Andres Amaya Garcia | 614d9c0 | 2017-10-24 21:27:43 +0100 | [diff] [blame] | 1 | /* |
Andres Amaya Garcia | 904e1ef | 2018-04-17 09:16:30 -0500 | [diff] [blame] | 2 | * Common and shared functions used by multiple modules in the Mbed TLS |
| 3 | * library. |
Andres Amaya Garcia | 614d9c0 | 2017-10-24 21:27:43 +0100 | [diff] [blame] | 4 | * |
Andres Amaya Garcia | 757cd72 | 2018-03-08 21:25:25 +0000 | [diff] [blame] | 5 | * Copyright (C) 2018, Arm Limited, All Rights Reserved |
Andres Amaya Garcia | 614d9c0 | 2017-10-24 21:27:43 +0100 | [diff] [blame] | 6 | * SPDX-License-Identifier: Apache-2.0 |
| 7 | * |
| 8 | * Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 9 | * not use this file except in compliance with the License. |
| 10 | * You may obtain a copy of the License at |
| 11 | * |
| 12 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 13 | * |
| 14 | * Unless required by applicable law or agreed to in writing, software |
| 15 | * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 16 | * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 17 | * See the License for the specific language governing permissions and |
| 18 | * limitations under the License. |
| 19 | * |
Andres Amaya Garcia | 757cd72 | 2018-03-08 21:25:25 +0000 | [diff] [blame] | 20 | * This file is part of Mbed TLS (https://tls.mbed.org) |
Andres Amaya Garcia | 614d9c0 | 2017-10-24 21:27:43 +0100 | [diff] [blame] | 21 | */ |
| 22 | |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 23 | /* |
Hanno Becker | 48a816f | 2018-09-05 15:22:22 +0100 | [diff] [blame] | 24 | * Ensure gmtime_r is available even with -std=c99; must be defined before |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 25 | * config.h, which pulls in glibc's features.h. Harmless on other platforms. |
| 26 | */ |
Andres Amaya Garcia | 94b540a | 2018-09-05 12:27:32 +0100 | [diff] [blame] | 27 | #if !defined(_POSIX_C_SOURCE) |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 28 | #define _POSIX_C_SOURCE 200112L |
Andres Amaya Garcia | 94b540a | 2018-09-05 12:27:32 +0100 | [diff] [blame] | 29 | #endif |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 30 | |
Andres Amaya Garcia | b1262a3 | 2017-10-25 09:51:14 +0100 | [diff] [blame] | 31 | #if !defined(MBEDTLS_CONFIG_FILE) |
| 32 | #include "mbedtls/config.h" |
| 33 | #else |
| 34 | #include MBEDTLS_CONFIG_FILE |
| 35 | #endif |
| 36 | |
Andres Amaya Garcia | 1f6301b | 2018-04-17 09:51:09 -0500 | [diff] [blame] | 37 | #include "mbedtls/platform_util.h" |
Simon Butcher | b486803 | 2018-12-06 17:36:34 +0000 | [diff] [blame] | 38 | #include "mbedtls/platform.h" |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 39 | #include "mbedtls/threading.h" |
Andres Amaya Garcia | 614d9c0 | 2017-10-24 21:27:43 +0100 | [diff] [blame] | 40 | |
Piotr Nowicki | 5d5841f | 2020-06-05 16:33:24 +0200 | [diff] [blame] | 41 | #if !defined(MBEDTLS_PLATFORM_C) |
| 42 | #include <stdlib.h> |
| 43 | #define mbedtls_calloc calloc |
| 44 | #define mbedtls_free free |
| 45 | #endif |
| 46 | |
Jarno Lamsa | e29e8a4 | 2019-10-03 11:06:35 +0300 | [diff] [blame] | 47 | #if defined(MBEDTLS_ENTROPY_HARDWARE_ALT) |
| 48 | #include "mbedtls/entropy_poll.h" |
| 49 | #endif |
| 50 | |
Andres Amaya Garcia | 614d9c0 | 2017-10-24 21:27:43 +0100 | [diff] [blame] | 51 | #include <stddef.h> |
Andres Amaya Garcia | ecd1891 | 2017-10-26 22:43:41 +0100 | [diff] [blame] | 52 | #include <string.h> |
Andres Amaya Garcia | 614d9c0 | 2017-10-24 21:27:43 +0100 | [diff] [blame] | 53 | |
Piotr Nowicki | 77b7a77 | 2020-07-31 16:11:06 +0200 | [diff] [blame] | 54 | /* Max number of loops for mbedtls_platform_random_delay. */ |
Arto Kinnunen | b148651 | 2020-01-09 11:11:23 +0200 | [diff] [blame] | 55 | #define MAX_RAND_DELAY 100 |
Arto Kinnunen | ac6d226 | 2020-01-09 10:11:20 +0200 | [diff] [blame] | 56 | |
Piotr Nowicki | 77b7a77 | 2020-07-31 16:11:06 +0200 | [diff] [blame] | 57 | /* Parameters for the linear congruential generator used as a non-cryptographic |
| 58 | * random number generator. The same parameters are used by e.g. ANSI C. */ |
| 59 | #define RAND_MULTIPLIER 1103515245 |
| 60 | #define RAND_INCREMENT 12345 |
| 61 | #define RAND_MODULUS 0x80000000 |
| 62 | |
| 63 | /* The number of iterations after which the seed of the non-cryptographic |
| 64 | * random number generator will be changed. This is used only if the |
| 65 | * MBEDTLS_ENTROPY_HARDWARE_ALT option is enabled. */ |
| 66 | #define RAND_SEED_LIFE 10000 |
| 67 | |
Andres Amaya Garcia | 904e1ef | 2018-04-17 09:16:30 -0500 | [diff] [blame] | 68 | #if !defined(MBEDTLS_PLATFORM_ZEROIZE_ALT) |
Andres Amaya Garcia | ecd1891 | 2017-10-26 22:43:41 +0100 | [diff] [blame] | 69 | /* |
| 70 | * This implementation should never be optimized out by the compiler |
| 71 | * |
Andres Amaya Garcia | 904e1ef | 2018-04-17 09:16:30 -0500 | [diff] [blame] | 72 | * This implementation for mbedtls_platform_zeroize() was inspired from Colin |
| 73 | * Percival's blog article at: |
Andres Amaya Garcia | 1e8ea5f | 2018-03-08 20:46:39 +0000 | [diff] [blame] | 74 | * |
| 75 | * http://www.daemonology.net/blog/2014-09-04-how-to-zero-a-buffer.html |
| 76 | * |
| 77 | * It uses a volatile function pointer to the standard memset(). Because the |
| 78 | * pointer is volatile the compiler expects it to change at |
| 79 | * any time and will not optimize out the call that could potentially perform |
| 80 | * other operations on the input buffer instead of just setting it to 0. |
| 81 | * Nevertheless, as pointed out by davidtgoldblatt on Hacker News |
| 82 | * (refer to http://www.daemonology.net/blog/2014-09-05-erratum.html for |
| 83 | * details), optimizations of the following form are still possible: |
Andres Amaya Garcia | ecd1891 | 2017-10-26 22:43:41 +0100 | [diff] [blame] | 84 | * |
| 85 | * if( memset_func != memset ) |
| 86 | * memset_func( buf, 0, len ); |
| 87 | * |
Andres Amaya Garcia | 904e1ef | 2018-04-17 09:16:30 -0500 | [diff] [blame] | 88 | * Note that it is extremely difficult to guarantee that |
| 89 | * mbedtls_platform_zeroize() will not be optimized out by aggressive compilers |
| 90 | * in a portable way. For this reason, Mbed TLS also provides the configuration |
| 91 | * option MBEDTLS_PLATFORM_ZEROIZE_ALT, which allows users to configure |
| 92 | * mbedtls_platform_zeroize() to use a suitable implementation for their |
| 93 | * platform and needs. |
Andres Amaya Garcia | ecd1891 | 2017-10-26 22:43:41 +0100 | [diff] [blame] | 94 | */ |
Manuel Pégourié-Gonnard | 14f33e7 | 2019-10-02 16:23:52 +0200 | [diff] [blame] | 95 | void *mbedtls_platform_memset( void *, int, size_t ); |
| 96 | static void * (* const volatile memset_func)( void *, int, size_t ) = mbedtls_platform_memset; |
Andres Amaya Garcia | ecd1891 | 2017-10-26 22:43:41 +0100 | [diff] [blame] | 97 | |
Piotr Nowicki | ed840db | 2020-06-23 12:59:56 +0200 | [diff] [blame] | 98 | void *mbedtls_platform_zeroize( void *buf, size_t len ) |
Andres Amaya Garcia | 614d9c0 | 2017-10-24 21:27:43 +0100 | [diff] [blame] | 99 | { |
Piotr Nowicki | ed840db | 2020-06-23 12:59:56 +0200 | [diff] [blame] | 100 | volatile size_t vlen = len; |
Vikas Katariya | 0c34499 | 2019-08-15 14:24:20 +0100 | [diff] [blame] | 101 | |
Piotr Nowicki | ed840db | 2020-06-23 12:59:56 +0200 | [diff] [blame] | 102 | MBEDTLS_INTERNAL_VALIDATE_RET( ( len == 0 || buf != NULL ), NULL ); |
| 103 | |
| 104 | if( vlen > 0 ) |
| 105 | { |
| 106 | return memset_func( buf, 0, vlen ); |
| 107 | } |
| 108 | else |
| 109 | { |
| 110 | mbedtls_platform_random_delay(); |
| 111 | if( vlen == 0 && vlen == len ) |
| 112 | { |
| 113 | return buf; |
| 114 | } |
| 115 | } |
| 116 | return NULL; |
Andres Amaya Garcia | 614d9c0 | 2017-10-24 21:27:43 +0100 | [diff] [blame] | 117 | } |
Andres Amaya Garcia | 904e1ef | 2018-04-17 09:16:30 -0500 | [diff] [blame] | 118 | #endif /* MBEDTLS_PLATFORM_ZEROIZE_ALT */ |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 119 | |
Manuel Pégourié-Gonnard | 51f65e4 | 2019-10-02 16:01:14 +0200 | [diff] [blame] | 120 | void *mbedtls_platform_memset( void *ptr, int value, size_t num ) |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 121 | { |
Piotr Nowicki | ed840db | 2020-06-23 12:59:56 +0200 | [diff] [blame] | 122 | size_t i, start_offset; |
| 123 | volatile size_t flow_counter = 0; |
| 124 | volatile char *b = ptr; |
| 125 | char rnd_data; |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 126 | |
Piotr Nowicki | ed840db | 2020-06-23 12:59:56 +0200 | [diff] [blame] | 127 | start_offset = (size_t) mbedtls_platform_random_in_range( (uint32_t) num ); |
| 128 | rnd_data = (char) mbedtls_platform_random_in_range( 256 ); |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 129 | |
Piotr Nowicki | ea8e846 | 2020-08-10 15:20:26 +0200 | [diff] [blame] | 130 | /* Perform a memset operations with random data and start from a random |
| 131 | * location */ |
| 132 | for( i = start_offset; i < num; ++i ) |
| 133 | { |
| 134 | b[i] = rnd_data; |
| 135 | flow_counter++; |
| 136 | } |
| 137 | |
| 138 | /* Start from a random location with target data */ |
Piotr Nowicki | ed840db | 2020-06-23 12:59:56 +0200 | [diff] [blame] | 139 | for( i = start_offset; i < num; ++i ) |
| 140 | { |
| 141 | b[i] = value; |
| 142 | flow_counter++; |
| 143 | } |
| 144 | |
Piotr Nowicki | ea8e846 | 2020-08-10 15:20:26 +0200 | [diff] [blame] | 145 | /* Second memset operation with random data */ |
Piotr Nowicki | ed840db | 2020-06-23 12:59:56 +0200 | [diff] [blame] | 146 | for( i = 0; i < start_offset; ++i ) |
| 147 | { |
| 148 | b[i] = rnd_data; |
Piotr Nowicki | ea8e846 | 2020-08-10 15:20:26 +0200 | [diff] [blame] | 149 | flow_counter++; |
Piotr Nowicki | ed840db | 2020-06-23 12:59:56 +0200 | [diff] [blame] | 150 | } |
| 151 | |
Piotr Nowicki | ea8e846 | 2020-08-10 15:20:26 +0200 | [diff] [blame] | 152 | /* Finish memset operation with correct data */ |
Piotr Nowicki | ed840db | 2020-06-23 12:59:56 +0200 | [diff] [blame] | 153 | for( i = 0; i < start_offset; ++i ) |
| 154 | { |
| 155 | b[i] = value; |
| 156 | flow_counter++; |
| 157 | } |
| 158 | |
| 159 | /* check the correct number of iterations */ |
Piotr Nowicki | ea8e846 | 2020-08-10 15:20:26 +0200 | [diff] [blame] | 160 | if( flow_counter == 2 * num ) |
Piotr Nowicki | ed840db | 2020-06-23 12:59:56 +0200 | [diff] [blame] | 161 | { |
| 162 | mbedtls_platform_random_delay(); |
Piotr Nowicki | ea8e846 | 2020-08-10 15:20:26 +0200 | [diff] [blame] | 163 | if( flow_counter == 2 * num ) |
Piotr Nowicki | ed840db | 2020-06-23 12:59:56 +0200 | [diff] [blame] | 164 | { |
| 165 | return ptr; |
| 166 | } |
| 167 | } |
| 168 | return NULL; |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 169 | } |
| 170 | |
Manuel Pégourié-Gonnard | 51f65e4 | 2019-10-02 16:01:14 +0200 | [diff] [blame] | 171 | void *mbedtls_platform_memcpy( void *dst, const void *src, size_t num ) |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 172 | { |
Piotr Nowicki | ea8e846 | 2020-08-10 15:20:26 +0200 | [diff] [blame] | 173 | size_t i; |
| 174 | volatile size_t flow_counter = 0; |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 175 | |
Piotr Nowicki | ea8e846 | 2020-08-10 15:20:26 +0200 | [diff] [blame] | 176 | if( num > 0 ) |
| 177 | { |
| 178 | /* Randomize start offset. */ |
| 179 | size_t start_offset = (size_t) mbedtls_platform_random_in_range( (uint32_t) num ); |
| 180 | /* Randomize initial data to prevent leakage while copying */ |
| 181 | uint32_t data = mbedtls_platform_random_in_range( 256 ); |
| 182 | |
| 183 | /* Use memset with random value at first to increase security - memset is |
| 184 | not normally part of the memcpy function and here can be useed |
| 185 | with regular, unsecured implementation */ |
| 186 | memset( (void *) dst, data, num ); |
| 187 | |
| 188 | /* Make a copy starting from a random location. */ |
| 189 | i = start_offset; |
| 190 | do |
| 191 | { |
| 192 | ( (char*) dst )[i] = ( (char*) src )[i]; |
| 193 | flow_counter++; |
| 194 | } |
| 195 | while( ( i = ( i + 1 ) % num ) != start_offset ); |
| 196 | } |
| 197 | |
| 198 | /* check the correct number of iterations */ |
| 199 | if( flow_counter == num ) |
| 200 | { |
| 201 | mbedtls_platform_random_delay(); |
| 202 | if( flow_counter == num ) |
| 203 | { |
| 204 | return dst; |
| 205 | } |
| 206 | } |
| 207 | return NULL; |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 208 | } |
| 209 | |
Piotr Nowicki | 5d5841f | 2020-06-05 16:33:24 +0200 | [diff] [blame] | 210 | int mbedtls_platform_memmove( void *dst, const void *src, size_t num ) |
| 211 | { |
Piotr Nowicki | ea8e846 | 2020-08-10 15:20:26 +0200 | [diff] [blame] | 212 | void *ret1 = NULL; |
| 213 | void *ret2 = NULL; |
Piotr Nowicki | 5d5841f | 2020-06-05 16:33:24 +0200 | [diff] [blame] | 214 | /* The buffers can have a common part, so we cannot do a copy from a random |
| 215 | * location. By using a temporary buffer we can do so, but the cost of it |
| 216 | * is using more memory and longer transfer time. */ |
| 217 | void *tmp = mbedtls_calloc( 1, num ); |
| 218 | if( tmp != NULL ) |
| 219 | { |
Piotr Nowicki | ea8e846 | 2020-08-10 15:20:26 +0200 | [diff] [blame] | 220 | ret1 = mbedtls_platform_memcpy( tmp, src, num ); |
| 221 | ret2 = mbedtls_platform_memcpy( dst, tmp, num ); |
Piotr Nowicki | 5d5841f | 2020-06-05 16:33:24 +0200 | [diff] [blame] | 222 | mbedtls_free( tmp ); |
Piotr Nowicki | ea8e846 | 2020-08-10 15:20:26 +0200 | [diff] [blame] | 223 | if( ret1 == tmp && ret2 == dst ) |
| 224 | { |
| 225 | return 0; |
| 226 | } |
| 227 | return MBEDTLS_ERR_PLATFORM_FAULT_DETECTED; |
Piotr Nowicki | 5d5841f | 2020-06-05 16:33:24 +0200 | [diff] [blame] | 228 | } |
| 229 | |
Piotr Nowicki | ce0aab4 | 2020-06-08 14:08:49 +0200 | [diff] [blame] | 230 | return MBEDTLS_ERR_PLATFORM_ALLOC_FAILED; |
Piotr Nowicki | 5d5841f | 2020-06-05 16:33:24 +0200 | [diff] [blame] | 231 | } |
| 232 | |
Andrzej Kurek | 8bb0839 | 2020-08-09 02:11:19 -0400 | [diff] [blame] | 233 | #if !defined(MBEDTLS_DEPRECATED_REMOVED) |
| 234 | int mbedtls_platform_memcmp( const void *buf1, const void *buf2, size_t num ) |
| 235 | { |
| 236 | return( mbedtls_platform_memequal( buf1, buf2, num ) ); |
| 237 | } |
| 238 | #endif /* MBEDTLS_DEPRECATED_REMOVED */ |
| 239 | |
Piotr Nowicki | e3c4ee5 | 2020-06-23 12:59:56 +0200 | [diff] [blame] | 240 | int mbedtls_platform_memequal( const void *buf1, const void *buf2, size_t num ) |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 241 | { |
Jarno Lamsa | 7cb9027 | 2019-10-02 08:32:51 +0300 | [diff] [blame] | 242 | volatile const unsigned char *A = (volatile const unsigned char *) buf1; |
| 243 | volatile const unsigned char *B = (volatile const unsigned char *) buf2; |
| 244 | volatile unsigned char diff = 0; |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 245 | |
Piotr Nowicki | f0ab6d6 | 2020-05-25 12:48:30 +0200 | [diff] [blame] | 246 | /* Start from a random location and check the correct number of iterations */ |
| 247 | size_t i, flow_counter = 0; |
Piotr Nowicki | 8656fc6 | 2020-06-23 12:30:40 +0200 | [diff] [blame] | 248 | size_t start_offset = (size_t) mbedtls_platform_random_in_range( (uint32_t) num ); |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 249 | |
Jarno Lamsa | 0ff7109 | 2019-10-02 08:18:29 +0300 | [diff] [blame] | 250 | for( i = start_offset; i < num; i++ ) |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 251 | { |
Jarno Lamsa | 7cb9027 | 2019-10-02 08:32:51 +0300 | [diff] [blame] | 252 | unsigned char x = A[i], y = B[i]; |
Piotr Nowicki | 4aaa34c | 2020-05-20 13:57:38 +0200 | [diff] [blame] | 253 | flow_counter++; |
Jarno Lamsa | 7cb9027 | 2019-10-02 08:32:51 +0300 | [diff] [blame] | 254 | diff |= x ^ y; |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 255 | } |
| 256 | |
Jarno Lamsa | 0ff7109 | 2019-10-02 08:18:29 +0300 | [diff] [blame] | 257 | for( i = 0; i < start_offset; i++ ) |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 258 | { |
Jarno Lamsa | 7cb9027 | 2019-10-02 08:32:51 +0300 | [diff] [blame] | 259 | unsigned char x = A[i], y = B[i]; |
Piotr Nowicki | 4aaa34c | 2020-05-20 13:57:38 +0200 | [diff] [blame] | 260 | flow_counter++; |
Jarno Lamsa | 7cb9027 | 2019-10-02 08:32:51 +0300 | [diff] [blame] | 261 | diff |= x ^ y; |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 262 | } |
| 263 | |
Piotr Nowicki | 4aaa34c | 2020-05-20 13:57:38 +0200 | [diff] [blame] | 264 | /* Return 0 only when diff is 0 and flow_counter is equal to num */ |
| 265 | return( (int) diff | (int) ( flow_counter ^ num ) ); |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 266 | } |
| 267 | |
Piotr Nowicki | 77b7a77 | 2020-07-31 16:11:06 +0200 | [diff] [blame] | 268 | /* This function implements a non-cryptographic random number generator based |
| 269 | * on the linear congruential generator algorithm. Additionally, if the |
| 270 | * MBEDTLS_ENTROPY_HARDWARE_ALT flag is defined, the seed is set at the first |
| 271 | * call of this function with using a hardware random number generator and |
| 272 | * changed every RAND_SEED_LIFE number of iterations. |
| 273 | * |
| 274 | * The value of the returned number is in the range [0; 0xffff]. |
| 275 | * |
| 276 | * Note: The range of values with a 16-bit precision is related to the modulo |
| 277 | * parameter of the generator and the fact that the function does not return the |
| 278 | * full value of the internal state of the generator. |
| 279 | */ |
| 280 | static uint32_t mbedtls_platform_random_uint16( void ) |
Andrzej Kurek | 189ee74 | 2020-06-24 17:28:31 -0400 | [diff] [blame] | 281 | { |
Piotr Nowicki | 77b7a77 | 2020-07-31 16:11:06 +0200 | [diff] [blame] | 282 | /* Set random_state - the first random value should not be zero. */ |
| 283 | static uint32_t random_state = RAND_INCREMENT; |
Andrzej Kurek | 189ee74 | 2020-06-24 17:28:31 -0400 | [diff] [blame] | 284 | |
Piotr Nowicki | 77b7a77 | 2020-07-31 16:11:06 +0200 | [diff] [blame] | 285 | #if defined(MBEDTLS_ENTROPY_HARDWARE_ALT) |
| 286 | |
| 287 | static uint32_t random_seed_life = 0; |
| 288 | |
| 289 | if( 0 < random_seed_life ) |
| 290 | { |
| 291 | --random_seed_life; |
| 292 | } |
| 293 | else |
| 294 | { |
| 295 | size_t olen = 0; |
| 296 | uint32_t hw_random; |
| 297 | mbedtls_hardware_poll( NULL, |
| 298 | (unsigned char *) &hw_random, sizeof( hw_random ), |
| 299 | &olen ); |
| 300 | if( olen == sizeof( hw_random ) ) |
| 301 | { |
| 302 | random_state ^= hw_random; |
| 303 | random_seed_life = RAND_SEED_LIFE; |
| 304 | } |
| 305 | } |
| 306 | |
| 307 | #endif /* MBEDTLS_ENTROPY_HARDWARE_ALT */ |
| 308 | |
| 309 | random_state = ( ( random_state * RAND_MULTIPLIER ) + RAND_INCREMENT ) % RAND_MODULUS; |
| 310 | |
| 311 | /* Do not return the entire random_state to hide generator predictability for |
| 312 | * the next iteration */ |
| 313 | return( ( random_state >> 15 ) & 0xffff ); |
| 314 | } |
| 315 | |
| 316 | uint32_t mbedtls_platform_random_uint32( void ) |
| 317 | { |
| 318 | return( ( mbedtls_platform_random_uint16() << 16 ) | |
| 319 | mbedtls_platform_random_uint16() ); |
Andrzej Kurek | 189ee74 | 2020-06-24 17:28:31 -0400 | [diff] [blame] | 320 | } |
| 321 | |
Shelly Liberman | 05beb9a | 2020-09-13 15:23:56 +0300 | [diff] [blame] | 322 | void mbedtls_platform_random_buf( uint8_t *buf, size_t len ) |
| 323 | { |
| 324 | uint16_t val; |
| 325 | |
| 326 | while( len > 1 ) |
| 327 | { |
| 328 | val = mbedtls_platform_random_uint16(); |
| 329 | buf[len-1] = (uint8_t)val; |
| 330 | buf[len-2] = (uint8_t)(val>>8); |
| 331 | len -= 2; |
| 332 | } |
| 333 | if( len == 1 ) |
| 334 | { |
| 335 | buf[0] = (uint8_t)mbedtls_platform_random_uint16(); |
| 336 | } |
| 337 | |
| 338 | return; |
| 339 | } |
| 340 | |
Piotr Nowicki | 8656fc6 | 2020-06-23 12:30:40 +0200 | [diff] [blame] | 341 | uint32_t mbedtls_platform_random_in_range( uint32_t num ) |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 342 | { |
Piotr Nowicki | 77b7a77 | 2020-07-31 16:11:06 +0200 | [diff] [blame] | 343 | uint32_t result; |
Jarno Lamsa | e29e8a4 | 2019-10-03 11:06:35 +0300 | [diff] [blame] | 344 | |
Piotr Nowicki | 77b7a77 | 2020-07-31 16:11:06 +0200 | [diff] [blame] | 345 | if( num <= 1 ) |
Jarno Lamsa | 436d18d | 2019-10-03 11:46:30 +0300 | [diff] [blame] | 346 | { |
| 347 | result = 0; |
| 348 | } |
| 349 | else |
| 350 | { |
Piotr Nowicki | 77b7a77 | 2020-07-31 16:11:06 +0200 | [diff] [blame] | 351 | result = mbedtls_platform_random_uint32() % num; |
Jarno Lamsa | 436d18d | 2019-10-03 11:46:30 +0300 | [diff] [blame] | 352 | } |
| 353 | |
| 354 | return( result ); |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 355 | } |
| 356 | |
Arto Kinnunen | ac6d226 | 2020-01-09 10:11:20 +0200 | [diff] [blame] | 357 | void mbedtls_platform_random_delay( void ) |
Arto Kinnunen | 4c63b98 | 2019-12-02 15:01:41 +0200 | [diff] [blame] | 358 | { |
Piotr Nowicki | 057daa3 | 2020-08-03 13:08:33 +0200 | [diff] [blame] | 359 | #if defined(MBEDTLS_FI_COUNTERMEASURES) |
Piotr Nowicki | 8656fc6 | 2020-06-23 12:30:40 +0200 | [diff] [blame] | 360 | uint32_t rn_1, rn_2, rn_3; |
Arto Kinnunen | 4c63b98 | 2019-12-02 15:01:41 +0200 | [diff] [blame] | 361 | volatile size_t i = 0; |
Arto Kinnunen | dbf2b43 | 2019-12-30 12:55:30 +0200 | [diff] [blame] | 362 | uint8_t shift; |
Arto Kinnunen | 4c63b98 | 2019-12-02 15:01:41 +0200 | [diff] [blame] | 363 | |
Arto Kinnunen | b148651 | 2020-01-09 11:11:23 +0200 | [diff] [blame] | 364 | rn_1 = mbedtls_platform_random_in_range( MAX_RAND_DELAY ); |
Arto Kinnunen | dbf2b43 | 2019-12-30 12:55:30 +0200 | [diff] [blame] | 365 | rn_2 = mbedtls_platform_random_in_range( 0xffffffff ) + 1; |
| 366 | rn_3 = mbedtls_platform_random_in_range( 0xffffffff ) + 1; |
Arto Kinnunen | 4c63b98 | 2019-12-02 15:01:41 +0200 | [diff] [blame] | 367 | |
Arto Kinnunen | b47b105 | 2019-12-05 17:32:05 +0200 | [diff] [blame] | 368 | do |
| 369 | { |
Arto Kinnunen | 4c63b98 | 2019-12-02 15:01:41 +0200 | [diff] [blame] | 370 | i++; |
Piotr Nowicki | b06ec05 | 2020-06-03 15:59:59 +0200 | [diff] [blame] | 371 | /* Dummy calculations to increase the time between iterations and |
| 372 | * make side channel attack more difficult by reducing predictability |
Piotr Nowicki | 26c3369 | 2020-08-11 13:58:47 +0200 | [diff] [blame] | 373 | * of its behaviour. */ |
| 374 | shift = ( rn_2 & 0x07 ) + 1; |
Arto Kinnunen | dbf2b43 | 2019-12-30 12:55:30 +0200 | [diff] [blame] | 375 | if ( i % 2 ) |
Piotr Nowicki | 8656fc6 | 2020-06-23 12:30:40 +0200 | [diff] [blame] | 376 | rn_2 = ( rn_2 >> shift ) | ( rn_2 << ( 32 - shift ) ); |
Arto Kinnunen | dbf2b43 | 2019-12-30 12:55:30 +0200 | [diff] [blame] | 377 | else |
Piotr Nowicki | 8656fc6 | 2020-06-23 12:30:40 +0200 | [diff] [blame] | 378 | rn_3 = ( rn_3 << shift ) | ( rn_3 >> ( 32 - shift ) ); |
Arto Kinnunen | dbf2b43 | 2019-12-30 12:55:30 +0200 | [diff] [blame] | 379 | rn_2 ^= rn_3; |
| 380 | } while( i < rn_1 || rn_2 == 0 || rn_3 == 0 ); |
Piotr Nowicki | 057daa3 | 2020-08-03 13:08:33 +0200 | [diff] [blame] | 381 | |
| 382 | #endif /* MBEDTLS_FI_COUNTERMEASURES */ |
| 383 | return; |
Arto Kinnunen | 4c63b98 | 2019-12-02 15:01:41 +0200 | [diff] [blame] | 384 | } |
| 385 | |
Hanno Becker | 6a73978 | 2018-09-05 15:06:19 +0100 | [diff] [blame] | 386 | #if defined(MBEDTLS_HAVE_TIME_DATE) && !defined(MBEDTLS_PLATFORM_GMTIME_R_ALT) |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 387 | #include <time.h> |
Hanno Becker | cfeb70c | 2018-09-05 13:50:22 +0100 | [diff] [blame] | 388 | #if !defined(_WIN32) && (defined(unix) || \ |
Andres Amaya Garcia | 433f911 | 2018-09-05 12:01:57 +0100 | [diff] [blame] | 389 | defined(__unix) || defined(__unix__) || (defined(__APPLE__) && \ |
| 390 | defined(__MACH__))) |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 391 | #include <unistd.h> |
Hanno Becker | 323d801 | 2018-09-06 11:30:57 +0100 | [diff] [blame] | 392 | #endif /* !_WIN32 && (unix || __unix || __unix__ || |
| 393 | * (__APPLE__ && __MACH__)) */ |
Hanno Becker | 6f70581 | 2018-09-06 09:06:33 +0100 | [diff] [blame] | 394 | |
| 395 | #if !( ( defined(_POSIX_VERSION) && _POSIX_VERSION >= 200809L ) || \ |
| 396 | ( defined(_POSIX_THREAD_SAFE_FUNCTIONS ) && \ |
| 397 | _POSIX_THREAD_SAFE_FUNCTIONS >= 20112L ) ) |
Andres Amaya Garcia | ca04a01 | 2018-09-05 11:43:57 +0100 | [diff] [blame] | 398 | /* |
| 399 | * This is a convenience shorthand macro to avoid checking the long |
| 400 | * preprocessor conditions above. Ideally, we could expose this macro in |
Hanno Becker | 7dd82b4 | 2018-09-05 16:25:50 +0100 | [diff] [blame] | 401 | * platform_util.h and simply use it in platform_util.c, threading.c and |
Andres Amaya Garcia | ca04a01 | 2018-09-05 11:43:57 +0100 | [diff] [blame] | 402 | * threading.h. However, this macro is not part of the Mbed TLS public API, so |
Andres Amaya Garcia | 3c9733a | 2018-09-05 11:52:07 +0100 | [diff] [blame] | 403 | * we keep it private by only defining it in this file |
Andres Amaya Garcia | ca04a01 | 2018-09-05 11:43:57 +0100 | [diff] [blame] | 404 | */ |
Hanno Becker | f5106d5 | 2018-09-06 12:09:56 +0100 | [diff] [blame] | 405 | #if ! ( defined(_WIN32) && !defined(EFIX64) && !defined(EFI32) ) |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 406 | #define PLATFORM_UTIL_USE_GMTIME |
Hanno Becker | f5106d5 | 2018-09-06 12:09:56 +0100 | [diff] [blame] | 407 | #endif /* ! ( defined(_WIN32) && !defined(EFIX64) && !defined(EFI32) ) */ |
| 408 | |
Hanno Becker | 6f70581 | 2018-09-06 09:06:33 +0100 | [diff] [blame] | 409 | #endif /* !( ( defined(_POSIX_VERSION) && _POSIX_VERSION >= 200809L ) || \ |
| 410 | ( defined(_POSIX_THREAD_SAFE_FUNCTIONS ) && \ |
| 411 | _POSIX_THREAD_SAFE_FUNCTIONS >= 20112L ) ) */ |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 412 | |
Hanno Becker | 6a73978 | 2018-09-05 15:06:19 +0100 | [diff] [blame] | 413 | struct tm *mbedtls_platform_gmtime_r( const mbedtls_time_t *tt, |
| 414 | struct tm *tm_buf ) |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 415 | { |
| 416 | #if defined(_WIN32) && !defined(EFIX64) && !defined(EFI32) |
Andres Amaya Garcia | a658d7d | 2018-08-21 19:33:02 +0100 | [diff] [blame] | 417 | return( ( gmtime_s( tm_buf, tt ) == 0 ) ? tm_buf : NULL ); |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 418 | #elif !defined(PLATFORM_UTIL_USE_GMTIME) |
Andres Amaya Garcia | a658d7d | 2018-08-21 19:33:02 +0100 | [diff] [blame] | 419 | return( gmtime_r( tt, tm_buf ) ); |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 420 | #else |
| 421 | struct tm *lt; |
| 422 | |
| 423 | #if defined(MBEDTLS_THREADING_C) |
| 424 | if( mbedtls_mutex_lock( &mbedtls_threading_gmtime_mutex ) != 0 ) |
| 425 | return( NULL ); |
| 426 | #endif /* MBEDTLS_THREADING_C */ |
| 427 | |
| 428 | lt = gmtime( tt ); |
| 429 | |
| 430 | if( lt != NULL ) |
| 431 | { |
| 432 | memcpy( tm_buf, lt, sizeof( struct tm ) ); |
| 433 | } |
| 434 | |
| 435 | #if defined(MBEDTLS_THREADING_C) |
| 436 | if( mbedtls_mutex_unlock( &mbedtls_threading_gmtime_mutex ) != 0 ) |
| 437 | return( NULL ); |
| 438 | #endif /* MBEDTLS_THREADING_C */ |
| 439 | |
Andres Amaya Garcia | a658d7d | 2018-08-21 19:33:02 +0100 | [diff] [blame] | 440 | return( ( lt == NULL ) ? NULL : tm_buf ); |
| 441 | #endif /* _WIN32 && !EFIX64 && !EFI32 */ |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 442 | } |
Hanno Becker | 6a73978 | 2018-09-05 15:06:19 +0100 | [diff] [blame] | 443 | #endif /* MBEDTLS_HAVE_TIME_DATE && MBEDTLS_PLATFORM_GMTIME_R_ALT */ |
Arto Kinnunen | 0b62ce8 | 2019-09-04 14:04:57 +0300 | [diff] [blame] | 444 | |
Andrzej Kurek | a793237 | 2020-09-19 07:56:06 +0200 | [diff] [blame^] | 445 | #if defined(MBEDTLS_VALIDATE_AES_KEYS_INTEGRITY) || defined(MBEDTLS_VALIDATE_SSL_KEYS_INTEGRITY) |
| 446 | uint32_t mbedtls_hash( const void *data, size_t data_len_bytes ) |
| 447 | { |
| 448 | uint32_t result = 0; |
| 449 | size_t i; |
| 450 | /* data_len_bytes - only multiples of 4 are considered, rest is truncated */ |
| 451 | for( i = 0; i < data_len_bytes >> 2; i++ ) |
| 452 | { |
| 453 | result ^= ( (uint32_t*) data )[i]; |
| 454 | } |
| 455 | return result; |
| 456 | } |
| 457 | #endif |
| 458 | |
Arto Kinnunen | ee9bfca | 2019-09-06 16:59:00 +0300 | [diff] [blame] | 459 | unsigned char* mbedtls_platform_put_uint32_be( unsigned char *buf, |
Arto Kinnunen | 4f4849a | 2019-09-09 10:21:18 +0300 | [diff] [blame] | 460 | size_t num ) |
Arto Kinnunen | 0b62ce8 | 2019-09-04 14:04:57 +0300 | [diff] [blame] | 461 | { |
| 462 | *buf++ = (unsigned char) ( num >> 24 ); |
| 463 | *buf++ = (unsigned char) ( num >> 16 ); |
| 464 | *buf++ = (unsigned char) ( num >> 8 ); |
| 465 | *buf++ = (unsigned char) ( num ); |
| 466 | |
| 467 | return buf; |
| 468 | } |
| 469 | |
Arto Kinnunen | ee9bfca | 2019-09-06 16:59:00 +0300 | [diff] [blame] | 470 | unsigned char* mbedtls_platform_put_uint24_be( unsigned char *buf, |
Arto Kinnunen | 4f4849a | 2019-09-09 10:21:18 +0300 | [diff] [blame] | 471 | size_t num ) |
Arto Kinnunen | 0b62ce8 | 2019-09-04 14:04:57 +0300 | [diff] [blame] | 472 | { |
| 473 | *buf++ = (unsigned char) ( num >> 16 ); |
| 474 | *buf++ = (unsigned char) ( num >> 8 ); |
| 475 | *buf++ = (unsigned char) ( num ); |
| 476 | |
| 477 | return buf; |
| 478 | } |
| 479 | |
Arto Kinnunen | ee9bfca | 2019-09-06 16:59:00 +0300 | [diff] [blame] | 480 | unsigned char* mbedtls_platform_put_uint16_be( unsigned char *buf, |
Arto Kinnunen | 4f4849a | 2019-09-09 10:21:18 +0300 | [diff] [blame] | 481 | size_t num ) |
Arto Kinnunen | 0b62ce8 | 2019-09-04 14:04:57 +0300 | [diff] [blame] | 482 | { |
| 483 | *buf++ = (unsigned char) ( num >> 8 ); |
| 484 | *buf++ = (unsigned char) ( num ); |
| 485 | |
| 486 | return buf; |
| 487 | } |
| 488 | |
Arto Kinnunen | 4f4849a | 2019-09-09 10:21:18 +0300 | [diff] [blame] | 489 | size_t mbedtls_platform_get_uint32_be( const unsigned char *buf ) |
Arto Kinnunen | 0b62ce8 | 2019-09-04 14:04:57 +0300 | [diff] [blame] | 490 | { |
| 491 | return ( ( (unsigned int) buf[0] << 24 ) | |
| 492 | ( (unsigned int) buf[1] << 16 ) | |
| 493 | ( (unsigned int) buf[2] << 8 ) | |
| 494 | ( (unsigned int) buf[3] ) ); |
| 495 | } |
| 496 | |
Arto Kinnunen | 4f4849a | 2019-09-09 10:21:18 +0300 | [diff] [blame] | 497 | size_t mbedtls_platform_get_uint24_be( const unsigned char *buf ) |
Arto Kinnunen | 0b62ce8 | 2019-09-04 14:04:57 +0300 | [diff] [blame] | 498 | { |
| 499 | return ( ( buf[0] << 16 ) | |
| 500 | ( buf[1] << 8) | |
| 501 | ( buf[2] ) ); |
| 502 | } |
| 503 | |
Arto Kinnunen | 4f4849a | 2019-09-09 10:21:18 +0300 | [diff] [blame] | 504 | size_t mbedtls_platform_get_uint16_be( const unsigned char *buf ) |
Arto Kinnunen | 0b62ce8 | 2019-09-04 14:04:57 +0300 | [diff] [blame] | 505 | { |
| 506 | return ( ( buf[0] << 8 ) | |
| 507 | ( buf[1] ) ); |
| 508 | } |