Important changes to repositories hosted on mbed.com
Mbed hosted mercurial repositories are deprecated and are due to be permanently deleted in July 2026.
To keep a copy of this software download the repository Zip archive or clone locally using Mercurial.
It is also possible to export all your personal repositories from the account settings page.
Fork of CyaSSL by
ctaocrypt/src/error.c
- Committer:
- wolfSSL
- Date:
- 2014-07-12
- Revision:
- 0:1239e9b70ca2
File content as of revision 0:1239e9b70ca2:
/* error.c * * Copyright (C) 2006-2014 wolfSSL Inc. * * This file is part of CyaSSL. * * CyaSSL is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * CyaSSL is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA */ #ifdef HAVE_CONFIG_H #include <config.h> #endif #include <cyassl/ctaocrypt/settings.h> #include <cyassl/ctaocrypt/error-crypt.h> #ifdef _MSC_VER /* 4996 warning to use MS extensions e.g., strcpy_s instead of XSTRNCPY */ #pragma warning(disable: 4996) #endif void CTaoCryptErrorString(int error, char* buffer) { const int max = CYASSL_MAX_ERROR_SZ; /* shorthand */ #ifdef NO_ERROR_STRINGS (void)error; XSTRNCPY(buffer, "no support for error strings built in", max); #else switch (error) { case OPEN_RAN_E : XSTRNCPY(buffer, "opening random device error", max); break; case READ_RAN_E : XSTRNCPY(buffer, "reading random device error", max); break; case WINCRYPT_E : XSTRNCPY(buffer, "windows crypt init error", max); break; case CRYPTGEN_E : XSTRNCPY(buffer, "windows crypt generation error", max); break; case RAN_BLOCK_E : XSTRNCPY(buffer, "random device read would block error", max); break; case BAD_MUTEX_E : XSTRNCPY(buffer, "Bad mutex, operation failed", max); break; case MP_INIT_E : XSTRNCPY(buffer, "mp_init error state", max); break; case MP_READ_E : XSTRNCPY(buffer, "mp_read error state", max); break; case MP_EXPTMOD_E : XSTRNCPY(buffer, "mp_exptmod error state", max); break; case MP_TO_E : XSTRNCPY(buffer, "mp_to_xxx error state, can't convert", max); break; case MP_SUB_E : XSTRNCPY(buffer, "mp_sub error state, can't subtract", max); break; case MP_ADD_E : XSTRNCPY(buffer, "mp_add error state, can't add", max); break; case MP_MUL_E : XSTRNCPY(buffer, "mp_mul error state, can't multiply", max); break; case MP_MULMOD_E : XSTRNCPY(buffer, "mp_mulmod error state, can't multiply mod", max); break; case MP_MOD_E : XSTRNCPY(buffer, "mp_mod error state, can't mod", max); break; case MP_INVMOD_E : XSTRNCPY(buffer, "mp_invmod error state, can't inv mod", max); break; case MP_CMP_E : XSTRNCPY(buffer, "mp_cmp error state", max); break; case MP_ZERO_E : XSTRNCPY(buffer, "mp zero result, not expected", max); break; case MEMORY_E : XSTRNCPY(buffer, "out of memory error", max); break; case RSA_WRONG_TYPE_E : XSTRNCPY(buffer, "RSA wrong block type for RSA function", max); break; case RSA_BUFFER_E : XSTRNCPY(buffer, "RSA buffer error, output too small or input too big", max); break; case BUFFER_E : XSTRNCPY(buffer, "Buffer error, output too small or input too big",max); break; case ALGO_ID_E : XSTRNCPY(buffer, "Setting Cert AlogID error", max); break; case PUBLIC_KEY_E : XSTRNCPY(buffer, "Setting Cert Public Key error", max); break; case DATE_E : XSTRNCPY(buffer, "Setting Cert Date validity error", max); break; case SUBJECT_E : XSTRNCPY(buffer, "Setting Cert Subject name error", max); break; case ISSUER_E : XSTRNCPY(buffer, "Setting Cert Issuer name error", max); break; case CA_TRUE_E : XSTRNCPY(buffer, "Setting basic constraint CA true error", max); break; case EXTENSIONS_E : XSTRNCPY(buffer, "Setting extensions error", max); break; case ASN_PARSE_E : XSTRNCPY(buffer, "ASN parsing error, invalid input", max); break; case ASN_VERSION_E : XSTRNCPY(buffer, "ASN version error, invalid number", max); break; case ASN_GETINT_E : XSTRNCPY(buffer, "ASN get big int error, invalid data", max); break; case ASN_RSA_KEY_E : XSTRNCPY(buffer, "ASN key init error, invalid input", max); break; case ASN_OBJECT_ID_E : XSTRNCPY(buffer, "ASN object id error, invalid id", max); break; case ASN_TAG_NULL_E : XSTRNCPY(buffer, "ASN tag error, not null", max); break; case ASN_EXPECT_0_E : XSTRNCPY(buffer, "ASN expect error, not zero", max); break; case ASN_BITSTR_E : XSTRNCPY(buffer, "ASN bit string error, wrong id", max); break; case ASN_UNKNOWN_OID_E : XSTRNCPY(buffer, "ASN oid error, unknown sum id", max); break; case ASN_DATE_SZ_E : XSTRNCPY(buffer, "ASN date error, bad size", max); break; case ASN_BEFORE_DATE_E : XSTRNCPY(buffer, "ASN date error, current date before", max); break; case ASN_AFTER_DATE_E : XSTRNCPY(buffer, "ASN date error, current date after", max); break; case ASN_SIG_OID_E : XSTRNCPY(buffer, "ASN signature error, mismatched oid", max); break; case ASN_TIME_E : XSTRNCPY(buffer, "ASN time error, unkown time type", max); break; case ASN_INPUT_E : XSTRNCPY(buffer, "ASN input error, not enough data", max); break; case ASN_SIG_CONFIRM_E : XSTRNCPY(buffer, "ASN sig error, confirm failure", max); break; case ASN_SIG_HASH_E : XSTRNCPY(buffer, "ASN sig error, unsupported hash type", max); break; case ASN_SIG_KEY_E : XSTRNCPY(buffer, "ASN sig error, unsupported key type", max); break; case ASN_DH_KEY_E : XSTRNCPY(buffer, "ASN key init error, invalid input", max); break; case ASN_NTRU_KEY_E : XSTRNCPY(buffer, "ASN NTRU key decode error, invalid input", max); break; case ASN_CRIT_EXT_E: XSTRNCPY(buffer, "X.509 Critical extension ignored", max); break; case ECC_BAD_ARG_E : XSTRNCPY(buffer, "ECC input argument wrong type, invalid input", max); break; case ASN_ECC_KEY_E : XSTRNCPY(buffer, "ECC ASN1 bad key data, invalid input", max); break; case ECC_CURVE_OID_E : XSTRNCPY(buffer, "ECC curve sum OID unsupported, invalid input", max); break; case BAD_FUNC_ARG : XSTRNCPY(buffer, "Bad function argument", max); break; case NOT_COMPILED_IN : XSTRNCPY(buffer, "Feature not compiled in", max); break; case UNICODE_SIZE_E : XSTRNCPY(buffer, "Unicode password too big", max); break; case NO_PASSWORD : XSTRNCPY(buffer, "No password provided by user", max); break; case ALT_NAME_E : XSTRNCPY(buffer, "Alt Name problem, too big", max); break; case AES_GCM_AUTH_E: XSTRNCPY(buffer, "AES-GCM Authentication check fail", max); break; case AES_CCM_AUTH_E: XSTRNCPY(buffer, "AES-CCM Authentication check fail", max); break; case CAVIUM_INIT_E: XSTRNCPY(buffer, "Cavium Init type error", max); break; case COMPRESS_INIT_E: XSTRNCPY(buffer, "Compress Init error", max); break; case COMPRESS_E: XSTRNCPY(buffer, "Compress error", max); break; case DECOMPRESS_INIT_E: XSTRNCPY(buffer, "DeCompress Init error", max); break; case DECOMPRESS_E: XSTRNCPY(buffer, "DeCompress error", max); break; case BAD_ALIGN_E: XSTRNCPY(buffer, "Bad alignment error, no alloc help", max); break; case ASN_NO_SIGNER_E : XSTRNCPY(buffer, "ASN no signer error to confirm failure", max); break; case ASN_CRL_CONFIRM_E : XSTRNCPY(buffer, "ASN CRL sig error, confirm failure", max); break; case ASN_CRL_NO_SIGNER_E : XSTRNCPY(buffer, "ASN CRL no signer error to confirm failure", max); break; case ASN_OCSP_CONFIRM_E : XSTRNCPY(buffer, "ASN OCSP sig error, confirm failure", max); break; case BAD_ENC_STATE_E: XSTRNCPY(buffer, "Bad ecc encrypt state operation", max); break; case BAD_PADDING_E: XSTRNCPY(buffer, "Bad padding, message wrong length", max); break; case REQ_ATTRIBUTE_E: XSTRNCPY(buffer, "Setting cert request attributes error", max); break; case PKCS7_OID_E: XSTRNCPY(buffer, "PKCS#7 error: mismatched OID value", max); break; case PKCS7_RECIP_E: XSTRNCPY(buffer, "PKCS#7 error: no matching recipient found", max); break; case FIPS_NOT_ALLOWED_E: XSTRNCPY(buffer, "FIPS mode not allowed error", max); break; case ASN_NAME_INVALID_E: XSTRNCPY(buffer, "Name Constraint error", max); break; default: XSTRNCPY(buffer, "unknown error number", max); } #endif /* NO_ERROR_STRINGS */ }