File Coverage

src/x509/x509_knownkey.c
Criterion Covered Total %
statement 0 27 0.0
branch 0 2 0.0
condition n/a
subroutine n/a
pod n/a
total 0 29 0.0


line stmt bran cond sub pod time code
1             /*
2             * Copyright (c) 2016 Thomas Pornin
3             *
4             * Permission is hereby granted, free of charge, to any person obtaining
5             * a copy of this software and associated documentation files (the
6             * "Software"), to deal in the Software without restriction, including
7             * without limitation the rights to use, copy, modify, merge, publish,
8             * distribute, sublicense, and/or sell copies of the Software, and to
9             * permit persons to whom the Software is furnished to do so, subject to
10             * the following conditions:
11             *
12             * The above copyright notice and this permission notice shall be
13             * included in all copies or substantial portions of the Software.
14             *
15             * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
16             * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
17             * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
18             * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
19             * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
20             * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
21             * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
22             * SOFTWARE.
23             */
24              
25             #include "inner.h"
26              
27             /* see bearssl_x509.h */
28             void
29 0           br_x509_knownkey_init_rsa(br_x509_knownkey_context *ctx,
30             const br_rsa_public_key *pk, unsigned usages)
31             {
32 0           ctx->vtable = &br_x509_knownkey_vtable;
33 0           ctx->pkey.key_type = BR_KEYTYPE_RSA;
34 0           ctx->pkey.key.rsa = *pk;
35 0           ctx->usages = usages;
36 0           }
37              
38             /* see bearssl_x509.h */
39             void
40 0           br_x509_knownkey_init_ec(br_x509_knownkey_context *ctx,
41             const br_ec_public_key *pk, unsigned usages)
42             {
43 0           ctx->vtable = &br_x509_knownkey_vtable;
44 0           ctx->pkey.key_type = BR_KEYTYPE_EC;
45 0           ctx->pkey.key.ec = *pk;
46 0           ctx->usages = usages;
47 0           }
48              
49             static void
50 0           kk_start_chain(const br_x509_class **ctx, const char *server_name)
51             {
52             (void)ctx;
53             (void)server_name;
54 0           }
55              
56             static void
57 0           kk_start_cert(const br_x509_class **ctx, uint32_t length)
58             {
59             (void)ctx;
60             (void)length;
61 0           }
62              
63             static void
64 0           kk_append(const br_x509_class **ctx, const unsigned char *buf, size_t len)
65             {
66             (void)ctx;
67             (void)buf;
68             (void)len;
69 0           }
70              
71             static void
72 0           kk_end_cert(const br_x509_class **ctx)
73             {
74             (void)ctx;
75 0           }
76              
77             static unsigned
78 0           kk_end_chain(const br_x509_class **ctx)
79             {
80             (void)ctx;
81 0           return 0;
82             }
83              
84             static const br_x509_pkey *
85 0           kk_get_pkey(const br_x509_class *const *ctx, unsigned *usages)
86             {
87             const br_x509_knownkey_context *xc;
88              
89 0           xc = (const br_x509_knownkey_context *)ctx;
90 0 0         if (usages != NULL) {
91 0           *usages = xc->usages;
92             }
93 0           return &xc->pkey;
94             }
95              
96             /* see bearssl_x509.h */
97             const br_x509_class br_x509_knownkey_vtable = {
98             sizeof(br_x509_knownkey_context),
99             kk_start_chain,
100             kk_start_cert,
101             kk_append,
102             kk_end_cert,
103             kk_end_chain,
104             kk_get_pkey
105             };