mirror of
https://github.com/wiidev/usbloadergx.git
synced 2024-11-14 15:35:09 +01:00
265 lines
13 KiB
C
265 lines
13 KiB
C
/* error-crypt.h
|
|
*
|
|
* Copyright (C) 2006-2021 wolfSSL Inc.
|
|
*
|
|
* This file is part of wolfSSL.
|
|
*
|
|
* wolfSSL is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* wolfSSL is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
|
*/
|
|
|
|
/*!
|
|
\file wolfssl/wolfcrypt/error-crypt.h
|
|
*/
|
|
/*
|
|
DESCRIPTION
|
|
This library defines error codes and contians routines for setting and examining
|
|
the error status.
|
|
*/
|
|
|
|
#ifndef WOLF_CRYPT_ERROR_H
|
|
#define WOLF_CRYPT_ERROR_H
|
|
|
|
#include <libs/libwolfssl/wolfcrypt/types.h>
|
|
|
|
#if defined(HAVE_FIPS) && \
|
|
(!defined(HAVE_FIPS_VERSION) || (HAVE_FIPS_VERSION < 2))
|
|
#include <cyassl/ctaocrypt/error-crypt.h>
|
|
#endif /* HAVE_FIPS V1 */
|
|
|
|
#ifdef __cplusplus
|
|
extern "C" {
|
|
#endif
|
|
|
|
|
|
/* error codes, add string for new errors !!! */
|
|
enum {
|
|
MAX_CODE_E = -100, /* errors -101 - -299 */
|
|
OPEN_RAN_E = -101, /* opening random device error */
|
|
READ_RAN_E = -102, /* reading random device error */
|
|
WINCRYPT_E = -103, /* windows crypt init error */
|
|
CRYPTGEN_E = -104, /* windows crypt generation error */
|
|
RAN_BLOCK_E = -105, /* reading random device would block */
|
|
BAD_MUTEX_E = -106, /* Bad mutex operation */
|
|
WC_TIMEOUT_E = -107, /* timeout error */
|
|
WC_PENDING_E = -108, /* wolfCrypt operation pending (would block) */
|
|
WC_NOT_PENDING_E = -109, /* wolfCrypt operation not pending */
|
|
|
|
MP_INIT_E = -110, /* mp_init error state */
|
|
MP_READ_E = -111, /* mp_read error state */
|
|
MP_EXPTMOD_E = -112, /* mp_exptmod error state */
|
|
MP_TO_E = -113, /* mp_to_xxx error state, can't convert */
|
|
MP_SUB_E = -114, /* mp_sub error state, can't subtract */
|
|
MP_ADD_E = -115, /* mp_add error state, can't add */
|
|
MP_MUL_E = -116, /* mp_mul error state, can't multiply */
|
|
MP_MULMOD_E = -117, /* mp_mulmod error state, can't multiply mod */
|
|
MP_MOD_E = -118, /* mp_mod error state, can't mod */
|
|
MP_INVMOD_E = -119, /* mp_invmod error state, can't inv mod */
|
|
MP_CMP_E = -120, /* mp_cmp error state */
|
|
MP_ZERO_E = -121, /* got a mp zero result, not expected */
|
|
|
|
MEMORY_E = -125, /* out of memory error */
|
|
VAR_STATE_CHANGE_E = -126, /* var state modified by different thread */
|
|
|
|
RSA_WRONG_TYPE_E = -130, /* RSA wrong block type for RSA function */
|
|
RSA_BUFFER_E = -131, /* RSA buffer error, output too small or
|
|
input too large */
|
|
BUFFER_E = -132, /* output buffer too small or input too large */
|
|
ALGO_ID_E = -133, /* setting algo id error */
|
|
PUBLIC_KEY_E = -134, /* setting public key error */
|
|
DATE_E = -135, /* setting date validity error */
|
|
SUBJECT_E = -136, /* setting subject name error */
|
|
ISSUER_E = -137, /* setting issuer name error */
|
|
CA_TRUE_E = -138, /* setting CA basic constraint true error */
|
|
EXTENSIONS_E = -139, /* setting extensions error */
|
|
|
|
ASN_PARSE_E = -140, /* ASN parsing error, invalid input */
|
|
ASN_VERSION_E = -141, /* ASN version error, invalid number */
|
|
ASN_GETINT_E = -142, /* ASN get big int error, invalid data */
|
|
ASN_RSA_KEY_E = -143, /* ASN key init error, invalid input */
|
|
ASN_OBJECT_ID_E = -144, /* ASN object id error, invalid id */
|
|
ASN_TAG_NULL_E = -145, /* ASN tag error, not null */
|
|
ASN_EXPECT_0_E = -146, /* ASN expect error, not zero */
|
|
ASN_BITSTR_E = -147, /* ASN bit string error, wrong id */
|
|
ASN_UNKNOWN_OID_E = -148, /* ASN oid error, unknown sum id */
|
|
ASN_DATE_SZ_E = -149, /* ASN date error, bad size */
|
|
ASN_BEFORE_DATE_E = -150, /* ASN date error, current date before */
|
|
ASN_AFTER_DATE_E = -151, /* ASN date error, current date after */
|
|
ASN_SIG_OID_E = -152, /* ASN signature error, mismatched oid */
|
|
ASN_TIME_E = -153, /* ASN time error, unknown time type */
|
|
ASN_INPUT_E = -154, /* ASN input error, not enough data */
|
|
ASN_SIG_CONFIRM_E = -155, /* ASN sig error, confirm failure */
|
|
ASN_SIG_HASH_E = -156, /* ASN sig error, unsupported hash type */
|
|
ASN_SIG_KEY_E = -157, /* ASN sig error, unsupported key type */
|
|
ASN_DH_KEY_E = -158, /* ASN key init error, invalid input */
|
|
ASN_NTRU_KEY_E = -159, /* ASN ntru key decode error, invalid input */
|
|
ASN_CRIT_EXT_E = -160, /* ASN unsupported critical extension */
|
|
ASN_ALT_NAME_E = -161, /* ASN alternate name error */
|
|
ASN_NO_PEM_HEADER = -162, /* ASN no PEM header found */
|
|
|
|
ECC_BAD_ARG_E = -170, /* ECC input argument of wrong type */
|
|
ASN_ECC_KEY_E = -171, /* ASN ECC bad input */
|
|
ECC_CURVE_OID_E = -172, /* Unsupported ECC OID curve type */
|
|
BAD_FUNC_ARG = -173, /* Bad function argument provided */
|
|
NOT_COMPILED_IN = -174, /* Feature not compiled in */
|
|
UNICODE_SIZE_E = -175, /* Unicode password too big */
|
|
NO_PASSWORD = -176, /* no password provided by user */
|
|
ALT_NAME_E = -177, /* alt name size problem, too big */
|
|
BAD_OCSP_RESPONDER = -178, /* missing key usage extensions */
|
|
|
|
AES_GCM_AUTH_E = -180, /* AES-GCM Authentication check failure */
|
|
AES_CCM_AUTH_E = -181, /* AES-CCM Authentication check failure */
|
|
|
|
ASYNC_INIT_E = -182, /* Async Init type error */
|
|
|
|
COMPRESS_INIT_E = -183, /* Compress init error */
|
|
COMPRESS_E = -184, /* Compress error */
|
|
DECOMPRESS_INIT_E = -185, /* DeCompress init error */
|
|
DECOMPRESS_E = -186, /* DeCompress error */
|
|
|
|
BAD_ALIGN_E = -187, /* Bad alignment for operation, no alloc */
|
|
ASN_NO_SIGNER_E = -188, /* ASN no signer to confirm failure */
|
|
ASN_CRL_CONFIRM_E = -189, /* ASN CRL signature confirm failure */
|
|
ASN_CRL_NO_SIGNER_E = -190, /* ASN CRL no signer to confirm failure */
|
|
ASN_OCSP_CONFIRM_E = -191, /* ASN OCSP signature confirm failure */
|
|
|
|
BAD_STATE_E = -192, /* Bad state operation */
|
|
BAD_PADDING_E = -193, /* Bad padding, msg not correct length */
|
|
|
|
REQ_ATTRIBUTE_E = -194, /* setting cert request attributes error */
|
|
|
|
PKCS7_OID_E = -195, /* PKCS#7, mismatched OID error */
|
|
PKCS7_RECIP_E = -196, /* PKCS#7, recipient error */
|
|
FIPS_NOT_ALLOWED_E = -197, /* FIPS not allowed error */
|
|
ASN_NAME_INVALID_E = -198, /* ASN name constraint error */
|
|
|
|
RNG_FAILURE_E = -199, /* RNG Failed, Reinitialize */
|
|
HMAC_MIN_KEYLEN_E = -200, /* FIPS Mode HMAC Minimum Key Length error */
|
|
RSA_PAD_E = -201, /* RSA Padding Error */
|
|
LENGTH_ONLY_E = -202, /* Returning output length only */
|
|
|
|
IN_CORE_FIPS_E = -203, /* In Core Integrity check failure */
|
|
AES_KAT_FIPS_E = -204, /* AES KAT failure */
|
|
DES3_KAT_FIPS_E = -205, /* DES3 KAT failure */
|
|
HMAC_KAT_FIPS_E = -206, /* HMAC KAT failure */
|
|
RSA_KAT_FIPS_E = -207, /* RSA KAT failure */
|
|
DRBG_KAT_FIPS_E = -208, /* HASH DRBG KAT failure */
|
|
DRBG_CONT_FIPS_E = -209, /* HASH DRBG Continuous test failure */
|
|
AESGCM_KAT_FIPS_E = -210, /* AESGCM KAT failure */
|
|
THREAD_STORE_KEY_E = -211, /* Thread local storage key create failure */
|
|
THREAD_STORE_SET_E = -212, /* Thread local storage key set failure */
|
|
|
|
MAC_CMP_FAILED_E = -213, /* MAC comparison failed */
|
|
IS_POINT_E = -214, /* ECC is point on curve failed */
|
|
ECC_INF_E = -215, /* ECC point infinity error */
|
|
ECC_PRIV_KEY_E = -216, /* ECC private key not valid error */
|
|
ECC_OUT_OF_RANGE_E = -217, /* ECC key component out of range */
|
|
|
|
SRP_CALL_ORDER_E = -218, /* SRP function called in the wrong order. */
|
|
SRP_VERIFY_E = -219, /* SRP proof verification failed. */
|
|
SRP_BAD_KEY_E = -220, /* SRP bad ephemeral values. */
|
|
|
|
ASN_NO_SKID = -221, /* ASN no Subject Key Identifier found */
|
|
ASN_NO_AKID = -222, /* ASN no Authority Key Identifier found */
|
|
ASN_NO_KEYUSAGE = -223, /* ASN no Key Usage found */
|
|
SKID_E = -224, /* setting Subject Key Identifier error */
|
|
AKID_E = -225, /* setting Authority Key Identifier error */
|
|
KEYUSAGE_E = -226, /* Bad Key Usage value */
|
|
CERTPOLICIES_E = -227, /* setting Certificate Policies error */
|
|
|
|
WC_INIT_E = -228, /* wolfcrypt failed to initialize */
|
|
SIG_VERIFY_E = -229, /* wolfcrypt signature verify error */
|
|
BAD_COND_E = -230, /* Bad condition variable operation */
|
|
SIG_TYPE_E = -231, /* Signature Type not enabled/available */
|
|
HASH_TYPE_E = -232, /* Hash Type not enabled/available */
|
|
|
|
WC_KEY_SIZE_E = -234, /* Key size error, either too small or large */
|
|
ASN_COUNTRY_SIZE_E = -235, /* ASN Cert Gen, invalid country code size */
|
|
MISSING_RNG_E = -236, /* RNG required but not provided */
|
|
ASN_PATHLEN_SIZE_E = -237, /* ASN CA path length too large error */
|
|
ASN_PATHLEN_INV_E = -238, /* ASN CA path length inversion error */
|
|
|
|
BAD_KEYWRAP_ALG_E = -239,
|
|
BAD_KEYWRAP_IV_E = -240, /* Decrypted AES key wrap IV incorrect */
|
|
WC_CLEANUP_E = -241, /* wolfcrypt cleanup failed */
|
|
ECC_CDH_KAT_FIPS_E = -242, /* ECC CDH Known Answer Test failure */
|
|
DH_CHECK_PUB_E = -243, /* DH Check Pub Key error */
|
|
BAD_PATH_ERROR = -244, /* Bad path for opendir */
|
|
|
|
ASYNC_OP_E = -245, /* Async operation error */
|
|
|
|
ECC_PRIVATEONLY_E = -246, /* Invalid use of private only ECC key*/
|
|
EXTKEYUSAGE_E = -247, /* Bad Extended Key Usage value */
|
|
WC_HW_E = -248, /* Error with hardware crypto use */
|
|
WC_HW_WAIT_E = -249, /* Hardware waiting on resource */
|
|
|
|
PSS_SALTLEN_E = -250, /* PSS length of salt is too long for hash */
|
|
PRIME_GEN_E = -251, /* Failure finding a prime. */
|
|
BER_INDEF_E = -252, /* Cannot decode indefinite length BER. */
|
|
RSA_OUT_OF_RANGE_E = -253, /* Ciphertext to decrypt out of range. */
|
|
RSAPSS_PAT_FIPS_E = -254, /* RSA-PSS PAT failure */
|
|
ECDSA_PAT_FIPS_E = -255, /* ECDSA PAT failure */
|
|
DH_KAT_FIPS_E = -256, /* DH KAT failure */
|
|
AESCCM_KAT_FIPS_E = -257, /* AESCCM KAT failure */
|
|
SHA3_KAT_FIPS_E = -258, /* SHA-3 KAT failure */
|
|
ECDHE_KAT_FIPS_E = -259, /* ECDHE KAT failure */
|
|
AES_GCM_OVERFLOW_E = -260, /* AES-GCM invocation counter overflow. */
|
|
AES_CCM_OVERFLOW_E = -261, /* AES-CCM invocation counter overflow. */
|
|
RSA_KEY_PAIR_E = -262, /* RSA Key Pair-Wise Consistency check fail. */
|
|
DH_CHECK_PRIV_E = -263, /* DH Check Priv Key error */
|
|
|
|
WC_AFALG_SOCK_E = -264, /* AF_ALG socket error */
|
|
WC_DEVCRYPTO_E = -265, /* /dev/crypto error */
|
|
|
|
ZLIB_INIT_ERROR = -266, /* zlib init error */
|
|
ZLIB_COMPRESS_ERROR = -267, /* zlib compression error */
|
|
ZLIB_DECOMPRESS_ERROR = -268, /* zlib decompression error */
|
|
|
|
PKCS7_NO_SIGNER_E = -269, /* No signer in PKCS#7 signed data msg */
|
|
WC_PKCS7_WANT_READ_E= -270, /* PKCS7 operations wants more input */
|
|
|
|
CRYPTOCB_UNAVAILABLE= -271, /* Crypto callback unavailable */
|
|
PKCS7_SIGNEEDS_CHECK= -272, /* signature needs verified by caller */
|
|
PSS_SALTLEN_RECOVER_E=-273, /* PSS slat length not recoverable */
|
|
CHACHA_POLY_OVERFLOW =-274, /* ChaCha20Poly1305 limit overflow */
|
|
ASN_SELF_SIGNED_E = -275, /* ASN self-signed certificate error */
|
|
SAKKE_VERIFY_FAIL_E = -276, /* SAKKE derivation verification error */
|
|
MISSING_IV = -277, /* IV was not set */
|
|
MISSING_KEY = -278, /* Key was not set */
|
|
BAD_LENGTH_E = -279, /* Value of length parameter is invalid. */
|
|
|
|
WC_LAST_E = -279, /* Update this to indicate last error */
|
|
MIN_CODE_E = -300 /* errors -101 - -299 */
|
|
|
|
/* add new companion error id strings for any new error codes
|
|
wolfcrypt/src/error.c !!! */
|
|
};
|
|
|
|
|
|
#ifdef NO_ERROR_STRINGS
|
|
#define wc_GetErrorString(error) "no support for error strings built in"
|
|
#define wc_ErrorString(err, buf) \
|
|
(void)err; XSTRNCPY((buf), wc_GetErrorString((err)), \
|
|
WOLFSSL_MAX_ERROR_SZ);
|
|
|
|
#else
|
|
WOLFSSL_API void wc_ErrorString(int err, char* buff);
|
|
WOLFSSL_API const char* wc_GetErrorString(int error);
|
|
#endif
|
|
|
|
#ifdef __cplusplus
|
|
} /* extern "C" */
|
|
#endif
|
|
#endif /* WOLF_CRYPT_ERROR_H */
|