| 1 | /* Copyright (c) 2014, Google Inc. |
| 2 | * |
| 3 | * Permission to use, copy, modify, and/or distribute this software for any |
| 4 | * purpose with or without fee is hereby granted, provided that the above |
| 5 | * copyright notice and this permission notice appear in all copies. |
| 6 | * |
| 7 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
| 8 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
| 9 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY |
| 10 | * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
| 11 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION |
| 12 | * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN |
| 13 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ |
| 14 | |
| 15 | #ifndef OPENSSL_HEADER_BYTESTRING_H |
| 16 | #define |
| 17 | |
| 18 | #include <openssl/base.h> |
| 19 | |
| 20 | #include <openssl/span.h> |
| 21 | |
| 22 | #if defined(__cplusplus) |
| 23 | extern "C" { |
| 24 | #endif |
| 25 | |
| 26 | |
| 27 | // Bytestrings are used for parsing and building TLS and ASN.1 messages. |
| 28 | // |
| 29 | // A "CBS" (CRYPTO ByteString) represents a string of bytes in memory and |
| 30 | // provides utility functions for safely parsing length-prefixed structures |
| 31 | // like TLS and ASN.1 from it. |
| 32 | // |
| 33 | // A "CBB" (CRYPTO ByteBuilder) is a memory buffer that grows as needed and |
| 34 | // provides utility functions for building length-prefixed messages. |
| 35 | |
| 36 | |
| 37 | // CRYPTO ByteString |
| 38 | |
| 39 | struct cbs_st { |
| 40 | const uint8_t *data; |
| 41 | size_t len; |
| 42 | |
| 43 | #if !defined(BORINGSSL_NO_CXX) |
| 44 | // Allow implicit conversions to and from bssl::Span<const uint8_t>. |
| 45 | cbs_st(bssl::Span<const uint8_t> span) |
| 46 | : data(span.data()), len(span.size()) {} |
| 47 | operator bssl::Span<const uint8_t>() const { |
| 48 | return bssl::MakeConstSpan(data, len); |
| 49 | } |
| 50 | |
| 51 | // Defining any constructors requires we explicitly default the others. |
| 52 | cbs_st() = default; |
| 53 | cbs_st(const cbs_st &) = default; |
| 54 | #endif |
| 55 | }; |
| 56 | |
| 57 | // CBS_init sets |cbs| to point to |data|. It does not take ownership of |
| 58 | // |data|. |
| 59 | OPENSSL_EXPORT void CBS_init(CBS *cbs, const uint8_t *data, size_t len); |
| 60 | |
| 61 | // CBS_skip advances |cbs| by |len| bytes. It returns one on success and zero |
| 62 | // otherwise. |
| 63 | OPENSSL_EXPORT int CBS_skip(CBS *cbs, size_t len); |
| 64 | |
| 65 | // CBS_data returns a pointer to the contents of |cbs|. |
| 66 | OPENSSL_EXPORT const uint8_t *CBS_data(const CBS *cbs); |
| 67 | |
| 68 | // CBS_len returns the number of bytes remaining in |cbs|. |
| 69 | OPENSSL_EXPORT size_t CBS_len(const CBS *cbs); |
| 70 | |
| 71 | // CBS_stow copies the current contents of |cbs| into |*out_ptr| and |
| 72 | // |*out_len|. If |*out_ptr| is not NULL, the contents are freed with |
| 73 | // OPENSSL_free. It returns one on success and zero on allocation failure. On |
| 74 | // success, |*out_ptr| should be freed with OPENSSL_free. If |cbs| is empty, |
| 75 | // |*out_ptr| will be NULL. |
| 76 | OPENSSL_EXPORT int CBS_stow(const CBS *cbs, uint8_t **out_ptr, size_t *out_len); |
| 77 | |
| 78 | // CBS_strdup copies the current contents of |cbs| into |*out_ptr| as a |
| 79 | // NUL-terminated C string. If |*out_ptr| is not NULL, the contents are freed |
| 80 | // with OPENSSL_free. It returns one on success and zero on allocation |
| 81 | // failure. On success, |*out_ptr| should be freed with OPENSSL_free. |
| 82 | // |
| 83 | // NOTE: If |cbs| contains NUL bytes, the string will be truncated. Call |
| 84 | // |CBS_contains_zero_byte(cbs)| to check for NUL bytes. |
| 85 | OPENSSL_EXPORT int CBS_strdup(const CBS *cbs, char **out_ptr); |
| 86 | |
| 87 | // CBS_contains_zero_byte returns one if the current contents of |cbs| contains |
| 88 | // a NUL byte and zero otherwise. |
| 89 | OPENSSL_EXPORT int CBS_contains_zero_byte(const CBS *cbs); |
| 90 | |
| 91 | // CBS_mem_equal compares the current contents of |cbs| with the |len| bytes |
| 92 | // starting at |data|. If they're equal, it returns one, otherwise zero. If the |
| 93 | // lengths match, it uses a constant-time comparison. |
| 94 | OPENSSL_EXPORT int CBS_mem_equal(const CBS *cbs, const uint8_t *data, |
| 95 | size_t len); |
| 96 | |
| 97 | // CBS_get_u8 sets |*out| to the next uint8_t from |cbs| and advances |cbs|. It |
| 98 | // returns one on success and zero on error. |
| 99 | OPENSSL_EXPORT int CBS_get_u8(CBS *cbs, uint8_t *out); |
| 100 | |
| 101 | // CBS_get_u16 sets |*out| to the next, big-endian uint16_t from |cbs| and |
| 102 | // advances |cbs|. It returns one on success and zero on error. |
| 103 | OPENSSL_EXPORT int CBS_get_u16(CBS *cbs, uint16_t *out); |
| 104 | |
| 105 | // CBS_get_u24 sets |*out| to the next, big-endian 24-bit value from |cbs| and |
| 106 | // advances |cbs|. It returns one on success and zero on error. |
| 107 | OPENSSL_EXPORT int CBS_get_u24(CBS *cbs, uint32_t *out); |
| 108 | |
| 109 | // CBS_get_u32 sets |*out| to the next, big-endian uint32_t value from |cbs| |
| 110 | // and advances |cbs|. It returns one on success and zero on error. |
| 111 | OPENSSL_EXPORT int CBS_get_u32(CBS *cbs, uint32_t *out); |
| 112 | |
| 113 | // CBS_get_u64 sets |*out| to the next, big-endian uint64_t value from |cbs| |
| 114 | // and advances |cbs|. It returns one on success and zero on error. |
| 115 | OPENSSL_EXPORT int CBS_get_u64(CBS *cbs, uint64_t *out); |
| 116 | |
| 117 | // CBS_get_last_u8 sets |*out| to the last uint8_t from |cbs| and shortens |
| 118 | // |cbs|. It returns one on success and zero on error. |
| 119 | OPENSSL_EXPORT int CBS_get_last_u8(CBS *cbs, uint8_t *out); |
| 120 | |
| 121 | // CBS_get_bytes sets |*out| to the next |len| bytes from |cbs| and advances |
| 122 | // |cbs|. It returns one on success and zero on error. |
| 123 | OPENSSL_EXPORT int CBS_get_bytes(CBS *cbs, CBS *out, size_t len); |
| 124 | |
| 125 | // CBS_copy_bytes copies the next |len| bytes from |cbs| to |out| and advances |
| 126 | // |cbs|. It returns one on success and zero on error. |
| 127 | OPENSSL_EXPORT int CBS_copy_bytes(CBS *cbs, uint8_t *out, size_t len); |
| 128 | |
| 129 | // CBS_get_u8_length_prefixed sets |*out| to the contents of an 8-bit, |
| 130 | // length-prefixed value from |cbs| and advances |cbs| over it. It returns one |
| 131 | // on success and zero on error. |
| 132 | OPENSSL_EXPORT int CBS_get_u8_length_prefixed(CBS *cbs, CBS *out); |
| 133 | |
| 134 | // CBS_get_u16_length_prefixed sets |*out| to the contents of a 16-bit, |
| 135 | // big-endian, length-prefixed value from |cbs| and advances |cbs| over it. It |
| 136 | // returns one on success and zero on error. |
| 137 | OPENSSL_EXPORT int CBS_get_u16_length_prefixed(CBS *cbs, CBS *out); |
| 138 | |
| 139 | // CBS_get_u24_length_prefixed sets |*out| to the contents of a 24-bit, |
| 140 | // big-endian, length-prefixed value from |cbs| and advances |cbs| over it. It |
| 141 | // returns one on success and zero on error. |
| 142 | OPENSSL_EXPORT int CBS_get_u24_length_prefixed(CBS *cbs, CBS *out); |
| 143 | |
| 144 | |
| 145 | // Parsing ASN.1 |
| 146 | // |
| 147 | // |CBS| may be used to parse DER structures. Rather than using a schema |
| 148 | // compiler, the following functions act on tag-length-value elements in the |
| 149 | // serialization itself. Thus the caller is responsible for looping over a |
| 150 | // SEQUENCE, branching on CHOICEs or OPTIONAL fields, checking for trailing |
| 151 | // data, and handling explict vs. implicit tagging. |
| 152 | // |
| 153 | // Tags are represented as |unsigned| values in memory. The upper few bits store |
| 154 | // the class and constructed bit, and the remaining bits store the tag |
| 155 | // number. Note this differs from the DER serialization, to support tag numbers |
| 156 | // beyond 31. Consumers must use the constants defined below to decompose or |
| 157 | // assemble tags. |
| 158 | // |
| 159 | // This library treats an element's constructed bit as part of its tag. In DER, |
| 160 | // the constructed bit is computable from the type. The constants for universal |
| 161 | // types have the bit set. Callers must set it correctly for tagged types. |
| 162 | // Explicitly-tagged types are always constructed, and implicitly-tagged types |
| 163 | // inherit the underlying type's bit. |
| 164 | |
| 165 | // CBS_ASN1_TAG_SHIFT is how much the in-memory representation shifts the class |
| 166 | // and constructed bits from the DER serialization. |
| 167 | #define CBS_ASN1_TAG_SHIFT 24 |
| 168 | |
| 169 | // CBS_ASN1_CONSTRUCTED may be ORed into a tag to set the constructed bit. |
| 170 | #define CBS_ASN1_CONSTRUCTED (0x20u << CBS_ASN1_TAG_SHIFT) |
| 171 | |
| 172 | // The following values specify the tag class and may be ORed into a tag number |
| 173 | // to produce the final tag. If none is used, the tag will be UNIVERSAL. |
| 174 | #define CBS_ASN1_UNIVERSAL (0u << CBS_ASN1_TAG_SHIFT) |
| 175 | #define CBS_ASN1_APPLICATION (0x40u << CBS_ASN1_TAG_SHIFT) |
| 176 | #define CBS_ASN1_CONTEXT_SPECIFIC (0x80u << CBS_ASN1_TAG_SHIFT) |
| 177 | #define CBS_ASN1_PRIVATE (0xc0u << CBS_ASN1_TAG_SHIFT) |
| 178 | |
| 179 | // CBS_ASN1_CLASS_MASK may be ANDed with a tag to query its class. This will |
| 180 | // give one of the four values above. |
| 181 | #define CBS_ASN1_CLASS_MASK (0xc0u << CBS_ASN1_TAG_SHIFT) |
| 182 | |
| 183 | // CBS_ASN1_TAG_NUMBER_MASK may be ANDed with a tag to query its number. |
| 184 | #define CBS_ASN1_TAG_NUMBER_MASK ((1u << (5 + CBS_ASN1_TAG_SHIFT)) - 1) |
| 185 | |
| 186 | // The following values are constants for UNIVERSAL tags. Note these constants |
| 187 | // include the constructed bit. |
| 188 | #define CBS_ASN1_BOOLEAN 0x1u |
| 189 | #define CBS_ASN1_INTEGER 0x2u |
| 190 | #define CBS_ASN1_BITSTRING 0x3u |
| 191 | #define CBS_ASN1_OCTETSTRING 0x4u |
| 192 | #define CBS_ASN1_NULL 0x5u |
| 193 | #define CBS_ASN1_OBJECT 0x6u |
| 194 | #define CBS_ASN1_ENUMERATED 0xau |
| 195 | #define CBS_ASN1_UTF8STRING 0xcu |
| 196 | #define CBS_ASN1_SEQUENCE (0x10u | CBS_ASN1_CONSTRUCTED) |
| 197 | #define CBS_ASN1_SET (0x11u | CBS_ASN1_CONSTRUCTED) |
| 198 | #define CBS_ASN1_NUMERICSTRING 0x12u |
| 199 | #define CBS_ASN1_PRINTABLESTRING 0x13u |
| 200 | #define CBS_ASN1_T61STRING 0x14u |
| 201 | #define CBS_ASN1_VIDEOTEXSTRING 0x15u |
| 202 | #define CBS_ASN1_IA5STRING 0x16u |
| 203 | #define CBS_ASN1_UTCTIME 0x17u |
| 204 | #define CBS_ASN1_GENERALIZEDTIME 0x18u |
| 205 | #define CBS_ASN1_GRAPHICSTRING 0x19u |
| 206 | #define CBS_ASN1_VISIBLESTRING 0x1au |
| 207 | #define CBS_ASN1_GENERALSTRING 0x1bu |
| 208 | #define CBS_ASN1_UNIVERSALSTRING 0x1cu |
| 209 | #define CBS_ASN1_BMPSTRING 0x1eu |
| 210 | |
| 211 | // CBS_get_asn1 sets |*out| to the contents of DER-encoded, ASN.1 element (not |
| 212 | // including tag and length bytes) and advances |cbs| over it. The ASN.1 |
| 213 | // element must match |tag_value|. It returns one on success and zero |
| 214 | // on error. |
| 215 | OPENSSL_EXPORT int CBS_get_asn1(CBS *cbs, CBS *out, unsigned tag_value); |
| 216 | |
| 217 | // CBS_get_asn1_element acts like |CBS_get_asn1| but |out| will include the |
| 218 | // ASN.1 header bytes too. |
| 219 | OPENSSL_EXPORT int CBS_get_asn1_element(CBS *cbs, CBS *out, unsigned tag_value); |
| 220 | |
| 221 | // CBS_peek_asn1_tag looks ahead at the next ASN.1 tag and returns one |
| 222 | // if the next ASN.1 element on |cbs| would have tag |tag_value|. If |
| 223 | // |cbs| is empty or the tag does not match, it returns zero. Note: if |
| 224 | // it returns one, CBS_get_asn1 may still fail if the rest of the |
| 225 | // element is malformed. |
| 226 | OPENSSL_EXPORT int CBS_peek_asn1_tag(const CBS *cbs, unsigned tag_value); |
| 227 | |
| 228 | // CBS_get_any_asn1 sets |*out| to contain the next ASN.1 element from |*cbs| |
| 229 | // (not including tag and length bytes), sets |*out_tag| to the tag number, and |
| 230 | // advances |*cbs|. It returns one on success and zero on error. Either of |out| |
| 231 | // and |out_tag| may be NULL to ignore the value. |
| 232 | OPENSSL_EXPORT int CBS_get_any_asn1(CBS *cbs, CBS *out, unsigned *out_tag); |
| 233 | |
| 234 | // CBS_get_any_asn1_element sets |*out| to contain the next ASN.1 element from |
| 235 | // |*cbs| (including header bytes) and advances |*cbs|. It sets |*out_tag| to |
| 236 | // the tag number and |*out_header_len| to the length of the ASN.1 header. Each |
| 237 | // of |out|, |out_tag|, and |out_header_len| may be NULL to ignore the value. |
| 238 | OPENSSL_EXPORT int CBS_get_any_asn1_element(CBS *cbs, CBS *out, |
| 239 | unsigned *out_tag, |
| 240 | size_t *); |
| 241 | |
| 242 | // CBS_get_any_ber_asn1_element acts the same as |CBS_get_any_asn1_element| but |
| 243 | // also allows indefinite-length elements to be returned. In that case, |
| 244 | // |*out_header_len| and |CBS_len(out)| will both be two as only the header is |
| 245 | // returned, otherwise it behaves the same as the previous function. |
| 246 | OPENSSL_EXPORT int CBS_get_any_ber_asn1_element(CBS *cbs, CBS *out, |
| 247 | unsigned *out_tag, |
| 248 | size_t *); |
| 249 | |
| 250 | // CBS_get_asn1_uint64 gets an ASN.1 INTEGER from |cbs| using |CBS_get_asn1| |
| 251 | // and sets |*out| to its value. It returns one on success and zero on error, |
| 252 | // where error includes the integer being negative, or too large to represent |
| 253 | // in 64 bits. |
| 254 | OPENSSL_EXPORT int CBS_get_asn1_uint64(CBS *cbs, uint64_t *out); |
| 255 | |
| 256 | // CBS_get_asn1_bool gets an ASN.1 BOOLEAN from |cbs| and sets |*out| to zero |
| 257 | // or one based on its value. It returns one on success or zero on error. |
| 258 | OPENSSL_EXPORT int CBS_get_asn1_bool(CBS *cbs, int *out); |
| 259 | |
| 260 | // CBS_get_optional_asn1 gets an optional explicitly-tagged element from |cbs| |
| 261 | // tagged with |tag| and sets |*out| to its contents, or ignores it if |out| is |
| 262 | // NULL. If present and if |out_present| is not NULL, it sets |*out_present| to |
| 263 | // one, otherwise zero. It returns one on success, whether or not the element |
| 264 | // was present, and zero on decode failure. |
| 265 | OPENSSL_EXPORT int CBS_get_optional_asn1(CBS *cbs, CBS *out, int *out_present, |
| 266 | unsigned tag); |
| 267 | |
| 268 | // CBS_get_optional_asn1_octet_string gets an optional |
| 269 | // explicitly-tagged OCTET STRING from |cbs|. If present, it sets |
| 270 | // |*out| to the string and |*out_present| to one. Otherwise, it sets |
| 271 | // |*out| to empty and |*out_present| to zero. |out_present| may be |
| 272 | // NULL. It returns one on success, whether or not the element was |
| 273 | // present, and zero on decode failure. |
| 274 | OPENSSL_EXPORT int CBS_get_optional_asn1_octet_string(CBS *cbs, CBS *out, |
| 275 | int *out_present, |
| 276 | unsigned tag); |
| 277 | |
| 278 | // CBS_get_optional_asn1_uint64 gets an optional explicitly-tagged |
| 279 | // INTEGER from |cbs|. If present, it sets |*out| to the |
| 280 | // value. Otherwise, it sets |*out| to |default_value|. It returns one |
| 281 | // on success, whether or not the element was present, and zero on |
| 282 | // decode failure. |
| 283 | OPENSSL_EXPORT int CBS_get_optional_asn1_uint64(CBS *cbs, uint64_t *out, |
| 284 | unsigned tag, |
| 285 | uint64_t default_value); |
| 286 | |
| 287 | // CBS_get_optional_asn1_bool gets an optional, explicitly-tagged BOOLEAN from |
| 288 | // |cbs|. If present, it sets |*out| to either zero or one, based on the |
| 289 | // boolean. Otherwise, it sets |*out| to |default_value|. It returns one on |
| 290 | // success, whether or not the element was present, and zero on decode |
| 291 | // failure. |
| 292 | OPENSSL_EXPORT int CBS_get_optional_asn1_bool(CBS *cbs, int *out, unsigned tag, |
| 293 | int default_value); |
| 294 | |
| 295 | // CBS_is_valid_asn1_bitstring returns one if |cbs| is a valid ASN.1 BIT STRING |
| 296 | // and zero otherwise. |
| 297 | OPENSSL_EXPORT int CBS_is_valid_asn1_bitstring(const CBS *cbs); |
| 298 | |
| 299 | // CBS_asn1_bitstring_has_bit returns one if |cbs| is a valid ASN.1 BIT STRING |
| 300 | // and the specified bit is present and set. Otherwise, it returns zero. |bit| |
| 301 | // is indexed starting from zero. |
| 302 | OPENSSL_EXPORT int CBS_asn1_bitstring_has_bit(const CBS *cbs, unsigned bit); |
| 303 | |
| 304 | // CBS_asn1_oid_to_text interprets |cbs| as DER-encoded ASN.1 OBJECT IDENTIFIER |
| 305 | // contents (not including the element framing) and returns the ASCII |
| 306 | // representation (e.g., "1.2.840.113554.4.1.72585") in a newly-allocated |
| 307 | // string, or NULL on failure. The caller must release the result with |
| 308 | // |OPENSSL_free|. |
| 309 | OPENSSL_EXPORT char *CBS_asn1_oid_to_text(const CBS *cbs); |
| 310 | |
| 311 | |
| 312 | // CRYPTO ByteBuilder. |
| 313 | // |
| 314 | // |CBB| objects allow one to build length-prefixed serialisations. A |CBB| |
| 315 | // object is associated with a buffer and new buffers are created with |
| 316 | // |CBB_init|. Several |CBB| objects can point at the same buffer when a |
| 317 | // length-prefix is pending, however only a single |CBB| can be 'current' at |
| 318 | // any one time. For example, if one calls |CBB_add_u8_length_prefixed| then |
| 319 | // the new |CBB| points at the same buffer as the original. But if the original |
| 320 | // |CBB| is used then the length prefix is written out and the new |CBB| must |
| 321 | // not be used again. |
| 322 | // |
| 323 | // If one needs to force a length prefix to be written out because a |CBB| is |
| 324 | // going out of scope, use |CBB_flush|. If an operation on a |CBB| fails, it is |
| 325 | // in an undefined state and must not be used except to call |CBB_cleanup|. |
| 326 | |
| 327 | struct cbb_buffer_st { |
| 328 | uint8_t *buf; |
| 329 | size_t len; // The number of valid bytes. |
| 330 | size_t cap; // The size of buf. |
| 331 | char can_resize; /* One iff |buf| is owned by this object. If not then |buf| |
| 332 | cannot be resized. */ |
| 333 | char error; /* One iff there was an error writing to this CBB. All future |
| 334 | operations will fail. */ |
| 335 | }; |
| 336 | |
| 337 | struct cbb_st { |
| 338 | struct cbb_buffer_st *base; |
| 339 | // child points to a child CBB if a length-prefix is pending. |
| 340 | CBB *child; |
| 341 | // offset is the number of bytes from the start of |base->buf| to this |CBB|'s |
| 342 | // pending length prefix. |
| 343 | size_t offset; |
| 344 | // pending_len_len contains the number of bytes in this |CBB|'s pending |
| 345 | // length-prefix, or zero if no length-prefix is pending. |
| 346 | uint8_t pending_len_len; |
| 347 | char pending_is_asn1; |
| 348 | // is_child is true iff this is a child |CBB| (as opposed to a top-level |
| 349 | // |CBB|). Top-level objects are valid arguments for |CBB_finish|. |
| 350 | char is_child; |
| 351 | }; |
| 352 | |
| 353 | // CBB_zero sets an uninitialised |cbb| to the zero state. It must be |
| 354 | // initialised with |CBB_init| or |CBB_init_fixed| before use, but it is safe to |
| 355 | // call |CBB_cleanup| without a successful |CBB_init|. This may be used for more |
| 356 | // uniform cleanup of a |CBB|. |
| 357 | OPENSSL_EXPORT void CBB_zero(CBB *cbb); |
| 358 | |
| 359 | // CBB_init initialises |cbb| with |initial_capacity|. Since a |CBB| grows as |
| 360 | // needed, the |initial_capacity| is just a hint. It returns one on success or |
| 361 | // zero on allocation failure. |
| 362 | OPENSSL_EXPORT int CBB_init(CBB *cbb, size_t initial_capacity); |
| 363 | |
| 364 | // CBB_init_fixed initialises |cbb| to write to |len| bytes at |buf|. Since |
| 365 | // |buf| cannot grow, trying to write more than |len| bytes will cause CBB |
| 366 | // functions to fail. It returns one on success or zero on error. |
| 367 | OPENSSL_EXPORT int CBB_init_fixed(CBB *cbb, uint8_t *buf, size_t len); |
| 368 | |
| 369 | // CBB_cleanup frees all resources owned by |cbb| and other |CBB| objects |
| 370 | // writing to the same buffer. This should be used in an error case where a |
| 371 | // serialisation is abandoned. |
| 372 | // |
| 373 | // This function can only be called on a "top level" |CBB|, i.e. one initialised |
| 374 | // with |CBB_init| or |CBB_init_fixed|, or a |CBB| set to the zero state with |
| 375 | // |CBB_zero|. |
| 376 | OPENSSL_EXPORT void CBB_cleanup(CBB *cbb); |
| 377 | |
| 378 | // CBB_finish completes any pending length prefix and sets |*out_data| to a |
| 379 | // malloced buffer and |*out_len| to the length of that buffer. The caller |
| 380 | // takes ownership of the buffer and, unless the buffer was fixed with |
| 381 | // |CBB_init_fixed|, must call |OPENSSL_free| when done. |
| 382 | // |
| 383 | // It can only be called on a "top level" |CBB|, i.e. one initialised with |
| 384 | // |CBB_init| or |CBB_init_fixed|. It returns one on success and zero on |
| 385 | // error. |
| 386 | OPENSSL_EXPORT int CBB_finish(CBB *cbb, uint8_t **out_data, size_t *out_len); |
| 387 | |
| 388 | // CBB_flush causes any pending length prefixes to be written out and any child |
| 389 | // |CBB| objects of |cbb| to be invalidated. This allows |cbb| to continue to be |
| 390 | // used after the children go out of scope, e.g. when local |CBB| objects are |
| 391 | // added as children to a |CBB| that persists after a function returns. This |
| 392 | // function returns one on success or zero on error. |
| 393 | OPENSSL_EXPORT int CBB_flush(CBB *cbb); |
| 394 | |
| 395 | // CBB_data returns a pointer to the bytes written to |cbb|. It does not flush |
| 396 | // |cbb|. The pointer is valid until the next operation to |cbb|. |
| 397 | // |
| 398 | // To avoid unfinalized length prefixes, it is a fatal error to call this on a |
| 399 | // CBB with any active children. |
| 400 | OPENSSL_EXPORT const uint8_t *CBB_data(const CBB *cbb); |
| 401 | |
| 402 | // CBB_len returns the number of bytes written to |cbb|. It does not flush |
| 403 | // |cbb|. |
| 404 | // |
| 405 | // To avoid unfinalized length prefixes, it is a fatal error to call this on a |
| 406 | // CBB with any active children. |
| 407 | OPENSSL_EXPORT size_t CBB_len(const CBB *cbb); |
| 408 | |
| 409 | // CBB_add_u8_length_prefixed sets |*out_contents| to a new child of |cbb|. The |
| 410 | // data written to |*out_contents| will be prefixed in |cbb| with an 8-bit |
| 411 | // length. It returns one on success or zero on error. |
| 412 | OPENSSL_EXPORT int CBB_add_u8_length_prefixed(CBB *cbb, CBB *out_contents); |
| 413 | |
| 414 | // CBB_add_u16_length_prefixed sets |*out_contents| to a new child of |cbb|. |
| 415 | // The data written to |*out_contents| will be prefixed in |cbb| with a 16-bit, |
| 416 | // big-endian length. It returns one on success or zero on error. |
| 417 | OPENSSL_EXPORT int CBB_add_u16_length_prefixed(CBB *cbb, CBB *out_contents); |
| 418 | |
| 419 | // CBB_add_u24_length_prefixed sets |*out_contents| to a new child of |cbb|. |
| 420 | // The data written to |*out_contents| will be prefixed in |cbb| with a 24-bit, |
| 421 | // big-endian length. It returns one on success or zero on error. |
| 422 | OPENSSL_EXPORT int CBB_add_u24_length_prefixed(CBB *cbb, CBB *out_contents); |
| 423 | |
| 424 | // CBB_add_asn1 sets |*out_contents| to a |CBB| into which the contents of an |
| 425 | // ASN.1 object can be written. The |tag| argument will be used as the tag for |
| 426 | // the object. It returns one on success or zero on error. |
| 427 | OPENSSL_EXPORT int CBB_add_asn1(CBB *cbb, CBB *out_contents, unsigned tag); |
| 428 | |
| 429 | // CBB_add_bytes appends |len| bytes from |data| to |cbb|. It returns one on |
| 430 | // success and zero otherwise. |
| 431 | OPENSSL_EXPORT int CBB_add_bytes(CBB *cbb, const uint8_t *data, size_t len); |
| 432 | |
| 433 | // CBB_add_space appends |len| bytes to |cbb| and sets |*out_data| to point to |
| 434 | // the beginning of that space. The caller must then write |len| bytes of |
| 435 | // actual contents to |*out_data|. It returns one on success and zero |
| 436 | // otherwise. |
| 437 | OPENSSL_EXPORT int CBB_add_space(CBB *cbb, uint8_t **out_data, size_t len); |
| 438 | |
| 439 | // CBB_reserve ensures |cbb| has room for |len| additional bytes and sets |
| 440 | // |*out_data| to point to the beginning of that space. It returns one on |
| 441 | // success and zero otherwise. The caller may write up to |len| bytes to |
| 442 | // |*out_data| and call |CBB_did_write| to complete the write. |*out_data| is |
| 443 | // valid until the next operation on |cbb| or an ancestor |CBB|. |
| 444 | OPENSSL_EXPORT int CBB_reserve(CBB *cbb, uint8_t **out_data, size_t len); |
| 445 | |
| 446 | // CBB_did_write advances |cbb| by |len| bytes, assuming the space has been |
| 447 | // written to by the caller. It returns one on success and zero on error. |
| 448 | OPENSSL_EXPORT int CBB_did_write(CBB *cbb, size_t len); |
| 449 | |
| 450 | // CBB_add_u8 appends an 8-bit number from |value| to |cbb|. It returns one on |
| 451 | // success and zero otherwise. |
| 452 | OPENSSL_EXPORT int CBB_add_u8(CBB *cbb, uint8_t value); |
| 453 | |
| 454 | // CBB_add_u16 appends a 16-bit, big-endian number from |value| to |cbb|. It |
| 455 | // returns one on success and zero otherwise. |
| 456 | OPENSSL_EXPORT int CBB_add_u16(CBB *cbb, uint16_t value); |
| 457 | |
| 458 | // CBB_add_u24 appends a 24-bit, big-endian number from |value| to |cbb|. It |
| 459 | // returns one on success and zero otherwise. |
| 460 | OPENSSL_EXPORT int CBB_add_u24(CBB *cbb, uint32_t value); |
| 461 | |
| 462 | // CBB_add_u32 appends a 32-bit, big-endian number from |value| to |cbb|. It |
| 463 | // returns one on success and zero otherwise. |
| 464 | OPENSSL_EXPORT int CBB_add_u32(CBB *cbb, uint32_t value); |
| 465 | |
| 466 | // CBB_add_u64 appends a 64-bit, big-endian number from |value| to |cbb|. It |
| 467 | // returns one on success and zero otherwise. |
| 468 | OPENSSL_EXPORT int CBB_add_u64(CBB *cbb, uint64_t value); |
| 469 | |
| 470 | // CBB_discard_child discards the current unflushed child of |cbb|. Neither the |
| 471 | // child's contents nor the length prefix will be included in the output. |
| 472 | OPENSSL_EXPORT void CBB_discard_child(CBB *cbb); |
| 473 | |
| 474 | // CBB_add_asn1_uint64 writes an ASN.1 INTEGER into |cbb| using |CBB_add_asn1| |
| 475 | // and writes |value| in its contents. It returns one on success and zero on |
| 476 | // error. |
| 477 | OPENSSL_EXPORT int CBB_add_asn1_uint64(CBB *cbb, uint64_t value); |
| 478 | |
| 479 | // CBB_add_asn1_octet_string writes an ASN.1 OCTET STRING into |cbb| with the |
| 480 | // given contents. It returns one on success and zero on error. |
| 481 | OPENSSL_EXPORT int CBB_add_asn1_octet_string(CBB *cbb, const uint8_t *data, |
| 482 | size_t data_len); |
| 483 | |
| 484 | // CBB_add_asn1_bool writes an ASN.1 BOOLEAN into |cbb| which is true iff |
| 485 | // |value| is non-zero. It returns one on success and zero on error. |
| 486 | OPENSSL_EXPORT int CBB_add_asn1_bool(CBB *cbb, int value); |
| 487 | |
| 488 | // CBB_add_asn1_oid_from_text decodes |len| bytes from |text| as an ASCII OID |
| 489 | // representation, e.g. "1.2.840.113554.4.1.72585", and writes the DER-encoded |
| 490 | // contents to |cbb|. It returns one on success and zero on malloc failure or if |
| 491 | // |text| was invalid. It does not include the OBJECT IDENTIFER framing, only |
| 492 | // the element's contents. |
| 493 | // |
| 494 | // This function considers OID strings with components which do not fit in a |
| 495 | // |uint64_t| to be invalid. |
| 496 | OPENSSL_EXPORT int CBB_add_asn1_oid_from_text(CBB *cbb, const char *text, |
| 497 | size_t len); |
| 498 | |
| 499 | // CBB_flush_asn1_set_of calls |CBB_flush| on |cbb| and then reorders the |
| 500 | // contents for a DER-encoded ASN.1 SET OF type. It returns one on success and |
| 501 | // zero on failure. DER canonicalizes SET OF contents by sorting |
| 502 | // lexicographically by encoding. Call this function when encoding a SET OF |
| 503 | // type in an order that is not already known to be canonical. |
| 504 | // |
| 505 | // Note a SET type has a slightly different ordering than a SET OF. |
| 506 | OPENSSL_EXPORT int CBB_flush_asn1_set_of(CBB *cbb); |
| 507 | |
| 508 | |
| 509 | #if defined(__cplusplus) |
| 510 | } // extern C |
| 511 | |
| 512 | |
| 513 | #if !defined(BORINGSSL_NO_CXX) |
| 514 | extern "C++" { |
| 515 | |
| 516 | BSSL_NAMESPACE_BEGIN |
| 517 | |
| 518 | using ScopedCBB = internal::StackAllocated<CBB, void, CBB_zero, CBB_cleanup>; |
| 519 | |
| 520 | BSSL_NAMESPACE_END |
| 521 | |
| 522 | } // extern C++ |
| 523 | #endif |
| 524 | |
| 525 | #endif |
| 526 | |
| 527 | #endif // OPENSSL_HEADER_BYTESTRING_H |
| 528 | |