_func_error_string(EVP_str_functs[0].error) == NULL) {
165 		ERR_load_strings(0, EVP_str_functs);
166 		ERR_load_strings(0, EVP_str_reasons);
167 	}
168 #endif
169 }
170