Coverage Report

Created: 2026-05-20 07:05

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/providers/implementations/kdfs/pbkdf2.inc
Line
Count
Source
1
/*
2
 * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the \"License\").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
12
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
13
#include <string.h>
14
#include <openssl/params.h>
15
#include "internal/common.h"
16
#include "prov/proverr.h"
17
18
#ifndef pbkdf2_set_ctx_params_list
19
static const OSSL_PARAM pbkdf2_set_ctx_params_list[] = {
20
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0),
21
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0),
22
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_PASSWORD, NULL, 0),
23
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SALT, NULL, 0),
24
    OSSL_PARAM_uint64(OSSL_KDF_PARAM_ITER, NULL),
25
    OSSL_PARAM_int(OSSL_KDF_PARAM_PKCS5, NULL),
26
    OSSL_PARAM_END
27
};
28
#endif
29
30
#ifndef pbkdf2_set_ctx_params_st
31
struct pbkdf2_set_ctx_params_st {
32
    OSSL_PARAM *digest;
33
    OSSL_PARAM *iter;
34
    OSSL_PARAM *pkcs5;
35
    OSSL_PARAM *propq;
36
    OSSL_PARAM *pw;
37
    OSSL_PARAM *salt;
38
};
39
#endif
40
41
#ifndef pbkdf2_set_ctx_params_decoder
42
static int pbkdf2_set_ctx_params_decoder
43
    (const OSSL_PARAM *p, struct pbkdf2_set_ctx_params_st *r)
44
0
{
45
0
    const char *s;
46
47
0
    memset(r, 0, sizeof(*r));
48
0
    if (p != NULL)
49
0
        for (; (s = p->key) != NULL; p++)
50
0
            switch(s[0]) {
51
0
            default:
52
0
                break;
53
0
            case 'd':
54
0
                if (ossl_likely(strcmp("igest", s + 1) == 0)) {
55
                    /* OSSL_KDF_PARAM_DIGEST */
56
0
                    if (ossl_unlikely(r->digest != NULL)) {
57
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
58
0
                                       "param %s is repeated", s);
59
0
                        return 0;
60
0
                    }
61
0
                    r->digest = (OSSL_PARAM *)p;
62
0
                }
63
0
                break;
64
0
            case 'i':
65
0
                if (ossl_likely(strcmp("ter", s + 1) == 0)) {
66
                    /* OSSL_KDF_PARAM_ITER */
67
0
                    if (ossl_unlikely(r->iter != NULL)) {
68
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
69
0
                                       "param %s is repeated", s);
70
0
                        return 0;
71
0
                    }
72
0
                    r->iter = (OSSL_PARAM *)p;
73
0
                }
74
0
                break;
75
0
            case 'p':
76
0
                switch(s[1]) {
77
0
                default:
78
0
                    break;
79
0
                case 'a':
80
0
                    if (ossl_likely(strcmp("ss", s + 2) == 0)) {
81
                        /* OSSL_KDF_PARAM_PASSWORD */
82
0
                        if (ossl_unlikely(r->pw != NULL)) {
83
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
84
0
                                           "param %s is repeated", s);
85
0
                            return 0;
86
0
                        }
87
0
                        r->pw = (OSSL_PARAM *)p;
88
0
                    }
89
0
                    break;
90
0
                case 'k':
91
0
                    if (ossl_likely(strcmp("cs5", s + 2) == 0)) {
92
                        /* OSSL_KDF_PARAM_PKCS5 */
93
0
                        if (ossl_unlikely(r->pkcs5 != NULL)) {
94
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
95
0
                                           "param %s is repeated", s);
96
0
                            return 0;
97
0
                        }
98
0
                        r->pkcs5 = (OSSL_PARAM *)p;
99
0
                    }
100
0
                    break;
101
0
                case 'r':
102
0
                    if (ossl_likely(strcmp("operties", s + 2) == 0)) {
103
                        /* OSSL_KDF_PARAM_PROPERTIES */
104
0
                        if (ossl_unlikely(r->propq != NULL)) {
105
0
                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
106
0
                                           "param %s is repeated", s);
107
0
                            return 0;
108
0
                        }
109
0
                        r->propq = (OSSL_PARAM *)p;
110
0
                    }
111
0
                }
112
0
                break;
113
0
            case 's':
114
0
                if (ossl_likely(strcmp("alt", s + 1) == 0)) {
115
                    /* OSSL_KDF_PARAM_SALT */
116
0
                    if (ossl_unlikely(r->salt != NULL)) {
117
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
118
0
                                       "param %s is repeated", s);
119
0
                        return 0;
120
0
                    }
121
0
                    r->salt = (OSSL_PARAM *)p;
122
0
                }
123
0
            }
124
0
    return 1;
125
0
}
126
#endif
127
/* End of machine generated */
128
129
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
130
#include <string.h>
131
#include <openssl/params.h>
132
#include "internal/common.h"
133
#include "prov/proverr.h"
134
135
#ifndef pbkdf2_get_ctx_params_list
136
static const OSSL_PARAM pbkdf2_get_ctx_params_list[] = {
137
    OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL),
138
# if defined(FIPS_MODULE)
139
    OSSL_PARAM_int(OSSL_KDF_PARAM_FIPS_APPROVED_INDICATOR, NULL),
140
# endif
141
    OSSL_PARAM_END
142
};
143
#endif
144
145
#ifndef pbkdf2_get_ctx_params_st
146
struct pbkdf2_get_ctx_params_st {
147
# if defined(FIPS_MODULE)
148
    OSSL_PARAM *ind;
149
# endif
150
    OSSL_PARAM *size;
151
};
152
#endif
153
154
#ifndef pbkdf2_get_ctx_params_decoder
155
static int pbkdf2_get_ctx_params_decoder
156
    (const OSSL_PARAM *p, struct pbkdf2_get_ctx_params_st *r)
157
0
{
158
0
    const char *s;
159
160
0
    memset(r, 0, sizeof(*r));
161
0
    if (p != NULL)
162
0
        for (; (s = p->key) != NULL; p++)
163
0
            switch(s[0]) {
164
0
            default:
165
0
                break;
166
0
            case 'f':
167
# if defined(FIPS_MODULE)
168
                if (ossl_likely(strcmp("ips-indicator", s + 1) == 0)) {
169
                    /* OSSL_KDF_PARAM_FIPS_APPROVED_INDICATOR */
170
                    if (ossl_unlikely(r->ind != NULL)) {
171
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
172
                                       "param %s is repeated", s);
173
                        return 0;
174
                    }
175
                    r->ind = (OSSL_PARAM *)p;
176
                }
177
# endif
178
0
                break;
179
0
            case 's':
180
0
                if (ossl_likely(strcmp("ize", s + 1) == 0)) {
181
                    /* OSSL_KDF_PARAM_SIZE */
182
0
                    if (ossl_unlikely(r->size != NULL)) {
183
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
184
0
                                       "param %s is repeated", s);
185
0
                        return 0;
186
0
                    }
187
0
                    r->size = (OSSL_PARAM *)p;
188
0
                }
189
0
            }
190
0
    return 1;
191
0
}
192
#endif
193
/* End of machine generated */