blob: 691af71003ee97929e213ece473f3659199da6d5 [file] [log] [blame]
Andres Amaya Garcia614d9c02017-10-24 21:27:43 +01001/*
Andres Amaya Garcia904e1ef2018-04-17 09:16:30 -05002 * Common and shared functions used by multiple modules in the Mbed TLS
3 * library.
Andres Amaya Garcia614d9c02017-10-24 21:27:43 +01004 *
Andres Amaya Garcia757cd722018-03-08 21:25:25 +00005 * Copyright (C) 2018, Arm Limited, All Rights Reserved
Andres Amaya Garcia614d9c02017-10-24 21:27:43 +01006 * SPDX-License-Identifier: Apache-2.0
7 *
8 * Licensed under the Apache License, Version 2.0 (the "License"); you may
9 * not use this file except in compliance with the License.
10 * You may obtain a copy of the License at
11 *
12 * http://www.apache.org/licenses/LICENSE-2.0
13 *
14 * Unless required by applicable law or agreed to in writing, software
15 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 * See the License for the specific language governing permissions and
18 * limitations under the License.
19 *
Andres Amaya Garcia757cd722018-03-08 21:25:25 +000020 * This file is part of Mbed TLS (https://tls.mbed.org)
Andres Amaya Garcia614d9c02017-10-24 21:27:43 +010021 */
22
Andres Amaya Garcia1abb3682018-08-16 21:42:09 +010023/*
Hanno Becker48a816f2018-09-05 15:22:22 +010024 * Ensure gmtime_r is available even with -std=c99; must be defined before
Andres Amaya Garcia1abb3682018-08-16 21:42:09 +010025 * config.h, which pulls in glibc's features.h. Harmless on other platforms.
26 */
Andres Amaya Garcia94b540a2018-09-05 12:27:32 +010027#if !defined(_POSIX_C_SOURCE)
Andres Amaya Garcia1abb3682018-08-16 21:42:09 +010028#define _POSIX_C_SOURCE 200112L
Andres Amaya Garcia94b540a2018-09-05 12:27:32 +010029#endif
Andres Amaya Garcia1abb3682018-08-16 21:42:09 +010030
Andres Amaya Garciab1262a32017-10-25 09:51:14 +010031#if !defined(MBEDTLS_CONFIG_FILE)
32#include "mbedtls/config.h"
33#else
34#include MBEDTLS_CONFIG_FILE
35#endif
36
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -050037#include "mbedtls/platform_util.h"
Simon Butcherb4868032018-12-06 17:36:34 +000038#include "mbedtls/platform.h"
Andres Amaya Garcia1abb3682018-08-16 21:42:09 +010039#include "mbedtls/threading.h"
Andres Amaya Garcia614d9c02017-10-24 21:27:43 +010040
Jarno Lamsae29e8a42019-10-03 11:06:35 +030041#if defined(MBEDTLS_ENTROPY_HARDWARE_ALT)
42#include "mbedtls/entropy_poll.h"
43#endif
44
Andres Amaya Garcia614d9c02017-10-24 21:27:43 +010045#include <stddef.h>
Andres Amaya Garciaecd18912017-10-26 22:43:41 +010046#include <string.h>
Andres Amaya Garcia614d9c02017-10-24 21:27:43 +010047
Andres Amaya Garcia904e1ef2018-04-17 09:16:30 -050048#if !defined(MBEDTLS_PLATFORM_ZEROIZE_ALT)
Andres Amaya Garciaecd18912017-10-26 22:43:41 +010049/*
50 * This implementation should never be optimized out by the compiler
51 *
Andres Amaya Garcia904e1ef2018-04-17 09:16:30 -050052 * This implementation for mbedtls_platform_zeroize() was inspired from Colin
53 * Percival's blog article at:
Andres Amaya Garcia1e8ea5f2018-03-08 20:46:39 +000054 *
55 * http://www.daemonology.net/blog/2014-09-04-how-to-zero-a-buffer.html
56 *
57 * It uses a volatile function pointer to the standard memset(). Because the
58 * pointer is volatile the compiler expects it to change at
59 * any time and will not optimize out the call that could potentially perform
60 * other operations on the input buffer instead of just setting it to 0.
61 * Nevertheless, as pointed out by davidtgoldblatt on Hacker News
62 * (refer to http://www.daemonology.net/blog/2014-09-05-erratum.html for
63 * details), optimizations of the following form are still possible:
Andres Amaya Garciaecd18912017-10-26 22:43:41 +010064 *
65 * if( memset_func != memset )
66 * memset_func( buf, 0, len );
67 *
Andres Amaya Garcia904e1ef2018-04-17 09:16:30 -050068 * Note that it is extremely difficult to guarantee that
69 * mbedtls_platform_zeroize() will not be optimized out by aggressive compilers
70 * in a portable way. For this reason, Mbed TLS also provides the configuration
71 * option MBEDTLS_PLATFORM_ZEROIZE_ALT, which allows users to configure
72 * mbedtls_platform_zeroize() to use a suitable implementation for their
73 * platform and needs.
Andres Amaya Garciaecd18912017-10-26 22:43:41 +010074 */
Manuel Pégourié-Gonnard14f33e72019-10-02 16:23:52 +020075void *mbedtls_platform_memset( void *, int, size_t );
76static void * (* const volatile memset_func)( void *, int, size_t ) = mbedtls_platform_memset;
Andres Amaya Garciaecd18912017-10-26 22:43:41 +010077
Andres Amaya Garcia904e1ef2018-04-17 09:16:30 -050078void mbedtls_platform_zeroize( void *buf, size_t len )
Andres Amaya Garcia614d9c02017-10-24 21:27:43 +010079{
Vikas Katariya0c344992019-08-15 14:24:20 +010080 MBEDTLS_INTERNAL_VALIDATE( len == 0 || buf != NULL );
81
82 if( len > 0 )
83 memset_func( buf, 0, len );
Andres Amaya Garcia614d9c02017-10-24 21:27:43 +010084}
Andres Amaya Garcia904e1ef2018-04-17 09:16:30 -050085#endif /* MBEDTLS_PLATFORM_ZEROIZE_ALT */
Andres Amaya Garcia1abb3682018-08-16 21:42:09 +010086
Manuel Pégourié-Gonnard51f65e42019-10-02 16:01:14 +020087void *mbedtls_platform_memset( void *ptr, int value, size_t num )
Jarno Lamsa07363252019-09-27 16:20:11 +030088{
89 /* Randomize start offset. */
Jarno Lamsa0ff71092019-10-02 08:18:29 +030090 size_t start_offset = (size_t) mbedtls_platform_random_in_range( num );
Jarno Lamsa07363252019-09-27 16:20:11 +030091 /* Randomize data */
Jarno Lamsaa1e50542019-10-02 12:44:36 +030092 uint32_t data = mbedtls_platform_random_in_range( 256 );
Jarno Lamsa07363252019-09-27 16:20:11 +030093
94 /* Perform a pair of memset operations from random locations with
95 * random data */
Jarno Lamsa32db9382019-10-02 08:25:57 +030096 memset( (void *) ( (unsigned char *) ptr + start_offset ), data,
Jarno Lamsa0ff71092019-10-02 08:18:29 +030097 ( num - start_offset ) );
98 memset( (void *) ptr, data, start_offset );
Jarno Lamsa07363252019-09-27 16:20:11 +030099
100 /* Perform the original memset */
Manuel Pégourié-Gonnard51f65e42019-10-02 16:01:14 +0200101 return( memset( ptr, value, num ) );
Jarno Lamsa07363252019-09-27 16:20:11 +0300102}
103
Manuel Pégourié-Gonnard51f65e42019-10-02 16:01:14 +0200104void *mbedtls_platform_memcpy( void *dst, const void *src, size_t num )
Jarno Lamsa07363252019-09-27 16:20:11 +0300105{
106 /* Randomize start offset. */
Jarno Lamsa0ff71092019-10-02 08:18:29 +0300107 size_t start_offset = (size_t) mbedtls_platform_random_in_range( num );
Jarno Lamsa07363252019-09-27 16:20:11 +0300108 /* Randomize initial data to prevent leakage while copying */
Jarno Lamsaa1e50542019-10-02 12:44:36 +0300109 uint32_t data = mbedtls_platform_random_in_range( 256 );
Jarno Lamsa07363252019-09-27 16:20:11 +0300110
Jarno Lamsa0ff71092019-10-02 08:18:29 +0300111 memset( (void *) dst, data, num );
112 memcpy( (void *) ( (unsigned char *) dst + start_offset ),
113 (void *) ( (unsigned char *) src + start_offset ),
114 ( num - start_offset ) );
Manuel Pégourié-Gonnard51f65e42019-10-02 16:01:14 +0200115 return( memcpy( (void *) dst, (void *) src, start_offset ) );
Jarno Lamsa07363252019-09-27 16:20:11 +0300116}
117
118int mbedtls_platform_memcmp( const void *buf1, const void *buf2, size_t num )
119{
Jarno Lamsa7cb90272019-10-02 08:32:51 +0300120 volatile const unsigned char *A = (volatile const unsigned char *) buf1;
121 volatile const unsigned char *B = (volatile const unsigned char *) buf2;
122 volatile unsigned char diff = 0;
Jarno Lamsa07363252019-09-27 16:20:11 +0300123
124 size_t i = num;
125
Jarno Lamsa0ff71092019-10-02 08:18:29 +0300126 size_t start_offset = (size_t) mbedtls_platform_random_in_range( num );
Jarno Lamsa07363252019-09-27 16:20:11 +0300127
Jarno Lamsa0ff71092019-10-02 08:18:29 +0300128 for( i = start_offset; i < num; i++ )
Jarno Lamsa07363252019-09-27 16:20:11 +0300129 {
Jarno Lamsa7cb90272019-10-02 08:32:51 +0300130 unsigned char x = A[i], y = B[i];
131 diff |= x ^ y;
Jarno Lamsa07363252019-09-27 16:20:11 +0300132 }
133
Jarno Lamsa0ff71092019-10-02 08:18:29 +0300134 for( i = 0; i < start_offset; i++ )
Jarno Lamsa07363252019-09-27 16:20:11 +0300135 {
Jarno Lamsa7cb90272019-10-02 08:32:51 +0300136 unsigned char x = A[i], y = B[i];
137 diff |= x ^ y;
Jarno Lamsa07363252019-09-27 16:20:11 +0300138 }
139
Jarno Lamsa7cb90272019-10-02 08:32:51 +0300140 return( diff );
Jarno Lamsa07363252019-09-27 16:20:11 +0300141}
142
Jarno Lamsaf65e9de2019-10-01 16:09:35 +0300143uint32_t mbedtls_platform_random_in_range( size_t num )
Jarno Lamsa07363252019-09-27 16:20:11 +0300144{
Arto Kinnunende657fc2019-12-04 16:30:54 +0200145#if !defined(MBEDTLS_ENTROPY_HARDWARE_ALT)
Jarno Lamsa07363252019-09-27 16:20:11 +0300146 (void) num;
147 return 0;
Jarno Lamsae29e8a42019-10-03 11:06:35 +0300148#else
149 uint32_t result = 0;
150 size_t olen = 0;
151
152 mbedtls_hardware_poll( NULL, (unsigned char *) &result, sizeof( result ),
153 &olen );
Jarno Lamsa436d18d2019-10-03 11:46:30 +0300154
155 if( num == 0 )
156 {
157 result = 0;
158 }
159 else
160 {
161 result %= num;
162 }
163
164 return( result );
Jarno Lamsae29e8a42019-10-03 11:06:35 +0300165#endif
Jarno Lamsa07363252019-09-27 16:20:11 +0300166}
167
Arto Kinnunen4c63b982019-12-02 15:01:41 +0200168int mbedtls_platform_random_delay( size_t max_rand )
169{
170#if !defined(MBEDTLS_ENTROPY_HARDWARE_ALT)
171 (void) max_rand;
172 return -1;
173#else
Arto Kinnunendbf2b432019-12-30 12:55:30 +0200174 size_t rn_1, rn_2, rn_3;
Arto Kinnunen4c63b982019-12-02 15:01:41 +0200175 volatile size_t i = 0;
Arto Kinnunendbf2b432019-12-30 12:55:30 +0200176 uint8_t shift;
Arto Kinnunen4c63b982019-12-02 15:01:41 +0200177 if( max_rand == 0 || max_rand > INT_MAX )
178 {
Arto Kinnunenb47b1052019-12-05 17:32:05 +0200179 return( -1 );
Arto Kinnunen4c63b982019-12-02 15:01:41 +0200180 }
181
Arto Kinnunendbf2b432019-12-30 12:55:30 +0200182 rn_1 = mbedtls_platform_random_in_range( max_rand );
183 rn_2 = mbedtls_platform_random_in_range( 0xffffffff ) + 1;
184 rn_3 = mbedtls_platform_random_in_range( 0xffffffff ) + 1;
Arto Kinnunen4c63b982019-12-02 15:01:41 +0200185
Arto Kinnunenb47b1052019-12-05 17:32:05 +0200186 do
187 {
Arto Kinnunen4c63b982019-12-02 15:01:41 +0200188 i++;
Arto Kinnunendbf2b432019-12-30 12:55:30 +0200189 shift = rn_2 & 0x07;
190 if ( i % 2 )
191 rn_2 = (uint32_t)( rn_2 >> shift | rn_2 << ( 32 - shift ) );
192 else
193 rn_3 = (uint32_t)( rn_3 << shift | rn_3 >> ( 32 - shift ) );
194 rn_2 ^= rn_3;
195 } while( i < rn_1 || rn_2 == 0 || rn_3 == 0 );
Arto Kinnunen4c63b982019-12-02 15:01:41 +0200196
Arto Kinnunenb47b1052019-12-05 17:32:05 +0200197 return( (int)i );
Arto Kinnunen4c63b982019-12-02 15:01:41 +0200198#endif /* !MBEDTLS_ENTROPY_HARDWARE_ALT */
199}
200
Manuel Pégourié-Gonnard72a8c9e2019-11-08 10:21:00 +0100201void mbedtls_platform_enforce_volatile_reads( void )
202{
Arto Kinnunen04904852019-12-09 14:39:51 +0200203 // Add a small random delay as a counter-measure to fault injection attack.
204 mbedtls_platform_random_delay( 50 );
Manuel Pégourié-Gonnard72a8c9e2019-11-08 10:21:00 +0100205}
206
Hanno Becker6a739782018-09-05 15:06:19 +0100207#if defined(MBEDTLS_HAVE_TIME_DATE) && !defined(MBEDTLS_PLATFORM_GMTIME_R_ALT)
Andres Amaya Garcia1abb3682018-08-16 21:42:09 +0100208#include <time.h>
Hanno Beckercfeb70c2018-09-05 13:50:22 +0100209#if !defined(_WIN32) && (defined(unix) || \
Andres Amaya Garcia433f9112018-09-05 12:01:57 +0100210 defined(__unix) || defined(__unix__) || (defined(__APPLE__) && \
211 defined(__MACH__)))
Andres Amaya Garcia1abb3682018-08-16 21:42:09 +0100212#include <unistd.h>
Hanno Becker323d8012018-09-06 11:30:57 +0100213#endif /* !_WIN32 && (unix || __unix || __unix__ ||
214 * (__APPLE__ && __MACH__)) */
Hanno Becker6f705812018-09-06 09:06:33 +0100215
216#if !( ( defined(_POSIX_VERSION) && _POSIX_VERSION >= 200809L ) || \
217 ( defined(_POSIX_THREAD_SAFE_FUNCTIONS ) && \
218 _POSIX_THREAD_SAFE_FUNCTIONS >= 20112L ) )
Andres Amaya Garciaca04a012018-09-05 11:43:57 +0100219/*
220 * This is a convenience shorthand macro to avoid checking the long
221 * preprocessor conditions above. Ideally, we could expose this macro in
Hanno Becker7dd82b42018-09-05 16:25:50 +0100222 * platform_util.h and simply use it in platform_util.c, threading.c and
Andres Amaya Garciaca04a012018-09-05 11:43:57 +0100223 * threading.h. However, this macro is not part of the Mbed TLS public API, so
Andres Amaya Garcia3c9733a2018-09-05 11:52:07 +0100224 * we keep it private by only defining it in this file
Andres Amaya Garciaca04a012018-09-05 11:43:57 +0100225 */
Hanno Beckerf5106d52018-09-06 12:09:56 +0100226#if ! ( defined(_WIN32) && !defined(EFIX64) && !defined(EFI32) )
Andres Amaya Garcia1abb3682018-08-16 21:42:09 +0100227#define PLATFORM_UTIL_USE_GMTIME
Hanno Beckerf5106d52018-09-06 12:09:56 +0100228#endif /* ! ( defined(_WIN32) && !defined(EFIX64) && !defined(EFI32) ) */
229
Hanno Becker6f705812018-09-06 09:06:33 +0100230#endif /* !( ( defined(_POSIX_VERSION) && _POSIX_VERSION >= 200809L ) || \
231 ( defined(_POSIX_THREAD_SAFE_FUNCTIONS ) && \
232 _POSIX_THREAD_SAFE_FUNCTIONS >= 20112L ) ) */
Andres Amaya Garcia1abb3682018-08-16 21:42:09 +0100233
Hanno Becker6a739782018-09-05 15:06:19 +0100234struct tm *mbedtls_platform_gmtime_r( const mbedtls_time_t *tt,
235 struct tm *tm_buf )
Andres Amaya Garcia1abb3682018-08-16 21:42:09 +0100236{
237#if defined(_WIN32) && !defined(EFIX64) && !defined(EFI32)
Andres Amaya Garciaa658d7d2018-08-21 19:33:02 +0100238 return( ( gmtime_s( tm_buf, tt ) == 0 ) ? tm_buf : NULL );
Andres Amaya Garcia1abb3682018-08-16 21:42:09 +0100239#elif !defined(PLATFORM_UTIL_USE_GMTIME)
Andres Amaya Garciaa658d7d2018-08-21 19:33:02 +0100240 return( gmtime_r( tt, tm_buf ) );
Andres Amaya Garcia1abb3682018-08-16 21:42:09 +0100241#else
242 struct tm *lt;
243
244#if defined(MBEDTLS_THREADING_C)
245 if( mbedtls_mutex_lock( &mbedtls_threading_gmtime_mutex ) != 0 )
246 return( NULL );
247#endif /* MBEDTLS_THREADING_C */
248
249 lt = gmtime( tt );
250
251 if( lt != NULL )
252 {
253 memcpy( tm_buf, lt, sizeof( struct tm ) );
254 }
255
256#if defined(MBEDTLS_THREADING_C)
257 if( mbedtls_mutex_unlock( &mbedtls_threading_gmtime_mutex ) != 0 )
258 return( NULL );
259#endif /* MBEDTLS_THREADING_C */
260
Andres Amaya Garciaa658d7d2018-08-21 19:33:02 +0100261 return( ( lt == NULL ) ? NULL : tm_buf );
262#endif /* _WIN32 && !EFIX64 && !EFI32 */
Andres Amaya Garcia1abb3682018-08-16 21:42:09 +0100263}
Hanno Becker6a739782018-09-05 15:06:19 +0100264#endif /* MBEDTLS_HAVE_TIME_DATE && MBEDTLS_PLATFORM_GMTIME_R_ALT */
Arto Kinnunen0b62ce82019-09-04 14:04:57 +0300265
Arto Kinnunenee9bfca2019-09-06 16:59:00 +0300266unsigned char* mbedtls_platform_put_uint32_be( unsigned char *buf,
Arto Kinnunen4f4849a2019-09-09 10:21:18 +0300267 size_t num )
Arto Kinnunen0b62ce82019-09-04 14:04:57 +0300268{
269 *buf++ = (unsigned char) ( num >> 24 );
270 *buf++ = (unsigned char) ( num >> 16 );
271 *buf++ = (unsigned char) ( num >> 8 );
272 *buf++ = (unsigned char) ( num );
273
274 return buf;
275}
276
Arto Kinnunenee9bfca2019-09-06 16:59:00 +0300277unsigned char* mbedtls_platform_put_uint24_be( unsigned char *buf,
Arto Kinnunen4f4849a2019-09-09 10:21:18 +0300278 size_t num )
Arto Kinnunen0b62ce82019-09-04 14:04:57 +0300279{
280 *buf++ = (unsigned char) ( num >> 16 );
281 *buf++ = (unsigned char) ( num >> 8 );
282 *buf++ = (unsigned char) ( num );
283
284 return buf;
285}
286
Arto Kinnunenee9bfca2019-09-06 16:59:00 +0300287unsigned char* mbedtls_platform_put_uint16_be( unsigned char *buf,
Arto Kinnunen4f4849a2019-09-09 10:21:18 +0300288 size_t num )
Arto Kinnunen0b62ce82019-09-04 14:04:57 +0300289{
290 *buf++ = (unsigned char) ( num >> 8 );
291 *buf++ = (unsigned char) ( num );
292
293 return buf;
294}
295
Arto Kinnunen4f4849a2019-09-09 10:21:18 +0300296size_t mbedtls_platform_get_uint32_be( const unsigned char *buf )
Arto Kinnunen0b62ce82019-09-04 14:04:57 +0300297{
298 return ( ( (unsigned int) buf[0] << 24 ) |
299 ( (unsigned int) buf[1] << 16 ) |
300 ( (unsigned int) buf[2] << 8 ) |
301 ( (unsigned int) buf[3] ) );
302}
303
Arto Kinnunen4f4849a2019-09-09 10:21:18 +0300304size_t mbedtls_platform_get_uint24_be( const unsigned char *buf )
Arto Kinnunen0b62ce82019-09-04 14:04:57 +0300305{
306 return ( ( buf[0] << 16 ) |
307 ( buf[1] << 8) |
308 ( buf[2] ) );
309}
310
Arto Kinnunen4f4849a2019-09-09 10:21:18 +0300311size_t mbedtls_platform_get_uint16_be( const unsigned char *buf )
Arto Kinnunen0b62ce82019-09-04 14:04:57 +0300312{
313 return ( ( buf[0] << 8 ) |
314 ( buf[1] ) );
315}