xref: /aosp_15_r20/external/tink/cc/util/secret_data_internal.h (revision e7b1675dde1b92d52ec075b0a92829627f2c52a5)
1*e7b1675dSTing-Kang Chang // Copyright 2020 Google LLC
2*e7b1675dSTing-Kang Chang //
3*e7b1675dSTing-Kang Chang // Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang // you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang // You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang //
7*e7b1675dSTing-Kang Chang //     http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang //
9*e7b1675dSTing-Kang Chang // Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang // distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang // See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang // limitations under the License.
14*e7b1675dSTing-Kang Chang //
15*e7b1675dSTing-Kang Chang ///////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang 
17*e7b1675dSTing-Kang Chang #ifndef TINK_UTIL_SECRET_DATA_INTERNAL_H_
18*e7b1675dSTing-Kang Chang #define TINK_UTIL_SECRET_DATA_INTERNAL_H_
19*e7b1675dSTing-Kang Chang 
20*e7b1675dSTing-Kang Chang #include <cstddef>
21*e7b1675dSTing-Kang Chang #include <cstdlib>
22*e7b1675dSTing-Kang Chang #include <limits>
23*e7b1675dSTing-Kang Chang #include <new>
24*e7b1675dSTing-Kang Chang 
25*e7b1675dSTing-Kang Chang #include "absl/base/attributes.h"
26*e7b1675dSTing-Kang Chang #include "absl/base/config.h"
27*e7b1675dSTing-Kang Chang #include "openssl/crypto.h"
28*e7b1675dSTing-Kang Chang 
29*e7b1675dSTing-Kang Chang namespace crypto {
30*e7b1675dSTing-Kang Chang namespace tink {
31*e7b1675dSTing-Kang Chang namespace util {
32*e7b1675dSTing-Kang Chang namespace internal {
33*e7b1675dSTing-Kang Chang 
SafeZeroMemory(void * ptr,std::size_t size)34*e7b1675dSTing-Kang Chang inline void SafeZeroMemory(void* ptr, std::size_t size) {
35*e7b1675dSTing-Kang Chang   OPENSSL_cleanse(ptr, size);
36*e7b1675dSTing-Kang Chang }
37*e7b1675dSTing-Kang Chang 
38*e7b1675dSTing-Kang Chang template <typename T>
39*e7b1675dSTing-Kang Chang struct SanitizingAllocatorImpl {
40*e7b1675dSTing-Kang Chang   // If aligned operator new is not supported this only supports under aligned
41*e7b1675dSTing-Kang Chang   // types.
42*e7b1675dSTing-Kang Chang #ifndef __cpp_aligned_new
43*e7b1675dSTing-Kang Chang   static_assert(alignof(T) <= alignof(std::max_align_t),
44*e7b1675dSTing-Kang Chang                 "SanitizingAllocator<T> only supports fundamental alignment "
45*e7b1675dSTing-Kang Chang                 "before C++17");
46*e7b1675dSTing-Kang Chang #endif
47*e7b1675dSTing-Kang Chang 
allocateSanitizingAllocatorImpl48*e7b1675dSTing-Kang Chang   static T* allocate(std::size_t n) {
49*e7b1675dSTing-Kang Chang     if (n > std::numeric_limits<std::size_t>::max() / sizeof(T)) {
50*e7b1675dSTing-Kang Chang #ifdef ABSL_HAVE_EXCEPTIONS
51*e7b1675dSTing-Kang Chang       throw std::bad_array_new_length();
52*e7b1675dSTing-Kang Chang #else
53*e7b1675dSTing-Kang Chang       std::abort();
54*e7b1675dSTing-Kang Chang #endif
55*e7b1675dSTing-Kang Chang     }
56*e7b1675dSTing-Kang Chang     std::size_t size = n * sizeof(T);
57*e7b1675dSTing-Kang Chang #ifdef __cpp_aligned_new
58*e7b1675dSTing-Kang Chang     return static_cast<T*>(::operator new(size, std::align_val_t(alignof(T))));
59*e7b1675dSTing-Kang Chang #else
60*e7b1675dSTing-Kang Chang     return static_cast<T*>(::operator new(size));
61*e7b1675dSTing-Kang Chang #endif
62*e7b1675dSTing-Kang Chang   }
63*e7b1675dSTing-Kang Chang 
deallocateSanitizingAllocatorImpl64*e7b1675dSTing-Kang Chang   static void deallocate(void* ptr, std::size_t n) {
65*e7b1675dSTing-Kang Chang     SafeZeroMemory(ptr, n * sizeof(T));
66*e7b1675dSTing-Kang Chang #ifdef __cpp_aligned_new
67*e7b1675dSTing-Kang Chang     ::operator delete(ptr, std::align_val_t(alignof(T)));
68*e7b1675dSTing-Kang Chang #else
69*e7b1675dSTing-Kang Chang     ::operator delete(ptr);
70*e7b1675dSTing-Kang Chang #endif
71*e7b1675dSTing-Kang Chang   }
72*e7b1675dSTing-Kang Chang };
73*e7b1675dSTing-Kang Chang 
74*e7b1675dSTing-Kang Chang // Specialization for malloc-like aligned storage.
75*e7b1675dSTing-Kang Chang template <>
76*e7b1675dSTing-Kang Chang struct SanitizingAllocatorImpl<void> {
77*e7b1675dSTing-Kang Chang   static void* allocate(std::size_t n) { return std::malloc(n); }
78*e7b1675dSTing-Kang Chang   static void deallocate(void* ptr, std::size_t n) {
79*e7b1675dSTing-Kang Chang     SafeZeroMemory(ptr, n);
80*e7b1675dSTing-Kang Chang     return std::free(ptr);
81*e7b1675dSTing-Kang Chang   }
82*e7b1675dSTing-Kang Chang };
83*e7b1675dSTing-Kang Chang 
84*e7b1675dSTing-Kang Chang template <typename T>
85*e7b1675dSTing-Kang Chang struct SanitizingAllocator {
86*e7b1675dSTing-Kang Chang   typedef T value_type;
87*e7b1675dSTing-Kang Chang 
88*e7b1675dSTing-Kang Chang   SanitizingAllocator() = default;
89*e7b1675dSTing-Kang Chang   template <class U>
90*e7b1675dSTing-Kang Chang   explicit constexpr SanitizingAllocator(
91*e7b1675dSTing-Kang Chang       const SanitizingAllocator<U>&) noexcept {}
92*e7b1675dSTing-Kang Chang 
93*e7b1675dSTing-Kang Chang   ABSL_MUST_USE_RESULT T* allocate(std::size_t n) {
94*e7b1675dSTing-Kang Chang     return SanitizingAllocatorImpl<T>::allocate(n);
95*e7b1675dSTing-Kang Chang   }
96*e7b1675dSTing-Kang Chang 
97*e7b1675dSTing-Kang Chang   void deallocate(T* ptr, std::size_t n) noexcept {
98*e7b1675dSTing-Kang Chang     SanitizingAllocatorImpl<T>::deallocate(ptr, n);
99*e7b1675dSTing-Kang Chang   }
100*e7b1675dSTing-Kang Chang 
101*e7b1675dSTing-Kang Chang   // Allocator requirements mandate definition of eq and neq operators
102*e7b1675dSTing-Kang Chang   bool operator==(const SanitizingAllocator&) { return true; }
103*e7b1675dSTing-Kang Chang   bool operator!=(const SanitizingAllocator&) { return false; }
104*e7b1675dSTing-Kang Chang };
105*e7b1675dSTing-Kang Chang 
106*e7b1675dSTing-Kang Chang }  // namespace internal
107*e7b1675dSTing-Kang Chang }  // namespace util
108*e7b1675dSTing-Kang Chang }  // namespace tink
109*e7b1675dSTing-Kang Chang }  // namespace crypto
110*e7b1675dSTing-Kang Chang 
111*e7b1675dSTing-Kang Chang #endif  // TINK_UTIL_SECRET_DATA_INTERNAL_H_
112