Coverage Report

Created: 2025-12-08 06:22

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/providers/implementations/macs/hmac_prov.inc
Line
Count
Source
1
/*
2
 * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the \"License\").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
12
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
13
#ifndef hmac_get_ctx_params_list
14
static const OSSL_PARAM hmac_get_ctx_params_list[] = {
15
    OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL),
16
    OSSL_PARAM_size_t(OSSL_MAC_PARAM_BLOCK_SIZE, NULL),
17
# if defined(FIPS_MODULE)
18
    OSSL_PARAM_int(OSSL_ALG_PARAM_FIPS_APPROVED_INDICATOR, NULL),
19
# endif
20
    OSSL_PARAM_END
21
};
22
#endif
23
24
#ifndef hmac_get_ctx_params_st
25
struct hmac_get_ctx_params_st {
26
    OSSL_PARAM *bsize;
27
# if defined(FIPS_MODULE)
28
    OSSL_PARAM *ind;
29
# endif
30
    OSSL_PARAM *size;
31
};
32
#endif
33
34
#ifndef hmac_get_ctx_params_decoder
35
static int hmac_get_ctx_params_decoder
36
    (const OSSL_PARAM *p, struct hmac_get_ctx_params_st *r)
37
0
{
38
0
    const char *s;
39
40
0
    memset(r, 0, sizeof(*r));
41
0
    if (p != NULL)
42
0
        for (; (s = p->key) != NULL; p++)
43
0
            switch(s[0]) {
44
0
            default:
45
0
                break;
46
0
            case 'b':
47
0
                if (ossl_likely(strcmp("lock-size", s + 1) == 0)) {
48
                    /* OSSL_MAC_PARAM_BLOCK_SIZE */
49
0
                    if (ossl_unlikely(r->bsize != NULL)) {
50
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
51
0
                                       "param %s is repeated", s);
52
0
                        return 0;
53
0
                    }
54
0
                    r->bsize = (OSSL_PARAM *)p;
55
0
                }
56
0
                break;
57
0
            case 'f':
58
# if defined(FIPS_MODULE)
59
                if (ossl_likely(strcmp("ips-indicator", s + 1) == 0)) {
60
                    /* OSSL_ALG_PARAM_FIPS_APPROVED_INDICATOR */
61
                    if (ossl_unlikely(r->ind != NULL)) {
62
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
63
                                       "param %s is repeated", s);
64
                        return 0;
65
                    }
66
                    r->ind = (OSSL_PARAM *)p;
67
                }
68
# endif
69
0
                break;
70
0
            case 's':
71
0
                if (ossl_likely(strcmp("ize", s + 1) == 0)) {
72
                    /* OSSL_MAC_PARAM_SIZE */
73
0
                    if (ossl_unlikely(r->size != NULL)) {
74
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
75
0
                                       "param %s is repeated", s);
76
0
                        return 0;
77
0
                    }
78
0
                    r->size = (OSSL_PARAM *)p;
79
0
                }
80
0
            }
81
0
    return 1;
82
0
}
83
#endif
84
/* End of machine generated */
85
86
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
87
#ifndef hmac_set_ctx_params_list
88
static const OSSL_PARAM hmac_set_ctx_params_list[] = {
89
    OSSL_PARAM_utf8_string(OSSL_MAC_PARAM_DIGEST, NULL, 0),
90
    OSSL_PARAM_utf8_string(OSSL_MAC_PARAM_PROPERTIES, NULL, 0),
91
    OSSL_PARAM_octet_string(OSSL_MAC_PARAM_KEY, NULL, 0),
92
    OSSL_PARAM_size_t(OSSL_MAC_PARAM_TLS_DATA_SIZE, NULL),
93
# if defined(FIPS_MODULE)
94
    OSSL_PARAM_int(OSSL_MAC_PARAM_FIPS_KEY_CHECK, NULL),
95
# endif
96
    OSSL_PARAM_END
97
};
98
#endif
99
100
#ifndef hmac_set_ctx_params_st
101
struct hmac_set_ctx_params_st {
102
    OSSL_PARAM *digest;
103
# if defined(FIPS_MODULE)
104
    OSSL_PARAM *ind_k;
105
# endif
106
    OSSL_PARAM *key;
107
    OSSL_PARAM *propq;
108
    OSSL_PARAM *tlssize;
109
};
110
#endif
111
112
#ifndef hmac_set_ctx_params_decoder
113
static int hmac_set_ctx_params_decoder
114
    (const OSSL_PARAM *p, struct hmac_set_ctx_params_st *r)
115
0
{
116
0
    const char *s;
117
118
0
    memset(r, 0, sizeof(*r));
119
0
    if (p != NULL)
120
0
        for (; (s = p->key) != NULL; p++)
121
0
            switch(s[0]) {
122
0
            default:
123
0
                break;
124
0
            case 'd':
125
0
                if (ossl_likely(strcmp("igest", s + 1) == 0)) {
126
                    /* OSSL_MAC_PARAM_DIGEST */
127
0
                    if (ossl_unlikely(r->digest != NULL)) {
128
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
129
0
                                       "param %s is repeated", s);
130
0
                        return 0;
131
0
                    }
132
0
                    r->digest = (OSSL_PARAM *)p;
133
0
                }
134
0
                break;
135
0
            case 'k':
136
0
                switch(s[1]) {
137
0
                default:
138
0
                    break;
139
0
                case 'e':
140
0
                    switch(s[2]) {
141
0
                    default:
142
0
                        break;
143
0
                    case 'y':
144
0
                        switch(s[3]) {
145
0
                        default:
146
0
                            break;
147
0
                        case '-':
148
# if defined(FIPS_MODULE)
149
                            if (ossl_likely(strcmp("check", s + 4) == 0)) {
150
                                /* OSSL_MAC_PARAM_FIPS_KEY_CHECK */
151
                                if (ossl_unlikely(r->ind_k != NULL)) {
152
                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
153
                                                   "param %s is repeated", s);
154
                                    return 0;
155
                                }
156
                                r->ind_k = (OSSL_PARAM *)p;
157
                            }
158
# endif
159
0
                            break;
160
0
                        case '\0':
161
0
                            if (ossl_unlikely(r->key != NULL)) {
162
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
163
0
                                               "param %s is repeated", s);
164
0
                                return 0;
165
0
                            }
166
0
                            r->key = (OSSL_PARAM *)p;
167
0
                        }
168
0
                    }
169
0
                }
170
0
                break;
171
0
            case 'p':
172
0
                if (ossl_likely(strcmp("roperties", s + 1) == 0)) {
173
                    /* OSSL_MAC_PARAM_PROPERTIES */
174
0
                    if (ossl_unlikely(r->propq != NULL)) {
175
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
176
0
                                       "param %s is repeated", s);
177
0
                        return 0;
178
0
                    }
179
0
                    r->propq = (OSSL_PARAM *)p;
180
0
                }
181
0
                break;
182
0
            case 't':
183
0
                if (ossl_likely(strcmp("ls-data-size", s + 1) == 0)) {
184
                    /* OSSL_MAC_PARAM_TLS_DATA_SIZE */
185
0
                    if (ossl_unlikely(r->tlssize != NULL)) {
186
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
187
0
                                       "param %s is repeated", s);
188
0
                        return 0;
189
0
                    }
190
0
                    r->tlssize = (OSSL_PARAM *)p;
191
0
                }
192
0
            }
193
0
    return 1;
194
0
}
195
#endif
196
/* End of machine generated */