Coverage Report

Created: 2025-12-08 06:22

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/providers/implementations/kdfs/pkcs12kdf.inc
Line
Count
Source
1
/*
2
 * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the \"License\").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
12
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
13
#ifndef pkcs12_set_ctx_params_list
14
static const OSSL_PARAM pkcs12_set_ctx_params_list[] = {
15
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0),
16
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0),
17
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_PASSWORD, NULL, 0),
18
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0),
19
    OSSL_PARAM_uint64(OSSL_KDF_PARAM_ITER, NULL),
20
    OSSL_PARAM_int(OSSL_KDF_PARAM_PKCS12_ID, NULL),
21
    OSSL_PARAM_END
22
};
23
#endif
24
25
#ifndef pkcs12_set_ctx_params_st
26
struct pkcs12_set_ctx_params_st {
27
    OSSL_PARAM *digest;
28
    OSSL_PARAM *iter;
29
    OSSL_PARAM *p12id;
30
    OSSL_PARAM *propq;
31
    OSSL_PARAM *pw;
32
    OSSL_PARAM *salt;
33
};
34
#endif
35
36
#ifndef pkcs12_set_ctx_params_decoder
37
static int pkcs12_set_ctx_params_decoder
38
    (const OSSL_PARAM *p, struct pkcs12_set_ctx_params_st *r)
39
0
{
40
0
    const char *s;
41
42
0
    memset(r, 0, sizeof(*r));
43
0
    if (p != NULL)
44
0
        for (; (s = p->key) != NULL; p++)
45
0
            switch(s[0]) {
46
0
            default:
47
0
                break;
48
0
            case 'd':
49
0
                if (ossl_likely(strcmp("igest", s + 1) == 0)) {
50
                    /* OSSL_KDF_PARAM_DIGEST */
51
0
                    if (ossl_unlikely(r->digest != NULL)) {
52
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
53
0
                                       "param %s is repeated", s);
54
0
                        return 0;
55
0
                    }
56
0
                    r->digest = (OSSL_PARAM *)p;
57
0
                }
58
0
                break;
59
0
            case 'i':
60
0
                switch(s[1]) {
61
0
                default:
62
0
                    break;
63
0
                case 'd':
64
0
                    switch(s[2]) {
65
0
                    default:
66
0
                        break;
67
0
                    case '\0':
68
0
                        if (ossl_unlikely(r->p12id != NULL)) {
69
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
70
0
                                           "param %s is repeated", s);
71
0
                            return 0;
72
0
                        }
73
0
                        r->p12id = (OSSL_PARAM *)p;
74
0
                    }
75
0
                    break;
76
0
                case 't':
77
0
                    if (ossl_likely(strcmp("er", s + 2) == 0)) {
78
                        /* OSSL_KDF_PARAM_ITER */
79
0
                        if (ossl_unlikely(r->iter != NULL)) {
80
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
81
0
                                           "param %s is repeated", s);
82
0
                            return 0;
83
0
                        }
84
0
                        r->iter = (OSSL_PARAM *)p;
85
0
                    }
86
0
                }
87
0
                break;
88
0
            case 'p':
89
0
                switch(s[1]) {
90
0
                default:
91
0
                    break;
92
0
                case 'a':
93
0
                    if (ossl_likely(strcmp("ss", s + 2) == 0)) {
94
                        /* OSSL_KDF_PARAM_PASSWORD */
95
0
                        if (ossl_unlikely(r->pw != NULL)) {
96
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
97
0
                                           "param %s is repeated", s);
98
0
                            return 0;
99
0
                        }
100
0
                        r->pw = (OSSL_PARAM *)p;
101
0
                    }
102
0
                    break;
103
0
                case 'r':
104
0
                    if (ossl_likely(strcmp("operties", s + 2) == 0)) {
105
                        /* OSSL_KDF_PARAM_PROPERTIES */
106
0
                        if (ossl_unlikely(r->propq != NULL)) {
107
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
108
0
                                           "param %s is repeated", s);
109
0
                            return 0;
110
0
                        }
111
0
                        r->propq = (OSSL_PARAM *)p;
112
0
                    }
113
0
                }
114
0
                break;
115
0
            case 's':
116
0
                if (ossl_likely(strcmp("alt", s + 1) == 0)) {
117
                    /* OSSL_KDF_PARAM_SALT */
118
0
                    if (ossl_unlikely(r->salt != NULL)) {
119
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
120
0
                                       "param %s is repeated", s);
121
0
                        return 0;
122
0
                    }
123
0
                    r->salt = (OSSL_PARAM *)p;
124
0
                }
125
0
            }
126
0
    return 1;
127
0
}
128
#endif
129
/* End of machine generated */
130
131
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
132
#ifndef pkcs12_get_ctx_params_list
133
static const OSSL_PARAM pkcs12_get_ctx_params_list[] = {
134
    OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL),
135
    OSSL_PARAM_END
136
};
137
#endif
138
139
#ifndef pkcs12_get_ctx_params_st
140
struct pkcs12_get_ctx_params_st {
141
    OSSL_PARAM *size;
142
};
143
#endif
144
145
#ifndef pkcs12_get_ctx_params_decoder
146
static int pkcs12_get_ctx_params_decoder
147
    (const OSSL_PARAM *p, struct pkcs12_get_ctx_params_st *r)
148
0
{
149
0
    const char *s;
150
151
0
    memset(r, 0, sizeof(*r));
152
0
    if (p != NULL)
153
0
        for (; (s = p->key) != NULL; p++)
154
0
            if (ossl_likely(strcmp("size", s + 0) == 0)) {
155
                /* OSSL_KDF_PARAM_SIZE */
156
0
                if (ossl_unlikely(r->size != NULL)) {
157
0
                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
158
0
                                   "param %s is repeated", s);
159
0
                    return 0;
160
0
                }
161
0
                r->size = (OSSL_PARAM *)p;
162
0
            }
163
0
    return 1;
164
0
}
165
#endif
166
/* End of machine generated */