Coverage Report

Created: 2025-12-08 06:22

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/providers/implementations/kdfs/hkdf.inc
Line
Count
Source
1
/*
2
 * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the \"License\").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
12
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
13
#ifndef hkdf_set_ctx_params_list
14
static const OSSL_PARAM hkdf_set_ctx_params_list[] = {
15
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_MODE, NULL, 0),
16
    OSSL_PARAM_int(OSSL_KDF_PARAM_MODE, NULL),
17
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_KEY, NULL, 0),
18
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0),
19
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0),
20
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0),
21
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_INFO, NULL, 0),
22
# if defined(FIPS_MODULE)
23
    OSSL_PARAM_int(OSSL_KDF_PARAM_FIPS_KEY_CHECK, NULL),
24
# endif
25
    OSSL_PARAM_END
26
};
27
#endif
28
29
#ifndef hkdf_set_ctx_params_st
30
struct hkdf_set_ctx_params_st {
31
    OSSL_PARAM *digest;
32
# if defined(FIPS_MODULE)
33
    OSSL_PARAM *ind_k;
34
# endif
35
    OSSL_PARAM *info[HKDF_MAX_INFOS];
36
    int num_info;
37
    OSSL_PARAM *key;
38
    OSSL_PARAM *mode;
39
    OSSL_PARAM *propq;
40
    OSSL_PARAM *salt;
41
};
42
#endif
43
44
#ifndef hkdf_set_ctx_params_decoder
45
static int hkdf_set_ctx_params_decoder
46
    (const OSSL_PARAM *p, struct hkdf_set_ctx_params_st *r)
47
0
{
48
0
    const char *s;
49
50
0
    memset(r, 0, sizeof(*r));
51
0
    if (p != NULL)
52
0
        for (; (s = p->key) != NULL; p++)
53
0
            switch(s[0]) {
54
0
            default:
55
0
                break;
56
0
            case 'd':
57
0
                if (ossl_likely(strcmp("igest", s + 1) == 0)) {
58
                    /* OSSL_KDF_PARAM_DIGEST */
59
0
                    if (ossl_unlikely(r->digest != NULL)) {
60
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
61
0
                                       "param %s is repeated", s);
62
0
                        return 0;
63
0
                    }
64
0
                    r->digest = (OSSL_PARAM *)p;
65
0
                }
66
0
                break;
67
0
            case 'i':
68
0
                if (ossl_likely(strcmp("nfo", s + 1) == 0)) {
69
                    /* OSSL_KDF_PARAM_INFO */
70
0
                    if (ossl_unlikely(r->num_info >= HKDF_MAX_INFOS)) {
71
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_TOO_MANY_RECORDS,
72
0
                                       "param %s present >%d times", s, HKDF_MAX_INFOS);
73
0
                        return 0;
74
0
                    }
75
0
                    r->info[r->num_info++] = (OSSL_PARAM *)p;
76
0
                }
77
0
                break;
78
0
            case 'k':
79
0
                switch(s[1]) {
80
0
                default:
81
0
                    break;
82
0
                case 'e':
83
0
                    switch(s[2]) {
84
0
                    default:
85
0
                        break;
86
0
                    case 'y':
87
0
                        switch(s[3]) {
88
0
                        default:
89
0
                            break;
90
0
                        case '-':
91
# if defined(FIPS_MODULE)
92
                            if (ossl_likely(strcmp("check", s + 4) == 0)) {
93
                                /* OSSL_KDF_PARAM_FIPS_KEY_CHECK */
94
                                if (ossl_unlikely(r->ind_k != NULL)) {
95
                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
96
                                                   "param %s is repeated", s);
97
                                    return 0;
98
                                }
99
                                r->ind_k = (OSSL_PARAM *)p;
100
                            }
101
# endif
102
0
                            break;
103
0
                        case '\0':
104
0
                            if (ossl_unlikely(r->key != NULL)) {
105
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
106
0
                                               "param %s is repeated", s);
107
0
                                return 0;
108
0
                            }
109
0
                            r->key = (OSSL_PARAM *)p;
110
0
                        }
111
0
                    }
112
0
                }
113
0
                break;
114
0
            case 'm':
115
0
                if (ossl_likely(strcmp("ode", s + 1) == 0)) {
116
                    /* OSSL_KDF_PARAM_MODE */
117
0
                    if (ossl_unlikely(r->mode != NULL)) {
118
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
119
0
                                       "param %s is repeated", s);
120
0
                        return 0;
121
0
                    }
122
0
                    r->mode = (OSSL_PARAM *)p;
123
0
                }
124
0
                break;
125
0
            case 'p':
126
0
                if (ossl_likely(strcmp("roperties", s + 1) == 0)) {
127
                    /* OSSL_KDF_PARAM_PROPERTIES */
128
0
                    if (ossl_unlikely(r->propq != NULL)) {
129
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
130
0
                                       "param %s is repeated", s);
131
0
                        return 0;
132
0
                    }
133
0
                    r->propq = (OSSL_PARAM *)p;
134
0
                }
135
0
                break;
136
0
            case 's':
137
0
                if (ossl_likely(strcmp("alt", s + 1) == 0)) {
138
                    /* OSSL_KDF_PARAM_SALT */
139
0
                    if (ossl_unlikely(r->salt != NULL)) {
140
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
141
0
                                       "param %s is repeated", s);
142
0
                        return 0;
143
0
                    }
144
0
                    r->salt = (OSSL_PARAM *)p;
145
0
                }
146
0
            }
147
0
    return 1;
148
0
}
149
#endif
150
/* End of machine generated */
151
152
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
153
#ifndef hkdf_get_ctx_params_list
154
static const OSSL_PARAM hkdf_get_ctx_params_list[] = {
155
    OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL),
156
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0),
157
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_MODE, NULL, 0),
158
    OSSL_PARAM_int(OSSL_KDF_PARAM_MODE, NULL),
159
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0),
160
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_INFO, NULL, 0),
161
# if defined(FIPS_MODULE)
162
    OSSL_PARAM_int(OSSL_KDF_PARAM_FIPS_APPROVED_INDICATOR, NULL),
163
# endif
164
    OSSL_PARAM_END
165
};
166
#endif
167
168
#ifndef hkdf_get_ctx_params_st
169
struct hkdf_get_ctx_params_st {
170
    OSSL_PARAM *digest;
171
# if defined(FIPS_MODULE)
172
    OSSL_PARAM *ind;
173
# endif
174
    OSSL_PARAM *info;
175
    OSSL_PARAM *mode;
176
    OSSL_PARAM *salt;
177
    OSSL_PARAM *size;
178
};
179
#endif
180
181
#ifndef hkdf_get_ctx_params_decoder
182
static int hkdf_get_ctx_params_decoder
183
    (const OSSL_PARAM *p, struct hkdf_get_ctx_params_st *r)
184
0
{
185
0
    const char *s;
186
187
0
    memset(r, 0, sizeof(*r));
188
0
    if (p != NULL)
189
0
        for (; (s = p->key) != NULL; p++)
190
0
            switch(s[0]) {
191
0
            default:
192
0
                break;
193
0
            case 'd':
194
0
                if (ossl_likely(strcmp("igest", s + 1) == 0)) {
195
                    /* OSSL_KDF_PARAM_DIGEST */
196
0
                    if (ossl_unlikely(r->digest != NULL)) {
197
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
198
0
                                       "param %s is repeated", s);
199
0
                        return 0;
200
0
                    }
201
0
                    r->digest = (OSSL_PARAM *)p;
202
0
                }
203
0
                break;
204
0
            case 'f':
205
# if defined(FIPS_MODULE)
206
                if (ossl_likely(strcmp("ips-indicator", s + 1) == 0)) {
207
                    /* OSSL_KDF_PARAM_FIPS_APPROVED_INDICATOR */
208
                    if (ossl_unlikely(r->ind != NULL)) {
209
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
210
                                       "param %s is repeated", s);
211
                        return 0;
212
                    }
213
                    r->ind = (OSSL_PARAM *)p;
214
                }
215
# endif
216
0
                break;
217
0
            case 'i':
218
0
                if (ossl_likely(strcmp("nfo", s + 1) == 0)) {
219
                    /* OSSL_KDF_PARAM_INFO */
220
0
                    if (ossl_unlikely(r->info != NULL)) {
221
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
222
0
                                       "param %s is repeated", s);
223
0
                        return 0;
224
0
                    }
225
0
                    r->info = (OSSL_PARAM *)p;
226
0
                }
227
0
                break;
228
0
            case 'm':
229
0
                if (ossl_likely(strcmp("ode", s + 1) == 0)) {
230
                    /* OSSL_KDF_PARAM_MODE */
231
0
                    if (ossl_unlikely(r->mode != NULL)) {
232
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
233
0
                                       "param %s is repeated", s);
234
0
                        return 0;
235
0
                    }
236
0
                    r->mode = (OSSL_PARAM *)p;
237
0
                }
238
0
                break;
239
0
            case 's':
240
0
                switch(s[1]) {
241
0
                default:
242
0
                    break;
243
0
                case 'a':
244
0
                    if (ossl_likely(strcmp("lt", s + 2) == 0)) {
245
                        /* OSSL_KDF_PARAM_SALT */
246
0
                        if (ossl_unlikely(r->salt != NULL)) {
247
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
248
0
                                           "param %s is repeated", s);
249
0
                            return 0;
250
0
                        }
251
0
                        r->salt = (OSSL_PARAM *)p;
252
0
                    }
253
0
                    break;
254
0
                case 'i':
255
0
                    if (ossl_likely(strcmp("ze", s + 2) == 0)) {
256
                        /* OSSL_KDF_PARAM_SIZE */
257
0
                        if (ossl_unlikely(r->size != NULL)) {
258
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
259
0
                                           "param %s is repeated", s);
260
0
                            return 0;
261
0
                        }
262
0
                        r->size = (OSSL_PARAM *)p;
263
0
                    }
264
0
                }
265
0
            }
266
0
    return 1;
267
0
}
268
#endif
269
/* End of machine generated */
270
271
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
272
#ifndef hkdf_fixed_digest_set_ctx_params_list
273
static const OSSL_PARAM hkdf_fixed_digest_set_ctx_params_list[] = {
274
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_MODE, NULL, 0),
275
    OSSL_PARAM_int(OSSL_KDF_PARAM_MODE, NULL),
276
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_KEY, NULL, 0),
277
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0),
278
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_INFO, NULL, 0),
279
# if defined(FIPS_MODULE)
280
    OSSL_PARAM_int(OSSL_KDF_PARAM_FIPS_KEY_CHECK, NULL),
281
# endif
282
    OSSL_PARAM_END
283
};
284
#endif
285
286
#ifndef hkdf_fixed_digest_set_ctx_params_st
287
struct hkdf_fixed_digest_set_ctx_params_st {
288
# if defined(FIPS_MODULE)
289
    OSSL_PARAM *ind_k;
290
# endif
291
    OSSL_PARAM *info[HKDF_MAX_INFOS];
292
    int num_info;
293
    OSSL_PARAM *key;
294
    OSSL_PARAM *mode;
295
    OSSL_PARAM *salt;
296
};
297
#endif
298
299
#ifndef hkdf_fixed_digest_set_ctx_params_decoder
300
static int hkdf_fixed_digest_set_ctx_params_decoder
301
    (const OSSL_PARAM *p, struct hkdf_fixed_digest_set_ctx_params_st *r)
302
0
{
303
0
    const char *s;
304
305
0
    memset(r, 0, sizeof(*r));
306
0
    if (p != NULL)
307
0
        for (; (s = p->key) != NULL; p++)
308
0
            switch(s[0]) {
309
0
            default:
310
0
                break;
311
0
            case 'd':
312
0
                if (ossl_likely(strcmp("igest", s + 1) == 0)) {
313
                    /* OSSL_KDF_PARAM_DIGEST */
314
0
                    ERR_raise_data(ERR_LIB_PROV, ERR_R_UNSUPPORTED,
315
0
                                   "param %s is unsupported", s);
316
0
                    return 0;
317
0
                }
318
0
                break;
319
0
            case 'i':
320
0
                if (ossl_likely(strcmp("nfo", s + 1) == 0)) {
321
                    /* OSSL_KDF_PARAM_INFO */
322
0
                    if (ossl_unlikely(r->num_info >= HKDF_MAX_INFOS)) {
323
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_TOO_MANY_RECORDS,
324
0
                                       "param %s present >%d times", s, HKDF_MAX_INFOS);
325
0
                        return 0;
326
0
                    }
327
0
                    r->info[r->num_info++] = (OSSL_PARAM *)p;
328
0
                }
329
0
                break;
330
0
            case 'k':
331
0
                switch(s[1]) {
332
0
                default:
333
0
                    break;
334
0
                case 'e':
335
0
                    switch(s[2]) {
336
0
                    default:
337
0
                        break;
338
0
                    case 'y':
339
0
                        switch(s[3]) {
340
0
                        default:
341
0
                            break;
342
0
                        case '-':
343
# if defined(FIPS_MODULE)
344
                            if (ossl_likely(strcmp("check", s + 4) == 0)) {
345
                                /* OSSL_KDF_PARAM_FIPS_KEY_CHECK */
346
                                if (ossl_unlikely(r->ind_k != NULL)) {
347
                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
348
                                                   "param %s is repeated", s);
349
                                    return 0;
350
                                }
351
                                r->ind_k = (OSSL_PARAM *)p;
352
                            }
353
# endif
354
0
                            break;
355
0
                        case '\0':
356
0
                            if (ossl_unlikely(r->key != NULL)) {
357
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
358
0
                                               "param %s is repeated", s);
359
0
                                return 0;
360
0
                            }
361
0
                            r->key = (OSSL_PARAM *)p;
362
0
                        }
363
0
                    }
364
0
                }
365
0
                break;
366
0
            case 'm':
367
0
                if (ossl_likely(strcmp("ode", s + 1) == 0)) {
368
                    /* OSSL_KDF_PARAM_MODE */
369
0
                    if (ossl_unlikely(r->mode != NULL)) {
370
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
371
0
                                       "param %s is repeated", s);
372
0
                        return 0;
373
0
                    }
374
0
                    r->mode = (OSSL_PARAM *)p;
375
0
                }
376
0
                break;
377
0
            case 's':
378
0
                if (ossl_likely(strcmp("alt", s + 1) == 0)) {
379
                    /* OSSL_KDF_PARAM_SALT */
380
0
                    if (ossl_unlikely(r->salt != NULL)) {
381
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
382
0
                                       "param %s is repeated", s);
383
0
                        return 0;
384
0
                    }
385
0
                    r->salt = (OSSL_PARAM *)p;
386
0
                }
387
0
            }
388
0
    return 1;
389
0
}
390
#endif
391
/* End of machine generated */
392
393
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
394
#ifndef kdf_tls1_3_set_ctx_params_list
395
static const OSSL_PARAM kdf_tls1_3_set_ctx_params_list[] = {
396
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_MODE, NULL, 0),
397
    OSSL_PARAM_int(OSSL_KDF_PARAM_MODE, NULL),
398
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_KEY, NULL, 0),
399
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0),
400
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0),
401
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0),
402
# if defined(FIPS_MODULE)
403
    OSSL_PARAM_int(OSSL_KDF_PARAM_FIPS_KEY_CHECK, NULL),
404
# endif
405
# if defined(FIPS_MODULE)
406
    OSSL_PARAM_int(OSSL_KDF_PARAM_FIPS_DIGEST_CHECK, NULL),
407
# endif
408
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_PREFIX, NULL, 0),
409
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_LABEL, NULL, 0),
410
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_DATA, NULL, 0),
411
    OSSL_PARAM_END
412
};
413
#endif
414
415
#ifndef kdf_tls1_3_set_ctx_params_st
416
struct kdf_tls1_3_set_ctx_params_st {
417
    OSSL_PARAM *data;
418
    OSSL_PARAM *digest;
419
# if defined(FIPS_MODULE)
420
    OSSL_PARAM *ind_d;
421
# endif
422
# if defined(FIPS_MODULE)
423
    OSSL_PARAM *ind_k;
424
# endif
425
    OSSL_PARAM *key;
426
    OSSL_PARAM *label;
427
    OSSL_PARAM *mode;
428
    OSSL_PARAM *prefix;
429
    OSSL_PARAM *propq;
430
    OSSL_PARAM *salt;
431
};
432
#endif
433
434
#ifndef kdf_tls1_3_set_ctx_params_decoder
435
static int kdf_tls1_3_set_ctx_params_decoder
436
    (const OSSL_PARAM *p, struct kdf_tls1_3_set_ctx_params_st *r)
437
0
{
438
0
    const char *s;
439
440
0
    memset(r, 0, sizeof(*r));
441
0
    if (p != NULL)
442
0
        for (; (s = p->key) != NULL; p++)
443
0
            switch(s[0]) {
444
0
            default:
445
0
                break;
446
0
            case 'd':
447
0
                switch(s[1]) {
448
0
                default:
449
0
                    break;
450
0
                case 'a':
451
0
                    if (ossl_likely(strcmp("ta", s + 2) == 0)) {
452
                        /* OSSL_KDF_PARAM_DATA */
453
0
                        if (ossl_unlikely(r->data != NULL)) {
454
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
455
0
                                           "param %s is repeated", s);
456
0
                            return 0;
457
0
                        }
458
0
                        r->data = (OSSL_PARAM *)p;
459
0
                    }
460
0
                    break;
461
0
                case 'i':
462
0
                    switch(s[2]) {
463
0
                    default:
464
0
                        break;
465
0
                    case 'g':
466
0
                        switch(s[3]) {
467
0
                        default:
468
0
                            break;
469
0
                        case 'e':
470
0
                            switch(s[4]) {
471
0
                            default:
472
0
                                break;
473
0
                            case 's':
474
0
                                switch(s[5]) {
475
0
                                default:
476
0
                                    break;
477
0
                                case 't':
478
0
                                    switch(s[6]) {
479
0
                                    default:
480
0
                                        break;
481
0
                                    case '-':
482
# if defined(FIPS_MODULE)
483
                                        if (ossl_likely(strcmp("check", s + 7) == 0)) {
484
                                            /* OSSL_KDF_PARAM_FIPS_DIGEST_CHECK */
485
                                            if (ossl_unlikely(r->ind_d != NULL)) {
486
                                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
487
                                                               "param %s is repeated", s);
488
                                                return 0;
489
                                            }
490
                                            r->ind_d = (OSSL_PARAM *)p;
491
                                        }
492
# endif
493
0
                                        break;
494
0
                                    case '\0':
495
0
                                        if (ossl_unlikely(r->digest != NULL)) {
496
0
                                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
497
0
                                                           "param %s is repeated", s);
498
0
                                            return 0;
499
0
                                        }
500
0
                                        r->digest = (OSSL_PARAM *)p;
501
0
                                    }
502
0
                                }
503
0
                            }
504
0
                        }
505
0
                    }
506
0
                }
507
0
                break;
508
0
            case 'k':
509
0
                switch(s[1]) {
510
0
                default:
511
0
                    break;
512
0
                case 'e':
513
0
                    switch(s[2]) {
514
0
                    default:
515
0
                        break;
516
0
                    case 'y':
517
0
                        switch(s[3]) {
518
0
                        default:
519
0
                            break;
520
0
                        case '-':
521
# if defined(FIPS_MODULE)
522
                            if (ossl_likely(strcmp("check", s + 4) == 0)) {
523
                                /* OSSL_KDF_PARAM_FIPS_KEY_CHECK */
524
                                if (ossl_unlikely(r->ind_k != NULL)) {
525
                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
526
                                                   "param %s is repeated", s);
527
                                    return 0;
528
                                }
529
                                r->ind_k = (OSSL_PARAM *)p;
530
                            }
531
# endif
532
0
                            break;
533
0
                        case '\0':
534
0
                            if (ossl_unlikely(r->key != NULL)) {
535
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
536
0
                                               "param %s is repeated", s);
537
0
                                return 0;
538
0
                            }
539
0
                            r->key = (OSSL_PARAM *)p;
540
0
                        }
541
0
                    }
542
0
                }
543
0
                break;
544
0
            case 'l':
545
0
                if (ossl_likely(strcmp("abel", s + 1) == 0)) {
546
                    /* OSSL_KDF_PARAM_LABEL */
547
0
                    if (ossl_unlikely(r->label != NULL)) {
548
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
549
0
                                       "param %s is repeated", s);
550
0
                        return 0;
551
0
                    }
552
0
                    r->label = (OSSL_PARAM *)p;
553
0
                }
554
0
                break;
555
0
            case 'm':
556
0
                if (ossl_likely(strcmp("ode", s + 1) == 0)) {
557
                    /* OSSL_KDF_PARAM_MODE */
558
0
                    if (ossl_unlikely(r->mode != NULL)) {
559
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
560
0
                                       "param %s is repeated", s);
561
0
                        return 0;
562
0
                    }
563
0
                    r->mode = (OSSL_PARAM *)p;
564
0
                }
565
0
                break;
566
0
            case 'p':
567
0
                switch(s[1]) {
568
0
                default:
569
0
                    break;
570
0
                case 'r':
571
0
                    switch(s[2]) {
572
0
                    default:
573
0
                        break;
574
0
                    case 'e':
575
0
                        if (ossl_likely(strcmp("fix", s + 3) == 0)) {
576
                            /* OSSL_KDF_PARAM_PREFIX */
577
0
                            if (ossl_unlikely(r->prefix != NULL)) {
578
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
579
0
                                               "param %s is repeated", s);
580
0
                                return 0;
581
0
                            }
582
0
                            r->prefix = (OSSL_PARAM *)p;
583
0
                        }
584
0
                        break;
585
0
                    case 'o':
586
0
                        if (ossl_likely(strcmp("perties", s + 3) == 0)) {
587
                            /* OSSL_KDF_PARAM_PROPERTIES */
588
0
                            if (ossl_unlikely(r->propq != NULL)) {
589
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
590
0
                                               "param %s is repeated", s);
591
0
                                return 0;
592
0
                            }
593
0
                            r->propq = (OSSL_PARAM *)p;
594
0
                        }
595
0
                    }
596
0
                }
597
0
                break;
598
0
            case 's':
599
0
                if (ossl_likely(strcmp("alt", s + 1) == 0)) {
600
                    /* OSSL_KDF_PARAM_SALT */
601
0
                    if (ossl_unlikely(r->salt != NULL)) {
602
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
603
0
                                       "param %s is repeated", s);
604
0
                        return 0;
605
0
                    }
606
0
                    r->salt = (OSSL_PARAM *)p;
607
0
                }
608
0
            }
609
0
    return 1;
610
0
}
611
#endif
612
/* End of machine generated */