Coverage Report

Created: 2025-12-08 06:22

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/providers/implementations/kdfs/hmacdrbg_kdf.inc
Line
Count
Source
1
/*
2
 * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the \"License\").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
12
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
13
#ifndef hmac_drbg_kdf_get_ctx_params_list
14
static const OSSL_PARAM hmac_drbg_kdf_get_ctx_params_list[] = {
15
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_MAC, NULL, 0),
16
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0),
17
    OSSL_PARAM_END
18
};
19
#endif
20
21
#ifndef hmac_drbg_kdf_get_ctx_params_st
22
struct hmac_drbg_kdf_get_ctx_params_st {
23
    OSSL_PARAM *digest;
24
    OSSL_PARAM *mac;
25
};
26
#endif
27
28
#ifndef hmac_drbg_kdf_get_ctx_params_decoder
29
static int hmac_drbg_kdf_get_ctx_params_decoder
30
    (const OSSL_PARAM *p, struct hmac_drbg_kdf_get_ctx_params_st *r)
31
0
{
32
0
    const char *s;
33
34
0
    memset(r, 0, sizeof(*r));
35
0
    if (p != NULL)
36
0
        for (; (s = p->key) != NULL; p++)
37
0
            switch(s[0]) {
38
0
            default:
39
0
                break;
40
0
            case 'd':
41
0
                if (ossl_likely(strcmp("igest", s + 1) == 0)) {
42
                    /* OSSL_KDF_PARAM_DIGEST */
43
0
                    if (ossl_unlikely(r->digest != NULL)) {
44
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
45
0
                                       "param %s is repeated", s);
46
0
                        return 0;
47
0
                    }
48
0
                    r->digest = (OSSL_PARAM *)p;
49
0
                }
50
0
                break;
51
0
            case 'm':
52
0
                if (ossl_likely(strcmp("ac", s + 1) == 0)) {
53
                    /* OSSL_KDF_PARAM_MAC */
54
0
                    if (ossl_unlikely(r->mac != NULL)) {
55
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
56
0
                                       "param %s is repeated", s);
57
0
                        return 0;
58
0
                    }
59
0
                    r->mac = (OSSL_PARAM *)p;
60
0
                }
61
0
            }
62
0
    return 1;
63
0
}
64
#endif
65
/* End of machine generated */
66
67
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
68
#ifndef hmac_drbg_kdf_set_ctx_params_list
69
static const OSSL_PARAM hmac_drbg_kdf_set_ctx_params_list[] = {
70
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0),
71
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0),
72
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_HMACDRBG_ENTROPY, NULL, 0),
73
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_HMACDRBG_NONCE, NULL, 0),
74
    OSSL_PARAM_END
75
};
76
#endif
77
78
#ifndef hmac_drbg_kdf_set_ctx_params_st
79
struct hmac_drbg_kdf_set_ctx_params_st {
80
    OSSL_PARAM *digest;
81
    OSSL_PARAM *ent;
82
    OSSL_PARAM *nonce;
83
    OSSL_PARAM *propq;
84
};
85
#endif
86
87
#ifndef hmac_drbg_kdf_set_ctx_params_decoder
88
static int hmac_drbg_kdf_set_ctx_params_decoder
89
    (const OSSL_PARAM *p, struct hmac_drbg_kdf_set_ctx_params_st *r)
90
0
{
91
0
    const char *s;
92
93
0
    memset(r, 0, sizeof(*r));
94
0
    if (p != NULL)
95
0
        for (; (s = p->key) != NULL; p++)
96
0
            switch(s[0]) {
97
0
            default:
98
0
                break;
99
0
            case 'd':
100
0
                if (ossl_likely(strcmp("igest", s + 1) == 0)) {
101
                    /* OSSL_KDF_PARAM_DIGEST */
102
0
                    if (ossl_unlikely(r->digest != NULL)) {
103
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
104
0
                                       "param %s is repeated", s);
105
0
                        return 0;
106
0
                    }
107
0
                    r->digest = (OSSL_PARAM *)p;
108
0
                }
109
0
                break;
110
0
            case 'e':
111
0
                if (ossl_likely(strcmp("ntropy", s + 1) == 0)) {
112
                    /* OSSL_KDF_PARAM_HMACDRBG_ENTROPY */
113
0
                    if (ossl_unlikely(r->ent != NULL)) {
114
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
115
0
                                       "param %s is repeated", s);
116
0
                        return 0;
117
0
                    }
118
0
                    r->ent = (OSSL_PARAM *)p;
119
0
                }
120
0
                break;
121
0
            case 'n':
122
0
                if (ossl_likely(strcmp("once", s + 1) == 0)) {
123
                    /* OSSL_KDF_PARAM_HMACDRBG_NONCE */
124
0
                    if (ossl_unlikely(r->nonce != NULL)) {
125
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
126
0
                                       "param %s is repeated", s);
127
0
                        return 0;
128
0
                    }
129
0
                    r->nonce = (OSSL_PARAM *)p;
130
0
                }
131
0
                break;
132
0
            case 'p':
133
0
                if (ossl_likely(strcmp("roperties", s + 1) == 0)) {
134
                    /* OSSL_KDF_PARAM_PROPERTIES */
135
0
                    if (ossl_unlikely(r->propq != NULL)) {
136
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
137
0
                                       "param %s is repeated", s);
138
0
                        return 0;
139
0
                    }
140
0
                    r->propq = (OSSL_PARAM *)p;
141
0
                }
142
0
            }
143
0
    return 1;
144
0
}
145
#endif
146
/* End of machine generated */