Coverage Report

Created: 2025-10-28 06:56

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/providers/implementations/kdfs/pbkdf2.inc
Line
Count
Source
1
/*
2
 * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the \"License\").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
12
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
13
#ifndef pbkdf2_set_ctx_params_list
14
static const OSSL_PARAM pbkdf2_set_ctx_params_list[] = {
15
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0),
16
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0),
17
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_PASSWORD, NULL, 0),
18
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0),
19
    OSSL_PARAM_uint64(OSSL_KDF_PARAM_ITER, NULL),
20
    OSSL_PARAM_int(OSSL_KDF_PARAM_PKCS5, NULL),
21
    OSSL_PARAM_END
22
};
23
#endif
24
25
#ifndef pbkdf2_set_ctx_params_st
26
struct pbkdf2_set_ctx_params_st {
27
    OSSL_PARAM *digest;
28
    OSSL_PARAM *engine;
29
    OSSL_PARAM *iter;
30
    OSSL_PARAM *pkcs5;
31
    OSSL_PARAM *propq;
32
    OSSL_PARAM *pw;
33
    OSSL_PARAM *salt;
34
};
35
#endif
36
37
#ifndef pbkdf2_set_ctx_params_decoder
38
static int pbkdf2_set_ctx_params_decoder
39
    (const OSSL_PARAM *p, struct pbkdf2_set_ctx_params_st *r)
40
0
{
41
0
    const char *s;
42
43
0
    memset(r, 0, sizeof(*r));
44
0
    if (p != NULL)
45
0
        for (; (s = p->key) != NULL; p++)
46
0
            switch(s[0]) {
47
0
            default:
48
0
                break;
49
0
            case 'd':
50
0
                if (ossl_likely(strcmp("igest", s + 1) == 0)) {
51
                    /* OSSL_KDF_PARAM_DIGEST */
52
0
                    if (ossl_unlikely(r->digest != NULL)) {
53
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
54
0
                                       "param %s is repeated", s);
55
0
                        return 0;
56
0
                    }
57
0
                    r->digest = (OSSL_PARAM *)p;
58
0
                }
59
0
                break;
60
0
            case 'e':
61
0
                if (ossl_likely(strcmp("ngine", s + 1) == 0)) {
62
                    /* OSSL_ALG_PARAM_ENGINE */
63
0
                    if (ossl_unlikely(r->engine != NULL)) {
64
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
65
0
                                       "param %s is repeated", s);
66
0
                        return 0;
67
0
                    }
68
0
                    r->engine = (OSSL_PARAM *)p;
69
0
                }
70
0
                break;
71
0
            case 'i':
72
0
                if (ossl_likely(strcmp("ter", s + 1) == 0)) {
73
                    /* OSSL_KDF_PARAM_ITER */
74
0
                    if (ossl_unlikely(r->iter != NULL)) {
75
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
76
0
                                       "param %s is repeated", s);
77
0
                        return 0;
78
0
                    }
79
0
                    r->iter = (OSSL_PARAM *)p;
80
0
                }
81
0
                break;
82
0
            case 'p':
83
0
                switch(s[1]) {
84
0
                default:
85
0
                    break;
86
0
                case 'a':
87
0
                    if (ossl_likely(strcmp("ss", s + 2) == 0)) {
88
                        /* OSSL_KDF_PARAM_PASSWORD */
89
0
                        if (ossl_unlikely(r->pw != NULL)) {
90
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
91
0
                                           "param %s is repeated", s);
92
0
                            return 0;
93
0
                        }
94
0
                        r->pw = (OSSL_PARAM *)p;
95
0
                    }
96
0
                    break;
97
0
                case 'k':
98
0
                    if (ossl_likely(strcmp("cs5", s + 2) == 0)) {
99
                        /* OSSL_KDF_PARAM_PKCS5 */
100
0
                        if (ossl_unlikely(r->pkcs5 != NULL)) {
101
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
102
0
                                           "param %s is repeated", s);
103
0
                            return 0;
104
0
                        }
105
0
                        r->pkcs5 = (OSSL_PARAM *)p;
106
0
                    }
107
0
                    break;
108
0
                case 'r':
109
0
                    if (ossl_likely(strcmp("operties", s + 2) == 0)) {
110
                        /* OSSL_KDF_PARAM_PROPERTIES */
111
0
                        if (ossl_unlikely(r->propq != NULL)) {
112
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
113
0
                                           "param %s is repeated", s);
114
0
                            return 0;
115
0
                        }
116
0
                        r->propq = (OSSL_PARAM *)p;
117
0
                    }
118
0
                }
119
0
                break;
120
0
            case 's':
121
0
                if (ossl_likely(strcmp("alt", s + 1) == 0)) {
122
                    /* OSSL_KDF_PARAM_SALT */
123
0
                    if (ossl_unlikely(r->salt != NULL)) {
124
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
125
0
                                       "param %s is repeated", s);
126
0
                        return 0;
127
0
                    }
128
0
                    r->salt = (OSSL_PARAM *)p;
129
0
                }
130
0
            }
131
0
    return 1;
132
0
}
133
#endif
134
/* End of machine generated */
135
136
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
137
#ifndef pbkdf2_get_ctx_params_list
138
static const OSSL_PARAM pbkdf2_get_ctx_params_list[] = {
139
    OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL),
140
# if defined(FIPS_MODULE)
141
    OSSL_PARAM_int(OSSL_KDF_PARAM_FIPS_APPROVED_INDICATOR, NULL),
142
# endif
143
    OSSL_PARAM_END
144
};
145
#endif
146
147
#ifndef pbkdf2_get_ctx_params_st
148
struct pbkdf2_get_ctx_params_st {
149
# if defined(FIPS_MODULE)
150
    OSSL_PARAM *ind;
151
# endif
152
    OSSL_PARAM *size;
153
};
154
#endif
155
156
#ifndef pbkdf2_get_ctx_params_decoder
157
static int pbkdf2_get_ctx_params_decoder
158
    (const OSSL_PARAM *p, struct pbkdf2_get_ctx_params_st *r)
159
0
{
160
0
    const char *s;
161
162
0
    memset(r, 0, sizeof(*r));
163
0
    if (p != NULL)
164
0
        for (; (s = p->key) != NULL; p++)
165
0
            switch(s[0]) {
166
0
            default:
167
0
                break;
168
0
            case 'f':
169
# if defined(FIPS_MODULE)
170
                if (ossl_likely(strcmp("ips-indicator", s + 1) == 0)) {
171
                    /* OSSL_KDF_PARAM_FIPS_APPROVED_INDICATOR */
172
                    if (ossl_unlikely(r->ind != NULL)) {
173
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
174
                                       "param %s is repeated", s);
175
                        return 0;
176
                    }
177
                    r->ind = (OSSL_PARAM *)p;
178
                }
179
# endif
180
0
                break;
181
0
            case 's':
182
0
                if (ossl_likely(strcmp("ize", s + 1) == 0)) {
183
                    /* OSSL_KDF_PARAM_SIZE */
184
0
                    if (ossl_unlikely(r->size != NULL)) {
185
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
186
0
                                       "param %s is repeated", s);
187
0
                        return 0;
188
0
                    }
189
0
                    r->size = (OSSL_PARAM *)p;
190
0
                }
191
0
            }
192
0
    return 1;
193
0
}
194
#endif
195
/* End of machine generated */