/src/openssl36/providers/implementations/include/prov/blake2_params.inc
Line | Count | Source |
1 | | /* |
2 | | * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the Apache License 2.0 (the "License"). You may not use |
5 | | * this file except in compliance with the License. You can obtain a copy |
6 | | * in the file LICENSE in the source distribution or at |
7 | | * https://www.openssl.org/source/license.html |
8 | | */ |
9 | | |
10 | | |
11 | | #include <string.h> |
12 | | #include "internal/common.h" |
13 | | |
14 | | /* Machine generated by util/perl/OpenSSL/paramnames.pm */ |
15 | | #ifndef blake2_get_ctx_list |
16 | | static const OSSL_PARAM blake2_get_ctx_list[] = { |
17 | | OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), |
18 | | OSSL_PARAM_size_t(OSSL_MAC_PARAM_BLOCK_SIZE, NULL), |
19 | | OSSL_PARAM_END |
20 | | }; |
21 | | #endif |
22 | | |
23 | | #ifndef blake2_get_ctx_st |
24 | | struct blake2_get_ctx_st { |
25 | | OSSL_PARAM *bsize; |
26 | | OSSL_PARAM *size; |
27 | | }; |
28 | | #endif |
29 | | |
30 | | #ifndef blake2_get_ctx_decoder |
31 | | static int blake2_get_ctx_decoder |
32 | | (const OSSL_PARAM *p, struct blake2_get_ctx_st *r) |
33 | 2.47k | { |
34 | 2.47k | const char *s; |
35 | | |
36 | 2.47k | memset(r, 0, sizeof(*r)); |
37 | 2.47k | if (p != NULL) |
38 | 4.94k | for (; (s = p->key) != NULL; p++) |
39 | 2.47k | switch(s[0]) { |
40 | 0 | default: |
41 | 0 | break; |
42 | 0 | case 'b': |
43 | 0 | if (ossl_likely(strcmp("lock-size", s + 1) == 0)) { |
44 | | /* OSSL_MAC_PARAM_BLOCK_SIZE */ |
45 | 0 | if (ossl_unlikely(r->bsize != NULL)) { |
46 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
47 | 0 | "param %s is repeated", s); |
48 | 0 | return 0; |
49 | 0 | } |
50 | 0 | r->bsize = (OSSL_PARAM *)p; |
51 | 0 | } |
52 | 0 | break; |
53 | 2.47k | case 's': |
54 | 2.47k | if (ossl_likely(strcmp("ize", s + 1) == 0)) { |
55 | | /* OSSL_MAC_PARAM_SIZE */ |
56 | 2.47k | if (ossl_unlikely(r->size != NULL)) { |
57 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
58 | 0 | "param %s is repeated", s); |
59 | 0 | return 0; |
60 | 0 | } |
61 | 2.47k | r->size = (OSSL_PARAM *)p; |
62 | 2.47k | } |
63 | 2.47k | } |
64 | 2.47k | return 1; |
65 | 2.47k | } blake2b_mac.c:blake2_get_ctx_decoder Line | Count | Source | 33 | 1.12k | { | 34 | 1.12k | const char *s; | 35 | | | 36 | 1.12k | memset(r, 0, sizeof(*r)); | 37 | 1.12k | if (p != NULL) | 38 | 2.25k | for (; (s = p->key) != NULL; p++) | 39 | 1.12k | switch(s[0]) { | 40 | 0 | default: | 41 | 0 | break; | 42 | 0 | case 'b': | 43 | 0 | if (ossl_likely(strcmp("lock-size", s + 1) == 0)) { | 44 | | /* OSSL_MAC_PARAM_BLOCK_SIZE */ | 45 | 0 | if (ossl_unlikely(r->bsize != NULL)) { | 46 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 47 | 0 | "param %s is repeated", s); | 48 | 0 | return 0; | 49 | 0 | } | 50 | 0 | r->bsize = (OSSL_PARAM *)p; | 51 | 0 | } | 52 | 0 | break; | 53 | 1.12k | case 's': | 54 | 1.12k | if (ossl_likely(strcmp("ize", s + 1) == 0)) { | 55 | | /* OSSL_MAC_PARAM_SIZE */ | 56 | 1.12k | if (ossl_unlikely(r->size != NULL)) { | 57 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 58 | 0 | "param %s is repeated", s); | 59 | 0 | return 0; | 60 | 0 | } | 61 | 1.12k | r->size = (OSSL_PARAM *)p; | 62 | 1.12k | } | 63 | 1.12k | } | 64 | 1.12k | return 1; | 65 | 1.12k | } |
blake2s_mac.c:blake2_get_ctx_decoder Line | Count | Source | 33 | 1.34k | { | 34 | 1.34k | const char *s; | 35 | | | 36 | 1.34k | memset(r, 0, sizeof(*r)); | 37 | 1.34k | if (p != NULL) | 38 | 2.68k | for (; (s = p->key) != NULL; p++) | 39 | 1.34k | switch(s[0]) { | 40 | 0 | default: | 41 | 0 | break; | 42 | 0 | case 'b': | 43 | 0 | if (ossl_likely(strcmp("lock-size", s + 1) == 0)) { | 44 | | /* OSSL_MAC_PARAM_BLOCK_SIZE */ | 45 | 0 | if (ossl_unlikely(r->bsize != NULL)) { | 46 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 47 | 0 | "param %s is repeated", s); | 48 | 0 | return 0; | 49 | 0 | } | 50 | 0 | r->bsize = (OSSL_PARAM *)p; | 51 | 0 | } | 52 | 0 | break; | 53 | 1.34k | case 's': | 54 | 1.34k | if (ossl_likely(strcmp("ize", s + 1) == 0)) { | 55 | | /* OSSL_MAC_PARAM_SIZE */ | 56 | 1.34k | if (ossl_unlikely(r->size != NULL)) { | 57 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 58 | 0 | "param %s is repeated", s); | 59 | 0 | return 0; | 60 | 0 | } | 61 | 1.34k | r->size = (OSSL_PARAM *)p; | 62 | 1.34k | } | 63 | 1.34k | } | 64 | 1.34k | return 1; | 65 | 1.34k | } |
|
66 | | #endif |
67 | | /* End of machine generated */ |
68 | | |
69 | | /* Machine generated by util/perl/OpenSSL/paramnames.pm */ |
70 | | #ifndef blake2_mac_set_ctx_list |
71 | | static const OSSL_PARAM blake2_mac_set_ctx_list[] = { |
72 | | OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), |
73 | | OSSL_PARAM_octet_string(OSSL_MAC_PARAM_KEY, NULL, 0), |
74 | | OSSL_PARAM_octet_string(OSSL_MAC_PARAM_CUSTOM, NULL, 0), |
75 | | OSSL_PARAM_octet_string(OSSL_MAC_PARAM_SALT, NULL, 0), |
76 | | OSSL_PARAM_END |
77 | | }; |
78 | | #endif |
79 | | |
80 | | #ifndef blake2_mac_set_ctx_st |
81 | | struct blake2_mac_set_ctx_st { |
82 | | OSSL_PARAM *cust; |
83 | | OSSL_PARAM *key; |
84 | | OSSL_PARAM *salt; |
85 | | OSSL_PARAM *size; |
86 | | }; |
87 | | #endif |
88 | | |
89 | | #ifndef blake2_mac_set_ctx_decoder |
90 | | static int blake2_mac_set_ctx_decoder |
91 | | (const OSSL_PARAM *p, struct blake2_mac_set_ctx_st *r) |
92 | 2.64k | { |
93 | 2.64k | const char *s; |
94 | | |
95 | 2.64k | memset(r, 0, sizeof(*r)); |
96 | 2.64k | if (p != NULL) |
97 | 1.13k | for (; (s = p->key) != NULL; p++) |
98 | 904 | switch(s[0]) { |
99 | 36 | default: |
100 | 36 | break; |
101 | 220 | case 'c': |
102 | 220 | if (ossl_likely(strcmp("ustom", s + 1) == 0)) { |
103 | | /* OSSL_MAC_PARAM_CUSTOM */ |
104 | 216 | if (ossl_unlikely(r->cust != NULL)) { |
105 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
106 | 0 | "param %s is repeated", s); |
107 | 0 | return 0; |
108 | 0 | } |
109 | 216 | r->cust = (OSSL_PARAM *)p; |
110 | 216 | } |
111 | 220 | break; |
112 | 220 | case 'k': |
113 | 216 | if (ossl_likely(strcmp("ey", s + 1) == 0)) { |
114 | | /* OSSL_MAC_PARAM_KEY */ |
115 | 216 | if (ossl_unlikely(r->key != NULL)) { |
116 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
117 | 0 | "param %s is repeated", s); |
118 | 0 | return 0; |
119 | 0 | } |
120 | 216 | r->key = (OSSL_PARAM *)p; |
121 | 216 | } |
122 | 216 | break; |
123 | 432 | case 's': |
124 | 432 | switch(s[1]) { |
125 | 0 | default: |
126 | 0 | break; |
127 | 216 | case 'a': |
128 | 216 | if (ossl_likely(strcmp("lt", s + 2) == 0)) { |
129 | | /* OSSL_MAC_PARAM_SALT */ |
130 | 216 | if (ossl_unlikely(r->salt != NULL)) { |
131 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
132 | 0 | "param %s is repeated", s); |
133 | 0 | return 0; |
134 | 0 | } |
135 | 216 | r->salt = (OSSL_PARAM *)p; |
136 | 216 | } |
137 | 216 | break; |
138 | 216 | case 'i': |
139 | 216 | if (ossl_likely(strcmp("ze", s + 2) == 0)) { |
140 | | /* OSSL_MAC_PARAM_SIZE */ |
141 | 216 | if (ossl_unlikely(r->size != NULL)) { |
142 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
143 | 0 | "param %s is repeated", s); |
144 | 0 | return 0; |
145 | 0 | } |
146 | 216 | r->size = (OSSL_PARAM *)p; |
147 | 216 | } |
148 | 432 | } |
149 | 904 | } |
150 | 2.64k | return 1; |
151 | 2.64k | } blake2b_mac.c:blake2_mac_set_ctx_decoder Line | Count | Source | 92 | 1.21k | { | 93 | 1.21k | const char *s; | 94 | | | 95 | 1.21k | memset(r, 0, sizeof(*r)); | 96 | 1.21k | if (p != NULL) | 97 | 581 | for (; (s = p->key) != NULL; p++) | 98 | 462 | switch(s[0]) { | 99 | 16 | default: | 100 | 16 | break; | 101 | 113 | case 'c': | 102 | 113 | if (ossl_likely(strcmp("ustom", s + 1) == 0)) { | 103 | | /* OSSL_MAC_PARAM_CUSTOM */ | 104 | 111 | if (ossl_unlikely(r->cust != NULL)) { | 105 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 106 | 0 | "param %s is repeated", s); | 107 | 0 | return 0; | 108 | 0 | } | 109 | 111 | r->cust = (OSSL_PARAM *)p; | 110 | 111 | } | 111 | 113 | break; | 112 | 113 | case 'k': | 113 | 111 | if (ossl_likely(strcmp("ey", s + 1) == 0)) { | 114 | | /* OSSL_MAC_PARAM_KEY */ | 115 | 111 | if (ossl_unlikely(r->key != NULL)) { | 116 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 117 | 0 | "param %s is repeated", s); | 118 | 0 | return 0; | 119 | 0 | } | 120 | 111 | r->key = (OSSL_PARAM *)p; | 121 | 111 | } | 122 | 111 | break; | 123 | 222 | case 's': | 124 | 222 | switch(s[1]) { | 125 | 0 | default: | 126 | 0 | break; | 127 | 111 | case 'a': | 128 | 111 | if (ossl_likely(strcmp("lt", s + 2) == 0)) { | 129 | | /* OSSL_MAC_PARAM_SALT */ | 130 | 111 | if (ossl_unlikely(r->salt != NULL)) { | 131 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 132 | 0 | "param %s is repeated", s); | 133 | 0 | return 0; | 134 | 0 | } | 135 | 111 | r->salt = (OSSL_PARAM *)p; | 136 | 111 | } | 137 | 111 | break; | 138 | 111 | case 'i': | 139 | 111 | if (ossl_likely(strcmp("ze", s + 2) == 0)) { | 140 | | /* OSSL_MAC_PARAM_SIZE */ | 141 | 111 | if (ossl_unlikely(r->size != NULL)) { | 142 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 143 | 0 | "param %s is repeated", s); | 144 | 0 | return 0; | 145 | 0 | } | 146 | 111 | r->size = (OSSL_PARAM *)p; | 147 | 111 | } | 148 | 222 | } | 149 | 462 | } | 150 | 1.21k | return 1; | 151 | 1.21k | } |
blake2s_mac.c:blake2_mac_set_ctx_decoder Line | Count | Source | 92 | 1.42k | { | 93 | 1.42k | const char *s; | 94 | | | 95 | 1.42k | memset(r, 0, sizeof(*r)); | 96 | 1.42k | if (p != NULL) | 97 | 557 | for (; (s = p->key) != NULL; p++) | 98 | 442 | switch(s[0]) { | 99 | 20 | default: | 100 | 20 | break; | 101 | 107 | case 'c': | 102 | 107 | if (ossl_likely(strcmp("ustom", s + 1) == 0)) { | 103 | | /* OSSL_MAC_PARAM_CUSTOM */ | 104 | 105 | if (ossl_unlikely(r->cust != NULL)) { | 105 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 106 | 0 | "param %s is repeated", s); | 107 | 0 | return 0; | 108 | 0 | } | 109 | 105 | r->cust = (OSSL_PARAM *)p; | 110 | 105 | } | 111 | 107 | break; | 112 | 107 | case 'k': | 113 | 105 | if (ossl_likely(strcmp("ey", s + 1) == 0)) { | 114 | | /* OSSL_MAC_PARAM_KEY */ | 115 | 105 | if (ossl_unlikely(r->key != NULL)) { | 116 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 117 | 0 | "param %s is repeated", s); | 118 | 0 | return 0; | 119 | 0 | } | 120 | 105 | r->key = (OSSL_PARAM *)p; | 121 | 105 | } | 122 | 105 | break; | 123 | 210 | case 's': | 124 | 210 | switch(s[1]) { | 125 | 0 | default: | 126 | 0 | break; | 127 | 105 | case 'a': | 128 | 105 | if (ossl_likely(strcmp("lt", s + 2) == 0)) { | 129 | | /* OSSL_MAC_PARAM_SALT */ | 130 | 105 | if (ossl_unlikely(r->salt != NULL)) { | 131 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 132 | 0 | "param %s is repeated", s); | 133 | 0 | return 0; | 134 | 0 | } | 135 | 105 | r->salt = (OSSL_PARAM *)p; | 136 | 105 | } | 137 | 105 | break; | 138 | 105 | case 'i': | 139 | 105 | if (ossl_likely(strcmp("ze", s + 2) == 0)) { | 140 | | /* OSSL_MAC_PARAM_SIZE */ | 141 | 105 | if (ossl_unlikely(r->size != NULL)) { | 142 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, | 143 | 0 | "param %s is repeated", s); | 144 | 0 | return 0; | 145 | 0 | } | 146 | 105 | r->size = (OSSL_PARAM *)p; | 147 | 105 | } | 148 | 210 | } | 149 | 442 | } | 150 | 1.42k | return 1; | 151 | 1.42k | } |
|
152 | | #endif |
153 | | /* End of machine generated */ |
154 | | |