mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-22 13:05:41 +01:00
Add MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN
This option allows to test the constant-flow nature of selected code, using MemSan and the fundamental observation behind ctgrind that the set of operations allowed on undefined memory by dynamic analysers is the same as the set of operations allowed on secret data to avoid leaking it to a local attacker via side channels, namely, any operation except branching and dereferencing. (This isn't the full story, as on some CPUs some instructions have variable execution depending on the inputs, most notably division and on some cores multiplication. However, testing that no branch or memory access depends on secret data is already a good start.) Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
This commit is contained in:
parent
368fc65f80
commit
a237722118
@ -199,6 +199,16 @@
|
|||||||
#error "MBEDTLS_ENTROPY_FORCE_SHA256 defined, but not all prerequisites"
|
#error "MBEDTLS_ENTROPY_FORCE_SHA256 defined, but not all prerequisites"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#if defined(__has_feature)
|
||||||
|
#if __has_feature(memory_sanitizer)
|
||||||
|
#define MBEDTLS_HAS_MEMSAN
|
||||||
|
#endif
|
||||||
|
#endif
|
||||||
|
#if defined(MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN) && !defined(MBEDTLS_HAS_MEMSAN)
|
||||||
|
#error "MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN requires building with MemorySanitizer"
|
||||||
|
#endif
|
||||||
|
#undef MBEDTLS_HAS_MEMSAN
|
||||||
|
|
||||||
#if defined(MBEDTLS_TEST_NULL_ENTROPY) && \
|
#if defined(MBEDTLS_TEST_NULL_ENTROPY) && \
|
||||||
( !defined(MBEDTLS_ENTROPY_C) || !defined(MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES) )
|
( !defined(MBEDTLS_ENTROPY_C) || !defined(MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES) )
|
||||||
#error "MBEDTLS_TEST_NULL_ENTROPY defined, but not all prerequisites"
|
#error "MBEDTLS_TEST_NULL_ENTROPY defined, but not all prerequisites"
|
||||||
|
@ -551,6 +551,19 @@
|
|||||||
//#define MBEDTLS_ECP_RANDOMIZE_MXZ_ALT
|
//#define MBEDTLS_ECP_RANDOMIZE_MXZ_ALT
|
||||||
//#define MBEDTLS_ECP_NORMALIZE_MXZ_ALT
|
//#define MBEDTLS_ECP_NORMALIZE_MXZ_ALT
|
||||||
|
|
||||||
|
/**
|
||||||
|
* \def MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN
|
||||||
|
*
|
||||||
|
* Enable testing of the constant-flow nature of some sensitive functions with
|
||||||
|
* clang's MemorySanitizer. This causes some existing tests to also test
|
||||||
|
* non-functional properties of the code under test.
|
||||||
|
*
|
||||||
|
* This setting requires compiling with clang -fsanitize=memory.
|
||||||
|
*
|
||||||
|
* Uncomment to enable testing of the constant-flow nature of seletected code.
|
||||||
|
*/
|
||||||
|
//#define MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \def MBEDTLS_TEST_NULL_ENTROPY
|
* \def MBEDTLS_TEST_NULL_ENTROPY
|
||||||
*
|
*
|
||||||
|
@ -279,6 +279,9 @@ static const char *features[] = {
|
|||||||
#if defined(MBEDTLS_ECP_NORMALIZE_MXZ_ALT)
|
#if defined(MBEDTLS_ECP_NORMALIZE_MXZ_ALT)
|
||||||
"MBEDTLS_ECP_NORMALIZE_MXZ_ALT",
|
"MBEDTLS_ECP_NORMALIZE_MXZ_ALT",
|
||||||
#endif /* MBEDTLS_ECP_NORMALIZE_MXZ_ALT */
|
#endif /* MBEDTLS_ECP_NORMALIZE_MXZ_ALT */
|
||||||
|
#if defined(MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN)
|
||||||
|
"MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN",
|
||||||
|
#endif /* MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN */
|
||||||
#if defined(MBEDTLS_TEST_NULL_ENTROPY)
|
#if defined(MBEDTLS_TEST_NULL_ENTROPY)
|
||||||
"MBEDTLS_TEST_NULL_ENTROPY",
|
"MBEDTLS_TEST_NULL_ENTROPY",
|
||||||
#endif /* MBEDTLS_TEST_NULL_ENTROPY */
|
#endif /* MBEDTLS_TEST_NULL_ENTROPY */
|
||||||
|
@ -741,6 +741,14 @@ int query_config( const char *config )
|
|||||||
}
|
}
|
||||||
#endif /* MBEDTLS_ECP_NORMALIZE_MXZ_ALT */
|
#endif /* MBEDTLS_ECP_NORMALIZE_MXZ_ALT */
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN)
|
||||||
|
if( strcmp( "MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN", config ) == 0 )
|
||||||
|
{
|
||||||
|
MACRO_EXPANSION_TO_STR( MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN );
|
||||||
|
return( 0 );
|
||||||
|
}
|
||||||
|
#endif /* MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN */
|
||||||
|
|
||||||
#if defined(MBEDTLS_TEST_NULL_ENTROPY)
|
#if defined(MBEDTLS_TEST_NULL_ENTROPY)
|
||||||
if( strcmp( "MBEDTLS_TEST_NULL_ENTROPY", config ) == 0 )
|
if( strcmp( "MBEDTLS_TEST_NULL_ENTROPY", config ) == 0 )
|
||||||
{
|
{
|
||||||
|
@ -128,6 +128,7 @@ MBEDTLS_REMOVE_3DES_CIPHERSUITES
|
|||||||
MBEDTLS_REMOVE_ARC4_CIPHERSUITES
|
MBEDTLS_REMOVE_ARC4_CIPHERSUITES
|
||||||
MBEDTLS_RSA_NO_CRT
|
MBEDTLS_RSA_NO_CRT
|
||||||
MBEDTLS_SSL_HW_RECORD_ACCEL
|
MBEDTLS_SSL_HW_RECORD_ACCEL
|
||||||
|
MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN
|
||||||
MBEDTLS_TEST_NULL_ENTROPY
|
MBEDTLS_TEST_NULL_ENTROPY
|
||||||
MBEDTLS_X509_ALLOW_UNSUPPORTED_CRITICAL_EXTENSION
|
MBEDTLS_X509_ALLOW_UNSUPPORTED_CRITICAL_EXTENSION
|
||||||
MBEDTLS_ZLIB_SUPPORT
|
MBEDTLS_ZLIB_SUPPORT
|
||||||
|
@ -1031,6 +1031,18 @@ component_test_full_cmake_clang () {
|
|||||||
if_build_succeeded env OPENSSL_CMD="$OPENSSL_NEXT" tests/compat.sh -e '^$' -f 'ARIA\|CHACHA'
|
if_build_succeeded env OPENSSL_CMD="$OPENSSL_NEXT" tests/compat.sh -e '^$' -f 'ARIA\|CHACHA'
|
||||||
}
|
}
|
||||||
|
|
||||||
|
component_test_memsan_constant_flow () {
|
||||||
|
msg "build: cmake memsan, full config with constant flow testing"
|
||||||
|
scripts/config.pl full
|
||||||
|
scripts/config.pl set MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN
|
||||||
|
scripts/config.pl unset MBEDTLS_AESNI_C # memsan doesn't grok asm
|
||||||
|
CC=clang cmake -D CMAKE_BUILD_TYPE:String=MemSan .
|
||||||
|
make
|
||||||
|
|
||||||
|
msg "test: main suites (memsan constant flow)"
|
||||||
|
make test
|
||||||
|
}
|
||||||
|
|
||||||
component_test_default_no_deprecated () {
|
component_test_default_no_deprecated () {
|
||||||
# Test that removing the deprecated features from the default
|
# Test that removing the deprecated features from the default
|
||||||
# configuration leaves something consistent.
|
# configuration leaves something consistent.
|
||||||
|
@ -46,6 +46,22 @@ typedef UINT32 uint32_t;
|
|||||||
#include <strings.h>
|
#include <strings.h>
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#if defined(MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN)
|
||||||
|
#include <sanitizer/msan_interface.h>
|
||||||
|
|
||||||
|
/* Use macros to avoid messing up with origin tracking */
|
||||||
|
#define TEST_CF_SECRET __msan_allocated_memory
|
||||||
|
// void __msan_allocated_memory(const volatile void* data, size_t size);
|
||||||
|
#define TEST_CF_PUBLIC __msan_unpoison
|
||||||
|
// void __msan_unpoison(const volatile void *a, size_t size);
|
||||||
|
|
||||||
|
#else /* MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN */
|
||||||
|
|
||||||
|
#define TEST_CF_SECRET(ptr, size)
|
||||||
|
#define TEST_CF_PUBLIC(ptr, size)
|
||||||
|
|
||||||
|
#endif /* MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN */
|
||||||
|
|
||||||
/* Type for Hex parameters */
|
/* Type for Hex parameters */
|
||||||
typedef struct data_tag
|
typedef struct data_tag
|
||||||
{
|
{
|
||||||
|
Loading…
Reference in New Issue
Block a user