Coverage Report

Created: 2026-04-12 07:08

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/providers/implementations/kdfs/ikev2kdf.inc
Line
Count
Source
1
/*
2
 * Copyright 2026 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the \"License\").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
12
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
13
#ifndef ikev2_set_ctx_params_list
14
static const OSSL_PARAM ikev2_set_ctx_params_list[] = {
15
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0),
16
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0),
17
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_IKEV2KDF_NI, NULL, 0),
18
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_IKEV2KDF_NR, NULL, 0),
19
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_IKEV2KDF_SPII, NULL, 0),
20
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_IKEV2KDF_SPIR, NULL, 0),
21
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SEED, NULL, 0),
22
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_KEY, NULL, 0),
23
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SECRET, NULL, 0),
24
    OSSL_PARAM_int32(OSSL_KDF_PARAM_MODE, NULL),
25
    OSSL_PARAM_END
26
};
27
#endif
28
29
#ifndef ikev2_set_ctx_params_st
30
struct ikev2_set_ctx_params_st {
31
    OSSL_PARAM *digest;
32
    OSSL_PARAM *mode;
33
    OSSL_PARAM *ni;
34
    OSSL_PARAM *nr;
35
    OSSL_PARAM *propq;
36
    OSSL_PARAM *secret;
37
    OSSL_PARAM *seedkey;
38
    OSSL_PARAM *sk_d;
39
    OSSL_PARAM *spii;
40
    OSSL_PARAM *spir;
41
};
42
#endif
43
44
#ifndef ikev2_set_ctx_params_decoder
45
static int ikev2_set_ctx_params_decoder
46
    (const OSSL_PARAM *p, struct ikev2_set_ctx_params_st *r)
47
0
{
48
0
    const char *s;
49
50
0
    memset(r, 0, sizeof(*r));
51
0
    if (p != NULL)
52
0
        for (; (s = p->key) != NULL; p++)
53
0
            switch(s[0]) {
54
0
            default:
55
0
                break;
56
0
            case 'd':
57
0
                if (ossl_likely(strcmp("igest", s + 1) == 0)) {
58
                    /* OSSL_KDF_PARAM_DIGEST */
59
0
                    if (ossl_unlikely(r->digest != NULL)) {
60
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
61
0
                                       "param %s is repeated", s);
62
0
                        return 0;
63
0
                    }
64
0
                    r->digest = (OSSL_PARAM *)p;
65
0
                }
66
0
                break;
67
0
            case 'k':
68
0
                if (ossl_likely(strcmp("ey", s + 1) == 0)) {
69
                    /* OSSL_KDF_PARAM_KEY */
70
0
                    if (ossl_unlikely(r->sk_d != NULL)) {
71
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
72
0
                                       "param %s is repeated", s);
73
0
                        return 0;
74
0
                    }
75
0
                    r->sk_d = (OSSL_PARAM *)p;
76
0
                }
77
0
                break;
78
0
            case 'm':
79
0
                if (ossl_likely(strcmp("ode", s + 1) == 0)) {
80
                    /* OSSL_KDF_PARAM_MODE */
81
0
                    if (ossl_unlikely(r->mode != NULL)) {
82
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
83
0
                                       "param %s is repeated", s);
84
0
                        return 0;
85
0
                    }
86
0
                    r->mode = (OSSL_PARAM *)p;
87
0
                }
88
0
                break;
89
0
            case 'n':
90
0
                switch(s[1]) {
91
0
                default:
92
0
                    break;
93
0
                case 'i':
94
0
                    switch(s[2]) {
95
0
                    default:
96
0
                        break;
97
0
                    case '\0':
98
0
                        if (ossl_unlikely(r->ni != NULL)) {
99
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
100
0
                                           "param %s is repeated", s);
101
0
                            return 0;
102
0
                        }
103
0
                        r->ni = (OSSL_PARAM *)p;
104
0
                    }
105
0
                    break;
106
0
                case 'r':
107
0
                    switch(s[2]) {
108
0
                    default:
109
0
                        break;
110
0
                    case '\0':
111
0
                        if (ossl_unlikely(r->nr != NULL)) {
112
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
113
0
                                           "param %s is repeated", s);
114
0
                            return 0;
115
0
                        }
116
0
                        r->nr = (OSSL_PARAM *)p;
117
0
                    }
118
0
                }
119
0
                break;
120
0
            case 'p':
121
0
                if (ossl_likely(strcmp("roperties", s + 1) == 0)) {
122
                    /* OSSL_KDF_PARAM_PROPERTIES */
123
0
                    if (ossl_unlikely(r->propq != NULL)) {
124
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
125
0
                                       "param %s is repeated", s);
126
0
                        return 0;
127
0
                    }
128
0
                    r->propq = (OSSL_PARAM *)p;
129
0
                }
130
0
                break;
131
0
            case 's':
132
0
                switch(s[1]) {
133
0
                default:
134
0
                    break;
135
0
                case 'e':
136
0
                    switch(s[2]) {
137
0
                    default:
138
0
                        break;
139
0
                    case 'c':
140
0
                        if (ossl_likely(strcmp("ret", s + 3) == 0)) {
141
                            /* OSSL_KDF_PARAM_SECRET */
142
0
                            if (ossl_unlikely(r->secret != NULL)) {
143
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
144
0
                                               "param %s is repeated", s);
145
0
                                return 0;
146
0
                            }
147
0
                            r->secret = (OSSL_PARAM *)p;
148
0
                        }
149
0
                        break;
150
0
                    case 'e':
151
0
                        if (ossl_likely(strcmp("d", s + 3) == 0)) {
152
                            /* OSSL_KDF_PARAM_SEED */
153
0
                            if (ossl_unlikely(r->seedkey != NULL)) {
154
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
155
0
                                               "param %s is repeated", s);
156
0
                                return 0;
157
0
                            }
158
0
                            r->seedkey = (OSSL_PARAM *)p;
159
0
                        }
160
0
                    }
161
0
                    break;
162
0
                case 'p':
163
0
                    switch(s[2]) {
164
0
                    default:
165
0
                        break;
166
0
                    case 'i':
167
0
                        switch(s[3]) {
168
0
                        default:
169
0
                            break;
170
0
                        case 'i':
171
0
                            switch(s[4]) {
172
0
                            default:
173
0
                                break;
174
0
                            case '\0':
175
0
                                if (ossl_unlikely(r->spii != NULL)) {
176
0
                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
177
0
                                                   "param %s is repeated", s);
178
0
                                    return 0;
179
0
                                }
180
0
                                r->spii = (OSSL_PARAM *)p;
181
0
                            }
182
0
                            break;
183
0
                        case 'r':
184
0
                            switch(s[4]) {
185
0
                            default:
186
0
                                break;
187
0
                            case '\0':
188
0
                                if (ossl_unlikely(r->spir != NULL)) {
189
0
                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
190
0
                                                   "param %s is repeated", s);
191
0
                                    return 0;
192
0
                                }
193
0
                                r->spir = (OSSL_PARAM *)p;
194
0
                            }
195
0
                        }
196
0
                    }
197
0
                }
198
0
            }
199
0
    return 1;
200
0
}
201
#endif
202
/* End of machine generated */
203
204
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
205
#ifndef ikev2_get_ctx_params_list
206
static const OSSL_PARAM ikev2_get_ctx_params_list[] = {
207
    OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL),
208
    OSSL_PARAM_END
209
};
210
#endif
211
212
#ifndef ikev2_get_ctx_params_st
213
struct ikev2_get_ctx_params_st {
214
    OSSL_PARAM *size;
215
};
216
#endif
217
218
#ifndef ikev2_get_ctx_params_decoder
219
static int ikev2_get_ctx_params_decoder
220
    (const OSSL_PARAM *p, struct ikev2_get_ctx_params_st *r)
221
0
{
222
0
    const char *s;
223
224
0
    memset(r, 0, sizeof(*r));
225
0
    if (p != NULL)
226
0
        for (; (s = p->key) != NULL; p++)
227
0
            if (ossl_likely(strcmp("size", s + 0) == 0)) {
228
                /* OSSL_KDF_PARAM_SIZE */
229
0
                if (ossl_unlikely(r->size != NULL)) {
230
0
                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
231
0
                                   "param %s is repeated", s);
232
0
                    return 0;
233
0
                }
234
0
                r->size = (OSSL_PARAM *)p;
235
0
            }
236
0
    return 1;
237
0
}
238
#endif
239
/* End of machine generated */