bytestring.h (33906B)
1 // Copyright 2014 The BoringSSL Authors 2 // 3 // Licensed under the Apache License, Version 2.0 (the "License"); 4 // you may not use this file except in compliance with the License. 5 // You may obtain a copy of the License at 6 // 7 // https://www.apache.org/licenses/LICENSE-2.0 8 // 9 // Unless required by applicable law or agreed to in writing, software 10 // distributed under the License is distributed on an "AS IS" BASIS, 11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 // See the License for the specific language governing permissions and 13 // limitations under the License. 14 15 #ifndef OPENSSL_HEADER_BYTESTRING_H 16 #define OPENSSL_HEADER_BYTESTRING_H 17 18 #include <openssl/base.h> // IWYU pragma: export 19 20 #include <openssl/span.h> 21 #include <time.h> 22 23 #if defined(__cplusplus) 24 extern "C" { 25 #endif 26 27 28 // Bytestrings are used for parsing and building TLS and ASN.1 messages. 29 // 30 // A "CBS" (CRYPTO ByteString) represents a string of bytes in memory and 31 // provides utility functions for safely parsing length-prefixed structures 32 // like TLS and ASN.1 from it. 33 // 34 // A "CBB" (CRYPTO ByteBuilder) is a memory buffer that grows as needed and 35 // provides utility functions for building length-prefixed messages. 36 37 38 // CRYPTO ByteString 39 40 struct cbs_st { 41 const uint8_t *data; 42 size_t len; 43 44 #if !defined(BORINGSSL_NO_CXX) 45 // Allow implicit conversions to and from bssl::Span<const uint8_t>. 46 cbs_st(bssl::Span<const uint8_t> span) 47 : data(span.data()), len(span.size()) {} 48 operator bssl::Span<const uint8_t>() const { return bssl::Span(data, len); } 49 50 // Defining any constructors requires we explicitly default the others. 51 cbs_st() = default; 52 cbs_st(const cbs_st &) = default; 53 cbs_st &operator=(const cbs_st &) = default; 54 #endif 55 }; 56 57 // CBS_init sets |cbs| to point to |data|. It does not take ownership of 58 // |data|. 59 OPENSSL_INLINE void CBS_init(CBS *cbs, const uint8_t *data, size_t len) { 60 cbs->data = data; 61 cbs->len = len; 62 } 63 64 // CBS_skip advances |cbs| by |len| bytes. It returns one on success and zero 65 // otherwise. 66 OPENSSL_EXPORT int CBS_skip(CBS *cbs, size_t len); 67 68 // CBS_data returns a pointer to the contents of |cbs|. 69 OPENSSL_INLINE const uint8_t *CBS_data(const CBS *cbs) { return cbs->data; } 70 71 // CBS_len returns the number of bytes remaining in |cbs|. 72 OPENSSL_INLINE size_t CBS_len(const CBS *cbs) { return cbs->len; } 73 74 // CBS_stow copies the current contents of |cbs| into |*out_ptr| and 75 // |*out_len|. If |*out_ptr| is not NULL, the contents are freed with 76 // OPENSSL_free. It returns one on success and zero on allocation failure. On 77 // success, |*out_ptr| should be freed with OPENSSL_free. If |cbs| is empty, 78 // |*out_ptr| will be NULL. 79 OPENSSL_EXPORT int CBS_stow(const CBS *cbs, uint8_t **out_ptr, size_t *out_len); 80 81 // CBS_strdup copies the current contents of |cbs| into |*out_ptr| as a 82 // NUL-terminated C string. If |*out_ptr| is not NULL, the contents are freed 83 // with OPENSSL_free. It returns one on success and zero on allocation 84 // failure. On success, |*out_ptr| should be freed with OPENSSL_free. 85 // 86 // NOTE: If |cbs| contains NUL bytes, the string will be truncated. Call 87 // |CBS_contains_zero_byte(cbs)| to check for NUL bytes. 88 OPENSSL_EXPORT int CBS_strdup(const CBS *cbs, char **out_ptr); 89 90 // CBS_contains_zero_byte returns one if the current contents of |cbs| contains 91 // a NUL byte and zero otherwise. 92 OPENSSL_EXPORT int CBS_contains_zero_byte(const CBS *cbs); 93 94 // CBS_mem_equal compares the current contents of |cbs| with the |len| bytes 95 // starting at |data|. If they're equal, it returns one, otherwise zero. If the 96 // lengths match, it uses a constant-time comparison. 97 OPENSSL_EXPORT int CBS_mem_equal(const CBS *cbs, const uint8_t *data, 98 size_t len); 99 100 // CBS_get_u8 sets |*out| to the next uint8_t from |cbs| and advances |cbs|. It 101 // returns one on success and zero on error. 102 OPENSSL_EXPORT int CBS_get_u8(CBS *cbs, uint8_t *out); 103 104 // CBS_get_u16 sets |*out| to the next, big-endian uint16_t from |cbs| and 105 // advances |cbs|. It returns one on success and zero on error. 106 OPENSSL_EXPORT int CBS_get_u16(CBS *cbs, uint16_t *out); 107 108 // CBS_get_u16le sets |*out| to the next, little-endian uint16_t from |cbs| and 109 // advances |cbs|. It returns one on success and zero on error. 110 OPENSSL_EXPORT int CBS_get_u16le(CBS *cbs, uint16_t *out); 111 112 // CBS_get_u24 sets |*out| to the next, big-endian 24-bit value from |cbs| and 113 // advances |cbs|. It returns one on success and zero on error. 114 OPENSSL_EXPORT int CBS_get_u24(CBS *cbs, uint32_t *out); 115 116 // CBS_get_u32 sets |*out| to the next, big-endian uint32_t value from |cbs| 117 // and advances |cbs|. It returns one on success and zero on error. 118 OPENSSL_EXPORT int CBS_get_u32(CBS *cbs, uint32_t *out); 119 120 // CBS_get_u32le sets |*out| to the next, little-endian uint32_t value from 121 // |cbs| and advances |cbs|. It returns one on success and zero on error. 122 OPENSSL_EXPORT int CBS_get_u32le(CBS *cbs, uint32_t *out); 123 124 // CBS_get_u64 sets |*out| to the next, big-endian uint64_t value from |cbs| 125 // and advances |cbs|. It returns one on success and zero on error. 126 OPENSSL_EXPORT int CBS_get_u64(CBS *cbs, uint64_t *out); 127 128 // CBS_get_u64le sets |*out| to the next, little-endian uint64_t value from 129 // |cbs| and advances |cbs|. It returns one on success and zero on error. 130 OPENSSL_EXPORT int CBS_get_u64le(CBS *cbs, uint64_t *out); 131 132 // CBS_get_last_u8 sets |*out| to the last uint8_t from |cbs| and shortens 133 // |cbs|. It returns one on success and zero on error. 134 OPENSSL_EXPORT int CBS_get_last_u8(CBS *cbs, uint8_t *out); 135 136 // CBS_get_bytes sets |*out| to the next |len| bytes from |cbs| and advances 137 // |cbs|. It returns one on success and zero on error. 138 OPENSSL_EXPORT int CBS_get_bytes(CBS *cbs, CBS *out, size_t len); 139 140 // CBS_copy_bytes copies the next |len| bytes from |cbs| to |out| and advances 141 // |cbs|. It returns one on success and zero on error. 142 OPENSSL_EXPORT int CBS_copy_bytes(CBS *cbs, uint8_t *out, size_t len); 143 144 // CBS_get_u8_length_prefixed sets |*out| to the contents of an 8-bit, 145 // length-prefixed value from |cbs| and advances |cbs| over it. It returns one 146 // on success and zero on error. 147 OPENSSL_EXPORT int CBS_get_u8_length_prefixed(CBS *cbs, CBS *out); 148 149 // CBS_get_u16_length_prefixed sets |*out| to the contents of a 16-bit, 150 // big-endian, length-prefixed value from |cbs| and advances |cbs| over it. It 151 // returns one on success and zero on error. 152 OPENSSL_EXPORT int CBS_get_u16_length_prefixed(CBS *cbs, CBS *out); 153 154 // CBS_get_u24_length_prefixed sets |*out| to the contents of a 24-bit, 155 // big-endian, length-prefixed value from |cbs| and advances |cbs| over it. It 156 // returns one on success and zero on error. 157 OPENSSL_EXPORT int CBS_get_u24_length_prefixed(CBS *cbs, CBS *out); 158 159 // CBS_get_until_first finds the first instance of |c| in |cbs|. If found, it 160 // sets |*out| to the text before the match, advances |cbs| over it, and returns 161 // one. Otherwise, it returns zero and leaves |cbs| unmodified. 162 OPENSSL_EXPORT int CBS_get_until_first(CBS *cbs, CBS *out, uint8_t c); 163 164 // CBS_get_u64_decimal reads a decimal integer from |cbs| and writes it to 165 // |*out|. It stops reading at the end of the string, or the first non-digit 166 // character. It returns one on success and zero on error. This function behaves 167 // analogously to |strtoul| except it does not accept empty inputs, leading 168 // zeros, or negative values. 169 OPENSSL_EXPORT int CBS_get_u64_decimal(CBS *cbs, uint64_t *out); 170 171 172 // Parsing ASN.1 173 // 174 // |CBS| may be used to parse DER structures. Rather than using a schema 175 // compiler, the following functions act on tag-length-value elements in the 176 // serialization itself. Thus the caller is responsible for looping over a 177 // SEQUENCE, branching on CHOICEs or OPTIONAL fields, checking for trailing 178 // data, and handling explict vs. implicit tagging. 179 // 180 // Tags are represented as |CBS_ASN1_TAG| values in memory. The upper few bits 181 // store the class and constructed bit, and the remaining bits store the tag 182 // number. Note this differs from the DER serialization, to support tag numbers 183 // beyond 31. Consumers must use the constants defined below to decompose or 184 // assemble tags. 185 // 186 // This library treats an element's constructed bit as part of its tag. In DER, 187 // the constructed bit is computable from the type. The constants for universal 188 // types have the bit set. Callers must set it correctly for tagged types. 189 // Explicitly-tagged types are always constructed, and implicitly-tagged types 190 // inherit the underlying type's bit. 191 192 // CBS_ASN1_TAG_SHIFT is how much the in-memory representation shifts the class 193 // and constructed bits from the DER serialization. 194 #define CBS_ASN1_TAG_SHIFT 24 195 196 // CBS_ASN1_CONSTRUCTED may be ORed into a tag to set the constructed bit. 197 #define CBS_ASN1_CONSTRUCTED (0x20u << CBS_ASN1_TAG_SHIFT) 198 199 // The following values specify the tag class and may be ORed into a tag number 200 // to produce the final tag. If none is used, the tag will be UNIVERSAL. 201 #define CBS_ASN1_UNIVERSAL (0u << CBS_ASN1_TAG_SHIFT) 202 #define CBS_ASN1_APPLICATION (0x40u << CBS_ASN1_TAG_SHIFT) 203 #define CBS_ASN1_CONTEXT_SPECIFIC (0x80u << CBS_ASN1_TAG_SHIFT) 204 #define CBS_ASN1_PRIVATE (0xc0u << CBS_ASN1_TAG_SHIFT) 205 206 // CBS_ASN1_CLASS_MASK may be ANDed with a tag to query its class. This will 207 // give one of the four values above. 208 #define CBS_ASN1_CLASS_MASK (0xc0u << CBS_ASN1_TAG_SHIFT) 209 210 // CBS_ASN1_TAG_NUMBER_MASK may be ANDed with a tag to query its number. 211 #define CBS_ASN1_TAG_NUMBER_MASK ((1u << (5 + CBS_ASN1_TAG_SHIFT)) - 1) 212 213 // The following values are constants for UNIVERSAL tags. Note these constants 214 // include the constructed bit. 215 #define CBS_ASN1_BOOLEAN 0x1u 216 #define CBS_ASN1_INTEGER 0x2u 217 #define CBS_ASN1_BITSTRING 0x3u 218 #define CBS_ASN1_OCTETSTRING 0x4u 219 #define CBS_ASN1_NULL 0x5u 220 #define CBS_ASN1_OBJECT 0x6u 221 #define CBS_ASN1_ENUMERATED 0xau 222 #define CBS_ASN1_UTF8STRING 0xcu 223 #define CBS_ASN1_SEQUENCE (0x10u | CBS_ASN1_CONSTRUCTED) 224 #define CBS_ASN1_SET (0x11u | CBS_ASN1_CONSTRUCTED) 225 #define CBS_ASN1_NUMERICSTRING 0x12u 226 #define CBS_ASN1_PRINTABLESTRING 0x13u 227 #define CBS_ASN1_T61STRING 0x14u 228 #define CBS_ASN1_VIDEOTEXSTRING 0x15u 229 #define CBS_ASN1_IA5STRING 0x16u 230 #define CBS_ASN1_UTCTIME 0x17u 231 #define CBS_ASN1_GENERALIZEDTIME 0x18u 232 #define CBS_ASN1_GRAPHICSTRING 0x19u 233 #define CBS_ASN1_VISIBLESTRING 0x1au 234 #define CBS_ASN1_GENERALSTRING 0x1bu 235 #define CBS_ASN1_UNIVERSALSTRING 0x1cu 236 #define CBS_ASN1_BMPSTRING 0x1eu 237 238 // CBS_get_asn1 sets |*out| to the contents of DER-encoded, ASN.1 element (not 239 // including tag and length bytes) and advances |cbs| over it. The ASN.1 240 // element must match |tag_value|. It returns one on success and zero 241 // on error. 242 OPENSSL_EXPORT int CBS_get_asn1(CBS *cbs, CBS *out, CBS_ASN1_TAG tag_value); 243 244 // CBS_get_asn1_element acts like |CBS_get_asn1| but |out| will include the 245 // ASN.1 header bytes too. 246 OPENSSL_EXPORT int CBS_get_asn1_element(CBS *cbs, CBS *out, 247 CBS_ASN1_TAG tag_value); 248 249 // CBS_peek_asn1_tag looks ahead at the next ASN.1 tag and returns one 250 // if the next ASN.1 element on |cbs| would have tag |tag_value|. If 251 // |cbs| is empty or the tag does not match, it returns zero. Note: if 252 // it returns one, CBS_get_asn1 may still fail if the rest of the 253 // element is malformed. 254 OPENSSL_EXPORT int CBS_peek_asn1_tag(const CBS *cbs, CBS_ASN1_TAG tag_value); 255 256 // CBS_get_any_asn1 sets |*out| to contain the next ASN.1 element from |*cbs| 257 // (not including tag and length bytes), sets |*out_tag| to the tag number, and 258 // advances |*cbs|. It returns one on success and zero on error. Either of |out| 259 // and |out_tag| may be NULL to ignore the value. 260 OPENSSL_EXPORT int CBS_get_any_asn1(CBS *cbs, CBS *out, 261 CBS_ASN1_TAG *out_tag); 262 263 // CBS_get_any_asn1_element sets |*out| to contain the next ASN.1 element from 264 // |*cbs| (including header bytes) and advances |*cbs|. It sets |*out_tag| to 265 // the tag number and |*out_header_len| to the length of the ASN.1 header. Each 266 // of |out|, |out_tag|, and |out_header_len| may be NULL to ignore the value. 267 OPENSSL_EXPORT int CBS_get_any_asn1_element(CBS *cbs, CBS *out, 268 CBS_ASN1_TAG *out_tag, 269 size_t *out_header_len); 270 271 // CBS_get_any_ber_asn1_element acts the same as |CBS_get_any_asn1_element| but 272 // also allows indefinite-length elements to be returned and does not enforce 273 // that lengths are minimal. It sets |*out_indefinite| to one if the length was 274 // indefinite and zero otherwise. If indefinite, |*out_header_len| and 275 // |CBS_len(out)| will be equal as only the header is returned (although this is 276 // also true for empty elements so |*out_indefinite| should be checked). If 277 // |out_ber_found| is not NULL then it is set to one if any case of invalid DER 278 // but valid BER is found, and to zero otherwise. 279 // 280 // This function will not successfully parse an end-of-contents (EOC) as an 281 // element. Callers parsing indefinite-length encoding must check for EOC 282 // separately. 283 OPENSSL_EXPORT int CBS_get_any_ber_asn1_element(CBS *cbs, CBS *out, 284 CBS_ASN1_TAG *out_tag, 285 size_t *out_header_len, 286 int *out_ber_found, 287 int *out_indefinite); 288 289 // CBS_get_asn1_uint64 gets an ASN.1 INTEGER from |cbs| using |CBS_get_asn1| 290 // and sets |*out| to its value. It returns one on success and zero on error, 291 // where error includes the integer being negative, or too large to represent 292 // in 64 bits. 293 OPENSSL_EXPORT int CBS_get_asn1_uint64(CBS *cbs, uint64_t *out); 294 295 // CBS_get_asn1_uint64_with_tag gets an ASN.1 INTEGER from |cbs| using 296 // |CBS_get_asn1| and sets |*out| to its value. |tag| is used to handle to 297 // handle implicitly tagged INTEGER fields. It returns one on success and zero 298 // on error, where error includes the integer being negative, or too large to 299 // represent in 64 bits. 300 OPENSSL_EXPORT int CBS_get_asn1_uint64_with_tag(CBS *cbs, uint64_t *out, 301 CBS_ASN1_TAG tag); 302 303 304 // CBS_get_asn1_int64 gets an ASN.1 INTEGER from |cbs| using |CBS_get_asn1| 305 // and sets |*out| to its value. It returns one on success and zero on error, 306 // where error includes the integer being too large to represent in 64 bits. 307 OPENSSL_EXPORT int CBS_get_asn1_int64(CBS *cbs, int64_t *out); 308 309 // CBS_get_asn1_int64_with_tag gets an ASN.1 INTEGER from |cbs| using 310 // |CBS_get_asn1| and sets |*out| to its value. |tag| is used to handle to 311 // handle implicitly tagged INTEGER fields. It returns one on success and zero 312 // on error, where error includes the integer being too large to represent in 64 313 // bits. 314 OPENSSL_EXPORT int CBS_get_asn1_int64_with_tag(CBS *cbs, int64_t *out, 315 CBS_ASN1_TAG tag); 316 317 // CBS_get_asn1_bool gets an ASN.1 BOOLEAN from |cbs| and sets |*out| to zero 318 // or one based on its value. It returns one on success or zero on error. 319 OPENSSL_EXPORT int CBS_get_asn1_bool(CBS *cbs, int *out); 320 321 // CBS_get_optional_asn1 gets an optional explicitly-tagged element from |cbs| 322 // tagged with |tag| and sets |*out| to its contents, or ignores it if |out| is 323 // NULL. If present and if |out_present| is not NULL, it sets |*out_present| to 324 // one, otherwise zero. It returns one on success, whether or not the element 325 // was present, and zero on decode failure. 326 OPENSSL_EXPORT int CBS_get_optional_asn1(CBS *cbs, CBS *out, int *out_present, 327 CBS_ASN1_TAG tag); 328 329 // CBS_get_optional_asn1_octet_string gets an optional 330 // explicitly-tagged OCTET STRING from |cbs|. If present, it sets 331 // |*out| to the string and |*out_present| to one. Otherwise, it sets 332 // |*out| to empty and |*out_present| to zero. |out_present| may be 333 // NULL. It returns one on success, whether or not the element was 334 // present, and zero on decode failure. 335 OPENSSL_EXPORT int CBS_get_optional_asn1_octet_string(CBS *cbs, CBS *out, 336 int *out_present, 337 CBS_ASN1_TAG tag); 338 339 // CBS_get_optional_asn1_uint64 gets an optional explicitly-tagged 340 // INTEGER from |cbs|. If present, it sets |*out| to the 341 // value. Otherwise, it sets |*out| to |default_value|. It returns one 342 // on success, whether or not the element was present, and zero on 343 // decode failure. 344 OPENSSL_EXPORT int CBS_get_optional_asn1_uint64(CBS *cbs, uint64_t *out, 345 CBS_ASN1_TAG tag, 346 uint64_t default_value); 347 348 // CBS_get_optional_asn1_bool gets an optional, explicitly-tagged BOOLEAN from 349 // |cbs|. If present, it sets |*out| to either zero or one, based on the 350 // boolean. Otherwise, it sets |*out| to |default_value|. It returns one on 351 // success, whether or not the element was present, and zero on decode 352 // failure. 353 OPENSSL_EXPORT int CBS_get_optional_asn1_bool(CBS *cbs, int *out, 354 CBS_ASN1_TAG tag, 355 int default_value); 356 357 // CBS_is_valid_asn1_bitstring returns one if |cbs| is a valid ASN.1 BIT STRING 358 // body and zero otherwise. 359 OPENSSL_EXPORT int CBS_is_valid_asn1_bitstring(const CBS *cbs); 360 361 // CBS_asn1_bitstring_has_bit returns one if |cbs| is a valid ASN.1 BIT STRING 362 // body and the specified bit is present and set. Otherwise, it returns zero. 363 // |bit| is indexed starting from zero. 364 OPENSSL_EXPORT int CBS_asn1_bitstring_has_bit(const CBS *cbs, unsigned bit); 365 366 // CBS_is_valid_asn1_integer returns one if |cbs| is a valid ASN.1 INTEGER, 367 // body and zero otherwise. On success, if |out_is_negative| is non-NULL, 368 // |*out_is_negative| will be set to one if |cbs| is negative and zero 369 // otherwise. 370 OPENSSL_EXPORT int CBS_is_valid_asn1_integer(const CBS *cbs, 371 int *out_is_negative); 372 373 // CBS_is_unsigned_asn1_integer returns one if |cbs| is a valid non-negative 374 // ASN.1 INTEGER body and zero otherwise. 375 OPENSSL_EXPORT int CBS_is_unsigned_asn1_integer(const CBS *cbs); 376 377 // CBS_is_valid_asn1_oid returns one if |cbs| is a valid DER-encoded ASN.1 378 // OBJECT IDENTIFIER contents (not including the element framing) and zero 379 // otherwise. This function tolerates arbitrarily large OID components. 380 OPENSSL_EXPORT int CBS_is_valid_asn1_oid(const CBS *cbs); 381 382 // CBS_asn1_oid_to_text interprets |cbs| as DER-encoded ASN.1 OBJECT IDENTIFIER 383 // contents (not including the element framing) and returns the ASCII 384 // representation (e.g., "1.2.840.113554.4.1.72585") in a newly-allocated 385 // string, or NULL on failure. The caller must release the result with 386 // |OPENSSL_free|. 387 // 388 // This function may fail if |cbs| is an invalid OBJECT IDENTIFIER, or if any 389 // OID components are too large. 390 OPENSSL_EXPORT char *CBS_asn1_oid_to_text(const CBS *cbs); 391 392 393 // CBS_parse_generalized_time returns one if |cbs| is a valid DER-encoded, ASN.1 394 // GeneralizedTime body within the limitations imposed by RFC 5280, or zero 395 // otherwise. If |allow_timezone_offset| is non-zero, four-digit timezone 396 // offsets, which would not be allowed by DER, are permitted. On success, if 397 // |out_tm| is non-NULL, |*out_tm| will be zeroed, and then set to the 398 // corresponding time in UTC. This function does not compute |out_tm->tm_wday| 399 // or |out_tm->tm_yday|. 400 OPENSSL_EXPORT int CBS_parse_generalized_time(const CBS *cbs, struct tm *out_tm, 401 int allow_timezone_offset); 402 403 // CBS_parse_utc_time returns one if |cbs| is a valid DER-encoded, ASN.1 404 // UTCTime body within the limitations imposed by RFC 5280, or zero otherwise. 405 // If |allow_timezone_offset| is non-zero, four-digit timezone offsets, which 406 // would not be allowed by DER, are permitted. On success, if |out_tm| is 407 // non-NULL, |*out_tm| will be zeroed, and then set to the corresponding time 408 // in UTC. This function does not compute |out_tm->tm_wday| or 409 // |out_tm->tm_yday|. 410 OPENSSL_EXPORT int CBS_parse_utc_time(const CBS *cbs, struct tm *out_tm, 411 int allow_timezone_offset); 412 413 // CRYPTO ByteBuilder. 414 // 415 // |CBB| objects allow one to build length-prefixed serialisations. A |CBB| 416 // object is associated with a buffer and new buffers are created with 417 // |CBB_init|. Several |CBB| objects can point at the same buffer when a 418 // length-prefix is pending, however only a single |CBB| can be 'current' at 419 // any one time. For example, if one calls |CBB_add_u8_length_prefixed| then 420 // the new |CBB| points at the same buffer as the original. But if the original 421 // |CBB| is used then the length prefix is written out and the new |CBB| must 422 // not be used again. 423 // 424 // If one needs to force a length prefix to be written out because a |CBB| is 425 // going out of scope, use |CBB_flush|. If an operation on a |CBB| fails, it is 426 // in an undefined state and must not be used except to call |CBB_cleanup|. 427 428 struct cbb_buffer_st { 429 uint8_t *buf; 430 // len is the number of valid bytes in |buf|. 431 size_t len; 432 // cap is the size of |buf|. 433 size_t cap; 434 // can_resize is one iff |buf| is owned by this object. If not then |buf| 435 // cannot be resized. 436 unsigned can_resize : 1; 437 // error is one if there was an error writing to this CBB. All future 438 // operations will fail. 439 unsigned error : 1; 440 }; 441 442 struct cbb_child_st { 443 // base is a pointer to the buffer this |CBB| writes to. 444 struct cbb_buffer_st *base; 445 // offset is the number of bytes from the start of |base->buf| to this |CBB|'s 446 // pending length prefix. 447 size_t offset; 448 // pending_len_len contains the number of bytes in this |CBB|'s pending 449 // length-prefix, or zero if no length-prefix is pending. 450 uint8_t pending_len_len; 451 unsigned pending_is_asn1 : 1; 452 }; 453 454 struct cbb_st { 455 // child points to a child CBB if a length-prefix is pending. 456 CBB *child; 457 // is_child is one if this is a child |CBB| and zero if it is a top-level 458 // |CBB|. This determines which arm of the union is valid. 459 char is_child; 460 union { 461 struct cbb_buffer_st base; 462 struct cbb_child_st child; 463 } u; 464 }; 465 466 // CBB_zero sets an uninitialised |cbb| to the zero state. It must be 467 // initialised with |CBB_init| or |CBB_init_fixed| before use, but it is safe to 468 // call |CBB_cleanup| without a successful |CBB_init|. This may be used for more 469 // uniform cleanup of a |CBB|. 470 OPENSSL_EXPORT void CBB_zero(CBB *cbb); 471 472 // CBB_init initialises |cbb| with |initial_capacity|. Since a |CBB| grows as 473 // needed, the |initial_capacity| is just a hint. It returns one on success or 474 // zero on allocation failure. 475 OPENSSL_EXPORT int CBB_init(CBB *cbb, size_t initial_capacity); 476 477 // CBB_init_fixed initialises |cbb| to write to |len| bytes at |buf|. Since 478 // |buf| cannot grow, trying to write more than |len| bytes will cause CBB 479 // functions to fail. This function is infallible and always returns one. It is 480 // safe, but not necessary, to call |CBB_cleanup| on |cbb|. 481 OPENSSL_EXPORT int CBB_init_fixed(CBB *cbb, uint8_t *buf, size_t len); 482 483 // CBB_cleanup frees all resources owned by |cbb| and other |CBB| objects 484 // writing to the same buffer. This should be used in an error case where a 485 // serialisation is abandoned. 486 // 487 // This function can only be called on a "top level" |CBB|, i.e. one initialised 488 // with |CBB_init| or |CBB_init_fixed|, or a |CBB| set to the zero state with 489 // |CBB_zero|. 490 OPENSSL_EXPORT void CBB_cleanup(CBB *cbb); 491 492 // CBB_finish completes any pending length prefix and sets |*out_data| to a 493 // malloced buffer and |*out_len| to the length of that buffer. The caller 494 // takes ownership of the buffer and, unless the buffer was fixed with 495 // |CBB_init_fixed|, must call |OPENSSL_free| when done. 496 // 497 // It can only be called on a "top level" |CBB|, i.e. one initialised with 498 // |CBB_init| or |CBB_init_fixed|. It returns one on success and zero on 499 // error. 500 OPENSSL_EXPORT int CBB_finish(CBB *cbb, uint8_t **out_data, size_t *out_len); 501 502 // CBB_flush causes any pending length prefixes to be written out and any child 503 // |CBB| objects of |cbb| to be invalidated. This allows |cbb| to continue to be 504 // used after the children go out of scope, e.g. when local |CBB| objects are 505 // added as children to a |CBB| that persists after a function returns. This 506 // function returns one on success or zero on error. 507 OPENSSL_EXPORT int CBB_flush(CBB *cbb); 508 509 // CBB_data returns a pointer to the bytes written to |cbb|. It does not flush 510 // |cbb|. The pointer is valid until the next operation to |cbb|. 511 // 512 // To avoid unfinalized length prefixes, it is a fatal error to call this on a 513 // CBB with any active children. 514 OPENSSL_EXPORT const uint8_t *CBB_data(const CBB *cbb); 515 516 // CBB_len returns the number of bytes written to |cbb|. It does not flush 517 // |cbb|. 518 // 519 // To avoid unfinalized length prefixes, it is a fatal error to call this on a 520 // CBB with any active children. 521 OPENSSL_EXPORT size_t CBB_len(const CBB *cbb); 522 523 // CBB_add_u8_length_prefixed sets |*out_contents| to a new child of |cbb|. The 524 // data written to |*out_contents| will be prefixed in |cbb| with an 8-bit 525 // length. It returns one on success or zero on error. 526 OPENSSL_EXPORT int CBB_add_u8_length_prefixed(CBB *cbb, CBB *out_contents); 527 528 // CBB_add_u16_length_prefixed sets |*out_contents| to a new child of |cbb|. 529 // The data written to |*out_contents| will be prefixed in |cbb| with a 16-bit, 530 // big-endian length. It returns one on success or zero on error. 531 OPENSSL_EXPORT int CBB_add_u16_length_prefixed(CBB *cbb, CBB *out_contents); 532 533 // CBB_add_u24_length_prefixed sets |*out_contents| to a new child of |cbb|. 534 // The data written to |*out_contents| will be prefixed in |cbb| with a 24-bit, 535 // big-endian length. It returns one on success or zero on error. 536 OPENSSL_EXPORT int CBB_add_u24_length_prefixed(CBB *cbb, CBB *out_contents); 537 538 // CBB_add_asn1 sets |*out_contents| to a |CBB| into which the contents of an 539 // ASN.1 object can be written. The |tag| argument will be used as the tag for 540 // the object. It returns one on success or zero on error. 541 OPENSSL_EXPORT int CBB_add_asn1(CBB *cbb, CBB *out_contents, CBS_ASN1_TAG tag); 542 543 // CBB_add_bytes appends |len| bytes from |data| to |cbb|. It returns one on 544 // success and zero otherwise. 545 OPENSSL_EXPORT int CBB_add_bytes(CBB *cbb, const uint8_t *data, size_t len); 546 547 // CBB_add_zeros append |len| bytes with value zero to |cbb|. It returns one on 548 // success and zero otherwise. 549 OPENSSL_EXPORT int CBB_add_zeros(CBB *cbb, size_t len); 550 551 // CBB_add_space appends |len| bytes to |cbb| and sets |*out_data| to point to 552 // the beginning of that space. The caller must then write |len| bytes of 553 // actual contents to |*out_data|. It returns one on success and zero 554 // otherwise. 555 OPENSSL_EXPORT int CBB_add_space(CBB *cbb, uint8_t **out_data, size_t len); 556 557 // CBB_reserve ensures |cbb| has room for |len| additional bytes and sets 558 // |*out_data| to point to the beginning of that space. It returns one on 559 // success and zero otherwise. The caller may write up to |len| bytes to 560 // |*out_data| and call |CBB_did_write| to complete the write. |*out_data| is 561 // valid until the next operation on |cbb| or an ancestor |CBB|. 562 OPENSSL_EXPORT int CBB_reserve(CBB *cbb, uint8_t **out_data, size_t len); 563 564 // CBB_did_write advances |cbb| by |len| bytes, assuming the space has been 565 // written to by the caller. It returns one on success and zero on error. 566 OPENSSL_EXPORT int CBB_did_write(CBB *cbb, size_t len); 567 568 // CBB_add_u8 appends an 8-bit number from |value| to |cbb|. It returns one on 569 // success and zero otherwise. 570 OPENSSL_EXPORT int CBB_add_u8(CBB *cbb, uint8_t value); 571 572 // CBB_add_u16 appends a 16-bit, big-endian number from |value| to |cbb|. It 573 // returns one on success and zero otherwise. 574 OPENSSL_EXPORT int CBB_add_u16(CBB *cbb, uint16_t value); 575 576 // CBB_add_u16le appends a 16-bit, little-endian number from |value| to |cbb|. 577 // It returns one on success and zero otherwise. 578 OPENSSL_EXPORT int CBB_add_u16le(CBB *cbb, uint16_t value); 579 580 // CBB_add_u24 appends a 24-bit, big-endian number from |value| to |cbb|. It 581 // returns one on success and zero otherwise. 582 OPENSSL_EXPORT int CBB_add_u24(CBB *cbb, uint32_t value); 583 584 // CBB_add_u32 appends a 32-bit, big-endian number from |value| to |cbb|. It 585 // returns one on success and zero otherwise. 586 OPENSSL_EXPORT int CBB_add_u32(CBB *cbb, uint32_t value); 587 588 // CBB_add_u32le appends a 32-bit, little-endian number from |value| to |cbb|. 589 // It returns one on success and zero otherwise. 590 OPENSSL_EXPORT int CBB_add_u32le(CBB *cbb, uint32_t value); 591 592 // CBB_add_u64 appends a 64-bit, big-endian number from |value| to |cbb|. It 593 // returns one on success and zero otherwise. 594 OPENSSL_EXPORT int CBB_add_u64(CBB *cbb, uint64_t value); 595 596 // CBB_add_u64le appends a 64-bit, little-endian number from |value| to |cbb|. 597 // It returns one on success and zero otherwise. 598 OPENSSL_EXPORT int CBB_add_u64le(CBB *cbb, uint64_t value); 599 600 // CBB_discard discards the last |len| bytes written to |cbb|. The process will 601 // abort if |cbb| has an unflushed child, or its length is smaller than |len|. 602 OPENSSL_EXPORT void CBB_discard(CBB *cbb, size_t len); 603 604 // CBB_discard_child discards the current unflushed child of |cbb|. Neither the 605 // child's contents nor the length prefix will be included in the output. 606 OPENSSL_EXPORT void CBB_discard_child(CBB *cbb); 607 608 // CBB_add_asn1_element adds an ASN.1 element with the specified tag and 609 // contents. It returns one on success and zero on error. This is a convenience 610 // function over |CBB_add_asn1| when the data is already available. 611 OPENSSL_EXPORT int CBB_add_asn1_element(CBB *cbb, CBS_ASN1_TAG tag, 612 const uint8_t *data, size_t data_len); 613 614 // CBB_add_asn1_uint64 writes an ASN.1 INTEGER into |cbb| using |CBB_add_asn1| 615 // and writes |value| in its contents. It returns one on success and zero on 616 // error. 617 OPENSSL_EXPORT int CBB_add_asn1_uint64(CBB *cbb, uint64_t value); 618 619 // CBB_add_asn1_uint64_with_tag behaves like |CBB_add_asn1_uint64| but uses 620 // |tag| as the tag instead of INTEGER. This is useful if the INTEGER type uses 621 // implicit tagging. 622 OPENSSL_EXPORT int CBB_add_asn1_uint64_with_tag(CBB *cbb, uint64_t value, 623 CBS_ASN1_TAG tag); 624 625 // CBB_add_asn1_int64 writes an ASN.1 INTEGER into |cbb| using |CBB_add_asn1| 626 // and writes |value| in its contents. It returns one on success and zero on 627 // error. 628 OPENSSL_EXPORT int CBB_add_asn1_int64(CBB *cbb, int64_t value); 629 630 // CBB_add_asn1_int64_with_tag behaves like |CBB_add_asn1_int64| but uses |tag| 631 // as the tag instead of INTEGER. This is useful if the INTEGER type uses 632 // implicit tagging. 633 OPENSSL_EXPORT int CBB_add_asn1_int64_with_tag(CBB *cbb, int64_t value, 634 CBS_ASN1_TAG tag); 635 636 // CBB_add_asn1_octet_string writes an ASN.1 OCTET STRING into |cbb| with the 637 // given contents. It returns one on success and zero on error. 638 OPENSSL_EXPORT int CBB_add_asn1_octet_string(CBB *cbb, const uint8_t *data, 639 size_t data_len); 640 641 // CBB_add_asn1_bool writes an ASN.1 BOOLEAN into |cbb| which is true iff 642 // |value| is non-zero. It returns one on success and zero on error. 643 OPENSSL_EXPORT int CBB_add_asn1_bool(CBB *cbb, int value); 644 645 // CBB_add_asn1_oid_from_text decodes |len| bytes from |text| as an ASCII OID 646 // representation, e.g. "1.2.840.113554.4.1.72585", and writes the DER-encoded 647 // contents to |cbb|. It returns one on success and zero on malloc failure or if 648 // |text| was invalid. It does not include the OBJECT IDENTIFER framing, only 649 // the element's contents. 650 // 651 // This function considers OID strings with components which do not fit in a 652 // |uint64_t| to be invalid. 653 OPENSSL_EXPORT int CBB_add_asn1_oid_from_text(CBB *cbb, const char *text, 654 size_t len); 655 656 // CBB_flush_asn1_set_of calls |CBB_flush| on |cbb| and then reorders the 657 // contents for a DER-encoded ASN.1 SET OF type. It returns one on success and 658 // zero on failure. DER canonicalizes SET OF contents by sorting 659 // lexicographically by encoding. Call this function when encoding a SET OF 660 // type in an order that is not already known to be canonical. 661 // 662 // Note a SET type has a slightly different ordering than a SET OF. 663 OPENSSL_EXPORT int CBB_flush_asn1_set_of(CBB *cbb); 664 665 666 // Unicode utilities. 667 // 668 // These functions consider noncharacters (see section 23.7 from Unicode 15.0.0) 669 // to be invalid code points and will treat them as an error condition. 670 671 // The following functions read one Unicode code point from |cbs| with the 672 // corresponding encoding and store it in |*out|. They return one on success and 673 // zero on error. 674 OPENSSL_EXPORT int CBS_get_utf8(CBS *cbs, uint32_t *out); 675 OPENSSL_EXPORT int CBS_get_latin1(CBS *cbs, uint32_t *out); 676 OPENSSL_EXPORT int CBS_get_ucs2_be(CBS *cbs, uint32_t *out); 677 OPENSSL_EXPORT int CBS_get_utf32_be(CBS *cbs, uint32_t *out); 678 679 // CBB_get_utf8_len returns the number of bytes needed to represent |u| in 680 // UTF-8. 681 OPENSSL_EXPORT size_t CBB_get_utf8_len(uint32_t u); 682 683 // The following functions encode |u| to |cbb| with the corresponding 684 // encoding. They return one on success and zero on error. Error conditions 685 // include |u| being an invalid code point, or |u| being unencodable in the 686 // specified encoding. 687 OPENSSL_EXPORT int CBB_add_utf8(CBB *cbb, uint32_t u); 688 OPENSSL_EXPORT int CBB_add_latin1(CBB *cbb, uint32_t u); 689 OPENSSL_EXPORT int CBB_add_ucs2_be(CBB *cbb, uint32_t u); 690 OPENSSL_EXPORT int CBB_add_utf32_be(CBB *cbb, uint32_t u); 691 692 693 #if defined(__cplusplus) 694 } // extern C 695 696 697 #if !defined(BORINGSSL_NO_CXX) 698 extern "C++" { 699 700 BSSL_NAMESPACE_BEGIN 701 702 using ScopedCBB = internal::StackAllocated<CBB, void, CBB_zero, CBB_cleanup>; 703 704 BSSL_NAMESPACE_END 705 706 } // extern C++ 707 #endif 708 709 #endif 710 711 #endif // OPENSSL_HEADER_BYTESTRING_H