Coverage Report

Created: 2025-10-28 06:56

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/providers/implementations/kdfs/krb5kdf.inc
Line
Count
Source
1
/*
2
 * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the \"License\").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
12
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
13
#ifndef krb5kdf_set_ctx_params_list
14
static const OSSL_PARAM krb5kdf_set_ctx_params_list[] = {
15
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0),
16
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_CIPHER, NULL, 0),
17
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_KEY, NULL, 0),
18
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_CONSTANT, NULL, 0),
19
    OSSL_PARAM_END
20
};
21
#endif
22
23
#ifndef krb5kdf_set_ctx_params_st
24
struct krb5kdf_set_ctx_params_st {
25
    OSSL_PARAM *cipher;
26
    OSSL_PARAM *cnst;
27
    OSSL_PARAM *engine;
28
    OSSL_PARAM *key;
29
    OSSL_PARAM *propq;
30
};
31
#endif
32
33
#ifndef krb5kdf_set_ctx_params_decoder
34
static int krb5kdf_set_ctx_params_decoder
35
    (const OSSL_PARAM *p, struct krb5kdf_set_ctx_params_st *r)
36
0
{
37
0
    const char *s;
38
39
0
    memset(r, 0, sizeof(*r));
40
0
    if (p != NULL)
41
0
        for (; (s = p->key) != NULL; p++)
42
0
            switch(s[0]) {
43
0
            default:
44
0
                break;
45
0
            case 'c':
46
0
                switch(s[1]) {
47
0
                default:
48
0
                    break;
49
0
                case 'i':
50
0
                    if (ossl_likely(strcmp("pher", s + 2) == 0)) {
51
                        /* OSSL_KDF_PARAM_CIPHER */
52
0
                        if (ossl_unlikely(r->cipher != NULL)) {
53
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
54
0
                                           "param %s is repeated", s);
55
0
                            return 0;
56
0
                        }
57
0
                        r->cipher = (OSSL_PARAM *)p;
58
0
                    }
59
0
                    break;
60
0
                case 'o':
61
0
                    if (ossl_likely(strcmp("nstant", s + 2) == 0)) {
62
                        /* OSSL_KDF_PARAM_CONSTANT */
63
0
                        if (ossl_unlikely(r->cnst != NULL)) {
64
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
65
0
                                           "param %s is repeated", s);
66
0
                            return 0;
67
0
                        }
68
0
                        r->cnst = (OSSL_PARAM *)p;
69
0
                    }
70
0
                }
71
0
                break;
72
0
            case 'e':
73
0
                if (ossl_likely(strcmp("ngine", s + 1) == 0)) {
74
                    /* OSSL_ALG_PARAM_ENGINE */
75
0
                    if (ossl_unlikely(r->engine != NULL)) {
76
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
77
0
                                       "param %s is repeated", s);
78
0
                        return 0;
79
0
                    }
80
0
                    r->engine = (OSSL_PARAM *)p;
81
0
                }
82
0
                break;
83
0
            case 'k':
84
0
                if (ossl_likely(strcmp("ey", s + 1) == 0)) {
85
                    /* OSSL_KDF_PARAM_KEY */
86
0
                    if (ossl_unlikely(r->key != NULL)) {
87
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
88
0
                                       "param %s is repeated", s);
89
0
                        return 0;
90
0
                    }
91
0
                    r->key = (OSSL_PARAM *)p;
92
0
                }
93
0
                break;
94
0
            case 'p':
95
0
                if (ossl_likely(strcmp("roperties", s + 1) == 0)) {
96
                    /* OSSL_KDF_PARAM_PROPERTIES */
97
0
                    if (ossl_unlikely(r->propq != NULL)) {
98
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
99
0
                                       "param %s is repeated", s);
100
0
                        return 0;
101
0
                    }
102
0
                    r->propq = (OSSL_PARAM *)p;
103
0
                }
104
0
            }
105
0
    return 1;
106
0
}
107
#endif
108
/* End of machine generated */
109
110
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
111
#ifndef krb5kdf_get_ctx_params_list
112
static const OSSL_PARAM krb5kdf_get_ctx_params_list[] = {
113
    OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL),
114
    OSSL_PARAM_END
115
};
116
#endif
117
118
#ifndef krb5kdf_get_ctx_params_st
119
struct krb5kdf_get_ctx_params_st {
120
    OSSL_PARAM *size;
121
};
122
#endif
123
124
#ifndef krb5kdf_get_ctx_params_decoder
125
static int krb5kdf_get_ctx_params_decoder
126
    (const OSSL_PARAM *p, struct krb5kdf_get_ctx_params_st *r)
127
0
{
128
0
    const char *s;
129
130
0
    memset(r, 0, sizeof(*r));
131
0
    if (p != NULL)
132
0
        for (; (s = p->key) != NULL; p++)
133
0
            if (ossl_likely(strcmp("size", s + 0) == 0)) {
134
                /* OSSL_KDF_PARAM_SIZE */
135
0
                if (ossl_unlikely(r->size != NULL)) {
136
0
                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
137
0
                                   "param %s is repeated", s);
138
0
                    return 0;
139
0
                }
140
0
                r->size = (OSSL_PARAM *)p;
141
0
            }
142
0
    return 1;
143
0
}
144
#endif
145
/* End of machine generated */