xref: /freebsd/crypto/openssl/util/perl/OpenSSL/paramnames.pm (revision e7be843b4a162e68651d3911f0357ed464915629)
1#! /usr/bin/env perl
2# Copyright 2023-2025 The OpenSSL Project Authors. All Rights Reserved.
3#
4# Licensed under the Apache License 2.0 (the "License").  You may not use
5# this file except in compliance with the License.  You can obtain a copy
6# in the file LICENSE in the source distribution or at
7# https://www.openssl.org/source/license.html
8
9package OpenSSL::paramnames;
10
11use strict;
12use warnings;
13
14require Exporter;
15our @ISA = qw(Exporter);
16our @EXPORT_OK = qw(generate_public_macros
17                    generate_internal_macros
18                    produce_decoder);
19
20my $case_sensitive = 1;
21
22my %params = (
23# Well known parameter names that core passes to providers
24    'PROV_PARAM_CORE_VERSION' =>         "openssl-version",# utf8_ptr
25    'PROV_PARAM_CORE_PROV_NAME' =>       "provider-name",  # utf8_ptr
26    'PROV_PARAM_CORE_MODULE_FILENAME' => "module-filename",# utf8_ptr
27
28# Well known parameter names that Providers can define
29    'PROV_PARAM_NAME' =>               "name",               # utf8_ptr
30    'PROV_PARAM_VERSION' =>            "version",            # utf8_ptr
31    'PROV_PARAM_BUILDINFO' =>          "buildinfo",          # utf8_ptr
32    'PROV_PARAM_STATUS' =>             "status",             # uint
33    'PROV_PARAM_SECURITY_CHECKS' =>    "security-checks",    # uint
34    'PROV_PARAM_HMAC_KEY_CHECK' =>     "hmac-key-check",     # uint
35    'PROV_PARAM_KMAC_KEY_CHECK' =>     "kmac-key-check",     # uint
36    'PROV_PARAM_TLS1_PRF_EMS_CHECK' => "tls1-prf-ems-check", # uint
37    'PROV_PARAM_NO_SHORT_MAC' =>       "no-short-mac",       # uint
38    'PROV_PARAM_DRBG_TRUNC_DIGEST' =>  "drbg-no-trunc-md",   # uint
39    'PROV_PARAM_HKDF_DIGEST_CHECK' =>      "hkdf-digest-check",      # uint
40    'PROV_PARAM_TLS13_KDF_DIGEST_CHECK' => "tls13-kdf-digest-check", # uint
41    'PROV_PARAM_TLS1_PRF_DIGEST_CHECK' =>  "tls1-prf-digest-check",  # uint
42    'PROV_PARAM_SSHKDF_DIGEST_CHECK' =>    "sshkdf-digest-check",    # uint
43    'PROV_PARAM_SSKDF_DIGEST_CHECK' =>     "sskdf-digest-check",     # uint
44    'PROV_PARAM_X963KDF_DIGEST_CHECK' =>   "x963kdf-digest-check",   # uint
45    'PROV_PARAM_DSA_SIGN_DISABLED' =>      "dsa-sign-disabled",      # uint
46    'PROV_PARAM_TDES_ENCRYPT_DISABLED' =>  "tdes-encrypt-disabled",  # uint
47    'PROV_PARAM_RSA_PSS_SALTLEN_CHECK' =>  "rsa-pss-saltlen-check",  # uint
48    'PROV_PARAM_RSA_SIGN_X931_PAD_DISABLED' =>  "rsa-sign-x931-pad-disabled",   # uint
49    'PROV_PARAM_RSA_PKCS15_PAD_DISABLED' => "rsa-pkcs15-pad-disabled", # uint
50    'PROV_PARAM_HKDF_KEY_CHECK' =>         "hkdf-key-check",         # uint
51    'PROV_PARAM_KBKDF_KEY_CHECK' =>        "kbkdf-key-check",        # uint
52    'PROV_PARAM_TLS13_KDF_KEY_CHECK' =>    "tls13-kdf-key-check",    # uint
53    'PROV_PARAM_TLS1_PRF_KEY_CHECK' =>     "tls1-prf-key-check",     # uint
54    'PROV_PARAM_SSHKDF_KEY_CHECK' =>       "sshkdf-key-check",       # uint
55    'PROV_PARAM_SSKDF_KEY_CHECK' =>        "sskdf-key-check",        # uint
56    'PROV_PARAM_X963KDF_KEY_CHECK' =>      "x963kdf-key-check",      # uint
57    'PROV_PARAM_X942KDF_KEY_CHECK' =>      "x942kdf-key-check",      # uint
58    'PROV_PARAM_PBKDF2_LOWER_BOUND_CHECK' => "pbkdf2-lower-bound-check", # uint
59    'PROV_PARAM_ECDH_COFACTOR_CHECK' =>    "ecdh-cofactor-check",    # uint
60    'PROV_PARAM_SIGNATURE_DIGEST_CHECK' => "signature-digest-check", # uint
61
62# Self test callback parameters
63    'PROV_PARAM_SELF_TEST_PHASE' =>  "st-phase",# utf8_string
64    'PROV_PARAM_SELF_TEST_TYPE' =>   "st-type", # utf8_string
65    'PROV_PARAM_SELF_TEST_DESC' =>   "st-desc", # utf8_string
66
67# Provider-native object abstractions
68#
69# These are used when a provider wants to pass object data or an object
70# reference back to libcrypto.  This is only useful for provider functions
71# that take a callback to which an PARAM array with these parameters
72# can be passed.
73#
74# This set of parameter names is explained in detail in provider-object(7)
75# (doc/man7/provider-object.pod)
76
77    'OBJECT_PARAM_TYPE' =>              "type",     # INTEGER
78    'OBJECT_PARAM_DATA_TYPE' =>         "data-type",# UTF8_STRING
79    'OBJECT_PARAM_DATA_STRUCTURE' =>    "data-structure",# UTF8_STRING
80    'OBJECT_PARAM_REFERENCE' =>         "reference",# OCTET_STRING
81    'OBJECT_PARAM_DATA' =>              "data",# OCTET_STRING or UTF8_STRING
82    'OBJECT_PARAM_DESC' =>              "desc",     # UTF8_STRING
83    'OBJECT_PARAM_INPUT_TYPE' =>        "input-type", # UTF8_STRING
84
85# Algorithm parameters
86# If "engine",or "properties",are specified, they should always be paired
87# with the algorithm type.
88# Note these are common names that are shared by many types (such as kdf, mac,
89# and pkey) e.g: see MAC_PARAM_DIGEST below.
90
91    'ALG_PARAM_DIGEST' =>       "digest",       # utf8_string
92    'ALG_PARAM_CIPHER' =>       "cipher",       # utf8_string
93    'ALG_PARAM_ENGINE' =>       "engine",       # utf8_string
94    'ALG_PARAM_MAC' =>          "mac",          # utf8_string
95    'ALG_PARAM_PROPERTIES' =>   "properties",   # utf8_string
96    'ALG_PARAM_FIPS_APPROVED_INDICATOR' => 'fips-indicator',   # int, -1, 0 or 1
97
98    # For any operation that deals with AlgorithmIdentifier, they should
99    # implement both of these.
100    # ALG_PARAM_ALGORITHM_ID is intended to be gettable, and is the
101    # implementation's idea of what its full AlgID should look like.
102    # ALG_PARAM_ALGORITHM_ID_PARAMS is intended to be both settable
103    # and gettable, to allow the calling application to pass or get
104    # AlgID parameters to and from the provided implementation.
105    'ALG_PARAM_ALGORITHM_ID' => "algorithm-id", # octet_string (DER)
106    'ALG_PARAM_ALGORITHM_ID_PARAMS' =>  "algorithm-id-params", # octet_string
107
108# cipher parameters
109    'CIPHER_PARAM_PADDING' =>              "padding",     # uint
110    'CIPHER_PARAM_USE_BITS' =>             "use-bits",    # uint
111    'CIPHER_PARAM_TLS_VERSION' =>          "tls-version", # uint
112    'CIPHER_PARAM_TLS_MAC' =>              "tls-mac",     # octet_ptr
113    'CIPHER_PARAM_TLS_MAC_SIZE' =>         "tls-mac-size",# size_t
114    'CIPHER_PARAM_MODE' =>                 "mode",        # uint
115    'CIPHER_PARAM_BLOCK_SIZE' =>           "blocksize",   # size_t
116    'CIPHER_PARAM_AEAD' =>                 "aead",        # int, 0 or 1
117    'CIPHER_PARAM_CUSTOM_IV' =>            "custom-iv",   # int, 0 or 1
118    'CIPHER_PARAM_CTS' =>                  "cts",         # int, 0 or 1
119    'CIPHER_PARAM_TLS1_MULTIBLOCK' =>      "tls-multi",   # int, 0 or 1
120    'CIPHER_PARAM_HAS_RAND_KEY' =>         "has-randkey", # int, 0 or 1
121    'CIPHER_PARAM_KEYLEN' =>               "keylen",      # size_t
122    'CIPHER_PARAM_IVLEN' =>                "ivlen",       # size_t
123    'CIPHER_PARAM_IV' =>                   "iv",          # octet_string OR octet_ptr
124    'CIPHER_PARAM_UPDATED_IV' =>           "updated-iv",  # octet_string OR octet_ptr
125    'CIPHER_PARAM_NUM' =>                  "num",         # uint
126    'CIPHER_PARAM_ROUNDS' =>               "rounds",      # uint
127    'CIPHER_PARAM_AEAD_TAG' =>             "tag",         # octet_string
128    'CIPHER_PARAM_PIPELINE_AEAD_TAG' =>    "pipeline-tag",# octet_ptr
129    'CIPHER_PARAM_AEAD_TLS1_AAD' =>        "tlsaad",      # octet_string
130    'CIPHER_PARAM_AEAD_TLS1_AAD_PAD' =>    "tlsaadpad",   # size_t
131    'CIPHER_PARAM_AEAD_TLS1_IV_FIXED' =>   "tlsivfixed",  # octet_string
132    'CIPHER_PARAM_AEAD_TLS1_GET_IV_GEN' => "tlsivgen",    # octet_string
133    'CIPHER_PARAM_AEAD_TLS1_SET_IV_INV' => "tlsivinv",    # octet_string
134    'CIPHER_PARAM_AEAD_IVLEN' =>           '*CIPHER_PARAM_IVLEN',
135    'CIPHER_PARAM_AEAD_IV_GENERATED' => "iv-generated",   # uint
136    'CIPHER_PARAM_AEAD_TAGLEN' =>          "taglen",      # size_t
137    'CIPHER_PARAM_AEAD_MAC_KEY' =>         "mackey",      # octet_string
138    'CIPHER_PARAM_RANDOM_KEY' =>           "randkey",     # octet_string
139    'CIPHER_PARAM_RC2_KEYBITS' =>          "keybits",     # size_t
140    'CIPHER_PARAM_SPEED' =>                "speed",       # uint
141    'CIPHER_PARAM_CTS_MODE' =>             "cts_mode",    # utf8_string
142    'CIPHER_PARAM_DECRYPT_ONLY' =>         "decrypt-only",  # int, 0 or 1
143    'CIPHER_PARAM_FIPS_ENCRYPT_CHECK' =>   "encrypt-check", # int
144    'CIPHER_PARAM_FIPS_APPROVED_INDICATOR' => '*ALG_PARAM_FIPS_APPROVED_INDICATOR',
145    'CIPHER_PARAM_ALGORITHM_ID' =>         '*ALG_PARAM_ALGORITHM_ID',
146    # Historically, CIPHER_PARAM_ALGORITHM_ID_PARAMS_OLD was used.  For the
147    # time being, the old libcrypto functions will use both, so old providers
148    # continue to work.
149    # New providers are encouraged to use CIPHER_PARAM_ALGORITHM_ID_PARAMS.
150    'CIPHER_PARAM_ALGORITHM_ID_PARAMS' =>  '*ALG_PARAM_ALGORITHM_ID_PARAMS',
151    'CIPHER_PARAM_ALGORITHM_ID_PARAMS_OLD' => "alg_id_param", # octet_string
152    'CIPHER_PARAM_XTS_STANDARD' =>         "xts_standard",# utf8_string
153
154    'CIPHER_PARAM_TLS1_MULTIBLOCK_MAX_SEND_FRAGMENT' =>  "tls1multi_maxsndfrag",# uint
155    'CIPHER_PARAM_TLS1_MULTIBLOCK_MAX_BUFSIZE' =>        "tls1multi_maxbufsz",  # size_t
156    'CIPHER_PARAM_TLS1_MULTIBLOCK_INTERLEAVE' =>         "tls1multi_interleave",# uint
157    'CIPHER_PARAM_TLS1_MULTIBLOCK_AAD' =>                "tls1multi_aad",       # octet_string
158    'CIPHER_PARAM_TLS1_MULTIBLOCK_AAD_PACKLEN' =>        "tls1multi_aadpacklen",# uint
159    'CIPHER_PARAM_TLS1_MULTIBLOCK_ENC' =>                "tls1multi_enc",       # octet_string
160    'CIPHER_PARAM_TLS1_MULTIBLOCK_ENC_IN' =>             "tls1multi_encin",     # octet_string
161    'CIPHER_PARAM_TLS1_MULTIBLOCK_ENC_LEN' =>            "tls1multi_enclen",    # size_t
162
163# digest parameters
164    'DIGEST_PARAM_XOFLEN' =>       "xoflen",       # size_t
165    'DIGEST_PARAM_SSL3_MS' =>      "ssl3-ms",      # octet string
166    'DIGEST_PARAM_PAD_TYPE' =>     "pad-type",     # uint
167    'DIGEST_PARAM_MICALG' =>       "micalg",       # utf8 string
168    'DIGEST_PARAM_BLOCK_SIZE' =>   "blocksize",    # size_t
169    'DIGEST_PARAM_SIZE' =>         "size",         # size_t
170    'DIGEST_PARAM_XOF' =>          "xof",          # int, 0 or 1
171    'DIGEST_PARAM_ALGID_ABSENT' => "algid-absent", # int, 0 or 1
172
173# MAC parameters
174    'MAC_PARAM_KEY' =>            "key",           # octet string
175    'MAC_PARAM_IV' =>             "iv",            # octet string
176    'MAC_PARAM_CUSTOM' =>         "custom",        # utf8 string
177    'MAC_PARAM_SALT' =>           "salt",          # octet string
178    'MAC_PARAM_XOF' =>            "xof",           # int, 0 or 1
179    'MAC_PARAM_DIGEST_NOINIT' =>  "digest-noinit", # int, 0 or 1
180    'MAC_PARAM_DIGEST_ONESHOT' => "digest-oneshot",# int, 0 or 1
181    'MAC_PARAM_C_ROUNDS' =>       "c-rounds",      # unsigned int
182    'MAC_PARAM_D_ROUNDS' =>       "d-rounds",      # unsigned int
183
184# If "engine",or "properties",are specified, they should always be paired
185# with "cipher",or "digest".
186
187    'MAC_PARAM_CIPHER' =>           '*ALG_PARAM_CIPHER',        # utf8 string
188    'MAC_PARAM_DIGEST' =>           '*ALG_PARAM_DIGEST',        # utf8 string
189    'MAC_PARAM_PROPERTIES' =>       '*ALG_PARAM_PROPERTIES',    # utf8 string
190    'MAC_PARAM_SIZE' =>             "size",                     # size_t
191    'MAC_PARAM_BLOCK_SIZE' =>       "block-size",               # size_t
192    'MAC_PARAM_TLS_DATA_SIZE' =>    "tls-data-size",            # size_t
193    'MAC_PARAM_FIPS_NO_SHORT_MAC' =>'*PROV_PARAM_NO_SHORT_MAC',
194    'MAC_PARAM_FIPS_KEY_CHECK' =>   '*PKEY_PARAM_FIPS_KEY_CHECK',
195    'MAC_PARAM_FIPS_APPROVED_INDICATOR' => '*ALG_PARAM_FIPS_APPROVED_INDICATOR',
196    'MAC_PARAM_FIPS_NO_SHORT_MAC' => '*PROV_PARAM_NO_SHORT_MAC',
197
198# KDF / PRF parameters
199    'KDF_PARAM_SECRET' =>       "secret",                   # octet string
200    'KDF_PARAM_KEY' =>          "key",                      # octet string
201    'KDF_PARAM_SALT' =>         "salt",                     # octet string
202    'KDF_PARAM_PASSWORD' =>     "pass",                     # octet string
203    'KDF_PARAM_PREFIX' =>       "prefix",                   # octet string
204    'KDF_PARAM_LABEL' =>        "label",                    # octet string
205    'KDF_PARAM_DATA' =>         "data",                     # octet string
206    'KDF_PARAM_DIGEST' =>       '*ALG_PARAM_DIGEST',        # utf8 string
207    'KDF_PARAM_CIPHER' =>       '*ALG_PARAM_CIPHER',        # utf8 string
208    'KDF_PARAM_MAC' =>          '*ALG_PARAM_MAC',           # utf8 string
209    'KDF_PARAM_MAC_SIZE' =>     "maclen",                   # size_t
210    'KDF_PARAM_PROPERTIES' =>   '*ALG_PARAM_PROPERTIES',    # utf8 string
211    'KDF_PARAM_ITER' =>         "iter",                     # unsigned int
212    'KDF_PARAM_MODE' =>         "mode",                     # utf8 string or int
213    'KDF_PARAM_PKCS5' =>        "pkcs5",                    # int
214    'KDF_PARAM_UKM' =>          "ukm",                      # octet string
215    'KDF_PARAM_CEK_ALG' =>      "cekalg",                   # utf8 string
216    'KDF_PARAM_SCRYPT_N' =>     "n",                        # uint64_t
217    'KDF_PARAM_SCRYPT_R' =>     "r",                        # uint32_t
218    'KDF_PARAM_SCRYPT_P' =>     "p",                        # uint32_t
219    'KDF_PARAM_SCRYPT_MAXMEM' => "maxmem_bytes",            # uint64_t
220    'KDF_PARAM_INFO' =>         "info",                     # octet string
221    'KDF_PARAM_SEED' =>         "seed",                     # octet string
222    'KDF_PARAM_SSHKDF_XCGHASH' => "xcghash",                # octet string
223    'KDF_PARAM_SSHKDF_SESSION_ID' => "session_id",          # octet string
224    'KDF_PARAM_SSHKDF_TYPE' =>  "type",                     # int
225    'KDF_PARAM_SIZE' =>         "size",                     # size_t
226    'KDF_PARAM_CONSTANT' =>     "constant",                 # octet string
227    'KDF_PARAM_PKCS12_ID' =>    "id",                       # int
228    'KDF_PARAM_KBKDF_USE_L' =>          "use-l",            # int
229    'KDF_PARAM_KBKDF_USE_SEPARATOR' =>  "use-separator",    # int
230    'KDF_PARAM_KBKDF_R' =>      "r",                        # int
231    'KDF_PARAM_X942_ACVPINFO' =>        "acvp-info",
232    'KDF_PARAM_X942_PARTYUINFO' =>      "partyu-info",
233    'KDF_PARAM_X942_PARTYVINFO' =>      "partyv-info",
234    'KDF_PARAM_X942_SUPP_PUBINFO' =>    "supp-pubinfo",
235    'KDF_PARAM_X942_SUPP_PRIVINFO' =>   "supp-privinfo",
236    'KDF_PARAM_X942_USE_KEYBITS' =>     "use-keybits",
237    'KDF_PARAM_HMACDRBG_ENTROPY' =>     "entropy",
238    'KDF_PARAM_HMACDRBG_NONCE' =>       "nonce",
239    'KDF_PARAM_THREADS' =>        "threads",                # uint32_t
240    'KDF_PARAM_EARLY_CLEAN' =>    "early_clean",            # uint32_t
241    'KDF_PARAM_ARGON2_AD' =>      "ad",                     # octet string
242    'KDF_PARAM_ARGON2_LANES' =>   "lanes",                  # uint32_t
243    'KDF_PARAM_ARGON2_MEMCOST' => "memcost",                # uint32_t
244    'KDF_PARAM_ARGON2_VERSION' => "version",                # uint32_t
245    'KDF_PARAM_FIPS_EMS_CHECK' => "ems_check",              # int
246    'KDF_PARAM_FIPS_DIGEST_CHECK' => '*PKEY_PARAM_FIPS_DIGEST_CHECK',
247    'KDF_PARAM_FIPS_KEY_CHECK' => '*PKEY_PARAM_FIPS_KEY_CHECK',
248    'KDF_PARAM_FIPS_APPROVED_INDICATOR' => '*ALG_PARAM_FIPS_APPROVED_INDICATOR',
249
250# Known RAND names
251    'RAND_PARAM_STATE' =>                   "state",
252    'RAND_PARAM_STRENGTH' =>                "strength",
253    'RAND_PARAM_MAX_REQUEST' =>             "max_request",
254    'RAND_PARAM_TEST_ENTROPY' =>            "test_entropy",
255    'RAND_PARAM_TEST_NONCE' =>              "test_nonce",
256    'RAND_PARAM_GENERATE' =>                "generate",
257    'RAND_PARAM_FIPS_APPROVED_INDICATOR' => '*ALG_PARAM_FIPS_APPROVED_INDICATOR',
258
259# RAND/DRBG names
260    'DRBG_PARAM_RESEED_REQUESTS' =>         "reseed_requests",
261    'DRBG_PARAM_RESEED_TIME_INTERVAL' =>    "reseed_time_interval",
262    'DRBG_PARAM_MIN_ENTROPYLEN' =>          "min_entropylen",
263    'DRBG_PARAM_MAX_ENTROPYLEN' =>          "max_entropylen",
264    'DRBG_PARAM_MIN_NONCELEN' =>            "min_noncelen",
265    'DRBG_PARAM_MAX_NONCELEN' =>            "max_noncelen",
266    'DRBG_PARAM_MAX_PERSLEN' =>             "max_perslen",
267    'DRBG_PARAM_MAX_ADINLEN' =>             "max_adinlen",
268    'DRBG_PARAM_RESEED_COUNTER' =>          "reseed_counter",
269    'DRBG_PARAM_RESEED_TIME' =>             "reseed_time",
270    'DRBG_PARAM_PROPERTIES' =>              '*ALG_PARAM_PROPERTIES',
271    'DRBG_PARAM_DIGEST' =>                  '*ALG_PARAM_DIGEST',
272    'DRBG_PARAM_CIPHER' =>                  '*ALG_PARAM_CIPHER',
273    'DRBG_PARAM_MAC' =>                     '*ALG_PARAM_MAC',
274    'DRBG_PARAM_USE_DF' =>                  "use_derivation_function",
275    'DRBG_PARAM_FIPS_DIGEST_CHECK' =>       '*PKEY_PARAM_FIPS_DIGEST_CHECK',
276    'DRBG_PARAM_FIPS_APPROVED_INDICATOR' => '*ALG_PARAM_FIPS_APPROVED_INDICATOR',
277
278# DRBG call back parameters
279    'DRBG_PARAM_ENTROPY_REQUIRED' =>        "entropy_required",
280    'DRBG_PARAM_PREDICTION_RESISTANCE' =>   "prediction_resistance",
281    'DRBG_PARAM_MIN_LENGTH' =>              "minium_length",
282    'DRBG_PARAM_MAX_LENGTH' =>              "maxium_length",
283    'DRBG_PARAM_RANDOM_DATA' =>             "random_data",
284    'DRBG_PARAM_SIZE' =>                    "size",
285
286# PKEY parameters
287# Common PKEY parameters
288    'PKEY_PARAM_BITS' =>                "bits",# integer
289    'PKEY_PARAM_MAX_SIZE' =>            "max-size",# integer
290    'PKEY_PARAM_SECURITY_BITS' =>       "security-bits",# integer
291    'PKEY_PARAM_DIGEST' =>              '*ALG_PARAM_DIGEST',
292    'PKEY_PARAM_CIPHER' =>              '*ALG_PARAM_CIPHER', # utf8 string
293    'PKEY_PARAM_ENGINE' =>              '*ALG_PARAM_ENGINE', # utf8 string
294    'PKEY_PARAM_PROPERTIES' =>          '*ALG_PARAM_PROPERTIES',
295    'PKEY_PARAM_DEFAULT_DIGEST' =>      "default-digest",# utf8 string
296    'PKEY_PARAM_MANDATORY_DIGEST' =>    "mandatory-digest",# utf8 string
297    'PKEY_PARAM_PAD_MODE' =>            "pad-mode",
298    'PKEY_PARAM_DIGEST_SIZE' =>         "digest-size",
299    'PKEY_PARAM_MASKGENFUNC' =>         "mgf",
300    'PKEY_PARAM_MGF1_DIGEST' =>         "mgf1-digest",
301    'PKEY_PARAM_MGF1_PROPERTIES' =>     "mgf1-properties",
302    'PKEY_PARAM_ENCODED_PUBLIC_KEY' =>  "encoded-pub-key",
303    'PKEY_PARAM_GROUP_NAME' =>          "group",
304    'PKEY_PARAM_DIST_ID' =>             "distid",
305    'PKEY_PARAM_PUB_KEY' =>             "pub",
306    'PKEY_PARAM_PRIV_KEY' =>            "priv",
307    # PKEY_PARAM_IMPLICIT_REJECTION isn't actually used, or meaningful.  We keep
308    # it for API stability, but please use ASYM_CIPHER_PARAM_IMPLICIT_REJECTION
309    # instead.
310    'PKEY_PARAM_IMPLICIT_REJECTION' =>  "implicit-rejection",
311    'PKEY_PARAM_FIPS_DIGEST_CHECK' =>   "digest-check",
312    'PKEY_PARAM_FIPS_KEY_CHECK' =>      "key-check",
313    'PKEY_PARAM_ALGORITHM_ID' =>        '*ALG_PARAM_ALGORITHM_ID',
314    'PKEY_PARAM_ALGORITHM_ID_PARAMS' => '*ALG_PARAM_ALGORITHM_ID_PARAMS',
315
316# Diffie-Hellman/DSA Parameters
317    'PKEY_PARAM_FFC_P' =>               "p",
318    'PKEY_PARAM_FFC_G' =>               "g",
319    'PKEY_PARAM_FFC_Q' =>               "q",
320    'PKEY_PARAM_FFC_GINDEX' =>          "gindex",
321    'PKEY_PARAM_FFC_PCOUNTER' =>        "pcounter",
322    'PKEY_PARAM_FFC_SEED' =>            "seed",
323    'PKEY_PARAM_FFC_COFACTOR' =>        "j",
324    'PKEY_PARAM_FFC_H' =>               "hindex",
325    'PKEY_PARAM_FFC_VALIDATE_PQ' =>     "validate-pq",
326    'PKEY_PARAM_FFC_VALIDATE_G' =>      "validate-g",
327    'PKEY_PARAM_FFC_VALIDATE_LEGACY' => "validate-legacy",
328
329# Diffie-Hellman params
330    'PKEY_PARAM_DH_GENERATOR' =>        "safeprime-generator",
331    'PKEY_PARAM_DH_PRIV_LEN' =>         "priv_len",
332
333# Elliptic Curve Domain Parameters
334    'PKEY_PARAM_EC_PUB_X' =>     "qx",
335    'PKEY_PARAM_EC_PUB_Y' =>     "qy",
336
337# Elliptic Curve Explicit Domain Parameters
338    'PKEY_PARAM_EC_FIELD_TYPE' =>                   "field-type",
339    'PKEY_PARAM_EC_P' =>                            "p",
340    'PKEY_PARAM_EC_A' =>                            "a",
341    'PKEY_PARAM_EC_B' =>                            "b",
342    'PKEY_PARAM_EC_GENERATOR' =>                    "generator",
343    'PKEY_PARAM_EC_ORDER' =>                        "order",
344    'PKEY_PARAM_EC_COFACTOR' =>                     "cofactor",
345    'PKEY_PARAM_EC_SEED' =>                         "seed",
346    'PKEY_PARAM_EC_CHAR2_M' =>                      "m",
347    'PKEY_PARAM_EC_CHAR2_TYPE' =>                   "basis-type",
348    'PKEY_PARAM_EC_CHAR2_TP_BASIS' =>               "tp",
349    'PKEY_PARAM_EC_CHAR2_PP_K1' =>                  "k1",
350    'PKEY_PARAM_EC_CHAR2_PP_K2' =>                  "k2",
351    'PKEY_PARAM_EC_CHAR2_PP_K3' =>                  "k3",
352    'PKEY_PARAM_EC_DECODED_FROM_EXPLICIT_PARAMS' => "decoded-from-explicit",
353
354# Elliptic Curve Key Parameters
355    'PKEY_PARAM_USE_COFACTOR_FLAG' => "use-cofactor-flag",
356    'PKEY_PARAM_USE_COFACTOR_ECDH' => '*PKEY_PARAM_USE_COFACTOR_FLAG',
357
358# RSA Keys
359#
360# n, e, d are the usual public and private key components
361#
362# rsa-num is the number of factors, including p and q
363# rsa-factor is used for each factor: p, q, r_i (i = 3, ...)
364# rsa-exponent is used for each exponent: dP, dQ, d_i (i = 3, ...)
365# rsa-coefficient is used for each coefficient: qInv, t_i (i = 3, ...)
366#
367# The number of rsa-factor items must be equal to the number of rsa-exponent
368# items, and the number of rsa-coefficients must be one less.
369# (the base i for the coefficients is 2, not 1, at least as implied by
370# RFC 8017)
371
372    'PKEY_PARAM_RSA_N' =>           "n",
373    'PKEY_PARAM_RSA_E' =>           "e",
374    'PKEY_PARAM_RSA_D' =>           "d",
375    'PKEY_PARAM_RSA_FACTOR' =>      "rsa-factor",
376    'PKEY_PARAM_RSA_EXPONENT' =>    "rsa-exponent",
377    'PKEY_PARAM_RSA_COEFFICIENT' => "rsa-coefficient",
378    'PKEY_PARAM_RSA_FACTOR1' =>      "rsa-factor1",
379    'PKEY_PARAM_RSA_FACTOR2' =>      "rsa-factor2",
380    'PKEY_PARAM_RSA_FACTOR3' =>      "rsa-factor3",
381    'PKEY_PARAM_RSA_FACTOR4' =>      "rsa-factor4",
382    'PKEY_PARAM_RSA_FACTOR5' =>      "rsa-factor5",
383    'PKEY_PARAM_RSA_FACTOR6' =>      "rsa-factor6",
384    'PKEY_PARAM_RSA_FACTOR7' =>      "rsa-factor7",
385    'PKEY_PARAM_RSA_FACTOR8' =>      "rsa-factor8",
386    'PKEY_PARAM_RSA_FACTOR9' =>      "rsa-factor9",
387    'PKEY_PARAM_RSA_FACTOR10' =>     "rsa-factor10",
388    'PKEY_PARAM_RSA_EXPONENT1' =>    "rsa-exponent1",
389    'PKEY_PARAM_RSA_EXPONENT2' =>    "rsa-exponent2",
390    'PKEY_PARAM_RSA_EXPONENT3' =>    "rsa-exponent3",
391    'PKEY_PARAM_RSA_EXPONENT4' =>    "rsa-exponent4",
392    'PKEY_PARAM_RSA_EXPONENT5' =>    "rsa-exponent5",
393    'PKEY_PARAM_RSA_EXPONENT6' =>    "rsa-exponent6",
394    'PKEY_PARAM_RSA_EXPONENT7' =>    "rsa-exponent7",
395    'PKEY_PARAM_RSA_EXPONENT8' =>    "rsa-exponent8",
396    'PKEY_PARAM_RSA_EXPONENT9' =>    "rsa-exponent9",
397    'PKEY_PARAM_RSA_EXPONENT10' =>   "rsa-exponent10",
398    'PKEY_PARAM_RSA_COEFFICIENT1' => "rsa-coefficient1",
399    'PKEY_PARAM_RSA_COEFFICIENT2' => "rsa-coefficient2",
400    'PKEY_PARAM_RSA_COEFFICIENT3' => "rsa-coefficient3",
401    'PKEY_PARAM_RSA_COEFFICIENT4' => "rsa-coefficient4",
402    'PKEY_PARAM_RSA_COEFFICIENT5' => "rsa-coefficient5",
403    'PKEY_PARAM_RSA_COEFFICIENT6' => "rsa-coefficient6",
404    'PKEY_PARAM_RSA_COEFFICIENT7' => "rsa-coefficient7",
405    'PKEY_PARAM_RSA_COEFFICIENT8' => "rsa-coefficient8",
406    'PKEY_PARAM_RSA_COEFFICIENT9' => "rsa-coefficient9",
407
408# Key generation parameters
409    'PKEY_PARAM_RSA_BITS' =>             '*PKEY_PARAM_BITS',
410    'PKEY_PARAM_RSA_PRIMES' =>           "primes",
411    'PKEY_PARAM_RSA_DIGEST' =>           '*PKEY_PARAM_DIGEST',
412    'PKEY_PARAM_RSA_DIGEST_PROPS' =>     '*PKEY_PARAM_PROPERTIES',
413    'PKEY_PARAM_RSA_MASKGENFUNC' =>      '*PKEY_PARAM_MASKGENFUNC',
414    'PKEY_PARAM_RSA_MGF1_DIGEST' =>      '*PKEY_PARAM_MGF1_DIGEST',
415    'PKEY_PARAM_RSA_PSS_SALTLEN' =>      "saltlen",
416    'PKEY_PARAM_RSA_DERIVE_FROM_PQ'    =>     "rsa-derive-from-pq",
417
418# EC, X25519 and X448 Key generation parameters
419    'PKEY_PARAM_DHKEM_IKM' =>        "dhkem-ikm",
420
421# ML-KEM parameters
422    'PKEY_PARAM_ML_KEM_SEED' => "seed",
423    'PKEY_PARAM_ML_KEM_PREFER_SEED' => "ml-kem.prefer_seed",
424    'PKEY_PARAM_ML_KEM_RETAIN_SEED' => "ml-kem.retain_seed",
425    'PKEY_PARAM_ML_KEM_INPUT_FORMATS' => "ml-kem.input_formats",
426    'PKEY_PARAM_ML_KEM_OUTPUT_FORMATS' => "ml-kem.output_formats",
427    'PKEY_PARAM_ML_KEM_IMPORT_PCT_TYPE' => "ml-kem.import_pct_type",
428
429# Key generation parameters
430    'PKEY_PARAM_FFC_TYPE' =>         "type",
431    'PKEY_PARAM_FFC_PBITS' =>        "pbits",
432    'PKEY_PARAM_FFC_QBITS' =>        "qbits",
433    'PKEY_PARAM_FFC_DIGEST' =>       '*PKEY_PARAM_DIGEST',
434    'PKEY_PARAM_FFC_DIGEST_PROPS' => '*PKEY_PARAM_PROPERTIES',
435
436    'PKEY_PARAM_EC_ENCODING' =>                "encoding",# utf8_string
437    'PKEY_PARAM_EC_POINT_CONVERSION_FORMAT' => "point-format",
438    'PKEY_PARAM_EC_GROUP_CHECK_TYPE' =>        "group-check",
439    'PKEY_PARAM_EC_INCLUDE_PUBLIC' =>          "include-public",
440    'PKEY_PARAM_FIPS_SIGN_CHECK' =>            "sign-check",
441    'PKEY_PARAM_FIPS_APPROVED_INDICATOR' => '*ALG_PARAM_FIPS_APPROVED_INDICATOR',
442
443# ML_DSA Key generation parameter
444    'PKEY_PARAM_ML_DSA_SEED' =>             "seed",
445    'PKEY_PARAM_ML_DSA_RETAIN_SEED' =>      "ml-dsa.retain_seed",
446    'PKEY_PARAM_ML_DSA_PREFER_SEED' =>      "ml-dsa.prefer_seed",
447    'PKEY_PARAM_ML_DSA_INPUT_FORMATS' =>    "ml-dsa.input_formats",
448    'PKEY_PARAM_ML_DSA_OUTPUT_FORMATS' =>   "ml-dsa.output_formats",
449
450# SLH_DSA Key generation parameters
451    'PKEY_PARAM_SLH_DSA_SEED' =>              "seed",
452
453# Key Exchange parameters
454    'EXCHANGE_PARAM_PAD' =>                   "pad",# uint
455    'EXCHANGE_PARAM_EC_ECDH_COFACTOR_MODE' => "ecdh-cofactor-mode",# int
456    'EXCHANGE_PARAM_KDF_TYPE' =>              "kdf-type",# utf8_string
457    'EXCHANGE_PARAM_KDF_DIGEST' =>            "kdf-digest",# utf8_string
458    'EXCHANGE_PARAM_KDF_DIGEST_PROPS' =>      "kdf-digest-props",# utf8_string
459    'EXCHANGE_PARAM_KDF_OUTLEN' =>            "kdf-outlen",# size_t
460# The following parameter is an octet_string on set and an octet_ptr on get
461    'EXCHANGE_PARAM_KDF_UKM' =>               "kdf-ukm",
462    'EXCHANGE_PARAM_FIPS_DIGEST_CHECK' =>     '*PKEY_PARAM_FIPS_DIGEST_CHECK',
463    'EXCHANGE_PARAM_FIPS_KEY_CHECK' =>        '*PKEY_PARAM_FIPS_KEY_CHECK',
464    'EXCHANGE_PARAM_FIPS_ECDH_COFACTOR_CHECK' => '*PROV_PARAM_ECDH_COFACTOR_CHECK',
465    'EXCHANGE_PARAM_FIPS_APPROVED_INDICATOR' => '*ALG_PARAM_FIPS_APPROVED_INDICATOR',
466
467# Signature parameters
468    'SIGNATURE_PARAM_ALGORITHM_ID' =>         '*PKEY_PARAM_ALGORITHM_ID',
469    'SIGNATURE_PARAM_ALGORITHM_ID_PARAMS' =>  '*PKEY_PARAM_ALGORITHM_ID_PARAMS',
470    'SIGNATURE_PARAM_PAD_MODE' =>             '*PKEY_PARAM_PAD_MODE',
471    'SIGNATURE_PARAM_DIGEST' =>               '*PKEY_PARAM_DIGEST',
472    'SIGNATURE_PARAM_PROPERTIES' =>           '*PKEY_PARAM_PROPERTIES',
473    'SIGNATURE_PARAM_PSS_SALTLEN' =>          "saltlen",
474    'SIGNATURE_PARAM_MGF1_DIGEST' =>          '*PKEY_PARAM_MGF1_DIGEST',
475    'SIGNATURE_PARAM_MGF1_PROPERTIES' =>      '*PKEY_PARAM_MGF1_PROPERTIES',
476    'SIGNATURE_PARAM_DIGEST_SIZE' =>          '*PKEY_PARAM_DIGEST_SIZE',
477    'SIGNATURE_PARAM_NONCE_TYPE' =>           "nonce-type",
478    'SIGNATURE_PARAM_INSTANCE' =>             "instance",
479    'SIGNATURE_PARAM_CONTEXT_STRING' =>       "context-string",
480    'SIGNATURE_PARAM_FIPS_DIGEST_CHECK' =>    '*PKEY_PARAM_FIPS_DIGEST_CHECK',
481    'SIGNATURE_PARAM_FIPS_VERIFY_MESSAGE' =>  'verify-message',
482    'SIGNATURE_PARAM_FIPS_KEY_CHECK' =>       '*PKEY_PARAM_FIPS_KEY_CHECK',
483    'SIGNATURE_PARAM_FIPS_SIGN_CHECK' =>      '*PKEY_PARAM_FIPS_SIGN_CHECK',
484    'SIGNATURE_PARAM_FIPS_RSA_PSS_SALTLEN_CHECK' => "rsa-pss-saltlen-check",
485    'SIGNATURE_PARAM_FIPS_SIGN_X931_PAD_CHECK' => "sign-x931-pad-check",
486    'SIGNATURE_PARAM_FIPS_APPROVED_INDICATOR' => '*ALG_PARAM_FIPS_APPROVED_INDICATOR',
487    'SIGNATURE_PARAM_SIGNATURE' =>          "signature",
488    'SIGNATURE_PARAM_MESSAGE_ENCODING' =>   "message-encoding",
489    'SIGNATURE_PARAM_DETERMINISTIC' =>      "deterministic",
490    'SIGNATURE_PARAM_MU' =>                 "mu", # int
491    'SIGNATURE_PARAM_TEST_ENTROPY' =>       "test-entropy",
492    'SIGNATURE_PARAM_ADD_RANDOM' =>         "additional-random",
493
494# Asym cipher parameters
495    'ASYM_CIPHER_PARAM_DIGEST' =>                   '*PKEY_PARAM_DIGEST',
496    'ASYM_CIPHER_PARAM_PROPERTIES' =>               '*PKEY_PARAM_PROPERTIES',
497    'ASYM_CIPHER_PARAM_ENGINE' =>                   '*PKEY_PARAM_ENGINE',
498    'ASYM_CIPHER_PARAM_PAD_MODE' =>                 '*PKEY_PARAM_PAD_MODE',
499    'ASYM_CIPHER_PARAM_MGF1_DIGEST' =>              '*PKEY_PARAM_MGF1_DIGEST',
500    'ASYM_CIPHER_PARAM_MGF1_DIGEST_PROPS' =>        '*PKEY_PARAM_MGF1_PROPERTIES',
501    'ASYM_CIPHER_PARAM_OAEP_DIGEST' =>              '*ALG_PARAM_DIGEST',
502    'ASYM_CIPHER_PARAM_OAEP_DIGEST_PROPS' =>        "digest-props",
503# The following parameter is an octet_string on set and an octet_ptr on get
504    'ASYM_CIPHER_PARAM_OAEP_LABEL' =>               "oaep-label",
505    'ASYM_CIPHER_PARAM_TLS_CLIENT_VERSION' =>       "tls-client-version",
506    'ASYM_CIPHER_PARAM_TLS_NEGOTIATED_VERSION' =>   "tls-negotiated-version",
507    'ASYM_CIPHER_PARAM_IMPLICIT_REJECTION' =>       "implicit-rejection",
508    'ASYM_CIPHER_PARAM_FIPS_RSA_PKCS15_PAD_DISABLED' => '*PROV_PARAM_RSA_PKCS15_PAD_DISABLED',
509    'ASYM_CIPHER_PARAM_FIPS_KEY_CHECK' =>           '*PKEY_PARAM_FIPS_KEY_CHECK',
510    'ASYM_CIPHER_PARAM_FIPS_APPROVED_INDICATOR' =>  '*ALG_PARAM_FIPS_APPROVED_INDICATOR',
511
512# Encoder / decoder parameters
513
514    'ENCODER_PARAM_CIPHER' =>           '*ALG_PARAM_CIPHER',
515    'ENCODER_PARAM_PROPERTIES' =>       '*ALG_PARAM_PROPERTIES',
516# Currently PVK only, but reusable for others as needed
517    'ENCODER_PARAM_ENCRYPT_LEVEL' =>    "encrypt-level",
518    'ENCODER_PARAM_SAVE_PARAMETERS' =>  "save-parameters",# integer
519
520    'DECODER_PARAM_PROPERTIES' =>       '*ALG_PARAM_PROPERTIES',
521
522# Passphrase callback parameters
523    'PASSPHRASE_PARAM_INFO' =>          "info",
524
525# Keygen callback parameters, from provider to libcrypto
526    'GEN_PARAM_POTENTIAL' =>            "potential",# integer
527    'GEN_PARAM_ITERATION' =>            "iteration",# integer
528
529# ACVP Test parameters : These should not be used normally
530    'PKEY_PARAM_RSA_TEST_XP1' => "xp1",
531    'PKEY_PARAM_RSA_TEST_XP2' => "xp2",
532    'PKEY_PARAM_RSA_TEST_XP' =>  "xp",
533    'PKEY_PARAM_RSA_TEST_XQ1' => "xq1",
534    'PKEY_PARAM_RSA_TEST_XQ2' => "xq2",
535    'PKEY_PARAM_RSA_TEST_XQ' =>  "xq",
536    'PKEY_PARAM_RSA_TEST_P1' =>  "p1",
537    'PKEY_PARAM_RSA_TEST_P2' =>  "p2",
538    'PKEY_PARAM_RSA_TEST_Q1' =>  "q1",
539    'PKEY_PARAM_RSA_TEST_Q2' =>  "q2",
540    'SIGNATURE_PARAM_KAT' =>     "kat",
541
542# KEM parameters
543    'KEM_PARAM_OPERATION' =>            "operation",
544    'KEM_PARAM_IKME' =>                 "ikme",
545    'KEM_PARAM_FIPS_KEY_CHECK' =>       '*PKEY_PARAM_FIPS_KEY_CHECK',
546    'KEM_PARAM_FIPS_APPROVED_INDICATOR' => '*ALG_PARAM_FIPS_APPROVED_INDICATOR',
547
548# Capabilities
549
550# TLS-GROUP Capability
551    'CAPABILITY_TLS_GROUP_NAME' =>              "tls-group-name",
552    'CAPABILITY_TLS_GROUP_NAME_INTERNAL' =>     "tls-group-name-internal",
553    'CAPABILITY_TLS_GROUP_ID' =>                "tls-group-id",
554    'CAPABILITY_TLS_GROUP_ALG' =>               "tls-group-alg",
555    'CAPABILITY_TLS_GROUP_SECURITY_BITS' =>     "tls-group-sec-bits",
556    'CAPABILITY_TLS_GROUP_IS_KEM' =>            "tls-group-is-kem",
557    'CAPABILITY_TLS_GROUP_MIN_TLS' =>           "tls-min-tls",
558    'CAPABILITY_TLS_GROUP_MAX_TLS' =>           "tls-max-tls",
559    'CAPABILITY_TLS_GROUP_MIN_DTLS' =>          "tls-min-dtls",
560    'CAPABILITY_TLS_GROUP_MAX_DTLS' =>          "tls-max-dtls",
561
562# TLS-SIGALG Capability
563    'CAPABILITY_TLS_SIGALG_IANA_NAME' =>         "tls-sigalg-iana-name",
564    'CAPABILITY_TLS_SIGALG_CODE_POINT' =>        "tls-sigalg-code-point",
565    'CAPABILITY_TLS_SIGALG_NAME' =>              "tls-sigalg-name",
566    'CAPABILITY_TLS_SIGALG_OID' =>               "tls-sigalg-oid",
567    'CAPABILITY_TLS_SIGALG_SIG_NAME' =>          "tls-sigalg-sig-name",
568    'CAPABILITY_TLS_SIGALG_SIG_OID' =>           "tls-sigalg-sig-oid",
569    'CAPABILITY_TLS_SIGALG_HASH_NAME' =>         "tls-sigalg-hash-name",
570    'CAPABILITY_TLS_SIGALG_HASH_OID' =>          "tls-sigalg-hash-oid",
571    'CAPABILITY_TLS_SIGALG_KEYTYPE' =>           "tls-sigalg-keytype",
572    'CAPABILITY_TLS_SIGALG_KEYTYPE_OID' =>       "tls-sigalg-keytype-oid",
573    'CAPABILITY_TLS_SIGALG_SECURITY_BITS' =>     "tls-sigalg-sec-bits",
574    'CAPABILITY_TLS_SIGALG_MIN_TLS' =>           "tls-min-tls",
575    'CAPABILITY_TLS_SIGALG_MAX_TLS' =>           "tls-max-tls",
576    'CAPABILITY_TLS_SIGALG_MIN_DTLS' =>          "tls-min-dtls",
577    'CAPABILITY_TLS_SIGALG_MAX_DTLS' =>          "tls-max-dtls",
578
579# storemgmt parameters
580
581
582# Used by storemgmt_ctx_set_params():
583#
584# - STORE_PARAM_EXPECT is an INTEGER, and the value is any of the
585#   STORE_INFO numbers.  This is used to set the expected type of
586#   object loaded.
587#
588# - STORE_PARAM_SUBJECT, STORE_PARAM_ISSUER,
589#   STORE_PARAM_SERIAL, STORE_PARAM_FINGERPRINT,
590#   STORE_PARAM_DIGEST, STORE_PARAM_ALIAS
591#   are used as search criteria.
592#   (STORE_PARAM_DIGEST is used with STORE_PARAM_FINGERPRINT)
593
594    'STORE_PARAM_EXPECT' =>     "expect",       # INTEGER
595    'STORE_PARAM_SUBJECT' =>    "subject",      # DER blob => OCTET_STRING
596    'STORE_PARAM_ISSUER' =>     "name",         # DER blob => OCTET_STRING
597    'STORE_PARAM_SERIAL' =>     "serial",       # INTEGER
598    'STORE_PARAM_DIGEST' =>     "digest",       # UTF8_STRING
599    'STORE_PARAM_FINGERPRINT' => "fingerprint", # OCTET_STRING
600    'STORE_PARAM_ALIAS' =>      "alias",        # UTF8_STRING
601
602# You may want to pass properties for the provider implementation to use
603    'STORE_PARAM_PROPERTIES' => "properties",   # utf8_string
604# DECODER input type if a decoder is used by the store
605    'STORE_PARAM_INPUT_TYPE' => "input-type",   # UTF8_STRING
606
607
608# Libssl record layer
609    'LIBSSL_RECORD_LAYER_PARAM_OPTIONS' =>        "options",
610    'LIBSSL_RECORD_LAYER_PARAM_MODE' =>           "mode",
611    'LIBSSL_RECORD_LAYER_PARAM_READ_AHEAD' =>     "read_ahead",
612    'LIBSSL_RECORD_LAYER_READ_BUFFER_LEN' =>      "read_buffer_len",
613    'LIBSSL_RECORD_LAYER_PARAM_USE_ETM' =>        "use_etm",
614    'LIBSSL_RECORD_LAYER_PARAM_STREAM_MAC' =>     "stream_mac",
615    'LIBSSL_RECORD_LAYER_PARAM_TLSTREE' =>        "tlstree",
616    'LIBSSL_RECORD_LAYER_PARAM_MAX_FRAG_LEN' =>   "max_frag_len",
617    'LIBSSL_RECORD_LAYER_PARAM_MAX_EARLY_DATA' => "max_early_data",
618    'LIBSSL_RECORD_LAYER_PARAM_BLOCK_PADDING' =>  "block_padding",
619    'LIBSSL_RECORD_LAYER_PARAM_HS_PADDING' =>     "hs_padding",
620
621# Symmetric Key parametes
622    'SKEY_PARAM_RAW_BYTES' => "raw-bytes",
623    'SKEY_PARAM_KEY_LENGTH' => "key-length",
624);
625
626# Generate string based macros for public consumption
627sub generate_public_macros {
628    my @macros = ();
629
630    foreach my $name (keys %params) {
631        my $val = $params{$name};
632        my $def = '# define OSSL_' . $name . ' ';
633
634        if (substr($val, 0, 1) eq '*') {
635            $def .= 'OSSL_' . substr($val, 1);
636        } else {
637            $def .= '"' . $val . '"';
638        }
639        push(@macros, $def)
640    }
641    return join("\n", sort @macros);
642}
643
644# Generate number based macros for internal use
645# The numbers are unique per string
646sub generate_internal_macros {
647    my @macros = ();
648    my $count = 0;
649    my %reverse;
650
651    # Determine the number for each unique string
652    # Sort the names to improve the chance of cache coherency
653    foreach my $name (sort keys %params) {
654        my $val = $params{$name};
655
656        if (substr($val, 0, 1) ne '*' and not defined $reverse{$val}) {
657            $reverse{$val} = $count++;
658        }
659    }
660
661    # Output the defines
662    foreach my $name (keys %params) {
663        my $val = $params{$name};
664        my $def = '#define PIDX_' . $name . ' ';
665
666        if (substr($val, 0, 1) eq '*') {
667            $def .= 'PIDX_' . substr($val, 1);
668        } else {
669            $def .= $reverse{$val};
670        }
671        push(@macros, $def)
672    }
673    return "#define NUM_PIDX $count\n\n" . join("\n", sort @macros);
674}
675
676sub generate_trie {
677    my %trie;
678    my $nodes = 0;
679    my $chars = 0;
680
681    foreach my $name (sort keys %params) {
682        my $val = $params{$name};
683        if (substr($val, 0, 1) ne '*') {
684            my $cursor = \%trie;
685
686            $chars += length($val);
687            for my $i (0 .. length($val) - 1) {
688                my $c = substr($val, $i, 1);
689
690                if (not $case_sensitive) {
691                    $c = '_' if $c eq '-';
692                    $c = lc $c;
693                }
694
695                if (not defined $$cursor{$c}) {
696                    $cursor->{$c} = {};
697                    $nodes++;
698                }
699                $cursor = $cursor->{$c};
700            }
701            $cursor->{'val'} = $name;
702        }
703    }
704    #print "\n\n/* $nodes nodes for $chars letters*/\n\n";
705    return %trie;
706}
707
708sub generate_code_from_trie {
709    my $n = shift;
710    my $trieref = shift;
711    my $idt = "    ";
712    my $indent0 = $idt x ($n + 1);
713    my $indent1 = $indent0 . $idt;
714    my $strcmp = $case_sensitive ? 'strcmp' : 'strcasecmp';
715
716    print "int ossl_param_find_pidx(const char *s)\n{\n" if $n == 0;
717
718    if ($trieref->{'suffix'}) {
719        my $suf = $trieref->{'suffix'};
720
721        printf "%sif ($strcmp(\"$suf\", s + $n) == 0", $indent0;
722        if (not $case_sensitive) {
723            $suf =~ tr/_/-/;
724            print " || $strcmp(\"$suf\", s + $n) == 0"
725                if ($suf ne $trieref->{'suffix'});
726        }
727        printf ")\n%sreturn PIDX_%s;\n", $indent1, $trieref->{'name'};
728        #printf "%sbreak;\n", $indent0;
729        return;
730    }
731
732    printf "%sswitch(s\[%d\]) {\n", $indent0, $n;
733    printf "%sdefault:\n", $indent0;
734    for my $l (sort keys %$trieref) {
735        if ($l eq 'val') {
736            printf "%sbreak;\n", $indent1;
737            printf "%scase '\\0':\n", $indent0;
738            printf "%sreturn PIDX_%s;\n", $indent1, $trieref->{'val'};
739        } else {
740            printf "%sbreak;\n", $indent1;
741            printf "%scase '%s':", $indent0, $l;
742            if (not $case_sensitive) {
743                print "   case '-':" if ($l eq '_');
744                printf "   case '%s':", uc $l if ($l =~ /[a-z]/);
745            }
746            print "\n";
747            generate_code_from_trie($n + 1, $trieref->{$l});
748        }
749    }
750    printf "%s}\n", $indent0;
751    print "    return -1;\n}\n" if $n == 0;
752    return "";
753}
754
755# Find long endings and cache what they resolve to
756sub locate_long_endings {
757    my $trieref = shift;
758    my @names = keys %$trieref;
759    my $num = @names;
760
761    return (1, '', $trieref->{$names[0]}) if ($num == 1 and $names[0] eq 'val');
762
763    if ($num == 1) {
764        my ($res, $suffix, $name) = locate_long_endings($trieref->{$names[0]});
765        my $e = $names[0] . $suffix;
766        if ($res) {
767            $trieref->{'suffix'} = $e;
768            $trieref->{'name'} = $name;
769        }
770        return $res, $e, $name;
771    }
772
773    for my $l (@names) {
774        if ($l ne 'val') {
775            my ($res, $suffix, $name) = locate_long_endings($trieref->{$l});
776        }
777    }
778    return 0, '';
779}
780
781sub produce_decoder {
782    my %t = generate_trie();
783    my $s;
784
785    locate_long_endings(\%t);
786
787    open local *STDOUT, '>', \$s;
788    generate_code_from_trie(0, \%t);
789    return $s;
790}
791