1*e7b1675dSTing-Kang Chang // Copyright 2020 Google LLC
2*e7b1675dSTing-Kang Chang //
3*e7b1675dSTing-Kang Chang // Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang // you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang // You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang //
7*e7b1675dSTing-Kang Chang // http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang //
9*e7b1675dSTing-Kang Chang // Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang // distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang // See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang // limitations under the License.
14*e7b1675dSTing-Kang Chang //
15*e7b1675dSTing-Kang Chang ///////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang
17*e7b1675dSTing-Kang Chang #ifndef TINK_UTIL_SECRET_DATA_H_
18*e7b1675dSTing-Kang Chang #define TINK_UTIL_SECRET_DATA_H_
19*e7b1675dSTing-Kang Chang
20*e7b1675dSTing-Kang Chang #include <memory>
21*e7b1675dSTing-Kang Chang #include <string>
22*e7b1675dSTing-Kang Chang #include <type_traits>
23*e7b1675dSTing-Kang Chang #include <vector>
24*e7b1675dSTing-Kang Chang
25*e7b1675dSTing-Kang Chang #include "absl/strings/string_view.h"
26*e7b1675dSTing-Kang Chang #include "tink/util/secret_data_internal.h"
27*e7b1675dSTing-Kang Chang
28*e7b1675dSTing-Kang Chang namespace crypto {
29*e7b1675dSTing-Kang Chang namespace tink {
30*e7b1675dSTing-Kang Chang namespace util {
31*e7b1675dSTing-Kang Chang namespace internal {
32*e7b1675dSTing-Kang Chang
33*e7b1675dSTing-Kang Chang template <typename T>
34*e7b1675dSTing-Kang Chang struct SanitizingDeleter {
operatorSanitizingDeleter35*e7b1675dSTing-Kang Chang void operator()(T* ptr) {
36*e7b1675dSTing-Kang Chang ptr->~T(); // Invoke destructor. Must do this before sanitize.
37*e7b1675dSTing-Kang Chang SanitizingAllocator<T>().deallocate(ptr, 1);
38*e7b1675dSTing-Kang Chang }
39*e7b1675dSTing-Kang Chang };
40*e7b1675dSTing-Kang Chang
41*e7b1675dSTing-Kang Chang } // namespace internal
42*e7b1675dSTing-Kang Chang
43*e7b1675dSTing-Kang Chang // Stores secret (sensitive) data and makes sure it's marked as such and
44*e7b1675dSTing-Kang Chang // destroyed in a safe way.
45*e7b1675dSTing-Kang Chang // This should be the first choice when handling key/key derived values.
46*e7b1675dSTing-Kang Chang //
47*e7b1675dSTing-Kang Chang // Example:
48*e7b1675dSTing-Kang Chang // class MyCryptoPrimitive {
49*e7b1675dSTing-Kang Chang // public:
50*e7b1675dSTing-Kang Chang // MyCryptoPrimitive(absl::string_view key_value) :
51*e7b1675dSTing-Kang Chang // key_(SecretDataFromStringView(key_value)) {}
52*e7b1675dSTing-Kang Chang // [...]
53*e7b1675dSTing-Kang Chang // private:
54*e7b1675dSTing-Kang Chang // const util::SecretData key_;
55*e7b1675dSTing-Kang Chang // }
56*e7b1675dSTing-Kang Chang using SecretData = std::vector<uint8_t, internal::SanitizingAllocator<uint8_t>>;
57*e7b1675dSTing-Kang Chang
58*e7b1675dSTing-Kang Chang // Stores secret (sensitive) object and makes sure it's marked as such and
59*e7b1675dSTing-Kang Chang // destroyed in a safe way.
60*e7b1675dSTing-Kang Chang // SecretUniquePtr MUST be constructed using MakeSecretUniquePtr function.
61*e7b1675dSTing-Kang Chang // Generally SecretUniquePtr should be used iff SecretData is unsuitable.
62*e7b1675dSTing-Kang Chang //
63*e7b1675dSTing-Kang Chang // Example:
64*e7b1675dSTing-Kang Chang // class MyCryptoPrimitive {
65*e7b1675dSTing-Kang Chang // public:
66*e7b1675dSTing-Kang Chang // MyEncryptionPrimitive(absl::string_view key_value) {
67*e7b1675dSTing-Kang Chang // AES_set_encrypt_key(key_value.data(), key_value.size() * 8, key_.get());
68*e7b1675dSTing-Kang Chang // }
69*e7b1675dSTing-Kang Chang // [...]
70*e7b1675dSTing-Kang Chang // private:
71*e7b1675dSTing-Kang Chang // util::SecretUniquePtr<AES_KEY> key_ = util::MakeSecretUniquePtr<AES_KEY>();
72*e7b1675dSTing-Kang Chang // }
73*e7b1675dSTing-Kang Chang //
74*e7b1675dSTing-Kang Chang // NOTE: SecretUniquePtr<T> will only protect the data which is stored in the
75*e7b1675dSTing-Kang Chang // memory which a T object takes on the stack. In particular, std::string and
76*e7b1675dSTing-Kang Chang // std::vector SHOULD NOT be used as arguments of T: they allocate memory
77*e7b1675dSTing-Kang Chang // on the heap, and hence the data stored in them will NOT be protected.
78*e7b1675dSTing-Kang Chang template <typename T>
79*e7b1675dSTing-Kang Chang class SecretUniquePtr {
80*e7b1675dSTing-Kang Chang private:
81*e7b1675dSTing-Kang Chang using Value = std::unique_ptr<T, internal::SanitizingDeleter<T>>;
82*e7b1675dSTing-Kang Chang
83*e7b1675dSTing-Kang Chang public:
84*e7b1675dSTing-Kang Chang using pointer = typename Value::pointer;
85*e7b1675dSTing-Kang Chang using element_type = typename Value::element_type;
86*e7b1675dSTing-Kang Chang using deleter_type = typename Value::deleter_type;
87*e7b1675dSTing-Kang Chang
88*e7b1675dSTing-Kang Chang SecretUniquePtr() = default;
89*e7b1675dSTing-Kang Chang
get()90*e7b1675dSTing-Kang Chang pointer get() const { return value_.get(); }
get_deleter()91*e7b1675dSTing-Kang Chang deleter_type& get_deleter() { return value_.get_deleter(); }
get_deleter()92*e7b1675dSTing-Kang Chang const deleter_type& get_deleter() const { return value_.get_deleter(); }
swap(SecretUniquePtr & other)93*e7b1675dSTing-Kang Chang void swap(SecretUniquePtr& other) { value_.swap(other.value_); }
reset()94*e7b1675dSTing-Kang Chang void reset() { value_.reset(); }
95*e7b1675dSTing-Kang Chang
96*e7b1675dSTing-Kang Chang typename std::add_lvalue_reference<T>::type operator*() const {
97*e7b1675dSTing-Kang Chang return value_.operator*();
98*e7b1675dSTing-Kang Chang }
99*e7b1675dSTing-Kang Chang pointer operator->() const { return value_.operator->(); }
100*e7b1675dSTing-Kang Chang explicit operator bool() const { return value_.operator bool(); }
101*e7b1675dSTing-Kang Chang
102*e7b1675dSTing-Kang Chang private:
103*e7b1675dSTing-Kang Chang template <typename S, typename... Args>
104*e7b1675dSTing-Kang Chang friend SecretUniquePtr<S> MakeSecretUniquePtr(Args&&... args);
SecretUniquePtr(Value && value)105*e7b1675dSTing-Kang Chang explicit SecretUniquePtr(Value&& value) : value_(std::move(value)) {}
106*e7b1675dSTing-Kang Chang Value value_;
107*e7b1675dSTing-Kang Chang };
108*e7b1675dSTing-Kang Chang
109*e7b1675dSTing-Kang Chang template <typename T, typename... Args>
MakeSecretUniquePtr(Args &&...args)110*e7b1675dSTing-Kang Chang SecretUniquePtr<T> MakeSecretUniquePtr(Args&&... args) {
111*e7b1675dSTing-Kang Chang T* ptr = internal::SanitizingAllocator<T>().allocate(1);
112*e7b1675dSTing-Kang Chang new (ptr)
113*e7b1675dSTing-Kang Chang T(std::forward<Args>(args)...); // Invoke constructor "placement new"
114*e7b1675dSTing-Kang Chang return SecretUniquePtr<T>({ptr, internal::SanitizingDeleter<T>()});
115*e7b1675dSTing-Kang Chang }
116*e7b1675dSTing-Kang Chang
117*e7b1675dSTing-Kang Chang // Convenience conversion functions
SecretDataAsStringView(const SecretData & secret)118*e7b1675dSTing-Kang Chang inline absl::string_view SecretDataAsStringView(const SecretData& secret) {
119*e7b1675dSTing-Kang Chang return {reinterpret_cast<const char*>(secret.data()), secret.size()};
120*e7b1675dSTing-Kang Chang }
121*e7b1675dSTing-Kang Chang
SecretDataFromStringView(absl::string_view secret)122*e7b1675dSTing-Kang Chang inline SecretData SecretDataFromStringView(absl::string_view secret) {
123*e7b1675dSTing-Kang Chang return {secret.begin(), secret.end()};
124*e7b1675dSTing-Kang Chang }
125*e7b1675dSTing-Kang Chang
126*e7b1675dSTing-Kang Chang // The same as SecretUniquePtr, but with value semantics.
127*e7b1675dSTing-Kang Chang //
128*e7b1675dSTing-Kang Chang // NOTE: SecretValue<T> will only protect the data which is stored in the
129*e7b1675dSTing-Kang Chang // memory which a T object takes on the stack. In particular, std::string and
130*e7b1675dSTing-Kang Chang // std::vector SHOULD NOT be used as arguments of T: they allocate memory
131*e7b1675dSTing-Kang Chang // on the heap, and hence the data stored in them will NOT be protected.
132*e7b1675dSTing-Kang Chang template <typename T>
133*e7b1675dSTing-Kang Chang class SecretValue {
134*e7b1675dSTing-Kang Chang public:
135*e7b1675dSTing-Kang Chang explicit SecretValue(T t = T())
ptr_(MakeSecretUniquePtr<T> (std::move (t)))136*e7b1675dSTing-Kang Chang : ptr_(MakeSecretUniquePtr<T>(std::move(t))) {}
137*e7b1675dSTing-Kang Chang
SecretValue(const SecretValue & other)138*e7b1675dSTing-Kang Chang SecretValue(const SecretValue& other) {
139*e7b1675dSTing-Kang Chang ptr_ = MakeSecretUniquePtr<T>(*other.ptr_);
140*e7b1675dSTing-Kang Chang }
141*e7b1675dSTing-Kang Chang
142*e7b1675dSTing-Kang Chang SecretValue& operator=(const SecretValue& other) {
143*e7b1675dSTing-Kang Chang *ptr_ = *other.ptr_;
144*e7b1675dSTing-Kang Chang return *this;
145*e7b1675dSTing-Kang Chang }
146*e7b1675dSTing-Kang Chang
value()147*e7b1675dSTing-Kang Chang T& value() { return *ptr_; }
value()148*e7b1675dSTing-Kang Chang const T& value() const { return *ptr_; }
149*e7b1675dSTing-Kang Chang
150*e7b1675dSTing-Kang Chang private:
151*e7b1675dSTing-Kang Chang SecretUniquePtr<T> ptr_;
152*e7b1675dSTing-Kang Chang };
153*e7b1675dSTing-Kang Chang
SafeZeroMemory(void * ptr,std::size_t size)154*e7b1675dSTing-Kang Chang inline void SafeZeroMemory(void* ptr, std::size_t size) {
155*e7b1675dSTing-Kang Chang internal::SafeZeroMemory(ptr, size);
156*e7b1675dSTing-Kang Chang }
157*e7b1675dSTing-Kang Chang
SafeZeroString(std::string * str)158*e7b1675dSTing-Kang Chang inline void SafeZeroString(std::string* str) {
159*e7b1675dSTing-Kang Chang SafeZeroMemory(&(*str)[0], str->size());
160*e7b1675dSTing-Kang Chang }
161*e7b1675dSTing-Kang Chang
162*e7b1675dSTing-Kang Chang } // namespace util
163*e7b1675dSTing-Kang Chang } // namespace tink
164*e7b1675dSTing-Kang Chang } // namespace crypto
165*e7b1675dSTing-Kang Chang
166*e7b1675dSTing-Kang Chang #endif // TINK_UTIL_SECRET_DATA_H_
167