Coverage Report

Created: 2025-08-25 06:30

/src/openssl/providers/implementations/digests/digestcommon.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
#include <string.h>
12
#include <openssl/err.h>
13
#include <openssl/proverr.h>
14
#include "prov/digestcommon.h"
15
#include "internal/common.h"
16
17
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
18
#ifndef digest_default_get_params_list
19
static const OSSL_PARAM digest_default_get_params_list[] = {
20
    OSSL_PARAM_size_t(OSSL_DIGEST_PARAM_BLOCK_SIZE, NULL),
21
    OSSL_PARAM_size_t(OSSL_DIGEST_PARAM_SIZE, NULL),
22
    OSSL_PARAM_int(OSSL_DIGEST_PARAM_XOF, NULL),
23
    OSSL_PARAM_int(OSSL_DIGEST_PARAM_ALGID_ABSENT, NULL),
24
    OSSL_PARAM_END
25
};
26
#endif
27
28
#ifndef digest_default_get_params_st
29
struct digest_default_get_params_st {
30
    OSSL_PARAM *aldid;
31
    OSSL_PARAM *bsize;
32
    OSSL_PARAM *size;
33
    OSSL_PARAM *xof;
34
};
35
#endif
36
37
#ifndef digest_default_get_params_decoder
38
static int digest_default_get_params_decoder
39
    (const OSSL_PARAM *p, struct digest_default_get_params_st *r)
40
432
{
41
432
    const char *s;
42
43
432
    memset(r, 0, sizeof(*r));
44
432
    if (p != NULL)
45
2.16k
        for (; (s = p->key) != NULL; p++)
46
1.72k
            switch(s[0]) {
47
0
            default:
48
0
                break;
49
432
            case 'a':
50
432
                if (ossl_likely(strcmp("lgid-absent", s + 1) == 0)) {
51
                    /* DIGEST_PARAM_ALGID_ABSENT */
52
432
                    if (ossl_unlikely(r->aldid != NULL)) {
53
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
54
0
                                       "param %s is repeated", s);
55
0
                        return 0;
56
0
                    }
57
432
                    r->aldid = (OSSL_PARAM *)p;
58
432
                }
59
432
                break;
60
432
            case 'b':
61
432
                if (ossl_likely(strcmp("locksize", s + 1) == 0)) {
62
                    /* DIGEST_PARAM_BLOCK_SIZE */
63
432
                    if (ossl_unlikely(r->bsize != NULL)) {
64
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
65
0
                                       "param %s is repeated", s);
66
0
                        return 0;
67
0
                    }
68
432
                    r->bsize = (OSSL_PARAM *)p;
69
432
                }
70
432
                break;
71
432
            case 's':
72
432
                if (ossl_likely(strcmp("ize", s + 1) == 0)) {
73
                    /* DIGEST_PARAM_SIZE */
74
432
                    if (ossl_unlikely(r->size != NULL)) {
75
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
76
0
                                       "param %s is repeated", s);
77
0
                        return 0;
78
0
                    }
79
432
                    r->size = (OSSL_PARAM *)p;
80
432
                }
81
432
                break;
82
432
            case 'x':
83
432
                if (ossl_likely(strcmp("of", s + 1) == 0)) {
84
                    /* DIGEST_PARAM_XOF */
85
432
                    if (ossl_unlikely(r->xof != NULL)) {
86
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
87
0
                                       "param %s is repeated", s);
88
0
                        return 0;
89
0
                    }
90
432
                    r->xof = (OSSL_PARAM *)p;
91
432
                }
92
1.72k
            }
93
432
    return 1;
94
432
}
95
#endif
96
/* End of machine generated */
97
98
int ossl_digest_default_get_params(OSSL_PARAM params[], size_t blksz,
99
                                   size_t paramsz, unsigned long flags)
100
432
{
101
432
    struct digest_default_get_params_st p;
102
103
432
    if (!digest_default_get_params_decoder(params, &p))
104
0
        return 0;
105
106
432
    if (p.bsize != NULL && !OSSL_PARAM_set_size_t(p.bsize, blksz)) {
107
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
108
0
        return 0;
109
0
    }
110
432
    if (p.size != NULL && !OSSL_PARAM_set_size_t(p.size, paramsz)) {
111
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
112
0
        return 0;
113
0
    }
114
432
    if (p.xof != NULL
115
432
        && !OSSL_PARAM_set_int(p.xof, (flags & PROV_DIGEST_FLAG_XOF) != 0)) {
116
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
117
0
        return 0;
118
0
    }
119
432
    if (p.aldid != NULL
120
432
        && !OSSL_PARAM_set_int(p.aldid, (flags & PROV_DIGEST_FLAG_ALGID_ABSENT) != 0)) {
121
0
        ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER);
122
0
        return 0;
123
0
    }
124
432
    return 1;
125
432
}
126
127
const OSSL_PARAM *ossl_digest_default_gettable_params(void *provctx)
128
0
{
129
0
    return digest_default_get_params_list;
130
0
}