- Timestamp:
- Feb 7, 2019, 8:36:33 AM (5 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
asp3_tinet_ecnl_rx/trunk/wolfssl-3.12.2/wolfcrypt/src/error.c
r337 r372 34 34 #endif 35 35 36 #ifndef NO_ERROR_STRINGS 36 37 const char* wc_GetErrorString(int error) 37 38 { 38 #ifdef NO_ERROR_STRINGS39 40 (void)error;41 return "no support for error strings built in";42 43 #else44 45 39 switch (error) { 46 40 … … 207 201 return "X.509 Critical extension ignored or invalid"; 208 202 203 case ASN_ALT_NAME_E: 204 return "ASN alternate name error"; 205 209 206 case ECC_BAD_ARG_E : 210 207 return "ECC input argument wrong type, invalid input"; … … 267 264 return "ASN OCSP sig error, confirm failure"; 268 265 266 case ASN_NO_PEM_HEADER: 267 return "ASN no PEM Header Error"; 268 269 269 case BAD_STATE_E: 270 270 return "Bad state operation"; … … 282 282 return "PKCS#7 error: no matching recipient found"; 283 283 284 case WC_PKCS7_WANT_READ_E: 285 return "PKCS#7 operations wants more input, call again"; 286 284 287 case FIPS_NOT_ALLOWED_E: 285 288 return "FIPS mode not allowed error"; … … 435 438 return "Invalid use of private only ECC key"; 436 439 440 case WC_HW_E: 441 return "Error with hardware crypto use"; 442 443 case WC_HW_WAIT_E: 444 return "Hardware waiting on resource"; 445 446 case PSS_SALTLEN_E: 447 return "PSS - Length of salt is too big for hash algorithm"; 448 449 case PRIME_GEN_E: 450 return "Unable to find a prime for RSA key"; 451 452 case BER_INDEF_E: 453 return "Unable to decode an indefinite length encoded message"; 454 455 case RSA_OUT_OF_RANGE_E: 456 return "Ciphertext to decrypt is out of range"; 457 458 case RSAPSS_PAT_FIPS_E: 459 return "wolfcrypt FIPS RSA-PSS Pairwise Agreement Test Failure"; 460 461 case ECDSA_PAT_FIPS_E: 462 return "wolfcrypt FIPS ECDSA Pairwise Agreement Test Failure"; 463 464 case DH_KAT_FIPS_E: 465 return "wolfcrypt FIPS DH Known Answer Test Failure"; 466 467 case AESCCM_KAT_FIPS_E: 468 return "AESCCM Known Answer Test check FIPS error"; 469 470 case SHA3_KAT_FIPS_E: 471 return "SHA-3 Known Answer Test check FIPS error"; 472 473 case ECDHE_KAT_FIPS_E: 474 return "wolfcrypt FIPS ECDHE Known Answer Test Failure"; 475 476 case AES_GCM_OVERFLOW_E: 477 return "AES-GCM invocation counter overflow"; 478 479 case AES_CCM_OVERFLOW_E: 480 return "AES-CCM invocation counter overflow"; 481 482 case RSA_KEY_PAIR_E: 483 return "RSA Key Pair-Wise Consistency check fail"; 484 485 case DH_CHECK_PRIV_E: 486 return "DH Check Private Key failure"; 487 488 case WC_AFALG_SOCK_E: 489 return "AF_ALG socket error"; 490 491 case WC_DEVCRYPTO_E: 492 return "Error with /dev/crypto"; 493 494 case ZLIB_INIT_ERROR: 495 return "zlib init error"; 496 497 case ZLIB_COMPRESS_ERROR: 498 return "zlib compress error"; 499 500 case ZLIB_DECOMPRESS_ERROR: 501 return "zlib decompress error"; 502 503 case PKCS7_NO_SIGNER_E: 504 return "No signer in PKCS#7 signed data"; 505 437 506 default: 438 507 return "unknown error number"; 439 508 440 509 } 441 442 #endif /* NO_ERROR_STRINGS */443 444 510 } 445 511 … … 448 514 XSTRNCPY(buffer, wc_GetErrorString(error), WOLFSSL_MAX_ERROR_SZ); 449 515 } 516 #endif /* !NO_ERROR_STRINGS */ 517
Note:
See TracChangeset
for help on using the changeset viewer.