Coverage Report

Created: 2025-12-31 06:58

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl36/providers/implementations/digests/digestcommon.c
Line
Count
Source
1
/*
2
 * Copyright 2019-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
/* clang-format off */
10
11
/* clang-format on */
12
13
#include <string.h>
14
#include <openssl/err.h>
15
#include <openssl/proverr.h>
16
#include "prov/digestcommon.h"
17
#include "internal/common.h"
18
19
/* clang-format off */
20
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
21
#ifndef digest_default_get_params_list
22
static const OSSL_PARAM digest_default_get_params_list[] = {
23
    OSSL_PARAM_size_t(OSSL_DIGEST_PARAM_BLOCK_SIZE, NULL),
24
    OSSL_PARAM_size_t(OSSL_DIGEST_PARAM_SIZE, NULL),
25
    OSSL_PARAM_int(OSSL_DIGEST_PARAM_XOF, NULL),
26
    OSSL_PARAM_int(OSSL_DIGEST_PARAM_ALGID_ABSENT, NULL),
27
    OSSL_PARAM_END
28
};
29
#endif
30
31
#ifndef digest_default_get_params_st
32
struct digest_default_get_params_st {
33
    OSSL_PARAM *aldid;
34
    OSSL_PARAM *bsize;
35
    OSSL_PARAM *size;
36
    OSSL_PARAM *xof;
37
};
38
#endif
39
40
#ifndef digest_default_get_params_decoder
41
static int digest_default_get_params_decoder
42
    (const OSSL_PARAM *p, struct digest_default_get_params_st *r)
43
1.02k
{
44
1.02k
    const char *s;
45
46
1.02k
    memset(r, 0, sizeof(*r));
47
1.02k
    if (p != NULL)
48
5.13k
        for (; (s = p->key) != NULL; p++)
49
4.10k
            switch(s[0]) {
50
0
            default:
51
0
                break;
52
1.02k
            case 'a':
53
1.02k
                if (ossl_likely(strcmp("lgid-absent", s + 1) == 0)) {
54
                    /* OSSL_DIGEST_PARAM_ALGID_ABSENT */
55
1.02k
                    if (ossl_unlikely(r->aldid != NULL)) {
56
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
57
0
                                       "param %s is repeated", s);
58
0
                        return 0;
59
0
                    }
60
1.02k
                    r->aldid = (OSSL_PARAM *)p;
61
1.02k
                }
62
1.02k
                break;
63
1.02k
            case 'b':
64
1.02k
                if (ossl_likely(strcmp("locksize", s + 1) == 0)) {
65
                    /* OSSL_DIGEST_PARAM_BLOCK_SIZE */
66
1.02k
                    if (ossl_unlikely(r->bsize != NULL)) {
67
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
68
0
                                       "param %s is repeated", s);
69
0
                        return 0;
70
0
                    }
71
1.02k
                    r->bsize = (OSSL_PARAM *)p;
72
1.02k
                }
73
1.02k
                break;
74
1.02k
            case 's':
75
1.02k
                if (ossl_likely(strcmp("ize", s + 1) == 0)) {
76
                    /* OSSL_DIGEST_PARAM_SIZE */
77
1.02k
                    if (ossl_unlikely(r->size != NULL)) {
78
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
79
0
                                       "param %s is repeated", s);
80
0
                        return 0;
81
0
                    }
82
1.02k
                    r->size = (OSSL_PARAM *)p;
83
1.02k
                }
84
1.02k
                break;
85
1.02k
            case 'x':
86
1.02k
                if (ossl_likely(strcmp("of", s + 1) == 0)) {
87
                    /* OSSL_DIGEST_PARAM_XOF */
88
1.02k
                    if (ossl_unlikely(r->xof != NULL)) {
89
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
90
0
                                       "param %s is repeated", s);
91
0
                        return 0;
92
0
                    }
93
1.02k
                    r->xof = (OSSL_PARAM *)p;
94
1.02k
                }
95
4.10k
            }
96
1.02k
    return 1;
97
1.02k
}
98
#endif
99
/* End of machine generated */
100
/* clang-format on */
101
102
int ossl_digest_default_get_params(OSSL_PARAM params[], size_t blksz,
103
    size_t paramsz, unsigned long flags)
104
1.02k
{
105
1.02k
    struct digest_default_get_params_st p;
106
107
1.02k
    if (!digest_default_get_params_decoder(params, &p))
108
0
        return 0;
109
110
1.02k
    if (p.bsize != NULL && !OSSL_PARAM_set_size_t(p.bsize, blksz)) {
111
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
112
0
        return 0;
113
0
    }
114
1.02k
    if (p.size != NULL && !OSSL_PARAM_set_size_t(p.size, paramsz)) {
115
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
116
0
        return 0;
117
0
    }
118
1.02k
    if (p.xof != NULL
119
1.02k
        && !OSSL_PARAM_set_int(p.xof, (flags & PROV_DIGEST_FLAG_XOF) != 0)) {
120
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
121
0
        return 0;
122
0
    }
123
1.02k
    if (p.aldid != NULL
124
1.02k
        && !OSSL_PARAM_set_int(p.aldid, (flags & PROV_DIGEST_FLAG_ALGID_ABSENT) != 0)) {
125
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
126
0
        return 0;
127
0
    }
128
1.02k
    return 1;
129
1.02k
}
130
131
const OSSL_PARAM *ossl_digest_default_gettable_params(void *provctx)
132
0
{
133
0
    return digest_default_get_params_list;
134
0
}