1 /* 2 * PSA ITS simulator over stdio files. 3 */ 4 /* 5 * Copyright The Mbed TLS Contributors 6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 7 */ 8 9 #include "common.h" 10 11 #if defined(MBEDTLS_PSA_ITS_FILE_C) 12 13 #include "mbedtls/platform.h" 14 15 #if defined(_WIN32) 16 #include <windows.h> 17 #endif 18 19 #include "psa_crypto_its.h" 20 21 #include <limits.h> 22 #include <stdint.h> 23 #include <stdio.h> 24 #include <string.h> 25 26 #if !defined(PSA_ITS_STORAGE_PREFIX) 27 #define PSA_ITS_STORAGE_PREFIX "" 28 #endif 29 30 #define PSA_ITS_STORAGE_FILENAME_PATTERN "%08x%08x" 31 #define PSA_ITS_STORAGE_SUFFIX ".psa_its" 32 #define PSA_ITS_STORAGE_FILENAME_LENGTH \ 33 (sizeof(PSA_ITS_STORAGE_PREFIX) - 1 + /*prefix without terminating 0*/ \ 34 16 + /*UID (64-bit number in hex)*/ \ 35 sizeof(PSA_ITS_STORAGE_SUFFIX) - 1 + /*suffix without terminating 0*/ \ 36 1 /*terminating null byte*/) 37 #define PSA_ITS_STORAGE_TEMP \ 38 PSA_ITS_STORAGE_PREFIX "tempfile" PSA_ITS_STORAGE_SUFFIX 39 40 /* The maximum value of psa_storage_info_t.size */ 41 #define PSA_ITS_MAX_SIZE 0xffffffff 42 43 #define PSA_ITS_MAGIC_STRING "PSA\0ITS\0" 44 #define PSA_ITS_MAGIC_LENGTH 8 45 46 /* As rename fails on Windows if the new filepath already exists, 47 * use MoveFileExA with the MOVEFILE_REPLACE_EXISTING flag instead. 48 * Returns 0 on success, nonzero on failure. */ 49 #if defined(_WIN32) 50 #define rename_replace_existing(oldpath, newpath) \ 51 (!MoveFileExA(oldpath, newpath, MOVEFILE_REPLACE_EXISTING)) 52 #else 53 #define rename_replace_existing(oldpath, newpath) rename(oldpath, newpath) 54 #endif 55 56 typedef struct { 57 uint8_t magic[PSA_ITS_MAGIC_LENGTH]; 58 uint8_t size[sizeof(uint32_t)]; 59 uint8_t flags[sizeof(psa_storage_create_flags_t)]; 60 } psa_its_file_header_t; 61 62 static void psa_its_fill_filename(psa_storage_uid_t uid, char *filename) 63 { 64 /* Break up the UID into two 32-bit pieces so as not to rely on 65 * long long support in snprintf. */ 66 mbedtls_snprintf(filename, PSA_ITS_STORAGE_FILENAME_LENGTH, 67 "%s" PSA_ITS_STORAGE_FILENAME_PATTERN "%s", 68 PSA_ITS_STORAGE_PREFIX, 69 (unsigned) (uid >> 32), 70 (unsigned) (uid & 0xffffffff), 71 PSA_ITS_STORAGE_SUFFIX); 72 } 73 74 static psa_status_t psa_its_read_file(psa_storage_uid_t uid, 75 struct psa_storage_info_t *p_info, 76 FILE **p_stream) 77 { 78 char filename[PSA_ITS_STORAGE_FILENAME_LENGTH]; 79 psa_its_file_header_t header; 80 size_t n; 81 82 *p_stream = NULL; 83 psa_its_fill_filename(uid, filename); 84 *p_stream = fopen(filename, "rb"); 85 if (*p_stream == NULL) { 86 return PSA_ERROR_DOES_NOT_EXIST; 87 } 88 89 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */ 90 mbedtls_setbuf(*p_stream, NULL); 91 92 n = fread(&header, 1, sizeof(header), *p_stream); 93 if (n != sizeof(header)) { 94 return PSA_ERROR_DATA_CORRUPT; 95 } 96 if (memcmp(header.magic, PSA_ITS_MAGIC_STRING, 97 PSA_ITS_MAGIC_LENGTH) != 0) { 98 return PSA_ERROR_DATA_CORRUPT; 99 } 100 101 p_info->size = MBEDTLS_GET_UINT32_LE(header.size, 0); 102 p_info->flags = MBEDTLS_GET_UINT32_LE(header.flags, 0); 103 104 return PSA_SUCCESS; 105 } 106 107 psa_status_t psa_its_get_info(psa_storage_uid_t uid, 108 struct psa_storage_info_t *p_info) 109 { 110 psa_status_t status; 111 FILE *stream = NULL; 112 status = psa_its_read_file(uid, p_info, &stream); 113 if (stream != NULL) { 114 fclose(stream); 115 } 116 return status; 117 } 118 119 psa_status_t psa_its_get(psa_storage_uid_t uid, 120 uint32_t data_offset, 121 uint32_t data_length, 122 void *p_data, 123 size_t *p_data_length) 124 { 125 psa_status_t status; 126 FILE *stream = NULL; 127 size_t n; 128 struct psa_storage_info_t info; 129 130 status = psa_its_read_file(uid, &info, &stream); 131 if (status != PSA_SUCCESS) { 132 goto exit; 133 } 134 status = PSA_ERROR_INVALID_ARGUMENT; 135 if (data_offset + data_length < data_offset) { 136 goto exit; 137 } 138 #if SIZE_MAX < 0xffffffff 139 if (data_offset + data_length > SIZE_MAX) { 140 goto exit; 141 } 142 #endif 143 if (data_offset + data_length > info.size) { 144 goto exit; 145 } 146 147 status = PSA_ERROR_STORAGE_FAILURE; 148 #if LONG_MAX < 0xffffffff 149 while (data_offset > LONG_MAX) { 150 if (fseek(stream, LONG_MAX, SEEK_CUR) != 0) { 151 goto exit; 152 } 153 data_offset -= LONG_MAX; 154 } 155 #endif 156 if (fseek(stream, data_offset, SEEK_CUR) != 0) { 157 goto exit; 158 } 159 n = fread(p_data, 1, data_length, stream); 160 if (n != data_length) { 161 goto exit; 162 } 163 status = PSA_SUCCESS; 164 if (p_data_length != NULL) { 165 *p_data_length = n; 166 } 167 168 exit: 169 if (stream != NULL) { 170 fclose(stream); 171 } 172 return status; 173 } 174 175 psa_status_t psa_its_set(psa_storage_uid_t uid, 176 uint32_t data_length, 177 const void *p_data, 178 psa_storage_create_flags_t create_flags) 179 { 180 if (uid == 0) { 181 return PSA_ERROR_INVALID_HANDLE; 182 } 183 184 psa_status_t status = PSA_ERROR_STORAGE_FAILURE; 185 char filename[PSA_ITS_STORAGE_FILENAME_LENGTH]; 186 FILE *stream = NULL; 187 psa_its_file_header_t header; 188 size_t n; 189 190 memcpy(header.magic, PSA_ITS_MAGIC_STRING, PSA_ITS_MAGIC_LENGTH); 191 MBEDTLS_PUT_UINT32_LE(data_length, header.size, 0); 192 MBEDTLS_PUT_UINT32_LE(create_flags, header.flags, 0); 193 194 psa_its_fill_filename(uid, filename); 195 stream = fopen(PSA_ITS_STORAGE_TEMP, "wb"); 196 197 if (stream == NULL) { 198 goto exit; 199 } 200 201 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */ 202 mbedtls_setbuf(stream, NULL); 203 204 status = PSA_ERROR_INSUFFICIENT_STORAGE; 205 n = fwrite(&header, 1, sizeof(header), stream); 206 if (n != sizeof(header)) { 207 goto exit; 208 } 209 if (data_length != 0) { 210 n = fwrite(p_data, 1, data_length, stream); 211 if (n != data_length) { 212 goto exit; 213 } 214 } 215 status = PSA_SUCCESS; 216 217 exit: 218 if (stream != NULL) { 219 int ret = fclose(stream); 220 if (status == PSA_SUCCESS && ret != 0) { 221 status = PSA_ERROR_INSUFFICIENT_STORAGE; 222 } 223 } 224 if (status == PSA_SUCCESS) { 225 if (rename_replace_existing(PSA_ITS_STORAGE_TEMP, filename) != 0) { 226 status = PSA_ERROR_STORAGE_FAILURE; 227 } 228 } 229 /* The temporary file may still exist, but only in failure cases where 230 * we're already reporting an error. So there's nothing we can do on 231 * failure. If the function succeeded, and in some error cases, the 232 * temporary file doesn't exist and so remove() is expected to fail. 233 * Thus we just ignore the return status of remove(). */ 234 (void) remove(PSA_ITS_STORAGE_TEMP); 235 return status; 236 } 237 238 psa_status_t psa_its_remove(psa_storage_uid_t uid) 239 { 240 char filename[PSA_ITS_STORAGE_FILENAME_LENGTH]; 241 FILE *stream; 242 psa_its_fill_filename(uid, filename); 243 stream = fopen(filename, "rb"); 244 if (stream == NULL) { 245 return PSA_ERROR_DOES_NOT_EXIST; 246 } 247 fclose(stream); 248 if (remove(filename) != 0) { 249 return PSA_ERROR_STORAGE_FAILURE; 250 } 251 return PSA_SUCCESS; 252 } 253 254 #endif /* MBEDTLS_PSA_ITS_FILE_C */ 255