2017-10-24 22:27:43 +02:00
|
|
|
/*
|
2018-04-17 16:16:30 +02:00
|
|
|
* Common and shared functions used by multiple modules in the Mbed TLS
|
|
|
|
* library.
|
2017-10-24 22:27:43 +02:00
|
|
|
*
|
2020-08-07 13:07:28 +02:00
|
|
|
* Copyright The Mbed TLS Contributors
|
2017-10-24 22:27:43 +02:00
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
|
|
* not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2018-08-16 22:42:09 +02:00
|
|
|
/*
|
2018-09-05 16:22:22 +02:00
|
|
|
* Ensure gmtime_r is available even with -std=c99; must be defined before
|
2023-03-07 13:51:11 +01:00
|
|
|
* mbedtls_config.h, which pulls in glibc's features.h. Harmless on other platforms
|
|
|
|
* except OpenBSD, where it stops us accessing explicit_bzero.
|
2018-08-16 22:42:09 +02:00
|
|
|
*/
|
2023-03-07 13:51:11 +01:00
|
|
|
#if !defined(_POSIX_C_SOURCE) && !defined(__OpenBSD__)
|
2018-08-16 22:42:09 +02:00
|
|
|
#define _POSIX_C_SOURCE 200112L
|
2018-09-05 13:27:32 +02:00
|
|
|
#endif
|
2018-08-16 22:42:09 +02:00
|
|
|
|
2023-02-25 18:17:15 +01:00
|
|
|
#if !defined(_GNU_SOURCE)
|
2023-02-25 16:19:52 +01:00
|
|
|
/* Clang requires this to get support for explicit_bzero */
|
|
|
|
#define _GNU_SOURCE
|
|
|
|
#endif
|
|
|
|
|
2020-06-03 01:43:33 +02:00
|
|
|
#include "common.h"
|
2017-10-25 10:51:14 +02:00
|
|
|
|
2018-04-17 16:51:09 +02:00
|
|
|
#include "mbedtls/platform_util.h"
|
2019-01-31 14:20:20 +01:00
|
|
|
#include "mbedtls/platform.h"
|
2018-08-16 22:42:09 +02:00
|
|
|
#include "mbedtls/threading.h"
|
2017-10-24 22:27:43 +02:00
|
|
|
|
|
|
|
#include <stddef.h>
|
2023-02-24 18:42:43 +01:00
|
|
|
|
|
|
|
#ifndef __STDC_WANT_LIB_EXT1__
|
2023-02-24 20:00:38 +01:00
|
|
|
#define __STDC_WANT_LIB_EXT1__ 1 /* Ask for the C11 gmtime_s() and memset_s() if available */
|
2023-02-24 18:42:43 +01:00
|
|
|
#endif
|
2017-10-26 23:43:41 +02:00
|
|
|
#include <string.h>
|
2017-10-24 22:27:43 +02:00
|
|
|
|
2023-02-24 18:42:43 +01:00
|
|
|
#if defined(_WIN32)
|
2023-02-25 18:17:35 +01:00
|
|
|
#include <windows.h>
|
2023-02-24 18:42:43 +01:00
|
|
|
#endif
|
|
|
|
|
|
|
|
// Detect platforms known to support explicit_bzero()
|
2023-03-03 18:06:09 +01:00
|
|
|
#if defined(__GLIBC__) && (__GLIBC__ >= 2) && (__GLIBC_MINOR__ >= 25)
|
2023-02-24 18:42:43 +01:00
|
|
|
#define MBEDTLS_PLATFORM_HAS_EXPLICIT_BZERO 1
|
2023-03-07 13:51:11 +01:00
|
|
|
#elif (defined(__FreeBSD__) && (__FreeBSD_version >= 1100037)) || defined(__OpenBSD__)
|
2023-02-24 18:42:43 +01:00
|
|
|
#define MBEDTLS_PLATFORM_HAS_EXPLICIT_BZERO 1
|
|
|
|
#endif
|
|
|
|
|
2018-04-17 16:16:30 +02:00
|
|
|
#if !defined(MBEDTLS_PLATFORM_ZEROIZE_ALT)
|
2023-03-16 10:53:46 +01:00
|
|
|
|
|
|
|
#undef HAVE_MEMORY_SANITIZER
|
|
|
|
#if defined(__has_feature)
|
|
|
|
#if __has_feature(memory_sanitizer)
|
|
|
|
#include <sanitizer/msan_interface.h>
|
|
|
|
#define HAVE_MEMORY_SANITIZER
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
2017-10-26 23:43:41 +02:00
|
|
|
/*
|
2023-02-24 18:43:00 +01:00
|
|
|
* Where possible, we try to detect the presence of a platform-provided
|
|
|
|
* secure memset, such as explicit_bzero(), that is safe against being optimized
|
|
|
|
* out, and use that.
|
|
|
|
*
|
|
|
|
* For other platforms, we provide an implementation that aims not to be
|
|
|
|
* optimized out by the compiler.
|
2017-10-26 23:43:41 +02:00
|
|
|
*
|
2018-04-17 16:16:30 +02:00
|
|
|
* This implementation for mbedtls_platform_zeroize() was inspired from Colin
|
|
|
|
* Percival's blog article at:
|
2018-03-08 21:46:39 +01:00
|
|
|
*
|
|
|
|
* http://www.daemonology.net/blog/2014-09-04-how-to-zero-a-buffer.html
|
|
|
|
*
|
|
|
|
* It uses a volatile function pointer to the standard memset(). Because the
|
|
|
|
* pointer is volatile the compiler expects it to change at
|
|
|
|
* any time and will not optimize out the call that could potentially perform
|
|
|
|
* other operations on the input buffer instead of just setting it to 0.
|
|
|
|
* Nevertheless, as pointed out by davidtgoldblatt on Hacker News
|
|
|
|
* (refer to http://www.daemonology.net/blog/2014-09-05-erratum.html for
|
|
|
|
* details), optimizations of the following form are still possible:
|
2017-10-26 23:43:41 +02:00
|
|
|
*
|
2023-02-24 19:07:05 +01:00
|
|
|
* if (memset_func != memset)
|
2023-02-24 18:43:00 +01:00
|
|
|
* memset_func(buf, 0, len);
|
2017-10-26 23:43:41 +02:00
|
|
|
*
|
2018-04-17 16:16:30 +02:00
|
|
|
* Note that it is extremely difficult to guarantee that
|
2023-02-24 18:43:00 +01:00
|
|
|
* the memset() call will not be optimized out by aggressive compilers
|
2018-04-17 16:16:30 +02:00
|
|
|
* in a portable way. For this reason, Mbed TLS also provides the configuration
|
|
|
|
* option MBEDTLS_PLATFORM_ZEROIZE_ALT, which allows users to configure
|
|
|
|
* mbedtls_platform_zeroize() to use a suitable implementation for their
|
|
|
|
* platform and needs.
|
2017-10-26 23:43:41 +02:00
|
|
|
*/
|
2023-07-14 16:56:33 +02:00
|
|
|
#if !defined(MBEDTLS_PLATFORM_HAS_EXPLICIT_BZERO) && !(defined(__STDC_LIB_EXT1__) && \
|
|
|
|
!defined(__IAR_SYSTEMS_ICC__)) \
|
2023-02-25 16:19:52 +01:00
|
|
|
&& !defined(_WIN32)
|
2023-01-11 14:50:10 +01:00
|
|
|
static void *(*const volatile memset_func)(void *, int, size_t) = memset;
|
2023-02-25 16:19:52 +01:00
|
|
|
#endif
|
2017-10-26 23:43:41 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
void mbedtls_platform_zeroize(void *buf, size_t len)
|
2017-10-24 22:27:43 +02:00
|
|
|
{
|
2023-01-11 14:50:10 +01:00
|
|
|
MBEDTLS_INTERNAL_VALIDATE(len == 0 || buf != NULL);
|
2019-08-15 12:59:08 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (len > 0) {
|
2023-02-24 18:42:43 +01:00
|
|
|
#if defined(MBEDTLS_PLATFORM_HAS_EXPLICIT_BZERO)
|
|
|
|
explicit_bzero(buf, len);
|
2023-03-16 10:53:46 +01:00
|
|
|
#if defined(HAVE_MEMORY_SANITIZER)
|
|
|
|
/* You'd think that Msan would recognize explicit_bzero() as
|
|
|
|
* equivalent to bzero(), but it actually doesn't on several
|
|
|
|
* platforms, including Linux (Ubuntu 20.04).
|
|
|
|
* https://github.com/google/sanitizers/issues/1507
|
|
|
|
* https://github.com/openssh/openssh-portable/commit/74433a19bb6f4cef607680fa4d1d7d81ca3826aa
|
|
|
|
*/
|
|
|
|
__msan_unpoison(buf, len);
|
|
|
|
#endif
|
2023-07-14 16:56:33 +02:00
|
|
|
#elif defined(__STDC_LIB_EXT1__) && !defined(__IAR_SYSTEMS_ICC__)
|
2023-02-24 18:42:43 +01:00
|
|
|
memset_s(buf, len, 0, len);
|
|
|
|
#elif defined(_WIN32)
|
|
|
|
SecureZeroMemory(buf, len);
|
|
|
|
#else
|
2023-01-11 14:50:10 +01:00
|
|
|
memset_func(buf, 0, len);
|
2023-08-31 16:19:38 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(__GNUC__)
|
2023-09-01 12:15:28 +02:00
|
|
|
/* For clang and recent gcc, pretend that we have some assembly that reads the
|
2023-08-31 16:19:38 +02:00
|
|
|
* zero'd memory as an additional protection against being optimised away. */
|
2023-09-01 12:15:28 +02:00
|
|
|
#if defined(__clang__) || (__GNUC__ >= 10)
|
2023-09-01 11:14:46 +02:00
|
|
|
#if defined(__clang__)
|
2023-08-31 16:19:38 +02:00
|
|
|
#pragma clang diagnostic push
|
|
|
|
#pragma clang diagnostic ignored "-Wvla"
|
2023-09-01 11:14:46 +02:00
|
|
|
#elif defined(MBEDTLS_COMPILER_IS_GCC)
|
|
|
|
#pragma GCC diagnostic push
|
|
|
|
#pragma GCC diagnostic ignored "-Wvla"
|
|
|
|
#endif
|
2023-09-01 12:00:58 +02:00
|
|
|
asm volatile ("" : : "m" (*(char (*)[len]) buf) :);
|
2023-09-01 11:14:46 +02:00
|
|
|
#if defined(__clang__)
|
2023-08-31 16:19:38 +02:00
|
|
|
#pragma clang diagnostic pop
|
2023-09-01 11:14:46 +02:00
|
|
|
#elif defined(MBEDTLS_COMPILER_IS_GCC)
|
|
|
|
#pragma GCC diagnostic pop
|
|
|
|
#endif
|
2023-09-01 12:15:28 +02:00
|
|
|
#endif
|
2023-02-24 18:42:43 +01:00
|
|
|
#endif
|
2023-01-11 14:50:10 +01:00
|
|
|
}
|
2017-10-24 22:27:43 +02:00
|
|
|
}
|
2018-04-17 16:16:30 +02:00
|
|
|
#endif /* MBEDTLS_PLATFORM_ZEROIZE_ALT */
|
2018-08-16 22:42:09 +02:00
|
|
|
|
2023-07-17 16:17:40 +02:00
|
|
|
void mbedtls_zeroize_and_free(void *buf, size_t len)
|
|
|
|
{
|
|
|
|
if (buf != NULL) {
|
|
|
|
mbedtls_platform_zeroize(buf, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
mbedtls_free(buf);
|
|
|
|
}
|
|
|
|
|
2018-09-05 16:06:19 +02:00
|
|
|
#if defined(MBEDTLS_HAVE_TIME_DATE) && !defined(MBEDTLS_PLATFORM_GMTIME_R_ALT)
|
2018-08-16 22:42:09 +02:00
|
|
|
#include <time.h>
|
2018-09-05 14:50:22 +02:00
|
|
|
#if !defined(_WIN32) && (defined(unix) || \
|
2018-09-05 13:01:57 +02:00
|
|
|
defined(__unix) || defined(__unix__) || (defined(__APPLE__) && \
|
|
|
|
defined(__MACH__)))
|
2018-08-16 22:42:09 +02:00
|
|
|
#include <unistd.h>
|
2018-09-06 12:30:57 +02:00
|
|
|
#endif /* !_WIN32 && (unix || __unix || __unix__ ||
|
|
|
|
* (__APPLE__ && __MACH__)) */
|
2018-09-06 10:06:33 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
#if !((defined(_POSIX_VERSION) && _POSIX_VERSION >= 200809L) || \
|
|
|
|
(defined(_POSIX_THREAD_SAFE_FUNCTIONS) && \
|
|
|
|
_POSIX_THREAD_SAFE_FUNCTIONS >= 200112L))
|
2018-09-05 12:43:57 +02:00
|
|
|
/*
|
|
|
|
* This is a convenience shorthand macro to avoid checking the long
|
|
|
|
* preprocessor conditions above. Ideally, we could expose this macro in
|
2018-09-05 17:25:50 +02:00
|
|
|
* platform_util.h and simply use it in platform_util.c, threading.c and
|
2018-09-05 12:43:57 +02:00
|
|
|
* threading.h. However, this macro is not part of the Mbed TLS public API, so
|
2018-09-05 12:52:07 +02:00
|
|
|
* we keep it private by only defining it in this file
|
2018-09-05 12:43:57 +02:00
|
|
|
*/
|
2023-01-11 14:50:10 +01:00
|
|
|
#if !(defined(_WIN32) && !defined(EFIX64) && !defined(EFI32)) || \
|
|
|
|
(defined(__MINGW32__) && !defined(__MINGW64_VERSION_MAJOR))
|
2018-08-16 22:42:09 +02:00
|
|
|
#define PLATFORM_UTIL_USE_GMTIME
|
2022-05-06 13:59:54 +02:00
|
|
|
#endif
|
2018-09-06 13:09:56 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
#endif /* !( ( defined(_POSIX_VERSION) && _POSIX_VERSION >= 200809L ) || \
|
|
|
|
( defined(_POSIX_THREAD_SAFE_FUNCTIONS ) && \
|
2020-11-12 18:10:36 +01:00
|
|
|
_POSIX_THREAD_SAFE_FUNCTIONS >= 200112L ) ) */
|
2018-08-16 22:42:09 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
struct tm *mbedtls_platform_gmtime_r(const mbedtls_time_t *tt,
|
|
|
|
struct tm *tm_buf)
|
2018-08-16 22:42:09 +02:00
|
|
|
{
|
2021-03-09 00:29:26 +01:00
|
|
|
#if defined(_WIN32) && !defined(PLATFORM_UTIL_USE_GMTIME)
|
2022-05-06 13:58:00 +02:00
|
|
|
#if defined(__STDC_LIB_EXT1__)
|
2023-01-11 14:50:10 +01:00
|
|
|
return (gmtime_s(tt, tm_buf) == 0) ? NULL : tm_buf;
|
2022-05-06 13:58:00 +02:00
|
|
|
#else
|
|
|
|
/* MSVC and mingw64 argument order and return value are inconsistent with the C11 standard */
|
2023-01-11 14:50:10 +01:00
|
|
|
return (gmtime_s(tm_buf, tt) == 0) ? tm_buf : NULL;
|
2022-05-06 13:58:00 +02:00
|
|
|
#endif
|
2018-08-16 22:42:09 +02:00
|
|
|
#elif !defined(PLATFORM_UTIL_USE_GMTIME)
|
2023-01-11 14:50:10 +01:00
|
|
|
return gmtime_r(tt, tm_buf);
|
2018-08-16 22:42:09 +02:00
|
|
|
#else
|
|
|
|
struct tm *lt;
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_THREADING_C)
|
2023-01-11 14:50:10 +01:00
|
|
|
if (mbedtls_mutex_lock(&mbedtls_threading_gmtime_mutex) != 0) {
|
|
|
|
return NULL;
|
|
|
|
}
|
2018-08-16 22:42:09 +02:00
|
|
|
#endif /* MBEDTLS_THREADING_C */
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
lt = gmtime(tt);
|
2018-08-16 22:42:09 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (lt != NULL) {
|
|
|
|
memcpy(tm_buf, lt, sizeof(struct tm));
|
2018-08-16 22:42:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_THREADING_C)
|
2023-01-11 14:50:10 +01:00
|
|
|
if (mbedtls_mutex_unlock(&mbedtls_threading_gmtime_mutex) != 0) {
|
|
|
|
return NULL;
|
|
|
|
}
|
2018-08-16 22:42:09 +02:00
|
|
|
#endif /* MBEDTLS_THREADING_C */
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
return (lt == NULL) ? NULL : tm_buf;
|
2018-08-21 20:33:02 +02:00
|
|
|
#endif /* _WIN32 && !EFIX64 && !EFI32 */
|
2018-08-16 22:42:09 +02:00
|
|
|
}
|
2018-09-05 16:06:19 +02:00
|
|
|
#endif /* MBEDTLS_HAVE_TIME_DATE && MBEDTLS_PLATFORM_GMTIME_R_ALT */
|
2021-07-13 12:23:12 +02:00
|
|
|
|
|
|
|
#if defined(MBEDTLS_TEST_HOOKS)
|
2023-01-11 14:50:10 +01:00
|
|
|
void (*mbedtls_test_hook_test_fail)(const char *, int, const char *);
|
2021-07-13 12:23:12 +02:00
|
|
|
#endif /* MBEDTLS_TEST_HOOKS */
|
|
|
|
|
2022-11-23 15:50:03 +01:00
|
|
|
/*
|
2022-11-24 21:07:39 +01:00
|
|
|
* Provide external definitions of some inline functions so that the compiler
|
|
|
|
* has the option to not inline them
|
2022-11-23 15:50:03 +01:00
|
|
|
*/
|
2023-01-11 14:50:10 +01:00
|
|
|
extern inline void mbedtls_xor(unsigned char *r,
|
|
|
|
const unsigned char *a,
|
|
|
|
const unsigned char *b,
|
|
|
|
size_t n);
|
2022-11-24 21:07:39 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
extern inline uint16_t mbedtls_get_unaligned_uint16(const void *p);
|
2022-11-28 15:44:05 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
extern inline void mbedtls_put_unaligned_uint16(void *p, uint16_t x);
|
2022-11-28 15:44:05 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
extern inline uint32_t mbedtls_get_unaligned_uint32(const void *p);
|
2022-11-24 21:07:39 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
extern inline void mbedtls_put_unaligned_uint32(void *p, uint32_t x);
|
2022-11-28 15:44:05 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
extern inline uint64_t mbedtls_get_unaligned_uint64(const void *p);
|
2022-11-28 15:44:05 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
extern inline void mbedtls_put_unaligned_uint64(void *p, uint64_t x);
|
2022-12-15 10:54:47 +01:00
|
|
|
|
|
|
|
#if defined(MBEDTLS_HAVE_TIME) && !defined(MBEDTLS_PLATFORM_MS_TIME_ALT)
|
|
|
|
|
|
|
|
#include <time.h>
|
2023-02-22 08:01:05 +01:00
|
|
|
#if !defined(_WIN32) && \
|
|
|
|
(defined(unix) || defined(__unix) || defined(__unix__) || \
|
|
|
|
(defined(__APPLE__) && defined(__MACH__)))
|
2022-12-15 10:54:47 +01:00
|
|
|
#include <unistd.h>
|
2023-02-22 08:01:05 +01:00
|
|
|
#endif /* !_WIN32 && (unix || __unix || __unix__ || (__APPLE__ && __MACH__)) */
|
2022-12-15 10:54:47 +01:00
|
|
|
#if (defined(_POSIX_VERSION) && _POSIX_VERSION >= 199309L)
|
|
|
|
mbedtls_ms_time_t mbedtls_ms_time(void)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
struct timespec tv;
|
|
|
|
mbedtls_ms_time_t current_ms;
|
|
|
|
|
2023-04-20 11:11:32 +02:00
|
|
|
#if defined(__linux__)
|
|
|
|
ret = clock_gettime(CLOCK_BOOTTIME, &tv);
|
|
|
|
#else
|
2023-03-15 11:58:51 +01:00
|
|
|
ret = clock_gettime(CLOCK_MONOTONIC, &tv);
|
2023-04-20 11:11:32 +02:00
|
|
|
#endif
|
2022-12-15 10:54:47 +01:00
|
|
|
if (ret) {
|
2023-02-23 04:25:36 +01:00
|
|
|
return time(NULL) * 1000;
|
2022-12-15 10:54:47 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
current_ms = tv.tv_sec;
|
|
|
|
|
|
|
|
return current_ms*1000 + tv.tv_nsec / 1000000;
|
|
|
|
}
|
|
|
|
#elif defined(_WIN32) || defined(WIN32) || defined(__CYGWIN__) || \
|
|
|
|
defined(__MINGW32__) || defined(_WIN64)
|
|
|
|
#include <windows.h>
|
|
|
|
mbedtls_ms_time_t mbedtls_ms_time(void)
|
|
|
|
{
|
2023-01-30 06:27:54 +01:00
|
|
|
FILETIME ct;
|
|
|
|
mbedtls_ms_time_t current_ms;
|
2022-12-15 10:54:47 +01:00
|
|
|
|
2023-01-30 06:27:54 +01:00
|
|
|
GetSystemTimeAsFileTime(&ct);
|
|
|
|
current_ms = ((mbedtls_ms_time_t) ct.dwLowDateTime +
|
2023-03-16 04:23:19 +01:00
|
|
|
((mbedtls_ms_time_t) (ct.dwHighDateTime) << 32LL))/10000;
|
2023-01-30 06:27:54 +01:00
|
|
|
return current_ms;
|
2022-12-15 10:54:47 +01:00
|
|
|
}
|
|
|
|
#else
|
|
|
|
#error "No mbedtls_ms_time available"
|
|
|
|
#endif
|
|
|
|
#endif /* MBEDTLS_HAVE_TIME && !MBEDTLS_PLATFORM_MS_TIME_ALT */
|