sl@0: /* crypto/rsa/rsa_err.c */ sl@0: /* ==================================================================== sl@0: * Copyright (c) 1999-2005 The OpenSSL Project. All rights reserved. sl@0: * sl@0: * Redistribution and use in source and binary forms, with or without sl@0: * modification, are permitted provided that the following conditions sl@0: * are met: sl@0: * sl@0: * 1. Redistributions of source code must retain the above copyright sl@0: * notice, this list of conditions and the following disclaimer. sl@0: * sl@0: * 2. Redistributions in binary form must reproduce the above copyright sl@0: * notice, this list of conditions and the following disclaimer in sl@0: * the documentation and/or other materials provided with the sl@0: * distribution. sl@0: * sl@0: * 3. All advertising materials mentioning features or use of this sl@0: * software must display the following acknowledgment: sl@0: * "This product includes software developed by the OpenSSL Project sl@0: * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" sl@0: * sl@0: * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to sl@0: * endorse or promote products derived from this software without sl@0: * prior written permission. For written permission, please contact sl@0: * openssl-core@OpenSSL.org. sl@0: * sl@0: * 5. Products derived from this software may not be called "OpenSSL" sl@0: * nor may "OpenSSL" appear in their names without prior written sl@0: * permission of the OpenSSL Project. sl@0: * sl@0: * 6. Redistributions of any form whatsoever must retain the following sl@0: * acknowledgment: sl@0: * "This product includes software developed by the OpenSSL Project sl@0: * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" sl@0: * sl@0: * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY sl@0: * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE sl@0: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR sl@0: * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR sl@0: * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, sl@0: * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT sl@0: * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; sl@0: * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) sl@0: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, sl@0: * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) sl@0: * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED sl@0: * OF THE POSSIBILITY OF SUCH DAMAGE. sl@0: * ==================================================================== sl@0: * sl@0: * This product includes cryptographic software written by Eric Young sl@0: * (eay@cryptsoft.com). This product includes software written by Tim sl@0: * Hudson (tjh@cryptsoft.com). sl@0: * sl@0: */ sl@0: /* sl@0: © Portions copyright (c) 2006 Nokia Corporation. All rights reserved. sl@0: */ sl@0: sl@0: sl@0: /* NOTE: this file was auto generated by the mkerr.pl script: any changes sl@0: * made to it will be overwritten when the script next updates this file, sl@0: * only reason strings will be preserved. sl@0: */ sl@0: sl@0: #include sl@0: #include sl@0: #include sl@0: #if (defined(SYMBIAN) && (defined(__WINSCW__) || defined(__WINS__))) sl@0: #include "libcrypto_wsd_macros.h" sl@0: #include "libcrypto_wsd.h" sl@0: #endif sl@0: sl@0: /* BEGIN ERROR CODES */ sl@0: #ifndef OPENSSL_NO_ERR sl@0: sl@0: #define ERR_FUNC(func) ERR_PACK(ERR_LIB_RSA,func,0) sl@0: #define ERR_REASON(reason) ERR_PACK(ERR_LIB_RSA,0,reason) sl@0: #ifndef EMULATOR sl@0: static ERR_STRING_DATA RSA_str_functs[]= sl@0: { sl@0: {ERR_FUNC(RSA_F_MEMORY_LOCK), "MEMORY_LOCK"}, sl@0: {ERR_FUNC(RSA_F_RSA_BUILTIN_KEYGEN), "RSA_BUILTIN_KEYGEN"}, sl@0: {ERR_FUNC(RSA_F_RSA_CHECK_KEY), "RSA_check_key"}, sl@0: {ERR_FUNC(RSA_F_RSA_EAY_PRIVATE_DECRYPT), "RSA_EAY_PRIVATE_DECRYPT"}, sl@0: {ERR_FUNC(RSA_F_RSA_EAY_PRIVATE_ENCRYPT), "RSA_EAY_PRIVATE_ENCRYPT"}, sl@0: {ERR_FUNC(RSA_F_RSA_EAY_PUBLIC_DECRYPT), "RSA_EAY_PUBLIC_DECRYPT"}, sl@0: {ERR_FUNC(RSA_F_RSA_EAY_PUBLIC_ENCRYPT), "RSA_EAY_PUBLIC_ENCRYPT"}, sl@0: {ERR_FUNC(RSA_F_RSA_GENERATE_KEY), "RSA_generate_key"}, sl@0: {ERR_FUNC(RSA_F_RSA_MEMORY_LOCK), "RSA_memory_lock"}, sl@0: {ERR_FUNC(RSA_F_RSA_NEW_METHOD), "RSA_new_method"}, sl@0: {ERR_FUNC(RSA_F_RSA_NULL), "RSA_NULL"}, sl@0: {ERR_FUNC(RSA_F_RSA_NULL_MOD_EXP), "RSA_NULL_MOD_EXP"}, sl@0: {ERR_FUNC(RSA_F_RSA_NULL_PRIVATE_DECRYPT), "RSA_NULL_PRIVATE_DECRYPT"}, sl@0: {ERR_FUNC(RSA_F_RSA_NULL_PRIVATE_ENCRYPT), "RSA_NULL_PRIVATE_ENCRYPT"}, sl@0: {ERR_FUNC(RSA_F_RSA_NULL_PUBLIC_DECRYPT), "RSA_NULL_PUBLIC_DECRYPT"}, sl@0: {ERR_FUNC(RSA_F_RSA_NULL_PUBLIC_ENCRYPT), "RSA_NULL_PUBLIC_ENCRYPT"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_ADD_NONE), "RSA_padding_add_none"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_ADD_PKCS1_OAEP), "RSA_padding_add_PKCS1_OAEP"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_ADD_PKCS1_PSS), "RSA_PADDING_ADD_PKCS1_PSS"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_1), "RSA_padding_add_PKCS1_type_1"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_2), "RSA_padding_add_PKCS1_type_2"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_ADD_SSLV23), "RSA_padding_add_SSLv23"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_ADD_X931), "RSA_padding_add_X931"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_CHECK_NONE), "RSA_padding_check_none"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP), "RSA_padding_check_PKCS1_OAEP"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1), "RSA_padding_check_PKCS1_type_1"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2), "RSA_padding_check_PKCS1_type_2"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_CHECK_SSLV23), "RSA_padding_check_SSLv23"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_CHECK_X931), "RSA_padding_check_X931"}, sl@0: {ERR_FUNC(RSA_F_RSA_PRINT), "RSA_print"}, sl@0: {ERR_FUNC(RSA_F_RSA_PRINT_FP), "RSA_print_fp"}, sl@0: {ERR_FUNC(RSA_F_RSA_SETUP_BLINDING), "RSA_setup_blinding"}, sl@0: {ERR_FUNC(RSA_F_RSA_SIGN), "RSA_sign"}, sl@0: {ERR_FUNC(RSA_F_RSA_SIGN_ASN1_OCTET_STRING), "RSA_sign_ASN1_OCTET_STRING"}, sl@0: {ERR_FUNC(RSA_F_RSA_VERIFY), "RSA_verify"}, sl@0: {ERR_FUNC(RSA_F_RSA_VERIFY_ASN1_OCTET_STRING), "RSA_verify_ASN1_OCTET_STRING"}, sl@0: {ERR_FUNC(RSA_F_RSA_VERIFY_PKCS1_PSS), "RSA_VERIFY_PKCS1_PSS"}, sl@0: {0,NULL} sl@0: }; sl@0: sl@0: static ERR_STRING_DATA RSA_str_reasons[]= sl@0: { sl@0: {ERR_REASON(RSA_R_ALGORITHM_MISMATCH) ,"algorithm mismatch"}, sl@0: {ERR_REASON(RSA_R_BAD_E_VALUE) ,"bad e value"}, sl@0: {ERR_REASON(RSA_R_BAD_FIXED_HEADER_DECRYPT),"bad fixed header decrypt"}, sl@0: {ERR_REASON(RSA_R_BAD_PAD_BYTE_COUNT) ,"bad pad byte count"}, sl@0: {ERR_REASON(RSA_R_BAD_SIGNATURE) ,"bad signature"}, sl@0: {ERR_REASON(RSA_R_BLOCK_TYPE_IS_NOT_01) ,"block type is not 01"}, sl@0: {ERR_REASON(RSA_R_BLOCK_TYPE_IS_NOT_02) ,"block type is not 02"}, sl@0: {ERR_REASON(RSA_R_DATA_GREATER_THAN_MOD_LEN),"data greater than mod len"}, sl@0: {ERR_REASON(RSA_R_DATA_TOO_LARGE) ,"data too large"}, sl@0: {ERR_REASON(RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE),"data too large for key size"}, sl@0: {ERR_REASON(RSA_R_DATA_TOO_LARGE_FOR_MODULUS),"data too large for modulus"}, sl@0: {ERR_REASON(RSA_R_DATA_TOO_SMALL) ,"data too small"}, sl@0: {ERR_REASON(RSA_R_DATA_TOO_SMALL_FOR_KEY_SIZE),"data too small for key size"}, sl@0: {ERR_REASON(RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY),"digest too big for rsa key"}, sl@0: {ERR_REASON(RSA_R_DMP1_NOT_CONGRUENT_TO_D),"dmp1 not congruent to d"}, sl@0: {ERR_REASON(RSA_R_DMQ1_NOT_CONGRUENT_TO_D),"dmq1 not congruent to d"}, sl@0: {ERR_REASON(RSA_R_D_E_NOT_CONGRUENT_TO_1),"d e not congruent to 1"}, sl@0: {ERR_REASON(RSA_R_FIRST_OCTET_INVALID) ,"first octet invalid"}, sl@0: {ERR_REASON(RSA_R_INVALID_HEADER) ,"invalid header"}, sl@0: {ERR_REASON(RSA_R_INVALID_MESSAGE_LENGTH),"invalid message length"}, sl@0: {ERR_REASON(RSA_R_INVALID_PADDING) ,"invalid padding"}, sl@0: {ERR_REASON(RSA_R_INVALID_TRAILER) ,"invalid trailer"}, sl@0: {ERR_REASON(RSA_R_IQMP_NOT_INVERSE_OF_Q) ,"iqmp not inverse of q"}, sl@0: {ERR_REASON(RSA_R_KEY_SIZE_TOO_SMALL) ,"key size too small"}, sl@0: {ERR_REASON(RSA_R_LAST_OCTET_INVALID) ,"last octet invalid"}, sl@0: {ERR_REASON(RSA_R_MODULUS_TOO_LARGE) ,"modulus too large"}, sl@0: {ERR_REASON(RSA_R_NO_PUBLIC_EXPONENT) ,"no public exponent"}, sl@0: {ERR_REASON(RSA_R_NULL_BEFORE_BLOCK_MISSING),"null before block missing"}, sl@0: {ERR_REASON(RSA_R_N_DOES_NOT_EQUAL_P_Q) ,"n does not equal p q"}, sl@0: {ERR_REASON(RSA_R_OAEP_DECODING_ERROR) ,"oaep decoding error"}, sl@0: {ERR_REASON(RSA_R_SLEN_RECOVERY_FAILED) ,"salt length recovery failed"}, sl@0: {ERR_REASON(RSA_R_PADDING_CHECK_FAILED) ,"padding check failed"}, sl@0: {ERR_REASON(RSA_R_P_NOT_PRIME) ,"p not prime"}, sl@0: {ERR_REASON(RSA_R_Q_NOT_PRIME) ,"q not prime"}, sl@0: {ERR_REASON(RSA_R_RSA_OPERATIONS_NOT_SUPPORTED),"rsa operations not supported"}, sl@0: {ERR_REASON(RSA_R_SSLV3_ROLLBACK_ATTACK) ,"sslv3 rollback attack"}, sl@0: {ERR_REASON(RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD),"the asn1 object identifier is not known for this md"}, sl@0: {ERR_REASON(RSA_R_UNKNOWN_ALGORITHM_TYPE),"unknown algorithm type"}, sl@0: {ERR_REASON(RSA_R_UNKNOWN_PADDING_TYPE) ,"unknown padding type"}, sl@0: {ERR_REASON(RSA_R_WRONG_SIGNATURE_LENGTH),"wrong signature length"}, sl@0: {ERR_REASON(RSA_R_SLEN_CHECK_FAILED) ,"salt length check failed"}, sl@0: {0,NULL} sl@0: }; sl@0: sl@0: #else //EMULATOR sl@0: const ERR_STRING_DATA temp_RSA_str_functs[]= sl@0: { sl@0: {ERR_FUNC(RSA_F_MEMORY_LOCK), "MEMORY_LOCK"}, sl@0: {ERR_FUNC(RSA_F_RSA_BUILTIN_KEYGEN), "RSA_BUILTIN_KEYGEN"}, sl@0: {ERR_FUNC(RSA_F_RSA_CHECK_KEY), "RSA_check_key"}, sl@0: {ERR_FUNC(RSA_F_RSA_EAY_PRIVATE_DECRYPT), "RSA_EAY_PRIVATE_DECRYPT"}, sl@0: {ERR_FUNC(RSA_F_RSA_EAY_PRIVATE_ENCRYPT), "RSA_EAY_PRIVATE_ENCRYPT"}, sl@0: {ERR_FUNC(RSA_F_RSA_EAY_PUBLIC_DECRYPT), "RSA_EAY_PUBLIC_DECRYPT"}, sl@0: {ERR_FUNC(RSA_F_RSA_EAY_PUBLIC_ENCRYPT), "RSA_EAY_PUBLIC_ENCRYPT"}, sl@0: {ERR_FUNC(RSA_F_RSA_GENERATE_KEY), "RSA_generate_key"}, sl@0: {ERR_FUNC(RSA_F_RSA_MEMORY_LOCK), "RSA_memory_lock"}, sl@0: {ERR_FUNC(RSA_F_RSA_NEW_METHOD), "RSA_new_method"}, sl@0: {ERR_FUNC(RSA_F_RSA_NULL), "RSA_NULL"}, sl@0: {ERR_FUNC(RSA_F_RSA_NULL_MOD_EXP), "RSA_NULL_MOD_EXP"}, sl@0: {ERR_FUNC(RSA_F_RSA_NULL_PRIVATE_DECRYPT), "RSA_NULL_PRIVATE_DECRYPT"}, sl@0: {ERR_FUNC(RSA_F_RSA_NULL_PRIVATE_ENCRYPT), "RSA_NULL_PRIVATE_ENCRYPT"}, sl@0: {ERR_FUNC(RSA_F_RSA_NULL_PUBLIC_DECRYPT), "RSA_NULL_PUBLIC_DECRYPT"}, sl@0: {ERR_FUNC(RSA_F_RSA_NULL_PUBLIC_ENCRYPT), "RSA_NULL_PUBLIC_ENCRYPT"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_ADD_NONE), "RSA_padding_add_none"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_ADD_PKCS1_OAEP), "RSA_padding_add_PKCS1_OAEP"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_ADD_PKCS1_PSS), "RSA_padding_add_PKCS1_PSS"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_1), "RSA_padding_add_PKCS1_type_1"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_2), "RSA_padding_add_PKCS1_type_2"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_ADD_SSLV23), "RSA_padding_add_SSLv23"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_ADD_X931), "RSA_padding_add_X931"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_CHECK_NONE), "RSA_padding_check_none"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP), "RSA_padding_check_PKCS1_OAEP"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1), "RSA_padding_check_PKCS1_type_1"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2), "RSA_padding_check_PKCS1_type_2"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_CHECK_SSLV23), "RSA_padding_check_SSLv23"}, sl@0: {ERR_FUNC(RSA_F_RSA_PADDING_CHECK_X931), "RSA_padding_check_X931"}, sl@0: {ERR_FUNC(RSA_F_RSA_PRINT), "RSA_print"}, sl@0: {ERR_FUNC(RSA_F_RSA_PRINT_FP), "RSA_print_fp"}, sl@0: {ERR_FUNC(RSA_F_RSA_SETUP_BLINDING), "RSA_setup_blinding"}, sl@0: {ERR_FUNC(RSA_F_RSA_SIGN), "RSA_sign"}, sl@0: {ERR_FUNC(RSA_F_RSA_SIGN_ASN1_OCTET_STRING), "RSA_sign_ASN1_OCTET_STRING"}, sl@0: {ERR_FUNC(RSA_F_RSA_VERIFY), "RSA_verify"}, sl@0: {ERR_FUNC(RSA_F_RSA_VERIFY_ASN1_OCTET_STRING), "RSA_verify_ASN1_OCTET_STRING"}, sl@0: {ERR_FUNC(RSA_F_RSA_VERIFY_PKCS1_PSS), "RSA_verify_PKCS1_PSS"}, sl@0: {0,NULL} sl@0: }; sl@0: sl@0: const ERR_STRING_DATA temp_RSA_str_reasons[]= sl@0: { sl@0: {ERR_REASON(RSA_R_ALGORITHM_MISMATCH) ,"algorithm mismatch"}, sl@0: {ERR_REASON(RSA_R_BAD_E_VALUE) ,"bad e value"}, sl@0: {ERR_REASON(RSA_R_BAD_FIXED_HEADER_DECRYPT),"bad fixed header decrypt"}, sl@0: {ERR_REASON(RSA_R_BAD_PAD_BYTE_COUNT) ,"bad pad byte count"}, sl@0: {ERR_REASON(RSA_R_BAD_SIGNATURE) ,"bad signature"}, sl@0: {ERR_REASON(RSA_R_BLOCK_TYPE_IS_NOT_01) ,"block type is not 01"}, sl@0: {ERR_REASON(RSA_R_BLOCK_TYPE_IS_NOT_02) ,"block type is not 02"}, sl@0: {ERR_REASON(RSA_R_DATA_GREATER_THAN_MOD_LEN),"data greater than mod len"}, sl@0: {ERR_REASON(RSA_R_DATA_TOO_LARGE) ,"data too large"}, sl@0: {ERR_REASON(RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE),"data too large for key size"}, sl@0: {ERR_REASON(RSA_R_DATA_TOO_LARGE_FOR_MODULUS),"data too large for modulus"}, sl@0: {ERR_REASON(RSA_R_DATA_TOO_SMALL) ,"data too small"}, sl@0: {ERR_REASON(RSA_R_DATA_TOO_SMALL_FOR_KEY_SIZE),"data too small for key size"}, sl@0: {ERR_REASON(RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY),"digest too big for rsa key"}, sl@0: {ERR_REASON(RSA_R_DMP1_NOT_CONGRUENT_TO_D),"dmp1 not congruent to d"}, sl@0: {ERR_REASON(RSA_R_DMQ1_NOT_CONGRUENT_TO_D),"dmq1 not congruent to d"}, sl@0: {ERR_REASON(RSA_R_D_E_NOT_CONGRUENT_TO_1),"d e not congruent to 1"}, sl@0: {ERR_REASON(RSA_R_FIRST_OCTET_INVALID) ,"first octet invalid"}, sl@0: {ERR_REASON(RSA_R_INVALID_HEADER) ,"invalid header"}, sl@0: {ERR_REASON(RSA_R_INVALID_MESSAGE_LENGTH),"invalid message length"}, sl@0: {ERR_REASON(RSA_R_INVALID_PADDING) ,"invalid padding"}, sl@0: {ERR_REASON(RSA_R_INVALID_TRAILER) ,"invalid trailer"}, sl@0: {ERR_REASON(RSA_R_IQMP_NOT_INVERSE_OF_Q) ,"iqmp not inverse of q"}, sl@0: {ERR_REASON(RSA_R_KEY_SIZE_TOO_SMALL) ,"key size too small"}, sl@0: {ERR_REASON(RSA_R_LAST_OCTET_INVALID) ,"last octet invalid"}, sl@0: {ERR_REASON(RSA_R_MODULUS_TOO_LARGE) ,"modulus too large"}, sl@0: {ERR_REASON(RSA_R_NO_PUBLIC_EXPONENT) ,"no public exponent"}, sl@0: {ERR_REASON(RSA_R_NULL_BEFORE_BLOCK_MISSING),"null before block missing"}, sl@0: {ERR_REASON(RSA_R_N_DOES_NOT_EQUAL_P_Q) ,"n does not equal p q"}, sl@0: {ERR_REASON(RSA_R_OAEP_DECODING_ERROR) ,"oaep decoding error"}, sl@0: {ERR_REASON(RSA_R_PADDING_CHECK_FAILED) ,"padding check failed"}, sl@0: {ERR_REASON(RSA_R_P_NOT_PRIME) ,"p not prime"}, sl@0: {ERR_REASON(RSA_R_Q_NOT_PRIME) ,"q not prime"}, sl@0: {ERR_REASON(RSA_R_RSA_OPERATIONS_NOT_SUPPORTED),"rsa operations not supported"}, sl@0: {ERR_REASON(RSA_R_SLEN_CHECK_FAILED) ,"salt length check failed"}, sl@0: {ERR_REASON(RSA_R_SLEN_RECOVERY_FAILED) ,"salt length recovery failed"}, sl@0: {ERR_REASON(RSA_R_SSLV3_ROLLBACK_ATTACK) ,"sslv3 rollback attack"}, sl@0: {ERR_REASON(RSA_R_THE_ASN1_OBJECT_IDENTIFIER_IS_NOT_KNOWN_FOR_THIS_MD),"the asn1 object identifier is not known for this md"}, sl@0: {ERR_REASON(RSA_R_UNKNOWN_ALGORITHM_TYPE),"unknown algorithm type"}, sl@0: {ERR_REASON(RSA_R_UNKNOWN_PADDING_TYPE) ,"unknown padding type"}, sl@0: {ERR_REASON(RSA_R_WRONG_SIGNATURE_LENGTH),"wrong signature length"}, sl@0: {0,NULL} sl@0: }; sl@0: sl@0: GET_STATIC_ARRAY_FROM_TLS(RSA_str_functs,rsa_err,ERR_STRING_DATA) sl@0: GET_STATIC_ARRAY_FROM_TLS(RSA_str_reasons,rsa_err,ERR_STRING_DATA) sl@0: #define RSA_str_functs (GET_WSD_VAR_NAME(RSA_str_functs,rsa_err, s)()) sl@0: #define RSA_str_reasons (GET_WSD_VAR_NAME(RSA_str_reasons,rsa_err, s)()) sl@0: #endif //EMULATOR sl@0: #endif sl@0: sl@0: EXPORT_C void ERR_load_RSA_strings(void) sl@0: { sl@0: #ifndef OPENSSL_NO_ERR sl@0: sl@0: if (ERR_func_error_string(RSA_str_functs[0].error) == NULL) sl@0: { sl@0: ERR_load_strings(0,RSA_str_functs); sl@0: ERR_load_strings(0,RSA_str_reasons); sl@0: } sl@0: #endif sl@0: }