/src/openssl/providers/implementations/signature/dsa_sig.inc
Line | Count | Source |
1 | | /* |
2 | | * Copyright 2025 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the Apache License 2.0 (the \"License\"). You may not use |
5 | | * this file except in compliance with the License. You can obtain a copy |
6 | | * in the file LICENSE in the source distribution or at |
7 | | * https://www.openssl.org/source/license.html |
8 | | */ |
9 | | |
10 | | |
11 | | |
12 | | /* Machine generated by util/perl/OpenSSL/paramnames.pm */ |
13 | | #include <string.h> |
14 | | #include <openssl/params.h> |
15 | | #include "internal/common.h" |
16 | | #include "prov/proverr.h" |
17 | | |
18 | | #ifndef dsa_get_ctx_params_list |
19 | | static const OSSL_PARAM dsa_get_ctx_params_list[] = { |
20 | | OSSL_PARAM_octet_string(OSSL_SIGNATURE_PARAM_ALGORITHM_ID, NULL, 0), |
21 | | OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_DIGEST, NULL, 0), |
22 | | OSSL_PARAM_uint(OSSL_SIGNATURE_PARAM_NONCE_TYPE, NULL), |
23 | | # if defined(FIPS_MODULE) |
24 | | OSSL_PARAM_int(OSSL_SIGNATURE_PARAM_FIPS_APPROVED_INDICATOR, NULL), |
25 | | # endif |
26 | | OSSL_PARAM_END |
27 | | }; |
28 | | #endif |
29 | | |
30 | | #ifndef dsa_get_ctx_params_st |
31 | | struct dsa_get_ctx_params_st { |
32 | | OSSL_PARAM *algid; |
33 | | OSSL_PARAM *digest; |
34 | | # if defined(FIPS_MODULE) |
35 | | OSSL_PARAM *ind; |
36 | | # endif |
37 | | OSSL_PARAM *nonce; |
38 | | }; |
39 | | #endif |
40 | | |
41 | | #ifndef dsa_get_ctx_params_decoder |
42 | | static int dsa_get_ctx_params_decoder |
43 | | (const OSSL_PARAM *p, struct dsa_get_ctx_params_st *r) |
44 | 0 | { |
45 | 0 | const char *s; |
46 | |
|
47 | 0 | memset(r, 0, sizeof(*r)); |
48 | 0 | if (p != NULL) |
49 | 0 | for (; (s = p->key) != NULL; p++) |
50 | 0 | switch(s[0]) { |
51 | 0 | default: |
52 | 0 | break; |
53 | 0 | case 'a': |
54 | 0 | if (ossl_likely(strcmp("lgorithm-id", s + 1) == 0)) { |
55 | | /* OSSL_SIGNATURE_PARAM_ALGORITHM_ID */ |
56 | 0 | if (ossl_unlikely(r->algid != NULL)) { |
57 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
58 | 0 | "param %s is repeated", s); |
59 | 0 | return 0; |
60 | 0 | } |
61 | 0 | r->algid = (OSSL_PARAM *)p; |
62 | 0 | } |
63 | 0 | break; |
64 | 0 | case 'd': |
65 | 0 | if (ossl_likely(strcmp("igest", s + 1) == 0)) { |
66 | | /* OSSL_SIGNATURE_PARAM_DIGEST */ |
67 | 0 | if (ossl_unlikely(r->digest != NULL)) { |
68 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
69 | 0 | "param %s is repeated", s); |
70 | 0 | return 0; |
71 | 0 | } |
72 | 0 | r->digest = (OSSL_PARAM *)p; |
73 | 0 | } |
74 | 0 | break; |
75 | 0 | case 'f': |
76 | | # if defined(FIPS_MODULE) |
77 | | if (ossl_likely(strcmp("ips-indicator", s + 1) == 0)) { |
78 | | /* OSSL_SIGNATURE_PARAM_FIPS_APPROVED_INDICATOR */ |
79 | | if (ossl_unlikely(r->ind != NULL)) { |
80 | | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
81 | | "param %s is repeated", s); |
82 | | return 0; |
83 | | } |
84 | | r->ind = (OSSL_PARAM *)p; |
85 | | } |
86 | | # endif |
87 | 0 | break; |
88 | 0 | case 'n': |
89 | 0 | if (ossl_likely(strcmp("once-type", s + 1) == 0)) { |
90 | | /* OSSL_SIGNATURE_PARAM_NONCE_TYPE */ |
91 | 0 | if (ossl_unlikely(r->nonce != NULL)) { |
92 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
93 | 0 | "param %s is repeated", s); |
94 | 0 | return 0; |
95 | 0 | } |
96 | 0 | r->nonce = (OSSL_PARAM *)p; |
97 | 0 | } |
98 | 0 | } |
99 | 0 | return 1; |
100 | 0 | } |
101 | | #endif |
102 | | /* End of machine generated */ |
103 | | |
104 | | /* Machine generated by util/perl/OpenSSL/paramnames.pm */ |
105 | | #include <string.h> |
106 | | #include <openssl/params.h> |
107 | | #include "internal/common.h" |
108 | | #include "prov/proverr.h" |
109 | | |
110 | | #ifndef dsa_set_ctx_params_list |
111 | | static const OSSL_PARAM dsa_set_ctx_params_list[] = { |
112 | | OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_DIGEST, NULL, 0), |
113 | | OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_PROPERTIES, NULL, 0), |
114 | | OSSL_PARAM_uint(OSSL_SIGNATURE_PARAM_NONCE_TYPE, NULL), |
115 | | # if defined(FIPS_MODULE) |
116 | | OSSL_PARAM_int(OSSL_SIGNATURE_PARAM_FIPS_KEY_CHECK, NULL), |
117 | | # endif |
118 | | # if defined(FIPS_MODULE) |
119 | | OSSL_PARAM_int(OSSL_SIGNATURE_PARAM_FIPS_DIGEST_CHECK, NULL), |
120 | | # endif |
121 | | # if defined(FIPS_MODULE) |
122 | | OSSL_PARAM_int(OSSL_SIGNATURE_PARAM_FIPS_SIGN_CHECK, NULL), |
123 | | # endif |
124 | | OSSL_PARAM_END |
125 | | }; |
126 | | #endif |
127 | | |
128 | | #ifndef dsa_set_ctx_params_st |
129 | | struct dsa_set_ctx_params_st { |
130 | | OSSL_PARAM *digest; |
131 | | # if defined(FIPS_MODULE) |
132 | | OSSL_PARAM *ind_d; |
133 | | # endif |
134 | | # if defined(FIPS_MODULE) |
135 | | OSSL_PARAM *ind_k; |
136 | | # endif |
137 | | # if defined(FIPS_MODULE) |
138 | | OSSL_PARAM *ind_sign; |
139 | | # endif |
140 | | OSSL_PARAM *nonce; |
141 | | OSSL_PARAM *propq; |
142 | | }; |
143 | | #endif |
144 | | |
145 | | #ifndef dsa_set_ctx_params_decoder |
146 | | static int dsa_set_ctx_params_decoder |
147 | | (const OSSL_PARAM *p, struct dsa_set_ctx_params_st *r) |
148 | 0 | { |
149 | 0 | const char *s; |
150 | |
|
151 | 0 | memset(r, 0, sizeof(*r)); |
152 | 0 | if (p != NULL) |
153 | 0 | for (; (s = p->key) != NULL; p++) |
154 | 0 | switch(s[0]) { |
155 | 0 | default: |
156 | 0 | break; |
157 | 0 | case 'd': |
158 | 0 | switch(s[1]) { |
159 | 0 | default: |
160 | 0 | break; |
161 | 0 | case 'i': |
162 | 0 | switch(s[2]) { |
163 | 0 | default: |
164 | 0 | break; |
165 | 0 | case 'g': |
166 | 0 | switch(s[3]) { |
167 | 0 | default: |
168 | 0 | break; |
169 | 0 | case 'e': |
170 | 0 | switch(s[4]) { |
171 | 0 | default: |
172 | 0 | break; |
173 | 0 | case 's': |
174 | 0 | switch(s[5]) { |
175 | 0 | default: |
176 | 0 | break; |
177 | 0 | case 't': |
178 | 0 | switch(s[6]) { |
179 | 0 | default: |
180 | 0 | break; |
181 | 0 | case '-': |
182 | | # if defined(FIPS_MODULE) |
183 | | if (ossl_likely(strcmp("check", s + 7) == 0)) { |
184 | | /* OSSL_SIGNATURE_PARAM_FIPS_DIGEST_CHECK */ |
185 | | if (ossl_unlikely(r->ind_d != NULL)) { |
186 | | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
187 | | "param %s is repeated", s); |
188 | | return 0; |
189 | | } |
190 | | r->ind_d = (OSSL_PARAM *)p; |
191 | | } |
192 | | # endif |
193 | 0 | break; |
194 | 0 | case '\0': |
195 | 0 | if (ossl_unlikely(r->digest != NULL)) { |
196 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
197 | 0 | "param %s is repeated", s); |
198 | 0 | return 0; |
199 | 0 | } |
200 | 0 | r->digest = (OSSL_PARAM *)p; |
201 | 0 | } |
202 | 0 | } |
203 | 0 | } |
204 | 0 | } |
205 | 0 | } |
206 | 0 | } |
207 | 0 | break; |
208 | 0 | case 'k': |
209 | | # if defined(FIPS_MODULE) |
210 | | if (ossl_likely(strcmp("ey-check", s + 1) == 0)) { |
211 | | /* OSSL_SIGNATURE_PARAM_FIPS_KEY_CHECK */ |
212 | | if (ossl_unlikely(r->ind_k != NULL)) { |
213 | | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
214 | | "param %s is repeated", s); |
215 | | return 0; |
216 | | } |
217 | | r->ind_k = (OSSL_PARAM *)p; |
218 | | } |
219 | | # endif |
220 | 0 | break; |
221 | 0 | case 'n': |
222 | 0 | if (ossl_likely(strcmp("once-type", s + 1) == 0)) { |
223 | | /* OSSL_SIGNATURE_PARAM_NONCE_TYPE */ |
224 | 0 | if (ossl_unlikely(r->nonce != NULL)) { |
225 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
226 | 0 | "param %s is repeated", s); |
227 | 0 | return 0; |
228 | 0 | } |
229 | 0 | r->nonce = (OSSL_PARAM *)p; |
230 | 0 | } |
231 | 0 | break; |
232 | 0 | case 'p': |
233 | 0 | if (ossl_likely(strcmp("roperties", s + 1) == 0)) { |
234 | | /* OSSL_SIGNATURE_PARAM_PROPERTIES */ |
235 | 0 | if (ossl_unlikely(r->propq != NULL)) { |
236 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
237 | 0 | "param %s is repeated", s); |
238 | 0 | return 0; |
239 | 0 | } |
240 | 0 | r->propq = (OSSL_PARAM *)p; |
241 | 0 | } |
242 | 0 | break; |
243 | 0 | case 's': |
244 | | # if defined(FIPS_MODULE) |
245 | | if (ossl_likely(strcmp("ign-check", s + 1) == 0)) { |
246 | | /* OSSL_SIGNATURE_PARAM_FIPS_SIGN_CHECK */ |
247 | | if (ossl_unlikely(r->ind_sign != NULL)) { |
248 | | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
249 | | "param %s is repeated", s); |
250 | | return 0; |
251 | | } |
252 | | r->ind_sign = (OSSL_PARAM *)p; |
253 | | } |
254 | | # endif |
255 | 0 | break; |
256 | 0 | } |
257 | 0 | return 1; |
258 | 0 | } |
259 | | #endif |
260 | | /* End of machine generated */ |
261 | | |
262 | | /* Machine generated by util/perl/OpenSSL/paramnames.pm */ |
263 | | #include <string.h> |
264 | | #include <openssl/params.h> |
265 | | #include "internal/common.h" |
266 | | #include "prov/proverr.h" |
267 | | |
268 | | #ifndef dsa_sigalg_set_ctx_params_list |
269 | | static const OSSL_PARAM dsa_sigalg_set_ctx_params_list[] = { |
270 | | OSSL_PARAM_octet_string(OSSL_SIGNATURE_PARAM_SIGNATURE, NULL, 0), |
271 | | OSSL_PARAM_uint(OSSL_SIGNATURE_PARAM_NONCE_TYPE, NULL), |
272 | | # if defined(FIPS_MODULE) |
273 | | OSSL_PARAM_int(OSSL_SIGNATURE_PARAM_FIPS_KEY_CHECK, NULL), |
274 | | # endif |
275 | | # if defined(FIPS_MODULE) |
276 | | OSSL_PARAM_int(OSSL_SIGNATURE_PARAM_FIPS_DIGEST_CHECK, NULL), |
277 | | # endif |
278 | | # if defined(FIPS_MODULE) |
279 | | OSSL_PARAM_int(OSSL_SIGNATURE_PARAM_FIPS_SIGN_CHECK, NULL), |
280 | | # endif |
281 | | OSSL_PARAM_END |
282 | | }; |
283 | | #endif |
284 | | |
285 | | #ifndef dsa_sigalg_set_ctx_params_st |
286 | | struct dsa_sigalg_set_ctx_params_st { |
287 | | # if defined(FIPS_MODULE) |
288 | | OSSL_PARAM *ind_d; |
289 | | # endif |
290 | | # if defined(FIPS_MODULE) |
291 | | OSSL_PARAM *ind_k; |
292 | | # endif |
293 | | # if defined(FIPS_MODULE) |
294 | | OSSL_PARAM *ind_sign; |
295 | | # endif |
296 | | OSSL_PARAM *nonce; |
297 | | OSSL_PARAM *sig; |
298 | | }; |
299 | | #endif |
300 | | |
301 | | #ifndef dsa_sigalg_set_ctx_params_decoder |
302 | | static int dsa_sigalg_set_ctx_params_decoder |
303 | | (const OSSL_PARAM *p, struct dsa_sigalg_set_ctx_params_st *r) |
304 | 0 | { |
305 | 0 | const char *s; |
306 | |
|
307 | 0 | memset(r, 0, sizeof(*r)); |
308 | 0 | if (p != NULL) |
309 | 0 | for (; (s = p->key) != NULL; p++) |
310 | 0 | switch(s[0]) { |
311 | 0 | default: |
312 | 0 | break; |
313 | 0 | case 'd': |
314 | | # if defined(FIPS_MODULE) |
315 | | if (ossl_likely(strcmp("igest-check", s + 1) == 0)) { |
316 | | /* OSSL_SIGNATURE_PARAM_FIPS_DIGEST_CHECK */ |
317 | | if (ossl_unlikely(r->ind_d != NULL)) { |
318 | | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
319 | | "param %s is repeated", s); |
320 | | return 0; |
321 | | } |
322 | | r->ind_d = (OSSL_PARAM *)p; |
323 | | } |
324 | | # endif |
325 | 0 | break; |
326 | 0 | case 'k': |
327 | | # if defined(FIPS_MODULE) |
328 | | if (ossl_likely(strcmp("ey-check", s + 1) == 0)) { |
329 | | /* OSSL_SIGNATURE_PARAM_FIPS_KEY_CHECK */ |
330 | | if (ossl_unlikely(r->ind_k != NULL)) { |
331 | | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
332 | | "param %s is repeated", s); |
333 | | return 0; |
334 | | } |
335 | | r->ind_k = (OSSL_PARAM *)p; |
336 | | } |
337 | | # endif |
338 | 0 | break; |
339 | 0 | case 'n': |
340 | 0 | if (ossl_likely(strcmp("once-type", s + 1) == 0)) { |
341 | | /* OSSL_SIGNATURE_PARAM_NONCE_TYPE */ |
342 | 0 | if (ossl_unlikely(r->nonce != NULL)) { |
343 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
344 | 0 | "param %s is repeated", s); |
345 | 0 | return 0; |
346 | 0 | } |
347 | 0 | r->nonce = (OSSL_PARAM *)p; |
348 | 0 | } |
349 | 0 | break; |
350 | 0 | case 's': |
351 | 0 | switch(s[1]) { |
352 | 0 | default: |
353 | 0 | break; |
354 | 0 | case 'i': |
355 | 0 | switch(s[2]) { |
356 | 0 | default: |
357 | 0 | break; |
358 | 0 | case 'g': |
359 | 0 | switch(s[3]) { |
360 | 0 | default: |
361 | 0 | break; |
362 | 0 | case 'n': |
363 | 0 | switch(s[4]) { |
364 | 0 | default: |
365 | 0 | break; |
366 | 0 | case '-': |
367 | | # if defined(FIPS_MODULE) |
368 | | if (ossl_likely(strcmp("check", s + 5) == 0)) { |
369 | | /* OSSL_SIGNATURE_PARAM_FIPS_SIGN_CHECK */ |
370 | | if (ossl_unlikely(r->ind_sign != NULL)) { |
371 | | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
372 | | "param %s is repeated", s); |
373 | | return 0; |
374 | | } |
375 | | r->ind_sign = (OSSL_PARAM *)p; |
376 | | } |
377 | | # endif |
378 | 0 | break; |
379 | 0 | case 'a': |
380 | 0 | if (ossl_likely(strcmp("ture", s + 5) == 0)) { |
381 | | /* OSSL_SIGNATURE_PARAM_SIGNATURE */ |
382 | 0 | if (ossl_unlikely(r->sig != NULL)) { |
383 | 0 | ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER, |
384 | 0 | "param %s is repeated", s); |
385 | 0 | return 0; |
386 | 0 | } |
387 | 0 | r->sig = (OSSL_PARAM *)p; |
388 | 0 | } |
389 | 0 | } |
390 | 0 | } |
391 | 0 | } |
392 | 0 | } |
393 | 0 | } |
394 | 0 | return 1; |
395 | 0 | } |
396 | | #endif |
397 | | /* End of machine generated */ |