VirtualBox

source: vbox/trunk/src/libs/openssl-3.3.2/util/perl/OpenSSL/paramnames.pm@ 108206

Last change on this file since 108206 was 108206, checked in by vboxsync, 3 months ago

openssl-3.3.2: Exported all files to OSE and removed .scm-settings ​bugref:10757

  • Property svn:eol-style set to LF
  • Property svn:executable set to *
  • Property svn:keywords set to Author Date Id Revision
File size: 30.4 KB
Line 
1#! /usr/bin/env perl
2# Copyright 2023-2024 The OpenSSL Project Authors. All Rights Reserved.
3#
4# Licensed under the Apache License 2.0 (the "License"). You may not use
5# this file except in compliance with the License. You can obtain a copy
6# in the file LICENSE in the source distribution or at
7# https://www.openssl.org/source/license.html
8
9package OpenSSL::paramnames;
10
11use strict;
12use warnings;
13
14require Exporter;
15our @ISA = qw(Exporter);
16our @EXPORT_OK = qw(generate_public_macros
17 generate_internal_macros
18 produce_decoder);
19
20my $case_sensitive = 1;
21
22my %params = (
23# Well known parameter names that core passes to providers
24 'PROV_PARAM_CORE_VERSION' => "openssl-version",# utf8_ptr
25 'PROV_PARAM_CORE_PROV_NAME' => "provider-name", # utf8_ptr
26 'PROV_PARAM_CORE_MODULE_FILENAME' => "module-filename",# utf8_ptr
27
28# Well known parameter names that Providers can define
29 'PROV_PARAM_NAME' => "name", # utf8_ptr
30 'PROV_PARAM_VERSION' => "version", # utf8_ptr
31 'PROV_PARAM_BUILDINFO' => "buildinfo", # utf8_ptr
32 'PROV_PARAM_STATUS' => "status", # uint
33 'PROV_PARAM_SECURITY_CHECKS' => "security-checks", # uint
34 'PROV_PARAM_TLS1_PRF_EMS_CHECK' => "tls1-prf-ems-check", # uint
35 'PROV_PARAM_DRBG_TRUNC_DIGEST' => "drbg-no-trunc-md", # uint
36
37# Self test callback parameters
38 'PROV_PARAM_SELF_TEST_PHASE' => "st-phase",# utf8_string
39 'PROV_PARAM_SELF_TEST_TYPE' => "st-type", # utf8_string
40 'PROV_PARAM_SELF_TEST_DESC' => "st-desc", # utf8_string
41
42# Provider-native object abstractions
43#
44# These are used when a provider wants to pass object data or an object
45# reference back to libcrypto. This is only useful for provider functions
46# that take a callback to which an PARAM array with these parameters
47# can be passed.
48#
49# This set of parameter names is explained in detail in provider-object(7)
50# (doc/man7/provider-object.pod)
51
52 'OBJECT_PARAM_TYPE' => "type", # INTEGER
53 'OBJECT_PARAM_DATA_TYPE' => "data-type",# UTF8_STRING
54 'OBJECT_PARAM_DATA_STRUCTURE' => "data-structure",# UTF8_STRING
55 'OBJECT_PARAM_REFERENCE' => "reference",# OCTET_STRING
56 'OBJECT_PARAM_DATA' => "data",# OCTET_STRING or UTF8_STRING
57 'OBJECT_PARAM_DESC' => "desc", # UTF8_STRING
58
59# Algorithm parameters
60# If "engine",or "properties",are specified, they should always be paired
61# with the algorithm type.
62# Note these are common names that are shared by many types (such as kdf, mac,
63# and pkey) e.g: see MAC_PARAM_DIGEST below.
64
65 'ALG_PARAM_DIGEST' => "digest", # utf8_string
66 'ALG_PARAM_CIPHER' => "cipher", # utf8_string
67 'ALG_PARAM_ENGINE' => "engine", # utf8_string
68 'ALG_PARAM_MAC' => "mac", # utf8_string
69 'ALG_PARAM_PROPERTIES' => "properties", # utf8_string
70
71# cipher parameters
72 'CIPHER_PARAM_PADDING' => "padding", # uint
73 'CIPHER_PARAM_USE_BITS' => "use-bits", # uint
74 'CIPHER_PARAM_TLS_VERSION' => "tls-version", # uint
75 'CIPHER_PARAM_TLS_MAC' => "tls-mac", # octet_ptr
76 'CIPHER_PARAM_TLS_MAC_SIZE' => "tls-mac-size",# size_t
77 'CIPHER_PARAM_MODE' => "mode", # uint
78 'CIPHER_PARAM_BLOCK_SIZE' => "blocksize", # size_t
79 'CIPHER_PARAM_AEAD' => "aead", # int, 0 or 1
80 'CIPHER_PARAM_CUSTOM_IV' => "custom-iv", # int, 0 or 1
81 'CIPHER_PARAM_CTS' => "cts", # int, 0 or 1
82 'CIPHER_PARAM_TLS1_MULTIBLOCK' => "tls-multi", # int, 0 or 1
83 'CIPHER_PARAM_HAS_RAND_KEY' => "has-randkey", # int, 0 or 1
84 'CIPHER_PARAM_KEYLEN' => "keylen", # size_t
85 'CIPHER_PARAM_IVLEN' => "ivlen", # size_t
86 'CIPHER_PARAM_IV' => "iv", # octet_string OR octet_ptr
87 'CIPHER_PARAM_UPDATED_IV' => "updated-iv", # octet_string OR octet_ptr
88 'CIPHER_PARAM_NUM' => "num", # uint
89 'CIPHER_PARAM_ROUNDS' => "rounds", # uint
90 'CIPHER_PARAM_AEAD_TAG' => "tag", # octet_string
91 'CIPHER_PARAM_AEAD_TLS1_AAD' => "tlsaad", # octet_string
92 'CIPHER_PARAM_AEAD_TLS1_AAD_PAD' => "tlsaadpad", # size_t
93 'CIPHER_PARAM_AEAD_TLS1_IV_FIXED' => "tlsivfixed", # octet_string
94 'CIPHER_PARAM_AEAD_TLS1_GET_IV_GEN' => "tlsivgen", # octet_string
95 'CIPHER_PARAM_AEAD_TLS1_SET_IV_INV' => "tlsivinv", # octet_string
96 'CIPHER_PARAM_AEAD_IVLEN' => '*CIPHER_PARAM_IVLEN',
97 'CIPHER_PARAM_AEAD_TAGLEN' => "taglen", # size_t
98 'CIPHER_PARAM_AEAD_MAC_KEY' => "mackey", # octet_string
99 'CIPHER_PARAM_RANDOM_KEY' => "randkey", # octet_string
100 'CIPHER_PARAM_RC2_KEYBITS' => "keybits", # size_t
101 'CIPHER_PARAM_SPEED' => "speed", # uint
102 'CIPHER_PARAM_CTS_MODE' => "cts_mode", # utf8_string
103# For passing the AlgorithmIdentifier parameter in DER form
104 'CIPHER_PARAM_ALGORITHM_ID_PARAMS' => "alg_id_param",# octet_string
105 'CIPHER_PARAM_XTS_STANDARD' => "xts_standard",# utf8_string
106
107 'CIPHER_PARAM_TLS1_MULTIBLOCK_MAX_SEND_FRAGMENT' => "tls1multi_maxsndfrag",# uint
108 'CIPHER_PARAM_TLS1_MULTIBLOCK_MAX_BUFSIZE' => "tls1multi_maxbufsz", # size_t
109 'CIPHER_PARAM_TLS1_MULTIBLOCK_INTERLEAVE' => "tls1multi_interleave",# uint
110 'CIPHER_PARAM_TLS1_MULTIBLOCK_AAD' => "tls1multi_aad", # octet_string
111 'CIPHER_PARAM_TLS1_MULTIBLOCK_AAD_PACKLEN' => "tls1multi_aadpacklen",# uint
112 'CIPHER_PARAM_TLS1_MULTIBLOCK_ENC' => "tls1multi_enc", # octet_string
113 'CIPHER_PARAM_TLS1_MULTIBLOCK_ENC_IN' => "tls1multi_encin", # octet_string
114 'CIPHER_PARAM_TLS1_MULTIBLOCK_ENC_LEN' => "tls1multi_enclen", # size_t
115
116# digest parameters
117 'DIGEST_PARAM_XOFLEN' => "xoflen", # size_t
118 'DIGEST_PARAM_SSL3_MS' => "ssl3-ms", # octet string
119 'DIGEST_PARAM_PAD_TYPE' => "pad-type", # uint
120 'DIGEST_PARAM_MICALG' => "micalg", # utf8 string
121 'DIGEST_PARAM_BLOCK_SIZE' => "blocksize", # size_t
122 'DIGEST_PARAM_SIZE' => "size", # size_t
123 'DIGEST_PARAM_XOF' => "xof", # int, 0 or 1
124 'DIGEST_PARAM_ALGID_ABSENT' => "algid-absent", # int, 0 or 1
125
126# MAC parameters
127 'MAC_PARAM_KEY' => "key", # octet string
128 'MAC_PARAM_IV' => "iv", # octet string
129 'MAC_PARAM_CUSTOM' => "custom", # utf8 string
130 'MAC_PARAM_SALT' => "salt", # octet string
131 'MAC_PARAM_XOF' => "xof", # int, 0 or 1
132 'MAC_PARAM_DIGEST_NOINIT' => "digest-noinit", # int, 0 or 1
133 'MAC_PARAM_DIGEST_ONESHOT' => "digest-oneshot",# int, 0 or 1
134 'MAC_PARAM_C_ROUNDS' => "c-rounds", # unsigned int
135 'MAC_PARAM_D_ROUNDS' => "d-rounds", # unsigned int
136
137# If "engine",or "properties",are specified, they should always be paired
138# with "cipher",or "digest".
139
140 'MAC_PARAM_CIPHER' => '*ALG_PARAM_CIPHER', # utf8 string
141 'MAC_PARAM_DIGEST' => '*ALG_PARAM_DIGEST', # utf8 string
142 'MAC_PARAM_PROPERTIES' => '*ALG_PARAM_PROPERTIES', # utf8 string
143 'MAC_PARAM_SIZE' => "size", # size_t
144 'MAC_PARAM_BLOCK_SIZE' => "block-size", # size_t
145 'MAC_PARAM_TLS_DATA_SIZE' => "tls-data-size", # size_t
146
147# KDF / PRF parameters
148 'KDF_PARAM_SECRET' => "secret", # octet string
149 'KDF_PARAM_KEY' => "key", # octet string
150 'KDF_PARAM_SALT' => "salt", # octet string
151 'KDF_PARAM_PASSWORD' => "pass", # octet string
152 'KDF_PARAM_PREFIX' => "prefix", # octet string
153 'KDF_PARAM_LABEL' => "label", # octet string
154 'KDF_PARAM_DATA' => "data", # octet string
155 'KDF_PARAM_DIGEST' => '*ALG_PARAM_DIGEST', # utf8 string
156 'KDF_PARAM_CIPHER' => '*ALG_PARAM_CIPHER', # utf8 string
157 'KDF_PARAM_MAC' => '*ALG_PARAM_MAC', # utf8 string
158 'KDF_PARAM_MAC_SIZE' => "maclen", # size_t
159 'KDF_PARAM_PROPERTIES' => '*ALG_PARAM_PROPERTIES', # utf8 string
160 'KDF_PARAM_ITER' => "iter", # unsigned int
161 'KDF_PARAM_MODE' => "mode", # utf8 string or int
162 'KDF_PARAM_PKCS5' => "pkcs5", # int
163 'KDF_PARAM_UKM' => "ukm", # octet string
164 'KDF_PARAM_CEK_ALG' => "cekalg", # utf8 string
165 'KDF_PARAM_SCRYPT_N' => "n", # uint64_t
166 'KDF_PARAM_SCRYPT_R' => "r", # uint32_t
167 'KDF_PARAM_SCRYPT_P' => "p", # uint32_t
168 'KDF_PARAM_SCRYPT_MAXMEM' => "maxmem_bytes", # uint64_t
169 'KDF_PARAM_INFO' => "info", # octet string
170 'KDF_PARAM_SEED' => "seed", # octet string
171 'KDF_PARAM_SSHKDF_XCGHASH' => "xcghash", # octet string
172 'KDF_PARAM_SSHKDF_SESSION_ID' => "session_id", # octet string
173 'KDF_PARAM_SSHKDF_TYPE' => "type", # int
174 'KDF_PARAM_SIZE' => "size", # size_t
175 'KDF_PARAM_CONSTANT' => "constant", # octet string
176 'KDF_PARAM_PKCS12_ID' => "id", # int
177 'KDF_PARAM_KBKDF_USE_L' => "use-l", # int
178 'KDF_PARAM_KBKDF_USE_SEPARATOR' => "use-separator", # int
179 'KDF_PARAM_KBKDF_R' => "r", # int
180 'KDF_PARAM_X942_ACVPINFO' => "acvp-info",
181 'KDF_PARAM_X942_PARTYUINFO' => "partyu-info",
182 'KDF_PARAM_X942_PARTYVINFO' => "partyv-info",
183 'KDF_PARAM_X942_SUPP_PUBINFO' => "supp-pubinfo",
184 'KDF_PARAM_X942_SUPP_PRIVINFO' => "supp-privinfo",
185 'KDF_PARAM_X942_USE_KEYBITS' => "use-keybits",
186 'KDF_PARAM_HMACDRBG_ENTROPY' => "entropy",
187 'KDF_PARAM_HMACDRBG_NONCE' => "nonce",
188 'KDF_PARAM_THREADS' => "threads", # uint32_t
189 'KDF_PARAM_EARLY_CLEAN' => "early_clean", # uint32_t
190 'KDF_PARAM_ARGON2_AD' => "ad", # octet string
191 'KDF_PARAM_ARGON2_LANES' => "lanes", # uint32_t
192 'KDF_PARAM_ARGON2_MEMCOST' => "memcost", # uint32_t
193 'KDF_PARAM_ARGON2_VERSION' => "version", # uint32_t
194
195# Known RAND names
196 'RAND_PARAM_STATE' => "state",
197 'RAND_PARAM_STRENGTH' => "strength",
198 'RAND_PARAM_MAX_REQUEST' => "max_request",
199 'RAND_PARAM_TEST_ENTROPY' => "test_entropy",
200 'RAND_PARAM_TEST_NONCE' => "test_nonce",
201 'RAND_PARAM_GENERATE' => "generate",
202
203# RAND/DRBG names
204 'DRBG_PARAM_RESEED_REQUESTS' => "reseed_requests",
205 'DRBG_PARAM_RESEED_TIME_INTERVAL' => "reseed_time_interval",
206 'DRBG_PARAM_MIN_ENTROPYLEN' => "min_entropylen",
207 'DRBG_PARAM_MAX_ENTROPYLEN' => "max_entropylen",
208 'DRBG_PARAM_MIN_NONCELEN' => "min_noncelen",
209 'DRBG_PARAM_MAX_NONCELEN' => "max_noncelen",
210 'DRBG_PARAM_MAX_PERSLEN' => "max_perslen",
211 'DRBG_PARAM_MAX_ADINLEN' => "max_adinlen",
212 'DRBG_PARAM_RESEED_COUNTER' => "reseed_counter",
213 'DRBG_PARAM_RESEED_TIME' => "reseed_time",
214 'DRBG_PARAM_PROPERTIES' => '*ALG_PARAM_PROPERTIES',
215 'DRBG_PARAM_DIGEST' => '*ALG_PARAM_DIGEST',
216 'DRBG_PARAM_CIPHER' => '*ALG_PARAM_CIPHER',
217 'DRBG_PARAM_MAC' => '*ALG_PARAM_MAC',
218 'DRBG_PARAM_USE_DF' => "use_derivation_function",
219
220# DRBG call back parameters
221 'DRBG_PARAM_ENTROPY_REQUIRED' => "entropy_required",
222 'DRBG_PARAM_PREDICTION_RESISTANCE' => "prediction_resistance",
223 'DRBG_PARAM_MIN_LENGTH' => "minium_length",
224 'DRBG_PARAM_MAX_LENGTH' => "maxium_length",
225 'DRBG_PARAM_RANDOM_DATA' => "random_data",
226 'DRBG_PARAM_SIZE' => "size",
227
228# PKEY parameters
229# Common PKEY parameters
230 'PKEY_PARAM_BITS' => "bits",# integer
231 'PKEY_PARAM_MAX_SIZE' => "max-size",# integer
232 'PKEY_PARAM_SECURITY_BITS' => "security-bits",# integer
233 'PKEY_PARAM_DIGEST' => '*ALG_PARAM_DIGEST',
234 'PKEY_PARAM_CIPHER' => '*ALG_PARAM_CIPHER', # utf8 string
235 'PKEY_PARAM_ENGINE' => '*ALG_PARAM_ENGINE', # utf8 string
236 'PKEY_PARAM_PROPERTIES' => '*ALG_PARAM_PROPERTIES',
237 'PKEY_PARAM_DEFAULT_DIGEST' => "default-digest",# utf8 string
238 'PKEY_PARAM_MANDATORY_DIGEST' => "mandatory-digest",# utf8 string
239 'PKEY_PARAM_PAD_MODE' => "pad-mode",
240 'PKEY_PARAM_DIGEST_SIZE' => "digest-size",
241 'PKEY_PARAM_MASKGENFUNC' => "mgf",
242 'PKEY_PARAM_MGF1_DIGEST' => "mgf1-digest",
243 'PKEY_PARAM_MGF1_PROPERTIES' => "mgf1-properties",
244 'PKEY_PARAM_ENCODED_PUBLIC_KEY' => "encoded-pub-key",
245 'PKEY_PARAM_GROUP_NAME' => "group",
246 'PKEY_PARAM_DIST_ID' => "distid",
247 'PKEY_PARAM_PUB_KEY' => "pub",
248 'PKEY_PARAM_PRIV_KEY' => "priv",
249 'PKEY_PARAM_IMPLICIT_REJECTION' => "implicit-rejection",
250
251# Diffie-Hellman/DSA Parameters
252 'PKEY_PARAM_FFC_P' => "p",
253 'PKEY_PARAM_FFC_G' => "g",
254 'PKEY_PARAM_FFC_Q' => "q",
255 'PKEY_PARAM_FFC_GINDEX' => "gindex",
256 'PKEY_PARAM_FFC_PCOUNTER' => "pcounter",
257 'PKEY_PARAM_FFC_SEED' => "seed",
258 'PKEY_PARAM_FFC_COFACTOR' => "j",
259 'PKEY_PARAM_FFC_H' => "hindex",
260 'PKEY_PARAM_FFC_VALIDATE_PQ' => "validate-pq",
261 'PKEY_PARAM_FFC_VALIDATE_G' => "validate-g",
262 'PKEY_PARAM_FFC_VALIDATE_LEGACY' => "validate-legacy",
263
264# Diffie-Hellman params
265 'PKEY_PARAM_DH_GENERATOR' => "safeprime-generator",
266 'PKEY_PARAM_DH_PRIV_LEN' => "priv_len",
267
268# Elliptic Curve Domain Parameters
269 'PKEY_PARAM_EC_PUB_X' => "qx",
270 'PKEY_PARAM_EC_PUB_Y' => "qy",
271
272# Elliptic Curve Explicit Domain Parameters
273 'PKEY_PARAM_EC_FIELD_TYPE' => "field-type",
274 'PKEY_PARAM_EC_P' => "p",
275 'PKEY_PARAM_EC_A' => "a",
276 'PKEY_PARAM_EC_B' => "b",
277 'PKEY_PARAM_EC_GENERATOR' => "generator",
278 'PKEY_PARAM_EC_ORDER' => "order",
279 'PKEY_PARAM_EC_COFACTOR' => "cofactor",
280 'PKEY_PARAM_EC_SEED' => "seed",
281 'PKEY_PARAM_EC_CHAR2_M' => "m",
282 'PKEY_PARAM_EC_CHAR2_TYPE' => "basis-type",
283 'PKEY_PARAM_EC_CHAR2_TP_BASIS' => "tp",
284 'PKEY_PARAM_EC_CHAR2_PP_K1' => "k1",
285 'PKEY_PARAM_EC_CHAR2_PP_K2' => "k2",
286 'PKEY_PARAM_EC_CHAR2_PP_K3' => "k3",
287 'PKEY_PARAM_EC_DECODED_FROM_EXPLICIT_PARAMS' => "decoded-from-explicit",
288
289# Elliptic Curve Key Parameters
290 'PKEY_PARAM_USE_COFACTOR_FLAG' => "use-cofactor-flag",
291 'PKEY_PARAM_USE_COFACTOR_ECDH' => '*PKEY_PARAM_USE_COFACTOR_FLAG',
292
293# RSA Keys
294#
295# n, e, d are the usual public and private key components
296#
297# rsa-num is the number of factors, including p and q
298# rsa-factor is used for each factor: p, q, r_i (i = 3, ...)
299# rsa-exponent is used for each exponent: dP, dQ, d_i (i = 3, ...)
300# rsa-coefficient is used for each coefficient: qInv, t_i (i = 3, ...)
301#
302# The number of rsa-factor items must be equal to the number of rsa-exponent
303# items, and the number of rsa-coefficients must be one less.
304# (the base i for the coefficients is 2, not 1, at least as implied by
305# RFC 8017)
306
307 'PKEY_PARAM_RSA_N' => "n",
308 'PKEY_PARAM_RSA_E' => "e",
309 'PKEY_PARAM_RSA_D' => "d",
310 'PKEY_PARAM_RSA_FACTOR' => "rsa-factor",
311 'PKEY_PARAM_RSA_EXPONENT' => "rsa-exponent",
312 'PKEY_PARAM_RSA_COEFFICIENT' => "rsa-coefficient",
313 'PKEY_PARAM_RSA_FACTOR1' => "rsa-factor1",
314 'PKEY_PARAM_RSA_FACTOR2' => "rsa-factor2",
315 'PKEY_PARAM_RSA_FACTOR3' => "rsa-factor3",
316 'PKEY_PARAM_RSA_FACTOR4' => "rsa-factor4",
317 'PKEY_PARAM_RSA_FACTOR5' => "rsa-factor5",
318 'PKEY_PARAM_RSA_FACTOR6' => "rsa-factor6",
319 'PKEY_PARAM_RSA_FACTOR7' => "rsa-factor7",
320 'PKEY_PARAM_RSA_FACTOR8' => "rsa-factor8",
321 'PKEY_PARAM_RSA_FACTOR9' => "rsa-factor9",
322 'PKEY_PARAM_RSA_FACTOR10' => "rsa-factor10",
323 'PKEY_PARAM_RSA_EXPONENT1' => "rsa-exponent1",
324 'PKEY_PARAM_RSA_EXPONENT2' => "rsa-exponent2",
325 'PKEY_PARAM_RSA_EXPONENT3' => "rsa-exponent3",
326 'PKEY_PARAM_RSA_EXPONENT4' => "rsa-exponent4",
327 'PKEY_PARAM_RSA_EXPONENT5' => "rsa-exponent5",
328 'PKEY_PARAM_RSA_EXPONENT6' => "rsa-exponent6",
329 'PKEY_PARAM_RSA_EXPONENT7' => "rsa-exponent7",
330 'PKEY_PARAM_RSA_EXPONENT8' => "rsa-exponent8",
331 'PKEY_PARAM_RSA_EXPONENT9' => "rsa-exponent9",
332 'PKEY_PARAM_RSA_EXPONENT10' => "rsa-exponent10",
333 'PKEY_PARAM_RSA_COEFFICIENT1' => "rsa-coefficient1",
334 'PKEY_PARAM_RSA_COEFFICIENT2' => "rsa-coefficient2",
335 'PKEY_PARAM_RSA_COEFFICIENT3' => "rsa-coefficient3",
336 'PKEY_PARAM_RSA_COEFFICIENT4' => "rsa-coefficient4",
337 'PKEY_PARAM_RSA_COEFFICIENT5' => "rsa-coefficient5",
338 'PKEY_PARAM_RSA_COEFFICIENT6' => "rsa-coefficient6",
339 'PKEY_PARAM_RSA_COEFFICIENT7' => "rsa-coefficient7",
340 'PKEY_PARAM_RSA_COEFFICIENT8' => "rsa-coefficient8",
341 'PKEY_PARAM_RSA_COEFFICIENT9' => "rsa-coefficient9",
342
343# Key generation parameters
344 'PKEY_PARAM_RSA_BITS' => '*PKEY_PARAM_BITS',
345 'PKEY_PARAM_RSA_PRIMES' => "primes",
346 'PKEY_PARAM_RSA_DIGEST' => '*PKEY_PARAM_DIGEST',
347 'PKEY_PARAM_RSA_DIGEST_PROPS' => '*PKEY_PARAM_PROPERTIES',
348 'PKEY_PARAM_RSA_MASKGENFUNC' => '*PKEY_PARAM_MASKGENFUNC',
349 'PKEY_PARAM_RSA_MGF1_DIGEST' => '*PKEY_PARAM_MGF1_DIGEST',
350 'PKEY_PARAM_RSA_PSS_SALTLEN' => "saltlen",
351 'PKEY_PARAM_RSA_DERIVE_FROM_PQ' => "rsa-derive-from-pq",
352
353# EC, X25519 and X448 Key generation parameters
354 'PKEY_PARAM_DHKEM_IKM' => "dhkem-ikm",
355
356# Key generation parameters
357 'PKEY_PARAM_FFC_TYPE' => "type",
358 'PKEY_PARAM_FFC_PBITS' => "pbits",
359 'PKEY_PARAM_FFC_QBITS' => "qbits",
360 'PKEY_PARAM_FFC_DIGEST' => '*PKEY_PARAM_DIGEST',
361 'PKEY_PARAM_FFC_DIGEST_PROPS' => '*PKEY_PARAM_PROPERTIES',
362
363 'PKEY_PARAM_EC_ENCODING' => "encoding",# utf8_string
364 'PKEY_PARAM_EC_POINT_CONVERSION_FORMAT' => "point-format",
365 'PKEY_PARAM_EC_GROUP_CHECK_TYPE' => "group-check",
366 'PKEY_PARAM_EC_INCLUDE_PUBLIC' => "include-public",
367
368# Key Exchange parameters
369 'EXCHANGE_PARAM_PAD' => "pad",# uint
370 'EXCHANGE_PARAM_EC_ECDH_COFACTOR_MODE' => "ecdh-cofactor-mode",# int
371 'EXCHANGE_PARAM_KDF_TYPE' => "kdf-type",# utf8_string
372 'EXCHANGE_PARAM_KDF_DIGEST' => "kdf-digest",# utf8_string
373 'EXCHANGE_PARAM_KDF_DIGEST_PROPS' => "kdf-digest-props",# utf8_string
374 'EXCHANGE_PARAM_KDF_OUTLEN' => "kdf-outlen",# size_t
375# The following parameter is an octet_string on set and an octet_ptr on get
376 'EXCHANGE_PARAM_KDF_UKM' => "kdf-ukm",
377
378# Signature parameters
379 'SIGNATURE_PARAM_ALGORITHM_ID' => "algorithm-id",
380 'SIGNATURE_PARAM_PAD_MODE' => '*PKEY_PARAM_PAD_MODE',
381 'SIGNATURE_PARAM_DIGEST' => '*PKEY_PARAM_DIGEST',
382 'SIGNATURE_PARAM_PROPERTIES' => '*PKEY_PARAM_PROPERTIES',
383 'SIGNATURE_PARAM_PSS_SALTLEN' => "saltlen",
384 'SIGNATURE_PARAM_MGF1_DIGEST' => '*PKEY_PARAM_MGF1_DIGEST',
385 'SIGNATURE_PARAM_MGF1_PROPERTIES' => '*PKEY_PARAM_MGF1_PROPERTIES',
386 'SIGNATURE_PARAM_DIGEST_SIZE' => '*PKEY_PARAM_DIGEST_SIZE',
387 'SIGNATURE_PARAM_NONCE_TYPE' => "nonce-type",
388 'SIGNATURE_PARAM_INSTANCE' => "instance",
389 'SIGNATURE_PARAM_CONTEXT_STRING' => "context-string",
390
391# Asym cipher parameters
392 'ASYM_CIPHER_PARAM_DIGEST' => '*PKEY_PARAM_DIGEST',
393 'ASYM_CIPHER_PARAM_PROPERTIES' => '*PKEY_PARAM_PROPERTIES',
394 'ASYM_CIPHER_PARAM_ENGINE' => '*PKEY_PARAM_ENGINE',
395 'ASYM_CIPHER_PARAM_PAD_MODE' => '*PKEY_PARAM_PAD_MODE',
396 'ASYM_CIPHER_PARAM_MGF1_DIGEST' => '*PKEY_PARAM_MGF1_DIGEST',
397 'ASYM_CIPHER_PARAM_MGF1_DIGEST_PROPS' => '*PKEY_PARAM_MGF1_PROPERTIES',
398 'ASYM_CIPHER_PARAM_OAEP_DIGEST' => '*ALG_PARAM_DIGEST',
399 'ASYM_CIPHER_PARAM_OAEP_DIGEST_PROPS' => "digest-props",
400# The following parameter is an octet_string on set and an octet_ptr on get
401 'ASYM_CIPHER_PARAM_OAEP_LABEL' => "oaep-label",
402 'ASYM_CIPHER_PARAM_TLS_CLIENT_VERSION' => "tls-client-version",
403 'ASYM_CIPHER_PARAM_TLS_NEGOTIATED_VERSION' => "tls-negotiated-version",
404 'ASYM_CIPHER_PARAM_IMPLICIT_REJECTION' => "implicit-rejection",
405
406# Encoder / decoder parameters
407
408 'ENCODER_PARAM_CIPHER' => '*ALG_PARAM_CIPHER',
409 'ENCODER_PARAM_PROPERTIES' => '*ALG_PARAM_PROPERTIES',
410# Currently PVK only, but reusable for others as needed
411 'ENCODER_PARAM_ENCRYPT_LEVEL' => "encrypt-level",
412 'ENCODER_PARAM_SAVE_PARAMETERS' => "save-parameters",# integer
413
414 'DECODER_PARAM_PROPERTIES' => '*ALG_PARAM_PROPERTIES',
415
416# Passphrase callback parameters
417 'PASSPHRASE_PARAM_INFO' => "info",
418
419# Keygen callback parameters, from provider to libcrypto
420 'GEN_PARAM_POTENTIAL' => "potential",# integer
421 'GEN_PARAM_ITERATION' => "iteration",# integer
422
423# ACVP Test parameters : These should not be used normally
424 'PKEY_PARAM_RSA_TEST_XP1' => "xp1",
425 'PKEY_PARAM_RSA_TEST_XP2' => "xp2",
426 'PKEY_PARAM_RSA_TEST_XP' => "xp",
427 'PKEY_PARAM_RSA_TEST_XQ1' => "xq1",
428 'PKEY_PARAM_RSA_TEST_XQ2' => "xq2",
429 'PKEY_PARAM_RSA_TEST_XQ' => "xq",
430 'PKEY_PARAM_RSA_TEST_P1' => "p1",
431 'PKEY_PARAM_RSA_TEST_P2' => "p2",
432 'PKEY_PARAM_RSA_TEST_Q1' => "q1",
433 'PKEY_PARAM_RSA_TEST_Q2' => "q2",
434 'SIGNATURE_PARAM_KAT' => "kat",
435
436# KEM parameters
437 'KEM_PARAM_OPERATION' => "operation",
438 'KEM_PARAM_IKME' => "ikme",
439
440# Capabilities
441
442# TLS-GROUP Capability
443 'CAPABILITY_TLS_GROUP_NAME' => "tls-group-name",
444 'CAPABILITY_TLS_GROUP_NAME_INTERNAL' => "tls-group-name-internal",
445 'CAPABILITY_TLS_GROUP_ID' => "tls-group-id",
446 'CAPABILITY_TLS_GROUP_ALG' => "tls-group-alg",
447 'CAPABILITY_TLS_GROUP_SECURITY_BITS' => "tls-group-sec-bits",
448 'CAPABILITY_TLS_GROUP_IS_KEM' => "tls-group-is-kem",
449 'CAPABILITY_TLS_GROUP_MIN_TLS' => "tls-min-tls",
450 'CAPABILITY_TLS_GROUP_MAX_TLS' => "tls-max-tls",
451 'CAPABILITY_TLS_GROUP_MIN_DTLS' => "tls-min-dtls",
452 'CAPABILITY_TLS_GROUP_MAX_DTLS' => "tls-max-dtls",
453
454# TLS-SIGALG Capability
455 'CAPABILITY_TLS_SIGALG_IANA_NAME' => "tls-sigalg-iana-name",
456 'CAPABILITY_TLS_SIGALG_CODE_POINT' => "tls-sigalg-code-point",
457 'CAPABILITY_TLS_SIGALG_NAME' => "tls-sigalg-name",
458 'CAPABILITY_TLS_SIGALG_OID' => "tls-sigalg-oid",
459 'CAPABILITY_TLS_SIGALG_SIG_NAME' => "tls-sigalg-sig-name",
460 'CAPABILITY_TLS_SIGALG_SIG_OID' => "tls-sigalg-sig-oid",
461 'CAPABILITY_TLS_SIGALG_HASH_NAME' => "tls-sigalg-hash-name",
462 'CAPABILITY_TLS_SIGALG_HASH_OID' => "tls-sigalg-hash-oid",
463 'CAPABILITY_TLS_SIGALG_KEYTYPE' => "tls-sigalg-keytype",
464 'CAPABILITY_TLS_SIGALG_KEYTYPE_OID' => "tls-sigalg-keytype-oid",
465 'CAPABILITY_TLS_SIGALG_SECURITY_BITS' => "tls-sigalg-sec-bits",
466 'CAPABILITY_TLS_SIGALG_MIN_TLS' => "tls-min-tls",
467 'CAPABILITY_TLS_SIGALG_MAX_TLS' => "tls-max-tls",
468
469# storemgmt parameters
470
471
472# Used by storemgmt_ctx_set_params():
473#
474# - STORE_PARAM_EXPECT is an INTEGER, and the value is any of the
475# STORE_INFO numbers. This is used to set the expected type of
476# object loaded.
477#
478# - STORE_PARAM_SUBJECT, STORE_PARAM_ISSUER,
479# STORE_PARAM_SERIAL, STORE_PARAM_FINGERPRINT,
480# STORE_PARAM_DIGEST, STORE_PARAM_ALIAS
481# are used as search criteria.
482# (STORE_PARAM_DIGEST is used with STORE_PARAM_FINGERPRINT)
483
484 'STORE_PARAM_EXPECT' => "expect", # INTEGER
485 'STORE_PARAM_SUBJECT' => "subject", # DER blob => OCTET_STRING
486 'STORE_PARAM_ISSUER' => "name", # DER blob => OCTET_STRING
487 'STORE_PARAM_SERIAL' => "serial", # INTEGER
488 'STORE_PARAM_DIGEST' => "digest", # UTF8_STRING
489 'STORE_PARAM_FINGERPRINT' => "fingerprint", # OCTET_STRING
490 'STORE_PARAM_ALIAS' => "alias", # UTF8_STRING
491
492# You may want to pass properties for the provider implementation to use
493 'STORE_PARAM_PROPERTIES' => "properties", # utf8_string
494# DECODER input type if a decoder is used by the store
495 'STORE_PARAM_INPUT_TYPE' => "input-type", # UTF8_STRING
496
497
498# Libssl record layer
499 'LIBSSL_RECORD_LAYER_PARAM_OPTIONS' => "options",
500 'LIBSSL_RECORD_LAYER_PARAM_MODE' => "mode",
501 'LIBSSL_RECORD_LAYER_PARAM_READ_AHEAD' => "read_ahead",
502 'LIBSSL_RECORD_LAYER_READ_BUFFER_LEN' => "read_buffer_len",
503 'LIBSSL_RECORD_LAYER_PARAM_USE_ETM' => "use_etm",
504 'LIBSSL_RECORD_LAYER_PARAM_STREAM_MAC' => "stream_mac",
505 'LIBSSL_RECORD_LAYER_PARAM_TLSTREE' => "tlstree",
506 'LIBSSL_RECORD_LAYER_PARAM_MAX_FRAG_LEN' => "max_frag_len",
507 'LIBSSL_RECORD_LAYER_PARAM_MAX_EARLY_DATA' => "max_early_data",
508 'LIBSSL_RECORD_LAYER_PARAM_BLOCK_PADDING' => "block_padding",
509);
510
511# Generate string based macros for public consumption
512sub generate_public_macros {
513 my @macros = ();
514
515 foreach my $name (keys %params) {
516 my $val = $params{$name};
517 my $def = '# define OSSL_' . $name . ' ';
518
519 if (substr($val, 0, 1) eq '*') {
520 $def .= 'OSSL_' . substr($val, 1);
521 } else {
522 $def .= '"' . $val . '"';
523 }
524 push(@macros, $def)
525 }
526 return join("\n", sort @macros);
527}
528
529# Generate number based macros for internal use
530# The numbers are unique per string
531sub generate_internal_macros {
532 my @macros = ();
533 my $count = 0;
534 my %reverse;
535
536 # Determine the number for each unique string
537 # Sort the names to improve the chance of cache coherency
538 foreach my $name (sort keys %params) {
539 my $val = $params{$name};
540
541 if (substr($val, 0, 1) ne '*' and not defined $reverse{$val}) {
542 $reverse{$val} = $count++;
543 }
544 }
545
546 # Output the defines
547 foreach my $name (keys %params) {
548 my $val = $params{$name};
549 my $def = '#define PIDX_' . $name . ' ';
550
551 if (substr($val, 0, 1) eq '*') {
552 $def .= 'PIDX_' . substr($val, 1);
553 } else {
554 $def .= $reverse{$val};
555 }
556 push(@macros, $def)
557 }
558 return "#define NUM_PIDX $count\n\n" . join("\n", sort @macros);
559}
560
561sub generate_trie {
562 my %trie;
563 my $nodes = 0;
564 my $chars = 0;
565
566 foreach my $name (sort keys %params) {
567 my $val = $params{$name};
568 if (substr($val, 0, 1) ne '*') {
569 my $cursor = \%trie;
570
571 $chars += length($val);
572 for my $i (0 .. length($val) - 1) {
573 my $c = substr($val, $i, 1);
574
575 if (not $case_sensitive) {
576 $c = '_' if $c eq '-';
577 $c = lc $c;
578 }
579
580 if (not defined $$cursor{$c}) {
581 $cursor->{$c} = {};
582 $nodes++;
583 }
584 $cursor = $cursor->{$c};
585 }
586 $cursor->{'val'} = $name;
587 }
588 }
589 #print "\n\n/* $nodes nodes for $chars letters*/\n\n";
590 return %trie;
591}
592
593sub generate_code_from_trie {
594 my $n = shift;
595 my $trieref = shift;
596 my $idt = " ";
597 my $indent0 = $idt x ($n + 1);
598 my $indent1 = $indent0 . $idt;
599 my $strcmp = $case_sensitive ? 'strcmp' : 'strcasecmp';
600
601 print "int ossl_param_find_pidx(const char *s)\n{\n" if $n == 0;
602
603 if ($trieref->{'suffix'}) {
604 my $suf = $trieref->{'suffix'};
605
606 printf "%sif ($strcmp(\"$suf\", s + $n) == 0", $indent0;
607 if (not $case_sensitive) {
608 $suf =~ tr/_/-/;
609 print " || $strcmp(\"$suf\", s + $n) == 0"
610 if ($suf ne $trieref->{'suffix'});
611 }
612 printf ")\n%sreturn PIDX_%s;\n", $indent1, $trieref->{'name'};
613 #printf "%sbreak;\n", $indent0;
614 return;
615 }
616
617 printf "%sswitch(s\[%d\]) {\n", $indent0, $n;
618 printf "%sdefault:\n", $indent0;
619 for my $l (sort keys %$trieref) {
620 if ($l eq 'val') {
621 printf "%sbreak;\n", $indent1;
622 printf "%scase '\\0':\n", $indent0;
623 printf "%sreturn PIDX_%s;\n", $indent1, $trieref->{'val'};
624 } else {
625 printf "%sbreak;\n", $indent1;
626 printf "%scase '%s':", $indent0, $l;
627 if (not $case_sensitive) {
628 print " case '-':" if ($l eq '_');
629 printf " case '%s':", uc $l if ($l =~ /[a-z]/);
630 }
631 print "\n";
632 generate_code_from_trie($n + 1, $trieref->{$l});
633 }
634 }
635 printf "%s}\n", $indent0;
636 print " return -1;\n}\n" if $n == 0;
637 return "";
638}
639
640# Find long endings and cache what they resolve to
641sub locate_long_endings {
642 my $trieref = shift;
643 my @names = keys %$trieref;
644 my $num = @names;
645
646 return (1, '', $trieref->{$names[0]}) if ($num == 1 and $names[0] eq 'val');
647
648 if ($num == 1) {
649 my ($res, $suffix, $name) = locate_long_endings($trieref->{$names[0]});
650 my $e = $names[0] . $suffix;
651 if ($res) {
652 $trieref->{'suffix'} = $e;
653 $trieref->{'name'} = $name;
654 }
655 return $res, $e, $name;
656 }
657
658 for my $l (@names) {
659 if ($l ne 'val') {
660 my ($res, $suffix, $name) = locate_long_endings($trieref->{$l});
661 }
662 }
663 return 0, '';
664}
665
666sub produce_decoder {
667 my %t = generate_trie();
668 my $s;
669
670 locate_long_endings(\%t);
671
672 open local *STDOUT, '>', \$s;
673 generate_code_from_trie(0, \%t);
674 return $s;
675}
Note: See TracBrowser for help on using the repository browser.

© 2025 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette