Coverage Report

Created: 2025-11-07 06:58

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/providers/implementations/ciphers/cipher_chacha20_poly1305.inc
Line
Count
Source
1
/*
2
 * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the \"License\").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
12
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
13
#ifndef chacha20_poly1305_get_ctx_params_list
14
static const OSSL_PARAM chacha20_poly1305_get_ctx_params_list[] = {
15
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL),
16
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL),
17
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_AEAD_TAGLEN, NULL),
18
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TAG, NULL, 0),
19
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_AEAD_TLS1_AAD_PAD, NULL),
20
    OSSL_PARAM_END
21
};
22
#endif
23
24
#ifndef chacha20_poly1305_get_ctx_params_st
25
struct chacha20_poly1305_get_ctx_params_st {
26
    OSSL_PARAM *ivlen;
27
    OSSL_PARAM *keylen;
28
    OSSL_PARAM *pad;
29
    OSSL_PARAM *tag;
30
    OSSL_PARAM *taglen;
31
};
32
#endif
33
34
#ifndef chacha20_poly1305_get_ctx_params_decoder
35
static int chacha20_poly1305_get_ctx_params_decoder
36
    (const OSSL_PARAM *p, struct chacha20_poly1305_get_ctx_params_st *r)
37
0
{
38
0
    const char *s;
39
40
0
    memset(r, 0, sizeof(*r));
41
0
    if (p != NULL)
42
0
        for (; (s = p->key) != NULL; p++)
43
0
            switch(s[0]) {
44
0
            default:
45
0
                break;
46
0
            case 'i':
47
0
                if (ossl_likely(strcmp("vlen", s + 1) == 0)) {
48
                    /* OSSL_CIPHER_PARAM_IVLEN */
49
0
                    if (ossl_unlikely(r->ivlen != NULL)) {
50
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
51
0
                                       "param %s is repeated", s);
52
0
                        return 0;
53
0
                    }
54
0
                    r->ivlen = (OSSL_PARAM *)p;
55
0
                }
56
0
                break;
57
0
            case 'k':
58
0
                if (ossl_likely(strcmp("eylen", s + 1) == 0)) {
59
                    /* OSSL_CIPHER_PARAM_KEYLEN */
60
0
                    if (ossl_unlikely(r->keylen != NULL)) {
61
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
62
0
                                       "param %s is repeated", s);
63
0
                        return 0;
64
0
                    }
65
0
                    r->keylen = (OSSL_PARAM *)p;
66
0
                }
67
0
                break;
68
0
            case 't':
69
0
                switch(s[1]) {
70
0
                default:
71
0
                    break;
72
0
                case 'a':
73
0
                    switch(s[2]) {
74
0
                    default:
75
0
                        break;
76
0
                    case 'g':
77
0
                        switch(s[3]) {
78
0
                        default:
79
0
                            break;
80
0
                        case 'l':
81
0
                            if (ossl_likely(strcmp("en", s + 4) == 0)) {
82
                                /* OSSL_CIPHER_PARAM_AEAD_TAGLEN */
83
0
                                if (ossl_unlikely(r->taglen != NULL)) {
84
0
                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
85
0
                                                   "param %s is repeated", s);
86
0
                                    return 0;
87
0
                                }
88
0
                                r->taglen = (OSSL_PARAM *)p;
89
0
                            }
90
0
                            break;
91
0
                        case '\0':
92
0
                            if (ossl_unlikely(r->tag != NULL)) {
93
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
94
0
                                               "param %s is repeated", s);
95
0
                                return 0;
96
0
                            }
97
0
                            r->tag = (OSSL_PARAM *)p;
98
0
                        }
99
0
                    }
100
0
                    break;
101
0
                case 'l':
102
0
                    if (ossl_likely(strcmp("saadpad", s + 2) == 0)) {
103
                        /* OSSL_CIPHER_PARAM_AEAD_TLS1_AAD_PAD */
104
0
                        if (ossl_unlikely(r->pad != NULL)) {
105
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
106
0
                                           "param %s is repeated", s);
107
0
                            return 0;
108
0
                        }
109
0
                        r->pad = (OSSL_PARAM *)p;
110
0
                    }
111
0
                }
112
0
            }
113
0
    return 1;
114
0
}
115
#endif
116
/* End of machine generated */
117
118
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
119
#ifndef chacha20_poly1305_set_ctx_params_list
120
static const OSSL_PARAM chacha20_poly1305_set_ctx_params_list[] = {
121
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_KEYLEN, NULL),
122
    OSSL_PARAM_size_t(OSSL_CIPHER_PARAM_IVLEN, NULL),
123
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TAG, NULL, 0),
124
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TLS1_AAD, NULL, 0),
125
    OSSL_PARAM_octet_string(OSSL_CIPHER_PARAM_AEAD_TLS1_IV_FIXED, NULL, 0),
126
    OSSL_PARAM_END
127
};
128
#endif
129
130
#ifndef chacha20_poly1305_set_ctx_params_st
131
struct chacha20_poly1305_set_ctx_params_st {
132
    OSSL_PARAM *aad;
133
    OSSL_PARAM *fixed;
134
    OSSL_PARAM *ivlen;
135
    OSSL_PARAM *keylen;
136
    OSSL_PARAM *tag;
137
};
138
#endif
139
140
#ifndef chacha20_poly1305_set_ctx_params_decoder
141
static int chacha20_poly1305_set_ctx_params_decoder
142
    (const OSSL_PARAM *p, struct chacha20_poly1305_set_ctx_params_st *r)
143
0
{
144
0
    const char *s;
145
146
0
    memset(r, 0, sizeof(*r));
147
0
    if (p != NULL)
148
0
        for (; (s = p->key) != NULL; p++)
149
0
            switch(s[0]) {
150
0
            default:
151
0
                break;
152
0
            case 'i':
153
0
                if (ossl_likely(strcmp("vlen", s + 1) == 0)) {
154
                    /* OSSL_CIPHER_PARAM_IVLEN */
155
0
                    if (ossl_unlikely(r->ivlen != NULL)) {
156
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
157
0
                                       "param %s is repeated", s);
158
0
                        return 0;
159
0
                    }
160
0
                    r->ivlen = (OSSL_PARAM *)p;
161
0
                }
162
0
                break;
163
0
            case 'k':
164
0
                if (ossl_likely(strcmp("eylen", s + 1) == 0)) {
165
                    /* OSSL_CIPHER_PARAM_KEYLEN */
166
0
                    if (ossl_unlikely(r->keylen != NULL)) {
167
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
168
0
                                       "param %s is repeated", s);
169
0
                        return 0;
170
0
                    }
171
0
                    r->keylen = (OSSL_PARAM *)p;
172
0
                }
173
0
                break;
174
0
            case 't':
175
0
                switch(s[1]) {
176
0
                default:
177
0
                    break;
178
0
                case 'a':
179
0
                    if (ossl_likely(strcmp("g", s + 2) == 0)) {
180
                        /* OSSL_CIPHER_PARAM_AEAD_TAG */
181
0
                        if (ossl_unlikely(r->tag != NULL)) {
182
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
183
0
                                           "param %s is repeated", s);
184
0
                            return 0;
185
0
                        }
186
0
                        r->tag = (OSSL_PARAM *)p;
187
0
                    }
188
0
                    break;
189
0
                case 'l':
190
0
                    switch(s[2]) {
191
0
                    default:
192
0
                        break;
193
0
                    case 's':
194
0
                        switch(s[3]) {
195
0
                        default:
196
0
                            break;
197
0
                        case 'a':
198
0
                            if (ossl_likely(strcmp("ad", s + 4) == 0)) {
199
                                /* OSSL_CIPHER_PARAM_AEAD_TLS1_AAD */
200
0
                                if (ossl_unlikely(r->aad != NULL)) {
201
0
                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
202
0
                                                   "param %s is repeated", s);
203
0
                                    return 0;
204
0
                                }
205
0
                                r->aad = (OSSL_PARAM *)p;
206
0
                            }
207
0
                            break;
208
0
                        case 'i':
209
0
                            if (ossl_likely(strcmp("vfixed", s + 4) == 0)) {
210
                                /* OSSL_CIPHER_PARAM_AEAD_TLS1_IV_FIXED */
211
0
                                if (ossl_unlikely(r->fixed != NULL)) {
212
0
                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
213
0
                                                   "param %s is repeated", s);
214
0
                                    return 0;
215
0
                                }
216
0
                                r->fixed = (OSSL_PARAM *)p;
217
0
                            }
218
0
                        }
219
0
                    }
220
0
                }
221
0
            }
222
0
    return 1;
223
0
}
224
#endif
225
/* End of machine generated */