Coverage Report

Created: 2026-05-20 07:05

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/providers/implementations/kdfs/x963kdf.inc
Line
Count
Source
1
/*
2
 * Copyright 2025-2026 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the \"License\").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
12
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
13
#include <string.h>
14
#include <openssl/params.h>
15
#include "internal/common.h"
16
#include "prov/proverr.h"
17
18
#ifndef x963kdf_get_ctx_params_list
19
static const OSSL_PARAM x963kdf_get_ctx_params_list[] = {
20
    OSSL_PARAM_size_t(OSSL_KDF_PARAM_SIZE, NULL),
21
# if defined(FIPS_MODULE)
22
    OSSL_PARAM_int(OSSL_KDF_PARAM_FIPS_APPROVED_INDICATOR, NULL),
23
# endif
24
    OSSL_PARAM_END
25
};
26
#endif
27
28
#ifndef x963kdf_get_ctx_params_st
29
struct x963kdf_get_ctx_params_st {
30
# if defined(FIPS_MODULE)
31
    OSSL_PARAM *ind;
32
# endif
33
    OSSL_PARAM *size;
34
};
35
#endif
36
37
#ifndef x963kdf_get_ctx_params_decoder
38
static int x963kdf_get_ctx_params_decoder
39
    (const OSSL_PARAM *p, struct x963kdf_get_ctx_params_st *r)
40
0
{
41
0
    const char *s;
42
43
0
    memset(r, 0, sizeof(*r));
44
0
    if (p != NULL)
45
0
        for (; (s = p->key) != NULL; p++)
46
0
            switch(s[0]) {
47
0
            default:
48
0
                break;
49
0
            case 'f':
50
# if defined(FIPS_MODULE)
51
                if (ossl_likely(strcmp("ips-indicator", s + 1) == 0)) {
52
                    /* OSSL_KDF_PARAM_FIPS_APPROVED_INDICATOR */
53
                    if (ossl_unlikely(r->ind != NULL)) {
54
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
55
                                       "param %s is repeated", s);
56
                        return 0;
57
                    }
58
                    r->ind = (OSSL_PARAM *)p;
59
                }
60
# endif
61
0
                break;
62
0
            case 's':
63
0
                if (ossl_likely(strcmp("ize", s + 1) == 0)) {
64
                    /* OSSL_KDF_PARAM_SIZE */
65
0
                    if (ossl_unlikely(r->size != NULL)) {
66
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
67
0
                                       "param %s is repeated", s);
68
0
                        return 0;
69
0
                    }
70
0
                    r->size = (OSSL_PARAM *)p;
71
0
                }
72
0
            }
73
0
    return 1;
74
0
}
75
#endif
76
/* End of machine generated */
77
78
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
79
#include <string.h>
80
#include <openssl/params.h>
81
#include "internal/common.h"
82
#include "prov/proverr.h"
83
84
#ifndef x963kdf_set_ctx_params_list
85
static const OSSL_PARAM x963kdf_set_ctx_params_list[] = {
86
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_SECRET, NULL, 0),
87
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_KEY, NULL, 0),
88
    OSSL_PARAM_octet_string(OSSL_KDF_PARAM_INFO, NULL, 0),
89
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0),
90
    OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_DIGEST, NULL, 0),
91
# if defined(FIPS_MODULE)
92
    OSSL_PARAM_int(OSSL_KDF_PARAM_FIPS_DIGEST_CHECK, NULL),
93
# endif
94
# if defined(FIPS_MODULE)
95
    OSSL_PARAM_int(OSSL_KDF_PARAM_FIPS_KEY_CHECK, NULL),
96
# endif
97
    OSSL_PARAM_END
98
};
99
#endif
100
101
#ifndef x963kdf_set_ctx_params_st
102
struct x963kdf_set_ctx_params_st {
103
    OSSL_PARAM *digest;
104
# if defined(FIPS_MODULE)
105
    OSSL_PARAM *ind_d;
106
# endif
107
# if defined(FIPS_MODULE)
108
    OSSL_PARAM *ind_k;
109
# endif
110
    OSSL_PARAM *info[SSKDF_MAX_INFOS];
111
    int num_info;
112
    OSSL_PARAM *propq;
113
    OSSL_PARAM *secret;
114
};
115
#endif
116
117
#ifndef x963kdf_set_ctx_params_decoder
118
static int x963kdf_set_ctx_params_decoder
119
    (const OSSL_PARAM *p, struct x963kdf_set_ctx_params_st *r)
120
0
{
121
0
    const char *s;
122
123
0
    memset(r, 0, sizeof(*r));
124
0
    if (p != NULL)
125
0
        for (; (s = p->key) != NULL; p++)
126
0
            switch(s[0]) {
127
0
            default:
128
0
                break;
129
0
            case 'd':
130
0
                switch(s[1]) {
131
0
                default:
132
0
                    break;
133
0
                case 'i':
134
0
                    switch(s[2]) {
135
0
                    default:
136
0
                        break;
137
0
                    case 'g':
138
0
                        switch(s[3]) {
139
0
                        default:
140
0
                            break;
141
0
                        case 'e':
142
0
                            switch(s[4]) {
143
0
                            default:
144
0
                                break;
145
0
                            case 's':
146
0
                                switch(s[5]) {
147
0
                                default:
148
0
                                    break;
149
0
                                case 't':
150
0
                                    switch(s[6]) {
151
0
                                    default:
152
0
                                        break;
153
0
                                    case '-':
154
# if defined(FIPS_MODULE)
155
                                        if (ossl_likely(strcmp("check", s + 7) == 0)) {
156
                                            /* OSSL_KDF_PARAM_FIPS_DIGEST_CHECK */
157
                                            if (ossl_unlikely(r->ind_d != NULL)) {
158
                                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
159
                                                               "param %s is repeated", s);
160
                                                return 0;
161
                                            }
162
                                            r->ind_d = (OSSL_PARAM *)p;
163
                                        }
164
# endif
165
0
                                        break;
166
0
                                    case '\0':
167
0
                                        if (ossl_unlikely(r->digest != NULL)) {
168
0
                                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
169
0
                                                           "param %s is repeated", s);
170
0
                                            return 0;
171
0
                                        }
172
0
                                        r->digest = (OSSL_PARAM *)p;
173
0
                                    }
174
0
                                }
175
0
                            }
176
0
                        }
177
0
                    }
178
0
                }
179
0
                break;
180
0
            case 'i':
181
0
                if (ossl_likely(strcmp("nfo", s + 1) == 0)) {
182
                    /* OSSL_KDF_PARAM_INFO */
183
0
                    if (ossl_unlikely(r->num_info >= SSKDF_MAX_INFOS)) {
184
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_TOO_MANY_RECORDS,
185
0
                                       "param %s present >%d times", s, SSKDF_MAX_INFOS);
186
0
                        return 0;
187
0
                    }
188
0
                    r->info[r->num_info++] = (OSSL_PARAM *)p;
189
0
                }
190
0
                break;
191
0
            case 'k':
192
0
                switch(s[1]) {
193
0
                default:
194
0
                    break;
195
0
                case 'e':
196
0
                    switch(s[2]) {
197
0
                    default:
198
0
                        break;
199
0
                    case 'y':
200
0
                        switch(s[3]) {
201
0
                        default:
202
0
                            break;
203
0
                        case '-':
204
# if defined(FIPS_MODULE)
205
                            if (ossl_likely(strcmp("check", s + 4) == 0)) {
206
                                /* OSSL_KDF_PARAM_FIPS_KEY_CHECK */
207
                                if (ossl_unlikely(r->ind_k != NULL)) {
208
                                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
209
                                                   "param %s is repeated", s);
210
                                    return 0;
211
                                }
212
                                r->ind_k = (OSSL_PARAM *)p;
213
                            }
214
# endif
215
0
                            break;
216
0
                        case '\0':
217
0
                            if (ossl_unlikely(r->secret != NULL)) {
218
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
219
0
                                               "param %s is repeated", s);
220
0
                                return 0;
221
0
                            }
222
0
                            r->secret = (OSSL_PARAM *)p;
223
0
                        }
224
0
                    }
225
0
                }
226
0
                break;
227
0
            case 'p':
228
0
                if (ossl_likely(strcmp("roperties", s + 1) == 0)) {
229
                    /* OSSL_KDF_PARAM_PROPERTIES */
230
0
                    if (ossl_unlikely(r->propq != NULL)) {
231
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
232
0
                                       "param %s is repeated", s);
233
0
                        return 0;
234
0
                    }
235
0
                    r->propq = (OSSL_PARAM *)p;
236
0
                }
237
0
                break;
238
0
            case 's':
239
0
                if (ossl_likely(strcmp("ecret", s + 1) == 0)) {
240
                    /* OSSL_KDF_PARAM_SECRET */
241
0
                    if (ossl_unlikely(r->secret != NULL)) {
242
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
243
0
                                       "param %s is repeated", s);
244
0
                        return 0;
245
0
                    }
246
0
                    r->secret = (OSSL_PARAM *)p;
247
0
                }
248
0
            }
249
0
    return 1;
250
0
}
251
#endif
252
/* End of machine generated */