]> git.ipfire.org Git - thirdparty/openssl.git/blame - crypto/params.c
Added ability to pass additional ASFLAGS to Configure
[thirdparty/openssl.git] / crypto / params.c
CommitLineData
7ffbd7ca 1/*
fecb3aae 2 * Copyright 2019-2022 The OpenSSL Project Authors. All Rights Reserved.
7ffbd7ca
P
3 * Copyright (c) 2019, Oracle and/or its affiliates. All rights reserved.
4 *
5 * Licensed under the Apache License 2.0 (the "License"). You may not use
6 * this file except in compliance with the License. You can obtain a copy
7 * in the file LICENSE in the source distribution or at
8 * https://www.openssl.org/source/license.html
9 */
10
11#include <string.h>
12#include <openssl/params.h>
ac1082f0 13#include <openssl/err.h>
7ffbd7ca 14#include "internal/thread_once.h"
c04a9916 15#include "internal/numbers.h"
e9c5e642 16#include "internal/endian.h"
7ffbd7ca 17
ac1082f0
P
18/* Shortcuts for raising errors that are widely used */
19#define err_unsigned_negative \
20 ERR_raise(ERR_LIB_CRYPTO, \
21 CRYPTO_R_PARAM_UNSIGNED_INTEGER_NEGATIVE_VALUE_UNSUPPORTED)
22#define err_out_of_range \
23 ERR_raise(ERR_LIB_CRYPTO, \
24 CRYPTO_R_PARAM_VALUE_TOO_LARGE_FOR_DESTINATION)
25#define err_inexact \
26 ERR_raise(ERR_LIB_CRYPTO, \
27 CRYPTO_R_PARAM_CANNOT_BE_REPRESENTED_EXACTLY)
28#define err_not_integer \
29 ERR_raise(ERR_LIB_CRYPTO, CRYPTO_R_PARAM_NOT_INTEGER_TYPE)
30#define err_too_small \
31 ERR_raise(ERR_LIB_CRYPTO, CRYPTO_R_TOO_SMALL_BUFFER)
32#define err_bad_type \
33 ERR_raise(ERR_LIB_CRYPTO, CRYPTO_R_PARAM_OF_INCOMPATIBLE_TYPE)
34#define err_null_argument \
35 ERR_raise(ERR_LIB_CRYPTO, ERR_R_PASSED_NULL_PARAMETER)
36#define err_unsupported_real \
37 ERR_raise(ERR_LIB_CRYPTO, CRYPTO_R_PARAM_UNSUPPORTED_FLOATING_POINT_FORMAT)
38
5b1d94c1
P
39/*
40 * Return the number of bits in the mantissa of a double. This is used to
41 * shift a larger integral value to determine if it will exactly fit into a
42 * double.
43 */
44static unsigned int real_shift(void)
45{
46 return sizeof(double) == 4 ? 24 : 53;
47}
48
4e7991b4 49OSSL_PARAM *OSSL_PARAM_locate(OSSL_PARAM *p, const char *key)
7ffbd7ca
P
50{
51 if (p != NULL && key != NULL)
52 for (; p->key != NULL; p++)
53 if (strcmp(key, p->key) == 0)
54 return p;
55 return NULL;
56}
57
4e7991b4
P
58const OSSL_PARAM *OSSL_PARAM_locate_const(const OSSL_PARAM *p, const char *key)
59{
60 return OSSL_PARAM_locate((OSSL_PARAM *)p, key);
61}
62
7ffbd7ca 63static OSSL_PARAM ossl_param_construct(const char *key, unsigned int data_type,
4e7991b4 64 void *data, size_t data_size)
7ffbd7ca
P
65{
66 OSSL_PARAM res;
67
68 res.key = key;
69 res.data_type = data_type;
70 res.data = data;
71 res.data_size = data_size;
8d5fb648 72 res.return_size = OSSL_PARAM_UNMODIFIED;
7ffbd7ca
P
73 return res;
74}
75
8d5fb648
P
76int OSSL_PARAM_modified(const OSSL_PARAM *p)
77{
78 return p != NULL && p->return_size != OSSL_PARAM_UNMODIFIED;
79}
80
3873887e 81void OSSL_PARAM_set_all_unmodified(OSSL_PARAM *p)
8d5fb648
P
82{
83 if (p != NULL)
3873887e
P
84 while (p->key != NULL)
85 p++->return_size = OSSL_PARAM_UNMODIFIED;
8d5fb648
P
86}
87
e9c5e642
P
88/* Return non-zero if the signed number is negative */
89static int is_negative(const void *number, size_t s)
90{
91 const unsigned char *n = number;
92 DECLARE_IS_ENDIAN;
93
94 return 0x80 & (IS_BIG_ENDIAN ? n[0] : n[s - 1]);
95}
96
97/* Check that all the bytes specified match the expected sign byte */
98static int check_sign_bytes(const unsigned char *p, size_t n, unsigned char s)
99{
100 size_t i;
101
102 for (i = 0; i < n; i++)
103 if (p[i] != s)
104 return 0;
105 return 1;
106}
107
108/*
109 * Copy an integer to another integer.
110 * Handle different length integers and signed and unsigned integers.
111 * Both integers are in native byte ordering.
112 */
113static int copy_integer(unsigned char *dest, size_t dest_len,
114 const unsigned char *src, size_t src_len,
115 unsigned char pad, int signed_int)
116{
117 size_t n;
118 DECLARE_IS_ENDIAN;
119
120 if (IS_BIG_ENDIAN) {
121 if (src_len < dest_len) {
122 n = dest_len - src_len;
123 memset(dest, pad, n);
124 memcpy(dest + n, src, src_len);
125 } else {
126 n = src_len - dest_len;
127 if (!check_sign_bytes(src, n, pad)
128 /*
129 * Shortening a signed value must retain the correct sign.
130 * Avoiding this kind of thing: -253 = 0xff03 -> 0x03 = 3
131 */
ac1082f0
P
132 || (signed_int && ((pad ^ src[n]) & 0x80) != 0)) {
133 err_out_of_range;
e9c5e642 134 return 0;
ac1082f0 135 }
e9c5e642
P
136 memcpy(dest, src + n, dest_len);
137 }
138 } else /* IS_LITTLE_ENDIAN */ {
139 if (src_len < dest_len) {
140 n = dest_len - src_len;
141 memset(dest + src_len, pad, n);
142 memcpy(dest, src, src_len);
143 } else {
144 n = src_len - dest_len;
145 if (!check_sign_bytes(src + dest_len, n, pad)
146 /*
147 * Shortening a signed value must retain the correct sign.
148 * Avoiding this kind of thing: 130 = 0x0082 -> 0x82 = -126
149 */
ac1082f0
P
150 || (signed_int && ((pad ^ src[dest_len - 1]) & 0x80) != 0)) {
151 err_out_of_range;
e9c5e642 152 return 0;
ac1082f0 153 }
e9c5e642
P
154 memcpy(dest, src, dest_len);
155 }
156 }
157 return 1;
158}
159
160/* Copy a signed number to a signed number of possibly different length */
161static int signed_from_signed(void *dest, size_t dest_len,
162 const void *src, size_t src_len)
163{
164 return copy_integer(dest, dest_len, src, src_len,
165 is_negative(src, src_len) ? 0xff : 0, 1);
166}
167
168/* Copy an unsigned number to a signed number of possibly different length */
169static int signed_from_unsigned(void *dest, size_t dest_len,
170 const void *src, size_t src_len)
171{
172 return copy_integer(dest, dest_len, src, src_len, 0, 1);
173}
174
175/* Copy a signed number to an unsigned number of possibly different length */
176static int unsigned_from_signed(void *dest, size_t dest_len,
177 const void *src, size_t src_len)
178{
ac1082f0
P
179 if (is_negative(src, src_len)) {
180 err_unsigned_negative;
e9c5e642 181 return 0;
ac1082f0 182 }
e9c5e642
P
183 return copy_integer(dest, dest_len, src, src_len, 0, 0);
184}
185
186/* Copy an unsigned number to an unsigned number of possibly different length */
187static int unsigned_from_unsigned(void *dest, size_t dest_len,
188 const void *src, size_t src_len)
189{
190 return copy_integer(dest, dest_len, src, src_len, 0, 0);
191}
192
193/* General purpose get integer parameter call that handles odd sizes */
194static int general_get_int(const OSSL_PARAM *p, void *val, size_t val_size)
195{
196 if (p->data_type == OSSL_PARAM_INTEGER)
197 return signed_from_signed(val, val_size, p->data, p->data_size);
198 if (p->data_type == OSSL_PARAM_UNSIGNED_INTEGER)
199 return signed_from_unsigned(val, val_size, p->data, p->data_size);
ac1082f0 200 err_not_integer;
e9c5e642
P
201 return 0;
202}
203
204/* General purpose set integer parameter call that handles odd sizes */
205static int general_set_int(OSSL_PARAM *p, void *val, size_t val_size)
206{
207 int r = 0;
208
209 p->return_size = val_size; /* Expected size */
210 if (p->data == NULL)
211 return 1;
212 if (p->data_type == OSSL_PARAM_INTEGER)
213 r = signed_from_signed(p->data, p->data_size, val, val_size);
214 else if (p->data_type == OSSL_PARAM_UNSIGNED_INTEGER)
215 r = unsigned_from_signed(p->data, p->data_size, val, val_size);
ac1082f0
P
216 else
217 err_not_integer;
e9c5e642
P
218 p->return_size = r ? p->data_size : val_size;
219 return r;
220}
221
222/* General purpose get unsigned integer parameter call that handles odd sizes */
223static int general_get_uint(const OSSL_PARAM *p, void *val, size_t val_size)
224{
225 if (p->data_type == OSSL_PARAM_INTEGER)
226 return unsigned_from_signed(val, val_size, p->data, p->data_size);
227 if (p->data_type == OSSL_PARAM_UNSIGNED_INTEGER)
228 return unsigned_from_unsigned(val, val_size, p->data, p->data_size);
ac1082f0 229 err_not_integer;
e9c5e642
P
230 return 0;
231}
232
233/* General purpose set unsigned integer parameter call that handles odd sizes */
234static int general_set_uint(OSSL_PARAM *p, void *val, size_t val_size)
235{
236 int r = 0;
237
238 p->return_size = val_size; /* Expected size */
239 if (p->data == NULL)
240 return 1;
241 if (p->data_type == OSSL_PARAM_INTEGER)
242 r = signed_from_unsigned(p->data, p->data_size, val, val_size);
243 else if (p->data_type == OSSL_PARAM_UNSIGNED_INTEGER)
244 r = unsigned_from_unsigned(p->data, p->data_size, val, val_size);
ac1082f0
P
245 else
246 err_not_integer;
e9c5e642
P
247 p->return_size = r ? p->data_size : val_size;
248 return r;
249}
250
7ffbd7ca
P
251int OSSL_PARAM_get_int(const OSSL_PARAM *p, int *val)
252{
e9c5e642 253#ifndef OPENSSL_SMALL_FOOTPRINT
863360fb 254 switch (sizeof(int)) {
7ffbd7ca 255 case sizeof(int32_t):
863360fb 256 return OSSL_PARAM_get_int32(p, (int32_t *)val);
7ffbd7ca 257 case sizeof(int64_t):
863360fb 258 return OSSL_PARAM_get_int64(p, (int64_t *)val);
7ffbd7ca 259 }
e9c5e642
P
260#endif
261 return general_get_int(p, val, sizeof(*val));
7ffbd7ca
P
262}
263
4e7991b4 264int OSSL_PARAM_set_int(OSSL_PARAM *p, int val)
7ffbd7ca 265{
e9c5e642 266#ifndef OPENSSL_SMALL_FOOTPRINT
863360fb 267 switch (sizeof(int)) {
7ffbd7ca 268 case sizeof(int32_t):
863360fb 269 return OSSL_PARAM_set_int32(p, (int32_t)val);
7ffbd7ca 270 case sizeof(int64_t):
863360fb 271 return OSSL_PARAM_set_int64(p, (int64_t)val);
7ffbd7ca 272 }
e9c5e642
P
273#endif
274 return general_set_int(p, &val, sizeof(val));
7ffbd7ca
P
275}
276
4e7991b4 277OSSL_PARAM OSSL_PARAM_construct_int(const char *key, int *buf)
7ffbd7ca 278{
4e7991b4 279 return ossl_param_construct(key, OSSL_PARAM_INTEGER, buf, sizeof(int));
7ffbd7ca
P
280}
281
282int OSSL_PARAM_get_uint(const OSSL_PARAM *p, unsigned int *val)
283{
e9c5e642 284#ifndef OPENSSL_SMALL_FOOTPRINT
863360fb 285 switch (sizeof(unsigned int)) {
7ffbd7ca 286 case sizeof(uint32_t):
863360fb 287 return OSSL_PARAM_get_uint32(p, (uint32_t *)val);
7ffbd7ca 288 case sizeof(uint64_t):
863360fb 289 return OSSL_PARAM_get_uint64(p, (uint64_t *)val);
7ffbd7ca 290 }
e9c5e642
P
291#endif
292 return general_get_uint(p, val, sizeof(*val));
7ffbd7ca
P
293}
294
4e7991b4 295int OSSL_PARAM_set_uint(OSSL_PARAM *p, unsigned int val)
7ffbd7ca 296{
e9c5e642 297#ifndef OPENSSL_SMALL_FOOTPRINT
863360fb 298 switch (sizeof(unsigned int)) {
7ffbd7ca 299 case sizeof(uint32_t):
863360fb 300 return OSSL_PARAM_set_uint32(p, (uint32_t)val);
7ffbd7ca 301 case sizeof(uint64_t):
863360fb 302 return OSSL_PARAM_set_uint64(p, (uint64_t)val);
7ffbd7ca 303 }
e9c5e642
P
304#endif
305 return general_set_uint(p, &val, sizeof(val));
7ffbd7ca
P
306}
307
4e7991b4 308OSSL_PARAM OSSL_PARAM_construct_uint(const char *key, unsigned int *buf)
7ffbd7ca
P
309{
310 return ossl_param_construct(key, OSSL_PARAM_UNSIGNED_INTEGER, buf,
4e7991b4 311 sizeof(unsigned int));
7ffbd7ca
P
312}
313
314int OSSL_PARAM_get_long(const OSSL_PARAM *p, long int *val)
315{
e9c5e642 316#ifndef OPENSSL_SMALL_FOOTPRINT
863360fb 317 switch (sizeof(long int)) {
7ffbd7ca 318 case sizeof(int32_t):
863360fb 319 return OSSL_PARAM_get_int32(p, (int32_t *)val);
7ffbd7ca 320 case sizeof(int64_t):
863360fb 321 return OSSL_PARAM_get_int64(p, (int64_t *)val);
7ffbd7ca 322 }
e9c5e642
P
323#endif
324 return general_get_int(p, val, sizeof(*val));
7ffbd7ca
P
325}
326
4e7991b4 327int OSSL_PARAM_set_long(OSSL_PARAM *p, long int val)
7ffbd7ca 328{
e9c5e642 329#ifndef OPENSSL_SMALL_FOOTPRINT
863360fb 330 switch (sizeof(long int)) {
7ffbd7ca 331 case sizeof(int32_t):
863360fb 332 return OSSL_PARAM_set_int32(p, (int32_t)val);
7ffbd7ca 333 case sizeof(int64_t):
863360fb 334 return OSSL_PARAM_set_int64(p, (int64_t)val);
7ffbd7ca 335 }
e9c5e642
P
336#endif
337 return general_set_int(p, &val, sizeof(val));
7ffbd7ca
P
338}
339
4e7991b4 340OSSL_PARAM OSSL_PARAM_construct_long(const char *key, long int *buf)
7ffbd7ca 341{
4e7991b4 342 return ossl_param_construct(key, OSSL_PARAM_INTEGER, buf, sizeof(long int));
7ffbd7ca
P
343}
344
345int OSSL_PARAM_get_ulong(const OSSL_PARAM *p, unsigned long int *val)
346{
e9c5e642 347#ifndef OPENSSL_SMALL_FOOTPRINT
863360fb 348 switch (sizeof(unsigned long int)) {
7ffbd7ca 349 case sizeof(uint32_t):
863360fb 350 return OSSL_PARAM_get_uint32(p, (uint32_t *)val);
7ffbd7ca 351 case sizeof(uint64_t):
863360fb 352 return OSSL_PARAM_get_uint64(p, (uint64_t *)val);
7ffbd7ca 353 }
e9c5e642
P
354#endif
355 return general_get_uint(p, val, sizeof(*val));
7ffbd7ca
P
356}
357
4e7991b4 358int OSSL_PARAM_set_ulong(OSSL_PARAM *p, unsigned long int val)
7ffbd7ca 359{
e9c5e642 360#ifndef OPENSSL_SMALL_FOOTPRINT
863360fb 361 switch (sizeof(unsigned long int)) {
7ffbd7ca 362 case sizeof(uint32_t):
863360fb 363 return OSSL_PARAM_set_uint32(p, (uint32_t)val);
7ffbd7ca 364 case sizeof(uint64_t):
863360fb 365 return OSSL_PARAM_set_uint64(p, (uint64_t)val);
7ffbd7ca 366 }
e9c5e642
P
367#endif
368 return general_set_uint(p, &val, sizeof(val));
7ffbd7ca
P
369}
370
4e7991b4 371OSSL_PARAM OSSL_PARAM_construct_ulong(const char *key, unsigned long int *buf)
7ffbd7ca
P
372{
373 return ossl_param_construct(key, OSSL_PARAM_UNSIGNED_INTEGER, buf,
4e7991b4 374 sizeof(unsigned long int));
7ffbd7ca
P
375}
376
377int OSSL_PARAM_get_int32(const OSSL_PARAM *p, int32_t *val)
378{
9830e7ea
P
379 double d;
380
ac1082f0
P
381 if (val == NULL || p == NULL) {
382 err_null_argument;
7ffbd7ca 383 return 0;
ac1082f0 384 }
7ffbd7ca 385
9830e7ea 386 if (p->data_type == OSSL_PARAM_INTEGER) {
e9c5e642
P
387#ifndef OPENSSL_SMALL_FOOTPRINT
388 int64_t i64;
389
9830e7ea
P
390 switch (p->data_size) {
391 case sizeof(int32_t):
392 *val = *(const int32_t *)p->data;
393 return 1;
394 case sizeof(int64_t):
395 i64 = *(const int64_t *)p->data;
396 if (i64 >= INT32_MIN && i64 <= INT32_MAX) {
397 *val = (int32_t)i64;
398 return 1;
399 }
ac1082f0 400 err_out_of_range;
e9c5e642 401 return 0;
9830e7ea 402 }
e9c5e642
P
403#endif
404 return general_get_int(p, val, sizeof(*val));
405
9830e7ea 406 } else if (p->data_type == OSSL_PARAM_UNSIGNED_INTEGER) {
e9c5e642
P
407#ifndef OPENSSL_SMALL_FOOTPRINT
408 uint32_t u32;
409 uint64_t u64;
410
9830e7ea
P
411 switch (p->data_size) {
412 case sizeof(uint32_t):
413 u32 = *(const uint32_t *)p->data;
414 if (u32 <= INT32_MAX) {
415 *val = (int32_t)u32;
416 return 1;
417 }
ac1082f0 418 err_out_of_range;
e9c5e642 419 return 0;
9830e7ea
P
420 case sizeof(uint64_t):
421 u64 = *(const uint64_t *)p->data;
422 if (u64 <= INT32_MAX) {
423 *val = (int32_t)u64;
424 return 1;
425 }
ac1082f0 426 err_out_of_range;
e9c5e642 427 return 0;
9830e7ea 428 }
e9c5e642
P
429#endif
430 return general_get_int(p, val, sizeof(*val));
431
9830e7ea
P
432 } else if (p->data_type == OSSL_PARAM_REAL) {
433 switch (p->data_size) {
434 case sizeof(double):
435 d = *(const double *)p->data;
436 if (d >= INT32_MIN && d <= INT32_MAX && d == (int32_t)d) {
437 *val = (int32_t)d;
438 return 1;
439 }
ac1082f0
P
440 err_out_of_range;
441 return 0;
9830e7ea 442 }
ac1082f0
P
443 err_unsupported_real;
444 return 0;
7ffbd7ca 445 }
ac1082f0 446 err_bad_type;
7ffbd7ca
P
447 return 0;
448}
449
4e7991b4 450int OSSL_PARAM_set_int32(OSSL_PARAM *p, int32_t val)
7ffbd7ca 451{
ac1082f0
P
452 uint32_t u32;
453 unsigned int shift;
454
455 if (p == NULL) {
456 err_null_argument;
7ffbd7ca 457 return 0;
ac1082f0 458 }
4e7991b4 459 p->return_size = 0;
9830e7ea 460 if (p->data_type == OSSL_PARAM_INTEGER) {
e9c5e642 461#ifndef OPENSSL_SMALL_FOOTPRINT
4e7991b4 462 p->return_size = sizeof(int32_t); /* Minimum expected size */
8f3b8fd6
RL
463 if (p->data == NULL)
464 return 1;
9830e7ea
P
465 switch (p->data_size) {
466 case sizeof(int32_t):
467 *(int32_t *)p->data = val;
468 return 1;
469 case sizeof(int64_t):
4e7991b4 470 p->return_size = sizeof(int64_t);
9830e7ea
P
471 *(int64_t *)p->data = (int64_t)val;
472 return 1;
473 }
e9c5e642
P
474#endif
475 return general_set_int(p, &val, sizeof(val));
9830e7ea 476 } else if (p->data_type == OSSL_PARAM_UNSIGNED_INTEGER && val >= 0) {
e9c5e642 477#ifndef OPENSSL_SMALL_FOOTPRINT
4e7991b4 478 p->return_size = sizeof(uint32_t); /* Minimum expected size */
8f3b8fd6
RL
479 if (p->data == NULL)
480 return 1;
9830e7ea
P
481 switch (p->data_size) {
482 case sizeof(uint32_t):
483 *(uint32_t *)p->data = (uint32_t)val;
484 return 1;
485 case sizeof(uint64_t):
4e7991b4 486 p->return_size = sizeof(uint64_t);
9830e7ea
P
487 *(uint64_t *)p->data = (uint64_t)val;
488 return 1;
489 }
e9c5e642
P
490#endif
491 return general_set_int(p, &val, sizeof(val));
9830e7ea 492 } else if (p->data_type == OSSL_PARAM_REAL) {
4e7991b4 493 p->return_size = sizeof(double);
8f3b8fd6
RL
494 if (p->data == NULL)
495 return 1;
9830e7ea
P
496 switch (p->data_size) {
497 case sizeof(double):
ac1082f0
P
498 shift = real_shift();
499 if (shift < 8 * sizeof(val) - 1) {
500 u32 = val < 0 ? -val : val;
501 if ((u32 >> shift) != 0) {
502 err_inexact;
503 return 0;
504 }
505 }
9830e7ea
P
506 *(double *)p->data = (double)val;
507 return 1;
508 }
ac1082f0
P
509 err_unsupported_real;
510 return 0;
7ffbd7ca 511 }
ac1082f0 512 err_bad_type;
7ffbd7ca
P
513 return 0;
514}
515
4e7991b4 516OSSL_PARAM OSSL_PARAM_construct_int32(const char *key, int32_t *buf)
7ffbd7ca
P
517{
518 return ossl_param_construct(key, OSSL_PARAM_INTEGER, buf,
4e7991b4 519 sizeof(int32_t));
7ffbd7ca
P
520}
521
522int OSSL_PARAM_get_uint32(const OSSL_PARAM *p, uint32_t *val)
523{
9830e7ea
P
524 double d;
525
ac1082f0
P
526 if (val == NULL || p == NULL) {
527 err_null_argument;
7ffbd7ca 528 return 0;
ac1082f0 529 }
7ffbd7ca 530
9830e7ea 531 if (p->data_type == OSSL_PARAM_UNSIGNED_INTEGER) {
e9c5e642
P
532#ifndef OPENSSL_SMALL_FOOTPRINT
533 uint64_t u64;
534
9830e7ea
P
535 switch (p->data_size) {
536 case sizeof(uint32_t):
537 *val = *(const uint32_t *)p->data;
538 return 1;
539 case sizeof(uint64_t):
540 u64 = *(const uint64_t *)p->data;
541 if (u64 <= UINT32_MAX) {
542 *val = (uint32_t)u64;
543 return 1;
544 }
ac1082f0 545 err_out_of_range;
e9c5e642 546 return 0;
9830e7ea 547 }
e9c5e642
P
548#endif
549 return general_get_uint(p, val, sizeof(*val));
9830e7ea 550 } else if (p->data_type == OSSL_PARAM_INTEGER) {
e9c5e642
P
551#ifndef OPENSSL_SMALL_FOOTPRINT
552 int32_t i32;
553 int64_t i64;
554
9830e7ea
P
555 switch (p->data_size) {
556 case sizeof(int32_t):
557 i32 = *(const int32_t *)p->data;
558 if (i32 >= 0) {
559 *val = i32;
560 return 1;
561 }
ac1082f0 562 err_unsigned_negative;
e9c5e642 563 return 0;
9830e7ea
P
564 case sizeof(int64_t):
565 i64 = *(const int64_t *)p->data;
566 if (i64 >= 0 && i64 <= UINT32_MAX) {
567 *val = (uint32_t)i64;
568 return 1;
569 }
ac1082f0
P
570 if (i64 < 0)
571 err_unsigned_negative;
572 else
573 err_out_of_range;
e9c5e642 574 return 0;
9830e7ea 575 }
e9c5e642
P
576#endif
577 return general_get_uint(p, val, sizeof(*val));
9830e7ea
P
578 } else if (p->data_type == OSSL_PARAM_REAL) {
579 switch (p->data_size) {
580 case sizeof(double):
581 d = *(const double *)p->data;
582 if (d >= 0 && d <= UINT32_MAX && d == (uint32_t)d) {
583 *val = (uint32_t)d;
584 return 1;
585 }
ac1082f0
P
586 err_inexact;
587 return 0;
9830e7ea 588 }
ac1082f0
P
589 err_unsupported_real;
590 return 0;
7ffbd7ca 591 }
ac1082f0 592 err_bad_type;
7ffbd7ca
P
593 return 0;
594}
595
4e7991b4 596int OSSL_PARAM_set_uint32(OSSL_PARAM *p, uint32_t val)
7ffbd7ca 597{
ac1082f0
P
598 unsigned int shift;
599
600 if (p == NULL) {
601 err_null_argument;
7ffbd7ca 602 return 0;
ac1082f0 603 }
4e7991b4 604 p->return_size = 0;
7ffbd7ca 605
9830e7ea 606 if (p->data_type == OSSL_PARAM_UNSIGNED_INTEGER) {
e9c5e642 607#ifndef OPENSSL_SMALL_FOOTPRINT
4e7991b4 608 p->return_size = sizeof(uint32_t); /* Minimum expected size */
8f3b8fd6
RL
609 if (p->data == NULL)
610 return 1;
9830e7ea
P
611 switch (p->data_size) {
612 case sizeof(uint32_t):
613 *(uint32_t *)p->data = val;
614 return 1;
615 case sizeof(uint64_t):
4e7991b4 616 p->return_size = sizeof(uint64_t);
9830e7ea
P
617 *(uint64_t *)p->data = val;
618 return 1;
619 }
e9c5e642
P
620#endif
621 return general_set_uint(p, &val, sizeof(val));
9830e7ea 622 } else if (p->data_type == OSSL_PARAM_INTEGER) {
e9c5e642 623#ifndef OPENSSL_SMALL_FOOTPRINT
4e7991b4 624 p->return_size = sizeof(int32_t); /* Minimum expected size */
8f3b8fd6
RL
625 if (p->data == NULL)
626 return 1;
9830e7ea
P
627 switch (p->data_size) {
628 case sizeof(int32_t):
629 if (val <= INT32_MAX) {
630 *(int32_t *)p->data = (int32_t)val;
631 return 1;
632 }
ac1082f0 633 err_out_of_range;
e9c5e642 634 return 0;
9830e7ea 635 case sizeof(int64_t):
4e7991b4 636 p->return_size = sizeof(int64_t);
9830e7ea
P
637 *(int64_t *)p->data = (int64_t)val;
638 return 1;
639 }
e9c5e642
P
640#endif
641 return general_set_uint(p, &val, sizeof(val));
9830e7ea 642 } else if (p->data_type == OSSL_PARAM_REAL) {
4e7991b4 643 p->return_size = sizeof(double);
8f3b8fd6
RL
644 if (p->data == NULL)
645 return 1;
9830e7ea
P
646 switch (p->data_size) {
647 case sizeof(double):
ac1082f0
P
648 shift = real_shift();
649 if (shift < 8 * sizeof(val) && (val >> shift) != 0) {
650 err_inexact;
651 return 0;
652 }
9830e7ea
P
653 *(double *)p->data = (double)val;
654 return 1;
655 }
ac1082f0
P
656 err_unsupported_real;
657 return 0;
7ffbd7ca 658 }
ac1082f0 659 err_bad_type;
7ffbd7ca
P
660 return 0;
661}
662
4e7991b4 663OSSL_PARAM OSSL_PARAM_construct_uint32(const char *key, uint32_t *buf)
7ffbd7ca
P
664{
665 return ossl_param_construct(key, OSSL_PARAM_UNSIGNED_INTEGER, buf,
4e7991b4 666 sizeof(uint32_t));
7ffbd7ca
P
667}
668
669int OSSL_PARAM_get_int64(const OSSL_PARAM *p, int64_t *val)
670{
9830e7ea
P
671 double d;
672
ac1082f0
P
673 if (val == NULL || p == NULL) {
674 err_null_argument;
7ffbd7ca 675 return 0;
ac1082f0 676 }
7ffbd7ca 677
9830e7ea 678 if (p->data_type == OSSL_PARAM_INTEGER) {
e9c5e642 679#ifndef OPENSSL_SMALL_FOOTPRINT
9830e7ea
P
680 switch (p->data_size) {
681 case sizeof(int32_t):
682 *val = *(const int32_t *)p->data;
683 return 1;
684 case sizeof(int64_t):
685 *val = *(const int64_t *)p->data;
686 return 1;
687 }
e9c5e642
P
688#endif
689 return general_get_int(p, val, sizeof(*val));
9830e7ea 690 } else if (p->data_type == OSSL_PARAM_UNSIGNED_INTEGER) {
e9c5e642
P
691#ifndef OPENSSL_SMALL_FOOTPRINT
692 uint64_t u64;
693
9830e7ea
P
694 switch (p->data_size) {
695 case sizeof(uint32_t):
696 *val = *(const uint32_t *)p->data;
697 return 1;
698 case sizeof(uint64_t):
699 u64 = *(const uint64_t *)p->data;
700 if (u64 <= INT64_MAX) {
701 *val = (int64_t)u64;
702 return 1;
703 }
ac1082f0 704 err_out_of_range;
e9c5e642 705 return 0;
9830e7ea 706 }
e9c5e642
P
707#endif
708 return general_get_int(p, val, sizeof(*val));
9830e7ea
P
709 } else if (p->data_type == OSSL_PARAM_REAL) {
710 switch (p->data_size) {
711 case sizeof(double):
712 d = *(const double *)p->data;
5b1d94c1
P
713 if (d >= INT64_MIN
714 /*
715 * By subtracting 65535 (2^16-1) we cancel the low order
716 * 15 bits of INT64_MAX to avoid using imprecise floating
717 * point values.
718 */
719 && d < (double)(INT64_MAX - 65535) + 65536.0
720 && d == (int64_t)d) {
9830e7ea
P
721 *val = (int64_t)d;
722 return 1;
723 }
ac1082f0
P
724 err_inexact;
725 return 0;
9830e7ea 726 }
ac1082f0
P
727 err_unsupported_real;
728 return 0;
7ffbd7ca 729 }
ac1082f0 730 err_bad_type;
7ffbd7ca
P
731 return 0;
732}
733
4e7991b4 734int OSSL_PARAM_set_int64(OSSL_PARAM *p, int64_t val)
7ffbd7ca 735{
9830e7ea
P
736 uint64_t u64;
737
ac1082f0
P
738 if (p == NULL) {
739 err_null_argument;
7ffbd7ca 740 return 0;
ac1082f0 741 }
4e7991b4 742 p->return_size = 0;
9830e7ea 743 if (p->data_type == OSSL_PARAM_INTEGER) {
e9c5e642 744#ifndef OPENSSL_SMALL_FOOTPRINT
4e7991b4 745 p->return_size = sizeof(int64_t); /* Expected size */
8f3b8fd6
RL
746 if (p->data == NULL)
747 return 1;
9830e7ea
P
748 switch (p->data_size) {
749 case sizeof(int32_t):
750 if (val >= INT32_MIN && val <= INT32_MAX) {
4e7991b4 751 p->return_size = sizeof(int32_t);
9830e7ea
P
752 *(int32_t *)p->data = (int32_t)val;
753 return 1;
754 }
ac1082f0 755 err_out_of_range;
e9c5e642 756 return 0;
9830e7ea
P
757 case sizeof(int64_t):
758 *(int64_t *)p->data = val;
759 return 1;
760 }
e9c5e642
P
761#endif
762 return general_set_int(p, &val, sizeof(val));
9830e7ea 763 } else if (p->data_type == OSSL_PARAM_UNSIGNED_INTEGER && val >= 0) {
e9c5e642 764#ifndef OPENSSL_SMALL_FOOTPRINT
4e7991b4 765 p->return_size = sizeof(uint64_t); /* Expected size */
8f3b8fd6
RL
766 if (p->data == NULL)
767 return 1;
9830e7ea
P
768 switch (p->data_size) {
769 case sizeof(uint32_t):
770 if (val <= UINT32_MAX) {
4e7991b4 771 p->return_size = sizeof(uint32_t);
9830e7ea
P
772 *(uint32_t *)p->data = (uint32_t)val;
773 return 1;
774 }
ac1082f0 775 err_out_of_range;
e9c5e642 776 return 0;
9830e7ea
P
777 case sizeof(uint64_t):
778 *(uint64_t *)p->data = (uint64_t)val;
779 return 1;
780 }
e9c5e642
P
781#endif
782 return general_set_int(p, &val, sizeof(val));
9830e7ea 783 } else if (p->data_type == OSSL_PARAM_REAL) {
4e7991b4 784 p->return_size = sizeof(double);
8f3b8fd6
RL
785 if (p->data == NULL)
786 return 1;
9830e7ea
P
787 switch (p->data_size) {
788 case sizeof(double):
789 u64 = val < 0 ? -val : val;
5b1d94c1 790 if ((u64 >> real_shift()) == 0) {
9830e7ea
P
791 *(double *)p->data = (double)val;
792 return 1;
793 }
ac1082f0
P
794 err_inexact;
795 return 0;
9830e7ea 796 }
ac1082f0
P
797 err_unsupported_real;
798 return 0;
7ffbd7ca 799 }
ac1082f0 800 err_bad_type;
7ffbd7ca
P
801 return 0;
802}
803
4e7991b4 804OSSL_PARAM OSSL_PARAM_construct_int64(const char *key, int64_t *buf)
7ffbd7ca 805{
4e7991b4 806 return ossl_param_construct(key, OSSL_PARAM_INTEGER, buf, sizeof(int64_t));
7ffbd7ca
P
807}
808
809int OSSL_PARAM_get_uint64(const OSSL_PARAM *p, uint64_t *val)
810{
9830e7ea
P
811 double d;
812
ac1082f0
P
813 if (val == NULL || p == NULL) {
814 err_null_argument;
7ffbd7ca 815 return 0;
ac1082f0 816 }
7ffbd7ca 817
9830e7ea 818 if (p->data_type == OSSL_PARAM_UNSIGNED_INTEGER) {
e9c5e642 819#ifndef OPENSSL_SMALL_FOOTPRINT
9830e7ea
P
820 switch (p->data_size) {
821 case sizeof(uint32_t):
822 *val = *(const uint32_t *)p->data;
823 return 1;
824 case sizeof(uint64_t):
825 *val = *(const uint64_t *)p->data;
826 return 1;
827 }
e9c5e642
P
828#endif
829 return general_get_uint(p, val, sizeof(*val));
9830e7ea 830 } else if (p->data_type == OSSL_PARAM_INTEGER) {
e9c5e642
P
831#ifndef OPENSSL_SMALL_FOOTPRINT
832 int32_t i32;
833 int64_t i64;
834
9830e7ea
P
835 switch (p->data_size) {
836 case sizeof(int32_t):
837 i32 = *(const int32_t *)p->data;
838 if (i32 >= 0) {
839 *val = (uint64_t)i32;
840 return 1;
841 }
ac1082f0 842 err_unsigned_negative;
e9c5e642 843 return 0;
9830e7ea
P
844 case sizeof(int64_t):
845 i64 = *(const int64_t *)p->data;
846 if (i64 >= 0) {
847 *val = (uint64_t)i64;
848 return 1;
849 }
ac1082f0 850 err_unsigned_negative;
e9c5e642 851 return 0;
9830e7ea 852 }
e9c5e642
P
853#endif
854 return general_get_uint(p, val, sizeof(*val));
9830e7ea
P
855 } else if (p->data_type == OSSL_PARAM_REAL) {
856 switch (p->data_size) {
857 case sizeof(double):
858 d = *(const double *)p->data;
5b1d94c1
P
859 if (d >= 0
860 /*
861 * By subtracting 65535 (2^16-1) we cancel the low order
862 * 15 bits of UINT64_MAX to avoid using imprecise floating
863 * point values.
864 */
865 && d < (double)(UINT64_MAX - 65535) + 65536.0
866 && d == (uint64_t)d) {
9830e7ea
P
867 *val = (uint64_t)d;
868 return 1;
869 }
ac1082f0
P
870 err_inexact;
871 return 0;
9830e7ea 872 }
ac1082f0
P
873 err_unsupported_real;
874 return 0;
7ffbd7ca 875 }
ac1082f0 876 err_bad_type;
7ffbd7ca
P
877 return 0;
878}
879
4e7991b4 880int OSSL_PARAM_set_uint64(OSSL_PARAM *p, uint64_t val)
7ffbd7ca 881{
ac1082f0
P
882 if (p == NULL) {
883 err_null_argument;
7ffbd7ca 884 return 0;
ac1082f0 885 }
4e7991b4 886 p->return_size = 0;
7ffbd7ca 887
9830e7ea 888 if (p->data_type == OSSL_PARAM_UNSIGNED_INTEGER) {
e9c5e642 889#ifndef OPENSSL_SMALL_FOOTPRINT
4e7991b4 890 p->return_size = sizeof(uint64_t); /* Expected size */
8f3b8fd6
RL
891 if (p->data == NULL)
892 return 1;
9830e7ea
P
893 switch (p->data_size) {
894 case sizeof(uint32_t):
895 if (val <= UINT32_MAX) {
4e7991b4 896 p->return_size = sizeof(uint32_t);
9830e7ea
P
897 *(uint32_t *)p->data = (uint32_t)val;
898 return 1;
899 }
ac1082f0 900 err_out_of_range;
e9c5e642 901 return 0;
9830e7ea
P
902 case sizeof(uint64_t):
903 *(uint64_t *)p->data = val;
904 return 1;
905 }
e9c5e642
P
906#endif
907 return general_set_uint(p, &val, sizeof(val));
9830e7ea 908 } else if (p->data_type == OSSL_PARAM_INTEGER) {
e9c5e642 909#ifndef OPENSSL_SMALL_FOOTPRINT
4e7991b4 910 p->return_size = sizeof(int64_t); /* Expected size */
8f3b8fd6
RL
911 if (p->data == NULL)
912 return 1;
9830e7ea
P
913 switch (p->data_size) {
914 case sizeof(int32_t):
915 if (val <= INT32_MAX) {
4e7991b4 916 p->return_size = sizeof(int32_t);
9830e7ea
P
917 *(int32_t *)p->data = (int32_t)val;
918 return 1;
919 }
ac1082f0 920 err_out_of_range;
e9c5e642 921 return 0;
9830e7ea
P
922 case sizeof(int64_t):
923 if (val <= INT64_MAX) {
924 *(int64_t *)p->data = (int64_t)val;
925 return 1;
926 }
ac1082f0 927 err_out_of_range;
e9c5e642 928 return 0;
9830e7ea 929 }
e9c5e642
P
930#endif
931 return general_set_uint(p, &val, sizeof(val));
9830e7ea 932 } else if (p->data_type == OSSL_PARAM_REAL) {
4e7991b4 933 p->return_size = sizeof(double);
9830e7ea
P
934 switch (p->data_size) {
935 case sizeof(double):
5b1d94c1 936 if ((val >> real_shift()) == 0) {
9830e7ea
P
937 *(double *)p->data = (double)val;
938 return 1;
939 }
ac1082f0
P
940 err_inexact;
941 return 0;
9830e7ea 942 }
ac1082f0
P
943 err_unsupported_real;
944 return 0;
7ffbd7ca 945 }
ac1082f0 946 err_bad_type;
7ffbd7ca
P
947 return 0;
948}
949
4e7991b4
P
950OSSL_PARAM OSSL_PARAM_construct_uint64(const char *key, uint64_t *buf)
951{
7ffbd7ca 952 return ossl_param_construct(key, OSSL_PARAM_UNSIGNED_INTEGER, buf,
4e7991b4 953 sizeof(uint64_t));
7ffbd7ca
P
954}
955
956int OSSL_PARAM_get_size_t(const OSSL_PARAM *p, size_t *val)
957{
e9c5e642 958#ifndef OPENSSL_SMALL_FOOTPRINT
863360fb 959 switch (sizeof(size_t)) {
7ffbd7ca 960 case sizeof(uint32_t):
863360fb 961 return OSSL_PARAM_get_uint32(p, (uint32_t *)val);
7ffbd7ca 962 case sizeof(uint64_t):
863360fb 963 return OSSL_PARAM_get_uint64(p, (uint64_t *)val);
7ffbd7ca 964 }
e9c5e642
P
965#endif
966 return general_get_uint(p, val, sizeof(*val));
7ffbd7ca
P
967}
968
4e7991b4 969int OSSL_PARAM_set_size_t(OSSL_PARAM *p, size_t val)
7ffbd7ca 970{
e9c5e642 971#ifndef OPENSSL_SMALL_FOOTPRINT
863360fb 972 switch (sizeof(size_t)) {
7ffbd7ca 973 case sizeof(uint32_t):
863360fb 974 return OSSL_PARAM_set_uint32(p, (uint32_t)val);
7ffbd7ca 975 case sizeof(uint64_t):
863360fb 976 return OSSL_PARAM_set_uint64(p, (uint64_t)val);
7ffbd7ca 977 }
e9c5e642
P
978#endif
979 return general_set_uint(p, &val, sizeof(val));
7ffbd7ca
P
980}
981
4e7991b4 982OSSL_PARAM OSSL_PARAM_construct_size_t(const char *key, size_t *buf)
7ffbd7ca
P
983{
984 return ossl_param_construct(key, OSSL_PARAM_UNSIGNED_INTEGER, buf,
4e7991b4
P
985 sizeof(size_t));
986}
7ffbd7ca 987
5fdaa38f
P
988int OSSL_PARAM_get_time_t(const OSSL_PARAM *p, time_t *val)
989{
e9c5e642 990#ifndef OPENSSL_SMALL_FOOTPRINT
5fdaa38f
P
991 switch (sizeof(time_t)) {
992 case sizeof(int32_t):
993 return OSSL_PARAM_get_int32(p, (int32_t *)val);
994 case sizeof(int64_t):
995 return OSSL_PARAM_get_int64(p, (int64_t *)val);
996 }
e9c5e642
P
997#endif
998 return general_get_int(p, val, sizeof(*val));
5fdaa38f
P
999}
1000
1001int OSSL_PARAM_set_time_t(OSSL_PARAM *p, time_t val)
1002{
e9c5e642 1003#ifndef OPENSSL_SMALL_FOOTPRINT
5fdaa38f
P
1004 switch (sizeof(time_t)) {
1005 case sizeof(int32_t):
1006 return OSSL_PARAM_set_int32(p, (int32_t)val);
1007 case sizeof(int64_t):
1008 return OSSL_PARAM_set_int64(p, (int64_t)val);
1009 }
e9c5e642
P
1010#endif
1011 return general_set_int(p, &val, sizeof(val));
5fdaa38f
P
1012}
1013
1014OSSL_PARAM OSSL_PARAM_construct_time_t(const char *key, time_t *buf)
1015{
1016 return ossl_param_construct(key, OSSL_PARAM_INTEGER, buf, sizeof(time_t));
1017}
1018
7ffbd7ca
P
1019int OSSL_PARAM_get_BN(const OSSL_PARAM *p, BIGNUM **val)
1020{
f1719858 1021 BIGNUM *b = NULL;
7ffbd7ca 1022
ac1082f0
P
1023 if (val == NULL || p == NULL) {
1024 err_null_argument;
1025 return 0;
1026 }
f1719858
RL
1027
1028 switch (p->data_type) {
1029 case OSSL_PARAM_UNSIGNED_INTEGER:
1030 b = BN_native2bn(p->data, (int)p->data_size, *val);
1031 break;
1032 case OSSL_PARAM_INTEGER:
1033 b = BN_signed_native2bn(p->data, (int)p->data_size, *val);
1034 break;
1035 default:
ac1082f0 1036 err_bad_type;
f1719858 1037 break;
ac1082f0 1038 }
7ffbd7ca 1039
f1719858 1040 if (b == NULL) {
e077455e 1041 ERR_raise(ERR_LIB_CRYPTO, ERR_R_BN_LIB);
f1719858 1042 return 0;
7ffbd7ca 1043 }
f1719858
RL
1044
1045 *val = b;
1046 return 1;
7ffbd7ca
P
1047}
1048
4e7991b4 1049int OSSL_PARAM_set_BN(OSSL_PARAM *p, const BIGNUM *val)
7ffbd7ca
P
1050{
1051 size_t bytes;
1052
ac1082f0
P
1053 if (p == NULL) {
1054 err_null_argument;
7ffbd7ca 1055 return 0;
ac1082f0 1056 }
4e7991b4 1057 p->return_size = 0;
ac1082f0
P
1058 if (val == NULL) {
1059 err_null_argument;
7ffbd7ca 1060 return 0;
ac1082f0 1061 }
f1719858 1062 if (p->data_type == OSSL_PARAM_UNSIGNED_INTEGER && BN_is_negative(val)) {
ac1082f0
P
1063 err_bad_type;
1064 return 0;
1065 }
7ffbd7ca
P
1066
1067 bytes = (size_t)BN_num_bytes(val);
f1719858
RL
1068 /* We add 1 byte for signed numbers, to make space for a sign extension */
1069 if (p->data_type == OSSL_PARAM_INTEGER)
1070 bytes++;
c2ae8914
RL
1071 /* We make sure that at least one byte is used, so zero is properly set */
1072 if (bytes == 0)
1073 bytes++;
f1719858 1074
4e7991b4 1075 p->return_size = bytes;
8f3b8fd6
RL
1076 if (p->data == NULL)
1077 return 1;
0f73e719
RL
1078 if (p->data_size >= bytes) {
1079 p->return_size = p->data_size;
f1719858
RL
1080
1081 switch (p->data_type) {
1082 case OSSL_PARAM_UNSIGNED_INTEGER:
1083 if (BN_bn2nativepad(val, p->data, p->data_size) >= 0)
1084 return 1;
1085 ERR_raise(ERR_LIB_CRYPTO, CRYPTO_R_INTEGER_OVERFLOW);
1086 break;
1087 case OSSL_PARAM_INTEGER:
1088 if (BN_signed_bn2native(val, p->data, p->data_size) >= 0)
1089 return 1;
1090 ERR_raise(ERR_LIB_CRYPTO, CRYPTO_R_INTEGER_OVERFLOW);
1091 break;
1092 default:
1093 err_bad_type;
1094 break;
1095 }
ac1082f0 1096 return 0;
0f73e719 1097 }
ac1082f0 1098 err_too_small;
0f73e719 1099 return 0;
7ffbd7ca
P
1100}
1101
1102OSSL_PARAM OSSL_PARAM_construct_BN(const char *key, unsigned char *buf,
4e7991b4 1103 size_t bsize)
7ffbd7ca
P
1104{
1105 return ossl_param_construct(key, OSSL_PARAM_UNSIGNED_INTEGER,
4e7991b4 1106 buf, bsize);
7ffbd7ca
P
1107}
1108
1109int OSSL_PARAM_get_double(const OSSL_PARAM *p, double *val)
1110{
9830e7ea
P
1111 int64_t i64;
1112 uint64_t u64;
1113
ac1082f0
P
1114 if (val == NULL || p == NULL) {
1115 err_null_argument;
7ffbd7ca 1116 return 0;
ac1082f0 1117 }
7ffbd7ca 1118
9830e7ea
P
1119 if (p->data_type == OSSL_PARAM_REAL) {
1120 switch (p->data_size) {
1121 case sizeof(double):
1122 *val = *(const double *)p->data;
1123 return 1;
1124 }
ac1082f0
P
1125 err_unsupported_real;
1126 return 0;
9830e7ea
P
1127 } else if (p->data_type == OSSL_PARAM_UNSIGNED_INTEGER) {
1128 switch (p->data_size) {
1129 case sizeof(uint32_t):
1130 *val = *(const uint32_t *)p->data;
1131 return 1;
1132 case sizeof(uint64_t):
1133 u64 = *(const uint64_t *)p->data;
5b1d94c1 1134 if ((u64 >> real_shift()) == 0) {
9830e7ea
P
1135 *val = (double)u64;
1136 return 1;
1137 }
ac1082f0
P
1138 err_inexact;
1139 return 0;
9830e7ea
P
1140 }
1141 } else if (p->data_type == OSSL_PARAM_INTEGER) {
1142 switch (p->data_size) {
1143 case sizeof(int32_t):
1144 *val = *(const int32_t *)p->data;
1145 return 1;
1146 case sizeof(int64_t):
1147 i64 = *(const int64_t *)p->data;
1148 u64 = i64 < 0 ? -i64 : i64;
5b1d94c1 1149 if ((u64 >> real_shift()) == 0) {
9830e7ea
P
1150 *val = 0.0 + i64;
1151 return 1;
1152 }
ac1082f0
P
1153 err_inexact;
1154 return 0;
9830e7ea 1155 }
7ffbd7ca 1156 }
ac1082f0 1157 err_bad_type;
7ffbd7ca
P
1158 return 0;
1159}
1160
4e7991b4 1161int OSSL_PARAM_set_double(OSSL_PARAM *p, double val)
7ffbd7ca 1162{
ac1082f0
P
1163 if (p == NULL) {
1164 err_null_argument;
7ffbd7ca 1165 return 0;
ac1082f0 1166 }
4e7991b4 1167 p->return_size = 0;
7ffbd7ca 1168
9830e7ea 1169 if (p->data_type == OSSL_PARAM_REAL) {
4e7991b4 1170 p->return_size = sizeof(double);
8f3b8fd6
RL
1171 if (p->data == NULL)
1172 return 1;
9830e7ea
P
1173 switch (p->data_size) {
1174 case sizeof(double):
1175 *(double *)p->data = val;
1176 return 1;
1177 }
ac1082f0
P
1178 err_unsupported_real;
1179 return 0;
1180 } else if (p->data_type == OSSL_PARAM_UNSIGNED_INTEGER) {
4e7991b4 1181 p->return_size = sizeof(double);
8f3b8fd6
RL
1182 if (p->data == NULL)
1183 return 1;
ac1082f0
P
1184 if (val != (uint64_t)val) {
1185 err_inexact;
1186 return 0;
1187 }
9830e7ea
P
1188 switch (p->data_size) {
1189 case sizeof(uint32_t):
1190 if (val >= 0 && val <= UINT32_MAX) {
4e7991b4 1191 p->return_size = sizeof(uint32_t);
9830e7ea
P
1192 *(uint32_t *)p->data = (uint32_t)val;
1193 return 1;
1194 }
ac1082f0
P
1195 err_out_of_range;
1196 return 0;
9830e7ea 1197 case sizeof(uint64_t):
5b1d94c1
P
1198 if (val >= 0
1199 /*
1200 * By subtracting 65535 (2^16-1) we cancel the low order
1201 * 15 bits of UINT64_MAX to avoid using imprecise floating
1202 * point values.
1203 */
b9d022d7 1204 && val < (double)(UINT64_MAX - 65535) + 65536.0) {
4e7991b4 1205 p->return_size = sizeof(uint64_t);
9830e7ea
P
1206 *(uint64_t *)p->data = (uint64_t)val;
1207 return 1;
1208 }
ac1082f0
P
1209 err_out_of_range;
1210 return 0;
1211 }
1212 } else if (p->data_type == OSSL_PARAM_INTEGER) {
4e7991b4 1213 p->return_size = sizeof(double);
8f3b8fd6
RL
1214 if (p->data == NULL)
1215 return 1;
ac1082f0
P
1216 if (val != (int64_t)val) {
1217 err_inexact;
1218 return 0;
1219 }
9830e7ea
P
1220 switch (p->data_size) {
1221 case sizeof(int32_t):
1222 if (val >= INT32_MIN && val <= INT32_MAX) {
4e7991b4 1223 p->return_size = sizeof(int32_t);
9830e7ea
P
1224 *(int32_t *)p->data = (int32_t)val;
1225 return 1;
1226 }
ac1082f0
P
1227 err_out_of_range;
1228 return 0;
9830e7ea 1229 case sizeof(int64_t):
5b1d94c1
P
1230 if (val >= INT64_MIN
1231 /*
1232 * By subtracting 65535 (2^16-1) we cancel the low order
1233 * 15 bits of INT64_MAX to avoid using imprecise floating
1234 * point values.
1235 */
1236 && val < (double)(INT64_MAX - 65535) + 65536.0) {
4e7991b4 1237 p->return_size = sizeof(int64_t);
9830e7ea
P
1238 *(int64_t *)p->data = (int64_t)val;
1239 return 1;
1240 }
ac1082f0
P
1241 err_out_of_range;
1242 return 0;
9830e7ea 1243 }
7ffbd7ca 1244 }
ac1082f0 1245 err_bad_type;
7ffbd7ca
P
1246 return 0;
1247}
1248
4e7991b4 1249OSSL_PARAM OSSL_PARAM_construct_double(const char *key, double *buf)
7ffbd7ca 1250{
4e7991b4 1251 return ossl_param_construct(key, OSSL_PARAM_REAL, buf, sizeof(double));
7ffbd7ca
P
1252}
1253
247a1786
RL
1254static int get_string_internal(const OSSL_PARAM *p, void **val,
1255 size_t *max_len, size_t *used_len,
1256 unsigned int type)
7ffbd7ca 1257{
247a1786 1258 size_t sz, alloc_sz;
7ffbd7ca 1259
ac1082f0
P
1260 if ((val == NULL && used_len == NULL) || p == NULL) {
1261 err_null_argument;
1262 return 0;
1263 }
1264 if (p->data_type != type) {
1265 err_bad_type;
7ffbd7ca 1266 return 0;
ac1082f0 1267 }
7ffbd7ca
P
1268
1269 sz = p->data_size;
247a1786
RL
1270 /*
1271 * If the input size is 0, or the input string needs NUL byte
1272 * termination, allocate an extra byte.
1273 */
1274 alloc_sz = sz + (type == OSSL_PARAM_UTF8_STRING || sz == 0);
7ffbd7ca
P
1275
1276 if (used_len != NULL)
1277 *used_len = sz;
1278
ac1082f0
P
1279 if (p->data == NULL) {
1280 err_null_argument;
86f32187 1281 return 0;
ac1082f0 1282 }
46ef075a 1283
b756626a
MC
1284 if (val == NULL)
1285 return 1;
1286
7ffbd7ca 1287 if (*val == NULL) {
247a1786 1288 char *const q = OPENSSL_malloc(alloc_sz);
7ffbd7ca 1289
e077455e 1290 if (q == NULL)
7ffbd7ca
P
1291 return 0;
1292 *val = q;
247a1786 1293 *max_len = alloc_sz;
7ffbd7ca 1294 }
247a1786 1295
ac1082f0
P
1296 if (*max_len < sz) {
1297 err_too_small;
7ffbd7ca 1298 return 0;
ac1082f0 1299 }
7ffbd7ca
P
1300 memcpy(*val, p->data, sz);
1301 return 1;
1302}
1303
1304int OSSL_PARAM_get_utf8_string(const OSSL_PARAM *p, char **val, size_t max_len)
1305{
247a1786
RL
1306 int ret = get_string_internal(p, (void **)val, &max_len, NULL,
1307 OSSL_PARAM_UTF8_STRING);
1308
1309 /*
1310 * We try to ensure that the copied string is terminated with a
1311 * NUL byte. That should be easy, just place a NUL byte at
1312 * |((char*)*val)[p->data_size]|.
1313 * Unfortunately, we have seen cases where |p->data_size| doesn't
1314 * correctly reflect the length of the string, and just happens
1315 * to be out of bounds according to |max_len|, so in that case, we
1316 * make the extra step of trying to find the true length of the
1317 * string that |p->data| points at, and use that as an index to
1318 * place the NUL byte in |*val|.
1319 */
1320 size_t data_length = p->data_size;
1321
1fac2705
TM
1322 if (ret == 0)
1323 return 0;
247a1786
RL
1324 if (data_length >= max_len)
1325 data_length = OPENSSL_strnlen(p->data, data_length);
ac1082f0
P
1326 if (data_length >= max_len) {
1327 ERR_raise(ERR_LIB_CRYPTO, CRYPTO_R_NO_SPACE_FOR_TERMINATING_NULL);
247a1786 1328 return 0; /* No space for a terminating NUL byte */
ac1082f0 1329 }
1fac2705 1330 (*val)[data_length] = '\0';
247a1786
RL
1331
1332 return ret;
7ffbd7ca
P
1333}
1334
1335int OSSL_PARAM_get_octet_string(const OSSL_PARAM *p, void **val, size_t max_len,
1336 size_t *used_len)
1337{
247a1786 1338 return get_string_internal(p, val, &max_len, used_len,
7ffbd7ca
P
1339 OSSL_PARAM_OCTET_STRING);
1340}
1341
4e7991b4 1342static int set_string_internal(OSSL_PARAM *p, const void *val, size_t len,
7ffbd7ca
P
1343 unsigned int type)
1344{
4e7991b4 1345 p->return_size = len;
8f3b8fd6
RL
1346 if (p->data == NULL)
1347 return 1;
ac1082f0
P
1348 if (p->data_type != type) {
1349 err_bad_type;
7ffbd7ca 1350 return 0;
ac1082f0
P
1351 }
1352 if (p->data_size < len) {
1353 err_too_small;
1354 return 0;
1355 }
7ffbd7ca
P
1356
1357 memcpy(p->data, val, len);
247a1786
RL
1358 /* If possible within the size of p->data, add a NUL terminator byte */
1359 if (type == OSSL_PARAM_UTF8_STRING && p->data_size > len)
1360 ((char *)p->data)[len] = '\0';
7ffbd7ca
P
1361 return 1;
1362}
1363
4e7991b4 1364int OSSL_PARAM_set_utf8_string(OSSL_PARAM *p, const char *val)
7ffbd7ca 1365{
ac1082f0
P
1366 if (p == NULL) {
1367 err_null_argument;
7ffbd7ca 1368 return 0;
ac1082f0 1369 }
7ffbd7ca 1370
4e7991b4 1371 p->return_size = 0;
ac1082f0
P
1372 if (val == NULL) {
1373 err_null_argument;
7ffbd7ca 1374 return 0;
ac1082f0 1375 }
247a1786 1376 return set_string_internal(p, val, strlen(val), OSSL_PARAM_UTF8_STRING);
7ffbd7ca
P
1377}
1378
4e7991b4 1379int OSSL_PARAM_set_octet_string(OSSL_PARAM *p, const void *val,
7ffbd7ca
P
1380 size_t len)
1381{
ac1082f0
P
1382 if (p == NULL) {
1383 err_null_argument;
7ffbd7ca 1384 return 0;
ac1082f0 1385 }
7ffbd7ca 1386
4e7991b4 1387 p->return_size = 0;
ac1082f0
P
1388 if (val == NULL) {
1389 err_null_argument;
7ffbd7ca 1390 return 0;
ac1082f0 1391 }
7ffbd7ca
P
1392 return set_string_internal(p, val, len, OSSL_PARAM_OCTET_STRING);
1393}
1394
1395OSSL_PARAM OSSL_PARAM_construct_utf8_string(const char *key, char *buf,
4e7991b4 1396 size_t bsize)
7ffbd7ca 1397{
7f588d20 1398 if (buf != NULL && bsize == 0)
247a1786 1399 bsize = strlen(buf);
4e7991b4 1400 return ossl_param_construct(key, OSSL_PARAM_UTF8_STRING, buf, bsize);
7ffbd7ca
P
1401}
1402
1403OSSL_PARAM OSSL_PARAM_construct_octet_string(const char *key, void *buf,
4e7991b4 1404 size_t bsize)
7ffbd7ca 1405{
4e7991b4 1406 return ossl_param_construct(key, OSSL_PARAM_OCTET_STRING, buf, bsize);
7ffbd7ca
P
1407}
1408
1409static int get_ptr_internal(const OSSL_PARAM *p, const void **val,
1410 size_t *used_len, unsigned int type)
1411{
ac1082f0
P
1412 if (val == NULL || p == NULL) {
1413 err_null_argument;
1414 return 0;
1415 }
1416 if (p->data_type != type) {
1417 err_bad_type;
7ffbd7ca 1418 return 0;
ac1082f0 1419 }
7ffbd7ca
P
1420 if (used_len != NULL)
1421 *used_len = p->data_size;
1422 *val = *(const void **)p->data;
1423 return 1;
1424}
1425
1426int OSSL_PARAM_get_utf8_ptr(const OSSL_PARAM *p, const char **val)
1427{
1428 return get_ptr_internal(p, (const void **)val, NULL, OSSL_PARAM_UTF8_PTR);
1429}
1430
1431int OSSL_PARAM_get_octet_ptr(const OSSL_PARAM *p, const void **val,
1432 size_t *used_len)
1433{
1434 return get_ptr_internal(p, val, used_len, OSSL_PARAM_OCTET_PTR);
1435}
1436
4e7991b4 1437static int set_ptr_internal(OSSL_PARAM *p, const void *val,
7ffbd7ca
P
1438 unsigned int type, size_t len)
1439{
4e7991b4 1440 p->return_size = len;
ac1082f0
P
1441 if (p->data_type != type) {
1442 err_bad_type;
7ffbd7ca 1443 return 0;
ac1082f0 1444 }
8f3b8fd6
RL
1445 if (p->data != NULL)
1446 *(const void **)p->data = val;
7ffbd7ca
P
1447 return 1;
1448}
1449
4e7991b4 1450int OSSL_PARAM_set_utf8_ptr(OSSL_PARAM *p, const char *val)
7ffbd7ca 1451{
ac1082f0
P
1452 if (p == NULL) {
1453 err_null_argument;
7ffbd7ca 1454 return 0;
ac1082f0 1455 }
4e7991b4 1456 p->return_size = 0;
b3f3ba70 1457 return set_ptr_internal(p, val, OSSL_PARAM_UTF8_PTR,
247a1786 1458 val == NULL ? 0 : strlen(val));
7ffbd7ca
P
1459}
1460
4e7991b4 1461int OSSL_PARAM_set_octet_ptr(OSSL_PARAM *p, const void *val,
7ffbd7ca
P
1462 size_t used_len)
1463{
ac1082f0
P
1464 if (p == NULL) {
1465 err_null_argument;
7ffbd7ca 1466 return 0;
ac1082f0 1467 }
4e7991b4 1468 p->return_size = 0;
7ffbd7ca
P
1469 return set_ptr_internal(p, val, OSSL_PARAM_OCTET_PTR, used_len);
1470}
1471
1472OSSL_PARAM OSSL_PARAM_construct_utf8_ptr(const char *key, char **buf,
4e7991b4 1473 size_t bsize)
7ffbd7ca 1474{
4e7991b4 1475 return ossl_param_construct(key, OSSL_PARAM_UTF8_PTR, buf, bsize);
7ffbd7ca
P
1476}
1477
1478OSSL_PARAM OSSL_PARAM_construct_octet_ptr(const char *key, void **buf,
4e7991b4 1479 size_t bsize)
7ffbd7ca 1480{
4e7991b4 1481 return ossl_param_construct(key, OSSL_PARAM_OCTET_PTR, buf, bsize);
7ffbd7ca 1482}
195852fe
RL
1483
1484OSSL_PARAM OSSL_PARAM_construct_end(void)
1485{
1486 OSSL_PARAM end = OSSL_PARAM_END;
1487
1488 return end;
1489}
ab00ddb5
RL
1490
1491static int get_string_ptr_internal(const OSSL_PARAM *p, const void **val,
1492 size_t *used_len, unsigned int type)
1493{
ac1082f0
P
1494 if (val == NULL || p == NULL) {
1495 err_null_argument;
ab00ddb5 1496 return 0;
ac1082f0
P
1497 }
1498 if (p->data_type != type) {
1499 err_bad_type;
1500 return 0;
1501 }
ab00ddb5
RL
1502 if (used_len != NULL)
1503 *used_len = p->data_size;
1504 *val = p->data;
1505 return 1;
1506}
1507
1508int OSSL_PARAM_get_utf8_string_ptr(const OSSL_PARAM *p, const char **val)
1509{
327a720d
TM
1510 int rv;
1511
1512 ERR_set_mark();
1513 rv = OSSL_PARAM_get_utf8_ptr(p, val);
1514 ERR_pop_to_mark();
1515
1516 return rv || get_string_ptr_internal(p, (const void **)val, NULL,
1517 OSSL_PARAM_UTF8_STRING);
ab00ddb5
RL
1518}
1519
1520int OSSL_PARAM_get_octet_string_ptr(const OSSL_PARAM *p, const void **val,
1521 size_t *used_len)
1522{
327a720d
TM
1523 int rv;
1524
1525 ERR_set_mark();
1526 rv = OSSL_PARAM_get_octet_ptr(p, val, used_len);
1527 ERR_pop_to_mark();
1528
1529 return rv || get_string_ptr_internal(p, val, used_len,
1530 OSSL_PARAM_OCTET_STRING);
ab00ddb5 1531}