1 /* Copyright (c) 2014, Google Inc.
2 *
3 * Permission to use, copy, modify, and/or distribute this software for any
4 * purpose with or without fee is hereby granted, provided that the above
5 * copyright notice and this permission notice appear in all copies.
6 *
7 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
8 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
9 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
10 * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
11 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
12 * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
13 * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
14
15 #ifndef OPENSSL_HEADER_BYTESTRING_H
16 #define OPENSSL_HEADER_BYTESTRING_H
17
18 #include <openssl/base.h>
19
20 #include <openssl/span.h>
21 #include <time.h>
22
23 #if defined(__cplusplus)
24 extern "C" {
25 #endif
26
27
28 // Bytestrings are used for parsing and building TLS and ASN.1 messages.
29 //
30 // A "CBS" (CRYPTO ByteString) represents a string of bytes in memory and
31 // provides utility functions for safely parsing length-prefixed structures
32 // like TLS and ASN.1 from it.
33 //
34 // A "CBB" (CRYPTO ByteBuilder) is a memory buffer that grows as needed and
35 // provides utility functions for building length-prefixed messages.
36
37
38 // CRYPTO ByteString
39
40 struct cbs_st {
41 const uint8_t *data;
42 size_t len;
43
44 #if !defined(BORINGSSL_NO_CXX)
45 // Allow implicit conversions to and from bssl::Span<const uint8_t>.
cbs_stcbs_st46 cbs_st(bssl::Span<const uint8_t> span)
47 : data(span.data()), len(span.size()) {}
48 operator bssl::Span<const uint8_t>() const {
49 return bssl::MakeConstSpan(data, len);
50 }
51
52 // Defining any constructors requires we explicitly default the others.
53 cbs_st() = default;
54 cbs_st(const cbs_st &) = default;
55 cbs_st &operator=(const cbs_st &) = default;
56 #endif
57 };
58
59 // CBS_init sets |cbs| to point to |data|. It does not take ownership of
60 // |data|.
CBS_init(CBS * cbs,const uint8_t * data,size_t len)61 OPENSSL_INLINE void CBS_init(CBS *cbs, const uint8_t *data, size_t len) {
62 cbs->data = data;
63 cbs->len = len;
64 }
65
66 // CBS_skip advances |cbs| by |len| bytes. It returns one on success and zero
67 // otherwise.
68 OPENSSL_EXPORT int CBS_skip(CBS *cbs, size_t len);
69
70 // CBS_data returns a pointer to the contents of |cbs|.
CBS_data(const CBS * cbs)71 OPENSSL_INLINE const uint8_t *CBS_data(const CBS *cbs) { return cbs->data; }
72
73 // CBS_len returns the number of bytes remaining in |cbs|.
CBS_len(const CBS * cbs)74 OPENSSL_INLINE size_t CBS_len(const CBS *cbs) { return cbs->len; }
75
76 // CBS_stow copies the current contents of |cbs| into |*out_ptr| and
77 // |*out_len|. If |*out_ptr| is not NULL, the contents are freed with
78 // OPENSSL_free. It returns one on success and zero on allocation failure. On
79 // success, |*out_ptr| should be freed with OPENSSL_free. If |cbs| is empty,
80 // |*out_ptr| will be NULL.
81 OPENSSL_EXPORT int CBS_stow(const CBS *cbs, uint8_t **out_ptr, size_t *out_len);
82
83 // CBS_strdup copies the current contents of |cbs| into |*out_ptr| as a
84 // NUL-terminated C string. If |*out_ptr| is not NULL, the contents are freed
85 // with OPENSSL_free. It returns one on success and zero on allocation
86 // failure. On success, |*out_ptr| should be freed with OPENSSL_free.
87 //
88 // NOTE: If |cbs| contains NUL bytes, the string will be truncated. Call
89 // |CBS_contains_zero_byte(cbs)| to check for NUL bytes.
90 OPENSSL_EXPORT int CBS_strdup(const CBS *cbs, char **out_ptr);
91
92 // CBS_contains_zero_byte returns one if the current contents of |cbs| contains
93 // a NUL byte and zero otherwise.
94 OPENSSL_EXPORT int CBS_contains_zero_byte(const CBS *cbs);
95
96 // CBS_mem_equal compares the current contents of |cbs| with the |len| bytes
97 // starting at |data|. If they're equal, it returns one, otherwise zero. If the
98 // lengths match, it uses a constant-time comparison.
99 OPENSSL_EXPORT int CBS_mem_equal(const CBS *cbs, const uint8_t *data,
100 size_t len);
101
102 // CBS_get_u8 sets |*out| to the next uint8_t from |cbs| and advances |cbs|. It
103 // returns one on success and zero on error.
104 OPENSSL_EXPORT int CBS_get_u8(CBS *cbs, uint8_t *out);
105
106 // CBS_get_u16 sets |*out| to the next, big-endian uint16_t from |cbs| and
107 // advances |cbs|. It returns one on success and zero on error.
108 OPENSSL_EXPORT int CBS_get_u16(CBS *cbs, uint16_t *out);
109
110 // CBS_get_u16le sets |*out| to the next, little-endian uint16_t from |cbs| and
111 // advances |cbs|. It returns one on success and zero on error.
112 OPENSSL_EXPORT int CBS_get_u16le(CBS *cbs, uint16_t *out);
113
114 // CBS_get_u24 sets |*out| to the next, big-endian 24-bit value from |cbs| and
115 // advances |cbs|. It returns one on success and zero on error.
116 OPENSSL_EXPORT int CBS_get_u24(CBS *cbs, uint32_t *out);
117
118 // CBS_get_u32 sets |*out| to the next, big-endian uint32_t value from |cbs|
119 // and advances |cbs|. It returns one on success and zero on error.
120 OPENSSL_EXPORT int CBS_get_u32(CBS *cbs, uint32_t *out);
121
122 // CBS_get_u32le sets |*out| to the next, little-endian uint32_t value from
123 // |cbs| and advances |cbs|. It returns one on success and zero on error.
124 OPENSSL_EXPORT int CBS_get_u32le(CBS *cbs, uint32_t *out);
125
126 // CBS_get_u64 sets |*out| to the next, big-endian uint64_t value from |cbs|
127 // and advances |cbs|. It returns one on success and zero on error.
128 OPENSSL_EXPORT int CBS_get_u64(CBS *cbs, uint64_t *out);
129
130 // CBS_get_u64le sets |*out| to the next, little-endian uint64_t value from
131 // |cbs| and advances |cbs|. It returns one on success and zero on error.
132 OPENSSL_EXPORT int CBS_get_u64le(CBS *cbs, uint64_t *out);
133
134 // CBS_get_last_u8 sets |*out| to the last uint8_t from |cbs| and shortens
135 // |cbs|. It returns one on success and zero on error.
136 OPENSSL_EXPORT int CBS_get_last_u8(CBS *cbs, uint8_t *out);
137
138 // CBS_get_bytes sets |*out| to the next |len| bytes from |cbs| and advances
139 // |cbs|. It returns one on success and zero on error.
140 OPENSSL_EXPORT int CBS_get_bytes(CBS *cbs, CBS *out, size_t len);
141
142 // CBS_copy_bytes copies the next |len| bytes from |cbs| to |out| and advances
143 // |cbs|. It returns one on success and zero on error.
144 OPENSSL_EXPORT int CBS_copy_bytes(CBS *cbs, uint8_t *out, size_t len);
145
146 // CBS_get_u8_length_prefixed sets |*out| to the contents of an 8-bit,
147 // length-prefixed value from |cbs| and advances |cbs| over it. It returns one
148 // on success and zero on error.
149 OPENSSL_EXPORT int CBS_get_u8_length_prefixed(CBS *cbs, CBS *out);
150
151 // CBS_get_u16_length_prefixed sets |*out| to the contents of a 16-bit,
152 // big-endian, length-prefixed value from |cbs| and advances |cbs| over it. It
153 // returns one on success and zero on error.
154 OPENSSL_EXPORT int CBS_get_u16_length_prefixed(CBS *cbs, CBS *out);
155
156 // CBS_get_u24_length_prefixed sets |*out| to the contents of a 24-bit,
157 // big-endian, length-prefixed value from |cbs| and advances |cbs| over it. It
158 // returns one on success and zero on error.
159 OPENSSL_EXPORT int CBS_get_u24_length_prefixed(CBS *cbs, CBS *out);
160
161 // CBS_get_until_first finds the first instance of |c| in |cbs|. If found, it
162 // sets |*out| to the text before the match, advances |cbs| over it, and returns
163 // one. Otherwise, it returns zero and leaves |cbs| unmodified.
164 OPENSSL_EXPORT int CBS_get_until_first(CBS *cbs, CBS *out, uint8_t c);
165
166 // CBS_get_u64_decimal reads a decimal integer from |cbs| and writes it to
167 // |*out|. It stops reading at the end of the string, or the first non-digit
168 // character. It returns one on success and zero on error. This function behaves
169 // analogously to |strtoul| except it does not accept empty inputs, leading
170 // zeros, or negative values.
171 OPENSSL_EXPORT int CBS_get_u64_decimal(CBS *cbs, uint64_t *out);
172
173
174 // Parsing ASN.1
175 //
176 // |CBS| may be used to parse DER structures. Rather than using a schema
177 // compiler, the following functions act on tag-length-value elements in the
178 // serialization itself. Thus the caller is responsible for looping over a
179 // SEQUENCE, branching on CHOICEs or OPTIONAL fields, checking for trailing
180 // data, and handling explict vs. implicit tagging.
181 //
182 // Tags are represented as |CBS_ASN1_TAG| values in memory. The upper few bits
183 // store the class and constructed bit, and the remaining bits store the tag
184 // number. Note this differs from the DER serialization, to support tag numbers
185 // beyond 31. Consumers must use the constants defined below to decompose or
186 // assemble tags.
187 //
188 // This library treats an element's constructed bit as part of its tag. In DER,
189 // the constructed bit is computable from the type. The constants for universal
190 // types have the bit set. Callers must set it correctly for tagged types.
191 // Explicitly-tagged types are always constructed, and implicitly-tagged types
192 // inherit the underlying type's bit.
193
194 // CBS_ASN1_TAG_SHIFT is how much the in-memory representation shifts the class
195 // and constructed bits from the DER serialization.
196 #define CBS_ASN1_TAG_SHIFT 24
197
198 // CBS_ASN1_CONSTRUCTED may be ORed into a tag to set the constructed bit.
199 #define CBS_ASN1_CONSTRUCTED (0x20u << CBS_ASN1_TAG_SHIFT)
200
201 // The following values specify the tag class and may be ORed into a tag number
202 // to produce the final tag. If none is used, the tag will be UNIVERSAL.
203 #define CBS_ASN1_UNIVERSAL (0u << CBS_ASN1_TAG_SHIFT)
204 #define CBS_ASN1_APPLICATION (0x40u << CBS_ASN1_TAG_SHIFT)
205 #define CBS_ASN1_CONTEXT_SPECIFIC (0x80u << CBS_ASN1_TAG_SHIFT)
206 #define CBS_ASN1_PRIVATE (0xc0u << CBS_ASN1_TAG_SHIFT)
207
208 // CBS_ASN1_CLASS_MASK may be ANDed with a tag to query its class. This will
209 // give one of the four values above.
210 #define CBS_ASN1_CLASS_MASK (0xc0u << CBS_ASN1_TAG_SHIFT)
211
212 // CBS_ASN1_TAG_NUMBER_MASK may be ANDed with a tag to query its number.
213 #define CBS_ASN1_TAG_NUMBER_MASK ((1u << (5 + CBS_ASN1_TAG_SHIFT)) - 1)
214
215 // The following values are constants for UNIVERSAL tags. Note these constants
216 // include the constructed bit.
217 #define CBS_ASN1_BOOLEAN 0x1u
218 #define CBS_ASN1_INTEGER 0x2u
219 #define CBS_ASN1_BITSTRING 0x3u
220 #define CBS_ASN1_OCTETSTRING 0x4u
221 #define CBS_ASN1_NULL 0x5u
222 #define CBS_ASN1_OBJECT 0x6u
223 #define CBS_ASN1_ENUMERATED 0xau
224 #define CBS_ASN1_UTF8STRING 0xcu
225 #define CBS_ASN1_SEQUENCE (0x10u | CBS_ASN1_CONSTRUCTED)
226 #define CBS_ASN1_SET (0x11u | CBS_ASN1_CONSTRUCTED)
227 #define CBS_ASN1_NUMERICSTRING 0x12u
228 #define CBS_ASN1_PRINTABLESTRING 0x13u
229 #define CBS_ASN1_T61STRING 0x14u
230 #define CBS_ASN1_VIDEOTEXSTRING 0x15u
231 #define CBS_ASN1_IA5STRING 0x16u
232 #define CBS_ASN1_UTCTIME 0x17u
233 #define CBS_ASN1_GENERALIZEDTIME 0x18u
234 #define CBS_ASN1_GRAPHICSTRING 0x19u
235 #define CBS_ASN1_VISIBLESTRING 0x1au
236 #define CBS_ASN1_GENERALSTRING 0x1bu
237 #define CBS_ASN1_UNIVERSALSTRING 0x1cu
238 #define CBS_ASN1_BMPSTRING 0x1eu
239
240 // CBS_get_asn1 sets |*out| to the contents of DER-encoded, ASN.1 element (not
241 // including tag and length bytes) and advances |cbs| over it. The ASN.1
242 // element must match |tag_value|. It returns one on success and zero
243 // on error.
244 OPENSSL_EXPORT int CBS_get_asn1(CBS *cbs, CBS *out, CBS_ASN1_TAG tag_value);
245
246 // CBS_get_asn1_element acts like |CBS_get_asn1| but |out| will include the
247 // ASN.1 header bytes too.
248 OPENSSL_EXPORT int CBS_get_asn1_element(CBS *cbs, CBS *out,
249 CBS_ASN1_TAG tag_value);
250
251 // CBS_peek_asn1_tag looks ahead at the next ASN.1 tag and returns one
252 // if the next ASN.1 element on |cbs| would have tag |tag_value|. If
253 // |cbs| is empty or the tag does not match, it returns zero. Note: if
254 // it returns one, CBS_get_asn1 may still fail if the rest of the
255 // element is malformed.
256 OPENSSL_EXPORT int CBS_peek_asn1_tag(const CBS *cbs, CBS_ASN1_TAG tag_value);
257
258 // CBS_get_any_asn1 sets |*out| to contain the next ASN.1 element from |*cbs|
259 // (not including tag and length bytes), sets |*out_tag| to the tag number, and
260 // advances |*cbs|. It returns one on success and zero on error. Either of |out|
261 // and |out_tag| may be NULL to ignore the value.
262 OPENSSL_EXPORT int CBS_get_any_asn1(CBS *cbs, CBS *out,
263 CBS_ASN1_TAG *out_tag);
264
265 // CBS_get_any_asn1_element sets |*out| to contain the next ASN.1 element from
266 // |*cbs| (including header bytes) and advances |*cbs|. It sets |*out_tag| to
267 // the tag number and |*out_header_len| to the length of the ASN.1 header. Each
268 // of |out|, |out_tag|, and |out_header_len| may be NULL to ignore the value.
269 OPENSSL_EXPORT int CBS_get_any_asn1_element(CBS *cbs, CBS *out,
270 CBS_ASN1_TAG *out_tag,
271 size_t *out_header_len);
272
273 // CBS_get_any_ber_asn1_element acts the same as |CBS_get_any_asn1_element| but
274 // also allows indefinite-length elements to be returned and does not enforce
275 // that lengths are minimal. It sets |*out_indefinite| to one if the length was
276 // indefinite and zero otherwise. If indefinite, |*out_header_len| and
277 // |CBS_len(out)| will be equal as only the header is returned (although this is
278 // also true for empty elements so |*out_indefinite| should be checked). If
279 // |out_ber_found| is not NULL then it is set to one if any case of invalid DER
280 // but valid BER is found, and to zero otherwise.
281 //
282 // This function will not successfully parse an end-of-contents (EOC) as an
283 // element. Callers parsing indefinite-length encoding must check for EOC
284 // separately.
285 OPENSSL_EXPORT int CBS_get_any_ber_asn1_element(CBS *cbs, CBS *out,
286 CBS_ASN1_TAG *out_tag,
287 size_t *out_header_len,
288 int *out_ber_found,
289 int *out_indefinite);
290
291 // CBS_get_asn1_uint64 gets an ASN.1 INTEGER from |cbs| using |CBS_get_asn1|
292 // and sets |*out| to its value. It returns one on success and zero on error,
293 // where error includes the integer being negative, or too large to represent
294 // in 64 bits.
295 OPENSSL_EXPORT int CBS_get_asn1_uint64(CBS *cbs, uint64_t *out);
296
297 // CBS_get_asn1_int64 gets an ASN.1 INTEGER from |cbs| using |CBS_get_asn1|
298 // and sets |*out| to its value. It returns one on success and zero on error,
299 // where error includes the integer being too large to represent in 64 bits.
300 OPENSSL_EXPORT int CBS_get_asn1_int64(CBS *cbs, int64_t *out);
301
302 // CBS_get_asn1_bool gets an ASN.1 BOOLEAN from |cbs| and sets |*out| to zero
303 // or one based on its value. It returns one on success or zero on error.
304 OPENSSL_EXPORT int CBS_get_asn1_bool(CBS *cbs, int *out);
305
306 // CBS_get_optional_asn1 gets an optional explicitly-tagged element from |cbs|
307 // tagged with |tag| and sets |*out| to its contents, or ignores it if |out| is
308 // NULL. If present and if |out_present| is not NULL, it sets |*out_present| to
309 // one, otherwise zero. It returns one on success, whether or not the element
310 // was present, and zero on decode failure.
311 OPENSSL_EXPORT int CBS_get_optional_asn1(CBS *cbs, CBS *out, int *out_present,
312 CBS_ASN1_TAG tag);
313
314 // CBS_get_optional_asn1_octet_string gets an optional
315 // explicitly-tagged OCTET STRING from |cbs|. If present, it sets
316 // |*out| to the string and |*out_present| to one. Otherwise, it sets
317 // |*out| to empty and |*out_present| to zero. |out_present| may be
318 // NULL. It returns one on success, whether or not the element was
319 // present, and zero on decode failure.
320 OPENSSL_EXPORT int CBS_get_optional_asn1_octet_string(CBS *cbs, CBS *out,
321 int *out_present,
322 CBS_ASN1_TAG tag);
323
324 // CBS_get_optional_asn1_uint64 gets an optional explicitly-tagged
325 // INTEGER from |cbs|. If present, it sets |*out| to the
326 // value. Otherwise, it sets |*out| to |default_value|. It returns one
327 // on success, whether or not the element was present, and zero on
328 // decode failure.
329 OPENSSL_EXPORT int CBS_get_optional_asn1_uint64(CBS *cbs, uint64_t *out,
330 CBS_ASN1_TAG tag,
331 uint64_t default_value);
332
333 // CBS_get_optional_asn1_bool gets an optional, explicitly-tagged BOOLEAN from
334 // |cbs|. If present, it sets |*out| to either zero or one, based on the
335 // boolean. Otherwise, it sets |*out| to |default_value|. It returns one on
336 // success, whether or not the element was present, and zero on decode
337 // failure.
338 OPENSSL_EXPORT int CBS_get_optional_asn1_bool(CBS *cbs, int *out,
339 CBS_ASN1_TAG tag,
340 int default_value);
341
342 // CBS_is_valid_asn1_bitstring returns one if |cbs| is a valid ASN.1 BIT STRING
343 // body and zero otherwise.
344 OPENSSL_EXPORT int CBS_is_valid_asn1_bitstring(const CBS *cbs);
345
346 // CBS_asn1_bitstring_has_bit returns one if |cbs| is a valid ASN.1 BIT STRING
347 // body and the specified bit is present and set. Otherwise, it returns zero.
348 // |bit| is indexed starting from zero.
349 OPENSSL_EXPORT int CBS_asn1_bitstring_has_bit(const CBS *cbs, unsigned bit);
350
351 // CBS_is_valid_asn1_integer returns one if |cbs| is a valid ASN.1 INTEGER,
352 // body and zero otherwise. On success, if |out_is_negative| is non-NULL,
353 // |*out_is_negative| will be set to one if |cbs| is negative and zero
354 // otherwise.
355 OPENSSL_EXPORT int CBS_is_valid_asn1_integer(const CBS *cbs,
356 int *out_is_negative);
357
358 // CBS_is_unsigned_asn1_integer returns one if |cbs| is a valid non-negative
359 // ASN.1 INTEGER body and zero otherwise.
360 OPENSSL_EXPORT int CBS_is_unsigned_asn1_integer(const CBS *cbs);
361
362 // CBS_is_valid_asn1_oid returns one if |cbs| is a valid DER-encoded ASN.1
363 // OBJECT IDENTIFIER contents (not including the element framing) and zero
364 // otherwise. This function tolerates arbitrarily large OID components.
365 OPENSSL_EXPORT int CBS_is_valid_asn1_oid(const CBS *cbs);
366
367 // CBS_asn1_oid_to_text interprets |cbs| as DER-encoded ASN.1 OBJECT IDENTIFIER
368 // contents (not including the element framing) and returns the ASCII
369 // representation (e.g., "1.2.840.113554.4.1.72585") in a newly-allocated
370 // string, or NULL on failure. The caller must release the result with
371 // |OPENSSL_free|.
372 //
373 // This function may fail if |cbs| is an invalid OBJECT IDENTIFIER, or if any
374 // OID components are too large.
375 OPENSSL_EXPORT char *CBS_asn1_oid_to_text(const CBS *cbs);
376
377
378 // CBS_parse_generalized_time returns one if |cbs| is a valid DER-encoded, ASN.1
379 // GeneralizedTime body within the limitations imposed by RFC 5280, or zero
380 // otherwise. If |allow_timezone_offset| is non-zero, four-digit timezone
381 // offsets, which would not be allowed by DER, are permitted. On success, if
382 // |out_tm| is non-NULL, |*out_tm| will be zeroed, and then set to the
383 // corresponding time in UTC. This function does not compute |out_tm->tm_wday|
384 // or |out_tm->tm_yday|.
385 OPENSSL_EXPORT int CBS_parse_generalized_time(const CBS *cbs, struct tm *out_tm,
386 int allow_timezone_offset);
387
388 // CBS_parse_utc_time returns one if |cbs| is a valid DER-encoded, ASN.1
389 // UTCTime body within the limitations imposed by RFC 5280, or zero otherwise.
390 // If |allow_timezone_offset| is non-zero, four-digit timezone offsets, which
391 // would not be allowed by DER, are permitted. On success, if |out_tm| is
392 // non-NULL, |*out_tm| will be zeroed, and then set to the corresponding time
393 // in UTC. This function does not compute |out_tm->tm_wday| or
394 // |out_tm->tm_yday|.
395 OPENSSL_EXPORT int CBS_parse_utc_time(const CBS *cbs, struct tm *out_tm,
396 int allow_timezone_offset);
397
398 // CRYPTO ByteBuilder.
399 //
400 // |CBB| objects allow one to build length-prefixed serialisations. A |CBB|
401 // object is associated with a buffer and new buffers are created with
402 // |CBB_init|. Several |CBB| objects can point at the same buffer when a
403 // length-prefix is pending, however only a single |CBB| can be 'current' at
404 // any one time. For example, if one calls |CBB_add_u8_length_prefixed| then
405 // the new |CBB| points at the same buffer as the original. But if the original
406 // |CBB| is used then the length prefix is written out and the new |CBB| must
407 // not be used again.
408 //
409 // If one needs to force a length prefix to be written out because a |CBB| is
410 // going out of scope, use |CBB_flush|. If an operation on a |CBB| fails, it is
411 // in an undefined state and must not be used except to call |CBB_cleanup|.
412
413 struct cbb_buffer_st {
414 uint8_t *buf;
415 // len is the number of valid bytes in |buf|.
416 size_t len;
417 // cap is the size of |buf|.
418 size_t cap;
419 // can_resize is one iff |buf| is owned by this object. If not then |buf|
420 // cannot be resized.
421 unsigned can_resize : 1;
422 // error is one if there was an error writing to this CBB. All future
423 // operations will fail.
424 unsigned error : 1;
425 };
426
427 struct cbb_child_st {
428 // base is a pointer to the buffer this |CBB| writes to.
429 struct cbb_buffer_st *base;
430 // offset is the number of bytes from the start of |base->buf| to this |CBB|'s
431 // pending length prefix.
432 size_t offset;
433 // pending_len_len contains the number of bytes in this |CBB|'s pending
434 // length-prefix, or zero if no length-prefix is pending.
435 uint8_t pending_len_len;
436 unsigned pending_is_asn1 : 1;
437 };
438
439 struct cbb_st {
440 // child points to a child CBB if a length-prefix is pending.
441 CBB *child;
442 // is_child is one if this is a child |CBB| and zero if it is a top-level
443 // |CBB|. This determines which arm of the union is valid.
444 char is_child;
445 union {
446 struct cbb_buffer_st base;
447 struct cbb_child_st child;
448 } u;
449 };
450
451 // CBB_zero sets an uninitialised |cbb| to the zero state. It must be
452 // initialised with |CBB_init| or |CBB_init_fixed| before use, but it is safe to
453 // call |CBB_cleanup| without a successful |CBB_init|. This may be used for more
454 // uniform cleanup of a |CBB|.
455 OPENSSL_EXPORT void CBB_zero(CBB *cbb);
456
457 // CBB_init initialises |cbb| with |initial_capacity|. Since a |CBB| grows as
458 // needed, the |initial_capacity| is just a hint. It returns one on success or
459 // zero on allocation failure.
460 OPENSSL_EXPORT int CBB_init(CBB *cbb, size_t initial_capacity);
461
462 // CBB_init_fixed initialises |cbb| to write to |len| bytes at |buf|. Since
463 // |buf| cannot grow, trying to write more than |len| bytes will cause CBB
464 // functions to fail. This function is infallible and always returns one. It is
465 // safe, but not necessary, to call |CBB_cleanup| on |cbb|.
466 OPENSSL_EXPORT int CBB_init_fixed(CBB *cbb, uint8_t *buf, size_t len);
467
468 // CBB_cleanup frees all resources owned by |cbb| and other |CBB| objects
469 // writing to the same buffer. This should be used in an error case where a
470 // serialisation is abandoned.
471 //
472 // This function can only be called on a "top level" |CBB|, i.e. one initialised
473 // with |CBB_init| or |CBB_init_fixed|, or a |CBB| set to the zero state with
474 // |CBB_zero|.
475 OPENSSL_EXPORT void CBB_cleanup(CBB *cbb);
476
477 // CBB_finish completes any pending length prefix and sets |*out_data| to a
478 // malloced buffer and |*out_len| to the length of that buffer. The caller
479 // takes ownership of the buffer and, unless the buffer was fixed with
480 // |CBB_init_fixed|, must call |OPENSSL_free| when done.
481 //
482 // It can only be called on a "top level" |CBB|, i.e. one initialised with
483 // |CBB_init| or |CBB_init_fixed|. It returns one on success and zero on
484 // error.
485 OPENSSL_EXPORT int CBB_finish(CBB *cbb, uint8_t **out_data, size_t *out_len);
486
487 // CBB_flush causes any pending length prefixes to be written out and any child
488 // |CBB| objects of |cbb| to be invalidated. This allows |cbb| to continue to be
489 // used after the children go out of scope, e.g. when local |CBB| objects are
490 // added as children to a |CBB| that persists after a function returns. This
491 // function returns one on success or zero on error.
492 OPENSSL_EXPORT int CBB_flush(CBB *cbb);
493
494 // CBB_data returns a pointer to the bytes written to |cbb|. It does not flush
495 // |cbb|. The pointer is valid until the next operation to |cbb|.
496 //
497 // To avoid unfinalized length prefixes, it is a fatal error to call this on a
498 // CBB with any active children.
499 OPENSSL_EXPORT const uint8_t *CBB_data(const CBB *cbb);
500
501 // CBB_len returns the number of bytes written to |cbb|. It does not flush
502 // |cbb|.
503 //
504 // To avoid unfinalized length prefixes, it is a fatal error to call this on a
505 // CBB with any active children.
506 OPENSSL_EXPORT size_t CBB_len(const CBB *cbb);
507
508 // CBB_add_u8_length_prefixed sets |*out_contents| to a new child of |cbb|. The
509 // data written to |*out_contents| will be prefixed in |cbb| with an 8-bit
510 // length. It returns one on success or zero on error.
511 OPENSSL_EXPORT int CBB_add_u8_length_prefixed(CBB *cbb, CBB *out_contents);
512
513 // CBB_add_u16_length_prefixed sets |*out_contents| to a new child of |cbb|.
514 // The data written to |*out_contents| will be prefixed in |cbb| with a 16-bit,
515 // big-endian length. It returns one on success or zero on error.
516 OPENSSL_EXPORT int CBB_add_u16_length_prefixed(CBB *cbb, CBB *out_contents);
517
518 // CBB_add_u24_length_prefixed sets |*out_contents| to a new child of |cbb|.
519 // The data written to |*out_contents| will be prefixed in |cbb| with a 24-bit,
520 // big-endian length. It returns one on success or zero on error.
521 OPENSSL_EXPORT int CBB_add_u24_length_prefixed(CBB *cbb, CBB *out_contents);
522
523 // CBB_add_asn1 sets |*out_contents| to a |CBB| into which the contents of an
524 // ASN.1 object can be written. The |tag| argument will be used as the tag for
525 // the object. It returns one on success or zero on error.
526 OPENSSL_EXPORT int CBB_add_asn1(CBB *cbb, CBB *out_contents, CBS_ASN1_TAG tag);
527
528 // CBB_add_bytes appends |len| bytes from |data| to |cbb|. It returns one on
529 // success and zero otherwise.
530 OPENSSL_EXPORT int CBB_add_bytes(CBB *cbb, const uint8_t *data, size_t len);
531
532 // CBB_add_zeros append |len| bytes with value zero to |cbb|. It returns one on
533 // success and zero otherwise.
534 OPENSSL_EXPORT int CBB_add_zeros(CBB *cbb, size_t len);
535
536 // CBB_add_space appends |len| bytes to |cbb| and sets |*out_data| to point to
537 // the beginning of that space. The caller must then write |len| bytes of
538 // actual contents to |*out_data|. It returns one on success and zero
539 // otherwise.
540 OPENSSL_EXPORT int CBB_add_space(CBB *cbb, uint8_t **out_data, size_t len);
541
542 // CBB_reserve ensures |cbb| has room for |len| additional bytes and sets
543 // |*out_data| to point to the beginning of that space. It returns one on
544 // success and zero otherwise. The caller may write up to |len| bytes to
545 // |*out_data| and call |CBB_did_write| to complete the write. |*out_data| is
546 // valid until the next operation on |cbb| or an ancestor |CBB|.
547 OPENSSL_EXPORT int CBB_reserve(CBB *cbb, uint8_t **out_data, size_t len);
548
549 // CBB_did_write advances |cbb| by |len| bytes, assuming the space has been
550 // written to by the caller. It returns one on success and zero on error.
551 OPENSSL_EXPORT int CBB_did_write(CBB *cbb, size_t len);
552
553 // CBB_add_u8 appends an 8-bit number from |value| to |cbb|. It returns one on
554 // success and zero otherwise.
555 OPENSSL_EXPORT int CBB_add_u8(CBB *cbb, uint8_t value);
556
557 // CBB_add_u16 appends a 16-bit, big-endian number from |value| to |cbb|. It
558 // returns one on success and zero otherwise.
559 OPENSSL_EXPORT int CBB_add_u16(CBB *cbb, uint16_t value);
560
561 // CBB_add_u16le appends a 16-bit, little-endian number from |value| to |cbb|.
562 // It returns one on success and zero otherwise.
563 OPENSSL_EXPORT int CBB_add_u16le(CBB *cbb, uint16_t value);
564
565 // CBB_add_u24 appends a 24-bit, big-endian number from |value| to |cbb|. It
566 // returns one on success and zero otherwise.
567 OPENSSL_EXPORT int CBB_add_u24(CBB *cbb, uint32_t value);
568
569 // CBB_add_u32 appends a 32-bit, big-endian number from |value| to |cbb|. It
570 // returns one on success and zero otherwise.
571 OPENSSL_EXPORT int CBB_add_u32(CBB *cbb, uint32_t value);
572
573 // CBB_add_u32le appends a 32-bit, little-endian number from |value| to |cbb|.
574 // It returns one on success and zero otherwise.
575 OPENSSL_EXPORT int CBB_add_u32le(CBB *cbb, uint32_t value);
576
577 // CBB_add_u64 appends a 64-bit, big-endian number from |value| to |cbb|. It
578 // returns one on success and zero otherwise.
579 OPENSSL_EXPORT int CBB_add_u64(CBB *cbb, uint64_t value);
580
581 // CBB_add_u64le appends a 64-bit, little-endian number from |value| to |cbb|.
582 // It returns one on success and zero otherwise.
583 OPENSSL_EXPORT int CBB_add_u64le(CBB *cbb, uint64_t value);
584
585 // CBB_discard_child discards the current unflushed child of |cbb|. Neither the
586 // child's contents nor the length prefix will be included in the output.
587 OPENSSL_EXPORT void CBB_discard_child(CBB *cbb);
588
589 // CBB_add_asn1_uint64 writes an ASN.1 INTEGER into |cbb| using |CBB_add_asn1|
590 // and writes |value| in its contents. It returns one on success and zero on
591 // error.
592 OPENSSL_EXPORT int CBB_add_asn1_uint64(CBB *cbb, uint64_t value);
593
594 // CBB_add_asn1_uint64_with_tag behaves like |CBB_add_asn1_uint64| but uses
595 // |tag| as the tag instead of INTEGER. This is useful if the INTEGER type uses
596 // implicit tagging.
597 OPENSSL_EXPORT int CBB_add_asn1_uint64_with_tag(CBB *cbb, uint64_t value,
598 CBS_ASN1_TAG tag);
599
600 // CBB_add_asn1_int64 writes an ASN.1 INTEGER into |cbb| using |CBB_add_asn1|
601 // and writes |value| in its contents. It returns one on success and zero on
602 // error.
603 OPENSSL_EXPORT int CBB_add_asn1_int64(CBB *cbb, int64_t value);
604
605 // CBB_add_asn1_int64_with_tag behaves like |CBB_add_asn1_int64| but uses |tag|
606 // as the tag instead of INTEGER. This is useful if the INTEGER type uses
607 // implicit tagging.
608 OPENSSL_EXPORT int CBB_add_asn1_int64_with_tag(CBB *cbb, int64_t value,
609 CBS_ASN1_TAG tag);
610
611 // CBB_add_asn1_octet_string writes an ASN.1 OCTET STRING into |cbb| with the
612 // given contents. It returns one on success and zero on error.
613 OPENSSL_EXPORT int CBB_add_asn1_octet_string(CBB *cbb, const uint8_t *data,
614 size_t data_len);
615
616 // CBB_add_asn1_bool writes an ASN.1 BOOLEAN into |cbb| which is true iff
617 // |value| is non-zero. It returns one on success and zero on error.
618 OPENSSL_EXPORT int CBB_add_asn1_bool(CBB *cbb, int value);
619
620 // CBB_add_asn1_oid_from_text decodes |len| bytes from |text| as an ASCII OID
621 // representation, e.g. "1.2.840.113554.4.1.72585", and writes the DER-encoded
622 // contents to |cbb|. It returns one on success and zero on malloc failure or if
623 // |text| was invalid. It does not include the OBJECT IDENTIFER framing, only
624 // the element's contents.
625 //
626 // This function considers OID strings with components which do not fit in a
627 // |uint64_t| to be invalid.
628 OPENSSL_EXPORT int CBB_add_asn1_oid_from_text(CBB *cbb, const char *text,
629 size_t len);
630
631 // CBB_flush_asn1_set_of calls |CBB_flush| on |cbb| and then reorders the
632 // contents for a DER-encoded ASN.1 SET OF type. It returns one on success and
633 // zero on failure. DER canonicalizes SET OF contents by sorting
634 // lexicographically by encoding. Call this function when encoding a SET OF
635 // type in an order that is not already known to be canonical.
636 //
637 // Note a SET type has a slightly different ordering than a SET OF.
638 OPENSSL_EXPORT int CBB_flush_asn1_set_of(CBB *cbb);
639
640
641 // Unicode utilities.
642 //
643 // These functions consider noncharacters (see section 23.7 from Unicode 15.0.0)
644 // to be invalid code points and will treat them as an error condition.
645
646 // The following functions read one Unicode code point from |cbs| with the
647 // corresponding encoding and store it in |*out|. They return one on success and
648 // zero on error.
649 OPENSSL_EXPORT int CBS_get_utf8(CBS *cbs, uint32_t *out);
650 OPENSSL_EXPORT int CBS_get_latin1(CBS *cbs, uint32_t *out);
651 OPENSSL_EXPORT int CBS_get_ucs2_be(CBS *cbs, uint32_t *out);
652 OPENSSL_EXPORT int CBS_get_utf32_be(CBS *cbs, uint32_t *out);
653
654 // CBB_get_utf8_len returns the number of bytes needed to represent |u| in
655 // UTF-8.
656 OPENSSL_EXPORT size_t CBB_get_utf8_len(uint32_t u);
657
658 // The following functions encode |u| to |cbb| with the corresponding
659 // encoding. They return one on success and zero on error. Error conditions
660 // include |u| being an invalid code point, or |u| being unencodable in the
661 // specified encoding.
662 OPENSSL_EXPORT int CBB_add_utf8(CBB *cbb, uint32_t u);
663 OPENSSL_EXPORT int CBB_add_latin1(CBB *cbb, uint32_t u);
664 OPENSSL_EXPORT int CBB_add_ucs2_be(CBB *cbb, uint32_t u);
665 OPENSSL_EXPORT int CBB_add_utf32_be(CBB *cbb, uint32_t u);
666
667
668 #if defined(__cplusplus)
669 } // extern C
670
671
672 #if !defined(BORINGSSL_NO_CXX)
673 extern "C++" {
674
675 BSSL_NAMESPACE_BEGIN
676
677 using ScopedCBB = internal::StackAllocated<CBB, void, CBB_zero, CBB_cleanup>;
678
679 BSSL_NAMESPACE_END
680
681 } // extern C++
682 #endif
683
684 #endif
685
686 #endif // OPENSSL_HEADER_BYTESTRING_H
687