1 | /* |
2 | * Generated by util/mkerr.pl DO NOT EDIT |
3 | * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved. |
4 | * |
5 | * Licensed under the Apache License 2.0 (the "License"). You may not use |
6 | * this file except in compliance with the License. You can obtain a copy |
7 | * in the file LICENSE in the source distribution or at |
8 | * https://www.openssl.org/source/license.html |
9 | */ |
10 | |
11 | #include <openssl/err.h> |
12 | #include "prov/providercommonerr.h" |
13 | |
14 | #ifndef OPENSSL_NO_ERR |
15 | |
16 | static const ERR_STRING_DATA PROV_str_reasons[] = { |
17 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_AES_KEY_SETUP_FAILED), |
18 | "aes key setup failed" }, |
19 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_BAD_DECRYPT), "bad decrypt" }, |
20 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_BAD_ENCODING), "bad encoding" }, |
21 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_BAD_LENGTH), "bad length" }, |
22 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_BAD_TLS_CLIENT_VERSION), |
23 | "bad tls client version" }, |
24 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_BN_ERROR), "bn error" }, |
25 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_BOTH_MODE_AND_MODE_INT), |
26 | "both mode and mode int" }, |
27 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_CIPHER_OPERATION_FAILED), |
28 | "cipher operation failed" }, |
29 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_FAILED_TO_DECRYPT), "failed to decrypt" }, |
30 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_FAILED_TO_GENERATE_KEY), |
31 | "failed to generate key" }, |
32 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_FAILED_TO_GET_PARAMETER), |
33 | "failed to get parameter" }, |
34 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_FAILED_TO_SET_PARAMETER), |
35 | "failed to set parameter" }, |
36 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INAVLID_UKM_LENGTH), |
37 | "inavlid ukm length" }, |
38 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_AAD), "invalid aad" }, |
39 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_CONSTANT_LENGTH), |
40 | "invalid constant length" }, |
41 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_CUSTOM_LENGTH), |
42 | "invalid custom length" }, |
43 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_DATA), "invalid data" }, |
44 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_DIGEST), "invalid digest" }, |
45 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_ITERATION_COUNT), |
46 | "invalid iteration count" }, |
47 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_IVLEN), "invalid ivlen" }, |
48 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_IV_LENGTH), "invalid iv length" }, |
49 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_KEY), "invalid key" }, |
50 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_KEYLEN), "invalid keylen" }, |
51 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_KEY_LEN), "invalid key len" }, |
52 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_KEY_LENGTH), |
53 | "invalid key length" }, |
54 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_MAC), "invalid mac" }, |
55 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_MODE), "invalid mode" }, |
56 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_MODE_INT), "invalid mode int" }, |
57 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_SALT_LENGTH), |
58 | "invalid salt length" }, |
59 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_SEED_LENGTH), |
60 | "invalid seed length" }, |
61 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_TAG), "invalid tag" }, |
62 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_TAGLEN), "invalid taglen" }, |
63 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_CEK_ALG), "missing cek alg" }, |
64 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_CIPHER), "missing cipher" }, |
65 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_CONSTANT), "missing constant" }, |
66 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_KEY), "missing key" }, |
67 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_MAC), "missing mac" }, |
68 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_MESSAGE_DIGEST), |
69 | "missing message digest" }, |
70 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_PASS), "missing pass" }, |
71 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_SALT), "missing salt" }, |
72 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_SECRET), "missing secret" }, |
73 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_SEED), "missing seed" }, |
74 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_SESSION_ID), |
75 | "missing session id" }, |
76 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_TYPE), "missing type" }, |
77 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_XCGHASH), "missing xcghash" }, |
78 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_NOT_SUPPORTED), "not supported" }, |
79 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_NOT_XOF_OR_INVALID_LENGTH), |
80 | "not xof or invalid length" }, |
81 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_NO_KEY_SET), "no key set" }, |
82 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_OUTPUT_BUFFER_TOO_SMALL), |
83 | "output buffer too small" }, |
84 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_READ_KEY), "read key" }, |
85 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_TAG_NOTSET), "tag notset" }, |
86 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_TAG_NOT_NEEDED), "tag not needed" }, |
87 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNABLE_TO_LOAD_SHA1), |
88 | "unable to load sha1" }, |
89 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNABLE_TO_LOAD_SHA256), |
90 | "unable to load sha256" }, |
91 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNSUPPORTED_CEK_ALG), |
92 | "unsupported cek alg" }, |
93 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNSUPPORTED_KEY_SIZE), |
94 | "unsupported key size" }, |
95 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNSUPPORTED_MAC_TYPE), |
96 | "unsupported mac type" }, |
97 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNSUPPORTED_NUMBER_OF_ROUNDS), |
98 | "unsupported number of rounds" }, |
99 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_VALUE_ERROR), "value error" }, |
100 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_WRONG_FINAL_BLOCK_LENGTH), |
101 | "wrong final block length" }, |
102 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_WRONG_OUTPUT_BUFFER_SIZE), |
103 | "wrong output buffer size" }, |
104 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_XTS_DATA_UNIT_IS_TOO_LARGE), |
105 | "xts data unit is too large" }, |
106 | {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_XTS_DUPLICATED_KEYS), |
107 | "xts duplicated keys" }, |
108 | {0, NULL} |
109 | }; |
110 | |
111 | #endif |
112 | |
113 | int ERR_load_PROV_strings(void) |
114 | { |
115 | #ifndef OPENSSL_NO_ERR |
116 | if (ERR_reason_error_string(PROV_str_reasons[0].error) == NULL) |
117 | ERR_load_strings_const(PROV_str_reasons); |
118 | #endif |
119 | return 1; |
120 | } |
121 | |