Merge pull request #1188 from davidhorstmann-arm/interruptible-sign-hash-buffer-protection

Add buffer protection for interruptible sign/verify
This commit is contained in:
David Horstmann 2024-03-12 14:47:00 +00:00 committed by GitHub
commit 3232842d63
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
3 changed files with 60 additions and 48 deletions

View File

@ -3556,13 +3556,15 @@ static psa_status_t psa_sign_hash_abort_internal(
psa_status_t psa_sign_hash_start( psa_status_t psa_sign_hash_start(
psa_sign_hash_interruptible_operation_t *operation, psa_sign_hash_interruptible_operation_t *operation,
mbedtls_svc_key_id_t key, psa_algorithm_t alg, mbedtls_svc_key_id_t key, psa_algorithm_t alg,
const uint8_t *hash, size_t hash_length) const uint8_t *hash_external, size_t hash_length)
{ {
psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
psa_status_t unlock_status = PSA_ERROR_CORRUPTION_DETECTED; psa_status_t unlock_status = PSA_ERROR_CORRUPTION_DETECTED;
psa_key_slot_t *slot; psa_key_slot_t *slot;
psa_key_attributes_t attributes; psa_key_attributes_t attributes;
LOCAL_INPUT_DECLARE(hash_external, hash);
/* Check that start has not been previously called, or operation has not /* Check that start has not been previously called, or operation has not
* previously errored. */ * previously errored. */
if (operation->id != 0 || operation->error_occurred) { if (operation->id != 0 || operation->error_occurred) {
@ -3588,6 +3590,8 @@ psa_status_t psa_sign_hash_start(
goto exit; goto exit;
} }
LOCAL_INPUT_ALLOC(hash_external, hash_length, hash);
attributes = (psa_key_attributes_t) { attributes = (psa_key_attributes_t) {
.core = slot->attr .core = slot->attr
}; };
@ -3612,17 +3616,21 @@ exit:
operation->error_occurred = 1; operation->error_occurred = 1;
} }
LOCAL_INPUT_FREE(hash_external, hash);
return (status == PSA_SUCCESS) ? unlock_status : status; return (status == PSA_SUCCESS) ? unlock_status : status;
} }
psa_status_t psa_sign_hash_complete( psa_status_t psa_sign_hash_complete(
psa_sign_hash_interruptible_operation_t *operation, psa_sign_hash_interruptible_operation_t *operation,
uint8_t *signature, size_t signature_size, uint8_t *signature_external, size_t signature_size,
size_t *signature_length) size_t *signature_length)
{ {
psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
LOCAL_OUTPUT_DECLARE(signature_external, signature);
*signature_length = 0; *signature_length = 0;
/* Check that start has been called first, and that operation has not /* Check that start has been called first, and that operation has not
@ -3639,6 +3647,8 @@ psa_status_t psa_sign_hash_complete(
goto exit; goto exit;
} }
LOCAL_OUTPUT_ALLOC(signature_external, signature_size, signature);
status = psa_driver_wrapper_sign_hash_complete(operation, signature, status = psa_driver_wrapper_sign_hash_complete(operation, signature,
signature_size, signature_size,
signature_length); signature_length);
@ -3648,8 +3658,10 @@ psa_status_t psa_sign_hash_complete(
exit: exit:
psa_wipe_tag_output_buffer(signature, status, signature_size, if (signature != NULL) {
*signature_length); psa_wipe_tag_output_buffer(signature, status, signature_size,
*signature_length);
}
if (status != PSA_OPERATION_INCOMPLETE) { if (status != PSA_OPERATION_INCOMPLETE) {
if (status != PSA_SUCCESS) { if (status != PSA_SUCCESS) {
@ -3659,6 +3671,8 @@ exit:
psa_sign_hash_abort_internal(operation); psa_sign_hash_abort_internal(operation);
} }
LOCAL_OUTPUT_FREE(signature_external, signature);
return status; return status;
} }
@ -3705,13 +3719,16 @@ static psa_status_t psa_verify_hash_abort_internal(
psa_status_t psa_verify_hash_start( psa_status_t psa_verify_hash_start(
psa_verify_hash_interruptible_operation_t *operation, psa_verify_hash_interruptible_operation_t *operation,
mbedtls_svc_key_id_t key, psa_algorithm_t alg, mbedtls_svc_key_id_t key, psa_algorithm_t alg,
const uint8_t *hash, size_t hash_length, const uint8_t *hash_external, size_t hash_length,
const uint8_t *signature, size_t signature_length) const uint8_t *signature_external, size_t signature_length)
{ {
psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
psa_status_t unlock_status = PSA_ERROR_CORRUPTION_DETECTED; psa_status_t unlock_status = PSA_ERROR_CORRUPTION_DETECTED;
psa_key_slot_t *slot; psa_key_slot_t *slot;
LOCAL_INPUT_DECLARE(hash_external, hash);
LOCAL_INPUT_DECLARE(signature_external, signature);
/* Check that start has not been previously called, or operation has not /* Check that start has not been previously called, or operation has not
* previously errored. */ * previously errored. */
if (operation->id != 0 || operation->error_occurred) { if (operation->id != 0 || operation->error_occurred) {
@ -3733,6 +3750,9 @@ psa_status_t psa_verify_hash_start(
return status; return status;
} }
LOCAL_INPUT_ALLOC(hash_external, hash_length, hash);
LOCAL_INPUT_ALLOC(signature_external, signature_length, signature);
psa_key_attributes_t attributes = { psa_key_attributes_t attributes = {
.core = slot->attr .core = slot->attr
}; };
@ -3745,6 +3765,9 @@ psa_status_t psa_verify_hash_start(
slot->key.bytes, slot->key.bytes,
alg, hash, hash_length, alg, hash, hash_length,
signature, signature_length); signature, signature_length);
#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
exit:
#endif
if (status != PSA_SUCCESS) { if (status != PSA_SUCCESS) {
operation->error_occurred = 1; operation->error_occurred = 1;
@ -3757,6 +3780,9 @@ psa_status_t psa_verify_hash_start(
operation->error_occurred = 1; operation->error_occurred = 1;
} }
LOCAL_INPUT_FREE(hash_external, hash);
LOCAL_INPUT_FREE(signature_external, signature);
return (status == PSA_SUCCESS) ? unlock_status : status; return (status == PSA_SUCCESS) ? unlock_status : status;
} }

View File

@ -142,48 +142,14 @@ class PSAWrapperGenerator(c_wrapper_generator.Base):
_buffer_name: Optional[str]) -> bool: _buffer_name: Optional[str]) -> bool:
"""Whether the specified buffer argument to a PSA function should be copied. """Whether the specified buffer argument to a PSA function should be copied.
""" """
#pylint: disable=too-many-return-statements # False-positives that do not need buffer copying
if function_name.startswith('psa_pake'): if function_name in ('mbedtls_psa_inject_entropy',
return True 'psa_crypto_driver_pake_get_password',
if function_name.startswith('psa_aead'): 'psa_crypto_driver_pake_get_user',
return True 'psa_crypto_driver_pake_get_peer'):
if function_name in {'psa_cipher_encrypt', 'psa_cipher_decrypt', return False
'psa_cipher_update', 'psa_cipher_finish',
'psa_cipher_generate_iv', 'psa_cipher_set_iv'}: return True
return True
if function_name in ('psa_key_derivation_output_bytes',
'psa_key_derivation_input_bytes'):
return True
if function_name in ('psa_import_key',
'psa_export_key',
'psa_export_public_key'):
return True
if function_name in ('psa_sign_message',
'psa_verify_message',
'psa_sign_hash',
'psa_verify_hash'):
return True
if function_name in ('psa_hash_update',
'psa_hash_finish',
'psa_hash_verify',
'psa_hash_compute',
'psa_hash_compare'):
return True
if function_name in ('psa_key_derivation_key_agreement',
'psa_raw_key_agreement'):
return True
if function_name == 'psa_generate_random':
return True
if function_name in ('psa_mac_update',
'psa_mac_sign_finish',
'psa_mac_verify_finish',
'psa_mac_compute',
'psa_mac_verify'):
return True
if function_name in ('psa_asymmetric_encrypt',
'psa_asymmetric_decrypt'):
return True
return False
def _write_function_call(self, out: typing_util.Writable, def _write_function_call(self, out: typing_util.Writable,
function: c_wrapper_generator.FunctionInfo, function: c_wrapper_generator.FunctionInfo,

View File

@ -1162,7 +1162,13 @@ psa_status_t mbedtls_test_wrap_psa_sign_hash_complete(
size_t arg2_signature_size, size_t arg2_signature_size,
size_t *arg3_signature_length) size_t *arg3_signature_length)
{ {
#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
MBEDTLS_TEST_MEMORY_POISON(arg1_signature, arg2_signature_size);
#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
psa_status_t status = (psa_sign_hash_complete)(arg0_operation, arg1_signature, arg2_signature_size, arg3_signature_length); psa_status_t status = (psa_sign_hash_complete)(arg0_operation, arg1_signature, arg2_signature_size, arg3_signature_length);
#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
MBEDTLS_TEST_MEMORY_UNPOISON(arg1_signature, arg2_signature_size);
#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
return status; return status;
} }
@ -1174,7 +1180,13 @@ psa_status_t mbedtls_test_wrap_psa_sign_hash_start(
const uint8_t *arg3_hash, const uint8_t *arg3_hash,
size_t arg4_hash_length) size_t arg4_hash_length)
{ {
#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
MBEDTLS_TEST_MEMORY_POISON(arg3_hash, arg4_hash_length);
#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
psa_status_t status = (psa_sign_hash_start)(arg0_operation, arg1_key, arg2_alg, arg3_hash, arg4_hash_length); psa_status_t status = (psa_sign_hash_start)(arg0_operation, arg1_key, arg2_alg, arg3_hash, arg4_hash_length);
#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
MBEDTLS_TEST_MEMORY_UNPOISON(arg3_hash, arg4_hash_length);
#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
return status; return status;
} }
@ -1247,7 +1259,15 @@ psa_status_t mbedtls_test_wrap_psa_verify_hash_start(
const uint8_t *arg5_signature, const uint8_t *arg5_signature,
size_t arg6_signature_length) size_t arg6_signature_length)
{ {
#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
MBEDTLS_TEST_MEMORY_POISON(arg3_hash, arg4_hash_length);
MBEDTLS_TEST_MEMORY_POISON(arg5_signature, arg6_signature_length);
#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
psa_status_t status = (psa_verify_hash_start)(arg0_operation, arg1_key, arg2_alg, arg3_hash, arg4_hash_length, arg5_signature, arg6_signature_length); psa_status_t status = (psa_verify_hash_start)(arg0_operation, arg1_key, arg2_alg, arg3_hash, arg4_hash_length, arg5_signature, arg6_signature_length);
#if defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS)
MBEDTLS_TEST_MEMORY_UNPOISON(arg3_hash, arg4_hash_length);
MBEDTLS_TEST_MEMORY_UNPOISON(arg5_signature, arg6_signature_length);
#endif /* defined(MBEDTLS_PSA_COPY_CALLER_BUFFERS) */
return status; return status;
} }