1 /* Copyright (c) 2014, Google Inc. 2 * 3 * Permission to use, copy, modify, and/or distribute this software for any 4 * purpose with or without fee is hereby granted, provided that the above 5 * copyright notice and this permission notice appear in all copies. 6 * 7 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 8 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 9 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY 10 * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 11 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION 12 * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN 13 * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ 14 15 #ifndef OPENSSL_HEADER_BYTESTRING_H 16 #define OPENSSL_HEADER_BYTESTRING_H 17 18 #include <openssl/base.h> 19 20 #include <openssl/span.h> 21 22 #if defined(__cplusplus) 23 extern "C" { 24 #endif 25 26 27 // Bytestrings are used for parsing and building TLS and ASN.1 messages. 28 // 29 // A "CBS" (CRYPTO ByteString) represents a string of bytes in memory and 30 // provides utility functions for safely parsing length-prefixed structures 31 // like TLS and ASN.1 from it. 32 // 33 // A "CBB" (CRYPTO ByteBuilder) is a memory buffer that grows as needed and 34 // provides utility functions for building length-prefixed messages. 35 36 37 // CRYPTO ByteString 38 39 struct cbs_st { 40 const uint8_t *data; 41 size_t len; 42 43 #if !defined(BORINGSSL_NO_CXX) 44 // Allow implicit conversions to and from bssl::Span<const uint8_t>. cbs_stcbs_st45 cbs_st(bssl::Span<const uint8_t> span) 46 : data(span.data()), len(span.size()) {} 47 operator bssl::Span<const uint8_t>() const { 48 return bssl::MakeConstSpan(data, len); 49 } 50 51 // Defining any constructors requires we explicitly default the others. 52 cbs_st() = default; 53 cbs_st(const cbs_st &) = default; 54 cbs_st &operator=(const cbs_st &) = default; 55 #endif 56 }; 57 58 // CBS_init sets |cbs| to point to |data|. It does not take ownership of 59 // |data|. 60 OPENSSL_EXPORT void CBS_init(CBS *cbs, const uint8_t *data, size_t len); 61 62 // CBS_skip advances |cbs| by |len| bytes. It returns one on success and zero 63 // otherwise. 64 OPENSSL_EXPORT int CBS_skip(CBS *cbs, size_t len); 65 66 // CBS_data returns a pointer to the contents of |cbs|. 67 OPENSSL_EXPORT const uint8_t *CBS_data(const CBS *cbs); 68 69 // CBS_len returns the number of bytes remaining in |cbs|. 70 OPENSSL_EXPORT size_t CBS_len(const CBS *cbs); 71 72 // CBS_stow copies the current contents of |cbs| into |*out_ptr| and 73 // |*out_len|. If |*out_ptr| is not NULL, the contents are freed with 74 // OPENSSL_free. It returns one on success and zero on allocation failure. On 75 // success, |*out_ptr| should be freed with OPENSSL_free. If |cbs| is empty, 76 // |*out_ptr| will be NULL. 77 OPENSSL_EXPORT int CBS_stow(const CBS *cbs, uint8_t **out_ptr, size_t *out_len); 78 79 // CBS_strdup copies the current contents of |cbs| into |*out_ptr| as a 80 // NUL-terminated C string. If |*out_ptr| is not NULL, the contents are freed 81 // with OPENSSL_free. It returns one on success and zero on allocation 82 // failure. On success, |*out_ptr| should be freed with OPENSSL_free. 83 // 84 // NOTE: If |cbs| contains NUL bytes, the string will be truncated. Call 85 // |CBS_contains_zero_byte(cbs)| to check for NUL bytes. 86 OPENSSL_EXPORT int CBS_strdup(const CBS *cbs, char **out_ptr); 87 88 // CBS_contains_zero_byte returns one if the current contents of |cbs| contains 89 // a NUL byte and zero otherwise. 90 OPENSSL_EXPORT int CBS_contains_zero_byte(const CBS *cbs); 91 92 // CBS_mem_equal compares the current contents of |cbs| with the |len| bytes 93 // starting at |data|. If they're equal, it returns one, otherwise zero. If the 94 // lengths match, it uses a constant-time comparison. 95 OPENSSL_EXPORT int CBS_mem_equal(const CBS *cbs, const uint8_t *data, 96 size_t len); 97 98 // CBS_get_u8 sets |*out| to the next uint8_t from |cbs| and advances |cbs|. It 99 // returns one on success and zero on error. 100 OPENSSL_EXPORT int CBS_get_u8(CBS *cbs, uint8_t *out); 101 102 // CBS_get_u16 sets |*out| to the next, big-endian uint16_t from |cbs| and 103 // advances |cbs|. It returns one on success and zero on error. 104 OPENSSL_EXPORT int CBS_get_u16(CBS *cbs, uint16_t *out); 105 106 // CBS_get_u16le sets |*out| to the next, little-endian uint16_t from |cbs| and 107 // advances |cbs|. It returns one on success and zero on error. 108 OPENSSL_EXPORT int CBS_get_u16le(CBS *cbs, uint16_t *out); 109 110 // CBS_get_u24 sets |*out| to the next, big-endian 24-bit value from |cbs| and 111 // advances |cbs|. It returns one on success and zero on error. 112 OPENSSL_EXPORT int CBS_get_u24(CBS *cbs, uint32_t *out); 113 114 // CBS_get_u32 sets |*out| to the next, big-endian uint32_t value from |cbs| 115 // and advances |cbs|. It returns one on success and zero on error. 116 OPENSSL_EXPORT int CBS_get_u32(CBS *cbs, uint32_t *out); 117 118 // CBS_get_u32le sets |*out| to the next, little-endian uint32_t value from 119 // |cbs| and advances |cbs|. It returns one on success and zero on error. 120 OPENSSL_EXPORT int CBS_get_u32le(CBS *cbs, uint32_t *out); 121 122 // CBS_get_u64 sets |*out| to the next, big-endian uint64_t value from |cbs| 123 // and advances |cbs|. It returns one on success and zero on error. 124 OPENSSL_EXPORT int CBS_get_u64(CBS *cbs, uint64_t *out); 125 126 // CBS_get_u64le sets |*out| to the next, little-endian uint64_t value from 127 // |cbs| and advances |cbs|. It returns one on success and zero on error. 128 OPENSSL_EXPORT int CBS_get_u64le(CBS *cbs, uint64_t *out); 129 130 // CBS_get_last_u8 sets |*out| to the last uint8_t from |cbs| and shortens 131 // |cbs|. It returns one on success and zero on error. 132 OPENSSL_EXPORT int CBS_get_last_u8(CBS *cbs, uint8_t *out); 133 134 // CBS_get_bytes sets |*out| to the next |len| bytes from |cbs| and advances 135 // |cbs|. It returns one on success and zero on error. 136 OPENSSL_EXPORT int CBS_get_bytes(CBS *cbs, CBS *out, size_t len); 137 138 // CBS_copy_bytes copies the next |len| bytes from |cbs| to |out| and advances 139 // |cbs|. It returns one on success and zero on error. 140 OPENSSL_EXPORT int CBS_copy_bytes(CBS *cbs, uint8_t *out, size_t len); 141 142 // CBS_get_u8_length_prefixed sets |*out| to the contents of an 8-bit, 143 // length-prefixed value from |cbs| and advances |cbs| over it. It returns one 144 // on success and zero on error. 145 OPENSSL_EXPORT int CBS_get_u8_length_prefixed(CBS *cbs, CBS *out); 146 147 // CBS_get_u16_length_prefixed sets |*out| to the contents of a 16-bit, 148 // big-endian, length-prefixed value from |cbs| and advances |cbs| over it. It 149 // returns one on success and zero on error. 150 OPENSSL_EXPORT int CBS_get_u16_length_prefixed(CBS *cbs, CBS *out); 151 152 // CBS_get_u24_length_prefixed sets |*out| to the contents of a 24-bit, 153 // big-endian, length-prefixed value from |cbs| and advances |cbs| over it. It 154 // returns one on success and zero on error. 155 OPENSSL_EXPORT int CBS_get_u24_length_prefixed(CBS *cbs, CBS *out); 156 157 // CBS_get_until_first finds the first instance of |c| in |cbs|. If found, it 158 // sets |*out| to the text before the match, advances |cbs| over it, and returns 159 // one. Otherwise, it returns zero and leaves |cbs| unmodified. 160 OPENSSL_EXPORT int CBS_get_until_first(CBS *cbs, CBS *out, uint8_t c); 161 162 163 // Parsing ASN.1 164 // 165 // |CBS| may be used to parse DER structures. Rather than using a schema 166 // compiler, the following functions act on tag-length-value elements in the 167 // serialization itself. Thus the caller is responsible for looping over a 168 // SEQUENCE, branching on CHOICEs or OPTIONAL fields, checking for trailing 169 // data, and handling explict vs. implicit tagging. 170 // 171 // Tags are represented as |unsigned| values in memory. The upper few bits store 172 // the class and constructed bit, and the remaining bits store the tag 173 // number. Note this differs from the DER serialization, to support tag numbers 174 // beyond 31. Consumers must use the constants defined below to decompose or 175 // assemble tags. 176 // 177 // This library treats an element's constructed bit as part of its tag. In DER, 178 // the constructed bit is computable from the type. The constants for universal 179 // types have the bit set. Callers must set it correctly for tagged types. 180 // Explicitly-tagged types are always constructed, and implicitly-tagged types 181 // inherit the underlying type's bit. 182 183 // CBS_ASN1_TAG_SHIFT is how much the in-memory representation shifts the class 184 // and constructed bits from the DER serialization. 185 #define CBS_ASN1_TAG_SHIFT 24 186 187 // CBS_ASN1_CONSTRUCTED may be ORed into a tag to set the constructed bit. 188 #define CBS_ASN1_CONSTRUCTED (0x20u << CBS_ASN1_TAG_SHIFT) 189 190 // The following values specify the tag class and may be ORed into a tag number 191 // to produce the final tag. If none is used, the tag will be UNIVERSAL. 192 #define CBS_ASN1_UNIVERSAL (0u << CBS_ASN1_TAG_SHIFT) 193 #define CBS_ASN1_APPLICATION (0x40u << CBS_ASN1_TAG_SHIFT) 194 #define CBS_ASN1_CONTEXT_SPECIFIC (0x80u << CBS_ASN1_TAG_SHIFT) 195 #define CBS_ASN1_PRIVATE (0xc0u << CBS_ASN1_TAG_SHIFT) 196 197 // CBS_ASN1_CLASS_MASK may be ANDed with a tag to query its class. This will 198 // give one of the four values above. 199 #define CBS_ASN1_CLASS_MASK (0xc0u << CBS_ASN1_TAG_SHIFT) 200 201 // CBS_ASN1_TAG_NUMBER_MASK may be ANDed with a tag to query its number. 202 #define CBS_ASN1_TAG_NUMBER_MASK ((1u << (5 + CBS_ASN1_TAG_SHIFT)) - 1) 203 204 // The following values are constants for UNIVERSAL tags. Note these constants 205 // include the constructed bit. 206 #define CBS_ASN1_BOOLEAN 0x1u 207 #define CBS_ASN1_INTEGER 0x2u 208 #define CBS_ASN1_BITSTRING 0x3u 209 #define CBS_ASN1_OCTETSTRING 0x4u 210 #define CBS_ASN1_NULL 0x5u 211 #define CBS_ASN1_OBJECT 0x6u 212 #define CBS_ASN1_ENUMERATED 0xau 213 #define CBS_ASN1_UTF8STRING 0xcu 214 #define CBS_ASN1_SEQUENCE (0x10u | CBS_ASN1_CONSTRUCTED) 215 #define CBS_ASN1_SET (0x11u | CBS_ASN1_CONSTRUCTED) 216 #define CBS_ASN1_NUMERICSTRING 0x12u 217 #define CBS_ASN1_PRINTABLESTRING 0x13u 218 #define CBS_ASN1_T61STRING 0x14u 219 #define CBS_ASN1_VIDEOTEXSTRING 0x15u 220 #define CBS_ASN1_IA5STRING 0x16u 221 #define CBS_ASN1_UTCTIME 0x17u 222 #define CBS_ASN1_GENERALIZEDTIME 0x18u 223 #define CBS_ASN1_GRAPHICSTRING 0x19u 224 #define CBS_ASN1_VISIBLESTRING 0x1au 225 #define CBS_ASN1_GENERALSTRING 0x1bu 226 #define CBS_ASN1_UNIVERSALSTRING 0x1cu 227 #define CBS_ASN1_BMPSTRING 0x1eu 228 229 // CBS_get_asn1 sets |*out| to the contents of DER-encoded, ASN.1 element (not 230 // including tag and length bytes) and advances |cbs| over it. The ASN.1 231 // element must match |tag_value|. It returns one on success and zero 232 // on error. 233 OPENSSL_EXPORT int CBS_get_asn1(CBS *cbs, CBS *out, unsigned tag_value); 234 235 // CBS_get_asn1_element acts like |CBS_get_asn1| but |out| will include the 236 // ASN.1 header bytes too. 237 OPENSSL_EXPORT int CBS_get_asn1_element(CBS *cbs, CBS *out, unsigned tag_value); 238 239 // CBS_peek_asn1_tag looks ahead at the next ASN.1 tag and returns one 240 // if the next ASN.1 element on |cbs| would have tag |tag_value|. If 241 // |cbs| is empty or the tag does not match, it returns zero. Note: if 242 // it returns one, CBS_get_asn1 may still fail if the rest of the 243 // element is malformed. 244 OPENSSL_EXPORT int CBS_peek_asn1_tag(const CBS *cbs, unsigned tag_value); 245 246 // CBS_get_any_asn1 sets |*out| to contain the next ASN.1 element from |*cbs| 247 // (not including tag and length bytes), sets |*out_tag| to the tag number, and 248 // advances |*cbs|. It returns one on success and zero on error. Either of |out| 249 // and |out_tag| may be NULL to ignore the value. 250 OPENSSL_EXPORT int CBS_get_any_asn1(CBS *cbs, CBS *out, unsigned *out_tag); 251 252 // CBS_get_any_asn1_element sets |*out| to contain the next ASN.1 element from 253 // |*cbs| (including header bytes) and advances |*cbs|. It sets |*out_tag| to 254 // the tag number and |*out_header_len| to the length of the ASN.1 header. Each 255 // of |out|, |out_tag|, and |out_header_len| may be NULL to ignore the value. 256 OPENSSL_EXPORT int CBS_get_any_asn1_element(CBS *cbs, CBS *out, 257 unsigned *out_tag, 258 size_t *out_header_len); 259 260 // CBS_get_any_ber_asn1_element acts the same as |CBS_get_any_asn1_element| but 261 // also allows indefinite-length elements to be returned and does not enforce 262 // that lengths are minimal. It sets |*out_indefinite| to one if the length was 263 // indefinite and zero otherwise. If indefinite, |*out_header_len| and 264 // |CBS_len(out)| will be equal as only the header is returned (although this is 265 // also true for empty elements so |*out_indefinite| should be checked). If 266 // |out_ber_found| is not NULL then it is set to one if any case of invalid DER 267 // but valid BER is found, and to zero otherwise. 268 // 269 // This function will not successfully parse an end-of-contents (EOC) as an 270 // element. Callers parsing indefinite-length encoding must check for EOC 271 // separately. 272 OPENSSL_EXPORT int CBS_get_any_ber_asn1_element(CBS *cbs, CBS *out, 273 unsigned *out_tag, 274 size_t *out_header_len, 275 int *out_ber_found, 276 int *out_indefinite); 277 278 // CBS_get_asn1_uint64 gets an ASN.1 INTEGER from |cbs| using |CBS_get_asn1| 279 // and sets |*out| to its value. It returns one on success and zero on error, 280 // where error includes the integer being negative, or too large to represent 281 // in 64 bits. 282 OPENSSL_EXPORT int CBS_get_asn1_uint64(CBS *cbs, uint64_t *out); 283 284 // CBS_get_asn1_int64 gets an ASN.1 INTEGER from |cbs| using |CBS_get_asn1| 285 // and sets |*out| to its value. It returns one on success and zero on error, 286 // where error includes the integer being too large to represent in 64 bits. 287 OPENSSL_EXPORT int CBS_get_asn1_int64(CBS *cbs, int64_t *out); 288 289 // CBS_get_asn1_bool gets an ASN.1 BOOLEAN from |cbs| and sets |*out| to zero 290 // or one based on its value. It returns one on success or zero on error. 291 OPENSSL_EXPORT int CBS_get_asn1_bool(CBS *cbs, int *out); 292 293 // CBS_get_optional_asn1 gets an optional explicitly-tagged element from |cbs| 294 // tagged with |tag| and sets |*out| to its contents, or ignores it if |out| is 295 // NULL. If present and if |out_present| is not NULL, it sets |*out_present| to 296 // one, otherwise zero. It returns one on success, whether or not the element 297 // was present, and zero on decode failure. 298 OPENSSL_EXPORT int CBS_get_optional_asn1(CBS *cbs, CBS *out, int *out_present, 299 unsigned tag); 300 301 // CBS_get_optional_asn1_octet_string gets an optional 302 // explicitly-tagged OCTET STRING from |cbs|. If present, it sets 303 // |*out| to the string and |*out_present| to one. Otherwise, it sets 304 // |*out| to empty and |*out_present| to zero. |out_present| may be 305 // NULL. It returns one on success, whether or not the element was 306 // present, and zero on decode failure. 307 OPENSSL_EXPORT int CBS_get_optional_asn1_octet_string(CBS *cbs, CBS *out, 308 int *out_present, 309 unsigned tag); 310 311 // CBS_get_optional_asn1_uint64 gets an optional explicitly-tagged 312 // INTEGER from |cbs|. If present, it sets |*out| to the 313 // value. Otherwise, it sets |*out| to |default_value|. It returns one 314 // on success, whether or not the element was present, and zero on 315 // decode failure. 316 OPENSSL_EXPORT int CBS_get_optional_asn1_uint64(CBS *cbs, uint64_t *out, 317 unsigned tag, 318 uint64_t default_value); 319 320 // CBS_get_optional_asn1_bool gets an optional, explicitly-tagged BOOLEAN from 321 // |cbs|. If present, it sets |*out| to either zero or one, based on the 322 // boolean. Otherwise, it sets |*out| to |default_value|. It returns one on 323 // success, whether or not the element was present, and zero on decode 324 // failure. 325 OPENSSL_EXPORT int CBS_get_optional_asn1_bool(CBS *cbs, int *out, unsigned tag, 326 int default_value); 327 328 // CBS_is_valid_asn1_bitstring returns one if |cbs| is a valid ASN.1 BIT STRING 329 // body and zero otherwise. 330 OPENSSL_EXPORT int CBS_is_valid_asn1_bitstring(const CBS *cbs); 331 332 // CBS_asn1_bitstring_has_bit returns one if |cbs| is a valid ASN.1 BIT STRING 333 // body and the specified bit is present and set. Otherwise, it returns zero. 334 // |bit| is indexed starting from zero. 335 OPENSSL_EXPORT int CBS_asn1_bitstring_has_bit(const CBS *cbs, unsigned bit); 336 337 // CBS_is_valid_asn1_integer returns one if |cbs| is a valid ASN.1 INTEGER, 338 // body and zero otherwise. On success, if |out_is_negative| is non-NULL, 339 // |*out_is_negative| will be set to one if |cbs| is negative and zero 340 // otherwise. 341 OPENSSL_EXPORT int CBS_is_valid_asn1_integer(const CBS *cbs, 342 int *out_is_negative); 343 344 // CBS_is_unsigned_asn1_integer returns one if |cbs| is a valid non-negative 345 // ASN.1 INTEGER body and zero otherwise. 346 OPENSSL_EXPORT int CBS_is_unsigned_asn1_integer(const CBS *cbs); 347 348 // CBS_asn1_oid_to_text interprets |cbs| as DER-encoded ASN.1 OBJECT IDENTIFIER 349 // contents (not including the element framing) and returns the ASCII 350 // representation (e.g., "1.2.840.113554.4.1.72585") in a newly-allocated 351 // string, or NULL on failure. The caller must release the result with 352 // |OPENSSL_free|. 353 OPENSSL_EXPORT char *CBS_asn1_oid_to_text(const CBS *cbs); 354 355 356 // CRYPTO ByteBuilder. 357 // 358 // |CBB| objects allow one to build length-prefixed serialisations. A |CBB| 359 // object is associated with a buffer and new buffers are created with 360 // |CBB_init|. Several |CBB| objects can point at the same buffer when a 361 // length-prefix is pending, however only a single |CBB| can be 'current' at 362 // any one time. For example, if one calls |CBB_add_u8_length_prefixed| then 363 // the new |CBB| points at the same buffer as the original. But if the original 364 // |CBB| is used then the length prefix is written out and the new |CBB| must 365 // not be used again. 366 // 367 // If one needs to force a length prefix to be written out because a |CBB| is 368 // going out of scope, use |CBB_flush|. If an operation on a |CBB| fails, it is 369 // in an undefined state and must not be used except to call |CBB_cleanup|. 370 371 struct cbb_buffer_st { 372 uint8_t *buf; 373 size_t len; // The number of valid bytes. 374 size_t cap; // The size of buf. 375 char can_resize; /* One iff |buf| is owned by this object. If not then |buf| 376 cannot be resized. */ 377 char error; /* One iff there was an error writing to this CBB. All future 378 operations will fail. */ 379 }; 380 381 struct cbb_st { 382 struct cbb_buffer_st *base; 383 // child points to a child CBB if a length-prefix is pending. 384 CBB *child; 385 // offset is the number of bytes from the start of |base->buf| to this |CBB|'s 386 // pending length prefix. 387 size_t offset; 388 // pending_len_len contains the number of bytes in this |CBB|'s pending 389 // length-prefix, or zero if no length-prefix is pending. 390 uint8_t pending_len_len; 391 char pending_is_asn1; 392 // is_child is true iff this is a child |CBB| (as opposed to a top-level 393 // |CBB|). Top-level objects are valid arguments for |CBB_finish|. 394 char is_child; 395 }; 396 397 // CBB_zero sets an uninitialised |cbb| to the zero state. It must be 398 // initialised with |CBB_init| or |CBB_init_fixed| before use, but it is safe to 399 // call |CBB_cleanup| without a successful |CBB_init|. This may be used for more 400 // uniform cleanup of a |CBB|. 401 OPENSSL_EXPORT void CBB_zero(CBB *cbb); 402 403 // CBB_init initialises |cbb| with |initial_capacity|. Since a |CBB| grows as 404 // needed, the |initial_capacity| is just a hint. It returns one on success or 405 // zero on allocation failure. 406 OPENSSL_EXPORT int CBB_init(CBB *cbb, size_t initial_capacity); 407 408 // CBB_init_fixed initialises |cbb| to write to |len| bytes at |buf|. Since 409 // |buf| cannot grow, trying to write more than |len| bytes will cause CBB 410 // functions to fail. It returns one on success or zero on error. 411 OPENSSL_EXPORT int CBB_init_fixed(CBB *cbb, uint8_t *buf, size_t len); 412 413 // CBB_cleanup frees all resources owned by |cbb| and other |CBB| objects 414 // writing to the same buffer. This should be used in an error case where a 415 // serialisation is abandoned. 416 // 417 // This function can only be called on a "top level" |CBB|, i.e. one initialised 418 // with |CBB_init| or |CBB_init_fixed|, or a |CBB| set to the zero state with 419 // |CBB_zero|. 420 OPENSSL_EXPORT void CBB_cleanup(CBB *cbb); 421 422 // CBB_finish completes any pending length prefix and sets |*out_data| to a 423 // malloced buffer and |*out_len| to the length of that buffer. The caller 424 // takes ownership of the buffer and, unless the buffer was fixed with 425 // |CBB_init_fixed|, must call |OPENSSL_free| when done. 426 // 427 // It can only be called on a "top level" |CBB|, i.e. one initialised with 428 // |CBB_init| or |CBB_init_fixed|. It returns one on success and zero on 429 // error. 430 OPENSSL_EXPORT int CBB_finish(CBB *cbb, uint8_t **out_data, size_t *out_len); 431 432 // CBB_flush causes any pending length prefixes to be written out and any child 433 // |CBB| objects of |cbb| to be invalidated. This allows |cbb| to continue to be 434 // used after the children go out of scope, e.g. when local |CBB| objects are 435 // added as children to a |CBB| that persists after a function returns. This 436 // function returns one on success or zero on error. 437 OPENSSL_EXPORT int CBB_flush(CBB *cbb); 438 439 // CBB_data returns a pointer to the bytes written to |cbb|. It does not flush 440 // |cbb|. The pointer is valid until the next operation to |cbb|. 441 // 442 // To avoid unfinalized length prefixes, it is a fatal error to call this on a 443 // CBB with any active children. 444 OPENSSL_EXPORT const uint8_t *CBB_data(const CBB *cbb); 445 446 // CBB_len returns the number of bytes written to |cbb|. It does not flush 447 // |cbb|. 448 // 449 // To avoid unfinalized length prefixes, it is a fatal error to call this on a 450 // CBB with any active children. 451 OPENSSL_EXPORT size_t CBB_len(const CBB *cbb); 452 453 // CBB_add_u8_length_prefixed sets |*out_contents| to a new child of |cbb|. The 454 // data written to |*out_contents| will be prefixed in |cbb| with an 8-bit 455 // length. It returns one on success or zero on error. 456 OPENSSL_EXPORT int CBB_add_u8_length_prefixed(CBB *cbb, CBB *out_contents); 457 458 // CBB_add_u16_length_prefixed sets |*out_contents| to a new child of |cbb|. 459 // The data written to |*out_contents| will be prefixed in |cbb| with a 16-bit, 460 // big-endian length. It returns one on success or zero on error. 461 OPENSSL_EXPORT int CBB_add_u16_length_prefixed(CBB *cbb, CBB *out_contents); 462 463 // CBB_add_u24_length_prefixed sets |*out_contents| to a new child of |cbb|. 464 // The data written to |*out_contents| will be prefixed in |cbb| with a 24-bit, 465 // big-endian length. It returns one on success or zero on error. 466 OPENSSL_EXPORT int CBB_add_u24_length_prefixed(CBB *cbb, CBB *out_contents); 467 468 // CBB_add_asn1 sets |*out_contents| to a |CBB| into which the contents of an 469 // ASN.1 object can be written. The |tag| argument will be used as the tag for 470 // the object. It returns one on success or zero on error. 471 OPENSSL_EXPORT int CBB_add_asn1(CBB *cbb, CBB *out_contents, unsigned tag); 472 473 // CBB_add_bytes appends |len| bytes from |data| to |cbb|. It returns one on 474 // success and zero otherwise. 475 OPENSSL_EXPORT int CBB_add_bytes(CBB *cbb, const uint8_t *data, size_t len); 476 477 // CBB_add_zeros append |len| bytes with value zero to |cbb|. It returns one on 478 // success and zero otherwise. 479 OPENSSL_EXPORT int CBB_add_zeros(CBB *cbb, size_t len); 480 481 // CBB_add_space appends |len| bytes to |cbb| and sets |*out_data| to point to 482 // the beginning of that space. The caller must then write |len| bytes of 483 // actual contents to |*out_data|. It returns one on success and zero 484 // otherwise. 485 OPENSSL_EXPORT int CBB_add_space(CBB *cbb, uint8_t **out_data, size_t len); 486 487 // CBB_reserve ensures |cbb| has room for |len| additional bytes and sets 488 // |*out_data| to point to the beginning of that space. It returns one on 489 // success and zero otherwise. The caller may write up to |len| bytes to 490 // |*out_data| and call |CBB_did_write| to complete the write. |*out_data| is 491 // valid until the next operation on |cbb| or an ancestor |CBB|. 492 OPENSSL_EXPORT int CBB_reserve(CBB *cbb, uint8_t **out_data, size_t len); 493 494 // CBB_did_write advances |cbb| by |len| bytes, assuming the space has been 495 // written to by the caller. It returns one on success and zero on error. 496 OPENSSL_EXPORT int CBB_did_write(CBB *cbb, size_t len); 497 498 // CBB_add_u8 appends an 8-bit number from |value| to |cbb|. It returns one on 499 // success and zero otherwise. 500 OPENSSL_EXPORT int CBB_add_u8(CBB *cbb, uint8_t value); 501 502 // CBB_add_u16 appends a 16-bit, big-endian number from |value| to |cbb|. It 503 // returns one on success and zero otherwise. 504 OPENSSL_EXPORT int CBB_add_u16(CBB *cbb, uint16_t value); 505 506 // CBB_add_u16le appends a 16-bit, little-endian number from |value| to |cbb|. 507 // It returns one on success and zero otherwise. 508 OPENSSL_EXPORT int CBB_add_u16le(CBB *cbb, uint16_t value); 509 510 // CBB_add_u24 appends a 24-bit, big-endian number from |value| to |cbb|. It 511 // returns one on success and zero otherwise. 512 OPENSSL_EXPORT int CBB_add_u24(CBB *cbb, uint32_t value); 513 514 // CBB_add_u32 appends a 32-bit, big-endian number from |value| to |cbb|. It 515 // returns one on success and zero otherwise. 516 OPENSSL_EXPORT int CBB_add_u32(CBB *cbb, uint32_t value); 517 518 // CBB_add_u32le appends a 32-bit, little-endian number from |value| to |cbb|. 519 // It returns one on success and zero otherwise. 520 OPENSSL_EXPORT int CBB_add_u32le(CBB *cbb, uint32_t value); 521 522 // CBB_add_u64 appends a 64-bit, big-endian number from |value| to |cbb|. It 523 // returns one on success and zero otherwise. 524 OPENSSL_EXPORT int CBB_add_u64(CBB *cbb, uint64_t value); 525 526 // CBB_add_u64le appends a 64-bit, little-endian number from |value| to |cbb|. 527 // It returns one on success and zero otherwise. 528 OPENSSL_EXPORT int CBB_add_u64le(CBB *cbb, uint64_t value); 529 530 // CBB_discard_child discards the current unflushed child of |cbb|. Neither the 531 // child's contents nor the length prefix will be included in the output. 532 OPENSSL_EXPORT void CBB_discard_child(CBB *cbb); 533 534 // CBB_add_asn1_uint64 writes an ASN.1 INTEGER into |cbb| using |CBB_add_asn1| 535 // and writes |value| in its contents. It returns one on success and zero on 536 // error. 537 OPENSSL_EXPORT int CBB_add_asn1_uint64(CBB *cbb, uint64_t value); 538 539 // CBB_add_asn1_int64 writes an ASN.1 INTEGER into |cbb| using |CBB_add_asn1| 540 // and writes |value| in its contents. It returns one on success and zero on 541 // error. 542 OPENSSL_EXPORT int CBB_add_asn1_int64(CBB *cbb, int64_t value); 543 544 // CBB_add_asn1_octet_string writes an ASN.1 OCTET STRING into |cbb| with the 545 // given contents. It returns one on success and zero on error. 546 OPENSSL_EXPORT int CBB_add_asn1_octet_string(CBB *cbb, const uint8_t *data, 547 size_t data_len); 548 549 // CBB_add_asn1_bool writes an ASN.1 BOOLEAN into |cbb| which is true iff 550 // |value| is non-zero. It returns one on success and zero on error. 551 OPENSSL_EXPORT int CBB_add_asn1_bool(CBB *cbb, int value); 552 553 // CBB_add_asn1_oid_from_text decodes |len| bytes from |text| as an ASCII OID 554 // representation, e.g. "1.2.840.113554.4.1.72585", and writes the DER-encoded 555 // contents to |cbb|. It returns one on success and zero on malloc failure or if 556 // |text| was invalid. It does not include the OBJECT IDENTIFER framing, only 557 // the element's contents. 558 // 559 // This function considers OID strings with components which do not fit in a 560 // |uint64_t| to be invalid. 561 OPENSSL_EXPORT int CBB_add_asn1_oid_from_text(CBB *cbb, const char *text, 562 size_t len); 563 564 // CBB_flush_asn1_set_of calls |CBB_flush| on |cbb| and then reorders the 565 // contents for a DER-encoded ASN.1 SET OF type. It returns one on success and 566 // zero on failure. DER canonicalizes SET OF contents by sorting 567 // lexicographically by encoding. Call this function when encoding a SET OF 568 // type in an order that is not already known to be canonical. 569 // 570 // Note a SET type has a slightly different ordering than a SET OF. 571 OPENSSL_EXPORT int CBB_flush_asn1_set_of(CBB *cbb); 572 573 574 #if defined(__cplusplus) 575 } // extern C 576 577 578 #if !defined(BORINGSSL_NO_CXX) 579 extern "C++" { 580 581 BSSL_NAMESPACE_BEGIN 582 583 using ScopedCBB = internal::StackAllocated<CBB, void, CBB_zero, CBB_cleanup>; 584 585 BSSL_NAMESPACE_END 586 587 } // extern C++ 588 #endif 589 590 #endif 591 592 #endif // OPENSSL_HEADER_BYTESTRING_H 593