/src/boringssl/include/openssl/bytestring.h
Line | Count | Source (jump to first uncovered line) |
1 | | /* Copyright (c) 2014, Google Inc. |
2 | | * |
3 | | * Permission to use, copy, modify, and/or distribute this software for any |
4 | | * purpose with or without fee is hereby granted, provided that the above |
5 | | * copyright notice and this permission notice appear in all copies. |
6 | | * |
7 | | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
8 | | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
9 | | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY |
10 | | * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
11 | | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION |
12 | | * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN |
13 | | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ |
14 | | |
15 | | #ifndef OPENSSL_HEADER_BYTESTRING_H |
16 | | #define OPENSSL_HEADER_BYTESTRING_H |
17 | | |
18 | | #include <openssl/base.h> |
19 | | |
20 | | #include <openssl/span.h> |
21 | | #include <time.h> |
22 | | |
23 | | #if defined(__cplusplus) |
24 | | extern "C" { |
25 | | #endif |
26 | | |
27 | | |
28 | | // Bytestrings are used for parsing and building TLS and ASN.1 messages. |
29 | | // |
30 | | // A "CBS" (CRYPTO ByteString) represents a string of bytes in memory and |
31 | | // provides utility functions for safely parsing length-prefixed structures |
32 | | // like TLS and ASN.1 from it. |
33 | | // |
34 | | // A "CBB" (CRYPTO ByteBuilder) is a memory buffer that grows as needed and |
35 | | // provides utility functions for building length-prefixed messages. |
36 | | |
37 | | |
38 | | // CRYPTO ByteString |
39 | | |
40 | | struct cbs_st { |
41 | | const uint8_t *data; |
42 | | size_t len; |
43 | | |
44 | | #if !defined(BORINGSSL_NO_CXX) |
45 | | // Allow implicit conversions to and from bssl::Span<const uint8_t>. |
46 | | cbs_st(bssl::Span<const uint8_t> span) |
47 | 0 | : data(span.data()), len(span.size()) {} |
48 | 0 | operator bssl::Span<const uint8_t>() const { |
49 | 0 | return bssl::MakeConstSpan(data, len); |
50 | 0 | } |
51 | | |
52 | | // Defining any constructors requires we explicitly default the others. |
53 | | cbs_st() = default; |
54 | | cbs_st(const cbs_st &) = default; |
55 | | cbs_st &operator=(const cbs_st &) = default; |
56 | | #endif |
57 | | }; |
58 | | |
59 | | // CBS_init sets |cbs| to point to |data|. It does not take ownership of |
60 | | // |data|. |
61 | 244 | OPENSSL_INLINE void CBS_init(CBS *cbs, const uint8_t *data, size_t len) { |
62 | 244 | cbs->data = data; |
63 | 244 | cbs->len = len; |
64 | 244 | } Unexecuted instantiation: CBS_init Unexecuted instantiation: a_int.c:CBS_init Unexecuted instantiation: asn1_lib.c:CBS_init Unexecuted instantiation: bcm.c:CBS_init Unexecuted instantiation: cbb.c:CBS_init Line | Count | Source | 61 | 183 | OPENSSL_INLINE void CBS_init(CBS *cbs, const uint8_t *data, size_t len) { | 62 | 183 | cbs->data = data; | 63 | 183 | cbs->len = len; | 64 | 183 | } |
Unexecuted instantiation: convert.c:CBS_init Unexecuted instantiation: digest_extra.c:CBS_init Line | Count | Source | 61 | 61 | OPENSSL_INLINE void CBS_init(CBS *cbs, const uint8_t *data, size_t len) { | 62 | 61 | cbs->data = data; | 63 | 61 | cbs->len = len; | 64 | 61 | } |
Unexecuted instantiation: ecdsa_asn1.c:CBS_init Unexecuted instantiation: obj.c:CBS_init Unexecuted instantiation: p_dsa_asn1.c:CBS_init Unexecuted instantiation: p_ec_asn1.c:CBS_init Unexecuted instantiation: p_ed25519_asn1.c:CBS_init Unexecuted instantiation: p_hkdf.c:CBS_init Unexecuted instantiation: p_rsa.c:CBS_init Unexecuted instantiation: p_rsa_asn1.c:CBS_init Unexecuted instantiation: p_x25519_asn1.c:CBS_init Unexecuted instantiation: rsa_asn1.c:CBS_init Unexecuted instantiation: a_object.c:CBS_init Unexecuted instantiation: asn1_compat.c:CBS_init Unexecuted instantiation: bn_asn1.c:CBS_init Unexecuted instantiation: ec_asn1.c:CBS_init Unexecuted instantiation: tasn_dec.c:CBS_init Unexecuted instantiation: tasn_new.c:CBS_init Unexecuted instantiation: tasn_utl.c:CBS_init Unexecuted instantiation: unicode.c:CBS_init Unexecuted instantiation: a_type.c:CBS_init Unexecuted instantiation: pool.c:CBS_init |
65 | | |
66 | | // CBS_skip advances |cbs| by |len| bytes. It returns one on success and zero |
67 | | // otherwise. |
68 | | OPENSSL_EXPORT int CBS_skip(CBS *cbs, size_t len); |
69 | | |
70 | | // CBS_data returns a pointer to the contents of |cbs|. |
71 | 183 | OPENSSL_INLINE const uint8_t *CBS_data(const CBS *cbs) { return cbs->data; } Unexecuted instantiation: CBS_data Unexecuted instantiation: a_int.c:CBS_data Unexecuted instantiation: asn1_lib.c:CBS_data Unexecuted instantiation: bcm.c:CBS_data Unexecuted instantiation: cbb.c:CBS_data Unexecuted instantiation: cbs.c:CBS_data Unexecuted instantiation: convert.c:CBS_data Unexecuted instantiation: digest_extra.c:CBS_data Line | Count | Source | 71 | 61 | OPENSSL_INLINE const uint8_t *CBS_data(const CBS *cbs) { return cbs->data; } |
Unexecuted instantiation: ecdsa_asn1.c:CBS_data Unexecuted instantiation: obj.c:CBS_data Unexecuted instantiation: p_dsa_asn1.c:CBS_data Unexecuted instantiation: p_ec_asn1.c:CBS_data Unexecuted instantiation: p_ed25519_asn1.c:CBS_data Unexecuted instantiation: p_hkdf.c:CBS_data Unexecuted instantiation: p_rsa.c:CBS_data Unexecuted instantiation: p_rsa_asn1.c:CBS_data Unexecuted instantiation: p_x25519_asn1.c:CBS_data Unexecuted instantiation: rsa_asn1.c:CBS_data Unexecuted instantiation: a_object.c:CBS_data Unexecuted instantiation: asn1_compat.c:CBS_data Line | Count | Source | 71 | 122 | OPENSSL_INLINE const uint8_t *CBS_data(const CBS *cbs) { return cbs->data; } |
Unexecuted instantiation: ec_asn1.c:CBS_data Unexecuted instantiation: tasn_dec.c:CBS_data Unexecuted instantiation: tasn_new.c:CBS_data Unexecuted instantiation: tasn_utl.c:CBS_data Unexecuted instantiation: unicode.c:CBS_data Unexecuted instantiation: a_type.c:CBS_data Unexecuted instantiation: pool.c:CBS_data |
72 | | |
73 | | // CBS_len returns the number of bytes remaining in |cbs|. |
74 | 549 | OPENSSL_INLINE size_t CBS_len(const CBS *cbs) { return cbs->len; } Unexecuted instantiation: CBS_len Unexecuted instantiation: a_int.c:CBS_len Unexecuted instantiation: asn1_lib.c:CBS_len Unexecuted instantiation: bcm.c:CBS_len Unexecuted instantiation: cbb.c:CBS_len Line | Count | Source | 74 | 366 | OPENSSL_INLINE size_t CBS_len(const CBS *cbs) { return cbs->len; } |
Unexecuted instantiation: convert.c:CBS_len Unexecuted instantiation: digest_extra.c:CBS_len Line | Count | Source | 74 | 61 | OPENSSL_INLINE size_t CBS_len(const CBS *cbs) { return cbs->len; } |
Unexecuted instantiation: ecdsa_asn1.c:CBS_len Unexecuted instantiation: obj.c:CBS_len Unexecuted instantiation: p_dsa_asn1.c:CBS_len Unexecuted instantiation: p_ec_asn1.c:CBS_len Unexecuted instantiation: p_ed25519_asn1.c:CBS_len Unexecuted instantiation: p_hkdf.c:CBS_len Unexecuted instantiation: p_rsa.c:CBS_len Unexecuted instantiation: p_rsa_asn1.c:CBS_len Unexecuted instantiation: p_x25519_asn1.c:CBS_len Unexecuted instantiation: rsa_asn1.c:CBS_len Unexecuted instantiation: a_object.c:CBS_len Unexecuted instantiation: asn1_compat.c:CBS_len Line | Count | Source | 74 | 122 | OPENSSL_INLINE size_t CBS_len(const CBS *cbs) { return cbs->len; } |
Unexecuted instantiation: ec_asn1.c:CBS_len Unexecuted instantiation: tasn_dec.c:CBS_len Unexecuted instantiation: tasn_new.c:CBS_len Unexecuted instantiation: tasn_utl.c:CBS_len Unexecuted instantiation: unicode.c:CBS_len Unexecuted instantiation: a_type.c:CBS_len Unexecuted instantiation: pool.c:CBS_len |
75 | | |
76 | | // CBS_stow copies the current contents of |cbs| into |*out_ptr| and |
77 | | // |*out_len|. If |*out_ptr| is not NULL, the contents are freed with |
78 | | // OPENSSL_free. It returns one on success and zero on allocation failure. On |
79 | | // success, |*out_ptr| should be freed with OPENSSL_free. If |cbs| is empty, |
80 | | // |*out_ptr| will be NULL. |
81 | | OPENSSL_EXPORT int CBS_stow(const CBS *cbs, uint8_t **out_ptr, size_t *out_len); |
82 | | |
83 | | // CBS_strdup copies the current contents of |cbs| into |*out_ptr| as a |
84 | | // NUL-terminated C string. If |*out_ptr| is not NULL, the contents are freed |
85 | | // with OPENSSL_free. It returns one on success and zero on allocation |
86 | | // failure. On success, |*out_ptr| should be freed with OPENSSL_free. |
87 | | // |
88 | | // NOTE: If |cbs| contains NUL bytes, the string will be truncated. Call |
89 | | // |CBS_contains_zero_byte(cbs)| to check for NUL bytes. |
90 | | OPENSSL_EXPORT int CBS_strdup(const CBS *cbs, char **out_ptr); |
91 | | |
92 | | // CBS_contains_zero_byte returns one if the current contents of |cbs| contains |
93 | | // a NUL byte and zero otherwise. |
94 | | OPENSSL_EXPORT int CBS_contains_zero_byte(const CBS *cbs); |
95 | | |
96 | | // CBS_mem_equal compares the current contents of |cbs| with the |len| bytes |
97 | | // starting at |data|. If they're equal, it returns one, otherwise zero. If the |
98 | | // lengths match, it uses a constant-time comparison. |
99 | | OPENSSL_EXPORT int CBS_mem_equal(const CBS *cbs, const uint8_t *data, |
100 | | size_t len); |
101 | | |
102 | | // CBS_get_u8 sets |*out| to the next uint8_t from |cbs| and advances |cbs|. It |
103 | | // returns one on success and zero on error. |
104 | | OPENSSL_EXPORT int CBS_get_u8(CBS *cbs, uint8_t *out); |
105 | | |
106 | | // CBS_get_u16 sets |*out| to the next, big-endian uint16_t from |cbs| and |
107 | | // advances |cbs|. It returns one on success and zero on error. |
108 | | OPENSSL_EXPORT int CBS_get_u16(CBS *cbs, uint16_t *out); |
109 | | |
110 | | // CBS_get_u16le sets |*out| to the next, little-endian uint16_t from |cbs| and |
111 | | // advances |cbs|. It returns one on success and zero on error. |
112 | | OPENSSL_EXPORT int CBS_get_u16le(CBS *cbs, uint16_t *out); |
113 | | |
114 | | // CBS_get_u24 sets |*out| to the next, big-endian 24-bit value from |cbs| and |
115 | | // advances |cbs|. It returns one on success and zero on error. |
116 | | OPENSSL_EXPORT int CBS_get_u24(CBS *cbs, uint32_t *out); |
117 | | |
118 | | // CBS_get_u32 sets |*out| to the next, big-endian uint32_t value from |cbs| |
119 | | // and advances |cbs|. It returns one on success and zero on error. |
120 | | OPENSSL_EXPORT int CBS_get_u32(CBS *cbs, uint32_t *out); |
121 | | |
122 | | // CBS_get_u32le sets |*out| to the next, little-endian uint32_t value from |
123 | | // |cbs| and advances |cbs|. It returns one on success and zero on error. |
124 | | OPENSSL_EXPORT int CBS_get_u32le(CBS *cbs, uint32_t *out); |
125 | | |
126 | | // CBS_get_u64 sets |*out| to the next, big-endian uint64_t value from |cbs| |
127 | | // and advances |cbs|. It returns one on success and zero on error. |
128 | | OPENSSL_EXPORT int CBS_get_u64(CBS *cbs, uint64_t *out); |
129 | | |
130 | | // CBS_get_u64le sets |*out| to the next, little-endian uint64_t value from |
131 | | // |cbs| and advances |cbs|. It returns one on success and zero on error. |
132 | | OPENSSL_EXPORT int CBS_get_u64le(CBS *cbs, uint64_t *out); |
133 | | |
134 | | // CBS_get_last_u8 sets |*out| to the last uint8_t from |cbs| and shortens |
135 | | // |cbs|. It returns one on success and zero on error. |
136 | | OPENSSL_EXPORT int CBS_get_last_u8(CBS *cbs, uint8_t *out); |
137 | | |
138 | | // CBS_get_bytes sets |*out| to the next |len| bytes from |cbs| and advances |
139 | | // |cbs|. It returns one on success and zero on error. |
140 | | OPENSSL_EXPORT int CBS_get_bytes(CBS *cbs, CBS *out, size_t len); |
141 | | |
142 | | // CBS_copy_bytes copies the next |len| bytes from |cbs| to |out| and advances |
143 | | // |cbs|. It returns one on success and zero on error. |
144 | | OPENSSL_EXPORT int CBS_copy_bytes(CBS *cbs, uint8_t *out, size_t len); |
145 | | |
146 | | // CBS_get_u8_length_prefixed sets |*out| to the contents of an 8-bit, |
147 | | // length-prefixed value from |cbs| and advances |cbs| over it. It returns one |
148 | | // on success and zero on error. |
149 | | OPENSSL_EXPORT int CBS_get_u8_length_prefixed(CBS *cbs, CBS *out); |
150 | | |
151 | | // CBS_get_u16_length_prefixed sets |*out| to the contents of a 16-bit, |
152 | | // big-endian, length-prefixed value from |cbs| and advances |cbs| over it. It |
153 | | // returns one on success and zero on error. |
154 | | OPENSSL_EXPORT int CBS_get_u16_length_prefixed(CBS *cbs, CBS *out); |
155 | | |
156 | | // CBS_get_u24_length_prefixed sets |*out| to the contents of a 24-bit, |
157 | | // big-endian, length-prefixed value from |cbs| and advances |cbs| over it. It |
158 | | // returns one on success and zero on error. |
159 | | OPENSSL_EXPORT int CBS_get_u24_length_prefixed(CBS *cbs, CBS *out); |
160 | | |
161 | | // CBS_get_until_first finds the first instance of |c| in |cbs|. If found, it |
162 | | // sets |*out| to the text before the match, advances |cbs| over it, and returns |
163 | | // one. Otherwise, it returns zero and leaves |cbs| unmodified. |
164 | | OPENSSL_EXPORT int CBS_get_until_first(CBS *cbs, CBS *out, uint8_t c); |
165 | | |
166 | | // CBS_get_u64_decimal reads a decimal integer from |cbs| and writes it to |
167 | | // |*out|. It stops reading at the end of the string, or the first non-digit |
168 | | // character. It returns one on success and zero on error. This function behaves |
169 | | // analogously to |strtoul| except it does not accept empty inputs, leading |
170 | | // zeros, or negative values. |
171 | | OPENSSL_EXPORT int CBS_get_u64_decimal(CBS *cbs, uint64_t *out); |
172 | | |
173 | | |
174 | | // Parsing ASN.1 |
175 | | // |
176 | | // |CBS| may be used to parse DER structures. Rather than using a schema |
177 | | // compiler, the following functions act on tag-length-value elements in the |
178 | | // serialization itself. Thus the caller is responsible for looping over a |
179 | | // SEQUENCE, branching on CHOICEs or OPTIONAL fields, checking for trailing |
180 | | // data, and handling explict vs. implicit tagging. |
181 | | // |
182 | | // Tags are represented as |CBS_ASN1_TAG| values in memory. The upper few bits |
183 | | // store the class and constructed bit, and the remaining bits store the tag |
184 | | // number. Note this differs from the DER serialization, to support tag numbers |
185 | | // beyond 31. Consumers must use the constants defined below to decompose or |
186 | | // assemble tags. |
187 | | // |
188 | | // This library treats an element's constructed bit as part of its tag. In DER, |
189 | | // the constructed bit is computable from the type. The constants for universal |
190 | | // types have the bit set. Callers must set it correctly for tagged types. |
191 | | // Explicitly-tagged types are always constructed, and implicitly-tagged types |
192 | | // inherit the underlying type's bit. |
193 | | |
194 | | // CBS_ASN1_TAG_SHIFT is how much the in-memory representation shifts the class |
195 | | // and constructed bits from the DER serialization. |
196 | 1.28k | #define CBS_ASN1_TAG_SHIFT 24 |
197 | | |
198 | | // CBS_ASN1_CONSTRUCTED may be ORed into a tag to set the constructed bit. |
199 | 366 | #define CBS_ASN1_CONSTRUCTED (0x20u << CBS_ASN1_TAG_SHIFT) |
200 | | |
201 | | // The following values specify the tag class and may be ORed into a tag number |
202 | | // to produce the final tag. If none is used, the tag will be UNIVERSAL. |
203 | | #define CBS_ASN1_UNIVERSAL (0u << CBS_ASN1_TAG_SHIFT) |
204 | | #define CBS_ASN1_APPLICATION (0x40u << CBS_ASN1_TAG_SHIFT) |
205 | | #define CBS_ASN1_CONTEXT_SPECIFIC (0x80u << CBS_ASN1_TAG_SHIFT) |
206 | | #define CBS_ASN1_PRIVATE (0xc0u << CBS_ASN1_TAG_SHIFT) |
207 | | |
208 | | // CBS_ASN1_CLASS_MASK may be ANDed with a tag to query its class. This will |
209 | | // give one of the four values above. |
210 | 0 | #define CBS_ASN1_CLASS_MASK (0xc0u << CBS_ASN1_TAG_SHIFT) |
211 | | |
212 | | // CBS_ASN1_TAG_NUMBER_MASK may be ANDed with a tag to query its number. |
213 | 366 | #define CBS_ASN1_TAG_NUMBER_MASK ((1u << (5 + CBS_ASN1_TAG_SHIFT)) - 1) |
214 | | |
215 | | // The following values are constants for UNIVERSAL tags. Note these constants |
216 | | // include the constructed bit. |
217 | 0 | #define CBS_ASN1_BOOLEAN 0x1u |
218 | 366 | #define CBS_ASN1_INTEGER 0x2u |
219 | 0 | #define CBS_ASN1_BITSTRING 0x3u |
220 | 0 | #define CBS_ASN1_OCTETSTRING 0x4u |
221 | 0 | #define CBS_ASN1_NULL 0x5u |
222 | 0 | #define CBS_ASN1_OBJECT 0x6u |
223 | | #define CBS_ASN1_ENUMERATED 0xau |
224 | | #define CBS_ASN1_UTF8STRING 0xcu |
225 | 183 | #define CBS_ASN1_SEQUENCE (0x10u | CBS_ASN1_CONSTRUCTED) |
226 | | #define CBS_ASN1_SET (0x11u | CBS_ASN1_CONSTRUCTED) |
227 | | #define CBS_ASN1_NUMERICSTRING 0x12u |
228 | | #define CBS_ASN1_PRINTABLESTRING 0x13u |
229 | | #define CBS_ASN1_T61STRING 0x14u |
230 | | #define CBS_ASN1_VIDEOTEXSTRING 0x15u |
231 | | #define CBS_ASN1_IA5STRING 0x16u |
232 | | #define CBS_ASN1_UTCTIME 0x17u |
233 | | #define CBS_ASN1_GENERALIZEDTIME 0x18u |
234 | | #define CBS_ASN1_GRAPHICSTRING 0x19u |
235 | | #define CBS_ASN1_VISIBLESTRING 0x1au |
236 | | #define CBS_ASN1_GENERALSTRING 0x1bu |
237 | | #define CBS_ASN1_UNIVERSALSTRING 0x1cu |
238 | | #define CBS_ASN1_BMPSTRING 0x1eu |
239 | | |
240 | | // CBS_get_asn1 sets |*out| to the contents of DER-encoded, ASN.1 element (not |
241 | | // including tag and length bytes) and advances |cbs| over it. The ASN.1 |
242 | | // element must match |tag_value|. It returns one on success and zero |
243 | | // on error. |
244 | | OPENSSL_EXPORT int CBS_get_asn1(CBS *cbs, CBS *out, CBS_ASN1_TAG tag_value); |
245 | | |
246 | | // CBS_get_asn1_element acts like |CBS_get_asn1| but |out| will include the |
247 | | // ASN.1 header bytes too. |
248 | | OPENSSL_EXPORT int CBS_get_asn1_element(CBS *cbs, CBS *out, |
249 | | CBS_ASN1_TAG tag_value); |
250 | | |
251 | | // CBS_peek_asn1_tag looks ahead at the next ASN.1 tag and returns one |
252 | | // if the next ASN.1 element on |cbs| would have tag |tag_value|. If |
253 | | // |cbs| is empty or the tag does not match, it returns zero. Note: if |
254 | | // it returns one, CBS_get_asn1 may still fail if the rest of the |
255 | | // element is malformed. |
256 | | OPENSSL_EXPORT int CBS_peek_asn1_tag(const CBS *cbs, CBS_ASN1_TAG tag_value); |
257 | | |
258 | | // CBS_get_any_asn1 sets |*out| to contain the next ASN.1 element from |*cbs| |
259 | | // (not including tag and length bytes), sets |*out_tag| to the tag number, and |
260 | | // advances |*cbs|. It returns one on success and zero on error. Either of |out| |
261 | | // and |out_tag| may be NULL to ignore the value. |
262 | | OPENSSL_EXPORT int CBS_get_any_asn1(CBS *cbs, CBS *out, |
263 | | CBS_ASN1_TAG *out_tag); |
264 | | |
265 | | // CBS_get_any_asn1_element sets |*out| to contain the next ASN.1 element from |
266 | | // |*cbs| (including header bytes) and advances |*cbs|. It sets |*out_tag| to |
267 | | // the tag number and |*out_header_len| to the length of the ASN.1 header. Each |
268 | | // of |out|, |out_tag|, and |out_header_len| may be NULL to ignore the value. |
269 | | OPENSSL_EXPORT int CBS_get_any_asn1_element(CBS *cbs, CBS *out, |
270 | | CBS_ASN1_TAG *out_tag, |
271 | | size_t *out_header_len); |
272 | | |
273 | | // CBS_get_any_ber_asn1_element acts the same as |CBS_get_any_asn1_element| but |
274 | | // also allows indefinite-length elements to be returned and does not enforce |
275 | | // that lengths are minimal. It sets |*out_indefinite| to one if the length was |
276 | | // indefinite and zero otherwise. If indefinite, |*out_header_len| and |
277 | | // |CBS_len(out)| will be equal as only the header is returned (although this is |
278 | | // also true for empty elements so |*out_indefinite| should be checked). If |
279 | | // |out_ber_found| is not NULL then it is set to one if any case of invalid DER |
280 | | // but valid BER is found, and to zero otherwise. |
281 | | // |
282 | | // This function will not successfully parse an end-of-contents (EOC) as an |
283 | | // element. Callers parsing indefinite-length encoding must check for EOC |
284 | | // separately. |
285 | | OPENSSL_EXPORT int CBS_get_any_ber_asn1_element(CBS *cbs, CBS *out, |
286 | | CBS_ASN1_TAG *out_tag, |
287 | | size_t *out_header_len, |
288 | | int *out_ber_found, |
289 | | int *out_indefinite); |
290 | | |
291 | | // CBS_get_asn1_uint64 gets an ASN.1 INTEGER from |cbs| using |CBS_get_asn1| |
292 | | // and sets |*out| to its value. It returns one on success and zero on error, |
293 | | // where error includes the integer being negative, or too large to represent |
294 | | // in 64 bits. |
295 | | OPENSSL_EXPORT int CBS_get_asn1_uint64(CBS *cbs, uint64_t *out); |
296 | | |
297 | | // CBS_get_asn1_int64 gets an ASN.1 INTEGER from |cbs| using |CBS_get_asn1| |
298 | | // and sets |*out| to its value. It returns one on success and zero on error, |
299 | | // where error includes the integer being too large to represent in 64 bits. |
300 | | OPENSSL_EXPORT int CBS_get_asn1_int64(CBS *cbs, int64_t *out); |
301 | | |
302 | | // CBS_get_asn1_bool gets an ASN.1 BOOLEAN from |cbs| and sets |*out| to zero |
303 | | // or one based on its value. It returns one on success or zero on error. |
304 | | OPENSSL_EXPORT int CBS_get_asn1_bool(CBS *cbs, int *out); |
305 | | |
306 | | // CBS_get_optional_asn1 gets an optional explicitly-tagged element from |cbs| |
307 | | // tagged with |tag| and sets |*out| to its contents, or ignores it if |out| is |
308 | | // NULL. If present and if |out_present| is not NULL, it sets |*out_present| to |
309 | | // one, otherwise zero. It returns one on success, whether or not the element |
310 | | // was present, and zero on decode failure. |
311 | | OPENSSL_EXPORT int CBS_get_optional_asn1(CBS *cbs, CBS *out, int *out_present, |
312 | | CBS_ASN1_TAG tag); |
313 | | |
314 | | // CBS_get_optional_asn1_octet_string gets an optional |
315 | | // explicitly-tagged OCTET STRING from |cbs|. If present, it sets |
316 | | // |*out| to the string and |*out_present| to one. Otherwise, it sets |
317 | | // |*out| to empty and |*out_present| to zero. |out_present| may be |
318 | | // NULL. It returns one on success, whether or not the element was |
319 | | // present, and zero on decode failure. |
320 | | OPENSSL_EXPORT int CBS_get_optional_asn1_octet_string(CBS *cbs, CBS *out, |
321 | | int *out_present, |
322 | | CBS_ASN1_TAG tag); |
323 | | |
324 | | // CBS_get_optional_asn1_uint64 gets an optional explicitly-tagged |
325 | | // INTEGER from |cbs|. If present, it sets |*out| to the |
326 | | // value. Otherwise, it sets |*out| to |default_value|. It returns one |
327 | | // on success, whether or not the element was present, and zero on |
328 | | // decode failure. |
329 | | OPENSSL_EXPORT int CBS_get_optional_asn1_uint64(CBS *cbs, uint64_t *out, |
330 | | CBS_ASN1_TAG tag, |
331 | | uint64_t default_value); |
332 | | |
333 | | // CBS_get_optional_asn1_bool gets an optional, explicitly-tagged BOOLEAN from |
334 | | // |cbs|. If present, it sets |*out| to either zero or one, based on the |
335 | | // boolean. Otherwise, it sets |*out| to |default_value|. It returns one on |
336 | | // success, whether or not the element was present, and zero on decode |
337 | | // failure. |
338 | | OPENSSL_EXPORT int CBS_get_optional_asn1_bool(CBS *cbs, int *out, |
339 | | CBS_ASN1_TAG tag, |
340 | | int default_value); |
341 | | |
342 | | // CBS_is_valid_asn1_bitstring returns one if |cbs| is a valid ASN.1 BIT STRING |
343 | | // body and zero otherwise. |
344 | | OPENSSL_EXPORT int CBS_is_valid_asn1_bitstring(const CBS *cbs); |
345 | | |
346 | | // CBS_asn1_bitstring_has_bit returns one if |cbs| is a valid ASN.1 BIT STRING |
347 | | // body and the specified bit is present and set. Otherwise, it returns zero. |
348 | | // |bit| is indexed starting from zero. |
349 | | OPENSSL_EXPORT int CBS_asn1_bitstring_has_bit(const CBS *cbs, unsigned bit); |
350 | | |
351 | | // CBS_is_valid_asn1_integer returns one if |cbs| is a valid ASN.1 INTEGER, |
352 | | // body and zero otherwise. On success, if |out_is_negative| is non-NULL, |
353 | | // |*out_is_negative| will be set to one if |cbs| is negative and zero |
354 | | // otherwise. |
355 | | OPENSSL_EXPORT int CBS_is_valid_asn1_integer(const CBS *cbs, |
356 | | int *out_is_negative); |
357 | | |
358 | | // CBS_is_unsigned_asn1_integer returns one if |cbs| is a valid non-negative |
359 | | // ASN.1 INTEGER body and zero otherwise. |
360 | | OPENSSL_EXPORT int CBS_is_unsigned_asn1_integer(const CBS *cbs); |
361 | | |
362 | | // CBS_is_valid_asn1_oid returns one if |cbs| is a valid DER-encoded ASN.1 |
363 | | // OBJECT IDENTIFIER contents (not including the element framing) and zero |
364 | | // otherwise. This function tolerates arbitrarily large OID components. |
365 | | OPENSSL_EXPORT int CBS_is_valid_asn1_oid(const CBS *cbs); |
366 | | |
367 | | // CBS_asn1_oid_to_text interprets |cbs| as DER-encoded ASN.1 OBJECT IDENTIFIER |
368 | | // contents (not including the element framing) and returns the ASCII |
369 | | // representation (e.g., "1.2.840.113554.4.1.72585") in a newly-allocated |
370 | | // string, or NULL on failure. The caller must release the result with |
371 | | // |OPENSSL_free|. |
372 | | // |
373 | | // This function may fail if |cbs| is an invalid OBJECT IDENTIFIER, or if any |
374 | | // OID components are too large. |
375 | | OPENSSL_EXPORT char *CBS_asn1_oid_to_text(const CBS *cbs); |
376 | | |
377 | | |
378 | | // CBS_parse_generalized_time returns one if |cbs| is a valid DER-encoded, ASN.1 |
379 | | // GeneralizedTime body within the limitations imposed by RFC 5280, or zero |
380 | | // otherwise. If |allow_timezone_offset| is non-zero, four-digit timezone |
381 | | // offsets, which would not be allowed by DER, are permitted. On success, if |
382 | | // |out_tm| is non-NULL, |*out_tm| will be zeroed, and then set to the |
383 | | // corresponding time in UTC. This function does not compute |out_tm->tm_wday| |
384 | | // or |out_tm->tm_yday|. |
385 | | OPENSSL_EXPORT int CBS_parse_generalized_time(const CBS *cbs, struct tm *out_tm, |
386 | | int allow_timezone_offset); |
387 | | |
388 | | // CBS_parse_utc_time returns one if |cbs| is a valid DER-encoded, ASN.1 |
389 | | // UTCTime body within the limitations imposed by RFC 5280, or zero otherwise. |
390 | | // If |allow_timezone_offset| is non-zero, four-digit timezone offsets, which |
391 | | // would not be allowed by DER, are permitted. On success, if |out_tm| is |
392 | | // non-NULL, |*out_tm| will be zeroed, and then set to the corresponding time |
393 | | // in UTC. This function does not compute |out_tm->tm_wday| or |
394 | | // |out_tm->tm_yday|. |
395 | | OPENSSL_EXPORT int CBS_parse_utc_time(const CBS *cbs, struct tm *out_tm, |
396 | | int allow_timezone_offset); |
397 | | |
398 | | // CRYPTO ByteBuilder. |
399 | | // |
400 | | // |CBB| objects allow one to build length-prefixed serialisations. A |CBB| |
401 | | // object is associated with a buffer and new buffers are created with |
402 | | // |CBB_init|. Several |CBB| objects can point at the same buffer when a |
403 | | // length-prefix is pending, however only a single |CBB| can be 'current' at |
404 | | // any one time. For example, if one calls |CBB_add_u8_length_prefixed| then |
405 | | // the new |CBB| points at the same buffer as the original. But if the original |
406 | | // |CBB| is used then the length prefix is written out and the new |CBB| must |
407 | | // not be used again. |
408 | | // |
409 | | // If one needs to force a length prefix to be written out because a |CBB| is |
410 | | // going out of scope, use |CBB_flush|. If an operation on a |CBB| fails, it is |
411 | | // in an undefined state and must not be used except to call |CBB_cleanup|. |
412 | | |
413 | | struct cbb_buffer_st { |
414 | | uint8_t *buf; |
415 | | // len is the number of valid bytes in |buf|. |
416 | | size_t len; |
417 | | // cap is the size of |buf|. |
418 | | size_t cap; |
419 | | // can_resize is one iff |buf| is owned by this object. If not then |buf| |
420 | | // cannot be resized. |
421 | | unsigned can_resize : 1; |
422 | | // error is one if there was an error writing to this CBB. All future |
423 | | // operations will fail. |
424 | | unsigned error : 1; |
425 | | }; |
426 | | |
427 | | struct cbb_child_st { |
428 | | // base is a pointer to the buffer this |CBB| writes to. |
429 | | struct cbb_buffer_st *base; |
430 | | // offset is the number of bytes from the start of |base->buf| to this |CBB|'s |
431 | | // pending length prefix. |
432 | | size_t offset; |
433 | | // pending_len_len contains the number of bytes in this |CBB|'s pending |
434 | | // length-prefix, or zero if no length-prefix is pending. |
435 | | uint8_t pending_len_len; |
436 | | unsigned pending_is_asn1 : 1; |
437 | | }; |
438 | | |
439 | | struct cbb_st { |
440 | | // child points to a child CBB if a length-prefix is pending. |
441 | | CBB *child; |
442 | | // is_child is one if this is a child |CBB| and zero if it is a top-level |
443 | | // |CBB|. This determines which arm of the union is valid. |
444 | | char is_child; |
445 | | union { |
446 | | struct cbb_buffer_st base; |
447 | | struct cbb_child_st child; |
448 | | } u; |
449 | | }; |
450 | | |
451 | | // CBB_zero sets an uninitialised |cbb| to the zero state. It must be |
452 | | // initialised with |CBB_init| or |CBB_init_fixed| before use, but it is safe to |
453 | | // call |CBB_cleanup| without a successful |CBB_init|. This may be used for more |
454 | | // uniform cleanup of a |CBB|. |
455 | | OPENSSL_EXPORT void CBB_zero(CBB *cbb); |
456 | | |
457 | | // CBB_init initialises |cbb| with |initial_capacity|. Since a |CBB| grows as |
458 | | // needed, the |initial_capacity| is just a hint. It returns one on success or |
459 | | // zero on allocation failure. |
460 | | OPENSSL_EXPORT int CBB_init(CBB *cbb, size_t initial_capacity); |
461 | | |
462 | | // CBB_init_fixed initialises |cbb| to write to |len| bytes at |buf|. Since |
463 | | // |buf| cannot grow, trying to write more than |len| bytes will cause CBB |
464 | | // functions to fail. This function is infallible and always returns one. It is |
465 | | // safe, but not necessary, to call |CBB_cleanup| on |cbb|. |
466 | | OPENSSL_EXPORT int CBB_init_fixed(CBB *cbb, uint8_t *buf, size_t len); |
467 | | |
468 | | // CBB_cleanup frees all resources owned by |cbb| and other |CBB| objects |
469 | | // writing to the same buffer. This should be used in an error case where a |
470 | | // serialisation is abandoned. |
471 | | // |
472 | | // This function can only be called on a "top level" |CBB|, i.e. one initialised |
473 | | // with |CBB_init| or |CBB_init_fixed|, or a |CBB| set to the zero state with |
474 | | // |CBB_zero|. |
475 | | OPENSSL_EXPORT void CBB_cleanup(CBB *cbb); |
476 | | |
477 | | // CBB_finish completes any pending length prefix and sets |*out_data| to a |
478 | | // malloced buffer and |*out_len| to the length of that buffer. The caller |
479 | | // takes ownership of the buffer and, unless the buffer was fixed with |
480 | | // |CBB_init_fixed|, must call |OPENSSL_free| when done. |
481 | | // |
482 | | // It can only be called on a "top level" |CBB|, i.e. one initialised with |
483 | | // |CBB_init| or |CBB_init_fixed|. It returns one on success and zero on |
484 | | // error. |
485 | | OPENSSL_EXPORT int CBB_finish(CBB *cbb, uint8_t **out_data, size_t *out_len); |
486 | | |
487 | | // CBB_flush causes any pending length prefixes to be written out and any child |
488 | | // |CBB| objects of |cbb| to be invalidated. This allows |cbb| to continue to be |
489 | | // used after the children go out of scope, e.g. when local |CBB| objects are |
490 | | // added as children to a |CBB| that persists after a function returns. This |
491 | | // function returns one on success or zero on error. |
492 | | OPENSSL_EXPORT int CBB_flush(CBB *cbb); |
493 | | |
494 | | // CBB_data returns a pointer to the bytes written to |cbb|. It does not flush |
495 | | // |cbb|. The pointer is valid until the next operation to |cbb|. |
496 | | // |
497 | | // To avoid unfinalized length prefixes, it is a fatal error to call this on a |
498 | | // CBB with any active children. |
499 | | OPENSSL_EXPORT const uint8_t *CBB_data(const CBB *cbb); |
500 | | |
501 | | // CBB_len returns the number of bytes written to |cbb|. It does not flush |
502 | | // |cbb|. |
503 | | // |
504 | | // To avoid unfinalized length prefixes, it is a fatal error to call this on a |
505 | | // CBB with any active children. |
506 | | OPENSSL_EXPORT size_t CBB_len(const CBB *cbb); |
507 | | |
508 | | // CBB_add_u8_length_prefixed sets |*out_contents| to a new child of |cbb|. The |
509 | | // data written to |*out_contents| will be prefixed in |cbb| with an 8-bit |
510 | | // length. It returns one on success or zero on error. |
511 | | OPENSSL_EXPORT int CBB_add_u8_length_prefixed(CBB *cbb, CBB *out_contents); |
512 | | |
513 | | // CBB_add_u16_length_prefixed sets |*out_contents| to a new child of |cbb|. |
514 | | // The data written to |*out_contents| will be prefixed in |cbb| with a 16-bit, |
515 | | // big-endian length. It returns one on success or zero on error. |
516 | | OPENSSL_EXPORT int CBB_add_u16_length_prefixed(CBB *cbb, CBB *out_contents); |
517 | | |
518 | | // CBB_add_u24_length_prefixed sets |*out_contents| to a new child of |cbb|. |
519 | | // The data written to |*out_contents| will be prefixed in |cbb| with a 24-bit, |
520 | | // big-endian length. It returns one on success or zero on error. |
521 | | OPENSSL_EXPORT int CBB_add_u24_length_prefixed(CBB *cbb, CBB *out_contents); |
522 | | |
523 | | // CBB_add_asn1 sets |*out_contents| to a |CBB| into which the contents of an |
524 | | // ASN.1 object can be written. The |tag| argument will be used as the tag for |
525 | | // the object. It returns one on success or zero on error. |
526 | | OPENSSL_EXPORT int CBB_add_asn1(CBB *cbb, CBB *out_contents, CBS_ASN1_TAG tag); |
527 | | |
528 | | // CBB_add_bytes appends |len| bytes from |data| to |cbb|. It returns one on |
529 | | // success and zero otherwise. |
530 | | OPENSSL_EXPORT int CBB_add_bytes(CBB *cbb, const uint8_t *data, size_t len); |
531 | | |
532 | | // CBB_add_zeros append |len| bytes with value zero to |cbb|. It returns one on |
533 | | // success and zero otherwise. |
534 | | OPENSSL_EXPORT int CBB_add_zeros(CBB *cbb, size_t len); |
535 | | |
536 | | // CBB_add_space appends |len| bytes to |cbb| and sets |*out_data| to point to |
537 | | // the beginning of that space. The caller must then write |len| bytes of |
538 | | // actual contents to |*out_data|. It returns one on success and zero |
539 | | // otherwise. |
540 | | OPENSSL_EXPORT int CBB_add_space(CBB *cbb, uint8_t **out_data, size_t len); |
541 | | |
542 | | // CBB_reserve ensures |cbb| has room for |len| additional bytes and sets |
543 | | // |*out_data| to point to the beginning of that space. It returns one on |
544 | | // success and zero otherwise. The caller may write up to |len| bytes to |
545 | | // |*out_data| and call |CBB_did_write| to complete the write. |*out_data| is |
546 | | // valid until the next operation on |cbb| or an ancestor |CBB|. |
547 | | OPENSSL_EXPORT int CBB_reserve(CBB *cbb, uint8_t **out_data, size_t len); |
548 | | |
549 | | // CBB_did_write advances |cbb| by |len| bytes, assuming the space has been |
550 | | // written to by the caller. It returns one on success and zero on error. |
551 | | OPENSSL_EXPORT int CBB_did_write(CBB *cbb, size_t len); |
552 | | |
553 | | // CBB_add_u8 appends an 8-bit number from |value| to |cbb|. It returns one on |
554 | | // success and zero otherwise. |
555 | | OPENSSL_EXPORT int CBB_add_u8(CBB *cbb, uint8_t value); |
556 | | |
557 | | // CBB_add_u16 appends a 16-bit, big-endian number from |value| to |cbb|. It |
558 | | // returns one on success and zero otherwise. |
559 | | OPENSSL_EXPORT int CBB_add_u16(CBB *cbb, uint16_t value); |
560 | | |
561 | | // CBB_add_u16le appends a 16-bit, little-endian number from |value| to |cbb|. |
562 | | // It returns one on success and zero otherwise. |
563 | | OPENSSL_EXPORT int CBB_add_u16le(CBB *cbb, uint16_t value); |
564 | | |
565 | | // CBB_add_u24 appends a 24-bit, big-endian number from |value| to |cbb|. It |
566 | | // returns one on success and zero otherwise. |
567 | | OPENSSL_EXPORT int CBB_add_u24(CBB *cbb, uint32_t value); |
568 | | |
569 | | // CBB_add_u32 appends a 32-bit, big-endian number from |value| to |cbb|. It |
570 | | // returns one on success and zero otherwise. |
571 | | OPENSSL_EXPORT int CBB_add_u32(CBB *cbb, uint32_t value); |
572 | | |
573 | | // CBB_add_u32le appends a 32-bit, little-endian number from |value| to |cbb|. |
574 | | // It returns one on success and zero otherwise. |
575 | | OPENSSL_EXPORT int CBB_add_u32le(CBB *cbb, uint32_t value); |
576 | | |
577 | | // CBB_add_u64 appends a 64-bit, big-endian number from |value| to |cbb|. It |
578 | | // returns one on success and zero otherwise. |
579 | | OPENSSL_EXPORT int CBB_add_u64(CBB *cbb, uint64_t value); |
580 | | |
581 | | // CBB_add_u64le appends a 64-bit, little-endian number from |value| to |cbb|. |
582 | | // It returns one on success and zero otherwise. |
583 | | OPENSSL_EXPORT int CBB_add_u64le(CBB *cbb, uint64_t value); |
584 | | |
585 | | // CBB_discard_child discards the current unflushed child of |cbb|. Neither the |
586 | | // child's contents nor the length prefix will be included in the output. |
587 | | OPENSSL_EXPORT void CBB_discard_child(CBB *cbb); |
588 | | |
589 | | // CBB_add_asn1_uint64 writes an ASN.1 INTEGER into |cbb| using |CBB_add_asn1| |
590 | | // and writes |value| in its contents. It returns one on success and zero on |
591 | | // error. |
592 | | OPENSSL_EXPORT int CBB_add_asn1_uint64(CBB *cbb, uint64_t value); |
593 | | |
594 | | // CBB_add_asn1_uint64_with_tag behaves like |CBB_add_asn1_uint64| but uses |
595 | | // |tag| as the tag instead of INTEGER. This is useful if the INTEGER type uses |
596 | | // implicit tagging. |
597 | | OPENSSL_EXPORT int CBB_add_asn1_uint64_with_tag(CBB *cbb, uint64_t value, |
598 | | CBS_ASN1_TAG tag); |
599 | | |
600 | | // CBB_add_asn1_int64 writes an ASN.1 INTEGER into |cbb| using |CBB_add_asn1| |
601 | | // and writes |value| in its contents. It returns one on success and zero on |
602 | | // error. |
603 | | OPENSSL_EXPORT int CBB_add_asn1_int64(CBB *cbb, int64_t value); |
604 | | |
605 | | // CBB_add_asn1_int64_with_tag behaves like |CBB_add_asn1_int64| but uses |tag| |
606 | | // as the tag instead of INTEGER. This is useful if the INTEGER type uses |
607 | | // implicit tagging. |
608 | | OPENSSL_EXPORT int CBB_add_asn1_int64_with_tag(CBB *cbb, int64_t value, |
609 | | CBS_ASN1_TAG tag); |
610 | | |
611 | | // CBB_add_asn1_octet_string writes an ASN.1 OCTET STRING into |cbb| with the |
612 | | // given contents. It returns one on success and zero on error. |
613 | | OPENSSL_EXPORT int CBB_add_asn1_octet_string(CBB *cbb, const uint8_t *data, |
614 | | size_t data_len); |
615 | | |
616 | | // CBB_add_asn1_bool writes an ASN.1 BOOLEAN into |cbb| which is true iff |
617 | | // |value| is non-zero. It returns one on success and zero on error. |
618 | | OPENSSL_EXPORT int CBB_add_asn1_bool(CBB *cbb, int value); |
619 | | |
620 | | // CBB_add_asn1_oid_from_text decodes |len| bytes from |text| as an ASCII OID |
621 | | // representation, e.g. "1.2.840.113554.4.1.72585", and writes the DER-encoded |
622 | | // contents to |cbb|. It returns one on success and zero on malloc failure or if |
623 | | // |text| was invalid. It does not include the OBJECT IDENTIFER framing, only |
624 | | // the element's contents. |
625 | | // |
626 | | // This function considers OID strings with components which do not fit in a |
627 | | // |uint64_t| to be invalid. |
628 | | OPENSSL_EXPORT int CBB_add_asn1_oid_from_text(CBB *cbb, const char *text, |
629 | | size_t len); |
630 | | |
631 | | // CBB_flush_asn1_set_of calls |CBB_flush| on |cbb| and then reorders the |
632 | | // contents for a DER-encoded ASN.1 SET OF type. It returns one on success and |
633 | | // zero on failure. DER canonicalizes SET OF contents by sorting |
634 | | // lexicographically by encoding. Call this function when encoding a SET OF |
635 | | // type in an order that is not already known to be canonical. |
636 | | // |
637 | | // Note a SET type has a slightly different ordering than a SET OF. |
638 | | OPENSSL_EXPORT int CBB_flush_asn1_set_of(CBB *cbb); |
639 | | |
640 | | |
641 | | // Unicode utilities. |
642 | | // |
643 | | // These functions consider noncharacters (see section 23.7 from Unicode 15.0.0) |
644 | | // to be invalid code points and will treat them as an error condition. |
645 | | |
646 | | // The following functions read one Unicode code point from |cbs| with the |
647 | | // corresponding encoding and store it in |*out|. They return one on success and |
648 | | // zero on error. |
649 | | OPENSSL_EXPORT int CBS_get_utf8(CBS *cbs, uint32_t *out); |
650 | | OPENSSL_EXPORT int CBS_get_latin1(CBS *cbs, uint32_t *out); |
651 | | OPENSSL_EXPORT int CBS_get_ucs2_be(CBS *cbs, uint32_t *out); |
652 | | OPENSSL_EXPORT int CBS_get_utf32_be(CBS *cbs, uint32_t *out); |
653 | | |
654 | | // CBB_get_utf8_len returns the number of bytes needed to represent |u| in |
655 | | // UTF-8. |
656 | | OPENSSL_EXPORT size_t CBB_get_utf8_len(uint32_t u); |
657 | | |
658 | | // The following functions encode |u| to |cbb| with the corresponding |
659 | | // encoding. They return one on success and zero on error. Error conditions |
660 | | // include |u| being an invalid code point, or |u| being unencodable in the |
661 | | // specified encoding. |
662 | | OPENSSL_EXPORT int CBB_add_utf8(CBB *cbb, uint32_t u); |
663 | | OPENSSL_EXPORT int CBB_add_latin1(CBB *cbb, uint32_t u); |
664 | | OPENSSL_EXPORT int CBB_add_ucs2_be(CBB *cbb, uint32_t u); |
665 | | OPENSSL_EXPORT int CBB_add_utf32_be(CBB *cbb, uint32_t u); |
666 | | |
667 | | |
668 | | #if defined(__cplusplus) |
669 | | } // extern C |
670 | | |
671 | | |
672 | | #if !defined(BORINGSSL_NO_CXX) |
673 | | extern "C++" { |
674 | | |
675 | | BSSL_NAMESPACE_BEGIN |
676 | | |
677 | | using ScopedCBB = internal::StackAllocated<CBB, void, CBB_zero, CBB_cleanup>; |
678 | | |
679 | | BSSL_NAMESPACE_END |
680 | | |
681 | | } // extern C++ |
682 | | #endif |
683 | | |
684 | | #endif |
685 | | |
686 | | #endif // OPENSSL_HEADER_BYTESTRING_H |