| 1 | /* |
| 2 | * Generated by util/mkerr.pl DO NOT EDIT |
| 3 | * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved. |
| 4 | * |
| 5 | * Licensed under the Apache License 2.0 (the "License"). You may not use |
| 6 | * this file except in compliance with the License. You can obtain a copy |
| 7 | * in the file LICENSE in the source distribution or at |
| 8 | * https://www.openssl.org/source/license.html |
| 9 | */ |
| 10 | |
| 11 | #include <openssl/err.h> |
| 12 | #include "prov/providercommonerr.h" |
| 13 | |
| 14 | #ifndef OPENSSL_NO_ERR |
| 15 | |
| 16 | static const ERR_STRING_DATA PROV_str_reasons[] = { |
| 17 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_AES_KEY_SETUP_FAILED), |
| 18 | "aes key setup failed" }, |
| 19 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_BAD_DECRYPT), "bad decrypt" }, |
| 20 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_BAD_ENCODING), "bad encoding" }, |
| 21 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_BAD_LENGTH), "bad length" }, |
| 22 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_BAD_TLS_CLIENT_VERSION), |
| 23 | "bad tls client version" }, |
| 24 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_BN_ERROR), "bn error" }, |
| 25 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_BOTH_MODE_AND_MODE_INT), |
| 26 | "both mode and mode int" }, |
| 27 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_CIPHER_OPERATION_FAILED), |
| 28 | "cipher operation failed" }, |
| 29 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_FAILED_TO_DECRYPT), "failed to decrypt" }, |
| 30 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_FAILED_TO_GENERATE_KEY), |
| 31 | "failed to generate key" }, |
| 32 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_FAILED_TO_GET_PARAMETER), |
| 33 | "failed to get parameter" }, |
| 34 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_FAILED_TO_SET_PARAMETER), |
| 35 | "failed to set parameter" }, |
| 36 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INAVLID_UKM_LENGTH), |
| 37 | "inavlid ukm length" }, |
| 38 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_AAD), "invalid aad" }, |
| 39 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_CONSTANT_LENGTH), |
| 40 | "invalid constant length" }, |
| 41 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_CUSTOM_LENGTH), |
| 42 | "invalid custom length" }, |
| 43 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_DATA), "invalid data" }, |
| 44 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_DIGEST), "invalid digest" }, |
| 45 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_ITERATION_COUNT), |
| 46 | "invalid iteration count" }, |
| 47 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_IVLEN), "invalid ivlen" }, |
| 48 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_IV_LENGTH), "invalid iv length" }, |
| 49 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_KEY), "invalid key" }, |
| 50 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_KEYLEN), "invalid keylen" }, |
| 51 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_KEY_LEN), "invalid key len" }, |
| 52 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_KEY_LENGTH), |
| 53 | "invalid key length" }, |
| 54 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_MAC), "invalid mac" }, |
| 55 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_MODE), "invalid mode" }, |
| 56 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_MODE_INT), "invalid mode int" }, |
| 57 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_SALT_LENGTH), |
| 58 | "invalid salt length" }, |
| 59 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_SEED_LENGTH), |
| 60 | "invalid seed length" }, |
| 61 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_TAG), "invalid tag" }, |
| 62 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_TAGLEN), "invalid taglen" }, |
| 63 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_CEK_ALG), "missing cek alg" }, |
| 64 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_CIPHER), "missing cipher" }, |
| 65 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_CONSTANT), "missing constant" }, |
| 66 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_KEY), "missing key" }, |
| 67 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_MAC), "missing mac" }, |
| 68 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_MESSAGE_DIGEST), |
| 69 | "missing message digest" }, |
| 70 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_PASS), "missing pass" }, |
| 71 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_SALT), "missing salt" }, |
| 72 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_SECRET), "missing secret" }, |
| 73 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_SEED), "missing seed" }, |
| 74 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_SESSION_ID), |
| 75 | "missing session id" }, |
| 76 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_TYPE), "missing type" }, |
| 77 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_XCGHASH), "missing xcghash" }, |
| 78 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_NOT_SUPPORTED), "not supported" }, |
| 79 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_NOT_XOF_OR_INVALID_LENGTH), |
| 80 | "not xof or invalid length" }, |
| 81 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_NO_KEY_SET), "no key set" }, |
| 82 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_OUTPUT_BUFFER_TOO_SMALL), |
| 83 | "output buffer too small" }, |
| 84 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_READ_KEY), "read key" }, |
| 85 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_TAG_NOTSET), "tag notset" }, |
| 86 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_TAG_NOT_NEEDED), "tag not needed" }, |
| 87 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNABLE_TO_LOAD_SHA1), |
| 88 | "unable to load sha1" }, |
| 89 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNABLE_TO_LOAD_SHA256), |
| 90 | "unable to load sha256" }, |
| 91 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNSUPPORTED_CEK_ALG), |
| 92 | "unsupported cek alg" }, |
| 93 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNSUPPORTED_KEY_SIZE), |
| 94 | "unsupported key size" }, |
| 95 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNSUPPORTED_MAC_TYPE), |
| 96 | "unsupported mac type" }, |
| 97 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNSUPPORTED_NUMBER_OF_ROUNDS), |
| 98 | "unsupported number of rounds" }, |
| 99 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_VALUE_ERROR), "value error" }, |
| 100 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_WRONG_FINAL_BLOCK_LENGTH), |
| 101 | "wrong final block length" }, |
| 102 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_WRONG_OUTPUT_BUFFER_SIZE), |
| 103 | "wrong output buffer size" }, |
| 104 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_XTS_DATA_UNIT_IS_TOO_LARGE), |
| 105 | "xts data unit is too large" }, |
| 106 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_XTS_DUPLICATED_KEYS), |
| 107 | "xts duplicated keys" }, |
| 108 | {0, NULL} |
| 109 | }; |
| 110 | |
| 111 | #endif |
| 112 | |
| 113 | int ERR_load_PROV_strings(void) |
| 114 | { |
| 115 | #ifndef OPENSSL_NO_ERR |
| 116 | if (ERR_reason_error_string(PROV_str_reasons[0].error) == NULL) |
| 117 | ERR_load_strings_const(PROV_str_reasons); |
| 118 | #endif |
| 119 | return 1; |
| 120 | } |
| 121 | |