mirror of
https://github.com/openssl/openssl.git
synced 2024-11-27 05:21:51 +08:00
e3efe7a532
The openssl provider app will now display these params. Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/12396)
97 lines
2.8 KiB
C
97 lines
2.8 KiB
C
/*
|
|
* Copyright 2019 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include "apps.h"
|
|
#include "app_params.h"
|
|
|
|
static int describe_param_type(char *buf, size_t bufsz, const OSSL_PARAM *param)
|
|
{
|
|
const char *type_mod = "";
|
|
const char *type = NULL;
|
|
int show_type_number = 0;
|
|
int printed_len;
|
|
|
|
switch (param->data_type) {
|
|
case OSSL_PARAM_UNSIGNED_INTEGER:
|
|
type_mod = "unsigned ";
|
|
/* FALLTHRU */
|
|
case OSSL_PARAM_INTEGER:
|
|
type = "integer";
|
|
break;
|
|
case OSSL_PARAM_UTF8_PTR:
|
|
type_mod = "pointer to a ";
|
|
/* FALLTHRU */
|
|
case OSSL_PARAM_UTF8_STRING:
|
|
type = "UTF8 encoded string";
|
|
break;
|
|
case OSSL_PARAM_OCTET_PTR:
|
|
type_mod = "pointer to an ";
|
|
/* FALLTHRU */
|
|
case OSSL_PARAM_OCTET_STRING:
|
|
type = "octet string";
|
|
break;
|
|
default:
|
|
type = "unknown type";
|
|
show_type_number = 1;
|
|
break;
|
|
}
|
|
|
|
printed_len = BIO_snprintf(buf, bufsz, "%s: ", param->key);
|
|
if (printed_len > 0) {
|
|
buf += printed_len;
|
|
bufsz -= printed_len;
|
|
}
|
|
printed_len = BIO_snprintf(buf, bufsz, "%s%s", type_mod, type);
|
|
if (printed_len > 0) {
|
|
buf += printed_len;
|
|
bufsz -= printed_len;
|
|
}
|
|
if (show_type_number) {
|
|
printed_len = BIO_snprintf(buf, bufsz, " [%d]", param->data_type);
|
|
if (printed_len > 0) {
|
|
buf += printed_len;
|
|
bufsz -= printed_len;
|
|
}
|
|
}
|
|
if (param->data_size == 0)
|
|
printed_len = BIO_snprintf(buf, bufsz, " (arbitrary size)");
|
|
else
|
|
printed_len = BIO_snprintf(buf, bufsz, " (max %zu bytes large)",
|
|
param->data_size);
|
|
if (printed_len > 0) {
|
|
buf += printed_len;
|
|
bufsz -= printed_len;
|
|
}
|
|
*buf = '\0';
|
|
return 1;
|
|
}
|
|
|
|
int print_param_types(const char *thing, const OSSL_PARAM *pdefs, int indent)
|
|
{
|
|
if (pdefs == NULL) {
|
|
return 1;
|
|
} else if (pdefs->key == NULL) {
|
|
/*
|
|
* An empty list? This shouldn't happen, but let's just make sure to
|
|
* say something if there's a badly written provider...
|
|
*/
|
|
BIO_printf(bio_out, "%*sEmpty list of %s (!!!)\n", indent, "", thing);
|
|
} else {
|
|
BIO_printf(bio_out, "%*s%s:\n", indent, "", thing);
|
|
for (; pdefs->key != NULL; pdefs++) {
|
|
char buf[200]; /* This should be ample space */
|
|
|
|
describe_param_type(buf, sizeof(buf), pdefs);
|
|
BIO_printf(bio_out, "%*s %s\n", indent, "", buf);
|
|
}
|
|
}
|
|
return 1;
|
|
}
|
|
|