Coverage Report

Created: 2026-05-20 07:05

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/providers/implementations/kdfs/hkdf.inc
Line
Count
Source
1
/*
2
 * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the \"License\").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
12
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
13
#include <string.h>
14
#include <openssl/params.h>
15
#include "internal/common.h"
16
#include "prov/proverr.h"
17
18
#ifndef hkdf_set_ctx_params_list
19
static const OSSL_PARAM hkdf_set_ctx_params_list[] = {
20
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_MODE, NULL, 0),
21
    OSSL_PARAM_int(OSSL_KDF_PARAM_MODE, NULL),
22
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_KEY, NULL, 0),
23
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0),
24
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0),
25
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0),
26
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_INFO, NULL, 0),
27
# if defined(FIPS_MODULE)
28
    OSSL_PARAM_int(OSSL_KDF_PARAM_FIPS_KEY_CHECK, NULL),
29
# endif
30
    OSSL_PARAM_END
31
};
32
#endif
33
34
#ifndef hkdf_set_ctx_params_st
35
struct hkdf_set_ctx_params_st {
36
    OSSL_PARAM *digest;
37
# if defined(FIPS_MODULE)
38
    OSSL_PARAM *ind_k;
39
# endif
40
    OSSL_PARAM *info[HKDF_MAX_INFOS];
41
    int num_info;
42
    OSSL_PARAM *key;
43
    OSSL_PARAM *mode;
44
    OSSL_PARAM *propq;
45
    OSSL_PARAM *salt;
46
};
47
#endif
48
49
#ifndef hkdf_set_ctx_params_decoder
50
static int hkdf_set_ctx_params_decoder
51
    (const OSSL_PARAM *p, struct hkdf_set_ctx_params_st *r)
52
0
{
53
0
    const char *s;
54
55
0
    memset(r, 0, sizeof(*r));
56
0
    if (p != NULL)
57
0
        for (; (s = p->key) != NULL; p++)
58
0
            switch(s[0]) {
59
0
            default:
60
0
                break;
61
0
            case 'd':
62
0
                if (ossl_likely(strcmp("igest", s + 1) == 0)) {
63
                    /* OSSL_KDF_PARAM_DIGEST */
64
0
                    if (ossl_unlikely(r->digest != NULL)) {
65
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
66
0
                                       "param %s is repeated", s);
67
0
                        return 0;
68
0
                    }
69
0
                    r->digest = (OSSL_PARAM *)p;
70
0
                }
71
0
                break;
72
0
            case 'i':
73
0
                if (ossl_likely(strcmp("nfo", s + 1) == 0)) {
74
                    /* OSSL_KDF_PARAM_INFO */
75
0
                    if (ossl_unlikely(r->num_info >= HKDF_MAX_INFOS)) {
76
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_TOO_MANY_RECORDS,
77
0
                                       "param %s present >%d times", s, HKDF_MAX_INFOS);
78
0
                        return 0;
79
0
                    }
80
0
                    r->info[r->num_info++] = (OSSL_PARAM *)p;
81
0
                }
82
0
                break;
83
0
            case 'k':
84
0
                switch(s[1]) {
85
0
                default:
86
0
                    break;
87
0
                case 'e':
88
0
                    switch(s[2]) {
89
0
                    default:
90
0
                        break;
91
0
                    case 'y':
92
0
                        switch(s[3]) {
93
0
                        default:
94
0
                            break;
95
0
                        case '-':
96
# if defined(FIPS_MODULE)
97
                            if (ossl_likely(strcmp("check", s + 4) == 0)) {
98
                                /* OSSL_KDF_PARAM_FIPS_KEY_CHECK */
99
                                if (ossl_unlikely(r->ind_k != NULL)) {
100
                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
101
                                                   "param %s is repeated", s);
102
                                    return 0;
103
                                }
104
                                r->ind_k = (OSSL_PARAM *)p;
105
                            }
106
# endif
107
0
                            break;
108
0
                        case '\0':
109
0
                            if (ossl_unlikely(r->key != NULL)) {
110
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
111
0
                                               "param %s is repeated", s);
112
0
                                return 0;
113
0
                            }
114
0
                            r->key = (OSSL_PARAM *)p;
115
0
                        }
116
0
                    }
117
0
                }
118
0
                break;
119
0
            case 'm':
120
0
                if (ossl_likely(strcmp("ode", s + 1) == 0)) {
121
                    /* OSSL_KDF_PARAM_MODE */
122
0
                    if (ossl_unlikely(r->mode != NULL)) {
123
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
124
0
                                       "param %s is repeated", s);
125
0
                        return 0;
126
0
                    }
127
0
                    r->mode = (OSSL_PARAM *)p;
128
0
                }
129
0
                break;
130
0
            case 'p':
131
0
                if (ossl_likely(strcmp("roperties", s + 1) == 0)) {
132
                    /* OSSL_KDF_PARAM_PROPERTIES */
133
0
                    if (ossl_unlikely(r->propq != NULL)) {
134
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
135
0
                                       "param %s is repeated", s);
136
0
                        return 0;
137
0
                    }
138
0
                    r->propq = (OSSL_PARAM *)p;
139
0
                }
140
0
                break;
141
0
            case 's':
142
0
                if (ossl_likely(strcmp("alt", s + 1) == 0)) {
143
                    /* OSSL_KDF_PARAM_SALT */
144
0
                    if (ossl_unlikely(r->salt != NULL)) {
145
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
146
0
                                       "param %s is repeated", s);
147
0
                        return 0;
148
0
                    }
149
0
                    r->salt = (OSSL_PARAM *)p;
150
0
                }
151
0
            }
152
0
    return 1;
153
0
}
154
#endif
155
/* End of machine generated */
156
157
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
158
#include <string.h>
159
#include <openssl/params.h>
160
#include "internal/common.h"
161
#include "prov/proverr.h"
162
163
#ifndef hkdf_get_ctx_params_list
164
static const OSSL_PARAM hkdf_get_ctx_params_list[] = {
165
    OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL),
166
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0),
167
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_MODE, NULL, 0),
168
    OSSL_PARAM_int(OSSL_KDF_PARAM_MODE, NULL),
169
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0),
170
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_INFO, NULL, 0),
171
# if defined(FIPS_MODULE)
172
    OSSL_PARAM_int(OSSL_KDF_PARAM_FIPS_APPROVED_INDICATOR, NULL),
173
# endif
174
    OSSL_PARAM_END
175
};
176
#endif
177
178
#ifndef hkdf_get_ctx_params_st
179
struct hkdf_get_ctx_params_st {
180
    OSSL_PARAM *digest;
181
# if defined(FIPS_MODULE)
182
    OSSL_PARAM *ind;
183
# endif
184
    OSSL_PARAM *info;
185
    OSSL_PARAM *mode;
186
    OSSL_PARAM *salt;
187
    OSSL_PARAM *size;
188
};
189
#endif
190
191
#ifndef hkdf_get_ctx_params_decoder
192
static int hkdf_get_ctx_params_decoder
193
    (const OSSL_PARAM *p, struct hkdf_get_ctx_params_st *r)
194
0
{
195
0
    const char *s;
196
197
0
    memset(r, 0, sizeof(*r));
198
0
    if (p != NULL)
199
0
        for (; (s = p->key) != NULL; p++)
200
0
            switch(s[0]) {
201
0
            default:
202
0
                break;
203
0
            case 'd':
204
0
                if (ossl_likely(strcmp("igest", s + 1) == 0)) {
205
                    /* OSSL_KDF_PARAM_DIGEST */
206
0
                    if (ossl_unlikely(r->digest != NULL)) {
207
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
208
0
                                       "param %s is repeated", s);
209
0
                        return 0;
210
0
                    }
211
0
                    r->digest = (OSSL_PARAM *)p;
212
0
                }
213
0
                break;
214
0
            case 'f':
215
# if defined(FIPS_MODULE)
216
                if (ossl_likely(strcmp("ips-indicator", s + 1) == 0)) {
217
                    /* OSSL_KDF_PARAM_FIPS_APPROVED_INDICATOR */
218
                    if (ossl_unlikely(r->ind != NULL)) {
219
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
220
                                       "param %s is repeated", s);
221
                        return 0;
222
                    }
223
                    r->ind = (OSSL_PARAM *)p;
224
                }
225
# endif
226
0
                break;
227
0
            case 'i':
228
0
                if (ossl_likely(strcmp("nfo", s + 1) == 0)) {
229
                    /* OSSL_KDF_PARAM_INFO */
230
0
                    if (ossl_unlikely(r->info != NULL)) {
231
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
232
0
                                       "param %s is repeated", s);
233
0
                        return 0;
234
0
                    }
235
0
                    r->info = (OSSL_PARAM *)p;
236
0
                }
237
0
                break;
238
0
            case 'm':
239
0
                if (ossl_likely(strcmp("ode", s + 1) == 0)) {
240
                    /* OSSL_KDF_PARAM_MODE */
241
0
                    if (ossl_unlikely(r->mode != NULL)) {
242
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
243
0
                                       "param %s is repeated", s);
244
0
                        return 0;
245
0
                    }
246
0
                    r->mode = (OSSL_PARAM *)p;
247
0
                }
248
0
                break;
249
0
            case 's':
250
0
                switch(s[1]) {
251
0
                default:
252
0
                    break;
253
0
                case 'a':
254
0
                    if (ossl_likely(strcmp("lt", s + 2) == 0)) {
255
                        /* OSSL_KDF_PARAM_SALT */
256
0
                        if (ossl_unlikely(r->salt != NULL)) {
257
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
258
0
                                           "param %s is repeated", s);
259
0
                            return 0;
260
0
                        }
261
0
                        r->salt = (OSSL_PARAM *)p;
262
0
                    }
263
0
                    break;
264
0
                case 'i':
265
0
                    if (ossl_likely(strcmp("ze", s + 2) == 0)) {
266
                        /* OSSL_KDF_PARAM_SIZE */
267
0
                        if (ossl_unlikely(r->size != NULL)) {
268
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
269
0
                                           "param %s is repeated", s);
270
0
                            return 0;
271
0
                        }
272
0
                        r->size = (OSSL_PARAM *)p;
273
0
                    }
274
0
                }
275
0
            }
276
0
    return 1;
277
0
}
278
#endif
279
/* End of machine generated */
280
281
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
282
#include <string.h>
283
#include <openssl/params.h>
284
#include "internal/common.h"
285
#include "prov/proverr.h"
286
287
#ifndef hkdf_fixed_digest_set_ctx_params_list
288
static const OSSL_PARAM hkdf_fixed_digest_set_ctx_params_list[] = {
289
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_MODE, NULL, 0),
290
    OSSL_PARAM_int(OSSL_KDF_PARAM_MODE, NULL),
291
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_KEY, NULL, 0),
292
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0),
293
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_INFO, NULL, 0),
294
# if defined(FIPS_MODULE)
295
    OSSL_PARAM_int(OSSL_KDF_PARAM_FIPS_KEY_CHECK, NULL),
296
# endif
297
    OSSL_PARAM_END
298
};
299
#endif
300
301
#ifndef hkdf_fixed_digest_set_ctx_params_st
302
struct hkdf_fixed_digest_set_ctx_params_st {
303
# if defined(FIPS_MODULE)
304
    OSSL_PARAM *ind_k;
305
# endif
306
    OSSL_PARAM *info[HKDF_MAX_INFOS];
307
    int num_info;
308
    OSSL_PARAM *key;
309
    OSSL_PARAM *mode;
310
    OSSL_PARAM *salt;
311
};
312
#endif
313
314
#ifndef hkdf_fixed_digest_set_ctx_params_decoder
315
static int hkdf_fixed_digest_set_ctx_params_decoder
316
    (const OSSL_PARAM *p, struct hkdf_fixed_digest_set_ctx_params_st *r)
317
0
{
318
0
    const char *s;
319
320
0
    memset(r, 0, sizeof(*r));
321
0
    if (p != NULL)
322
0
        for (; (s = p->key) != NULL; p++)
323
0
            switch(s[0]) {
324
0
            default:
325
0
                break;
326
0
            case 'd':
327
0
                if (ossl_likely(strcmp("igest", s + 1) == 0)) {
328
                    /* OSSL_KDF_PARAM_DIGEST */
329
0
                    ERR_raise_data(ERR_LIB_PROV, ERR_R_UNSUPPORTED,
330
0
                                   "param %s is unsupported", s);
331
0
                    return 0;
332
0
                }
333
0
                break;
334
0
            case 'i':
335
0
                if (ossl_likely(strcmp("nfo", s + 1) == 0)) {
336
                    /* OSSL_KDF_PARAM_INFO */
337
0
                    if (ossl_unlikely(r->num_info >= HKDF_MAX_INFOS)) {
338
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_TOO_MANY_RECORDS,
339
0
                                       "param %s present >%d times", s, HKDF_MAX_INFOS);
340
0
                        return 0;
341
0
                    }
342
0
                    r->info[r->num_info++] = (OSSL_PARAM *)p;
343
0
                }
344
0
                break;
345
0
            case 'k':
346
0
                switch(s[1]) {
347
0
                default:
348
0
                    break;
349
0
                case 'e':
350
0
                    switch(s[2]) {
351
0
                    default:
352
0
                        break;
353
0
                    case 'y':
354
0
                        switch(s[3]) {
355
0
                        default:
356
0
                            break;
357
0
                        case '-':
358
# if defined(FIPS_MODULE)
359
                            if (ossl_likely(strcmp("check", s + 4) == 0)) {
360
                                /* OSSL_KDF_PARAM_FIPS_KEY_CHECK */
361
                                if (ossl_unlikely(r->ind_k != NULL)) {
362
                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
363
                                                   "param %s is repeated", s);
364
                                    return 0;
365
                                }
366
                                r->ind_k = (OSSL_PARAM *)p;
367
                            }
368
# endif
369
0
                            break;
370
0
                        case '\0':
371
0
                            if (ossl_unlikely(r->key != NULL)) {
372
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
373
0
                                               "param %s is repeated", s);
374
0
                                return 0;
375
0
                            }
376
0
                            r->key = (OSSL_PARAM *)p;
377
0
                        }
378
0
                    }
379
0
                }
380
0
                break;
381
0
            case 'm':
382
0
                if (ossl_likely(strcmp("ode", s + 1) == 0)) {
383
                    /* OSSL_KDF_PARAM_MODE */
384
0
                    if (ossl_unlikely(r->mode != NULL)) {
385
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
386
0
                                       "param %s is repeated", s);
387
0
                        return 0;
388
0
                    }
389
0
                    r->mode = (OSSL_PARAM *)p;
390
0
                }
391
0
                break;
392
0
            case 's':
393
0
                if (ossl_likely(strcmp("alt", s + 1) == 0)) {
394
                    /* OSSL_KDF_PARAM_SALT */
395
0
                    if (ossl_unlikely(r->salt != NULL)) {
396
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
397
0
                                       "param %s is repeated", s);
398
0
                        return 0;
399
0
                    }
400
0
                    r->salt = (OSSL_PARAM *)p;
401
0
                }
402
0
            }
403
0
    return 1;
404
0
}
405
#endif
406
/* End of machine generated */
407
408
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
409
#include <string.h>
410
#include <openssl/params.h>
411
#include "internal/common.h"
412
#include "prov/proverr.h"
413
414
#ifndef kdf_tls1_3_set_ctx_params_list
415
static const OSSL_PARAM kdf_tls1_3_set_ctx_params_list[] = {
416
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_MODE, NULL, 0),
417
    OSSL_PARAM_int(OSSL_KDF_PARAM_MODE, NULL),
418
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_KEY, NULL, 0),
419
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0),
420
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0),
421
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0),
422
# if defined(FIPS_MODULE)
423
    OSSL_PARAM_int(OSSL_KDF_PARAM_FIPS_KEY_CHECK, NULL),
424
# endif
425
# if defined(FIPS_MODULE)
426
    OSSL_PARAM_int(OSSL_KDF_PARAM_FIPS_DIGEST_CHECK, NULL),
427
# endif
428
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_PREFIX, NULL, 0),
429
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_LABEL, NULL, 0),
430
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_DATA, NULL, 0),
431
    OSSL_PARAM_END
432
};
433
#endif
434
435
#ifndef kdf_tls1_3_set_ctx_params_st
436
struct kdf_tls1_3_set_ctx_params_st {
437
    OSSL_PARAM *data;
438
    OSSL_PARAM *digest;
439
# if defined(FIPS_MODULE)
440
    OSSL_PARAM *ind_d;
441
# endif
442
# if defined(FIPS_MODULE)
443
    OSSL_PARAM *ind_k;
444
# endif
445
    OSSL_PARAM *key;
446
    OSSL_PARAM *label;
447
    OSSL_PARAM *mode;
448
    OSSL_PARAM *prefix;
449
    OSSL_PARAM *propq;
450
    OSSL_PARAM *salt;
451
};
452
#endif
453
454
#ifndef kdf_tls1_3_set_ctx_params_decoder
455
static int kdf_tls1_3_set_ctx_params_decoder
456
    (const OSSL_PARAM *p, struct kdf_tls1_3_set_ctx_params_st *r)
457
0
{
458
0
    const char *s;
459
460
0
    memset(r, 0, sizeof(*r));
461
0
    if (p != NULL)
462
0
        for (; (s = p->key) != NULL; p++)
463
0
            switch(s[0]) {
464
0
            default:
465
0
                break;
466
0
            case 'd':
467
0
                switch(s[1]) {
468
0
                default:
469
0
                    break;
470
0
                case 'a':
471
0
                    if (ossl_likely(strcmp("ta", s + 2) == 0)) {
472
                        /* OSSL_KDF_PARAM_DATA */
473
0
                        if (ossl_unlikely(r->data != NULL)) {
474
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
475
0
                                           "param %s is repeated", s);
476
0
                            return 0;
477
0
                        }
478
0
                        r->data = (OSSL_PARAM *)p;
479
0
                    }
480
0
                    break;
481
0
                case 'i':
482
0
                    switch(s[2]) {
483
0
                    default:
484
0
                        break;
485
0
                    case 'g':
486
0
                        switch(s[3]) {
487
0
                        default:
488
0
                            break;
489
0
                        case 'e':
490
0
                            switch(s[4]) {
491
0
                            default:
492
0
                                break;
493
0
                            case 's':
494
0
                                switch(s[5]) {
495
0
                                default:
496
0
                                    break;
497
0
                                case 't':
498
0
                                    switch(s[6]) {
499
0
                                    default:
500
0
                                        break;
501
0
                                    case '-':
502
# if defined(FIPS_MODULE)
503
                                        if (ossl_likely(strcmp("check", s + 7) == 0)) {
504
                                            /* OSSL_KDF_PARAM_FIPS_DIGEST_CHECK */
505
                                            if (ossl_unlikely(r->ind_d != NULL)) {
506
                                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
507
                                                               "param %s is repeated", s);
508
                                                return 0;
509
                                            }
510
                                            r->ind_d = (OSSL_PARAM *)p;
511
                                        }
512
# endif
513
0
                                        break;
514
0
                                    case '\0':
515
0
                                        if (ossl_unlikely(r->digest != NULL)) {
516
0
                                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
517
0
                                                           "param %s is repeated", s);
518
0
                                            return 0;
519
0
                                        }
520
0
                                        r->digest = (OSSL_PARAM *)p;
521
0
                                    }
522
0
                                }
523
0
                            }
524
0
                        }
525
0
                    }
526
0
                }
527
0
                break;
528
0
            case 'k':
529
0
                switch(s[1]) {
530
0
                default:
531
0
                    break;
532
0
                case 'e':
533
0
                    switch(s[2]) {
534
0
                    default:
535
0
                        break;
536
0
                    case 'y':
537
0
                        switch(s[3]) {
538
0
                        default:
539
0
                            break;
540
0
                        case '-':
541
# if defined(FIPS_MODULE)
542
                            if (ossl_likely(strcmp("check", s + 4) == 0)) {
543
                                /* OSSL_KDF_PARAM_FIPS_KEY_CHECK */
544
                                if (ossl_unlikely(r->ind_k != NULL)) {
545
                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
546
                                                   "param %s is repeated", s);
547
                                    return 0;
548
                                }
549
                                r->ind_k = (OSSL_PARAM *)p;
550
                            }
551
# endif
552
0
                            break;
553
0
                        case '\0':
554
0
                            if (ossl_unlikely(r->key != NULL)) {
555
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
556
0
                                               "param %s is repeated", s);
557
0
                                return 0;
558
0
                            }
559
0
                            r->key = (OSSL_PARAM *)p;
560
0
                        }
561
0
                    }
562
0
                }
563
0
                break;
564
0
            case 'l':
565
0
                if (ossl_likely(strcmp("abel", s + 1) == 0)) {
566
                    /* OSSL_KDF_PARAM_LABEL */
567
0
                    if (ossl_unlikely(r->label != NULL)) {
568
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
569
0
                                       "param %s is repeated", s);
570
0
                        return 0;
571
0
                    }
572
0
                    r->label = (OSSL_PARAM *)p;
573
0
                }
574
0
                break;
575
0
            case 'm':
576
0
                if (ossl_likely(strcmp("ode", s + 1) == 0)) {
577
                    /* OSSL_KDF_PARAM_MODE */
578
0
                    if (ossl_unlikely(r->mode != NULL)) {
579
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
580
0
                                       "param %s is repeated", s);
581
0
                        return 0;
582
0
                    }
583
0
                    r->mode = (OSSL_PARAM *)p;
584
0
                }
585
0
                break;
586
0
            case 'p':
587
0
                switch(s[1]) {
588
0
                default:
589
0
                    break;
590
0
                case 'r':
591
0
                    switch(s[2]) {
592
0
                    default:
593
0
                        break;
594
0
                    case 'e':
595
0
                        if (ossl_likely(strcmp("fix", s + 3) == 0)) {
596
                            /* OSSL_KDF_PARAM_PREFIX */
597
0
                            if (ossl_unlikely(r->prefix != NULL)) {
598
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
599
0
                                               "param %s is repeated", s);
600
0
                                return 0;
601
0
                            }
602
0
                            r->prefix = (OSSL_PARAM *)p;
603
0
                        }
604
0
                        break;
605
0
                    case 'o':
606
0
                        if (ossl_likely(strcmp("perties", s + 3) == 0)) {
607
                            /* OSSL_KDF_PARAM_PROPERTIES */
608
0
                            if (ossl_unlikely(r->propq != NULL)) {
609
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
610
0
                                               "param %s is repeated", s);
611
0
                                return 0;
612
0
                            }
613
0
                            r->propq = (OSSL_PARAM *)p;
614
0
                        }
615
0
                    }
616
0
                }
617
0
                break;
618
0
            case 's':
619
0
                if (ossl_likely(strcmp("alt", s + 1) == 0)) {
620
                    /* OSSL_KDF_PARAM_SALT */
621
0
                    if (ossl_unlikely(r->salt != NULL)) {
622
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
623
0
                                       "param %s is repeated", s);
624
0
                        return 0;
625
0
                    }
626
0
                    r->salt = (OSSL_PARAM *)p;
627
0
                }
628
0
            }
629
0
    return 1;
630
0
}
631
#endif
632
/* End of machine generated */