Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 1 | /* Copyright (c) 2014, Google Inc. |
| 2 | * |
| 3 | * Permission to use, copy, modify, and/or distribute this software for any |
| 4 | * purpose with or without fee is hereby granted, provided that the above |
| 5 | * copyright notice and this permission notice appear in all copies. |
| 6 | * |
| 7 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
| 8 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
| 9 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY |
| 10 | * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
| 11 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION |
| 12 | * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN |
| 13 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ |
| 14 | |
| 15 | #ifndef OPENSSL_HEADER_BYTESTRING_H |
| 16 | #define OPENSSL_HEADER_BYTESTRING_H |
| 17 | |
| 18 | #include <openssl/base.h> |
| 19 | |
| 20 | #if defined(__cplusplus) |
| 21 | extern "C" { |
| 22 | #endif |
| 23 | |
| 24 | |
| 25 | /* Bytestrings are used for parsing and building TLS and ASN.1 messages. |
| 26 | * |
| 27 | * A "CBS" (CRYPTO ByteString) represents a string of bytes in memory and |
| 28 | * provides utility functions for safely parsing length-prefixed structures |
| 29 | * like TLS and ASN.1 from it. |
| 30 | * |
| 31 | * A "CBB" (CRYPTO ByteBuilder) is a memory buffer that grows as needed and |
| 32 | * provides utility functions for building length-prefixed messages. */ |
| 33 | |
| 34 | |
| 35 | /* CRYPTO ByteString */ |
| 36 | |
| 37 | struct cbs_st { |
| 38 | const uint8_t *data; |
| 39 | size_t len; |
| 40 | }; |
| 41 | |
| 42 | /* CBS_init sets |cbs| to point to |data|. It does not take ownership of |
| 43 | * |data|. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 44 | OPENSSL_EXPORT void CBS_init(CBS *cbs, const uint8_t *data, size_t len); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 45 | |
| 46 | /* CBS_skip advances |cbs| by |len| bytes. It returns one on success and zero |
| 47 | * otherwise. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 48 | OPENSSL_EXPORT int CBS_skip(CBS *cbs, size_t len); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 49 | |
Doug Hogan | 2683af7 | 2015-02-01 23:35:14 -0800 | [diff] [blame] | 50 | /* CBS_data returns a pointer to the contents of |cbs|. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 51 | OPENSSL_EXPORT const uint8_t *CBS_data(const CBS *cbs); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 52 | |
| 53 | /* CBS_len returns the number of bytes remaining in |cbs|. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 54 | OPENSSL_EXPORT size_t CBS_len(const CBS *cbs); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 55 | |
David Benjamin | 0397309 | 2014-06-24 23:27:17 -0400 | [diff] [blame] | 56 | /* CBS_stow copies the current contents of |cbs| into |*out_ptr| and |
| 57 | * |*out_len|. If |*out_ptr| is not NULL, the contents are freed with |
| 58 | * OPENSSL_free. It returns one on success and zero on allocation failure. On |
| 59 | * success, |*out_ptr| should be freed with OPENSSL_free. If |cbs| is empty, |
| 60 | * |*out_ptr| will be NULL. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 61 | OPENSSL_EXPORT int CBS_stow(const CBS *cbs, uint8_t **out_ptr, size_t *out_len); |
David Benjamin | 0397309 | 2014-06-24 23:27:17 -0400 | [diff] [blame] | 62 | |
David Benjamin | ed43958 | 2014-07-14 19:13:02 -0400 | [diff] [blame] | 63 | /* CBS_strdup copies the current contents of |cbs| into |*out_ptr| as a |
| 64 | * NUL-terminated C string. If |*out_ptr| is not NULL, the contents are freed |
| 65 | * with OPENSSL_free. It returns one on success and zero on allocation |
| 66 | * failure. On success, |*out_ptr| should be freed with OPENSSL_free. |
| 67 | * |
| 68 | * NOTE: If |cbs| contains NUL bytes, the string will be truncated. Call |
| 69 | * |CBS_contains_zero_byte(cbs)| to check for NUL bytes. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 70 | OPENSSL_EXPORT int CBS_strdup(const CBS *cbs, char **out_ptr); |
David Benjamin | ed43958 | 2014-07-14 19:13:02 -0400 | [diff] [blame] | 71 | |
| 72 | /* CBS_contains_zero_byte returns one if the current contents of |cbs| contains |
| 73 | * a NUL byte and zero otherwise. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 74 | OPENSSL_EXPORT int CBS_contains_zero_byte(const CBS *cbs); |
David Benjamin | ed43958 | 2014-07-14 19:13:02 -0400 | [diff] [blame] | 75 | |
David Benjamin | 22f9bcc | 2014-07-13 12:29:21 -0400 | [diff] [blame] | 76 | /* CBS_mem_equal compares the current contents of |cbs| with the |len| bytes |
| 77 | * starting at |data|. If they're equal, it returns one, otherwise zero. If the |
| 78 | * lengths match, it uses a constant-time comparison. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 79 | OPENSSL_EXPORT int CBS_mem_equal(const CBS *cbs, const uint8_t *data, |
| 80 | size_t len); |
David Benjamin | 22f9bcc | 2014-07-13 12:29:21 -0400 | [diff] [blame] | 81 | |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 82 | /* CBS_get_u8 sets |*out| to the next uint8_t from |cbs| and advances |cbs|. It |
| 83 | * returns one on success and zero on error. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 84 | OPENSSL_EXPORT int CBS_get_u8(CBS *cbs, uint8_t *out); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 85 | |
| 86 | /* CBS_get_u16 sets |*out| to the next, big-endian uint16_t from |cbs| and |
| 87 | * advances |cbs|. It returns one on success and zero on error. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 88 | OPENSSL_EXPORT int CBS_get_u16(CBS *cbs, uint16_t *out); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 89 | |
| 90 | /* CBS_get_u24 sets |*out| to the next, big-endian 24-bit value from |cbs| and |
| 91 | * advances |cbs|. It returns one on success and zero on error. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 92 | OPENSSL_EXPORT int CBS_get_u24(CBS *cbs, uint32_t *out); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 93 | |
| 94 | /* CBS_get_u32 sets |*out| to the next, big-endian uint32_t value from |cbs| |
| 95 | * and advances |cbs|. It returns one on success and zero on error. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 96 | OPENSSL_EXPORT int CBS_get_u32(CBS *cbs, uint32_t *out); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 97 | |
| 98 | /* CBS_get_bytes sets |*out| to the next |len| bytes from |cbs| and advances |
| 99 | * |cbs|. It returns one on success and zero on error. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 100 | OPENSSL_EXPORT int CBS_get_bytes(CBS *cbs, CBS *out, size_t len); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 101 | |
| 102 | /* CBS_get_u8_length_prefixed sets |*out| to the contents of an 8-bit, |
| 103 | * length-prefixed value from |cbs| and advances |cbs| over it. It returns one |
| 104 | * on success and zero on error. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 105 | OPENSSL_EXPORT int CBS_get_u8_length_prefixed(CBS *cbs, CBS *out); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 106 | |
| 107 | /* CBS_get_u16_length_prefixed sets |*out| to the contents of a 16-bit, |
| 108 | * big-endian, length-prefixed value from |cbs| and advances |cbs| over it. It |
| 109 | * returns one on success and zero on error. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 110 | OPENSSL_EXPORT int CBS_get_u16_length_prefixed(CBS *cbs, CBS *out); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 111 | |
| 112 | /* CBS_get_u24_length_prefixed sets |*out| to the contents of a 24-bit, |
| 113 | * big-endian, length-prefixed value from |cbs| and advances |cbs| over it. It |
| 114 | * returns one on success and zero on error. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 115 | OPENSSL_EXPORT int CBS_get_u24_length_prefixed(CBS *cbs, CBS *out); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 116 | |
| 117 | |
| 118 | /* Parsing ASN.1 */ |
| 119 | |
| 120 | #define CBS_ASN1_BOOLEAN 0x1 |
| 121 | #define CBS_ASN1_INTEGER 0x2 |
| 122 | #define CBS_ASN1_BITSTRING 0x3 |
| 123 | #define CBS_ASN1_OCTETSTRING 0x4 |
| 124 | #define CBS_ASN1_OBJECT 0x6 |
David Benjamin | ed6eb66 | 2014-08-28 16:28:18 -0400 | [diff] [blame] | 125 | #define CBS_ASN1_ENUMERATED 0xa |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 126 | #define CBS_ASN1_SEQUENCE (0x10 | CBS_ASN1_CONSTRUCTED) |
| 127 | #define CBS_ASN1_SET (0x11 | CBS_ASN1_CONSTRUCTED) |
| 128 | |
| 129 | #define CBS_ASN1_CONSTRUCTED 0x20 |
| 130 | #define CBS_ASN1_CONTEXT_SPECIFIC 0x80 |
| 131 | |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 132 | /* CBS_get_asn1 sets |*out| to the contents of DER-encoded, ASN.1 element (not |
| 133 | * including tag and length bytes) and advances |cbs| over it. The ASN.1 |
| 134 | * element must match |tag_value|. It returns one on success and zero |
| 135 | * on error. |
| 136 | * |
Doug Hogan | 2683af7 | 2015-02-01 23:35:14 -0800 | [diff] [blame] | 137 | * Tag numbers greater than 30 are not supported (i.e. short form only). */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 138 | OPENSSL_EXPORT int CBS_get_asn1(CBS *cbs, CBS *out, unsigned tag_value); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 139 | |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 140 | /* CBS_get_asn1_element acts like |CBS_get_asn1| but |out| will include the |
| 141 | * ASN.1 header bytes too. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 142 | OPENSSL_EXPORT int CBS_get_asn1_element(CBS *cbs, CBS *out, unsigned tag_value); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 143 | |
David Benjamin | b698617 | 2014-10-09 19:39:15 -0400 | [diff] [blame] | 144 | /* CBS_peek_asn1_tag looks ahead at the next ASN.1 tag and returns one |
| 145 | * if the next ASN.1 element on |cbs| would have tag |tag_value|. If |
| 146 | * |cbs| is empty or the tag does not match, it returns zero. Note: if |
| 147 | * it returns one, CBS_get_asn1 may still fail if the rest of the |
| 148 | * element is malformed. */ |
| 149 | OPENSSL_EXPORT int CBS_peek_asn1_tag(const CBS *cbs, unsigned tag_value); |
| 150 | |
David Benjamin | 9b04d65 | 2014-08-27 20:19:50 -0400 | [diff] [blame] | 151 | /* CBS_get_any_asn1_element sets |*out| to contain the next ASN.1 element from |
| 152 | * |*cbs| (including header bytes) and advances |*cbs|. It sets |*out_tag| to |
| 153 | * the tag number and |*out_header_len| to the length of the ASN.1 header. If |
| 154 | * the element has indefinite length then |*out| will only contain the |
| 155 | * header. Each of |out|, |out_tag|, and |out_header_len| may be NULL to ignore |
| 156 | * the value. |
| 157 | * |
Doug Hogan | 2683af7 | 2015-02-01 23:35:14 -0800 | [diff] [blame] | 158 | * Tag numbers greater than 30 are not supported (i.e. short form only). */ |
David Benjamin | 9b04d65 | 2014-08-27 20:19:50 -0400 | [diff] [blame] | 159 | OPENSSL_EXPORT int CBS_get_any_asn1_element(CBS *cbs, CBS *out, |
| 160 | unsigned *out_tag, |
| 161 | size_t *out_header_len); |
| 162 | |
Adam Langley | 9c01e00 | 2014-08-21 10:54:06 -0700 | [diff] [blame] | 163 | /* CBS_get_asn1_uint64 gets an ASN.1 INTEGER from |cbs| using |CBS_get_asn1| |
| 164 | * and sets |*out| to its value. It returns one on success and zero on error, |
| 165 | * where error includes the integer being negative, or too large to represent |
| 166 | * in 64 bits. */ |
| 167 | OPENSSL_EXPORT int CBS_get_asn1_uint64(CBS *cbs, uint64_t *out); |
| 168 | |
David Benjamin | 83fd6b6 | 2014-10-19 04:33:38 -0400 | [diff] [blame] | 169 | /* CBS_get_optional_asn1 gets an optional explicitly-tagged element |
| 170 | * from |cbs| tagged with |tag| and sets |*out| to its contents. If |
| 171 | * present, it sets |*out_present| to one, otherwise zero. It returns |
| 172 | * one on success, whether or not the element was present, and zero on |
| 173 | * decode failure. */ |
| 174 | OPENSSL_EXPORT int CBS_get_optional_asn1(CBS *cbs, CBS *out, int *out_present, |
| 175 | unsigned tag); |
| 176 | |
| 177 | /* CBS_get_optional_asn1_octet_string gets an optional |
| 178 | * explicitly-tagged OCTET STRING from |cbs|. If present, it sets |
| 179 | * |*out| to the string and |*out_present| to one. Otherwise, it sets |
| 180 | * |*out| to empty and |*out_present| to zero. |out_present| may be |
| 181 | * NULL. It returns one on success, whether or not the element was |
| 182 | * present, and zero on decode failure. */ |
| 183 | OPENSSL_EXPORT int CBS_get_optional_asn1_octet_string(CBS *cbs, CBS *out, |
| 184 | int *out_present, |
| 185 | unsigned tag); |
| 186 | |
| 187 | /* CBS_get_optional_asn1_uint64 gets an optional explicitly-tagged |
| 188 | * INTEGER from |cbs|. If present, it sets |*out| to the |
| 189 | * value. Otherwise, it sets |*out| to |default_value|. It returns one |
| 190 | * on success, whether or not the element was present, and zero on |
| 191 | * decode failure. */ |
| 192 | OPENSSL_EXPORT int CBS_get_optional_asn1_uint64(CBS *cbs, uint64_t *out, |
| 193 | unsigned tag, |
| 194 | uint64_t default_value); |
| 195 | |
Adam Langley | 7571292 | 2014-10-10 16:23:43 -0700 | [diff] [blame] | 196 | /* CBS_get_optional_asn1_bool gets an optional, explicitly-tagged BOOLEAN from |
| 197 | * |cbs|. If present, it sets |*out| to either zero or one, based on the |
| 198 | * boolean. Otherwise, it sets |*out| to |default_value|. It returns one on |
| 199 | * success, whether or not the element was present, and zero on decode |
| 200 | * failure. */ |
| 201 | OPENSSL_EXPORT int CBS_get_optional_asn1_bool(CBS *cbs, int *out, unsigned tag, |
| 202 | int default_value); |
| 203 | |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 204 | |
| 205 | /* CRYPTO ByteBuilder. |
| 206 | * |
| 207 | * |CBB| objects allow one to build length-prefixed serialisations. A |CBB| |
| 208 | * object is associated with a buffer and new buffers are created with |
| 209 | * |CBB_init|. Several |CBB| objects can point at the same buffer when a |
| 210 | * length-prefix is pending, however only a single |CBB| can be 'current' at |
| 211 | * any one time. For example, if one calls |CBB_add_u8_length_prefixed| then |
| 212 | * the new |CBB| points at the same buffer as the original. But if the original |
| 213 | * |CBB| is used then the length prefix is written out and the new |CBB| must |
| 214 | * not be used again. |
| 215 | * |
| 216 | * If one needs to force a length prefix to be written out because a |CBB| is |
| 217 | * going out of scope, use |CBB_flush|. */ |
| 218 | |
| 219 | struct cbb_buffer_st { |
| 220 | uint8_t *buf; |
| 221 | size_t len; /* The number of valid bytes. */ |
| 222 | size_t cap; /* The size of buf. */ |
| 223 | char can_resize; /* One iff |buf| is owned by this object. If not then |buf| |
| 224 | cannot be resized. */ |
| 225 | }; |
| 226 | |
| 227 | struct cbb_st { |
| 228 | struct cbb_buffer_st *base; |
| 229 | /* offset is the offset from the start of |base->buf| to the position of any |
| 230 | * pending length-prefix. */ |
| 231 | size_t offset; |
| 232 | /* child points to a child CBB if a length-prefix is pending. */ |
| 233 | struct cbb_st *child; |
| 234 | /* pending_len_len contains the number of bytes in a pending length-prefix, |
| 235 | * or zero if no length-prefix is pending. */ |
| 236 | uint8_t pending_len_len; |
| 237 | char pending_is_asn1; |
| 238 | /* is_top_level is true iff this is a top-level |CBB| (as opposed to a child |
| 239 | * |CBB|). Top-level objects are valid arguments for |CBB_finish|. */ |
| 240 | char is_top_level; |
| 241 | }; |
| 242 | |
| 243 | /* CBB_init initialises |cbb| with |initial_capacity|. Since a |CBB| grows as |
| 244 | * needed, the |initial_capacity| is just a hint. It returns one on success or |
| 245 | * zero on error. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 246 | OPENSSL_EXPORT int CBB_init(CBB *cbb, size_t initial_capacity); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 247 | |
| 248 | /* CBB_init_fixed initialises |cbb| to write to |len| bytes at |buf|. Since |
| 249 | * |buf| cannot grow, trying to write more than |len| bytes will cause CBB |
| 250 | * functions to fail. It returns one on success or zero on error. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 251 | OPENSSL_EXPORT int CBB_init_fixed(CBB *cbb, uint8_t *buf, size_t len); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 252 | |
| 253 | /* CBB_cleanup frees all resources owned by |cbb| and other |CBB| objects |
| 254 | * writing to the same buffer. This should be used in an error case where a |
| 255 | * serialisation is abandoned. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 256 | OPENSSL_EXPORT void CBB_cleanup(CBB *cbb); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 257 | |
| 258 | /* CBB_finish completes any pending length prefix and sets |*out_data| to a |
| 259 | * malloced buffer and |*out_len| to the length of that buffer. The caller |
| 260 | * takes ownership of the buffer and, unless the buffer was fixed with |
| 261 | * |CBB_init_fixed|, must call |OPENSSL_free| when done. |
| 262 | * |
| 263 | * It can only be called on a "top level" |CBB|, i.e. one initialised with |
| 264 | * |CBB_init| or |CBB_init_fixed|. It returns one on success and zero on |
| 265 | * error. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 266 | OPENSSL_EXPORT int CBB_finish(CBB *cbb, uint8_t **out_data, size_t *out_len); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 267 | |
| 268 | /* CBB_flush causes any pending length prefixes to be written out and any child |
| 269 | * |CBB| objects of |cbb| to be invalidated. It returns one on success or zero |
| 270 | * on error. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 271 | OPENSSL_EXPORT int CBB_flush(CBB *cbb); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 272 | |
| 273 | /* CBB_add_u8_length_prefixed sets |*out_contents| to a new child of |cbb|. The |
| 274 | * data written to |*out_contents| will be prefixed in |cbb| with an 8-bit |
| 275 | * length. It returns one on success or zero on error. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 276 | OPENSSL_EXPORT int CBB_add_u8_length_prefixed(CBB *cbb, CBB *out_contents); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 277 | |
| 278 | /* CBB_add_u16_length_prefixed sets |*out_contents| to a new child of |cbb|. |
| 279 | * The data written to |*out_contents| will be prefixed in |cbb| with a 16-bit, |
| 280 | * big-endian length. It returns one on success or zero on error. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 281 | OPENSSL_EXPORT int CBB_add_u16_length_prefixed(CBB *cbb, CBB *out_contents); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 282 | |
| 283 | /* CBB_add_u24_length_prefixed sets |*out_contents| to a new child of |cbb|. |
| 284 | * The data written to |*out_contents| will be prefixed in |cbb| with a 24-bit, |
| 285 | * big-endian length. It returns one on success or zero on error. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 286 | OPENSSL_EXPORT int CBB_add_u24_length_prefixed(CBB *cbb, CBB *out_contents); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 287 | |
| 288 | /* CBB_add_asn sets |*out_contents| to a |CBB| into which the contents of an |
| 289 | * ASN.1 object can be written. The |tag| argument will be used as the tag for |
Doug Hogan | 5ba3056 | 2015-02-02 00:40:21 -0800 | [diff] [blame^] | 290 | * the object. Passing in |tag| number 31 will return in an error since only |
| 291 | * single octet identifiers are supported. It returns one on success or zero |
| 292 | * on error. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 293 | OPENSSL_EXPORT int CBB_add_asn1(CBB *cbb, CBB *out_contents, uint8_t tag); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 294 | |
| 295 | /* CBB_add_bytes appends |len| bytes from |data| to |cbb|. It returns one on |
| 296 | * success and zero otherwise. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 297 | OPENSSL_EXPORT int CBB_add_bytes(CBB *cbb, const uint8_t *data, size_t len); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 298 | |
Adam Langley | eeb9f49 | 2014-08-06 16:29:56 -0700 | [diff] [blame] | 299 | /* CBB_add_space appends |len| bytes to |cbb| and sets |*out_data| to point to |
| 300 | * the beginning of that space. The caller must then write |len| bytes of |
| 301 | * actual contents to |*out_data|. It returns one on success and zero |
| 302 | * otherwise. */ |
| 303 | OPENSSL_EXPORT int CBB_add_space(CBB *cbb, uint8_t **out_data, size_t len); |
| 304 | |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 305 | /* CBB_add_u8 appends an 8-bit number from |value| to |cbb|. It returns one on |
| 306 | * success and zero otherwise. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 307 | OPENSSL_EXPORT int CBB_add_u8(CBB *cbb, uint8_t value); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 308 | |
| 309 | /* CBB_add_u8 appends a 16-bit, big-endian number from |value| to |cbb|. It |
| 310 | * returns one on success and zero otherwise. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 311 | OPENSSL_EXPORT int CBB_add_u16(CBB *cbb, uint16_t value); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 312 | |
| 313 | /* CBB_add_u24 appends a 24-bit, big-endian number from |value| to |cbb|. It |
| 314 | * returns one on success and zero otherwise. */ |
Adam Langley | eb7d2ed | 2014-07-30 16:02:14 -0700 | [diff] [blame] | 315 | OPENSSL_EXPORT int CBB_add_u24(CBB *cbb, uint32_t value); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 316 | |
David Benjamin | b5b6854 | 2014-10-19 13:14:30 -0400 | [diff] [blame] | 317 | /* CBB_add_asn1_uint64 writes an ASN.1 INTEGER into |cbb| using |CBB_add_asn1| |
| 318 | * and writes |value| in its contents. It returns one on success and zero on |
| 319 | * error. */ |
| 320 | OPENSSL_EXPORT int CBB_add_asn1_uint64(CBB *cbb, uint64_t value); |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 321 | |
David Benjamin | 5b082e8 | 2014-12-26 00:54:52 -0500 | [diff] [blame] | 322 | |
Adam Langley | 95c29f3 | 2014-06-20 12:00:00 -0700 | [diff] [blame] | 323 | #if defined(__cplusplus) |
| 324 | } /* extern C */ |
| 325 | #endif |
| 326 | |
| 327 | #endif /* OPENSSL_HEADER_BYTESTRING_H */ |