diff options
| author | auth12 <[email protected]> | 2020-07-22 08:40:38 -0700 |
|---|---|---|
| committer | auth12 <[email protected]> | 2020-07-22 08:40:38 -0700 |
| commit | 4ff89e85e74884e8f04edb5c31a94b4323e895e9 (patch) | |
| tree | 65f98ebf9af0d0947e44bf397b1fac0f107d7a2f /client/wolfssl/wolfcrypt/src/error.c | |
| parent | Client injection. (diff) | |
| download | loader-4ff89e85e74884e8f04edb5c31a94b4323e895e9.tar.xz loader-4ff89e85e74884e8f04edb5c31a94b4323e895e9.zip | |
Removed wolfssl
Diffstat (limited to 'client/wolfssl/wolfcrypt/src/error.c')
| -rw-r--r-- | client/wolfssl/wolfcrypt/src/error.c | 530 |
1 files changed, 0 insertions, 530 deletions
diff --git a/client/wolfssl/wolfcrypt/src/error.c b/client/wolfssl/wolfcrypt/src/error.c deleted file mode 100644 index 87ded35..0000000 --- a/client/wolfssl/wolfcrypt/src/error.c +++ /dev/null @@ -1,530 +0,0 @@ -/* error.c - * - * Copyright (C) 2006-2020 wolfSSL Inc. - * - * This file is part of wolfSSL. - * - * wolfSSL is free software; you can redistribute it and/or modify - * it under the terms of the GNU General Public License as published by - * the Free Software Foundation; either version 2 of the License, or - * (at your option) any later version. - * - * wolfSSL is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU General Public License for more details. - * - * You should have received a copy of the GNU General Public License - * along with this program; if not, write to the Free Software - * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA - */ - - -#ifdef HAVE_CONFIG_H - #include <config.h> -#endif - -#include <wolfssl/wolfcrypt/settings.h> - -#include <wolfssl/wolfcrypt/error-crypt.h> - -#ifdef _MSC_VER - /* 4996 warning to use MS extensions e.g., strcpy_s instead of XSTRNCPY */ - #pragma warning(disable: 4996) -#endif - -#ifndef NO_ERROR_STRINGS -const char* wc_GetErrorString(int error) -{ - switch (error) { - - case OPEN_RAN_E : - return "opening random device error"; - - case READ_RAN_E : - return "reading random device error"; - - case WINCRYPT_E : - return "windows crypt init error"; - - case CRYPTGEN_E : - return "windows crypt generation error"; - - case RAN_BLOCK_E : - return "random device read would block error"; - - case BAD_MUTEX_E : - return "Bad mutex, operation failed"; - - case WC_TIMEOUT_E: - return "Timeout error"; - - case WC_PENDING_E: - return "wolfCrypt Operation Pending (would block / eagain) error"; - - case WC_NOT_PENDING_E: - return "wolfCrypt operation not pending error"; - - case MP_INIT_E : - return "mp_init error state"; - - case MP_READ_E : - return "mp_read error state"; - - case MP_EXPTMOD_E : - return "mp_exptmod error state"; - - case MP_TO_E : - return "mp_to_xxx error state, can't convert"; - - case MP_SUB_E : - return "mp_sub error state, can't subtract"; - - case MP_ADD_E : - return "mp_add error state, can't add"; - - case MP_MUL_E : - return "mp_mul error state, can't multiply"; - - case MP_MULMOD_E : - return "mp_mulmod error state, can't multiply mod"; - - case MP_MOD_E : - return "mp_mod error state, can't mod"; - - case MP_INVMOD_E : - return "mp_invmod error state, can't inv mod"; - - case MP_CMP_E : - return "mp_cmp error state"; - - case MP_ZERO_E : - return "mp zero result, not expected"; - - case MEMORY_E : - return "out of memory error"; - - case VAR_STATE_CHANGE_E : - return "Variable state modified by different thread"; - - case RSA_WRONG_TYPE_E : - return "RSA wrong block type for RSA function"; - - case RSA_BUFFER_E : - return "RSA buffer error, output too small or input too big"; - - case BUFFER_E : - return "Buffer error, output too small or input too big"; - - case ALGO_ID_E : - return "Setting Cert AlgoID error"; - - case PUBLIC_KEY_E : - return "Setting Cert Public Key error"; - - case DATE_E : - return "Setting Cert Date validity error"; - - case SUBJECT_E : - return "Setting Cert Subject name error"; - - case ISSUER_E : - return "Setting Cert Issuer name error"; - - case CA_TRUE_E : - return "Setting basic constraint CA true error"; - - case EXTENSIONS_E : - return "Setting extensions error"; - - case ASN_PARSE_E : - return "ASN parsing error, invalid input"; - - case ASN_VERSION_E : - return "ASN version error, invalid number"; - - case ASN_GETINT_E : - return "ASN get big int error, invalid data"; - - case ASN_RSA_KEY_E : - return "ASN key init error, invalid input"; - - case ASN_OBJECT_ID_E : - return "ASN object id error, invalid id"; - - case ASN_TAG_NULL_E : - return "ASN tag error, not null"; - - case ASN_EXPECT_0_E : - return "ASN expect error, not zero"; - - case ASN_BITSTR_E : - return "ASN bit string error, wrong id"; - - case ASN_UNKNOWN_OID_E : - return "ASN oid error, unknown sum id"; - - case ASN_DATE_SZ_E : - return "ASN date error, bad size"; - - case ASN_BEFORE_DATE_E : - return "ASN date error, current date before"; - - case ASN_AFTER_DATE_E : - return "ASN date error, current date after"; - - case ASN_SIG_OID_E : - return "ASN signature error, mismatched oid"; - - case ASN_TIME_E : - return "ASN time error, unknown time type"; - - case ASN_INPUT_E : - return "ASN input error, not enough data"; - - case ASN_SIG_CONFIRM_E : - return "ASN sig error, confirm failure"; - - case ASN_SIG_HASH_E : - return "ASN sig error, unsupported hash type"; - - case ASN_SIG_KEY_E : - return "ASN sig error, unsupported key type"; - - case ASN_DH_KEY_E : - return "ASN key init error, invalid input"; - - case ASN_NTRU_KEY_E : - return "ASN NTRU key decode error, invalid input"; - - case ASN_CRIT_EXT_E: - return "X.509 Critical extension ignored or invalid"; - - case ASN_ALT_NAME_E: - return "ASN alternate name error"; - - case ECC_BAD_ARG_E : - return "ECC input argument wrong type, invalid input"; - - case ASN_ECC_KEY_E : - return "ECC ASN1 bad key data, invalid input"; - - case ECC_CURVE_OID_E : - return "ECC curve sum OID unsupported, invalid input"; - - case BAD_FUNC_ARG : - return "Bad function argument"; - - case NOT_COMPILED_IN : - return "Feature not compiled in"; - - case UNICODE_SIZE_E : - return "Unicode password too big"; - - case NO_PASSWORD : - return "No password provided by user"; - - case ALT_NAME_E : - return "Alt Name problem, too big"; - - case AES_GCM_AUTH_E: - return "AES-GCM Authentication check fail"; - - case AES_CCM_AUTH_E: - return "AES-CCM Authentication check fail"; - - case ASYNC_INIT_E: - return "Async Init error"; - - case COMPRESS_INIT_E: - return "Compress Init error"; - - case COMPRESS_E: - return "Compress error"; - - case DECOMPRESS_INIT_E: - return "DeCompress Init error"; - - case DECOMPRESS_E: - return "DeCompress error"; - - case BAD_ALIGN_E: - return "Bad alignment error, no alloc help"; - - case ASN_NO_SIGNER_E : - return "ASN no signer error to confirm failure"; - - case ASN_CRL_CONFIRM_E : - return "ASN CRL sig error, confirm failure"; - - case ASN_CRL_NO_SIGNER_E : - return "ASN CRL no signer error to confirm failure"; - - case ASN_OCSP_CONFIRM_E : - return "ASN OCSP sig error, confirm failure"; - - case ASN_NO_PEM_HEADER: - return "ASN no PEM Header Error"; - - case BAD_STATE_E: - return "Bad state operation"; - - case BAD_PADDING_E: - return "Bad padding, message wrong length"; - - case REQ_ATTRIBUTE_E: - return "Setting cert request attributes error"; - - case PKCS7_OID_E: - return "PKCS#7 error: mismatched OID value"; - - case PKCS7_RECIP_E: - return "PKCS#7 error: no matching recipient found"; - - case WC_PKCS7_WANT_READ_E: - return "PKCS#7 operations wants more input, call again"; - - case FIPS_NOT_ALLOWED_E: - return "FIPS mode not allowed error"; - - case ASN_NAME_INVALID_E: - return "Name Constraint error"; - - case RNG_FAILURE_E: - return "Random Number Generator failed"; - - case HMAC_MIN_KEYLEN_E: - return "FIPS Mode HMAC Minimum Key Length error"; - - case RSA_PAD_E: - return "Rsa Padding error"; - - case LENGTH_ONLY_E: - return "Output length only set, not for other use error"; - - case IN_CORE_FIPS_E: - return "In Core Integrity check FIPS error"; - - case AES_KAT_FIPS_E: - return "AES Known Answer Test check FIPS error"; - - case DES3_KAT_FIPS_E: - return "DES3 Known Answer Test check FIPS error"; - - case HMAC_KAT_FIPS_E: - return "HMAC Known Answer Test check FIPS error"; - - case RSA_KAT_FIPS_E: - return "RSA Known Answer Test check FIPS error"; - - case DRBG_KAT_FIPS_E: - return "DRBG Known Answer Test check FIPS error"; - - case DRBG_CONT_FIPS_E: - return "DRBG Continuous Test FIPS error"; - - case AESGCM_KAT_FIPS_E: - return "AESGCM Known Answer Test check FIPS error"; - - case THREAD_STORE_KEY_E: - return "Thread Storage Key Create error"; - - case THREAD_STORE_SET_E: - return "Thread Storage Set error"; - - case MAC_CMP_FAILED_E: - return "MAC comparison failed"; - - case IS_POINT_E: - return "ECC is point on curve failed"; - - case ECC_INF_E: - return " ECC point at infinity error"; - - case ECC_OUT_OF_RANGE_E: - return " ECC Qx or Qy out of range error"; - - case ECC_PRIV_KEY_E: - return " ECC private key is not valid error"; - - case SRP_CALL_ORDER_E: - return "SRP function called in the wrong order error"; - - case SRP_VERIFY_E: - return "SRP proof verification error"; - - case SRP_BAD_KEY_E: - return "SRP bad key values error"; - - case ASN_NO_SKID: - return "ASN no Subject Key Identifier found error"; - - case ASN_NO_AKID: - return "ASN no Authority Key Identifier found error"; - - case ASN_NO_KEYUSAGE: - return "ASN no Key Usage found error"; - - case SKID_E: - return "Setting Subject Key Identifier error"; - - case AKID_E: - return "Setting Authority Key Identifier error"; - - case KEYUSAGE_E: - return "Key Usage value error"; - - case EXTKEYUSAGE_E: - return "Extended Key Usage value error"; - - case CERTPOLICIES_E: - return "Setting Certificate Policies error"; - - case WC_INIT_E: - return "wolfCrypt Initialize Failure error"; - - case SIG_VERIFY_E: - return "Signature verify error"; - - case BAD_COND_E: - return "Bad condition variable operation error"; - - case SIG_TYPE_E: - return "Signature type not enabled/available"; - - case HASH_TYPE_E: - return "Hash type not enabled/available"; - - case WC_KEY_SIZE_E: - return "Key size error, either too small or large"; - - case ASN_COUNTRY_SIZE_E: - return "Country code size error, either too small or large"; - - case MISSING_RNG_E: - return "RNG required but not provided"; - - case ASN_PATHLEN_SIZE_E: - return "ASN CA path length value too large error"; - - case ASN_PATHLEN_INV_E: - return "ASN CA path length larger than signer error"; - - case BAD_KEYWRAP_ALG_E: - return "Unsupported key wrap algorithm error"; - - case BAD_KEYWRAP_IV_E: - return "Decrypted AES key wrap IV does not match expected"; - - case WC_CLEANUP_E: - return "wolfcrypt cleanup failed"; - - case ECC_CDH_KAT_FIPS_E: - return "wolfcrypt FIPS ECC CDH Known Answer Test Failure"; - - case DH_CHECK_PUB_E: - return "DH Check Public Key failure"; - - case BAD_PATH_ERROR: - return "Bad path for opendir error"; - - case ASYNC_OP_E: - return "Async operation error"; - - case BAD_OCSP_RESPONDER: - return "Invalid OCSP Responder, missing specific key usage extensions"; - - case ECC_PRIVATEONLY_E: - return "Invalid use of private only ECC key"; - - case WC_HW_E: - return "Error with hardware crypto use"; - - case WC_HW_WAIT_E: - return "Hardware waiting on resource"; - - case PSS_SALTLEN_E: - return "PSS - Length of salt is too big for hash algorithm"; - - case PRIME_GEN_E: - return "Unable to find a prime for RSA key"; - - case BER_INDEF_E: - return "Unable to decode an indefinite length encoded message"; - - case RSA_OUT_OF_RANGE_E: - return "Ciphertext to decrypt is out of range"; - - case RSAPSS_PAT_FIPS_E: - return "wolfcrypt FIPS RSA-PSS Pairwise Agreement Test Failure"; - - case ECDSA_PAT_FIPS_E: - return "wolfcrypt FIPS ECDSA Pairwise Agreement Test Failure"; - - case DH_KAT_FIPS_E: - return "wolfcrypt FIPS DH Known Answer Test Failure"; - - case AESCCM_KAT_FIPS_E: - return "AESCCM Known Answer Test check FIPS error"; - - case SHA3_KAT_FIPS_E: - return "SHA-3 Known Answer Test check FIPS error"; - - case ECDHE_KAT_FIPS_E: - return "wolfcrypt FIPS ECDHE Known Answer Test Failure"; - - case AES_GCM_OVERFLOW_E: - return "AES-GCM invocation counter overflow"; - - case AES_CCM_OVERFLOW_E: - return "AES-CCM invocation counter overflow"; - - case RSA_KEY_PAIR_E: - return "RSA Key Pair-Wise Consistency check fail"; - - case DH_CHECK_PRIV_E: - return "DH Check Private Key failure"; - - case WC_AFALG_SOCK_E: - return "AF_ALG socket error"; - - case WC_DEVCRYPTO_E: - return "Error with /dev/crypto"; - - case ZLIB_INIT_ERROR: - return "zlib init error"; - - case ZLIB_COMPRESS_ERROR: - return "zlib compress error"; - - case ZLIB_DECOMPRESS_ERROR: - return "zlib decompress error"; - - case PKCS7_NO_SIGNER_E: - return "No signer in PKCS#7 signed data"; - - case CRYPTOCB_UNAVAILABLE: - return "Crypto callback unavailable"; - - case PKCS7_SIGNEEDS_CHECK: - return "Signature found but no certificate to verify"; - - case PSS_SALTLEN_RECOVER_E: - return "PSS - Salt length unable to be recovered"; - - case ASN_SELF_SIGNED_E: - return "ASN self-signed certificate error"; - - default: - return "unknown error number"; - - } -} - -void wc_ErrorString(int error, char* buffer) -{ - XSTRNCPY(buffer, wc_GetErrorString(error), WOLFSSL_MAX_ERROR_SZ); - buffer[WOLFSSL_MAX_ERROR_SZ-1] = 0; -} -#endif /* !NO_ERROR_STRINGS */ - |