The `crdtp` library in the inspector_protocol is compiled as a library and linked to the node executable. PR-URL: https://github.com/nodejs/node/pull/56649 Reviewed-By: James M Snell <jasnell@gmail.com> Reviewed-By: Yagiz Nizipli <yagiz@nizipli.com>
1079 lines
39 KiB
C++
1079 lines
39 KiB
C++
// Copyright 2019 The Chromium Authors
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "cbor.h"
|
|
|
|
#include <algorithm>
|
|
#include <cassert>
|
|
#include <cmath>
|
|
#include <cstring>
|
|
#include <limits>
|
|
#include <stack>
|
|
|
|
namespace crdtp {
|
|
namespace cbor {
|
|
namespace {
|
|
// Indicates the number of bits the "initial byte" needs to be shifted to the
|
|
// right after applying |kMajorTypeMask| to produce the major type in the
|
|
// lowermost bits.
|
|
static constexpr uint8_t kMajorTypeBitShift = 5u;
|
|
// Mask selecting the low-order 5 bits of the "initial byte", which is where
|
|
// the additional information is encoded.
|
|
static constexpr uint8_t kAdditionalInformationMask = 0x1f;
|
|
// Mask selecting the high-order 3 bits of the "initial byte", which indicates
|
|
// the major type of the encoded value.
|
|
static constexpr uint8_t kMajorTypeMask = 0xe0;
|
|
// Indicates the integer is in the following byte.
|
|
static constexpr uint8_t kAdditionalInformation1Byte = 24u;
|
|
// Indicates the integer is in the next 2 bytes.
|
|
static constexpr uint8_t kAdditionalInformation2Bytes = 25u;
|
|
// Indicates the integer is in the next 4 bytes.
|
|
static constexpr uint8_t kAdditionalInformation4Bytes = 26u;
|
|
// Indicates the integer is in the next 8 bytes.
|
|
static constexpr uint8_t kAdditionalInformation8Bytes = 27u;
|
|
|
|
// Encodes the initial byte, consisting of the |type| in the first 3 bits
|
|
// followed by 5 bits of |additional_info|.
|
|
constexpr uint8_t EncodeInitialByte(MajorType type, uint8_t additional_info) {
|
|
return (static_cast<uint8_t>(type) << kMajorTypeBitShift) |
|
|
(additional_info & kAdditionalInformationMask);
|
|
}
|
|
|
|
// TAG 24 indicates that what follows is a byte string which is
|
|
// encoded in CBOR format. We use this as a wrapper for
|
|
// maps and arrays, allowing us to skip them, because the
|
|
// byte string carries its size (byte length).
|
|
// https://tools.ietf.org/html/rfc7049#section-2.4.4.1
|
|
static constexpr uint8_t kInitialByteForEnvelope =
|
|
EncodeInitialByte(MajorType::TAG, kAdditionalInformation1Byte);
|
|
|
|
// The standalone byte for "envelope" tag, to follow kInitialByteForEnvelope
|
|
// in the correct implementation, as it is above in-tag value max (which is
|
|
// also, confusingly, 24). See EnvelopeHeader::Parse() for more.
|
|
static constexpr uint8_t kCBOREnvelopeTag = 24;
|
|
|
|
// The initial byte for a byte string with at most 2^32 bytes
|
|
// of payload. This is used for envelope encoding, even if
|
|
// the byte string is shorter.
|
|
static constexpr uint8_t kInitialByteFor32BitLengthByteString =
|
|
EncodeInitialByte(MajorType::BYTE_STRING, 26);
|
|
|
|
// See RFC 7049 Section 2.2.1, indefinite length arrays / maps have additional
|
|
// info = 31.
|
|
static constexpr uint8_t kInitialByteIndefiniteLengthArray =
|
|
EncodeInitialByte(MajorType::ARRAY, 31);
|
|
static constexpr uint8_t kInitialByteIndefiniteLengthMap =
|
|
EncodeInitialByte(MajorType::MAP, 31);
|
|
// See RFC 7049 Section 2.3, Table 1; this is used for finishing indefinite
|
|
// length maps / arrays.
|
|
static constexpr uint8_t kStopByte =
|
|
EncodeInitialByte(MajorType::SIMPLE_VALUE, 31);
|
|
|
|
// See RFC 7049 Section 2.3, Table 2.
|
|
static constexpr uint8_t kEncodedTrue =
|
|
EncodeInitialByte(MajorType::SIMPLE_VALUE, 21);
|
|
static constexpr uint8_t kEncodedFalse =
|
|
EncodeInitialByte(MajorType::SIMPLE_VALUE, 20);
|
|
static constexpr uint8_t kEncodedNull =
|
|
EncodeInitialByte(MajorType::SIMPLE_VALUE, 22);
|
|
static constexpr uint8_t kInitialByteForDouble =
|
|
EncodeInitialByte(MajorType::SIMPLE_VALUE, 27);
|
|
|
|
// See RFC 7049 Table 3 and Section 2.4.4.2. This is used as a prefix for
|
|
// arbitrary binary data encoded as BYTE_STRING.
|
|
static constexpr uint8_t kExpectedConversionToBase64Tag =
|
|
EncodeInitialByte(MajorType::TAG, 22);
|
|
|
|
// Writes the bytes for |v| to |out|, starting with the most significant byte.
|
|
// See also: https://commandcenter.blogspot.com/2012/04/byte-order-fallacy.html
|
|
template <typename T>
|
|
void WriteBytesMostSignificantByteFirst(T v, std::vector<uint8_t>* out) {
|
|
for (int shift_bytes = sizeof(T) - 1; shift_bytes >= 0; --shift_bytes)
|
|
out->push_back(0xff & (v >> (shift_bytes * 8)));
|
|
}
|
|
|
|
// Extracts sizeof(T) bytes from |in| to extract a value of type T
|
|
// (e.g. uint64_t, uint32_t, ...), most significant byte first.
|
|
// See also: https://commandcenter.blogspot.com/2012/04/byte-order-fallacy.html
|
|
template <typename T>
|
|
T ReadBytesMostSignificantByteFirst(span<uint8_t> in) {
|
|
assert(in.size() >= sizeof(T));
|
|
T result = 0;
|
|
for (size_t shift_bytes = 0; shift_bytes < sizeof(T); ++shift_bytes)
|
|
result |= T(in[sizeof(T) - 1 - shift_bytes]) << (shift_bytes * 8);
|
|
return result;
|
|
}
|
|
} // namespace
|
|
|
|
namespace internals {
|
|
// Reads the start of a token with definitive size from |bytes|.
|
|
// |type| is the major type as specified in RFC 7049 Section 2.1.
|
|
// |value| is the payload (e.g. for MajorType::UNSIGNED) or is the size
|
|
// (e.g. for BYTE_STRING).
|
|
// If successful, returns the number of bytes read. Otherwise returns 0.
|
|
size_t ReadTokenStart(span<uint8_t> bytes, MajorType* type, uint64_t* value) {
|
|
if (bytes.empty())
|
|
return 0;
|
|
uint8_t initial_byte = bytes[0];
|
|
*type = MajorType((initial_byte & kMajorTypeMask) >> kMajorTypeBitShift);
|
|
|
|
uint8_t additional_information = initial_byte & kAdditionalInformationMask;
|
|
if (additional_information < 24) {
|
|
// Values 0-23 are encoded directly into the additional info of the
|
|
// initial byte.
|
|
*value = additional_information;
|
|
return 1;
|
|
}
|
|
if (additional_information == kAdditionalInformation1Byte) {
|
|
// Values 24-255 are encoded with one initial byte, followed by the value.
|
|
if (bytes.size() < 2)
|
|
return 0;
|
|
*value = ReadBytesMostSignificantByteFirst<uint8_t>(bytes.subspan(1));
|
|
return 2;
|
|
}
|
|
if (additional_information == kAdditionalInformation2Bytes) {
|
|
// Values 256-65535: 1 initial byte + 2 bytes payload.
|
|
if (bytes.size() < 1 + sizeof(uint16_t))
|
|
return 0;
|
|
*value = ReadBytesMostSignificantByteFirst<uint16_t>(bytes.subspan(1));
|
|
return 3;
|
|
}
|
|
if (additional_information == kAdditionalInformation4Bytes) {
|
|
// 32 bit uint: 1 initial byte + 4 bytes payload.
|
|
if (bytes.size() < 1 + sizeof(uint32_t))
|
|
return 0;
|
|
*value = ReadBytesMostSignificantByteFirst<uint32_t>(bytes.subspan(1));
|
|
return 5;
|
|
}
|
|
if (additional_information == kAdditionalInformation8Bytes) {
|
|
// 64 bit uint: 1 initial byte + 8 bytes payload.
|
|
if (bytes.size() < 1 + sizeof(uint64_t))
|
|
return 0;
|
|
*value = ReadBytesMostSignificantByteFirst<uint64_t>(bytes.subspan(1));
|
|
return 9;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
// Writes the start of a token with |type|. The |value| may indicate the size,
|
|
// or it may be the payload if the value is an unsigned integer.
|
|
void WriteTokenStart(MajorType type,
|
|
uint64_t value,
|
|
std::vector<uint8_t>* encoded) {
|
|
if (value < 24) {
|
|
// Values 0-23 are encoded directly into the additional info of the
|
|
// initial byte.
|
|
encoded->push_back(EncodeInitialByte(type, /*additional_info=*/value));
|
|
return;
|
|
}
|
|
if (value <= std::numeric_limits<uint8_t>::max()) {
|
|
// Values 24-255 are encoded with one initial byte, followed by the value.
|
|
encoded->push_back(EncodeInitialByte(type, kAdditionalInformation1Byte));
|
|
encoded->push_back(value);
|
|
return;
|
|
}
|
|
if (value <= std::numeric_limits<uint16_t>::max()) {
|
|
// Values 256-65535: 1 initial byte + 2 bytes payload.
|
|
encoded->push_back(EncodeInitialByte(type, kAdditionalInformation2Bytes));
|
|
WriteBytesMostSignificantByteFirst<uint16_t>(value, encoded);
|
|
return;
|
|
}
|
|
if (value <= std::numeric_limits<uint32_t>::max()) {
|
|
// 32 bit uint: 1 initial byte + 4 bytes payload.
|
|
encoded->push_back(EncodeInitialByte(type, kAdditionalInformation4Bytes));
|
|
WriteBytesMostSignificantByteFirst<uint32_t>(static_cast<uint32_t>(value),
|
|
encoded);
|
|
return;
|
|
}
|
|
// 64 bit uint: 1 initial byte + 8 bytes payload.
|
|
encoded->push_back(EncodeInitialByte(type, kAdditionalInformation8Bytes));
|
|
WriteBytesMostSignificantByteFirst<uint64_t>(value, encoded);
|
|
}
|
|
} // namespace internals
|
|
|
|
// =============================================================================
|
|
// Detecting CBOR content
|
|
// =============================================================================
|
|
|
|
bool IsCBORMessage(span<uint8_t> msg) {
|
|
return msg.size() >= 4 && msg[0] == kInitialByteForEnvelope &&
|
|
(msg[1] == kInitialByteFor32BitLengthByteString ||
|
|
(msg[1] == kCBOREnvelopeTag &&
|
|
msg[2] == kInitialByteFor32BitLengthByteString));
|
|
}
|
|
|
|
Status CheckCBORMessage(span<uint8_t> msg) {
|
|
if (msg.empty())
|
|
return Status(Error::CBOR_UNEXPECTED_EOF_IN_ENVELOPE, 0);
|
|
if (msg[0] != kInitialByteForEnvelope)
|
|
return Status(Error::CBOR_INVALID_START_BYTE, 0);
|
|
StatusOr<EnvelopeHeader> status_or_header = EnvelopeHeader::Parse(msg);
|
|
if (!status_or_header.ok())
|
|
return status_or_header.status();
|
|
const size_t pos = (*status_or_header).header_size();
|
|
assert(pos < msg.size()); // EnvelopeParser would not allow empty envelope.
|
|
if (msg[pos] != EncodeIndefiniteLengthMapStart())
|
|
return Status(Error::CBOR_MAP_START_EXPECTED, pos);
|
|
return Status();
|
|
}
|
|
|
|
// =============================================================================
|
|
// Encoding invidiual CBOR items
|
|
// =============================================================================
|
|
|
|
uint8_t EncodeTrue() {
|
|
return kEncodedTrue;
|
|
}
|
|
|
|
uint8_t EncodeFalse() {
|
|
return kEncodedFalse;
|
|
}
|
|
|
|
uint8_t EncodeNull() {
|
|
return kEncodedNull;
|
|
}
|
|
|
|
uint8_t EncodeIndefiniteLengthArrayStart() {
|
|
return kInitialByteIndefiniteLengthArray;
|
|
}
|
|
|
|
uint8_t EncodeIndefiniteLengthMapStart() {
|
|
return kInitialByteIndefiniteLengthMap;
|
|
}
|
|
|
|
uint8_t EncodeStop() {
|
|
return kStopByte;
|
|
}
|
|
|
|
void EncodeInt32(int32_t value, std::vector<uint8_t>* out) {
|
|
if (value >= 0) {
|
|
internals::WriteTokenStart(MajorType::UNSIGNED, value, out);
|
|
} else {
|
|
uint64_t representation = static_cast<uint64_t>(-(value + 1));
|
|
internals::WriteTokenStart(MajorType::NEGATIVE, representation, out);
|
|
}
|
|
}
|
|
|
|
void EncodeString16(span<uint16_t> in, std::vector<uint8_t>* out) {
|
|
uint64_t byte_length = static_cast<uint64_t>(in.size_bytes());
|
|
internals::WriteTokenStart(MajorType::BYTE_STRING, byte_length, out);
|
|
// When emitting UTF16 characters, we always write the least significant byte
|
|
// first; this is because it's the native representation for X86.
|
|
// TODO(johannes): Implement a more efficient thing here later, e.g.
|
|
// casting *iff* the machine has this byte order.
|
|
// The wire format for UTF16 chars will probably remain the same
|
|
// (least significant byte first) since this way we can have
|
|
// golden files, unittests, etc. that port easily and universally.
|
|
// See also:
|
|
// https://commandcenter.blogspot.com/2012/04/byte-order-fallacy.html
|
|
for (const uint16_t two_bytes : in) {
|
|
out->push_back(two_bytes);
|
|
out->push_back(two_bytes >> 8);
|
|
}
|
|
}
|
|
|
|
void EncodeString8(span<uint8_t> in, std::vector<uint8_t>* out) {
|
|
internals::WriteTokenStart(MajorType::STRING,
|
|
static_cast<uint64_t>(in.size_bytes()), out);
|
|
out->insert(out->end(), in.begin(), in.end());
|
|
}
|
|
|
|
void EncodeFromLatin1(span<uint8_t> latin1, std::vector<uint8_t>* out) {
|
|
for (size_t ii = 0; ii < latin1.size(); ++ii) {
|
|
if (latin1[ii] <= 127)
|
|
continue;
|
|
// If there's at least one non-ASCII char, convert to UTF8.
|
|
std::vector<uint8_t> utf8(latin1.begin(), latin1.begin() + ii);
|
|
for (; ii < latin1.size(); ++ii) {
|
|
if (latin1[ii] <= 127) {
|
|
utf8.push_back(latin1[ii]);
|
|
} else {
|
|
// 0xC0 means it's a UTF8 sequence with 2 bytes.
|
|
utf8.push_back((latin1[ii] >> 6) | 0xc0);
|
|
utf8.push_back((latin1[ii] | 0x80) & 0xbf);
|
|
}
|
|
}
|
|
EncodeString8(SpanFrom(utf8), out);
|
|
return;
|
|
}
|
|
EncodeString8(latin1, out);
|
|
}
|
|
|
|
void EncodeFromUTF16(span<uint16_t> utf16, std::vector<uint8_t>* out) {
|
|
// If there's at least one non-ASCII char, encode as STRING16 (UTF16).
|
|
for (uint16_t ch : utf16) {
|
|
if (ch <= 127)
|
|
continue;
|
|
EncodeString16(utf16, out);
|
|
return;
|
|
}
|
|
// It's all US-ASCII, strip out every second byte and encode as UTF8.
|
|
internals::WriteTokenStart(MajorType::STRING,
|
|
static_cast<uint64_t>(utf16.size()), out);
|
|
out->insert(out->end(), utf16.begin(), utf16.end());
|
|
}
|
|
|
|
void EncodeBinary(span<uint8_t> in, std::vector<uint8_t>* out) {
|
|
out->push_back(kExpectedConversionToBase64Tag);
|
|
uint64_t byte_length = static_cast<uint64_t>(in.size_bytes());
|
|
internals::WriteTokenStart(MajorType::BYTE_STRING, byte_length, out);
|
|
out->insert(out->end(), in.begin(), in.end());
|
|
}
|
|
|
|
// A double is encoded with a specific initial byte
|
|
// (kInitialByteForDouble) plus the 64 bits of payload for its value.
|
|
constexpr size_t kEncodedDoubleSize = 1 + sizeof(uint64_t);
|
|
|
|
void EncodeDouble(double value, std::vector<uint8_t>* out) {
|
|
// The additional_info=27 indicates 64 bits for the double follow.
|
|
// See RFC 7049 Section 2.3, Table 1.
|
|
out->push_back(kInitialByteForDouble);
|
|
union {
|
|
double from_double;
|
|
uint64_t to_uint64;
|
|
} reinterpret;
|
|
reinterpret.from_double = value;
|
|
WriteBytesMostSignificantByteFirst<uint64_t>(reinterpret.to_uint64, out);
|
|
}
|
|
|
|
// =============================================================================
|
|
// cbor::EnvelopeEncoder - for wrapping submessages
|
|
// =============================================================================
|
|
|
|
void EnvelopeEncoder::EncodeStart(std::vector<uint8_t>* out) {
|
|
assert(byte_size_pos_ == 0);
|
|
out->push_back(kInitialByteForEnvelope);
|
|
out->push_back(kCBOREnvelopeTag);
|
|
out->push_back(kInitialByteFor32BitLengthByteString);
|
|
byte_size_pos_ = out->size();
|
|
out->resize(out->size() + sizeof(uint32_t));
|
|
}
|
|
|
|
bool EnvelopeEncoder::EncodeStop(std::vector<uint8_t>* out) {
|
|
assert(byte_size_pos_ != 0);
|
|
// The byte size is the size of the payload, that is, all the
|
|
// bytes that were written past the byte size position itself.
|
|
uint64_t byte_size = out->size() - (byte_size_pos_ + sizeof(uint32_t));
|
|
// We store exactly 4 bytes, so at most INT32MAX, with most significant
|
|
// byte first.
|
|
if (byte_size > std::numeric_limits<uint32_t>::max())
|
|
return false;
|
|
for (int shift_bytes = sizeof(uint32_t) - 1; shift_bytes >= 0;
|
|
--shift_bytes) {
|
|
(*out)[byte_size_pos_++] = 0xff & (byte_size >> (shift_bytes * 8));
|
|
}
|
|
return true;
|
|
}
|
|
|
|
// static
|
|
StatusOr<EnvelopeHeader> EnvelopeHeader::Parse(span<uint8_t> in) {
|
|
auto header_or_status = ParseFromFragment(in);
|
|
if (!header_or_status.ok())
|
|
return header_or_status;
|
|
if ((*header_or_status).outer_size() > in.size()) {
|
|
return StatusOr<EnvelopeHeader>(
|
|
Status(Error::CBOR_ENVELOPE_CONTENTS_LENGTH_MISMATCH, in.size()));
|
|
}
|
|
return header_or_status;
|
|
}
|
|
|
|
// static
|
|
StatusOr<EnvelopeHeader> EnvelopeHeader::ParseFromFragment(span<uint8_t> in) {
|
|
// Our copy of StatusOr<> requires explicit constructor.
|
|
using Ret = StatusOr<EnvelopeHeader>;
|
|
constexpr size_t kMinEnvelopeSize = 2 + /* for envelope tag */
|
|
1 + /* for byte string */
|
|
1; /* for contents, a map or an array */
|
|
if (in.size() < kMinEnvelopeSize)
|
|
return Ret(Status(Error::CBOR_UNEXPECTED_EOF_IN_ENVELOPE, in.size()));
|
|
assert(in[0] == kInitialByteForEnvelope); // Caller should assure that.
|
|
size_t offset = 1;
|
|
// TODO(caseq): require this! We're currently accepting both a legacy,
|
|
// non spec-compliant envelope tag (that this implementation still currently
|
|
// produces), as well as a well-formed two-byte tag that a correct
|
|
// implementation should emit.
|
|
if (in[offset] == kCBOREnvelopeTag)
|
|
++offset;
|
|
MajorType type;
|
|
uint64_t size;
|
|
size_t string_header_size =
|
|
internals::ReadTokenStart(in.subspan(offset), &type, &size);
|
|
if (!string_header_size)
|
|
return Ret(Status(Error::CBOR_UNEXPECTED_EOF_IN_ENVELOPE, in.size()));
|
|
if (type != MajorType::BYTE_STRING)
|
|
return Ret(Status(Error::CBOR_INVALID_ENVELOPE, offset));
|
|
// Do not allow empty envelopes -- at least an empty map/array should fit.
|
|
if (!size) {
|
|
return Ret(Status(Error::CBOR_MAP_OR_ARRAY_EXPECTED_IN_ENVELOPE,
|
|
offset + string_header_size));
|
|
}
|
|
if (size > std::numeric_limits<uint32_t>::max())
|
|
return Ret(Status(Error::CBOR_INVALID_ENVELOPE, offset));
|
|
offset += string_header_size;
|
|
return Ret(EnvelopeHeader(offset, static_cast<size_t>(size)));
|
|
}
|
|
|
|
// =============================================================================
|
|
// cbor::NewCBOREncoder - for encoding from a streaming parser
|
|
// =============================================================================
|
|
|
|
namespace {
|
|
class CBOREncoder : public ParserHandler {
|
|
public:
|
|
CBOREncoder(std::vector<uint8_t>* out, Status* status)
|
|
: out_(out), status_(status) {
|
|
*status_ = Status();
|
|
}
|
|
|
|
void HandleMapBegin() override {
|
|
if (!status_->ok())
|
|
return;
|
|
envelopes_.emplace_back();
|
|
envelopes_.back().EncodeStart(out_);
|
|
out_->push_back(kInitialByteIndefiniteLengthMap);
|
|
}
|
|
|
|
void HandleMapEnd() override {
|
|
if (!status_->ok())
|
|
return;
|
|
out_->push_back(kStopByte);
|
|
assert(!envelopes_.empty());
|
|
if (!envelopes_.back().EncodeStop(out_)) {
|
|
HandleError(
|
|
Status(Error::CBOR_ENVELOPE_SIZE_LIMIT_EXCEEDED, out_->size()));
|
|
return;
|
|
}
|
|
envelopes_.pop_back();
|
|
}
|
|
|
|
void HandleArrayBegin() override {
|
|
if (!status_->ok())
|
|
return;
|
|
envelopes_.emplace_back();
|
|
envelopes_.back().EncodeStart(out_);
|
|
out_->push_back(kInitialByteIndefiniteLengthArray);
|
|
}
|
|
|
|
void HandleArrayEnd() override {
|
|
if (!status_->ok())
|
|
return;
|
|
out_->push_back(kStopByte);
|
|
assert(!envelopes_.empty());
|
|
if (!envelopes_.back().EncodeStop(out_)) {
|
|
HandleError(
|
|
Status(Error::CBOR_ENVELOPE_SIZE_LIMIT_EXCEEDED, out_->size()));
|
|
return;
|
|
}
|
|
envelopes_.pop_back();
|
|
}
|
|
|
|
void HandleString8(span<uint8_t> chars) override {
|
|
if (!status_->ok())
|
|
return;
|
|
EncodeString8(chars, out_);
|
|
}
|
|
|
|
void HandleString16(span<uint16_t> chars) override {
|
|
if (!status_->ok())
|
|
return;
|
|
EncodeFromUTF16(chars, out_);
|
|
}
|
|
|
|
void HandleBinary(span<uint8_t> bytes) override {
|
|
if (!status_->ok())
|
|
return;
|
|
EncodeBinary(bytes, out_);
|
|
}
|
|
|
|
void HandleDouble(double value) override {
|
|
if (!status_->ok())
|
|
return;
|
|
EncodeDouble(value, out_);
|
|
}
|
|
|
|
void HandleInt32(int32_t value) override {
|
|
if (!status_->ok())
|
|
return;
|
|
EncodeInt32(value, out_);
|
|
}
|
|
|
|
void HandleBool(bool value) override {
|
|
if (!status_->ok())
|
|
return;
|
|
// See RFC 7049 Section 2.3, Table 2.
|
|
out_->push_back(value ? kEncodedTrue : kEncodedFalse);
|
|
}
|
|
|
|
void HandleNull() override {
|
|
if (!status_->ok())
|
|
return;
|
|
// See RFC 7049 Section 2.3, Table 2.
|
|
out_->push_back(kEncodedNull);
|
|
}
|
|
|
|
void HandleError(Status error) override {
|
|
if (!status_->ok())
|
|
return;
|
|
*status_ = error;
|
|
out_->clear();
|
|
}
|
|
|
|
private:
|
|
std::vector<uint8_t>* out_;
|
|
std::vector<EnvelopeEncoder> envelopes_;
|
|
Status* status_;
|
|
};
|
|
} // namespace
|
|
|
|
std::unique_ptr<ParserHandler> NewCBOREncoder(std::vector<uint8_t>* out,
|
|
Status* status) {
|
|
return std::unique_ptr<ParserHandler>(new CBOREncoder(out, status));
|
|
}
|
|
|
|
// =============================================================================
|
|
// cbor::CBORTokenizer - for parsing individual CBOR items
|
|
// =============================================================================
|
|
|
|
CBORTokenizer::CBORTokenizer(span<uint8_t> bytes)
|
|
: bytes_(bytes), status_(Error::OK, 0) {
|
|
ReadNextToken();
|
|
}
|
|
|
|
CBORTokenizer::~CBORTokenizer() {}
|
|
|
|
CBORTokenTag CBORTokenizer::TokenTag() const {
|
|
return token_tag_;
|
|
}
|
|
|
|
void CBORTokenizer::Next() {
|
|
if (token_tag_ == CBORTokenTag::ERROR_VALUE ||
|
|
token_tag_ == CBORTokenTag::DONE)
|
|
return;
|
|
ReadNextToken();
|
|
}
|
|
|
|
void CBORTokenizer::EnterEnvelope() {
|
|
token_byte_length_ = GetEnvelopeHeader().header_size();
|
|
ReadNextToken();
|
|
}
|
|
|
|
Status CBORTokenizer::Status() const {
|
|
return status_;
|
|
}
|
|
|
|
// The following accessor functions ::GetInt32, ::GetDouble,
|
|
// ::GetString8, ::GetString16WireRep, ::GetBinary, ::GetEnvelopeContents
|
|
// assume that a particular token was recognized in ::ReadNextToken.
|
|
// That's where all the error checking is done. By design,
|
|
// the accessors (assuming the token was recognized) never produce
|
|
// an error.
|
|
|
|
int32_t CBORTokenizer::GetInt32() const {
|
|
assert(token_tag_ == CBORTokenTag::INT32);
|
|
// The range checks happen in ::ReadNextToken().
|
|
return static_cast<int32_t>(
|
|
token_start_type_ == MajorType::UNSIGNED
|
|
? token_start_internal_value_
|
|
: -static_cast<int64_t>(token_start_internal_value_) - 1);
|
|
}
|
|
|
|
double CBORTokenizer::GetDouble() const {
|
|
assert(token_tag_ == CBORTokenTag::DOUBLE);
|
|
union {
|
|
uint64_t from_uint64;
|
|
double to_double;
|
|
} reinterpret;
|
|
reinterpret.from_uint64 = ReadBytesMostSignificantByteFirst<uint64_t>(
|
|
bytes_.subspan(status_.pos + 1));
|
|
return reinterpret.to_double;
|
|
}
|
|
|
|
span<uint8_t> CBORTokenizer::GetString8() const {
|
|
assert(token_tag_ == CBORTokenTag::STRING8);
|
|
auto length = static_cast<size_t>(token_start_internal_value_);
|
|
return bytes_.subspan(status_.pos + (token_byte_length_ - length), length);
|
|
}
|
|
|
|
span<uint8_t> CBORTokenizer::GetString16WireRep() const {
|
|
assert(token_tag_ == CBORTokenTag::STRING16);
|
|
auto length = static_cast<size_t>(token_start_internal_value_);
|
|
return bytes_.subspan(status_.pos + (token_byte_length_ - length), length);
|
|
}
|
|
|
|
span<uint8_t> CBORTokenizer::GetBinary() const {
|
|
assert(token_tag_ == CBORTokenTag::BINARY);
|
|
auto length = static_cast<size_t>(token_start_internal_value_);
|
|
return bytes_.subspan(status_.pos + (token_byte_length_ - length), length);
|
|
}
|
|
|
|
span<uint8_t> CBORTokenizer::GetEnvelope() const {
|
|
return bytes_.subspan(status_.pos, GetEnvelopeHeader().outer_size());
|
|
}
|
|
|
|
span<uint8_t> CBORTokenizer::GetEnvelopeContents() const {
|
|
const EnvelopeHeader& header = GetEnvelopeHeader();
|
|
return bytes_.subspan(status_.pos + header.header_size(),
|
|
header.content_size());
|
|
}
|
|
|
|
const EnvelopeHeader& CBORTokenizer::GetEnvelopeHeader() const {
|
|
assert(token_tag_ == CBORTokenTag::ENVELOPE);
|
|
return envelope_header_;
|
|
}
|
|
|
|
// All error checking happens in ::ReadNextToken, so that the accessors
|
|
// can avoid having to carry an error return value.
|
|
//
|
|
// With respect to checking the encoded lengths of strings, arrays, etc:
|
|
// On the wire, CBOR uses 1,2,4, and 8 byte unsigned integers, so
|
|
// we initially read them as uint64_t, usually into token_start_internal_value_.
|
|
//
|
|
// However, since these containers have a representation on the machine,
|
|
// we need to do corresponding size computations on the input byte array,
|
|
// output span (e.g. the payload for a string), etc., and size_t is
|
|
// machine specific (in practice either 32 bit or 64 bit).
|
|
//
|
|
// Further, we must avoid overflowing size_t. Therefore, we use this
|
|
// kMaxValidLength constant to:
|
|
// - Reject values that are larger than the architecture specific
|
|
// max size_t (differs between 32 bit and 64 bit arch).
|
|
// - Reserve at least one bit so that we can check against overflows
|
|
// when adding lengths (array / string length / etc.); we do this by
|
|
// ensuring that the inputs to an addition are <= kMaxValidLength,
|
|
// and then checking whether the sum went past it.
|
|
//
|
|
// See also
|
|
// https://chromium.googlesource.com/chromium/src/+/main/docs/security/integer-semantics.md
|
|
static const uint64_t kMaxValidLength =
|
|
std::min<uint64_t>(std::numeric_limits<uint64_t>::max() >> 2,
|
|
std::numeric_limits<size_t>::max());
|
|
|
|
void CBORTokenizer::ReadNextToken() {
|
|
status_.pos += token_byte_length_;
|
|
status_.error = Error::OK;
|
|
envelope_header_ = EnvelopeHeader();
|
|
if (status_.pos >= bytes_.size()) {
|
|
token_tag_ = CBORTokenTag::DONE;
|
|
return;
|
|
}
|
|
const size_t remaining_bytes = bytes_.size() - status_.pos;
|
|
switch (bytes_[status_.pos]) {
|
|
case kStopByte:
|
|
SetToken(CBORTokenTag::STOP, 1);
|
|
return;
|
|
case kInitialByteIndefiniteLengthMap:
|
|
SetToken(CBORTokenTag::MAP_START, 1);
|
|
return;
|
|
case kInitialByteIndefiniteLengthArray:
|
|
SetToken(CBORTokenTag::ARRAY_START, 1);
|
|
return;
|
|
case kEncodedTrue:
|
|
SetToken(CBORTokenTag::TRUE_VALUE, 1);
|
|
return;
|
|
case kEncodedFalse:
|
|
SetToken(CBORTokenTag::FALSE_VALUE, 1);
|
|
return;
|
|
case kEncodedNull:
|
|
SetToken(CBORTokenTag::NULL_VALUE, 1);
|
|
return;
|
|
case kExpectedConversionToBase64Tag: { // BINARY
|
|
const size_t bytes_read = internals::ReadTokenStart(
|
|
bytes_.subspan(status_.pos + 1), &token_start_type_,
|
|
&token_start_internal_value_);
|
|
if (!bytes_read || token_start_type_ != MajorType::BYTE_STRING ||
|
|
token_start_internal_value_ > kMaxValidLength) {
|
|
SetError(Error::CBOR_INVALID_BINARY);
|
|
return;
|
|
}
|
|
const uint64_t token_byte_length = token_start_internal_value_ +
|
|
/* tag before token start: */ 1 +
|
|
/* token start: */ bytes_read;
|
|
if (token_byte_length > remaining_bytes) {
|
|
SetError(Error::CBOR_INVALID_BINARY);
|
|
return;
|
|
}
|
|
SetToken(CBORTokenTag::BINARY, static_cast<size_t>(token_byte_length));
|
|
return;
|
|
}
|
|
case kInitialByteForDouble: { // DOUBLE
|
|
if (kEncodedDoubleSize > remaining_bytes) {
|
|
SetError(Error::CBOR_INVALID_DOUBLE);
|
|
return;
|
|
}
|
|
SetToken(CBORTokenTag::DOUBLE, kEncodedDoubleSize);
|
|
return;
|
|
}
|
|
case kInitialByteForEnvelope: { // ENVELOPE
|
|
StatusOr<EnvelopeHeader> status_or_header =
|
|
EnvelopeHeader::Parse(bytes_.subspan(status_.pos));
|
|
if (!status_or_header.ok()) {
|
|
status_.pos += status_or_header.status().pos;
|
|
SetError(status_or_header.status().error);
|
|
return;
|
|
}
|
|
assert((*status_or_header).outer_size() <= remaining_bytes);
|
|
envelope_header_ = *status_or_header;
|
|
SetToken(CBORTokenTag::ENVELOPE, envelope_header_.outer_size());
|
|
return;
|
|
}
|
|
default: {
|
|
const size_t bytes_read = internals::ReadTokenStart(
|
|
bytes_.subspan(status_.pos), &token_start_type_,
|
|
&token_start_internal_value_);
|
|
switch (token_start_type_) {
|
|
case MajorType::UNSIGNED: // INT32.
|
|
// INT32 is a signed int32 (int32 makes sense for the
|
|
// inspector protocol, it's not a CBOR limitation), so we check
|
|
// against the signed max, so that the allowable values are
|
|
// 0, 1, 2, ... 2^31 - 1.
|
|
if (!bytes_read ||
|
|
static_cast<uint64_t>(std::numeric_limits<int32_t>::max()) <
|
|
static_cast<uint64_t>(token_start_internal_value_)) {
|
|
SetError(Error::CBOR_INVALID_INT32);
|
|
return;
|
|
}
|
|
SetToken(CBORTokenTag::INT32, bytes_read);
|
|
return;
|
|
case MajorType::NEGATIVE: { // INT32.
|
|
// INT32 is a signed int32 (int32 makes sense for the
|
|
// inspector protocol, it's not a CBOR limitation); in CBOR, the
|
|
// negative values for INT32 are represented as NEGATIVE, that is, -1
|
|
// INT32 is represented as 1 << 5 | 0 (major type 1, additional info
|
|
// value 0).
|
|
// The represented allowed values range is -1 to -2^31.
|
|
// They are mapped into the encoded range of 0 to 2^31-1.
|
|
// We check the payload in token_start_internal_value_ against
|
|
// that range (2^31-1 is also known as
|
|
// std::numeric_limits<int32_t>::max()).
|
|
if (!bytes_read ||
|
|
static_cast<uint64_t>(token_start_internal_value_) >
|
|
static_cast<uint64_t>(std::numeric_limits<int32_t>::max())) {
|
|
SetError(Error::CBOR_INVALID_INT32);
|
|
return;
|
|
}
|
|
SetToken(CBORTokenTag::INT32, bytes_read);
|
|
return;
|
|
}
|
|
case MajorType::STRING: { // STRING8.
|
|
if (!bytes_read || token_start_internal_value_ > kMaxValidLength) {
|
|
SetError(Error::CBOR_INVALID_STRING8);
|
|
return;
|
|
}
|
|
uint64_t token_byte_length = token_start_internal_value_ + bytes_read;
|
|
if (token_byte_length > remaining_bytes) {
|
|
SetError(Error::CBOR_INVALID_STRING8);
|
|
return;
|
|
}
|
|
SetToken(CBORTokenTag::STRING8,
|
|
static_cast<size_t>(token_byte_length));
|
|
return;
|
|
}
|
|
case MajorType::BYTE_STRING: { // STRING16.
|
|
// Length must be divisible by 2 since UTF16 is 2 bytes per
|
|
// character, hence the &1 check.
|
|
if (!bytes_read || token_start_internal_value_ > kMaxValidLength ||
|
|
token_start_internal_value_ & 1) {
|
|
SetError(Error::CBOR_INVALID_STRING16);
|
|
return;
|
|
}
|
|
uint64_t token_byte_length = token_start_internal_value_ + bytes_read;
|
|
if (token_byte_length > remaining_bytes) {
|
|
SetError(Error::CBOR_INVALID_STRING16);
|
|
return;
|
|
}
|
|
SetToken(CBORTokenTag::STRING16,
|
|
static_cast<size_t>(token_byte_length));
|
|
return;
|
|
}
|
|
case MajorType::ARRAY:
|
|
case MajorType::MAP:
|
|
case MajorType::TAG:
|
|
case MajorType::SIMPLE_VALUE:
|
|
SetError(Error::CBOR_UNSUPPORTED_VALUE);
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
void CBORTokenizer::SetToken(CBORTokenTag token_tag, size_t token_byte_length) {
|
|
token_tag_ = token_tag;
|
|
token_byte_length_ = token_byte_length;
|
|
}
|
|
|
|
void CBORTokenizer::SetError(Error error) {
|
|
token_tag_ = CBORTokenTag::ERROR_VALUE;
|
|
status_.error = error;
|
|
}
|
|
|
|
// =============================================================================
|
|
// cbor::ParseCBOR - for receiving streaming parser events for CBOR messages
|
|
// =============================================================================
|
|
|
|
namespace {
|
|
// When parsing CBOR, we limit recursion depth for objects and arrays
|
|
// to this constant.
|
|
static constexpr int kStackLimit = 300;
|
|
|
|
// Below are three parsing routines for CBOR, which cover enough
|
|
// to roundtrip JSON messages.
|
|
bool ParseMap(int32_t stack_depth,
|
|
CBORTokenizer* tokenizer,
|
|
ParserHandler* out);
|
|
bool ParseArray(int32_t stack_depth,
|
|
CBORTokenizer* tokenizer,
|
|
ParserHandler* out);
|
|
bool ParseValue(int32_t stack_depth,
|
|
CBORTokenizer* tokenizer,
|
|
ParserHandler* out);
|
|
|
|
void ParseUTF16String(CBORTokenizer* tokenizer, ParserHandler* out) {
|
|
std::vector<uint16_t> value;
|
|
span<uint8_t> rep = tokenizer->GetString16WireRep();
|
|
for (size_t ii = 0; ii < rep.size(); ii += 2)
|
|
value.push_back((rep[ii + 1] << 8) | rep[ii]);
|
|
out->HandleString16(span<uint16_t>(value.data(), value.size()));
|
|
tokenizer->Next();
|
|
}
|
|
|
|
bool ParseUTF8String(CBORTokenizer* tokenizer, ParserHandler* out) {
|
|
assert(tokenizer->TokenTag() == CBORTokenTag::STRING8);
|
|
out->HandleString8(tokenizer->GetString8());
|
|
tokenizer->Next();
|
|
return true;
|
|
}
|
|
|
|
bool ParseEnvelope(int32_t stack_depth,
|
|
CBORTokenizer* tokenizer,
|
|
ParserHandler* out) {
|
|
assert(tokenizer->TokenTag() == CBORTokenTag::ENVELOPE);
|
|
// Before we enter the envelope, we save the position that we
|
|
// expect to see after we're done parsing the envelope contents.
|
|
// This way we can compare and produce an error if the contents
|
|
// didn't fit exactly into the envelope length.
|
|
size_t pos_past_envelope =
|
|
tokenizer->Status().pos + tokenizer->GetEnvelopeHeader().outer_size();
|
|
tokenizer->EnterEnvelope();
|
|
switch (tokenizer->TokenTag()) {
|
|
case CBORTokenTag::ERROR_VALUE:
|
|
out->HandleError(tokenizer->Status());
|
|
return false;
|
|
case CBORTokenTag::MAP_START:
|
|
if (!ParseMap(stack_depth + 1, tokenizer, out))
|
|
return false;
|
|
break; // Continue to check pos_past_envelope below.
|
|
case CBORTokenTag::ARRAY_START:
|
|
if (!ParseArray(stack_depth + 1, tokenizer, out))
|
|
return false;
|
|
break; // Continue to check pos_past_envelope below.
|
|
default:
|
|
out->HandleError(Status{Error::CBOR_MAP_OR_ARRAY_EXPECTED_IN_ENVELOPE,
|
|
tokenizer->Status().pos});
|
|
return false;
|
|
}
|
|
// The contents of the envelope parsed OK, now check that we're at
|
|
// the expected position.
|
|
if (pos_past_envelope != tokenizer->Status().pos) {
|
|
out->HandleError(Status{Error::CBOR_ENVELOPE_CONTENTS_LENGTH_MISMATCH,
|
|
tokenizer->Status().pos});
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool ParseValue(int32_t stack_depth,
|
|
CBORTokenizer* tokenizer,
|
|
ParserHandler* out) {
|
|
if (stack_depth > kStackLimit) {
|
|
out->HandleError(
|
|
Status{Error::CBOR_STACK_LIMIT_EXCEEDED, tokenizer->Status().pos});
|
|
return false;
|
|
}
|
|
switch (tokenizer->TokenTag()) {
|
|
case CBORTokenTag::ERROR_VALUE:
|
|
out->HandleError(tokenizer->Status());
|
|
return false;
|
|
case CBORTokenTag::DONE:
|
|
out->HandleError(Status{Error::CBOR_UNEXPECTED_EOF_EXPECTED_VALUE,
|
|
tokenizer->Status().pos});
|
|
return false;
|
|
case CBORTokenTag::ENVELOPE:
|
|
return ParseEnvelope(stack_depth, tokenizer, out);
|
|
case CBORTokenTag::TRUE_VALUE:
|
|
out->HandleBool(true);
|
|
tokenizer->Next();
|
|
return true;
|
|
case CBORTokenTag::FALSE_VALUE:
|
|
out->HandleBool(false);
|
|
tokenizer->Next();
|
|
return true;
|
|
case CBORTokenTag::NULL_VALUE:
|
|
out->HandleNull();
|
|
tokenizer->Next();
|
|
return true;
|
|
case CBORTokenTag::INT32:
|
|
out->HandleInt32(tokenizer->GetInt32());
|
|
tokenizer->Next();
|
|
return true;
|
|
case CBORTokenTag::DOUBLE:
|
|
out->HandleDouble(tokenizer->GetDouble());
|
|
tokenizer->Next();
|
|
return true;
|
|
case CBORTokenTag::STRING8:
|
|
return ParseUTF8String(tokenizer, out);
|
|
case CBORTokenTag::STRING16:
|
|
ParseUTF16String(tokenizer, out);
|
|
return true;
|
|
case CBORTokenTag::BINARY: {
|
|
out->HandleBinary(tokenizer->GetBinary());
|
|
tokenizer->Next();
|
|
return true;
|
|
}
|
|
case CBORTokenTag::MAP_START:
|
|
return ParseMap(stack_depth + 1, tokenizer, out);
|
|
case CBORTokenTag::ARRAY_START:
|
|
return ParseArray(stack_depth + 1, tokenizer, out);
|
|
default:
|
|
out->HandleError(
|
|
Status{Error::CBOR_UNSUPPORTED_VALUE, tokenizer->Status().pos});
|
|
return false;
|
|
}
|
|
}
|
|
|
|
// |bytes| must start with the indefinite length array byte, so basically,
|
|
// ParseArray may only be called after an indefinite length array has been
|
|
// detected.
|
|
bool ParseArray(int32_t stack_depth,
|
|
CBORTokenizer* tokenizer,
|
|
ParserHandler* out) {
|
|
assert(tokenizer->TokenTag() == CBORTokenTag::ARRAY_START);
|
|
tokenizer->Next();
|
|
out->HandleArrayBegin();
|
|
while (tokenizer->TokenTag() != CBORTokenTag::STOP) {
|
|
if (tokenizer->TokenTag() == CBORTokenTag::DONE) {
|
|
out->HandleError(
|
|
Status{Error::CBOR_UNEXPECTED_EOF_IN_ARRAY, tokenizer->Status().pos});
|
|
return false;
|
|
}
|
|
if (tokenizer->TokenTag() == CBORTokenTag::ERROR_VALUE) {
|
|
out->HandleError(tokenizer->Status());
|
|
return false;
|
|
}
|
|
// Parse value.
|
|
if (!ParseValue(stack_depth, tokenizer, out))
|
|
return false;
|
|
}
|
|
out->HandleArrayEnd();
|
|
tokenizer->Next();
|
|
return true;
|
|
}
|
|
|
|
// |bytes| must start with the indefinite length array byte, so basically,
|
|
// ParseArray may only be called after an indefinite length array has been
|
|
// detected.
|
|
bool ParseMap(int32_t stack_depth,
|
|
CBORTokenizer* tokenizer,
|
|
ParserHandler* out) {
|
|
assert(tokenizer->TokenTag() == CBORTokenTag::MAP_START);
|
|
out->HandleMapBegin();
|
|
tokenizer->Next();
|
|
while (tokenizer->TokenTag() != CBORTokenTag::STOP) {
|
|
if (tokenizer->TokenTag() == CBORTokenTag::DONE) {
|
|
out->HandleError(
|
|
Status{Error::CBOR_UNEXPECTED_EOF_IN_MAP, tokenizer->Status().pos});
|
|
return false;
|
|
}
|
|
if (tokenizer->TokenTag() == CBORTokenTag::ERROR_VALUE) {
|
|
out->HandleError(tokenizer->Status());
|
|
return false;
|
|
}
|
|
// Parse key.
|
|
if (tokenizer->TokenTag() == CBORTokenTag::STRING8) {
|
|
if (!ParseUTF8String(tokenizer, out))
|
|
return false;
|
|
} else if (tokenizer->TokenTag() == CBORTokenTag::STRING16) {
|
|
ParseUTF16String(tokenizer, out);
|
|
} else {
|
|
out->HandleError(
|
|
Status{Error::CBOR_INVALID_MAP_KEY, tokenizer->Status().pos});
|
|
return false;
|
|
}
|
|
// Parse value.
|
|
if (!ParseValue(stack_depth, tokenizer, out))
|
|
return false;
|
|
}
|
|
out->HandleMapEnd();
|
|
tokenizer->Next();
|
|
return true;
|
|
}
|
|
} // namespace
|
|
|
|
void ParseCBOR(span<uint8_t> bytes, ParserHandler* out) {
|
|
if (bytes.empty()) {
|
|
out->HandleError(Status{Error::CBOR_UNEXPECTED_EOF_IN_ENVELOPE, 0});
|
|
return;
|
|
}
|
|
CBORTokenizer tokenizer(bytes);
|
|
if (tokenizer.TokenTag() == CBORTokenTag::ERROR_VALUE) {
|
|
out->HandleError(tokenizer.Status());
|
|
return;
|
|
}
|
|
if (!ParseValue(/*stack_depth=*/0, &tokenizer, out))
|
|
return;
|
|
if (tokenizer.TokenTag() == CBORTokenTag::DONE)
|
|
return;
|
|
if (tokenizer.TokenTag() == CBORTokenTag::ERROR_VALUE) {
|
|
out->HandleError(tokenizer.Status());
|
|
return;
|
|
}
|
|
out->HandleError(Status{Error::CBOR_TRAILING_JUNK, tokenizer.Status().pos});
|
|
}
|
|
|
|
// =============================================================================
|
|
// cbor::AppendString8EntryToMap - for limited in-place editing of messages
|
|
// =============================================================================
|
|
|
|
Status AppendString8EntryToCBORMap(span<uint8_t> string8_key,
|
|
span<uint8_t> string8_value,
|
|
std::vector<uint8_t>* cbor) {
|
|
span<uint8_t> bytes(cbor->data(), cbor->size());
|
|
CBORTokenizer tokenizer(bytes);
|
|
if (tokenizer.TokenTag() == CBORTokenTag::ERROR_VALUE)
|
|
return tokenizer.Status();
|
|
if (tokenizer.TokenTag() != CBORTokenTag::ENVELOPE)
|
|
return Status(Error::CBOR_INVALID_ENVELOPE, 0);
|
|
EnvelopeHeader env_header = tokenizer.GetEnvelopeHeader();
|
|
size_t old_size = cbor->size();
|
|
if (old_size != env_header.outer_size())
|
|
return Status(Error::CBOR_INVALID_ENVELOPE, 0);
|
|
assert(env_header.content_size() > 0);
|
|
if (tokenizer.GetEnvelopeContents()[0] != EncodeIndefiniteLengthMapStart())
|
|
return Status(Error::CBOR_MAP_START_EXPECTED, env_header.header_size());
|
|
if (bytes[bytes.size() - 1] != EncodeStop())
|
|
return Status(Error::CBOR_MAP_STOP_EXPECTED, cbor->size() - 1);
|
|
// We generally accept envelope headers with size specified in all possible
|
|
// widths, but when it comes to modifying, we only support the fixed 4 byte
|
|
// widths that we produce.
|
|
const size_t byte_string_pos = bytes[1] == kCBOREnvelopeTag ? 2 : 1;
|
|
if (bytes[byte_string_pos] != kInitialByteFor32BitLengthByteString)
|
|
return Status(Error::CBOR_INVALID_ENVELOPE, byte_string_pos);
|
|
cbor->pop_back();
|
|
EncodeString8(string8_key, cbor);
|
|
EncodeString8(string8_value, cbor);
|
|
cbor->push_back(EncodeStop());
|
|
size_t new_envelope_size =
|
|
env_header.content_size() + (cbor->size() - old_size);
|
|
if (new_envelope_size > std::numeric_limits<uint32_t>::max())
|
|
return Status(Error::CBOR_ENVELOPE_SIZE_LIMIT_EXCEEDED, 0);
|
|
std::vector<uint8_t>::iterator out =
|
|
cbor->begin() + env_header.header_size() - sizeof(int32_t);
|
|
*(out++) = (new_envelope_size >> 24) & 0xff;
|
|
*(out++) = (new_envelope_size >> 16) & 0xff;
|
|
*(out++) = (new_envelope_size >> 8) & 0xff;
|
|
*(out) = new_envelope_size & 0xff;
|
|
return Status();
|
|
}
|
|
} // namespace cbor
|
|
} // namespace crdtp
|