Return Codes for the Big Data Protector

If you are using the Big Data Protector and any failures occur, then the protector throws an exception. The exception consists of an error code and error message. All the possible error codes and error messages are described below.

The following table lists all errors returned from the Core layer that are logged.

CodeErrorError Message
0NONE 
1USER_NOT_FOUNDThe username could not be found in the policy.
2DATA_ELEMENT_NOT_FOUNDThe data element could not be found in the policy.
3PERMISSION_DENIEDThe user does not have the appropriate permissions to perform the requested operation.
4TWEAK_NULLTweak is null.
5INTEGRITY_CHECK_FAILEDIntegrity check failed.
6PROTECT_SUCCESSData protect operation was successful.
7PROTECT_FAILEDData protect operation failed.
8UNPROTECT_SUCCESSData unprotect operation was successful.
9UNPROTECT_FAILEDData unprotect operation failed.
10OK_ACCESSThe user has appropriate permissions to perform the requested operation but no data has been protected/unprotected.
11INACTIVE_KEYID_USEDData unprotect operation was successful with use of an inactive keyid.
12INVALID_PARAMInput is null or not within allowed limits.
13INTERNAL_ERRORInternal error occurring in a function call after the Core Provider has been opened.
14LOAD_KEY_FAILEDFailed to load data encryption key.
15TWEAK_INPUT_TOO_LONGTweak input is too long.
17INIT_FAILEDFailed to initialize the CORE - This is a fatal error
19UNSUPPORTED_TWEAKUnsupported tweak action for the specified FPE data element.
20OUT_OF_MEMORYFailed to allocate memory.
21BUFFER_TOO_SMALLInput or output buffer is too small.
22INPUT_TOO_SHORTData is too short to be protected/unprotected.
23INPUT_TOO_LONGData is too long to be protected/unprotected.
25USERNAME_TOO_LONGUsername too long.
26UNSUPPORTEDUnsupported algorithm or unsupported action for the specific data element.
27APPLICATION_AUTHORIZEDApplication has been authorized.
28APPLICATION_NOT_AUTHORIZEDApplication has not been authorized.
31EMPTY_POLICYPolicy not available.
40LICENSE_EXPIREDNo valid license or current date is beyond the license expiration date.
41METHOD_RESTRICTEDThe use of the protection method is restricted by license.
42LICENSE_INVALIDInvalid license or time is before licensestart.
44INVALID_FORMATThe content of the input data is not valid.
49LOG_UNSUPPORTED_ENCODINGUnsupported input encoding for the specific data element.
50REPROTECT_SUCCESSData reprotect operation was successful.
51LOG_LOG_UNREACHABLEFailed to send logs, connection refused.

The following table lists all the error messages returned from the Core layer that are NOT logged.

CodeErrorError Message
1SUCCESSThe operation was successful.
0FAILEDThe operation failed.
-1INVALID_PARAMETERThe parameter is invalid.
-2EOFThe end of file was reached.
-3BUSYThe operation is already in progress or object already locked.
-4TIMEOUTTime-out waiting for response or operation took too long.
-5ALREADY_EXISTSThe object, such as file, already exists.
-6ACCESS_DENIEDThe permission to access the object was denied.
-7PARSE_ERRORError when parsing contents, e.g. ini file, or user supplied data.
-8NOT_FOUNDThe search operation was not successful.
-9NOT_SUPPORTEDThe operation is not supported.
-10CONNECTION_REFUSEDThe connection was refused.
-11DISCONNECTEDThe connection was disconnected.
-12UNREACHABLEThe Internet link is down or the host is not reachable.
-13ADDRESS_IN_USEThe IP Address or port is already utilized.
-14OUT_OF_MEMORYThe operation to allocate memory failed.
-15CRC_ERRORThe CRC check failed.
-16BUFFER_TOO_SMALLThe buffer size is very small.
-17BAD_REQUESTA malformed message request was received.
-18INVALID_STRING_LENGTHThe input string is too long.
-19INVALID_TYPEThe wrong type was used.
-20READONLY_OBJECTUnable to write to read-only object.
-21SERVICE_FAILEDThe service failed.
-22ALREADY_CONNECTEDThe Administrator is already connected to the server.
-23INVALID_KEYThe key is invalid.
-24INTEGRITY_ERRORThe integrity check failed.
-25LOGIN_FAILEDThe attempt to login failed.
-26NOT_AVAILABLEThe object is not available.
-27NOT_EXISTThe object does not exist.
-28SET_FAILEDThe Set operation failed.
-29GET_FAILEDThe Get operation failed.
-30READ_FAILEDThe Read operation failed.
-31WRITE_FAILEDThe Write operation failed.
-33REWRITE_FAILEDThe Rewrite operation failed.
-34DELETE_FAILEDThe Delete operation failed.
-35UPDATE_FAILEDThe Update operation failed.
-36SIGN_FAILEDThe Sign operation failed.
-37VERIFY_FAILEDThe Verification failed.
-38ENCRYPT_FAILEDThe Encrypt operation failed.
-39DECRYPT_FAILEDThe Decrypt operation failed.
-40REENCRYPT_FAILEDThe Reencrypt operation failed.
-41EXPIREDThe object has expired.
-42REVOKEDThe object has been revoked.
-43INVALID_FORMATThe format is invalid.
-44HASH_FAILEDThe Hash operation failed.
-45NOT_DEFINEDThe property or setting is not defined.
-46NOT_INITIALIZEDThe service requested or function is performed on an object that is not initialized.
-47POLICY_LOCKEDThe Policy is locked for some reason.
-48THROW_EXCEPTIONThe error message is used to convey that an exception should be thrown during decryption.
-49USER_AUTHENTICATION_FAILEDThe Authentication operation failed.
-54INVALID_CARD_TYPEThe credit card number provided does not confirm to the required credit card format.
-55LICENSE_AUDITONLYThe License provided is for the audit functionality and only No Encryption data elements are allowed.
-56NO_VALID_CIPHERSNo valid ciphers were found.
-57NO_VALID_PROTOCOLSNo valid protocols were found.
-61SEND_LOG_FAILEDFailed to send logs to logforwarder.
-201CRYPT_KEY_DATA_ILLEGALThe key data specified is invalid.
-202CRYPT_INTEGRITY_ERRORThe integrity check for the data failed.
-203CRYPT_DATA_LEN_ILLEGALThe data length specified is invalid.
-204CRYPT_LOGIN_FAILUREThe Crypto login failed.
-205CRYPT_CONTEXT_IN_USEAn attempt to close a key being used is made.
-206CRYPT_NO_TOKENThe hardware token is available.
-207CRYPT_OBJECT_EXISTSThe object to be created already exists.
-208CRYPT_OBJECT_MISSINGA request for a non-existing object is made.
-221X509_SET_DATAThe operation to set data in the object failed.
-222X509_GET_DATAThe operation to get data from the object failed.
-223X509_SIGN_OBJECTThe operation to sign the object failed.
-224X509_VERIFY_OBJECTThe verification operation for the object failed.
-231SSL_CERT_EXPIREDThe certificate has expired.
-232SSL_CERT_REVOKEDThe certificate has been revoked.
-233SSL_CERT_UNKNOWNThe Trusted certificate was not found.
-234SSL_CERT_VERIFY_FAILEDThe certificate cound not be verified.
-235SSL_FAILEDA general SSL error occurs.
-241KEY_ID_FORMAT_ERRORThe format on the Key ID is invalid.
-242KEY_CLASS_FORMAT_ERRORThe format on the KeyClass is invalid.
-243KEY_EXPIREDThe key expired.
-250FIPS_MODE_FAILEDThe FIPS mode failed.

Last modified : December 18, 2025