Coverage Report

Created: 2026-05-20 07:05

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/providers/implementations/rands/test_rng.inc
Line
Count
Source
1
/*
2
 * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the \"License\").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
11
12
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
13
#include <string.h>
14
#include <openssl/params.h>
15
#include "internal/common.h"
16
#include "prov/proverr.h"
17
18
#ifndef test_rng_get_ctx_params_list
19
static const OSSL_PARAM test_rng_get_ctx_params_list[] = {
20
    OSSL_PARAM_int(OSSL_RAND_PARAM_STATE, NULL),
21
    OSSL_PARAM_uint(OSSL_RAND_PARAM_STRENGTH, NULL),
22
    OSSL_PARAM_size_t(OSSL_RAND_PARAM_MAX_REQUEST, NULL),
23
    OSSL_PARAM_uint(OSSL_RAND_PARAM_GENERATE, NULL),
24
# if defined(FIPS_MODULE)
25
    OSSL_PARAM_int(OSSL_RAND_PARAM_FIPS_APPROVED_INDICATOR, NULL),
26
# endif
27
    OSSL_PARAM_END
28
};
29
#endif
30
31
#ifndef test_rng_get_ctx_params_st
32
struct test_rng_get_ctx_params_st {
33
    OSSL_PARAM *gen;
34
# if defined(FIPS_MODULE)
35
    OSSL_PARAM *ind;
36
# endif
37
    OSSL_PARAM *maxreq;
38
    OSSL_PARAM *state;
39
    OSSL_PARAM *str;
40
};
41
#endif
42
43
#ifndef test_rng_get_ctx_params_decoder
44
static int test_rng_get_ctx_params_decoder
45
    (const OSSL_PARAM *p, struct test_rng_get_ctx_params_st *r)
46
0
{
47
0
    const char *s;
48
49
0
    memset(r, 0, sizeof(*r));
50
0
    if (p != NULL)
51
0
        for (; (s = p->key) != NULL; p++)
52
0
            switch(s[0]) {
53
0
            default:
54
0
                break;
55
0
            case 'f':
56
# if defined(FIPS_MODULE)
57
                if (ossl_likely(strcmp("ips-indicator", s + 1) == 0)) {
58
                    /* OSSL_RAND_PARAM_FIPS_APPROVED_INDICATOR */
59
                    if (ossl_unlikely(r->ind != NULL)) {
60
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
61
                                       "param %s is repeated", s);
62
                        return 0;
63
                    }
64
                    r->ind = (OSSL_PARAM *)p;
65
                }
66
# endif
67
0
                break;
68
0
            case 'g':
69
0
                if (ossl_likely(strcmp("enerate", s + 1) == 0)) {
70
                    /* OSSL_RAND_PARAM_GENERATE */
71
0
                    if (ossl_unlikely(r->gen != NULL)) {
72
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
73
0
                                       "param %s is repeated", s);
74
0
                        return 0;
75
0
                    }
76
0
                    r->gen = (OSSL_PARAM *)p;
77
0
                }
78
0
                break;
79
0
            case 'm':
80
0
                if (ossl_likely(strcmp("ax_request", s + 1) == 0)) {
81
                    /* OSSL_RAND_PARAM_MAX_REQUEST */
82
0
                    if (ossl_unlikely(r->maxreq != NULL)) {
83
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
84
0
                                       "param %s is repeated", s);
85
0
                        return 0;
86
0
                    }
87
0
                    r->maxreq = (OSSL_PARAM *)p;
88
0
                }
89
0
                break;
90
0
            case 's':
91
0
                switch(s[1]) {
92
0
                default:
93
0
                    break;
94
0
                case 't':
95
0
                    switch(s[2]) {
96
0
                    default:
97
0
                        break;
98
0
                    case 'a':
99
0
                        if (ossl_likely(strcmp("te", s + 3) == 0)) {
100
                            /* OSSL_RAND_PARAM_STATE */
101
0
                            if (ossl_unlikely(r->state != NULL)) {
102
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
103
0
                                               "param %s is repeated", s);
104
0
                                return 0;
105
0
                            }
106
0
                            r->state = (OSSL_PARAM *)p;
107
0
                        }
108
0
                        break;
109
0
                    case 'r':
110
0
                        if (ossl_likely(strcmp("ength", s + 3) == 0)) {
111
                            /* OSSL_RAND_PARAM_STRENGTH */
112
0
                            if (ossl_unlikely(r->str != NULL)) {
113
0
                                ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
114
0
                                               "param %s is repeated", s);
115
0
                                return 0;
116
0
                            }
117
0
                            r->str = (OSSL_PARAM *)p;
118
0
                        }
119
0
                    }
120
0
                }
121
0
            }
122
0
    return 1;
123
0
}
124
#endif
125
/* End of machine generated */
126
127
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
128
#include <string.h>
129
#include <openssl/params.h>
130
#include "internal/common.h"
131
#include "prov/proverr.h"
132
133
#ifndef test_rng_set_ctx_params_list
134
static const OSSL_PARAM test_rng_set_ctx_params_list[] = {
135
    OSSL_PARAM_octet_string(OSSL_RAND_PARAM_TEST_ENTROPY, NULL, 0),
136
    OSSL_PARAM_octet_string(OSSL_RAND_PARAM_TEST_NONCE, NULL, 0),
137
    OSSL_PARAM_uint(OSSL_RAND_PARAM_STRENGTH, NULL),
138
    OSSL_PARAM_size_t(OSSL_RAND_PARAM_MAX_REQUEST, NULL),
139
    OSSL_PARAM_uint(OSSL_RAND_PARAM_GENERATE, NULL),
140
    OSSL_PARAM_END
141
};
142
#endif
143
144
#ifndef test_rng_set_ctx_params_st
145
struct test_rng_set_ctx_params_st {
146
    OSSL_PARAM *ent;
147
    OSSL_PARAM *gen;
148
    OSSL_PARAM *maxreq;
149
    OSSL_PARAM *nonce;
150
    OSSL_PARAM *str;
151
};
152
#endif
153
154
#ifndef test_rng_set_ctx_params_decoder
155
static int test_rng_set_ctx_params_decoder
156
    (const OSSL_PARAM *p, struct test_rng_set_ctx_params_st *r)
157
0
{
158
0
    const char *s;
159
160
0
    memset(r, 0, sizeof(*r));
161
0
    if (p != NULL)
162
0
        for (; (s = p->key) != NULL; p++)
163
0
            switch(s[0]) {
164
0
            default:
165
0
                break;
166
0
            case 'g':
167
0
                if (ossl_likely(strcmp("enerate", s + 1) == 0)) {
168
                    /* OSSL_RAND_PARAM_GENERATE */
169
0
                    if (ossl_unlikely(r->gen != NULL)) {
170
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
171
0
                                       "param %s is repeated", s);
172
0
                        return 0;
173
0
                    }
174
0
                    r->gen = (OSSL_PARAM *)p;
175
0
                }
176
0
                break;
177
0
            case 'm':
178
0
                if (ossl_likely(strcmp("ax_request", s + 1) == 0)) {
179
                    /* OSSL_RAND_PARAM_MAX_REQUEST */
180
0
                    if (ossl_unlikely(r->maxreq != NULL)) {
181
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
182
0
                                       "param %s is repeated", s);
183
0
                        return 0;
184
0
                    }
185
0
                    r->maxreq = (OSSL_PARAM *)p;
186
0
                }
187
0
                break;
188
0
            case 's':
189
0
                if (ossl_likely(strcmp("trength", s + 1) == 0)) {
190
                    /* OSSL_RAND_PARAM_STRENGTH */
191
0
                    if (ossl_unlikely(r->str != NULL)) {
192
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
193
0
                                       "param %s is repeated", s);
194
0
                        return 0;
195
0
                    }
196
0
                    r->str = (OSSL_PARAM *)p;
197
0
                }
198
0
                break;
199
0
            case 't':
200
0
                switch(s[1]) {
201
0
                default:
202
0
                    break;
203
0
                case 'e':
204
0
                    switch(s[2]) {
205
0
                    default:
206
0
                        break;
207
0
                    case 's':
208
0
                        switch(s[3]) {
209
0
                        default:
210
0
                            break;
211
0
                        case 't':
212
0
                            switch(s[4]) {
213
0
                            default:
214
0
                                break;
215
0
                            case '_':
216
0
                                switch(s[5]) {
217
0
                                default:
218
0
                                    break;
219
0
                                case 'e':
220
0
                                    if (ossl_likely(strcmp("ntropy", s + 6) == 0)) {
221
                                        /* OSSL_RAND_PARAM_TEST_ENTROPY */
222
0
                                        if (ossl_unlikely(r->ent != NULL)) {
223
0
                                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
224
0
                                                           "param %s is repeated", s);
225
0
                                            return 0;
226
0
                                        }
227
0
                                        r->ent = (OSSL_PARAM *)p;
228
0
                                    }
229
0
                                    break;
230
0
                                case 'n':
231
0
                                    if (ossl_likely(strcmp("once", s + 6) == 0)) {
232
                                        /* OSSL_RAND_PARAM_TEST_NONCE */
233
0
                                        if (ossl_unlikely(r->nonce != NULL)) {
234
0
                                            ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
235
0
                                                           "param %s is repeated", s);
236
0
                                            return 0;
237
0
                                        }
238
0
                                        r->nonce = (OSSL_PARAM *)p;
239
0
                                    }
240
0
                                }
241
0
                            }
242
0
                        }
243
0
                    }
244
0
                }
245
0
            }
246
0
    return 1;
247
0
}
248
#endif
249
/* End of machine generated */