/src/openssl36/providers/implementations/include/prov/blake2_params.inc
Line | Count | Source |
1 | | /* |
2 | | * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the Apache License 2.0 (the "License"). You may not use |
5 | | * this file except in compliance with the License. You can obtain a copy |
6 | | * in the file LICENSE in the source distribution or at |
7 | | * https://www.openssl.org/source/license.html |
8 | | */ |
9 | | |
10 | | |
11 | | #include <string.h> |
12 | | #include "internal/common.h" |
13 | | |
14 | | /* Machine generated by util/perl/OpenSSL/paramnames.pm */ |
15 | | #ifndef blake2_get_ctx_list |
16 | | static const OSSL_PARAM blake2_get_ctx_list[] = { |
17 | | OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), |
18 | | OSSL_PARAM_size_t(OSSL_MAC_PARAM_BLOCK_SIZE, NULL), |
19 | | OSSL_PARAM_END |
20 | | }; |
21 | | #endif |
22 | | |
23 | | #ifndef blake2_get_ctx_st |
24 | | struct blake2_get_ctx_st { |
25 | | OSSL_PARAM *bsize; |
26 | | OSSL_PARAM *size; |
27 | | }; |
28 | | #endif |
29 | | |
30 | | #ifndef blake2_get_ctx_decoder |
31 | | static int blake2_get_ctx_decoder |
32 | | (const OSSL_PARAM *p, struct blake2_get_ctx_st *r) |
33 | 2.48k | { |
34 | 2.48k | const char *s; |
35 | | |
36 | 2.48k | memset(r, 0, sizeof(*r)); |
37 | 2.48k | if (p != NULL) |
38 | 4.96k | for (; (s = p->key) != NULL; p++) |
39 | 2.48k | switch(s[0]) { |
40 | 0 | default: |
41 | 0 | break; |
42 | 0 | case 'b': |
43 | 0 | if (ossl_likely(strcmp("lock-size", s + 1) == 0)) { |
44 | | /* OSSL_MAC_PARAM_BLOCK_SIZE */ |
45 | 0 | if (ossl_unlikely(r->bsize != NULL)) { |
46 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
47 | 0 | "param %s is repeated", s); |
48 | 0 | return 0; |
49 | 0 | } |
50 | 0 | r->bsize = (OSSL_PARAM *)p; |
51 | 0 | } |
52 | 0 | break; |
53 | 2.48k | case 's': |
54 | 2.48k | if (ossl_likely(strcmp("ize", s + 1) == 0)) { |
55 | | /* OSSL_MAC_PARAM_SIZE */ |
56 | 2.48k | if (ossl_unlikely(r->size != NULL)) { |
57 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
58 | 0 | "param %s is repeated", s); |
59 | 0 | return 0; |
60 | 0 | } |
61 | 2.48k | r->size = (OSSL_PARAM *)p; |
62 | 2.48k | } |
63 | 2.48k | } |
64 | 2.48k | return 1; |
65 | 2.48k | } blake2b_mac.c:blake2_get_ctx_decoder Line | Count | Source | 33 | 1.13k | { | 34 | 1.13k | const char *s; | 35 | | | 36 | 1.13k | memset(r, 0, sizeof(*r)); | 37 | 1.13k | if (p != NULL) | 38 | 2.27k | for (; (s = p->key) != NULL; p++) | 39 | 1.13k | switch(s[0]) { | 40 | 0 | default: | 41 | 0 | break; | 42 | 0 | case 'b': | 43 | 0 | if (ossl_likely(strcmp("lock-size", s + 1) == 0)) { | 44 | | /* OSSL_MAC_PARAM_BLOCK_SIZE */ | 45 | 0 | if (ossl_unlikely(r->bsize != NULL)) { | 46 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 47 | 0 | "param %s is repeated", s); | 48 | 0 | return 0; | 49 | 0 | } | 50 | 0 | r->bsize = (OSSL_PARAM *)p; | 51 | 0 | } | 52 | 0 | break; | 53 | 1.13k | case 's': | 54 | 1.13k | if (ossl_likely(strcmp("ize", s + 1) == 0)) { | 55 | | /* OSSL_MAC_PARAM_SIZE */ | 56 | 1.13k | if (ossl_unlikely(r->size != NULL)) { | 57 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 58 | 0 | "param %s is repeated", s); | 59 | 0 | return 0; | 60 | 0 | } | 61 | 1.13k | r->size = (OSSL_PARAM *)p; | 62 | 1.13k | } | 63 | 1.13k | } | 64 | 1.13k | return 1; | 65 | 1.13k | } |
blake2s_mac.c:blake2_get_ctx_decoder Line | Count | Source | 33 | 1.34k | { | 34 | 1.34k | const char *s; | 35 | | | 36 | 1.34k | memset(r, 0, sizeof(*r)); | 37 | 1.34k | if (p != NULL) | 38 | 2.68k | for (; (s = p->key) != NULL; p++) | 39 | 1.34k | switch(s[0]) { | 40 | 0 | default: | 41 | 0 | break; | 42 | 0 | case 'b': | 43 | 0 | if (ossl_likely(strcmp("lock-size", s + 1) == 0)) { | 44 | | /* OSSL_MAC_PARAM_BLOCK_SIZE */ | 45 | 0 | if (ossl_unlikely(r->bsize != NULL)) { | 46 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 47 | 0 | "param %s is repeated", s); | 48 | 0 | return 0; | 49 | 0 | } | 50 | 0 | r->bsize = (OSSL_PARAM *)p; | 51 | 0 | } | 52 | 0 | break; | 53 | 1.34k | case 's': | 54 | 1.34k | if (ossl_likely(strcmp("ize", s + 1) == 0)) { | 55 | | /* OSSL_MAC_PARAM_SIZE */ | 56 | 1.34k | if (ossl_unlikely(r->size != NULL)) { | 57 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 58 | 0 | "param %s is repeated", s); | 59 | 0 | return 0; | 60 | 0 | } | 61 | 1.34k | r->size = (OSSL_PARAM *)p; | 62 | 1.34k | } | 63 | 1.34k | } | 64 | 1.34k | return 1; | 65 | 1.34k | } |
|
66 | | #endif |
67 | | /* End of machine generated */ |
68 | | |
69 | | /* Machine generated by util/perl/OpenSSL/paramnames.pm */ |
70 | | #ifndef blake2_mac_set_ctx_list |
71 | | static const OSSL_PARAM blake2_mac_set_ctx_list[] = { |
72 | | OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), |
73 | | OSSL_PARAM_octet_string(OSSL_MAC_PARAM_KEY, NULL, 0), |
74 | | OSSL_PARAM_octet_string(OSSL_MAC_PARAM_CUSTOM, NULL, 0), |
75 | | OSSL_PARAM_octet_string(OSSL_MAC_PARAM_SALT, NULL, 0), |
76 | | OSSL_PARAM_END |
77 | | }; |
78 | | #endif |
79 | | |
80 | | #ifndef blake2_mac_set_ctx_st |
81 | | struct blake2_mac_set_ctx_st { |
82 | | OSSL_PARAM *cust; |
83 | | OSSL_PARAM *key; |
84 | | OSSL_PARAM *salt; |
85 | | OSSL_PARAM *size; |
86 | | }; |
87 | | #endif |
88 | | |
89 | | #ifndef blake2_mac_set_ctx_decoder |
90 | | static int blake2_mac_set_ctx_decoder |
91 | | (const OSSL_PARAM *p, struct blake2_mac_set_ctx_st *r) |
92 | 2.65k | { |
93 | 2.65k | const char *s; |
94 | | |
95 | 2.65k | memset(r, 0, sizeof(*r)); |
96 | 2.65k | if (p != NULL) |
97 | 1.17k | for (; (s = p->key) != NULL; p++) |
98 | 934 | switch(s[0]) { |
99 | 34 | default: |
100 | 34 | break; |
101 | 228 | case 'c': |
102 | 228 | if (ossl_likely(strcmp("ustom", s + 1) == 0)) { |
103 | | /* OSSL_MAC_PARAM_CUSTOM */ |
104 | 224 | if (ossl_unlikely(r->cust != NULL)) { |
105 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
106 | 0 | "param %s is repeated", s); |
107 | 0 | return 0; |
108 | 0 | } |
109 | 224 | r->cust = (OSSL_PARAM *)p; |
110 | 224 | } |
111 | 228 | break; |
112 | 228 | case 'k': |
113 | 224 | if (ossl_likely(strcmp("ey", s + 1) == 0)) { |
114 | | /* OSSL_MAC_PARAM_KEY */ |
115 | 224 | if (ossl_unlikely(r->key != NULL)) { |
116 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
117 | 0 | "param %s is repeated", s); |
118 | 0 | return 0; |
119 | 0 | } |
120 | 224 | r->key = (OSSL_PARAM *)p; |
121 | 224 | } |
122 | 224 | break; |
123 | 448 | case 's': |
124 | 448 | switch(s[1]) { |
125 | 0 | default: |
126 | 0 | break; |
127 | 224 | case 'a': |
128 | 224 | if (ossl_likely(strcmp("lt", s + 2) == 0)) { |
129 | | /* OSSL_MAC_PARAM_SALT */ |
130 | 224 | if (ossl_unlikely(r->salt != NULL)) { |
131 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
132 | 0 | "param %s is repeated", s); |
133 | 0 | return 0; |
134 | 0 | } |
135 | 224 | r->salt = (OSSL_PARAM *)p; |
136 | 224 | } |
137 | 224 | break; |
138 | 224 | case 'i': |
139 | 224 | if (ossl_likely(strcmp("ze", s + 2) == 0)) { |
140 | | /* OSSL_MAC_PARAM_SIZE */ |
141 | 224 | if (ossl_unlikely(r->size != NULL)) { |
142 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
143 | 0 | "param %s is repeated", s); |
144 | 0 | return 0; |
145 | 0 | } |
146 | 224 | r->size = (OSSL_PARAM *)p; |
147 | 224 | } |
148 | 448 | } |
149 | 934 | } |
150 | 2.65k | return 1; |
151 | 2.65k | } blake2b_mac.c:blake2_mac_set_ctx_decoder Line | Count | Source | 92 | 1.22k | { | 93 | 1.22k | const char *s; | 94 | | | 95 | 1.22k | memset(r, 0, sizeof(*r)); | 96 | 1.22k | if (p != NULL) | 97 | 636 | for (; (s = p->key) != NULL; p++) | 98 | 506 | switch(s[0]) { | 99 | 16 | default: | 100 | 16 | break; | 101 | 124 | case 'c': | 102 | 124 | if (ossl_likely(strcmp("ustom", s + 1) == 0)) { | 103 | | /* OSSL_MAC_PARAM_CUSTOM */ | 104 | 122 | if (ossl_unlikely(r->cust != NULL)) { | 105 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 106 | 0 | "param %s is repeated", s); | 107 | 0 | return 0; | 108 | 0 | } | 109 | 122 | r->cust = (OSSL_PARAM *)p; | 110 | 122 | } | 111 | 124 | break; | 112 | 124 | case 'k': | 113 | 122 | if (ossl_likely(strcmp("ey", s + 1) == 0)) { | 114 | | /* OSSL_MAC_PARAM_KEY */ | 115 | 122 | if (ossl_unlikely(r->key != NULL)) { | 116 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 117 | 0 | "param %s is repeated", s); | 118 | 0 | return 0; | 119 | 0 | } | 120 | 122 | r->key = (OSSL_PARAM *)p; | 121 | 122 | } | 122 | 122 | break; | 123 | 244 | case 's': | 124 | 244 | switch(s[1]) { | 125 | 0 | default: | 126 | 0 | break; | 127 | 122 | case 'a': | 128 | 122 | if (ossl_likely(strcmp("lt", s + 2) == 0)) { | 129 | | /* OSSL_MAC_PARAM_SALT */ | 130 | 122 | if (ossl_unlikely(r->salt != NULL)) { | 131 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 132 | 0 | "param %s is repeated", s); | 133 | 0 | return 0; | 134 | 0 | } | 135 | 122 | r->salt = (OSSL_PARAM *)p; | 136 | 122 | } | 137 | 122 | break; | 138 | 122 | case 'i': | 139 | 122 | if (ossl_likely(strcmp("ze", s + 2) == 0)) { | 140 | | /* OSSL_MAC_PARAM_SIZE */ | 141 | 122 | if (ossl_unlikely(r->size != NULL)) { | 142 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 143 | 0 | "param %s is repeated", s); | 144 | 0 | return 0; | 145 | 0 | } | 146 | 122 | r->size = (OSSL_PARAM *)p; | 147 | 122 | } | 148 | 244 | } | 149 | 506 | } | 150 | 1.22k | return 1; | 151 | 1.22k | } |
blake2s_mac.c:blake2_mac_set_ctx_decoder Line | Count | Source | 92 | 1.42k | { | 93 | 1.42k | const char *s; | 94 | | | 95 | 1.42k | memset(r, 0, sizeof(*r)); | 96 | 1.42k | if (p != NULL) | 97 | 539 | for (; (s = p->key) != NULL; p++) | 98 | 428 | switch(s[0]) { | 99 | 18 | default: | 100 | 18 | break; | 101 | 104 | case 'c': | 102 | 104 | if (ossl_likely(strcmp("ustom", s + 1) == 0)) { | 103 | | /* OSSL_MAC_PARAM_CUSTOM */ | 104 | 102 | if (ossl_unlikely(r->cust != NULL)) { | 105 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 106 | 0 | "param %s is repeated", s); | 107 | 0 | return 0; | 108 | 0 | } | 109 | 102 | r->cust = (OSSL_PARAM *)p; | 110 | 102 | } | 111 | 104 | break; | 112 | 104 | case 'k': | 113 | 102 | if (ossl_likely(strcmp("ey", s + 1) == 0)) { | 114 | | /* OSSL_MAC_PARAM_KEY */ | 115 | 102 | if (ossl_unlikely(r->key != NULL)) { | 116 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 117 | 0 | "param %s is repeated", s); | 118 | 0 | return 0; | 119 | 0 | } | 120 | 102 | r->key = (OSSL_PARAM *)p; | 121 | 102 | } | 122 | 102 | break; | 123 | 204 | case 's': | 124 | 204 | switch(s[1]) { | 125 | 0 | default: | 126 | 0 | break; | 127 | 102 | case 'a': | 128 | 102 | if (ossl_likely(strcmp("lt", s + 2) == 0)) { | 129 | | /* OSSL_MAC_PARAM_SALT */ | 130 | 102 | if (ossl_unlikely(r->salt != NULL)) { | 131 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 132 | 0 | "param %s is repeated", s); | 133 | 0 | return 0; | 134 | 0 | } | 135 | 102 | r->salt = (OSSL_PARAM *)p; | 136 | 102 | } | 137 | 102 | break; | 138 | 102 | case 'i': | 139 | 102 | if (ossl_likely(strcmp("ze", s + 2) == 0)) { | 140 | | /* OSSL_MAC_PARAM_SIZE */ | 141 | 102 | if (ossl_unlikely(r->size != NULL)) { | 142 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 143 | 0 | "param %s is repeated", s); | 144 | 0 | return 0; | 145 | 0 | } | 146 | 102 | r->size = (OSSL_PARAM *)p; | 147 | 102 | } | 148 | 204 | } | 149 | 428 | } | 150 | 1.42k | return 1; | 151 | 1.42k | } |
|
152 | | #endif |
153 | | /* End of machine generated */ |
154 | | |