blob: a35ac2494df753ed4037258971a2560734274a4f [file] [log] [blame]
Gilles Peskine6194dc22018-11-16 22:24:15 +01001/*
2 * PSA ITS simulator over stdio files.
3 */
Bence Szépkúti86974652020-06-15 11:59:37 +02004/*
Bence Szépkúti1e148272020-08-07 13:07:28 +02005 * Copyright The Mbed TLS Contributors
Gilles Peskine6194dc22018-11-16 22:24:15 +01006 * SPDX-License-Identifier: Apache-2.0
7 *
8 * Licensed under the Apache License, Version 2.0 (the "License"); you may
9 * not use this file except in compliance with the License.
10 * You may obtain a copy of the License at
11 *
12 * http://www.apache.org/licenses/LICENSE-2.0
13 *
14 * Unless required by applicable law or agreed to in writing, software
15 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 * See the License for the specific language governing permissions and
18 * limitations under the License.
Gilles Peskine6194dc22018-11-16 22:24:15 +010019 */
20
Mateusz Starzyk03f00302021-05-27 14:40:40 +020021#include "common.h"
Gilles Peskine6194dc22018-11-16 22:24:15 +010022
23#if defined(MBEDTLS_PSA_ITS_FILE_C)
24
Gilles Peskine6194dc22018-11-16 22:24:15 +010025#include "mbedtls/platform.h"
Gilles Peskine6194dc22018-11-16 22:24:15 +010026
Darryl Greenb4679342019-04-10 15:37:06 +010027#if defined(_WIN32)
28#include <windows.h>
29#endif
30
Gilles Peskine6194dc22018-11-16 22:24:15 +010031#include "psa_crypto_its.h"
32
33#include <limits.h>
34#include <stdint.h>
35#include <stdio.h>
36#include <string.h>
37
Simon D Hughesbda5a212019-07-10 16:34:21 +010038#if !defined(PSA_ITS_STORAGE_PREFIX)
Gilles Peskine6194dc22018-11-16 22:24:15 +010039#define PSA_ITS_STORAGE_PREFIX ""
Simon D Hughesbda5a212019-07-10 16:34:21 +010040#endif
Gilles Peskine6194dc22018-11-16 22:24:15 +010041
Paul Elliott3a5a1072020-12-17 18:33:40 +000042#define PSA_ITS_STORAGE_FILENAME_PATTERN "%08x%08x"
Gilles Peskine6194dc22018-11-16 22:24:15 +010043#define PSA_ITS_STORAGE_SUFFIX ".psa_its"
44#define PSA_ITS_STORAGE_FILENAME_LENGTH \
45 ( sizeof( PSA_ITS_STORAGE_PREFIX ) - 1 + /*prefix without terminating 0*/ \
46 16 + /*UID (64-bit number in hex)*/ \
47 sizeof( PSA_ITS_STORAGE_SUFFIX ) - 1 + /*suffix without terminating 0*/ \
48 1 /*terminating null byte*/ )
49#define PSA_ITS_STORAGE_TEMP \
50 PSA_ITS_STORAGE_PREFIX "tempfile" PSA_ITS_STORAGE_SUFFIX
51
52/* The maximum value of psa_storage_info_t.size */
53#define PSA_ITS_MAX_SIZE 0xffffffff
54
55#define PSA_ITS_MAGIC_STRING "PSA\0ITS\0"
56#define PSA_ITS_MAGIC_LENGTH 8
57
Darryl Green86095bc2019-04-11 14:21:14 +010058/* As rename fails on Windows if the new filepath already exists,
59 * use MoveFileExA with the MOVEFILE_REPLACE_EXISTING flag instead.
60 * Returns 0 on success, nonzero on failure. */
Darryl Greenfdda7de2019-04-11 12:54:02 +010061#if defined(_WIN32)
62#define rename_replace_existing( oldpath, newpath ) \
Darryl Green86095bc2019-04-11 14:21:14 +010063 ( ! MoveFileExA( oldpath, newpath, MOVEFILE_REPLACE_EXISTING ) )
Darryl Greenfdda7de2019-04-11 12:54:02 +010064#else
65#define rename_replace_existing( oldpath, newpath ) rename( oldpath, newpath )
66#endif
67
Gilles Peskine6194dc22018-11-16 22:24:15 +010068typedef struct
69{
70 uint8_t magic[PSA_ITS_MAGIC_LENGTH];
71 uint8_t size[sizeof( uint32_t )];
72 uint8_t flags[sizeof( psa_storage_create_flags_t )];
73} psa_its_file_header_t;
74
75static void psa_its_fill_filename( psa_storage_uid_t uid, char *filename )
76{
77 /* Break up the UID into two 32-bit pieces so as not to rely on
78 * long long support in snprintf. */
79 mbedtls_snprintf( filename, PSA_ITS_STORAGE_FILENAME_LENGTH,
80 "%s" PSA_ITS_STORAGE_FILENAME_PATTERN "%s",
81 PSA_ITS_STORAGE_PREFIX,
Paul Elliott3a5a1072020-12-17 18:33:40 +000082 (unsigned) ( uid >> 32 ),
83 (unsigned) ( uid & 0xffffffff ),
Gilles Peskine6194dc22018-11-16 22:24:15 +010084 PSA_ITS_STORAGE_SUFFIX );
85}
86
87static psa_status_t psa_its_read_file( psa_storage_uid_t uid,
88 struct psa_storage_info_t *p_info,
89 FILE **p_stream )
90{
91 char filename[PSA_ITS_STORAGE_FILENAME_LENGTH];
92 psa_its_file_header_t header;
93 size_t n;
94
95 *p_stream = NULL;
96 psa_its_fill_filename( uid, filename );
97 *p_stream = fopen( filename, "rb" );
98 if( *p_stream == NULL )
99 return( PSA_ERROR_DOES_NOT_EXIST );
100
Gilles Peskineda0913b2022-06-30 17:03:40 +0200101 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
102 mbedtls_setbuf( *p_stream, NULL );
103
Gilles Peskine6194dc22018-11-16 22:24:15 +0100104 n = fread( &header, 1, sizeof( header ), *p_stream );
105 if( n != sizeof( header ) )
106 return( PSA_ERROR_DATA_CORRUPT );
107 if( memcmp( header.magic, PSA_ITS_MAGIC_STRING,
108 PSA_ITS_MAGIC_LENGTH ) != 0 )
109 return( PSA_ERROR_DATA_CORRUPT );
110
111 p_info->size = ( header.size[0] |
112 header.size[1] << 8 |
113 header.size[2] << 16 |
114 header.size[3] << 24 );
115 p_info->flags = ( header.flags[0] |
116 header.flags[1] << 8 |
117 header.flags[2] << 16 |
118 header.flags[3] << 24 );
119 return( PSA_SUCCESS );
120}
121
122psa_status_t psa_its_get_info( psa_storage_uid_t uid,
123 struct psa_storage_info_t *p_info )
124{
125 psa_status_t status;
126 FILE *stream = NULL;
127 status = psa_its_read_file( uid, p_info, &stream );
128 if( stream != NULL )
129 fclose( stream );
130 return( status );
131}
132
133psa_status_t psa_its_get( psa_storage_uid_t uid,
134 uint32_t data_offset,
135 uint32_t data_length,
Simon D Hughesbda5a212019-07-10 16:34:21 +0100136 void *p_data,
137 size_t *p_data_length )
Gilles Peskine6194dc22018-11-16 22:24:15 +0100138{
139 psa_status_t status;
140 FILE *stream = NULL;
141 size_t n;
142 struct psa_storage_info_t info;
143
144 status = psa_its_read_file( uid, &info, &stream );
145 if( status != PSA_SUCCESS )
146 goto exit;
Gilles Peskinebc1f2722018-11-16 22:24:38 +0100147 status = PSA_ERROR_INVALID_ARGUMENT;
Gilles Peskine6194dc22018-11-16 22:24:15 +0100148 if( data_offset + data_length < data_offset )
149 goto exit;
150#if SIZE_MAX < 0xffffffff
151 if( data_offset + data_length > SIZE_MAX )
152 goto exit;
153#endif
154 if( data_offset + data_length > info.size )
155 goto exit;
156
Gilles Peskinebc1f2722018-11-16 22:24:38 +0100157 status = PSA_ERROR_STORAGE_FAILURE;
Gilles Peskine6194dc22018-11-16 22:24:15 +0100158#if LONG_MAX < 0xffffffff
159 while( data_offset > LONG_MAX )
160 {
161 if( fseek( stream, LONG_MAX, SEEK_CUR ) != 0 )
162 goto exit;
163 data_offset -= LONG_MAX;
164 }
165#endif
166 if( fseek( stream, data_offset, SEEK_CUR ) != 0 )
167 goto exit;
168 n = fread( p_data, 1, data_length, stream );
169 if( n != data_length )
170 goto exit;
171 status = PSA_SUCCESS;
Simon D Hughesbda5a212019-07-10 16:34:21 +0100172 if( p_data_length != NULL )
173 *p_data_length = n;
Gilles Peskine6194dc22018-11-16 22:24:15 +0100174
175exit:
176 if( stream != NULL )
177 fclose( stream );
178 return( status );
179}
180
181psa_status_t psa_its_set( psa_storage_uid_t uid,
182 uint32_t data_length,
183 const void *p_data,
184 psa_storage_create_flags_t create_flags )
185{
pespaceke9901002022-02-08 13:52:28 +0100186 if( uid == 0 )
187 {
PeterSpacec2774a32022-02-11 10:21:16 +0100188 return( PSA_ERROR_INVALID_HANDLE );
pespaceke9901002022-02-08 13:52:28 +0100189 }
190
Gilles Peskine6194dc22018-11-16 22:24:15 +0100191 psa_status_t status = PSA_ERROR_STORAGE_FAILURE;
192 char filename[PSA_ITS_STORAGE_FILENAME_LENGTH];
193 FILE *stream = NULL;
194 psa_its_file_header_t header;
195 size_t n;
196
197 memcpy( header.magic, PSA_ITS_MAGIC_STRING, PSA_ITS_MAGIC_LENGTH );
Joe Subbiani6dd73642021-07-19 11:56:54 +0100198 MBEDTLS_PUT_UINT32_LE( data_length, header.size, 0 );
199 MBEDTLS_PUT_UINT32_LE( create_flags, header.flags, 0 );
Gilles Peskine6194dc22018-11-16 22:24:15 +0100200
201 psa_its_fill_filename( uid, filename );
202 stream = fopen( PSA_ITS_STORAGE_TEMP, "wb" );
Gilles Peskineda0913b2022-06-30 17:03:40 +0200203
Gilles Peskine6194dc22018-11-16 22:24:15 +0100204 if( stream == NULL )
205 goto exit;
206
Gilles Peskineda0913b2022-06-30 17:03:40 +0200207 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
208 mbedtls_setbuf( stream, NULL );
209
Gilles Peskine6194dc22018-11-16 22:24:15 +0100210 status = PSA_ERROR_INSUFFICIENT_STORAGE;
211 n = fwrite( &header, 1, sizeof( header ), stream );
212 if( n != sizeof( header ) )
213 goto exit;
Andrzej Kurekdc22d8d2019-09-05 09:34:34 -0400214 if( data_length != 0 )
215 {
216 n = fwrite( p_data, 1, data_length, stream );
217 if( n != data_length )
218 goto exit;
219 }
Gilles Peskine6194dc22018-11-16 22:24:15 +0100220 status = PSA_SUCCESS;
221
222exit:
223 if( stream != NULL )
224 {
225 int ret = fclose( stream );
226 if( status == PSA_SUCCESS && ret != 0 )
227 status = PSA_ERROR_INSUFFICIENT_STORAGE;
228 }
229 if( status == PSA_SUCCESS )
230 {
Darryl Greenfdda7de2019-04-11 12:54:02 +0100231 if( rename_replace_existing( PSA_ITS_STORAGE_TEMP, filename ) != 0 )
Gilles Peskine6194dc22018-11-16 22:24:15 +0100232 status = PSA_ERROR_STORAGE_FAILURE;
233 }
Gilles Peskinebab1b522020-08-25 22:49:19 +0200234 /* The temporary file may still exist, but only in failure cases where
235 * we're already reporting an error. So there's nothing we can do on
236 * failure. If the function succeeded, and in some error cases, the
237 * temporary file doesn't exist and so remove() is expected to fail.
238 * Thus we just ignore the return status of remove(). */
239 (void) remove( PSA_ITS_STORAGE_TEMP );
Gilles Peskine6194dc22018-11-16 22:24:15 +0100240 return( status );
241}
242
243psa_status_t psa_its_remove( psa_storage_uid_t uid )
244{
245 char filename[PSA_ITS_STORAGE_FILENAME_LENGTH];
246 FILE *stream;
247 psa_its_fill_filename( uid, filename );
248 stream = fopen( filename, "rb" );
249 if( stream == NULL )
250 return( PSA_ERROR_DOES_NOT_EXIST );
251 fclose( stream );
252 if( remove( filename ) != 0 )
253 return( PSA_ERROR_STORAGE_FAILURE );
254 return( PSA_SUCCESS );
255}
256
257#endif /* MBEDTLS_PSA_ITS_FILE_C */