forked from wolfSSL/wolfssl
update const error strings for newly added ones
This commit is contained in:
@@ -32,7 +32,7 @@
|
|||||||
#pragma warning(disable: 4996)
|
#pragma warning(disable: 4996)
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
const char *CTaoCryptGetErrorString(int error)
|
const char* CTaoCryptGetErrorString(int error)
|
||||||
{
|
{
|
||||||
#ifdef NO_ERROR_STRINGS
|
#ifdef NO_ERROR_STRINGS
|
||||||
|
|
||||||
@@ -191,8 +191,7 @@ const char *CTaoCryptGetErrorString(int error)
|
|||||||
return "ASN NTRU key decode error, invalid input";
|
return "ASN NTRU key decode error, invalid input";
|
||||||
|
|
||||||
case ASN_CRIT_EXT_E:
|
case ASN_CRIT_EXT_E:
|
||||||
XSTRNCPY(buffer, "X.509 Critical extension ignored", max);
|
return "X.509 Critical extension ignored";
|
||||||
break;
|
|
||||||
|
|
||||||
case ECC_BAD_ARG_E :
|
case ECC_BAD_ARG_E :
|
||||||
return "ECC input argument wrong type, invalid input";
|
return "ECC input argument wrong type, invalid input";
|
||||||
@@ -261,24 +260,19 @@ const char *CTaoCryptGetErrorString(int error)
|
|||||||
return "Bad padding, message wrong length";
|
return "Bad padding, message wrong length";
|
||||||
|
|
||||||
case REQ_ATTRIBUTE_E:
|
case REQ_ATTRIBUTE_E:
|
||||||
XSTRNCPY(buffer, "Setting cert request attributes error", max);
|
return "Setting cert request attributes error";
|
||||||
break;
|
|
||||||
|
|
||||||
case PKCS7_OID_E:
|
case PKCS7_OID_E:
|
||||||
XSTRNCPY(buffer, "PKCS#7 error: mismatched OID value", max);
|
return "PKCS#7 error: mismatched OID value";
|
||||||
break;
|
|
||||||
|
|
||||||
case PKCS7_RECIP_E:
|
case PKCS7_RECIP_E:
|
||||||
XSTRNCPY(buffer, "PKCS#7 error: no matching recipient found", max);
|
return "PKCS#7 error: no matching recipient found";
|
||||||
break;
|
|
||||||
|
|
||||||
case FIPS_NOT_ALLOWED_E:
|
case FIPS_NOT_ALLOWED_E:
|
||||||
XSTRNCPY(buffer, "FIPS mode not allowed error", max);
|
return "FIPS mode not allowed error";
|
||||||
break;
|
|
||||||
|
|
||||||
case ASN_NAME_INVALID_E:
|
case ASN_NAME_INVALID_E:
|
||||||
XSTRNCPY(buffer, "Name Constraint error", max);
|
return "Name Constraint error";
|
||||||
break;
|
|
||||||
|
|
||||||
default:
|
default:
|
||||||
return "unknown error number";
|
return "unknown error number";
|
||||||
|
@@ -130,7 +130,7 @@ enum {
|
|||||||
|
|
||||||
|
|
||||||
CYASSL_API void CTaoCryptErrorString(int err, char* buff);
|
CYASSL_API void CTaoCryptErrorString(int err, char* buff);
|
||||||
CYASSL_API const char *CTaoCryptGetErrorString(int error);
|
CYASSL_API const char* CTaoCryptGetErrorString(int error);
|
||||||
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
|
@@ -6206,7 +6206,7 @@ const char* CyaSSL_ERR_reason_error_string(unsigned long e)
|
|||||||
|
|
||||||
#else
|
#else
|
||||||
|
|
||||||
int error = (long) e;
|
int error = (int)e;
|
||||||
|
|
||||||
/* pass to CTaoCrypt */
|
/* pass to CTaoCrypt */
|
||||||
if (error < MAX_CODE_E && error > MIN_CODE_E) {
|
if (error < MAX_CODE_E && error > MIN_CODE_E) {
|
||||||
@@ -6465,16 +6465,13 @@ const char* CyaSSL_ERR_reason_error_string(unsigned long e)
|
|||||||
return "Unrecognized host name Error";
|
return "Unrecognized host name Error";
|
||||||
|
|
||||||
case KEYUSE_SIGNATURE_E:
|
case KEYUSE_SIGNATURE_E:
|
||||||
XSTRNCPY(str, "Key Use digitalSignature not set Error", max);
|
return "Key Use digitalSignature not set Error";
|
||||||
break;
|
|
||||||
|
|
||||||
case KEYUSE_ENCIPHER_E:
|
case KEYUSE_ENCIPHER_E:
|
||||||
XSTRNCPY(str, "Key Use keyEncipherment not set Error", max);
|
return "Key Use keyEncipherment not set Error";
|
||||||
break;
|
|
||||||
|
|
||||||
case EXTKEYUSE_AUTH_E:
|
case EXTKEYUSE_AUTH_E:
|
||||||
XSTRNCPY(str, "Ext Key Use server/client auth not set Error", max);
|
return "Ext Key Use server/client auth not set Error";
|
||||||
break;
|
|
||||||
|
|
||||||
default :
|
default :
|
||||||
return "unknown error number";
|
return "unknown error number";
|
||||||
|
Reference in New Issue
Block a user