Coverage Report

Created: 2023-06-29 07:23

/src/boringssl/include/openssl/bytestring.h
Line
Count
Source (jump to first uncovered line)
1
/* Copyright (c) 2014, Google Inc.
2
 *
3
 * Permission to use, copy, modify, and/or distribute this software for any
4
 * purpose with or without fee is hereby granted, provided that the above
5
 * copyright notice and this permission notice appear in all copies.
6
 *
7
 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
8
 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
9
 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
10
 * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
11
 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
12
 * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
13
 * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
14
15
#ifndef OPENSSL_HEADER_BYTESTRING_H
16
#define OPENSSL_HEADER_BYTESTRING_H
17
18
#include <openssl/base.h>
19
20
#include <openssl/span.h>
21
#include <time.h>
22
23
#if defined(__cplusplus)
24
extern "C" {
25
#endif
26
27
28
// Bytestrings are used for parsing and building TLS and ASN.1 messages.
29
//
30
// A "CBS" (CRYPTO ByteString) represents a string of bytes in memory and
31
// provides utility functions for safely parsing length-prefixed structures
32
// like TLS and ASN.1 from it.
33
//
34
// A "CBB" (CRYPTO ByteBuilder) is a memory buffer that grows as needed and
35
// provides utility functions for building length-prefixed messages.
36
37
38
// CRYPTO ByteString
39
40
struct cbs_st {
41
  const uint8_t *data;
42
  size_t len;
43
44
#if !defined(BORINGSSL_NO_CXX)
45
  // Allow implicit conversions to and from bssl::Span<const uint8_t>.
46
  cbs_st(bssl::Span<const uint8_t> span)
47
0
      : data(span.data()), len(span.size()) {}
48
0
  operator bssl::Span<const uint8_t>() const {
49
0
    return bssl::MakeConstSpan(data, len);
50
0
  }
51
52
  // Defining any constructors requires we explicitly default the others.
53
  cbs_st() = default;
54
  cbs_st(const cbs_st &) = default;
55
  cbs_st &operator=(const cbs_st &) = default;
56
#endif
57
};
58
59
// CBS_init sets |cbs| to point to |data|. It does not take ownership of
60
// |data|.
61
OPENSSL_EXPORT void CBS_init(CBS *cbs, const uint8_t *data, size_t len);
62
63
// CBS_skip advances |cbs| by |len| bytes. It returns one on success and zero
64
// otherwise.
65
OPENSSL_EXPORT int CBS_skip(CBS *cbs, size_t len);
66
67
// CBS_data returns a pointer to the contents of |cbs|.
68
OPENSSL_EXPORT const uint8_t *CBS_data(const CBS *cbs);
69
70
// CBS_len returns the number of bytes remaining in |cbs|.
71
OPENSSL_EXPORT size_t CBS_len(const CBS *cbs);
72
73
// CBS_stow copies the current contents of |cbs| into |*out_ptr| and
74
// |*out_len|. If |*out_ptr| is not NULL, the contents are freed with
75
// OPENSSL_free. It returns one on success and zero on allocation failure. On
76
// success, |*out_ptr| should be freed with OPENSSL_free. If |cbs| is empty,
77
// |*out_ptr| will be NULL.
78
OPENSSL_EXPORT int CBS_stow(const CBS *cbs, uint8_t **out_ptr, size_t *out_len);
79
80
// CBS_strdup copies the current contents of |cbs| into |*out_ptr| as a
81
// NUL-terminated C string. If |*out_ptr| is not NULL, the contents are freed
82
// with OPENSSL_free. It returns one on success and zero on allocation
83
// failure. On success, |*out_ptr| should be freed with OPENSSL_free.
84
//
85
// NOTE: If |cbs| contains NUL bytes, the string will be truncated. Call
86
// |CBS_contains_zero_byte(cbs)| to check for NUL bytes.
87
OPENSSL_EXPORT int CBS_strdup(const CBS *cbs, char **out_ptr);
88
89
// CBS_contains_zero_byte returns one if the current contents of |cbs| contains
90
// a NUL byte and zero otherwise.
91
OPENSSL_EXPORT int CBS_contains_zero_byte(const CBS *cbs);
92
93
// CBS_mem_equal compares the current contents of |cbs| with the |len| bytes
94
// starting at |data|. If they're equal, it returns one, otherwise zero. If the
95
// lengths match, it uses a constant-time comparison.
96
OPENSSL_EXPORT int CBS_mem_equal(const CBS *cbs, const uint8_t *data,
97
                                 size_t len);
98
99
// CBS_get_u8 sets |*out| to the next uint8_t from |cbs| and advances |cbs|. It
100
// returns one on success and zero on error.
101
OPENSSL_EXPORT int CBS_get_u8(CBS *cbs, uint8_t *out);
102
103
// CBS_get_u16 sets |*out| to the next, big-endian uint16_t from |cbs| and
104
// advances |cbs|. It returns one on success and zero on error.
105
OPENSSL_EXPORT int CBS_get_u16(CBS *cbs, uint16_t *out);
106
107
// CBS_get_u16le sets |*out| to the next, little-endian uint16_t from |cbs| and
108
// advances |cbs|. It returns one on success and zero on error.
109
OPENSSL_EXPORT int CBS_get_u16le(CBS *cbs, uint16_t *out);
110
111
// CBS_get_u24 sets |*out| to the next, big-endian 24-bit value from |cbs| and
112
// advances |cbs|. It returns one on success and zero on error.
113
OPENSSL_EXPORT int CBS_get_u24(CBS *cbs, uint32_t *out);
114
115
// CBS_get_u32 sets |*out| to the next, big-endian uint32_t value from |cbs|
116
// and advances |cbs|. It returns one on success and zero on error.
117
OPENSSL_EXPORT int CBS_get_u32(CBS *cbs, uint32_t *out);
118
119
// CBS_get_u32le sets |*out| to the next, little-endian uint32_t value from
120
// |cbs| and advances |cbs|. It returns one on success and zero on error.
121
OPENSSL_EXPORT int CBS_get_u32le(CBS *cbs, uint32_t *out);
122
123
// CBS_get_u64 sets |*out| to the next, big-endian uint64_t value from |cbs|
124
// and advances |cbs|. It returns one on success and zero on error.
125
OPENSSL_EXPORT int CBS_get_u64(CBS *cbs, uint64_t *out);
126
127
// CBS_get_u64le sets |*out| to the next, little-endian uint64_t value from
128
// |cbs| and advances |cbs|. It returns one on success and zero on error.
129
OPENSSL_EXPORT int CBS_get_u64le(CBS *cbs, uint64_t *out);
130
131
// CBS_get_last_u8 sets |*out| to the last uint8_t from |cbs| and shortens
132
// |cbs|. It returns one on success and zero on error.
133
OPENSSL_EXPORT int CBS_get_last_u8(CBS *cbs, uint8_t *out);
134
135
// CBS_get_bytes sets |*out| to the next |len| bytes from |cbs| and advances
136
// |cbs|. It returns one on success and zero on error.
137
OPENSSL_EXPORT int CBS_get_bytes(CBS *cbs, CBS *out, size_t len);
138
139
// CBS_copy_bytes copies the next |len| bytes from |cbs| to |out| and advances
140
// |cbs|. It returns one on success and zero on error.
141
OPENSSL_EXPORT int CBS_copy_bytes(CBS *cbs, uint8_t *out, size_t len);
142
143
// CBS_get_u8_length_prefixed sets |*out| to the contents of an 8-bit,
144
// length-prefixed value from |cbs| and advances |cbs| over it. It returns one
145
// on success and zero on error.
146
OPENSSL_EXPORT int CBS_get_u8_length_prefixed(CBS *cbs, CBS *out);
147
148
// CBS_get_u16_length_prefixed sets |*out| to the contents of a 16-bit,
149
// big-endian, length-prefixed value from |cbs| and advances |cbs| over it. It
150
// returns one on success and zero on error.
151
OPENSSL_EXPORT int CBS_get_u16_length_prefixed(CBS *cbs, CBS *out);
152
153
// CBS_get_u24_length_prefixed sets |*out| to the contents of a 24-bit,
154
// big-endian, length-prefixed value from |cbs| and advances |cbs| over it. It
155
// returns one on success and zero on error.
156
OPENSSL_EXPORT int CBS_get_u24_length_prefixed(CBS *cbs, CBS *out);
157
158
// CBS_get_until_first finds the first instance of |c| in |cbs|. If found, it
159
// sets |*out| to the text before the match, advances |cbs| over it, and returns
160
// one. Otherwise, it returns zero and leaves |cbs| unmodified.
161
OPENSSL_EXPORT int CBS_get_until_first(CBS *cbs, CBS *out, uint8_t c);
162
163
// CBS_get_u64_decimal reads a decimal integer from |cbs| and writes it to
164
// |*out|. It stops reading at the end of the string, or the first non-digit
165
// character. It returns one on success and zero on error. This function behaves
166
// analogously to |strtoul| except it does not accept empty inputs, leading
167
// zeros, or negative values.
168
OPENSSL_EXPORT int CBS_get_u64_decimal(CBS *cbs, uint64_t *out);
169
170
171
// Parsing ASN.1
172
//
173
// |CBS| may be used to parse DER structures. Rather than using a schema
174
// compiler, the following functions act on tag-length-value elements in the
175
// serialization itself. Thus the caller is responsible for looping over a
176
// SEQUENCE, branching on CHOICEs or OPTIONAL fields, checking for trailing
177
// data, and handling explict vs. implicit tagging.
178
//
179
// Tags are represented as |CBS_ASN1_TAG| values in memory. The upper few bits
180
// store the class and constructed bit, and the remaining bits store the tag
181
// number. Note this differs from the DER serialization, to support tag numbers
182
// beyond 31. Consumers must use the constants defined below to decompose or
183
// assemble tags.
184
//
185
// This library treats an element's constructed bit as part of its tag. In DER,
186
// the constructed bit is computable from the type. The constants for universal
187
// types have the bit set. Callers must set it correctly for tagged types.
188
// Explicitly-tagged types are always constructed, and implicitly-tagged types
189
// inherit the underlying type's bit.
190
191
// CBS_ASN1_TAG_SHIFT is how much the in-memory representation shifts the class
192
// and constructed bits from the DER serialization.
193
22.3M
#define CBS_ASN1_TAG_SHIFT 24
194
195
// CBS_ASN1_CONSTRUCTED may be ORed into a tag to set the constructed bit.
196
11.4M
#define CBS_ASN1_CONSTRUCTED (0x20u << CBS_ASN1_TAG_SHIFT)
197
198
// The following values specify the tag class and may be ORed into a tag number
199
// to produce the final tag. If none is used, the tag will be UNIVERSAL.
200
0
#define CBS_ASN1_UNIVERSAL (0u << CBS_ASN1_TAG_SHIFT)
201
0
#define CBS_ASN1_APPLICATION (0x40u << CBS_ASN1_TAG_SHIFT)
202
10.1k
#define CBS_ASN1_CONTEXT_SPECIFIC (0x80u << CBS_ASN1_TAG_SHIFT)
203
0
#define CBS_ASN1_PRIVATE (0xc0u << CBS_ASN1_TAG_SHIFT)
204
205
// CBS_ASN1_CLASS_MASK may be ANDed with a tag to query its class. This will
206
// give one of the four values above.
207
14.4k
#define CBS_ASN1_CLASS_MASK (0xc0u << CBS_ASN1_TAG_SHIFT)
208
209
// CBS_ASN1_TAG_NUMBER_MASK may be ANDed with a tag to query its number.
210
3.54M
#define CBS_ASN1_TAG_NUMBER_MASK ((1u << (5 + CBS_ASN1_TAG_SHIFT)) - 1)
211
212
// The following values are constants for UNIVERSAL tags. Note these constants
213
// include the constructed bit.
214
0
#define CBS_ASN1_BOOLEAN 0x1u
215
12.1k
#define CBS_ASN1_INTEGER 0x2u
216
1.27k
#define CBS_ASN1_BITSTRING 0x3u
217
17.7k
#define CBS_ASN1_OCTETSTRING 0x4u
218
772
#define CBS_ASN1_NULL 0x5u
219
16.9k
#define CBS_ASN1_OBJECT 0x6u
220
0
#define CBS_ASN1_ENUMERATED 0xau
221
2.11k
#define CBS_ASN1_UTF8STRING 0xcu
222
39.7k
#define CBS_ASN1_SEQUENCE (0x10u | CBS_ASN1_CONSTRUCTED)
223
1.09k
#define CBS_ASN1_SET (0x11u | CBS_ASN1_CONSTRUCTED)
224
2.59k
#define CBS_ASN1_NUMERICSTRING 0x12u
225
2.87k
#define CBS_ASN1_PRINTABLESTRING 0x13u
226
2.98k
#define CBS_ASN1_T61STRING 0x14u
227
3.21k
#define CBS_ASN1_VIDEOTEXSTRING 0x15u
228
3.41k
#define CBS_ASN1_IA5STRING 0x16u
229
0
#define CBS_ASN1_UTCTIME 0x17u
230
0
#define CBS_ASN1_GENERALIZEDTIME 0x18u
231
3.48k
#define CBS_ASN1_GRAPHICSTRING 0x19u
232
3.54k
#define CBS_ASN1_VISIBLESTRING 0x1au
233
4.19k
#define CBS_ASN1_GENERALSTRING 0x1bu
234
4.65k
#define CBS_ASN1_UNIVERSALSTRING 0x1cu
235
5.00k
#define CBS_ASN1_BMPSTRING 0x1eu
236
237
// CBS_get_asn1 sets |*out| to the contents of DER-encoded, ASN.1 element (not
238
// including tag and length bytes) and advances |cbs| over it. The ASN.1
239
// element must match |tag_value|. It returns one on success and zero
240
// on error.
241
OPENSSL_EXPORT int CBS_get_asn1(CBS *cbs, CBS *out, CBS_ASN1_TAG tag_value);
242
243
// CBS_get_asn1_element acts like |CBS_get_asn1| but |out| will include the
244
// ASN.1 header bytes too.
245
OPENSSL_EXPORT int CBS_get_asn1_element(CBS *cbs, CBS *out,
246
                                        CBS_ASN1_TAG tag_value);
247
248
// CBS_peek_asn1_tag looks ahead at the next ASN.1 tag and returns one
249
// if the next ASN.1 element on |cbs| would have tag |tag_value|. If
250
// |cbs| is empty or the tag does not match, it returns zero. Note: if
251
// it returns one, CBS_get_asn1 may still fail if the rest of the
252
// element is malformed.
253
OPENSSL_EXPORT int CBS_peek_asn1_tag(const CBS *cbs, CBS_ASN1_TAG tag_value);
254
255
// CBS_get_any_asn1 sets |*out| to contain the next ASN.1 element from |*cbs|
256
// (not including tag and length bytes), sets |*out_tag| to the tag number, and
257
// advances |*cbs|. It returns one on success and zero on error. Either of |out|
258
// and |out_tag| may be NULL to ignore the value.
259
OPENSSL_EXPORT int CBS_get_any_asn1(CBS *cbs, CBS *out,
260
                                    CBS_ASN1_TAG *out_tag);
261
262
// CBS_get_any_asn1_element sets |*out| to contain the next ASN.1 element from
263
// |*cbs| (including header bytes) and advances |*cbs|. It sets |*out_tag| to
264
// the tag number and |*out_header_len| to the length of the ASN.1 header. Each
265
// of |out|, |out_tag|, and |out_header_len| may be NULL to ignore the value.
266
OPENSSL_EXPORT int CBS_get_any_asn1_element(CBS *cbs, CBS *out,
267
                                            CBS_ASN1_TAG *out_tag,
268
                                            size_t *out_header_len);
269
270
// CBS_get_any_ber_asn1_element acts the same as |CBS_get_any_asn1_element| but
271
// also allows indefinite-length elements to be returned and does not enforce
272
// that lengths are minimal. It sets |*out_indefinite| to one if the length was
273
// indefinite and zero otherwise. If indefinite, |*out_header_len| and
274
// |CBS_len(out)| will be equal as only the header is returned (although this is
275
// also true for empty elements so |*out_indefinite| should be checked). If
276
// |out_ber_found| is not NULL then it is set to one if any case of invalid DER
277
// but valid BER is found, and to zero otherwise.
278
//
279
// This function will not successfully parse an end-of-contents (EOC) as an
280
// element. Callers parsing indefinite-length encoding must check for EOC
281
// separately.
282
OPENSSL_EXPORT int CBS_get_any_ber_asn1_element(CBS *cbs, CBS *out,
283
                                                CBS_ASN1_TAG *out_tag,
284
                                                size_t *out_header_len,
285
                                                int *out_ber_found,
286
                                                int *out_indefinite);
287
288
// CBS_get_asn1_uint64 gets an ASN.1 INTEGER from |cbs| using |CBS_get_asn1|
289
// and sets |*out| to its value. It returns one on success and zero on error,
290
// where error includes the integer being negative, or too large to represent
291
// in 64 bits.
292
OPENSSL_EXPORT int CBS_get_asn1_uint64(CBS *cbs, uint64_t *out);
293
294
// CBS_get_asn1_int64 gets an ASN.1 INTEGER from |cbs| using |CBS_get_asn1|
295
// and sets |*out| to its value. It returns one on success and zero on error,
296
// where error includes the integer being too large to represent in 64 bits.
297
OPENSSL_EXPORT int CBS_get_asn1_int64(CBS *cbs, int64_t *out);
298
299
// CBS_get_asn1_bool gets an ASN.1 BOOLEAN from |cbs| and sets |*out| to zero
300
// or one based on its value. It returns one on success or zero on error.
301
OPENSSL_EXPORT int CBS_get_asn1_bool(CBS *cbs, int *out);
302
303
// CBS_get_optional_asn1 gets an optional explicitly-tagged element from |cbs|
304
// tagged with |tag| and sets |*out| to its contents, or ignores it if |out| is
305
// NULL. If present and if |out_present| is not NULL, it sets |*out_present| to
306
// one, otherwise zero. It returns one on success, whether or not the element
307
// was present, and zero on decode failure.
308
OPENSSL_EXPORT int CBS_get_optional_asn1(CBS *cbs, CBS *out, int *out_present,
309
                                         CBS_ASN1_TAG tag);
310
311
// CBS_get_optional_asn1_octet_string gets an optional
312
// explicitly-tagged OCTET STRING from |cbs|. If present, it sets
313
// |*out| to the string and |*out_present| to one. Otherwise, it sets
314
// |*out| to empty and |*out_present| to zero. |out_present| may be
315
// NULL. It returns one on success, whether or not the element was
316
// present, and zero on decode failure.
317
OPENSSL_EXPORT int CBS_get_optional_asn1_octet_string(CBS *cbs, CBS *out,
318
                                                      int *out_present,
319
                                                      CBS_ASN1_TAG tag);
320
321
// CBS_get_optional_asn1_uint64 gets an optional explicitly-tagged
322
// INTEGER from |cbs|. If present, it sets |*out| to the
323
// value. Otherwise, it sets |*out| to |default_value|. It returns one
324
// on success, whether or not the element was present, and zero on
325
// decode failure.
326
OPENSSL_EXPORT int CBS_get_optional_asn1_uint64(CBS *cbs, uint64_t *out,
327
                                                CBS_ASN1_TAG tag,
328
                                                uint64_t default_value);
329
330
// CBS_get_optional_asn1_bool gets an optional, explicitly-tagged BOOLEAN from
331
// |cbs|. If present, it sets |*out| to either zero or one, based on the
332
// boolean. Otherwise, it sets |*out| to |default_value|. It returns one on
333
// success, whether or not the element was present, and zero on decode
334
// failure.
335
OPENSSL_EXPORT int CBS_get_optional_asn1_bool(CBS *cbs, int *out,
336
                                              CBS_ASN1_TAG tag,
337
                                              int default_value);
338
339
// CBS_is_valid_asn1_bitstring returns one if |cbs| is a valid ASN.1 BIT STRING
340
// body and zero otherwise.
341
OPENSSL_EXPORT int CBS_is_valid_asn1_bitstring(const CBS *cbs);
342
343
// CBS_asn1_bitstring_has_bit returns one if |cbs| is a valid ASN.1 BIT STRING
344
// body and the specified bit is present and set. Otherwise, it returns zero.
345
// |bit| is indexed starting from zero.
346
OPENSSL_EXPORT int CBS_asn1_bitstring_has_bit(const CBS *cbs, unsigned bit);
347
348
// CBS_is_valid_asn1_integer returns one if |cbs| is a valid ASN.1 INTEGER,
349
// body and zero otherwise. On success, if |out_is_negative| is non-NULL,
350
// |*out_is_negative| will be set to one if |cbs| is negative and zero
351
// otherwise.
352
OPENSSL_EXPORT int CBS_is_valid_asn1_integer(const CBS *cbs,
353
                                             int *out_is_negative);
354
355
// CBS_is_unsigned_asn1_integer returns one if |cbs| is a valid non-negative
356
// ASN.1 INTEGER body and zero otherwise.
357
OPENSSL_EXPORT int CBS_is_unsigned_asn1_integer(const CBS *cbs);
358
359
// CBS_is_valid_asn1_oid returns one if |cbs| is a valid DER-encoded ASN.1
360
// OBJECT IDENTIFIER contents (not including the element framing) and zero
361
// otherwise. This function tolerates arbitrarily large OID components.
362
OPENSSL_EXPORT int CBS_is_valid_asn1_oid(const CBS *cbs);
363
364
// CBS_asn1_oid_to_text interprets |cbs| as DER-encoded ASN.1 OBJECT IDENTIFIER
365
// contents (not including the element framing) and returns the ASCII
366
// representation (e.g., "1.2.840.113554.4.1.72585") in a newly-allocated
367
// string, or NULL on failure. The caller must release the result with
368
// |OPENSSL_free|.
369
//
370
// This function may fail if |cbs| is an invalid OBJECT IDENTIFIER, or if any
371
// OID components are too large.
372
OPENSSL_EXPORT char *CBS_asn1_oid_to_text(const CBS *cbs);
373
374
375
// CBS_parse_generalized_time returns one if |cbs| is a valid DER-encoded, ASN.1
376
// GeneralizedTime body within the limitations imposed by RFC 5280, or zero
377
// otherwise. If |allow_timezone_offset| is non-zero, four-digit timezone
378
// offsets, which would not be allowed by DER, are permitted. On success, if
379
// |out_tm| is non-NULL, |*out_tm| will be zeroed, and then set to the
380
// corresponding time in UTC. This function does not compute |out_tm->tm_wday|
381
// or |out_tm->tm_yday|.
382
OPENSSL_EXPORT int CBS_parse_generalized_time(const CBS *cbs, struct tm *out_tm,
383
                                              int allow_timezone_offset);
384
385
// CBS_parse_utc_time returns one if |cbs| is a valid DER-encoded, ASN.1
386
// UTCTime body within the limitations imposed by RFC 5280, or zero otherwise.
387
// If |allow_timezone_offset| is non-zero, four-digit timezone offsets, which
388
// would not be allowed by DER, are permitted. On success, if |out_tm| is
389
// non-NULL, |*out_tm| will be zeroed, and then set to the corresponding time
390
// in UTC. This function does not compute |out_tm->tm_wday| or
391
// |out_tm->tm_yday|.
392
OPENSSL_EXPORT int CBS_parse_utc_time(const CBS *cbs, struct tm *out_tm,
393
                                      int allow_timezone_offset);
394
395
// CRYPTO ByteBuilder.
396
//
397
// |CBB| objects allow one to build length-prefixed serialisations. A |CBB|
398
// object is associated with a buffer and new buffers are created with
399
// |CBB_init|. Several |CBB| objects can point at the same buffer when a
400
// length-prefix is pending, however only a single |CBB| can be 'current' at
401
// any one time. For example, if one calls |CBB_add_u8_length_prefixed| then
402
// the new |CBB| points at the same buffer as the original. But if the original
403
// |CBB| is used then the length prefix is written out and the new |CBB| must
404
// not be used again.
405
//
406
// If one needs to force a length prefix to be written out because a |CBB| is
407
// going out of scope, use |CBB_flush|. If an operation on a |CBB| fails, it is
408
// in an undefined state and must not be used except to call |CBB_cleanup|.
409
410
struct cbb_buffer_st {
411
  uint8_t *buf;
412
  // len is the number of valid bytes in |buf|.
413
  size_t len;
414
  // cap is the size of |buf|.
415
  size_t cap;
416
  // can_resize is one iff |buf| is owned by this object. If not then |buf|
417
  // cannot be resized.
418
  unsigned can_resize : 1;
419
  // error is one if there was an error writing to this CBB. All future
420
  // operations will fail.
421
  unsigned error : 1;
422
};
423
424
struct cbb_child_st {
425
  // base is a pointer to the buffer this |CBB| writes to.
426
  struct cbb_buffer_st *base;
427
  // offset is the number of bytes from the start of |base->buf| to this |CBB|'s
428
  // pending length prefix.
429
  size_t offset;
430
  // pending_len_len contains the number of bytes in this |CBB|'s pending
431
  // length-prefix, or zero if no length-prefix is pending.
432
  uint8_t pending_len_len;
433
  unsigned pending_is_asn1 : 1;
434
};
435
436
struct cbb_st {
437
  // child points to a child CBB if a length-prefix is pending.
438
  CBB *child;
439
  // is_child is one if this is a child |CBB| and zero if it is a top-level
440
  // |CBB|. This determines which arm of the union is valid.
441
  char is_child;
442
  union {
443
    struct cbb_buffer_st base;
444
    struct cbb_child_st child;
445
  } u;
446
};
447
448
// CBB_zero sets an uninitialised |cbb| to the zero state. It must be
449
// initialised with |CBB_init| or |CBB_init_fixed| before use, but it is safe to
450
// call |CBB_cleanup| without a successful |CBB_init|. This may be used for more
451
// uniform cleanup of a |CBB|.
452
OPENSSL_EXPORT void CBB_zero(CBB *cbb);
453
454
// CBB_init initialises |cbb| with |initial_capacity|. Since a |CBB| grows as
455
// needed, the |initial_capacity| is just a hint. It returns one on success or
456
// zero on allocation failure.
457
OPENSSL_EXPORT int CBB_init(CBB *cbb, size_t initial_capacity);
458
459
// CBB_init_fixed initialises |cbb| to write to |len| bytes at |buf|. Since
460
// |buf| cannot grow, trying to write more than |len| bytes will cause CBB
461
// functions to fail. This function is infallible and always returns one. It is
462
// safe, but not necessary, to call |CBB_cleanup| on |cbb|.
463
OPENSSL_EXPORT int CBB_init_fixed(CBB *cbb, uint8_t *buf, size_t len);
464
465
// CBB_cleanup frees all resources owned by |cbb| and other |CBB| objects
466
// writing to the same buffer. This should be used in an error case where a
467
// serialisation is abandoned.
468
//
469
// This function can only be called on a "top level" |CBB|, i.e. one initialised
470
// with |CBB_init| or |CBB_init_fixed|, or a |CBB| set to the zero state with
471
// |CBB_zero|.
472
OPENSSL_EXPORT void CBB_cleanup(CBB *cbb);
473
474
// CBB_finish completes any pending length prefix and sets |*out_data| to a
475
// malloced buffer and |*out_len| to the length of that buffer. The caller
476
// takes ownership of the buffer and, unless the buffer was fixed with
477
// |CBB_init_fixed|, must call |OPENSSL_free| when done.
478
//
479
// It can only be called on a "top level" |CBB|, i.e. one initialised with
480
// |CBB_init| or |CBB_init_fixed|. It returns one on success and zero on
481
// error.
482
OPENSSL_EXPORT int CBB_finish(CBB *cbb, uint8_t **out_data, size_t *out_len);
483
484
// CBB_flush causes any pending length prefixes to be written out and any child
485
// |CBB| objects of |cbb| to be invalidated. This allows |cbb| to continue to be
486
// used after the children go out of scope, e.g. when local |CBB| objects are
487
// added as children to a |CBB| that persists after a function returns. This
488
// function returns one on success or zero on error.
489
OPENSSL_EXPORT int CBB_flush(CBB *cbb);
490
491
// CBB_data returns a pointer to the bytes written to |cbb|. It does not flush
492
// |cbb|. The pointer is valid until the next operation to |cbb|.
493
//
494
// To avoid unfinalized length prefixes, it is a fatal error to call this on a
495
// CBB with any active children.
496
OPENSSL_EXPORT const uint8_t *CBB_data(const CBB *cbb);
497
498
// CBB_len returns the number of bytes written to |cbb|. It does not flush
499
// |cbb|.
500
//
501
// To avoid unfinalized length prefixes, it is a fatal error to call this on a
502
// CBB with any active children.
503
OPENSSL_EXPORT size_t CBB_len(const CBB *cbb);
504
505
// CBB_add_u8_length_prefixed sets |*out_contents| to a new child of |cbb|. The
506
// data written to |*out_contents| will be prefixed in |cbb| with an 8-bit
507
// length. It returns one on success or zero on error.
508
OPENSSL_EXPORT int CBB_add_u8_length_prefixed(CBB *cbb, CBB *out_contents);
509
510
// CBB_add_u16_length_prefixed sets |*out_contents| to a new child of |cbb|.
511
// The data written to |*out_contents| will be prefixed in |cbb| with a 16-bit,
512
// big-endian length. It returns one on success or zero on error.
513
OPENSSL_EXPORT int CBB_add_u16_length_prefixed(CBB *cbb, CBB *out_contents);
514
515
// CBB_add_u24_length_prefixed sets |*out_contents| to a new child of |cbb|.
516
// The data written to |*out_contents| will be prefixed in |cbb| with a 24-bit,
517
// big-endian length. It returns one on success or zero on error.
518
OPENSSL_EXPORT int CBB_add_u24_length_prefixed(CBB *cbb, CBB *out_contents);
519
520
// CBB_add_asn1 sets |*out_contents| to a |CBB| into which the contents of an
521
// ASN.1 object can be written. The |tag| argument will be used as the tag for
522
// the object. It returns one on success or zero on error.
523
OPENSSL_EXPORT int CBB_add_asn1(CBB *cbb, CBB *out_contents, CBS_ASN1_TAG tag);
524
525
// CBB_add_bytes appends |len| bytes from |data| to |cbb|. It returns one on
526
// success and zero otherwise.
527
OPENSSL_EXPORT int CBB_add_bytes(CBB *cbb, const uint8_t *data, size_t len);
528
529
// CBB_add_zeros append |len| bytes with value zero to |cbb|. It returns one on
530
// success and zero otherwise.
531
OPENSSL_EXPORT int CBB_add_zeros(CBB *cbb, size_t len);
532
533
// CBB_add_space appends |len| bytes to |cbb| and sets |*out_data| to point to
534
// the beginning of that space. The caller must then write |len| bytes of
535
// actual contents to |*out_data|. It returns one on success and zero
536
// otherwise.
537
OPENSSL_EXPORT int CBB_add_space(CBB *cbb, uint8_t **out_data, size_t len);
538
539
// CBB_reserve ensures |cbb| has room for |len| additional bytes and sets
540
// |*out_data| to point to the beginning of that space. It returns one on
541
// success and zero otherwise. The caller may write up to |len| bytes to
542
// |*out_data| and call |CBB_did_write| to complete the write. |*out_data| is
543
// valid until the next operation on |cbb| or an ancestor |CBB|.
544
OPENSSL_EXPORT int CBB_reserve(CBB *cbb, uint8_t **out_data, size_t len);
545
546
// CBB_did_write advances |cbb| by |len| bytes, assuming the space has been
547
// written to by the caller. It returns one on success and zero on error.
548
OPENSSL_EXPORT int CBB_did_write(CBB *cbb, size_t len);
549
550
// CBB_add_u8 appends an 8-bit number from |value| to |cbb|. It returns one on
551
// success and zero otherwise.
552
OPENSSL_EXPORT int CBB_add_u8(CBB *cbb, uint8_t value);
553
554
// CBB_add_u16 appends a 16-bit, big-endian number from |value| to |cbb|. It
555
// returns one on success and zero otherwise.
556
OPENSSL_EXPORT int CBB_add_u16(CBB *cbb, uint16_t value);
557
558
// CBB_add_u16le appends a 16-bit, little-endian number from |value| to |cbb|.
559
// It returns one on success and zero otherwise.
560
OPENSSL_EXPORT int CBB_add_u16le(CBB *cbb, uint16_t value);
561
562
// CBB_add_u24 appends a 24-bit, big-endian number from |value| to |cbb|. It
563
// returns one on success and zero otherwise.
564
OPENSSL_EXPORT int CBB_add_u24(CBB *cbb, uint32_t value);
565
566
// CBB_add_u32 appends a 32-bit, big-endian number from |value| to |cbb|. It
567
// returns one on success and zero otherwise.
568
OPENSSL_EXPORT int CBB_add_u32(CBB *cbb, uint32_t value);
569
570
// CBB_add_u32le appends a 32-bit, little-endian number from |value| to |cbb|.
571
// It returns one on success and zero otherwise.
572
OPENSSL_EXPORT int CBB_add_u32le(CBB *cbb, uint32_t value);
573
574
// CBB_add_u64 appends a 64-bit, big-endian number from |value| to |cbb|. It
575
// returns one on success and zero otherwise.
576
OPENSSL_EXPORT int CBB_add_u64(CBB *cbb, uint64_t value);
577
578
// CBB_add_u64le appends a 64-bit, little-endian number from |value| to |cbb|.
579
// It returns one on success and zero otherwise.
580
OPENSSL_EXPORT int CBB_add_u64le(CBB *cbb, uint64_t value);
581
582
// CBB_discard_child discards the current unflushed child of |cbb|. Neither the
583
// child's contents nor the length prefix will be included in the output.
584
OPENSSL_EXPORT void CBB_discard_child(CBB *cbb);
585
586
// CBB_add_asn1_uint64 writes an ASN.1 INTEGER into |cbb| using |CBB_add_asn1|
587
// and writes |value| in its contents. It returns one on success and zero on
588
// error.
589
OPENSSL_EXPORT int CBB_add_asn1_uint64(CBB *cbb, uint64_t value);
590
591
// CBB_add_asn1_uint64_with_tag behaves like |CBB_add_asn1_uint64| but uses
592
// |tag| as the tag instead of INTEGER. This is useful if the INTEGER type uses
593
// implicit tagging.
594
OPENSSL_EXPORT int CBB_add_asn1_uint64_with_tag(CBB *cbb, uint64_t value,
595
                                                CBS_ASN1_TAG tag);
596
597
// CBB_add_asn1_int64 writes an ASN.1 INTEGER into |cbb| using |CBB_add_asn1|
598
// and writes |value| in its contents. It returns one on success and zero on
599
// error.
600
OPENSSL_EXPORT int CBB_add_asn1_int64(CBB *cbb, int64_t value);
601
602
// CBB_add_asn1_int64_with_tag behaves like |CBB_add_asn1_int64| but uses |tag|
603
// as the tag instead of INTEGER. This is useful if the INTEGER type uses
604
// implicit tagging.
605
OPENSSL_EXPORT int CBB_add_asn1_int64_with_tag(CBB *cbb, int64_t value,
606
                                               CBS_ASN1_TAG tag);
607
608
// CBB_add_asn1_octet_string writes an ASN.1 OCTET STRING into |cbb| with the
609
// given contents. It returns one on success and zero on error.
610
OPENSSL_EXPORT int CBB_add_asn1_octet_string(CBB *cbb, const uint8_t *data,
611
                                             size_t data_len);
612
613
// CBB_add_asn1_bool writes an ASN.1 BOOLEAN into |cbb| which is true iff
614
// |value| is non-zero.  It returns one on success and zero on error.
615
OPENSSL_EXPORT int CBB_add_asn1_bool(CBB *cbb, int value);
616
617
// CBB_add_asn1_oid_from_text decodes |len| bytes from |text| as an ASCII OID
618
// representation, e.g. "1.2.840.113554.4.1.72585", and writes the DER-encoded
619
// contents to |cbb|. It returns one on success and zero on malloc failure or if
620
// |text| was invalid. It does not include the OBJECT IDENTIFER framing, only
621
// the element's contents.
622
//
623
// This function considers OID strings with components which do not fit in a
624
// |uint64_t| to be invalid.
625
OPENSSL_EXPORT int CBB_add_asn1_oid_from_text(CBB *cbb, const char *text,
626
                                              size_t len);
627
628
// CBB_flush_asn1_set_of calls |CBB_flush| on |cbb| and then reorders the
629
// contents for a DER-encoded ASN.1 SET OF type. It returns one on success and
630
// zero on failure. DER canonicalizes SET OF contents by sorting
631
// lexicographically by encoding. Call this function when encoding a SET OF
632
// type in an order that is not already known to be canonical.
633
//
634
// Note a SET type has a slightly different ordering than a SET OF.
635
OPENSSL_EXPORT int CBB_flush_asn1_set_of(CBB *cbb);
636
637
638
#if defined(__cplusplus)
639
}  // extern C
640
641
642
#if !defined(BORINGSSL_NO_CXX)
643
extern "C++" {
644
645
BSSL_NAMESPACE_BEGIN
646
647
using ScopedCBB = internal::StackAllocated<CBB, void, CBB_zero, CBB_cleanup>;
648
649
BSSL_NAMESPACE_END
650
651
}  // extern C++
652
#endif
653
654
#endif
655
656
#endif  // OPENSSL_HEADER_BYTESTRING_H