/src/openssl36/providers/implementations/include/prov/blake2_params.inc
Line | Count | Source |
1 | | /* |
2 | | * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the Apache License 2.0 (the "License"). You may not use |
5 | | * this file except in compliance with the License. You can obtain a copy |
6 | | * in the file LICENSE in the source distribution or at |
7 | | * https://www.openssl.org/source/license.html |
8 | | */ |
9 | | |
10 | | |
11 | | #include <string.h> |
12 | | #include "internal/common.h" |
13 | | |
14 | | /* Machine generated by util/perl/OpenSSL/paramnames.pm */ |
15 | | #ifndef blake2_get_ctx_list |
16 | | static const OSSL_PARAM blake2_get_ctx_list[] = { |
17 | | OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), |
18 | | OSSL_PARAM_size_t(OSSL_MAC_PARAM_BLOCK_SIZE, NULL), |
19 | | OSSL_PARAM_END |
20 | | }; |
21 | | #endif |
22 | | |
23 | | #ifndef blake2_get_ctx_st |
24 | | struct blake2_get_ctx_st { |
25 | | OSSL_PARAM *bsize; |
26 | | OSSL_PARAM *size; |
27 | | }; |
28 | | #endif |
29 | | |
30 | | #ifndef blake2_get_ctx_decoder |
31 | | static int blake2_get_ctx_decoder |
32 | | (const OSSL_PARAM *p, struct blake2_get_ctx_st *r) |
33 | 2.29k | { |
34 | 2.29k | const char *s; |
35 | | |
36 | 2.29k | memset(r, 0, sizeof(*r)); |
37 | 2.29k | if (p != NULL) |
38 | 4.58k | for (; (s = p->key) != NULL; p++) |
39 | 2.29k | switch(s[0]) { |
40 | 0 | default: |
41 | 0 | break; |
42 | 0 | case 'b': |
43 | 0 | if (ossl_likely(strcmp("lock-size", s + 1) == 0)) { |
44 | | /* OSSL_MAC_PARAM_BLOCK_SIZE */ |
45 | 0 | if (ossl_unlikely(r->bsize != NULL)) { |
46 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
47 | 0 | "param %s is repeated", s); |
48 | 0 | return 0; |
49 | 0 | } |
50 | 0 | r->bsize = (OSSL_PARAM *)p; |
51 | 0 | } |
52 | 0 | break; |
53 | 2.29k | case 's': |
54 | 2.29k | if (ossl_likely(strcmp("ize", s + 1) == 0)) { |
55 | | /* OSSL_MAC_PARAM_SIZE */ |
56 | 2.29k | if (ossl_unlikely(r->size != NULL)) { |
57 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
58 | 0 | "param %s is repeated", s); |
59 | 0 | return 0; |
60 | 0 | } |
61 | 2.29k | r->size = (OSSL_PARAM *)p; |
62 | 2.29k | } |
63 | 2.29k | } |
64 | 2.29k | return 1; |
65 | 2.29k | } blake2b_mac.c:blake2_get_ctx_decoder Line | Count | Source | 33 | 1.21k | { | 34 | 1.21k | const char *s; | 35 | | | 36 | 1.21k | memset(r, 0, sizeof(*r)); | 37 | 1.21k | if (p != NULL) | 38 | 2.43k | for (; (s = p->key) != NULL; p++) | 39 | 1.21k | switch(s[0]) { | 40 | 0 | default: | 41 | 0 | break; | 42 | 0 | case 'b': | 43 | 0 | if (ossl_likely(strcmp("lock-size", s + 1) == 0)) { | 44 | | /* OSSL_MAC_PARAM_BLOCK_SIZE */ | 45 | 0 | if (ossl_unlikely(r->bsize != NULL)) { | 46 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 47 | 0 | "param %s is repeated", s); | 48 | 0 | return 0; | 49 | 0 | } | 50 | 0 | r->bsize = (OSSL_PARAM *)p; | 51 | 0 | } | 52 | 0 | break; | 53 | 1.21k | case 's': | 54 | 1.21k | if (ossl_likely(strcmp("ize", s + 1) == 0)) { | 55 | | /* OSSL_MAC_PARAM_SIZE */ | 56 | 1.21k | if (ossl_unlikely(r->size != NULL)) { | 57 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 58 | 0 | "param %s is repeated", s); | 59 | 0 | return 0; | 60 | 0 | } | 61 | 1.21k | r->size = (OSSL_PARAM *)p; | 62 | 1.21k | } | 63 | 1.21k | } | 64 | 1.21k | return 1; | 65 | 1.21k | } |
blake2s_mac.c:blake2_get_ctx_decoder Line | Count | Source | 33 | 1.07k | { | 34 | 1.07k | const char *s; | 35 | | | 36 | 1.07k | memset(r, 0, sizeof(*r)); | 37 | 1.07k | if (p != NULL) | 38 | 2.15k | for (; (s = p->key) != NULL; p++) | 39 | 1.07k | switch(s[0]) { | 40 | 0 | default: | 41 | 0 | break; | 42 | 0 | case 'b': | 43 | 0 | if (ossl_likely(strcmp("lock-size", s + 1) == 0)) { | 44 | | /* OSSL_MAC_PARAM_BLOCK_SIZE */ | 45 | 0 | if (ossl_unlikely(r->bsize != NULL)) { | 46 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 47 | 0 | "param %s is repeated", s); | 48 | 0 | return 0; | 49 | 0 | } | 50 | 0 | r->bsize = (OSSL_PARAM *)p; | 51 | 0 | } | 52 | 0 | break; | 53 | 1.07k | case 's': | 54 | 1.07k | if (ossl_likely(strcmp("ize", s + 1) == 0)) { | 55 | | /* OSSL_MAC_PARAM_SIZE */ | 56 | 1.07k | if (ossl_unlikely(r->size != NULL)) { | 57 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 58 | 0 | "param %s is repeated", s); | 59 | 0 | return 0; | 60 | 0 | } | 61 | 1.07k | r->size = (OSSL_PARAM *)p; | 62 | 1.07k | } | 63 | 1.07k | } | 64 | 1.07k | return 1; | 65 | 1.07k | } |
|
66 | | #endif |
67 | | /* End of machine generated */ |
68 | | |
69 | | /* Machine generated by util/perl/OpenSSL/paramnames.pm */ |
70 | | #ifndef blake2_mac_set_ctx_list |
71 | | static const OSSL_PARAM blake2_mac_set_ctx_list[] = { |
72 | | OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), |
73 | | OSSL_PARAM_octet_string(OSSL_MAC_PARAM_KEY, NULL, 0), |
74 | | OSSL_PARAM_octet_string(OSSL_MAC_PARAM_CUSTOM, NULL, 0), |
75 | | OSSL_PARAM_octet_string(OSSL_MAC_PARAM_SALT, NULL, 0), |
76 | | OSSL_PARAM_END |
77 | | }; |
78 | | #endif |
79 | | |
80 | | #ifndef blake2_mac_set_ctx_st |
81 | | struct blake2_mac_set_ctx_st { |
82 | | OSSL_PARAM *cust; |
83 | | OSSL_PARAM *key; |
84 | | OSSL_PARAM *salt; |
85 | | OSSL_PARAM *size; |
86 | | }; |
87 | | #endif |
88 | | |
89 | | #ifndef blake2_mac_set_ctx_decoder |
90 | | static int blake2_mac_set_ctx_decoder |
91 | | (const OSSL_PARAM *p, struct blake2_mac_set_ctx_st *r) |
92 | 2.51k | { |
93 | 2.51k | const char *s; |
94 | | |
95 | 2.51k | memset(r, 0, sizeof(*r)); |
96 | 2.51k | if (p != NULL) |
97 | 1.44k | for (; (s = p->key) != NULL; p++) |
98 | 1.15k | switch(s[0]) { |
99 | 32 | default: |
100 | 32 | break; |
101 | 283 | case 'c': |
102 | 283 | if (ossl_likely(strcmp("ustom", s + 1) == 0)) { |
103 | | /* OSSL_MAC_PARAM_CUSTOM */ |
104 | 279 | if (ossl_unlikely(r->cust != NULL)) { |
105 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
106 | 0 | "param %s is repeated", s); |
107 | 0 | return 0; |
108 | 0 | } |
109 | 279 | r->cust = (OSSL_PARAM *)p; |
110 | 279 | } |
111 | 283 | break; |
112 | 283 | case 'k': |
113 | 279 | if (ossl_likely(strcmp("ey", s + 1) == 0)) { |
114 | | /* OSSL_MAC_PARAM_KEY */ |
115 | 279 | if (ossl_unlikely(r->key != NULL)) { |
116 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
117 | 0 | "param %s is repeated", s); |
118 | 0 | return 0; |
119 | 0 | } |
120 | 279 | r->key = (OSSL_PARAM *)p; |
121 | 279 | } |
122 | 279 | break; |
123 | 558 | case 's': |
124 | 558 | switch(s[1]) { |
125 | 0 | default: |
126 | 0 | break; |
127 | 279 | case 'a': |
128 | 279 | if (ossl_likely(strcmp("lt", s + 2) == 0)) { |
129 | | /* OSSL_MAC_PARAM_SALT */ |
130 | 279 | if (ossl_unlikely(r->salt != NULL)) { |
131 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
132 | 0 | "param %s is repeated", s); |
133 | 0 | return 0; |
134 | 0 | } |
135 | 279 | r->salt = (OSSL_PARAM *)p; |
136 | 279 | } |
137 | 279 | break; |
138 | 279 | case 'i': |
139 | 279 | if (ossl_likely(strcmp("ze", s + 2) == 0)) { |
140 | | /* OSSL_MAC_PARAM_SIZE */ |
141 | 279 | if (ossl_unlikely(r->size != NULL)) { |
142 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
143 | 0 | "param %s is repeated", s); |
144 | 0 | return 0; |
145 | 0 | } |
146 | 279 | r->size = (OSSL_PARAM *)p; |
147 | 279 | } |
148 | 558 | } |
149 | 1.15k | } |
150 | 2.51k | return 1; |
151 | 2.51k | } blake2b_mac.c:blake2_mac_set_ctx_decoder Line | Count | Source | 92 | 1.33k | { | 93 | 1.33k | const char *s; | 94 | | | 95 | 1.33k | memset(r, 0, sizeof(*r)); | 96 | 1.33k | if (p != NULL) | 97 | 801 | for (; (s = p->key) != NULL; p++) | 98 | 638 | switch(s[0]) { | 99 | 16 | default: | 100 | 16 | break; | 101 | 157 | case 'c': | 102 | 157 | if (ossl_likely(strcmp("ustom", s + 1) == 0)) { | 103 | | /* OSSL_MAC_PARAM_CUSTOM */ | 104 | 155 | if (ossl_unlikely(r->cust != NULL)) { | 105 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 106 | 0 | "param %s is repeated", s); | 107 | 0 | return 0; | 108 | 0 | } | 109 | 155 | r->cust = (OSSL_PARAM *)p; | 110 | 155 | } | 111 | 157 | break; | 112 | 157 | case 'k': | 113 | 155 | if (ossl_likely(strcmp("ey", s + 1) == 0)) { | 114 | | /* OSSL_MAC_PARAM_KEY */ | 115 | 155 | if (ossl_unlikely(r->key != NULL)) { | 116 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 117 | 0 | "param %s is repeated", s); | 118 | 0 | return 0; | 119 | 0 | } | 120 | 155 | r->key = (OSSL_PARAM *)p; | 121 | 155 | } | 122 | 155 | break; | 123 | 310 | case 's': | 124 | 310 | switch(s[1]) { | 125 | 0 | default: | 126 | 0 | break; | 127 | 155 | case 'a': | 128 | 155 | if (ossl_likely(strcmp("lt", s + 2) == 0)) { | 129 | | /* OSSL_MAC_PARAM_SALT */ | 130 | 155 | if (ossl_unlikely(r->salt != NULL)) { | 131 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 132 | 0 | "param %s is repeated", s); | 133 | 0 | return 0; | 134 | 0 | } | 135 | 155 | r->salt = (OSSL_PARAM *)p; | 136 | 155 | } | 137 | 155 | break; | 138 | 155 | case 'i': | 139 | 155 | if (ossl_likely(strcmp("ze", s + 2) == 0)) { | 140 | | /* OSSL_MAC_PARAM_SIZE */ | 141 | 155 | if (ossl_unlikely(r->size != NULL)) { | 142 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 143 | 0 | "param %s is repeated", s); | 144 | 0 | return 0; | 145 | 0 | } | 146 | 155 | r->size = (OSSL_PARAM *)p; | 147 | 155 | } | 148 | 310 | } | 149 | 638 | } | 150 | 1.33k | return 1; | 151 | 1.33k | } |
blake2s_mac.c:blake2_mac_set_ctx_decoder Line | Count | Source | 92 | 1.17k | { | 93 | 1.17k | const char *s; | 94 | | | 95 | 1.17k | memset(r, 0, sizeof(*r)); | 96 | 1.17k | if (p != NULL) | 97 | 646 | for (; (s = p->key) != NULL; p++) | 98 | 514 | switch(s[0]) { | 99 | 16 | default: | 100 | 16 | break; | 101 | 126 | case 'c': | 102 | 126 | if (ossl_likely(strcmp("ustom", s + 1) == 0)) { | 103 | | /* OSSL_MAC_PARAM_CUSTOM */ | 104 | 124 | if (ossl_unlikely(r->cust != NULL)) { | 105 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 106 | 0 | "param %s is repeated", s); | 107 | 0 | return 0; | 108 | 0 | } | 109 | 124 | r->cust = (OSSL_PARAM *)p; | 110 | 124 | } | 111 | 126 | break; | 112 | 126 | case 'k': | 113 | 124 | if (ossl_likely(strcmp("ey", s + 1) == 0)) { | 114 | | /* OSSL_MAC_PARAM_KEY */ | 115 | 124 | if (ossl_unlikely(r->key != NULL)) { | 116 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 117 | 0 | "param %s is repeated", s); | 118 | 0 | return 0; | 119 | 0 | } | 120 | 124 | r->key = (OSSL_PARAM *)p; | 121 | 124 | } | 122 | 124 | break; | 123 | 248 | case 's': | 124 | 248 | switch(s[1]) { | 125 | 0 | default: | 126 | 0 | break; | 127 | 124 | case 'a': | 128 | 124 | if (ossl_likely(strcmp("lt", s + 2) == 0)) { | 129 | | /* OSSL_MAC_PARAM_SALT */ | 130 | 124 | if (ossl_unlikely(r->salt != NULL)) { | 131 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 132 | 0 | "param %s is repeated", s); | 133 | 0 | return 0; | 134 | 0 | } | 135 | 124 | r->salt = (OSSL_PARAM *)p; | 136 | 124 | } | 137 | 124 | break; | 138 | 124 | case 'i': | 139 | 124 | if (ossl_likely(strcmp("ze", s + 2) == 0)) { | 140 | | /* OSSL_MAC_PARAM_SIZE */ | 141 | 124 | if (ossl_unlikely(r->size != NULL)) { | 142 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 143 | 0 | "param %s is repeated", s); | 144 | 0 | return 0; | 145 | 0 | } | 146 | 124 | r->size = (OSSL_PARAM *)p; | 147 | 124 | } | 148 | 248 | } | 149 | 514 | } | 150 | 1.17k | return 1; | 151 | 1.17k | } |
|
152 | | #endif |
153 | | /* End of machine generated */ |
154 | | |