Coverage Report

Created: 2025-10-28 06:56

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/providers/implementations/signature/dsa_sig.inc
Line
Count
Source
1
/*
2
 * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the \"License\").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
12
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
13
#ifndef dsa_get_ctx_params_list
14
static const OSSL_PARAM dsa_get_ctx_params_list[] = {
15
    OSSL_PARAM_octet_string(OSSL_SIGNATURE_PARAM_ALGORITHM_ID, NULL, 0),
16
    OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_DIGEST, NULL, 0),
17
    OSSL_PARAM_uint(OSSL_SIGNATURE_PARAM_NONCE_TYPE, NULL),
18
# if defined(FIPS_MODULE)
19
    OSSL_PARAM_int(OSSL_SIGNATURE_PARAM_FIPS_APPROVED_INDICATOR, NULL),
20
# endif
21
    OSSL_PARAM_END
22
};
23
#endif
24
25
#ifndef dsa_get_ctx_params_st
26
struct dsa_get_ctx_params_st {
27
    OSSL_PARAM *algid;
28
    OSSL_PARAM *digest;
29
# if defined(FIPS_MODULE)
30
    OSSL_PARAM *ind;
31
# endif
32
    OSSL_PARAM *nonce;
33
};
34
#endif
35
36
#ifndef dsa_get_ctx_params_decoder
37
static int dsa_get_ctx_params_decoder
38
    (const OSSL_PARAM *p, struct dsa_get_ctx_params_st *r)
39
0
{
40
0
    const char *s;
41
42
0
    memset(r, 0, sizeof(*r));
43
0
    if (p != NULL)
44
0
        for (; (s = p->key) != NULL; p++)
45
0
            switch(s[0]) {
46
0
            default:
47
0
                break;
48
0
            case 'a':
49
0
                if (ossl_likely(strcmp("lgorithm-id", s + 1) == 0)) {
50
                    /* OSSL_SIGNATURE_PARAM_ALGORITHM_ID */
51
0
                    if (ossl_unlikely(r->algid != NULL)) {
52
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
53
0
                                       "param %s is repeated", s);
54
0
                        return 0;
55
0
                    }
56
0
                    r->algid = (OSSL_PARAM *)p;
57
0
                }
58
0
                break;
59
0
            case 'd':
60
0
                if (ossl_likely(strcmp("igest", s + 1) == 0)) {
61
                    /* OSSL_SIGNATURE_PARAM_DIGEST */
62
0
                    if (ossl_unlikely(r->digest != NULL)) {
63
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
64
0
                                       "param %s is repeated", s);
65
0
                        return 0;
66
0
                    }
67
0
                    r->digest = (OSSL_PARAM *)p;
68
0
                }
69
0
                break;
70
0
            case 'f':
71
# if defined(FIPS_MODULE)
72
                if (ossl_likely(strcmp("ips-indicator", s + 1) == 0)) {
73
                    /* OSSL_SIGNATURE_PARAM_FIPS_APPROVED_INDICATOR */
74
                    if (ossl_unlikely(r->ind != NULL)) {
75
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
76
                                       "param %s is repeated", s);
77
                        return 0;
78
                    }
79
                    r->ind = (OSSL_PARAM *)p;
80
                }
81
# endif
82
0
                break;
83
0
            case 'n':
84
0
                if (ossl_likely(strcmp("once-type", s + 1) == 0)) {
85
                    /* OSSL_SIGNATURE_PARAM_NONCE_TYPE */
86
0
                    if (ossl_unlikely(r->nonce != NULL)) {
87
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
88
0
                                       "param %s is repeated", s);
89
0
                        return 0;
90
0
                    }
91
0
                    r->nonce = (OSSL_PARAM *)p;
92
0
                }
93
0
            }
94
0
    return 1;
95
0
}
96
#endif
97
/* End of machine generated */
98
99
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
100
#ifndef dsa_set_ctx_params_list
101
static const OSSL_PARAM dsa_set_ctx_params_list[] = {
102
    OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_DIGEST, NULL, 0),
103
    OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_PROPERTIES, NULL, 0),
104
    OSSL_PARAM_uint(OSSL_SIGNATURE_PARAM_NONCE_TYPE, NULL),
105
# if defined(FIPS_MODULE)
106
    OSSL_PARAM_int(OSSL_SIGNATURE_PARAM_FIPS_KEY_CHECK, NULL),
107
# endif
108
# if defined(FIPS_MODULE)
109
    OSSL_PARAM_int(OSSL_SIGNATURE_PARAM_FIPS_DIGEST_CHECK, NULL),
110
# endif
111
# if defined(FIPS_MODULE)
112
    OSSL_PARAM_int(OSSL_SIGNATURE_PARAM_FIPS_SIGN_CHECK, NULL),
113
# endif
114
    OSSL_PARAM_END
115
};
116
#endif
117
118
#ifndef dsa_set_ctx_params_st
119
struct dsa_set_ctx_params_st {
120
    OSSL_PARAM *digest;
121
# if defined(FIPS_MODULE)
122
    OSSL_PARAM *ind_d;
123
# endif
124
# if defined(FIPS_MODULE)
125
    OSSL_PARAM *ind_k;
126
# endif
127
# if defined(FIPS_MODULE)
128
    OSSL_PARAM *ind_sign;
129
# endif
130
    OSSL_PARAM *nonce;
131
    OSSL_PARAM *propq;
132
};
133
#endif
134
135
#ifndef dsa_set_ctx_params_decoder
136
static int dsa_set_ctx_params_decoder
137
    (const OSSL_PARAM *p, struct dsa_set_ctx_params_st *r)
138
0
{
139
0
    const char *s;
140
141
0
    memset(r, 0, sizeof(*r));
142
0
    if (p != NULL)
143
0
        for (; (s = p->key) != NULL; p++)
144
0
            switch(s[0]) {
145
0
            default:
146
0
                break;
147
0
            case 'd':
148
0
                switch(s[1]) {
149
0
                default:
150
0
                    break;
151
0
                case 'i':
152
0
                    switch(s[2]) {
153
0
                    default:
154
0
                        break;
155
0
                    case 'g':
156
0
                        switch(s[3]) {
157
0
                        default:
158
0
                            break;
159
0
                        case 'e':
160
0
                            switch(s[4]) {
161
0
                            default:
162
0
                                break;
163
0
                            case 's':
164
0
                                switch(s[5]) {
165
0
                                default:
166
0
                                    break;
167
0
                                case 't':
168
0
                                    switch(s[6]) {
169
0
                                    default:
170
0
                                        break;
171
0
                                    case '-':
172
# if defined(FIPS_MODULE)
173
                                        if (ossl_likely(strcmp("check", s + 7) == 0)) {
174
                                            /* OSSL_SIGNATURE_PARAM_FIPS_DIGEST_CHECK */
175
                                            if (ossl_unlikely(r->ind_d != NULL)) {
176
                                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
177
                                                               "param %s is repeated", s);
178
                                                return 0;
179
                                            }
180
                                            r->ind_d = (OSSL_PARAM *)p;
181
                                        }
182
# endif
183
0
                                        break;
184
0
                                    case '\0':
185
0
                                        if (ossl_unlikely(r->digest != NULL)) {
186
0
                                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
187
0
                                                           "param %s is repeated", s);
188
0
                                            return 0;
189
0
                                        }
190
0
                                        r->digest = (OSSL_PARAM *)p;
191
0
                                    }
192
0
                                }
193
0
                            }
194
0
                        }
195
0
                    }
196
0
                }
197
0
                break;
198
0
            case 'k':
199
# if defined(FIPS_MODULE)
200
                if (ossl_likely(strcmp("ey-check", s + 1) == 0)) {
201
                    /* OSSL_SIGNATURE_PARAM_FIPS_KEY_CHECK */
202
                    if (ossl_unlikely(r->ind_k != NULL)) {
203
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
204
                                       "param %s is repeated", s);
205
                        return 0;
206
                    }
207
                    r->ind_k = (OSSL_PARAM *)p;
208
                }
209
# endif
210
0
                break;
211
0
            case 'n':
212
0
                if (ossl_likely(strcmp("once-type", s + 1) == 0)) {
213
                    /* OSSL_SIGNATURE_PARAM_NONCE_TYPE */
214
0
                    if (ossl_unlikely(r->nonce != NULL)) {
215
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
216
0
                                       "param %s is repeated", s);
217
0
                        return 0;
218
0
                    }
219
0
                    r->nonce = (OSSL_PARAM *)p;
220
0
                }
221
0
                break;
222
0
            case 'p':
223
0
                if (ossl_likely(strcmp("roperties", s + 1) == 0)) {
224
                    /* OSSL_SIGNATURE_PARAM_PROPERTIES */
225
0
                    if (ossl_unlikely(r->propq != NULL)) {
226
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
227
0
                                       "param %s is repeated", s);
228
0
                        return 0;
229
0
                    }
230
0
                    r->propq = (OSSL_PARAM *)p;
231
0
                }
232
0
                break;
233
0
            case 's':
234
# if defined(FIPS_MODULE)
235
                if (ossl_likely(strcmp("ign-check", s + 1) == 0)) {
236
                    /* OSSL_SIGNATURE_PARAM_FIPS_SIGN_CHECK */
237
                    if (ossl_unlikely(r->ind_sign != NULL)) {
238
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
239
                                       "param %s is repeated", s);
240
                        return 0;
241
                    }
242
                    r->ind_sign = (OSSL_PARAM *)p;
243
                }
244
# endif
245
0
                break;
246
0
            }
247
0
    return 1;
248
0
}
249
#endif
250
/* End of machine generated */
251
252
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
253
#ifndef dsa_sigalg_set_ctx_params_list
254
static const OSSL_PARAM dsa_sigalg_set_ctx_params_list[] = {
255
    OSSL_PARAM_octet_string(OSSL_SIGNATURE_PARAM_SIGNATURE, NULL, 0),
256
    OSSL_PARAM_uint(OSSL_SIGNATURE_PARAM_NONCE_TYPE, NULL),
257
# if defined(FIPS_MODULE)
258
    OSSL_PARAM_int(OSSL_SIGNATURE_PARAM_FIPS_KEY_CHECK, NULL),
259
# endif
260
# if defined(FIPS_MODULE)
261
    OSSL_PARAM_int(OSSL_SIGNATURE_PARAM_FIPS_DIGEST_CHECK, NULL),
262
# endif
263
# if defined(FIPS_MODULE)
264
    OSSL_PARAM_int(OSSL_SIGNATURE_PARAM_FIPS_SIGN_CHECK, NULL),
265
# endif
266
    OSSL_PARAM_END
267
};
268
#endif
269
270
#ifndef dsa_sigalg_set_ctx_params_st
271
struct dsa_sigalg_set_ctx_params_st {
272
# if defined(FIPS_MODULE)
273
    OSSL_PARAM *ind_d;
274
# endif
275
# if defined(FIPS_MODULE)
276
    OSSL_PARAM *ind_k;
277
# endif
278
# if defined(FIPS_MODULE)
279
    OSSL_PARAM *ind_sign;
280
# endif
281
    OSSL_PARAM *nonce;
282
    OSSL_PARAM *sig;
283
};
284
#endif
285
286
#ifndef dsa_sigalg_set_ctx_params_decoder
287
static int dsa_sigalg_set_ctx_params_decoder
288
    (const OSSL_PARAM *p, struct dsa_sigalg_set_ctx_params_st *r)
289
0
{
290
0
    const char *s;
291
292
0
    memset(r, 0, sizeof(*r));
293
0
    if (p != NULL)
294
0
        for (; (s = p->key) != NULL; p++)
295
0
            switch(s[0]) {
296
0
            default:
297
0
                break;
298
0
            case 'd':
299
# if defined(FIPS_MODULE)
300
                if (ossl_likely(strcmp("igest-check", s + 1) == 0)) {
301
                    /* OSSL_SIGNATURE_PARAM_FIPS_DIGEST_CHECK */
302
                    if (ossl_unlikely(r->ind_d != NULL)) {
303
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
304
                                       "param %s is repeated", s);
305
                        return 0;
306
                    }
307
                    r->ind_d = (OSSL_PARAM *)p;
308
                }
309
# endif
310
0
                break;
311
0
            case 'k':
312
# if defined(FIPS_MODULE)
313
                if (ossl_likely(strcmp("ey-check", s + 1) == 0)) {
314
                    /* OSSL_SIGNATURE_PARAM_FIPS_KEY_CHECK */
315
                    if (ossl_unlikely(r->ind_k != NULL)) {
316
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
317
                                       "param %s is repeated", s);
318
                        return 0;
319
                    }
320
                    r->ind_k = (OSSL_PARAM *)p;
321
                }
322
# endif
323
0
                break;
324
0
            case 'n':
325
0
                if (ossl_likely(strcmp("once-type", s + 1) == 0)) {
326
                    /* OSSL_SIGNATURE_PARAM_NONCE_TYPE */
327
0
                    if (ossl_unlikely(r->nonce != NULL)) {
328
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
329
0
                                       "param %s is repeated", s);
330
0
                        return 0;
331
0
                    }
332
0
                    r->nonce = (OSSL_PARAM *)p;
333
0
                }
334
0
                break;
335
0
            case 's':
336
0
                switch(s[1]) {
337
0
                default:
338
0
                    break;
339
0
                case 'i':
340
0
                    switch(s[2]) {
341
0
                    default:
342
0
                        break;
343
0
                    case 'g':
344
0
                        switch(s[3]) {
345
0
                        default:
346
0
                            break;
347
0
                        case 'n':
348
0
                            switch(s[4]) {
349
0
                            default:
350
0
                                break;
351
0
                            case '-':
352
# if defined(FIPS_MODULE)
353
                                if (ossl_likely(strcmp("check", s + 5) == 0)) {
354
                                    /* OSSL_SIGNATURE_PARAM_FIPS_SIGN_CHECK */
355
                                    if (ossl_unlikely(r->ind_sign != NULL)) {
356
                                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
357
                                                       "param %s is repeated", s);
358
                                        return 0;
359
                                    }
360
                                    r->ind_sign = (OSSL_PARAM *)p;
361
                                }
362
# endif
363
0
                                break;
364
0
                            case 'a':
365
0
                                if (ossl_likely(strcmp("ture", s + 5) == 0)) {
366
                                    /* OSSL_SIGNATURE_PARAM_SIGNATURE */
367
0
                                    if (ossl_unlikely(r->sig != NULL)) {
368
0
                                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
369
0
                                                       "param %s is repeated", s);
370
0
                                        return 0;
371
0
                                    }
372
0
                                    r->sig = (OSSL_PARAM *)p;
373
0
                                }
374
0
                            }
375
0
                        }
376
0
                    }
377
0
                }
378
0
            }
379
0
    return 1;
380
0
}
381
#endif
382
/* End of machine generated */