Coverage Report

Created: 2025-12-31 06:58

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl36/providers/implementations/rands/drbg_hash.c
Line
Count
Source
1
/*
2
 * Copyright 2011-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
/* clang-format off */
10
11
/* clang-format on */
12
13
#include <assert.h>
14
#include <stdlib.h>
15
#include <string.h>
16
#include <openssl/sha.h>
17
#include <openssl/crypto.h>
18
#include <openssl/err.h>
19
#include <openssl/rand.h>
20
#include <openssl/core_dispatch.h>
21
#include <openssl/proverr.h>
22
#include "internal/cryptlib.h"
23
#include "internal/thread_once.h"
24
#include "prov/providercommon.h"
25
#include "prov/provider_ctx.h"
26
#include "prov/provider_util.h"
27
#include "prov/implementations.h"
28
#include "prov/drbg.h"
29
#include "crypto/evp.h"
30
#include "crypto/evp/evp_local.h"
31
#include "internal/provider.h"
32
33
static OSSL_FUNC_rand_newctx_fn drbg_hash_new_wrapper;
34
static OSSL_FUNC_rand_freectx_fn drbg_hash_free;
35
static OSSL_FUNC_rand_instantiate_fn drbg_hash_instantiate_wrapper;
36
static OSSL_FUNC_rand_uninstantiate_fn drbg_hash_uninstantiate_wrapper;
37
static OSSL_FUNC_rand_generate_fn drbg_hash_generate_wrapper;
38
static OSSL_FUNC_rand_reseed_fn drbg_hash_reseed_wrapper;
39
static OSSL_FUNC_rand_settable_ctx_params_fn drbg_hash_settable_ctx_params;
40
static OSSL_FUNC_rand_set_ctx_params_fn drbg_hash_set_ctx_params;
41
static OSSL_FUNC_rand_gettable_ctx_params_fn drbg_hash_gettable_ctx_params;
42
static OSSL_FUNC_rand_get_ctx_params_fn drbg_hash_get_ctx_params;
43
static OSSL_FUNC_rand_verify_zeroization_fn drbg_hash_verify_zeroization;
44
45
static int drbg_hash_set_ctx_params_locked(PROV_DRBG *drbg, const struct drbg_set_ctx_params_st *p);
46
static int drbg_hash_set_ctx_params_decoder(const OSSL_PARAM params[],
47
    struct drbg_set_ctx_params_st *p);
48
49
/* 888 bits from SP800-90Ar1 10.1 table 2 */
50
355
#define HASH_PRNG_MAX_SEEDLEN (888 / 8)
51
52
/* 440 bits from SP800-90Ar1 10.1 table 2 */
53
131
#define HASH_PRNG_SMALL_SEEDLEN (440 / 8)
54
55
/* Determine what seedlen to use based on the block length */
56
186
#define MAX_BLOCKLEN_USING_SMALL_SEEDLEN (256 / 8)
57
1.27k
#define INBYTE_IGNORE ((unsigned char)0xFF)
58
59
typedef struct rand_drbg_hash_st {
60
    PROV_DIGEST digest;
61
    EVP_MD_CTX *ctx;
62
    size_t blocklen;
63
    unsigned char V[HASH_PRNG_MAX_SEEDLEN];
64
    unsigned char C[HASH_PRNG_MAX_SEEDLEN];
65
    /* Temporary value storage: should always exceed max digest length */
66
    unsigned char vtmp[HASH_PRNG_MAX_SEEDLEN];
67
} PROV_DRBG_HASH;
68
69
/*
70
 * SP800-90Ar1 10.3.1 Derivation function using a Hash Function (Hash_df).
71
 * The input string used is composed of:
72
 *    inbyte - An optional leading byte (ignore if equal to INBYTE_IGNORE)
73
 *    in - input string 1 (A Non NULL value).
74
 *    in2 - optional input string (Can be NULL).
75
 *    in3 - optional input string (Can be NULL).
76
 *    These are concatenated as part of the DigestUpdate process.
77
 */
78
static int hash_df(PROV_DRBG *drbg, unsigned char *out,
79
    const unsigned char inbyte,
80
    const unsigned char *in, size_t inlen,
81
    const unsigned char *in2, size_t in2len,
82
    const unsigned char *in3, size_t in3len)
83
1.03k
{
84
1.03k
    PROV_DRBG_HASH *hash = (PROV_DRBG_HASH *)drbg->data;
85
1.03k
    EVP_MD_CTX *ctx = hash->ctx;
86
1.03k
    unsigned char *vtmp = hash->vtmp;
87
    /* tmp = counter || num_bits_returned || [inbyte] */
88
1.03k
    unsigned char tmp[1 + 4 + 1];
89
1.03k
    int tmp_sz = 0;
90
1.03k
    size_t outlen = drbg->seedlen;
91
1.03k
    size_t num_bits_returned = outlen * 8;
92
    /*
93
     * No need to check outlen size here, as the standard only ever needs
94
     * seedlen bytes which is always less than the maximum permitted.
95
     */
96
97
    /* (Step 3) counter = 1 (tmp[0] is the 8 bit counter) */
98
1.03k
    tmp[tmp_sz++] = 1;
99
    /* tmp[1..4] is the fixed 32 bit no_of_bits_to_return */
100
1.03k
    tmp[tmp_sz++] = (unsigned char)((num_bits_returned >> 24) & 0xff);
101
1.03k
    tmp[tmp_sz++] = (unsigned char)((num_bits_returned >> 16) & 0xff);
102
1.03k
    tmp[tmp_sz++] = (unsigned char)((num_bits_returned >> 8) & 0xff);
103
1.03k
    tmp[tmp_sz++] = (unsigned char)(num_bits_returned & 0xff);
104
    /* Tack the additional input byte onto the end of tmp if it exists */
105
1.03k
    if (inbyte != INBYTE_IGNORE)
106
792
        tmp[tmp_sz++] = inbyte;
107
108
    /* (Step 4) */
109
3.05k
    for (;;) {
110
        /*
111
         * (Step 4.1) out = out || Hash(tmp || in || [in2] || [in3])
112
         *            (where tmp = counter || num_bits_returned || [inbyte])
113
         */
114
3.05k
        if (!(EVP_DigestInit_ex(ctx, ossl_prov_digest_md(&hash->digest), NULL)
115
3.05k
                && EVP_DigestUpdate(ctx, tmp, tmp_sz)
116
3.05k
                && EVP_DigestUpdate(ctx, in, inlen)
117
3.05k
                && (in2 == NULL || EVP_DigestUpdate(ctx, in2, in2len))
118
3.05k
                && (in3 == NULL || EVP_DigestUpdate(ctx, in3, in3len))))
119
0
            return 0;
120
121
3.05k
        if (outlen < hash->blocklen) {
122
1.03k
            if (!EVP_DigestFinal(ctx, vtmp, NULL))
123
0
                return 0;
124
1.03k
            memcpy(out, vtmp, outlen);
125
1.03k
            OPENSSL_cleanse(vtmp, hash->blocklen);
126
1.03k
            break;
127
2.01k
        } else if (!EVP_DigestFinal(ctx, out, NULL)) {
128
0
            return 0;
129
0
        }
130
131
2.01k
        outlen -= hash->blocklen;
132
2.01k
        if (outlen == 0)
133
0
            break;
134
        /* (Step 4.2) counter++ */
135
2.01k
        tmp[0]++;
136
2.01k
        out += hash->blocklen;
137
2.01k
    }
138
1.03k
    return 1;
139
1.03k
}
140
141
/* Helper function that just passes 2 input parameters to hash_df() */
142
static int hash_df1(PROV_DRBG *drbg, unsigned char *out,
143
    const unsigned char in_byte,
144
    const unsigned char *in1, size_t in1len)
145
517
{
146
517
    return hash_df(drbg, out, in_byte, in1, in1len, NULL, 0, NULL, 0);
147
517
}
148
149
/*
150
 * Add 2 byte buffers together. The first elements in each buffer are the top
151
 * most bytes. The result is stored in the dst buffer.
152
 * The final carry is ignored i.e: dst =  (dst + in) mod (2^seedlen_bits).
153
 * where dst size is drbg->seedlen, and inlen <= drbg->seedlen.
154
 */
155
static int add_bytes(PROV_DRBG *drbg, unsigned char *dst,
156
    unsigned char *in, size_t inlen)
157
39.9k
{
158
39.9k
    size_t i;
159
39.9k
    int result;
160
39.9k
    const unsigned char *add;
161
39.9k
    unsigned char carry = 0, *d;
162
163
39.9k
    assert(drbg->seedlen >= 1 && inlen >= 1 && inlen <= drbg->seedlen);
164
165
39.9k
    d = &dst[drbg->seedlen - 1];
166
39.9k
    add = &in[inlen - 1];
167
168
104k
    for (i = inlen; i > 0; i--, d--, add--) {
169
65.0k
        result = *d + *add + carry;
170
65.0k
        carry = (unsigned char)(result >> 8);
171
65.0k
        *d = (unsigned char)(result & 0xff);
172
65.0k
    }
173
174
39.9k
    if (carry != 0) {
175
        /* Add the carry to the top of the dst if inlen is not the same size */
176
396
        for (i = drbg->seedlen - inlen; i > 0; --i, d--) {
177
274
            *d += 1; /* Carry can only be 1 */
178
274
            if (*d != 0) /* exit if carry doesn't propagate to the next byte */
179
273
                break;
180
274
        }
181
395
    }
182
39.9k
    return 1;
183
39.9k
}
184
185
/* V = (V + Hash(inbyte || V  || [additional_input]) mod (2^seedlen) */
186
static int add_hash_to_v(PROV_DRBG *drbg, unsigned char inbyte,
187
    const unsigned char *adin, size_t adinlen)
188
242
{
189
242
    PROV_DRBG_HASH *hash = (PROV_DRBG_HASH *)drbg->data;
190
242
    EVP_MD_CTX *ctx = hash->ctx;
191
192
242
    return EVP_DigestInit_ex(ctx, ossl_prov_digest_md(&hash->digest), NULL)
193
242
        && EVP_DigestUpdate(ctx, &inbyte, 1)
194
242
        && EVP_DigestUpdate(ctx, hash->V, drbg->seedlen)
195
242
        && (adin == NULL || EVP_DigestUpdate(ctx, adin, adinlen))
196
242
        && EVP_DigestFinal(ctx, hash->vtmp, NULL)
197
242
        && add_bytes(drbg, hash->V, hash->vtmp, hash->blocklen);
198
242
}
199
200
/*
201
 * The Hashgen() as listed in SP800-90Ar1 10.1.1.4 Hash_DRBG_Generate_Process.
202
 *
203
 * drbg contains the current value of V.
204
 * outlen is the requested number of bytes.
205
 * out is a buffer to return the generated bits.
206
 *
207
 * The algorithm to generate the bits is:
208
 *     data = V
209
 *     w = NULL
210
 *     for (i = 1 to m) {
211
 *        W = W || Hash(data)
212
 *        data = (data + 1) mod (2^seedlen)
213
 *     }
214
 *     out = Leftmost(W, outlen)
215
 *
216
 * Returns zero if an error occurs otherwise it returns 1.
217
 */
218
static int hash_gen(PROV_DRBG *drbg, unsigned char *out, size_t outlen)
219
242
{
220
242
    PROV_DRBG_HASH *hash = (PROV_DRBG_HASH *)drbg->data;
221
242
    unsigned char one = 1;
222
223
242
    if (outlen == 0)
224
0
        return 1;
225
242
    memcpy(hash->vtmp, hash->V, drbg->seedlen);
226
39.4k
    for (;;) {
227
39.4k
        if (!EVP_DigestInit_ex(hash->ctx, ossl_prov_digest_md(&hash->digest),
228
39.4k
                NULL)
229
39.4k
            || !EVP_DigestUpdate(hash->ctx, hash->vtmp, drbg->seedlen))
230
0
            return 0;
231
232
39.4k
        if (outlen < hash->blocklen) {
233
117
            if (!EVP_DigestFinal(hash->ctx, hash->vtmp, NULL))
234
0
                return 0;
235
117
            memcpy(out, hash->vtmp, outlen);
236
117
            return 1;
237
39.3k
        } else {
238
39.3k
            if (!EVP_DigestFinal(hash->ctx, out, NULL))
239
0
                return 0;
240
39.3k
            outlen -= hash->blocklen;
241
39.3k
            if (outlen == 0)
242
125
                break;
243
39.1k
            out += hash->blocklen;
244
39.1k
        }
245
39.1k
        add_bytes(drbg, hash->vtmp, &one, 1);
246
39.1k
    }
247
125
    return 1;
248
242
}
249
250
/*
251
 * SP800-90Ar1 10.1.1.2 Hash_DRBG_Instantiate_Process:
252
 *
253
 * ent is entropy input obtained from a randomness source of length ent_len.
254
 * nonce is a string of bytes of length nonce_len.
255
 * pstr is a personalization string received from an application. May be NULL.
256
 *
257
 * Returns zero if an error occurs otherwise it returns 1.
258
 */
259
static int drbg_hash_instantiate(PROV_DRBG *drbg,
260
    const unsigned char *ent, size_t ent_len,
261
    const unsigned char *nonce, size_t nonce_len,
262
    const unsigned char *pstr, size_t pstr_len)
263
242
{
264
242
    PROV_DRBG_HASH *hash = (PROV_DRBG_HASH *)drbg->data;
265
266
242
    EVP_MD_CTX_free(hash->ctx);
267
242
    hash->ctx = EVP_MD_CTX_new();
268
269
    /* (Step 1-3) V = Hash_df(entropy||nonce||pers, seedlen) */
270
242
    return hash->ctx != NULL
271
242
        && hash_df(drbg, hash->V, INBYTE_IGNORE,
272
242
            ent, ent_len, nonce, nonce_len, pstr, pstr_len)
273
        /* (Step 4) C = Hash_df(0x00||V, seedlen) */
274
242
        && hash_df1(drbg, hash->C, 0x00, hash->V, drbg->seedlen);
275
242
}
276
277
static int drbg_hash_instantiate_wrapper(void *vdrbg, unsigned int strength,
278
    int prediction_resistance,
279
    const unsigned char *pstr,
280
    size_t pstr_len,
281
    const OSSL_PARAM params[])
282
0
{
283
0
    PROV_DRBG *drbg = (PROV_DRBG *)vdrbg;
284
0
    struct drbg_set_ctx_params_st p;
285
0
    int ret = 0;
286
287
0
    if (drbg == NULL || !drbg_hash_set_ctx_params_decoder(params, &p))
288
0
        return 0;
289
290
0
    if (drbg->lock != NULL && !CRYPTO_THREAD_write_lock(drbg->lock))
291
0
        return 0;
292
293
0
    if (!ossl_prov_is_running()
294
0
        || !drbg_hash_set_ctx_params_locked(drbg, &p))
295
0
        goto err;
296
0
    ret = ossl_prov_drbg_instantiate(drbg, strength, prediction_resistance,
297
0
        pstr, pstr_len);
298
0
err:
299
0
    if (drbg->lock != NULL)
300
0
        CRYPTO_THREAD_unlock(drbg->lock);
301
0
    return ret;
302
0
}
303
304
/*
305
 * SP800-90Ar1 10.1.1.3 Hash_DRBG_Reseed_Process:
306
 *
307
 * ent is entropy input bytes obtained from a randomness source.
308
 * addin is additional input received from an application. May be NULL.
309
 *
310
 * Returns zero if an error occurs otherwise it returns 1.
311
 */
312
static int drbg_hash_reseed(PROV_DRBG *drbg,
313
    const unsigned char *ent, size_t ent_len,
314
    const unsigned char *adin, size_t adin_len)
315
275
{
316
275
    PROV_DRBG_HASH *hash = (PROV_DRBG_HASH *)drbg->data;
317
318
    /* (Step 1-2) V = Hash_df(0x01 || V || entropy_input || additional_input) */
319
    /* V about to be updated so use C as output instead */
320
275
    if (!hash_df(drbg, hash->C, 0x01, hash->V, drbg->seedlen, ent, ent_len,
321
275
            adin, adin_len))
322
0
        return 0;
323
275
    memcpy(hash->V, hash->C, drbg->seedlen);
324
    /* (Step 4) C = Hash_df(0x00||V, seedlen) */
325
275
    return hash_df1(drbg, hash->C, 0x00, hash->V, drbg->seedlen);
326
275
}
327
328
static int drbg_hash_reseed_wrapper(void *vdrbg, int prediction_resistance,
329
    const unsigned char *ent, size_t ent_len,
330
    const unsigned char *adin, size_t adin_len)
331
242
{
332
242
    PROV_DRBG *drbg = (PROV_DRBG *)vdrbg;
333
334
242
    return ossl_prov_drbg_reseed(drbg, prediction_resistance, ent, ent_len,
335
242
        adin, adin_len);
336
242
}
337
338
/*
339
 * SP800-90Ar1 10.1.1.4 Hash_DRBG_Generate_Process:
340
 *
341
 * Generates pseudo random bytes using the drbg.
342
 * out is a buffer to fill with outlen bytes of pseudo random data.
343
 * addin is additional input received from an application. May be NULL.
344
 *
345
 * Returns zero if an error occurs otherwise it returns 1.
346
 */
347
static int drbg_hash_generate(PROV_DRBG *drbg,
348
    unsigned char *out, size_t outlen,
349
    const unsigned char *adin, size_t adin_len)
350
242
{
351
242
    PROV_DRBG_HASH *hash = (PROV_DRBG_HASH *)drbg->data;
352
242
    unsigned char counter[4];
353
242
    int reseed_counter = drbg->generate_counter;
354
355
242
    counter[0] = (unsigned char)((reseed_counter >> 24) & 0xff);
356
242
    counter[1] = (unsigned char)((reseed_counter >> 16) & 0xff);
357
242
    counter[2] = (unsigned char)((reseed_counter >> 8) & 0xff);
358
242
    counter[3] = (unsigned char)(reseed_counter & 0xff);
359
360
242
    return hash->ctx != NULL
361
242
        && (adin == NULL
362
            /* (Step 2) if adin != NULL then V = V + Hash(0x02||V||adin) */
363
0
            || adin_len == 0
364
0
            || add_hash_to_v(drbg, 0x02, adin, adin_len))
365
        /* (Step 3) Hashgen(outlen, V) */
366
242
        && hash_gen(drbg, out, outlen)
367
        /* (Step 4/5) H = V = (V + Hash(0x03||V) mod (2^seedlen_bits) */
368
242
        && add_hash_to_v(drbg, 0x03, NULL, 0)
369
        /* (Step 5) V = (V + H + C + reseed_counter) mod (2^seedlen_bits) */
370
        /* V = (V + C) mod (2^seedlen_bits) */
371
242
        && add_bytes(drbg, hash->V, hash->C, drbg->seedlen)
372
        /* V = (V + reseed_counter) mod (2^seedlen_bits) */
373
242
        && add_bytes(drbg, hash->V, counter, 4);
374
242
}
375
376
static int drbg_hash_generate_wrapper(void *vdrbg, unsigned char *out, size_t outlen, unsigned int strength,
377
    int prediction_resistance, const unsigned char *adin, size_t adin_len)
378
242
{
379
242
    PROV_DRBG *drbg = (PROV_DRBG *)vdrbg;
380
381
242
    return ossl_prov_drbg_generate(drbg, out, outlen, strength,
382
242
        prediction_resistance, adin, adin_len);
383
242
}
384
385
static int drbg_hash_uninstantiate(PROV_DRBG *drbg)
386
0
{
387
0
    PROV_DRBG_HASH *hash = (PROV_DRBG_HASH *)drbg->data;
388
389
0
    OPENSSL_cleanse(hash->V, sizeof(hash->V));
390
0
    OPENSSL_cleanse(hash->C, sizeof(hash->C));
391
0
    OPENSSL_cleanse(hash->vtmp, sizeof(hash->vtmp));
392
0
    return ossl_prov_drbg_uninstantiate(drbg);
393
0
}
394
395
static int drbg_hash_uninstantiate_wrapper(void *vdrbg)
396
0
{
397
0
    PROV_DRBG *drbg = (PROV_DRBG *)vdrbg;
398
0
    int ret;
399
400
0
    if (drbg->lock != NULL && !CRYPTO_THREAD_write_lock(drbg->lock))
401
0
        return 0;
402
403
0
    ret = drbg_hash_uninstantiate(drbg);
404
405
0
    if (drbg->lock != NULL)
406
0
        CRYPTO_THREAD_unlock(drbg->lock);
407
408
0
    return ret;
409
0
}
410
411
static int drbg_hash_verify_zeroization(void *vdrbg)
412
0
{
413
0
    PROV_DRBG *drbg = (PROV_DRBG *)vdrbg;
414
0
    PROV_DRBG_HASH *hash = (PROV_DRBG_HASH *)drbg->data;
415
0
    int ret = 0;
416
417
0
    if (drbg->lock != NULL && !CRYPTO_THREAD_read_lock(drbg->lock))
418
0
        return 0;
419
420
0
    PROV_DRBG_VERIFY_ZEROIZATION(hash->V);
421
0
    PROV_DRBG_VERIFY_ZEROIZATION(hash->C);
422
0
    PROV_DRBG_VERIFY_ZEROIZATION(hash->vtmp);
423
424
0
    ret = 1;
425
0
err:
426
0
    if (drbg->lock != NULL)
427
0
        CRYPTO_THREAD_unlock(drbg->lock);
428
0
    return ret;
429
0
}
430
431
static int drbg_hash_new(PROV_DRBG *ctx)
432
300
{
433
300
    PROV_DRBG_HASH *hash;
434
435
300
    hash = OPENSSL_secure_zalloc(sizeof(*hash));
436
300
    if (hash == NULL)
437
0
        return 0;
438
439
300
    OSSL_FIPS_IND_INIT(ctx)
440
441
300
    ctx->data = hash;
442
300
    ctx->seedlen = HASH_PRNG_MAX_SEEDLEN;
443
300
    ctx->max_entropylen = DRBG_MAX_LENGTH;
444
300
    ctx->max_noncelen = DRBG_MAX_LENGTH;
445
300
    ctx->max_perslen = DRBG_MAX_LENGTH;
446
300
    ctx->max_adinlen = DRBG_MAX_LENGTH;
447
448
    /* Maximum number of bits per request = 2^19  = 2^16 bytes */
449
300
    ctx->max_request = 1 << 16;
450
300
    return 1;
451
300
}
452
453
static void *drbg_hash_new_wrapper(void *provctx, void *parent,
454
    const OSSL_DISPATCH *parent_dispatch)
455
300
{
456
300
    return ossl_rand_drbg_new(provctx, parent, parent_dispatch,
457
300
        &drbg_hash_new, &drbg_hash_free,
458
300
        &drbg_hash_instantiate, &drbg_hash_uninstantiate,
459
300
        &drbg_hash_reseed, &drbg_hash_generate);
460
300
}
461
462
static void drbg_hash_free(void *vdrbg)
463
300
{
464
300
    PROV_DRBG *drbg = (PROV_DRBG *)vdrbg;
465
300
    PROV_DRBG_HASH *hash;
466
467
300
    if (drbg != NULL && (hash = (PROV_DRBG_HASH *)drbg->data) != NULL) {
468
300
        EVP_MD_CTX_free(hash->ctx);
469
300
        ossl_prov_digest_reset(&hash->digest);
470
300
        OPENSSL_secure_clear_free(hash, sizeof(*hash));
471
300
    }
472
300
    ossl_rand_drbg_free(drbg);
473
300
}
474
475
#define drbg_hash_get_ctx_params_st drbg_get_ctx_params_st
476
477
/* clang-format off */
478
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
479
#ifndef drbg_hash_get_ctx_params_list
480
static const OSSL_PARAM drbg_hash_get_ctx_params_list[] = {
481
    OSSL_PARAM_utf8_string(OSSL_DRBG_PARAM_DIGEST, NULL, 0),
482
    OSSL_PARAM_int(OSSL_RAND_PARAM_STATE, NULL),
483
    OSSL_PARAM_uint(OSSL_RAND_PARAM_STRENGTH, NULL),
484
    OSSL_PARAM_size_t(OSSL_RAND_PARAM_MAX_REQUEST, NULL),
485
    OSSL_PARAM_size_t(OSSL_DRBG_PARAM_MIN_ENTROPYLEN, NULL),
486
    OSSL_PARAM_size_t(OSSL_DRBG_PARAM_MAX_ENTROPYLEN, NULL),
487
    OSSL_PARAM_size_t(OSSL_DRBG_PARAM_MIN_NONCELEN, NULL),
488
    OSSL_PARAM_size_t(OSSL_DRBG_PARAM_MAX_NONCELEN, NULL),
489
    OSSL_PARAM_size_t(OSSL_DRBG_PARAM_MAX_PERSLEN, NULL),
490
    OSSL_PARAM_size_t(OSSL_DRBG_PARAM_MAX_ADINLEN, NULL),
491
    OSSL_PARAM_uint(OSSL_DRBG_PARAM_RESEED_COUNTER, NULL),
492
    OSSL_PARAM_time_t(OSSL_DRBG_PARAM_RESEED_TIME, NULL),
493
    OSSL_PARAM_uint(OSSL_DRBG_PARAM_RESEED_REQUESTS, NULL),
494
    OSSL_PARAM_uint64(OSSL_DRBG_PARAM_RESEED_TIME_INTERVAL, NULL),
495
# if defined(FIPS_MODULE)
496
    OSSL_PARAM_int(OSSL_KDF_PARAM_FIPS_APPROVED_INDICATOR, NULL),
497
# endif
498
    OSSL_PARAM_END
499
};
500
#endif
501
502
#ifndef drbg_hash_get_ctx_params_st
503
struct drbg_hash_get_ctx_params_st {
504
    OSSL_PARAM *digest;
505
# if defined(FIPS_MODULE)
506
    OSSL_PARAM *ind;
507
# endif
508
    OSSL_PARAM *maxadlen;
509
    OSSL_PARAM *maxentlen;
510
    OSSL_PARAM *maxnonlen;
511
    OSSL_PARAM *maxperlen;
512
    OSSL_PARAM *maxreq;
513
    OSSL_PARAM *minentlen;
514
    OSSL_PARAM *minnonlen;
515
    OSSL_PARAM *reseed_cnt;
516
    OSSL_PARAM *reseed_int;
517
    OSSL_PARAM *reseed_req;
518
    OSSL_PARAM *reseed_time;
519
    OSSL_PARAM *state;
520
    OSSL_PARAM *str;
521
};
522
#endif
523
524
#ifndef drbg_hash_get_ctx_params_decoder
525
static int drbg_hash_get_ctx_params_decoder
526
    (const OSSL_PARAM *p, struct drbg_hash_get_ctx_params_st *r)
527
139
{
528
139
    const char *s;
529
530
139
    memset(r, 0, sizeof(*r));
531
139
    if (p != NULL)
532
278
        for (; (s = p->key) != NULL; p++)
533
139
            switch(s[0]) {
534
0
            default:
535
0
                break;
536
0
            case 'd':
537
0
                if (ossl_likely(strcmp("igest", s + 1) == 0)) {
538
                    /* OSSL_DRBG_PARAM_DIGEST */
539
0
                    if (ossl_unlikely(r->digest != NULL)) {
540
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
541
0
                                       "param %s is repeated", s);
542
0
                        return 0;
543
0
                    }
544
0
                    r->digest = (OSSL_PARAM *)p;
545
0
                }
546
0
                break;
547
0
            case 'f':
548
# if defined(FIPS_MODULE)
549
                if (ossl_likely(strcmp("ips-indicator", s + 1) == 0)) {
550
                    /* OSSL_KDF_PARAM_FIPS_APPROVED_INDICATOR */
551
                    if (ossl_unlikely(r->ind != NULL)) {
552
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
553
                                       "param %s is repeated", s);
554
                        return 0;
555
                    }
556
                    r->ind = (OSSL_PARAM *)p;
557
                }
558
# endif
559
0
                break;
560
139
            case 'm':
561
139
                switch(s[1]) {
562
0
                default:
563
0
                    break;
564
139
                case 'a':
565
139
                    switch(s[2]) {
566
0
                    default:
567
0
                        break;
568
139
                    case 'x':
569
139
                        switch(s[3]) {
570
0
                        default:
571
0
                            break;
572
139
                        case '_':
573
139
                            switch(s[4]) {
574
0
                            default:
575
0
                                break;
576
0
                            case 'a':
577
0
                                if (ossl_likely(strcmp("dinlen", s + 5) == 0)) {
578
                                    /* OSSL_DRBG_PARAM_MAX_ADINLEN */
579
0
                                    if (ossl_unlikely(r->maxadlen != NULL)) {
580
0
                                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
581
0
                                                       "param %s is repeated", s);
582
0
                                        return 0;
583
0
                                    }
584
0
                                    r->maxadlen = (OSSL_PARAM *)p;
585
0
                                }
586
0
                                break;
587
0
                            case 'e':
588
0
                                if (ossl_likely(strcmp("ntropylen", s + 5) == 0)) {
589
                                    /* OSSL_DRBG_PARAM_MAX_ENTROPYLEN */
590
0
                                    if (ossl_unlikely(r->maxentlen != NULL)) {
591
0
                                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
592
0
                                                       "param %s is repeated", s);
593
0
                                        return 0;
594
0
                                    }
595
0
                                    r->maxentlen = (OSSL_PARAM *)p;
596
0
                                }
597
0
                                break;
598
0
                            case 'n':
599
0
                                if (ossl_likely(strcmp("oncelen", s + 5) == 0)) {
600
                                    /* OSSL_DRBG_PARAM_MAX_NONCELEN */
601
0
                                    if (ossl_unlikely(r->maxnonlen != NULL)) {
602
0
                                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
603
0
                                                       "param %s is repeated", s);
604
0
                                        return 0;
605
0
                                    }
606
0
                                    r->maxnonlen = (OSSL_PARAM *)p;
607
0
                                }
608
0
                                break;
609
0
                            case 'p':
610
0
                                if (ossl_likely(strcmp("erslen", s + 5) == 0)) {
611
                                    /* OSSL_DRBG_PARAM_MAX_PERSLEN */
612
0
                                    if (ossl_unlikely(r->maxperlen != NULL)) {
613
0
                                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
614
0
                                                       "param %s is repeated", s);
615
0
                                        return 0;
616
0
                                    }
617
0
                                    r->maxperlen = (OSSL_PARAM *)p;
618
0
                                }
619
0
                                break;
620
139
                            case 'r':
621
139
                                if (ossl_likely(strcmp("equest", s + 5) == 0)) {
622
                                    /* OSSL_RAND_PARAM_MAX_REQUEST */
623
139
                                    if (ossl_unlikely(r->maxreq != NULL)) {
624
0
                                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
625
0
                                                       "param %s is repeated", s);
626
0
                                        return 0;
627
0
                                    }
628
139
                                    r->maxreq = (OSSL_PARAM *)p;
629
139
                                }
630
139
                            }
631
139
                        }
632
139
                    }
633
139
                    break;
634
139
                case 'i':
635
0
                    switch(s[2]) {
636
0
                    default:
637
0
                        break;
638
0
                    case 'n':
639
0
                        switch(s[3]) {
640
0
                        default:
641
0
                            break;
642
0
                        case '_':
643
0
                            switch(s[4]) {
644
0
                            default:
645
0
                                break;
646
0
                            case 'e':
647
0
                                if (ossl_likely(strcmp("ntropylen", s + 5) == 0)) {
648
                                    /* OSSL_DRBG_PARAM_MIN_ENTROPYLEN */
649
0
                                    if (ossl_unlikely(r->minentlen != NULL)) {
650
0
                                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
651
0
                                                       "param %s is repeated", s);
652
0
                                        return 0;
653
0
                                    }
654
0
                                    r->minentlen = (OSSL_PARAM *)p;
655
0
                                }
656
0
                                break;
657
0
                            case 'n':
658
0
                                if (ossl_likely(strcmp("oncelen", s + 5) == 0)) {
659
                                    /* OSSL_DRBG_PARAM_MIN_NONCELEN */
660
0
                                    if (ossl_unlikely(r->minnonlen != NULL)) {
661
0
                                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
662
0
                                                       "param %s is repeated", s);
663
0
                                        return 0;
664
0
                                    }
665
0
                                    r->minnonlen = (OSSL_PARAM *)p;
666
0
                                }
667
0
                            }
668
0
                        }
669
0
                    }
670
139
                }
671
139
                break;
672
139
            case 'r':
673
0
                switch(s[1]) {
674
0
                default:
675
0
                    break;
676
0
                case 'e':
677
0
                    switch(s[2]) {
678
0
                    default:
679
0
                        break;
680
0
                    case 's':
681
0
                        switch(s[3]) {
682
0
                        default:
683
0
                            break;
684
0
                        case 'e':
685
0
                            switch(s[4]) {
686
0
                            default:
687
0
                                break;
688
0
                            case 'e':
689
0
                                switch(s[5]) {
690
0
                                default:
691
0
                                    break;
692
0
                                case 'd':
693
0
                                    switch(s[6]) {
694
0
                                    default:
695
0
                                        break;
696
0
                                    case '_':
697
0
                                        switch(s[7]) {
698
0
                                        default:
699
0
                                            break;
700
0
                                        case 'c':
701
0
                                            if (ossl_likely(strcmp("ounter", s + 8) == 0)) {
702
                                                /* OSSL_DRBG_PARAM_RESEED_COUNTER */
703
0
                                                if (ossl_unlikely(r->reseed_cnt != NULL)) {
704
0
                                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
705
0
                                                                   "param %s is repeated", s);
706
0
                                                    return 0;
707
0
                                                }
708
0
                                                r->reseed_cnt = (OSSL_PARAM *)p;
709
0
                                            }
710
0
                                            break;
711
0
                                        case 'r':
712
0
                                            if (ossl_likely(strcmp("equests", s + 8) == 0)) {
713
                                                /* OSSL_DRBG_PARAM_RESEED_REQUESTS */
714
0
                                                if (ossl_unlikely(r->reseed_req != NULL)) {
715
0
                                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
716
0
                                                                   "param %s is repeated", s);
717
0
                                                    return 0;
718
0
                                                }
719
0
                                                r->reseed_req = (OSSL_PARAM *)p;
720
0
                                            }
721
0
                                            break;
722
0
                                        case 't':
723
0
                                            switch(s[8]) {
724
0
                                            default:
725
0
                                                break;
726
0
                                            case 'i':
727
0
                                                switch(s[9]) {
728
0
                                                default:
729
0
                                                    break;
730
0
                                                case 'm':
731
0
                                                    switch(s[10]) {
732
0
                                                    default:
733
0
                                                        break;
734
0
                                                    case 'e':
735
0
                                                        switch(s[11]) {
736
0
                                                        default:
737
0
                                                            break;
738
0
                                                        case '_':
739
0
                                                            if (ossl_likely(strcmp("interval", s + 12) == 0)) {
740
                                                                /* OSSL_DRBG_PARAM_RESEED_TIME_INTERVAL */
741
0
                                                                if (ossl_unlikely(r->reseed_int != NULL)) {
742
0
                                                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
743
0
                                                                                   "param %s is repeated", s);
744
0
                                                                    return 0;
745
0
                                                                }
746
0
                                                                r->reseed_int = (OSSL_PARAM *)p;
747
0
                                                            }
748
0
                                                            break;
749
0
                                                        case '\0':
750
0
                                                            if (ossl_unlikely(r->reseed_time != NULL)) {
751
0
                                                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
752
0
                                                                               "param %s is repeated", s);
753
0
                                                                return 0;
754
0
                                                            }
755
0
                                                            r->reseed_time = (OSSL_PARAM *)p;
756
0
                                                        }
757
0
                                                    }
758
0
                                                }
759
0
                                            }
760
0
                                        }
761
0
                                    }
762
0
                                }
763
0
                            }
764
0
                        }
765
0
                    }
766
0
                }
767
0
                break;
768
0
            case 's':
769
0
                switch(s[1]) {
770
0
                default:
771
0
                    break;
772
0
                case 't':
773
0
                    switch(s[2]) {
774
0
                    default:
775
0
                        break;
776
0
                    case 'a':
777
0
                        if (ossl_likely(strcmp("te", s + 3) == 0)) {
778
                            /* OSSL_RAND_PARAM_STATE */
779
0
                            if (ossl_unlikely(r->state != NULL)) {
780
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
781
0
                                               "param %s is repeated", s);
782
0
                                return 0;
783
0
                            }
784
0
                            r->state = (OSSL_PARAM *)p;
785
0
                        }
786
0
                        break;
787
0
                    case 'r':
788
0
                        if (ossl_likely(strcmp("ength", s + 3) == 0)) {
789
                            /* OSSL_RAND_PARAM_STRENGTH */
790
0
                            if (ossl_unlikely(r->str != NULL)) {
791
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
792
0
                                               "param %s is repeated", s);
793
0
                                return 0;
794
0
                            }
795
0
                            r->str = (OSSL_PARAM *)p;
796
0
                        }
797
0
                    }
798
0
                }
799
139
            }
800
139
    return 1;
801
139
}
802
#endif
803
/* End of machine generated */
804
/* clang-format on */
805
806
static int drbg_hash_get_ctx_params(void *vdrbg, OSSL_PARAM params[])
807
139
{
808
139
    PROV_DRBG *drbg = (PROV_DRBG *)vdrbg;
809
139
    PROV_DRBG_HASH *hash;
810
139
    const EVP_MD *md;
811
139
    struct drbg_get_ctx_params_st p;
812
139
    int ret = 0, complete = 0;
813
814
139
    if (drbg == NULL || !drbg_hash_get_ctx_params_decoder(params, &p))
815
0
        return 0;
816
817
139
    if (!ossl_drbg_get_ctx_params_no_lock(drbg, &p, params, &complete))
818
0
        return 0;
819
820
139
    if (complete)
821
139
        return 1;
822
823
0
    hash = (PROV_DRBG_HASH *)drbg->data;
824
825
0
    if (drbg->lock != NULL && !CRYPTO_THREAD_read_lock(drbg->lock))
826
0
        return 0;
827
828
0
    if (p.digest != NULL) {
829
0
        md = ossl_prov_digest_md(&hash->digest);
830
0
        if (md == NULL
831
0
            || !OSSL_PARAM_set_utf8_string(p.digest, EVP_MD_get0_name(md)))
832
0
            goto err;
833
0
    }
834
835
0
    ret = ossl_drbg_get_ctx_params(drbg, &p);
836
0
err:
837
0
    if (drbg->lock != NULL)
838
0
        CRYPTO_THREAD_unlock(drbg->lock);
839
840
0
    return ret;
841
0
}
842
843
static const OSSL_PARAM *drbg_hash_gettable_ctx_params(ossl_unused void *vctx,
844
    ossl_unused void *p_ctx)
845
0
{
846
0
    return drbg_hash_get_ctx_params_list;
847
0
}
848
849
static int drbg_fetch_digest_from_prov(const struct drbg_set_ctx_params_st *p,
850
    OSSL_LIB_CTX *libctx,
851
    EVP_MD **digest)
852
178
{
853
178
    OSSL_PROVIDER *prov = NULL;
854
178
    EVP_MD *md = NULL;
855
178
    int ret = 0;
856
857
178
    if (digest == NULL)
858
0
        return 0;
859
860
178
    if (p->prov == NULL || p->prov->data_type != OSSL_PARAM_UTF8_STRING)
861
0
        return 0;
862
178
    if ((prov = ossl_provider_find(libctx, (const char *)p->prov->data, 1)) == NULL)
863
173
        return 0;
864
865
5
    if (p->digest == NULL) {
866
0
        ret = 1;
867
0
        goto done;
868
0
    }
869
870
5
    if (p->digest->data_type != OSSL_PARAM_UTF8_STRING)
871
0
        goto done;
872
873
5
    md = evp_digest_fetch_from_prov(prov, (const char *)p->digest->data, NULL);
874
5
    if (md) {
875
2
        EVP_MD_free(*digest);
876
2
        *digest = md;
877
2
        ret = 1;
878
2
    }
879
880
5
done:
881
5
    ossl_provider_free(prov);
882
5
    return ret;
883
5
}
884
885
static int drbg_hash_set_ctx_params_locked(PROV_DRBG *ctx, const struct drbg_set_ctx_params_st *p)
886
234
{
887
234
    PROV_DRBG_HASH *hash = (PROV_DRBG_HASH *)ctx->data;
888
234
    OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(ctx->provctx);
889
234
    EVP_MD *prov_md = NULL;
890
234
    const EVP_MD *md;
891
234
    int md_size;
892
893
234
    if (!OSSL_FIPS_IND_SET_CTX_FROM_PARAM(ctx, OSSL_FIPS_IND_SETTABLE0, p->ind_d))
894
0
        return 0;
895
896
    /* try to fetch digest from provider */
897
234
    (void)ERR_set_mark();
898
234
    if (!drbg_fetch_digest_from_prov(p, libctx, &prov_md)) {
899
232
        (void)ERR_pop_to_mark();
900
        /* fall back to full implementation search */
901
232
        if (!ossl_prov_digest_load(&hash->digest, p->digest, p->propq,
902
232
                p->engine, libctx))
903
42
            return 0;
904
232
    } else {
905
2
        (void)ERR_clear_last_mark();
906
2
        if (prov_md)
907
2
            ossl_prov_digest_set_md(&hash->digest, prov_md);
908
2
    }
909
910
192
    md = ossl_prov_digest_md(&hash->digest);
911
192
    if (md != NULL) {
912
192
        if (!ossl_drbg_verify_digest(ctx, libctx, md))
913
3
            return 0; /* Error already raised for us */
914
915
        /* These are taken from SP 800-90 10.1 Table 2 */
916
189
        md_size = EVP_MD_get_size(md);
917
189
        if (md_size <= 0)
918
3
            return 0;
919
186
        hash->blocklen = md_size;
920
        /* See SP800-57 Part1 Rev4 5.6.1 Table 3 */
921
186
        ctx->strength = (unsigned int)(64 * (hash->blocklen >> 3));
922
186
        if (ctx->strength > 256)
923
41
            ctx->strength = 256;
924
186
        if (hash->blocklen > MAX_BLOCKLEN_USING_SMALL_SEEDLEN)
925
55
            ctx->seedlen = HASH_PRNG_MAX_SEEDLEN;
926
131
        else
927
131
            ctx->seedlen = HASH_PRNG_SMALL_SEEDLEN;
928
929
186
        ctx->min_entropylen = ctx->strength / 8;
930
186
        ctx->min_noncelen = ctx->min_entropylen / 2;
931
186
    }
932
933
186
    return ossl_drbg_set_ctx_params(ctx, p);
934
192
}
935
936
#define drbg_hash_set_ctx_params_st drbg_set_ctx_params_st
937
938
/* clang-format off */
939
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
940
#ifndef drbg_hash_set_ctx_params_list
941
static const OSSL_PARAM drbg_hash_set_ctx_params_list[] = {
942
    OSSL_PARAM_utf8_string(OSSL_DRBG_PARAM_PROPERTIES, NULL, 0),
943
    OSSL_PARAM_utf8_string(OSSL_DRBG_PARAM_DIGEST, NULL, 0),
944
    OSSL_PARAM_utf8_string(OSSL_PROV_PARAM_CORE_PROV_NAME, NULL, 0),
945
    OSSL_PARAM_uint(OSSL_DRBG_PARAM_RESEED_REQUESTS, NULL),
946
    OSSL_PARAM_uint64(OSSL_DRBG_PARAM_RESEED_TIME_INTERVAL, NULL),
947
# if defined(FIPS_MODULE)
948
    OSSL_PARAM_int(OSSL_KDF_PARAM_FIPS_DIGEST_CHECK, NULL),
949
# endif
950
    OSSL_PARAM_END
951
};
952
#endif
953
954
#ifndef drbg_hash_set_ctx_params_st
955
struct drbg_hash_set_ctx_params_st {
956
    OSSL_PARAM *digest;
957
    OSSL_PARAM *engine;
958
# if defined(FIPS_MODULE)
959
    OSSL_PARAM *ind_d;
960
# endif
961
    OSSL_PARAM *propq;
962
    OSSL_PARAM *prov;
963
    OSSL_PARAM *reseed_req;
964
    OSSL_PARAM *reseed_time;
965
};
966
#endif
967
968
#ifndef drbg_hash_set_ctx_params_decoder
969
static int drbg_hash_set_ctx_params_decoder
970
    (const OSSL_PARAM *p, struct drbg_hash_set_ctx_params_st *r)
971
79
{
972
79
    const char *s;
973
974
79
    memset(r, 0, sizeof(*r));
975
79
    if (p != NULL)
976
474
        for (; (s = p->key) != NULL; p++)
977
395
            switch(s[0]) {
978
0
            default:
979
0
                break;
980
79
            case 'd':
981
79
                switch(s[1]) {
982
0
                default:
983
0
                    break;
984
79
                case 'i':
985
79
                    switch(s[2]) {
986
0
                    default:
987
0
                        break;
988
79
                    case 'g':
989
79
                        switch(s[3]) {
990
0
                        default:
991
0
                            break;
992
79
                        case 'e':
993
79
                            switch(s[4]) {
994
0
                            default:
995
0
                                break;
996
79
                            case 's':
997
79
                                switch(s[5]) {
998
0
                                default:
999
0
                                    break;
1000
79
                                case 't':
1001
79
                                    switch(s[6]) {
1002
0
                                    default:
1003
0
                                        break;
1004
0
                                    case '-':
1005
# if defined(FIPS_MODULE)
1006
                                        if (ossl_likely(strcmp("check", s + 7) == 0)) {
1007
                                            /* OSSL_KDF_PARAM_FIPS_DIGEST_CHECK */
1008
                                            if (ossl_unlikely(r->ind_d != NULL)) {
1009
                                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
1010
                                                               "param %s is repeated", s);
1011
                                                return 0;
1012
                                            }
1013
                                            r->ind_d = (OSSL_PARAM *)p;
1014
                                        }
1015
# endif
1016
0
                                        break;
1017
79
                                    case '\0':
1018
79
                                        if (ossl_unlikely(r->digest != NULL)) {
1019
0
                                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
1020
0
                                                           "param %s is repeated", s);
1021
0
                                            return 0;
1022
0
                                        }
1023
79
                                        r->digest = (OSSL_PARAM *)p;
1024
79
                                    }
1025
79
                                }
1026
79
                            }
1027
79
                        }
1028
79
                    }
1029
79
                }
1030
79
                break;
1031
79
            case 'e':
1032
0
                if (ossl_likely(strcmp("ngine", s + 1) == 0)) {
1033
                    /* OSSL_ALG_PARAM_ENGINE */
1034
0
                    if (ossl_unlikely(r->engine != NULL)) {
1035
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
1036
0
                                       "param %s is repeated", s);
1037
0
                        return 0;
1038
0
                    }
1039
0
                    r->engine = (OSSL_PARAM *)p;
1040
0
                }
1041
0
                break;
1042
158
            case 'p':
1043
158
                switch(s[1]) {
1044
0
                default:
1045
0
                    break;
1046
158
                case 'r':
1047
158
                    switch(s[2]) {
1048
0
                    default:
1049
0
                        break;
1050
158
                    case 'o':
1051
158
                        switch(s[3]) {
1052
0
                        default:
1053
0
                            break;
1054
79
                        case 'p':
1055
79
                            if (ossl_likely(strcmp("erties", s + 4) == 0)) {
1056
                                /* OSSL_DRBG_PARAM_PROPERTIES */
1057
79
                                if (ossl_unlikely(r->propq != NULL)) {
1058
0
                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
1059
0
                                                   "param %s is repeated", s);
1060
0
                                    return 0;
1061
0
                                }
1062
79
                                r->propq = (OSSL_PARAM *)p;
1063
79
                            }
1064
79
                            break;
1065
79
                        case 'v':
1066
79
                            if (ossl_likely(strcmp("ider-name", s + 4) == 0)) {
1067
                                /* OSSL_PROV_PARAM_CORE_PROV_NAME */
1068
79
                                if (ossl_unlikely(r->prov != NULL)) {
1069
0
                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
1070
0
                                                   "param %s is repeated", s);
1071
0
                                    return 0;
1072
0
                                }
1073
79
                                r->prov = (OSSL_PARAM *)p;
1074
79
                            }
1075
158
                        }
1076
158
                    }
1077
158
                }
1078
158
                break;
1079
158
            case 'r':
1080
158
                switch(s[1]) {
1081
0
                default:
1082
0
                    break;
1083
158
                case 'e':
1084
158
                    switch(s[2]) {
1085
0
                    default:
1086
0
                        break;
1087
158
                    case 's':
1088
158
                        switch(s[3]) {
1089
0
                        default:
1090
0
                            break;
1091
158
                        case 'e':
1092
158
                            switch(s[4]) {
1093
0
                            default:
1094
0
                                break;
1095
158
                            case 'e':
1096
158
                                switch(s[5]) {
1097
0
                                default:
1098
0
                                    break;
1099
158
                                case 'd':
1100
158
                                    switch(s[6]) {
1101
0
                                    default:
1102
0
                                        break;
1103
158
                                    case '_':
1104
158
                                        switch(s[7]) {
1105
0
                                        default:
1106
0
                                            break;
1107
79
                                        case 'r':
1108
79
                                            if (ossl_likely(strcmp("equests", s + 8) == 0)) {
1109
                                                /* OSSL_DRBG_PARAM_RESEED_REQUESTS */
1110
79
                                                if (ossl_unlikely(r->reseed_req != NULL)) {
1111
0
                                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
1112
0
                                                                   "param %s is repeated", s);
1113
0
                                                    return 0;
1114
0
                                                }
1115
79
                                                r->reseed_req = (OSSL_PARAM *)p;
1116
79
                                            }
1117
79
                                            break;
1118
79
                                        case 't':
1119
79
                                            if (ossl_likely(strcmp("ime_interval", s + 8) == 0)) {
1120
                                                /* OSSL_DRBG_PARAM_RESEED_TIME_INTERVAL */
1121
79
                                                if (ossl_unlikely(r->reseed_time != NULL)) {
1122
0
                                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
1123
0
                                                                   "param %s is repeated", s);
1124
0
                                                    return 0;
1125
0
                                                }
1126
79
                                                r->reseed_time = (OSSL_PARAM *)p;
1127
79
                                            }
1128
158
                                        }
1129
158
                                    }
1130
158
                                }
1131
158
                            }
1132
158
                        }
1133
158
                    }
1134
158
                }
1135
395
            }
1136
79
    return 1;
1137
79
}
1138
#endif
1139
/* End of machine generated */
1140
/* clang-format on */
1141
1142
static int drbg_hash_set_ctx_params(void *vctx, const OSSL_PARAM params[])
1143
178
{
1144
178
    PROV_DRBG *drbg = (PROV_DRBG *)vctx;
1145
178
    struct drbg_set_ctx_params_st p;
1146
178
    int ret;
1147
1148
178
    if (drbg == NULL || !drbg_hash_set_ctx_params_decoder(params, &p))
1149
0
        return 0;
1150
1151
178
    if (drbg->lock != NULL && !CRYPTO_THREAD_write_lock(drbg->lock))
1152
0
        return 0;
1153
1154
178
    ret = drbg_hash_set_ctx_params_locked(drbg, &p);
1155
1156
178
    if (drbg->lock != NULL)
1157
0
        CRYPTO_THREAD_unlock(drbg->lock);
1158
1159
178
    return ret;
1160
178
}
1161
1162
static const OSSL_PARAM *drbg_hash_settable_ctx_params(ossl_unused void *vctx,
1163
    ossl_unused void *p_ctx)
1164
300
{
1165
300
    return drbg_hash_set_ctx_params_list;
1166
300
}
1167
1168
const OSSL_DISPATCH ossl_drbg_hash_functions[] = {
1169
    { OSSL_FUNC_RAND_NEWCTX, (void (*)(void))drbg_hash_new_wrapper },
1170
    { OSSL_FUNC_RAND_FREECTX, (void (*)(void))drbg_hash_free },
1171
    { OSSL_FUNC_RAND_INSTANTIATE,
1172
        (void (*)(void))drbg_hash_instantiate_wrapper },
1173
    { OSSL_FUNC_RAND_UNINSTANTIATE,
1174
        (void (*)(void))drbg_hash_uninstantiate_wrapper },
1175
    { OSSL_FUNC_RAND_GENERATE, (void (*)(void))drbg_hash_generate_wrapper },
1176
    { OSSL_FUNC_RAND_RESEED, (void (*)(void))drbg_hash_reseed_wrapper },
1177
    { OSSL_FUNC_RAND_ENABLE_LOCKING, (void (*)(void))ossl_drbg_enable_locking },
1178
    { OSSL_FUNC_RAND_LOCK, (void (*)(void))ossl_drbg_lock },
1179
    { OSSL_FUNC_RAND_UNLOCK, (void (*)(void))ossl_drbg_unlock },
1180
    { OSSL_FUNC_RAND_SETTABLE_CTX_PARAMS,
1181
        (void (*)(void))drbg_hash_settable_ctx_params },
1182
    { OSSL_FUNC_RAND_SET_CTX_PARAMS, (void (*)(void))drbg_hash_set_ctx_params },
1183
    { OSSL_FUNC_RAND_GETTABLE_CTX_PARAMS,
1184
        (void (*)(void))drbg_hash_gettable_ctx_params },
1185
    { OSSL_FUNC_RAND_GET_CTX_PARAMS, (void (*)(void))drbg_hash_get_ctx_params },
1186
    { OSSL_FUNC_RAND_VERIFY_ZEROIZATION,
1187
        (void (*)(void))drbg_hash_verify_zeroization },
1188
    { OSSL_FUNC_RAND_GET_SEED, (void (*)(void))ossl_drbg_get_seed },
1189
    { OSSL_FUNC_RAND_CLEAR_SEED, (void (*)(void))ossl_drbg_clear_seed },
1190
    OSSL_DISPATCH_END
1191
};