Coverage Report

Created: 2025-11-11 06:20

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/providers/implementations/kdfs/pbkdf1.inc
Line
Count
Source
1
/*
2
 * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the \"License\").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
12
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
13
#ifndef pbkdf1_set_ctx_params_list
14
static const OSSL_PARAM pbkdf1_set_ctx_params_list[] = {
15
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0),
16
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0),
17
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_PASSWORD, NULL, 0),
18
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0),
19
    OSSL_PARAM_uint64(OSSL_KDF_PARAM_ITER, NULL),
20
    OSSL_PARAM_END
21
};
22
#endif
23
24
#ifndef pbkdf1_set_ctx_params_st
25
struct pbkdf1_set_ctx_params_st {
26
    OSSL_PARAM *digest;
27
    OSSL_PARAM *engine;
28
    OSSL_PARAM *iter;
29
    OSSL_PARAM *propq;
30
    OSSL_PARAM *pw;
31
    OSSL_PARAM *salt;
32
};
33
#endif
34
35
#ifndef pbkdf1_set_ctx_params_decoder
36
static int pbkdf1_set_ctx_params_decoder
37
    (const OSSL_PARAM *p, struct pbkdf1_set_ctx_params_st *r)
38
0
{
39
0
    const char *s;
40
41
0
    memset(r, 0, sizeof(*r));
42
0
    if (p != NULL)
43
0
        for (; (s = p->key) != NULL; p++)
44
0
            switch(s[0]) {
45
0
            default:
46
0
                break;
47
0
            case 'd':
48
0
                if (ossl_likely(strcmp("igest", s + 1) == 0)) {
49
                    /* OSSL_KDF_PARAM_DIGEST */
50
0
                    if (ossl_unlikely(r->digest != NULL)) {
51
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
52
0
                                       "param %s is repeated", s);
53
0
                        return 0;
54
0
                    }
55
0
                    r->digest = (OSSL_PARAM *)p;
56
0
                }
57
0
                break;
58
0
            case 'e':
59
0
                if (ossl_likely(strcmp("ngine", s + 1) == 0)) {
60
                    /* OSSL_ALG_PARAM_ENGINE */
61
0
                    if (ossl_unlikely(r->engine != NULL)) {
62
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
63
0
                                       "param %s is repeated", s);
64
0
                        return 0;
65
0
                    }
66
0
                    r->engine = (OSSL_PARAM *)p;
67
0
                }
68
0
                break;
69
0
            case 'i':
70
0
                if (ossl_likely(strcmp("ter", s + 1) == 0)) {
71
                    /* OSSL_KDF_PARAM_ITER */
72
0
                    if (ossl_unlikely(r->iter != NULL)) {
73
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
74
0
                                       "param %s is repeated", s);
75
0
                        return 0;
76
0
                    }
77
0
                    r->iter = (OSSL_PARAM *)p;
78
0
                }
79
0
                break;
80
0
            case 'p':
81
0
                switch(s[1]) {
82
0
                default:
83
0
                    break;
84
0
                case 'a':
85
0
                    if (ossl_likely(strcmp("ss", s + 2) == 0)) {
86
                        /* OSSL_KDF_PARAM_PASSWORD */
87
0
                        if (ossl_unlikely(r->pw != NULL)) {
88
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
89
0
                                           "param %s is repeated", s);
90
0
                            return 0;
91
0
                        }
92
0
                        r->pw = (OSSL_PARAM *)p;
93
0
                    }
94
0
                    break;
95
0
                case 'r':
96
0
                    if (ossl_likely(strcmp("operties", s + 2) == 0)) {
97
                        /* OSSL_KDF_PARAM_PROPERTIES */
98
0
                        if (ossl_unlikely(r->propq != NULL)) {
99
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
100
0
                                           "param %s is repeated", s);
101
0
                            return 0;
102
0
                        }
103
0
                        r->propq = (OSSL_PARAM *)p;
104
0
                    }
105
0
                }
106
0
                break;
107
0
            case 's':
108
0
                if (ossl_likely(strcmp("alt", s + 1) == 0)) {
109
                    /* OSSL_KDF_PARAM_SALT */
110
0
                    if (ossl_unlikely(r->salt != NULL)) {
111
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
112
0
                                       "param %s is repeated", s);
113
0
                        return 0;
114
0
                    }
115
0
                    r->salt = (OSSL_PARAM *)p;
116
0
                }
117
0
            }
118
0
    return 1;
119
0
}
120
#endif
121
/* End of machine generated */
122
123
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
124
#ifndef pbkdf1_get_ctx_params_list
125
static const OSSL_PARAM pbkdf1_get_ctx_params_list[] = {
126
    OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL),
127
    OSSL_PARAM_END
128
};
129
#endif
130
131
#ifndef pbkdf1_get_ctx_params_st
132
struct pbkdf1_get_ctx_params_st {
133
    OSSL_PARAM *size;
134
};
135
#endif
136
137
#ifndef pbkdf1_get_ctx_params_decoder
138
static int pbkdf1_get_ctx_params_decoder
139
    (const OSSL_PARAM *p, struct pbkdf1_get_ctx_params_st *r)
140
0
{
141
0
    const char *s;
142
143
0
    memset(r, 0, sizeof(*r));
144
0
    if (p != NULL)
145
0
        for (; (s = p->key) != NULL; p++)
146
0
            if (ossl_likely(strcmp("size", s + 0) == 0)) {
147
                /* OSSL_KDF_PARAM_SIZE */
148
0
                if (ossl_unlikely(r->size != NULL)) {
149
0
                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
150
0
                                   "param %s is repeated", s);
151
0
                    return 0;
152
0
                }
153
0
                r->size = (OSSL_PARAM *)p;
154
0
            }
155
0
    return 1;
156
0
}
157
#endif
158
/* End of machine generated */