xref: /aosp_15_r20/external/tink/cc/util/secret_data.h (revision e7b1675dde1b92d52ec075b0a92829627f2c52a5)
1*e7b1675dSTing-Kang Chang // Copyright 2020 Google LLC
2*e7b1675dSTing-Kang Chang //
3*e7b1675dSTing-Kang Chang // Licensed under the Apache License, Version 2.0 (the "License");
4*e7b1675dSTing-Kang Chang // you may not use this file except in compliance with the License.
5*e7b1675dSTing-Kang Chang // You may obtain a copy of the License at
6*e7b1675dSTing-Kang Chang //
7*e7b1675dSTing-Kang Chang //     http://www.apache.org/licenses/LICENSE-2.0
8*e7b1675dSTing-Kang Chang //
9*e7b1675dSTing-Kang Chang // Unless required by applicable law or agreed to in writing, software
10*e7b1675dSTing-Kang Chang // distributed under the License is distributed on an "AS IS" BASIS,
11*e7b1675dSTing-Kang Chang // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*e7b1675dSTing-Kang Chang // See the License for the specific language governing permissions and
13*e7b1675dSTing-Kang Chang // limitations under the License.
14*e7b1675dSTing-Kang Chang //
15*e7b1675dSTing-Kang Chang ///////////////////////////////////////////////////////////////////////////////
16*e7b1675dSTing-Kang Chang 
17*e7b1675dSTing-Kang Chang #ifndef TINK_UTIL_SECRET_DATA_H_
18*e7b1675dSTing-Kang Chang #define TINK_UTIL_SECRET_DATA_H_
19*e7b1675dSTing-Kang Chang 
20*e7b1675dSTing-Kang Chang #include <memory>
21*e7b1675dSTing-Kang Chang #include <string>
22*e7b1675dSTing-Kang Chang #include <type_traits>
23*e7b1675dSTing-Kang Chang #include <vector>
24*e7b1675dSTing-Kang Chang 
25*e7b1675dSTing-Kang Chang #include "absl/strings/string_view.h"
26*e7b1675dSTing-Kang Chang #include "tink/util/secret_data_internal.h"
27*e7b1675dSTing-Kang Chang 
28*e7b1675dSTing-Kang Chang namespace crypto {
29*e7b1675dSTing-Kang Chang namespace tink {
30*e7b1675dSTing-Kang Chang namespace util {
31*e7b1675dSTing-Kang Chang namespace internal {
32*e7b1675dSTing-Kang Chang 
33*e7b1675dSTing-Kang Chang template <typename T>
34*e7b1675dSTing-Kang Chang struct SanitizingDeleter {
operatorSanitizingDeleter35*e7b1675dSTing-Kang Chang   void operator()(T* ptr) {
36*e7b1675dSTing-Kang Chang     ptr->~T();  // Invoke destructor. Must do this before sanitize.
37*e7b1675dSTing-Kang Chang     SanitizingAllocator<T>().deallocate(ptr, 1);
38*e7b1675dSTing-Kang Chang   }
39*e7b1675dSTing-Kang Chang };
40*e7b1675dSTing-Kang Chang 
41*e7b1675dSTing-Kang Chang }  // namespace internal
42*e7b1675dSTing-Kang Chang 
43*e7b1675dSTing-Kang Chang // Stores secret (sensitive) data and makes sure it's marked as such and
44*e7b1675dSTing-Kang Chang // destroyed in a safe way.
45*e7b1675dSTing-Kang Chang // This should be the first choice when handling key/key derived values.
46*e7b1675dSTing-Kang Chang //
47*e7b1675dSTing-Kang Chang // Example:
48*e7b1675dSTing-Kang Chang // class MyCryptoPrimitive {
49*e7b1675dSTing-Kang Chang //  public:
50*e7b1675dSTing-Kang Chang //   MyCryptoPrimitive(absl::string_view key_value) :
51*e7b1675dSTing-Kang Chang //     key_(SecretDataFromStringView(key_value)) {}
52*e7b1675dSTing-Kang Chang //   [...]
53*e7b1675dSTing-Kang Chang //  private:
54*e7b1675dSTing-Kang Chang //   const util::SecretData key_;
55*e7b1675dSTing-Kang Chang // }
56*e7b1675dSTing-Kang Chang using SecretData = std::vector<uint8_t, internal::SanitizingAllocator<uint8_t>>;
57*e7b1675dSTing-Kang Chang 
58*e7b1675dSTing-Kang Chang // Stores secret (sensitive) object and makes sure it's marked as such and
59*e7b1675dSTing-Kang Chang // destroyed in a safe way.
60*e7b1675dSTing-Kang Chang // SecretUniquePtr MUST be constructed using MakeSecretUniquePtr function.
61*e7b1675dSTing-Kang Chang // Generally SecretUniquePtr should be used iff SecretData is unsuitable.
62*e7b1675dSTing-Kang Chang //
63*e7b1675dSTing-Kang Chang // Example:
64*e7b1675dSTing-Kang Chang // class MyCryptoPrimitive {
65*e7b1675dSTing-Kang Chang //  public:
66*e7b1675dSTing-Kang Chang //   MyEncryptionPrimitive(absl::string_view key_value) {
67*e7b1675dSTing-Kang Chang //     AES_set_encrypt_key(key_value.data(), key_value.size() * 8, key_.get());
68*e7b1675dSTing-Kang Chang //   }
69*e7b1675dSTing-Kang Chang //   [...]
70*e7b1675dSTing-Kang Chang //  private:
71*e7b1675dSTing-Kang Chang //   util::SecretUniquePtr<AES_KEY> key_ = util::MakeSecretUniquePtr<AES_KEY>();
72*e7b1675dSTing-Kang Chang // }
73*e7b1675dSTing-Kang Chang //
74*e7b1675dSTing-Kang Chang // NOTE: SecretUniquePtr<T> will only protect the data which is stored in the
75*e7b1675dSTing-Kang Chang // memory which a T object takes on the stack. In particular, std::string and
76*e7b1675dSTing-Kang Chang // std::vector SHOULD NOT be used as arguments of T: they allocate memory
77*e7b1675dSTing-Kang Chang // on the heap, and hence the data stored in them will NOT be protected.
78*e7b1675dSTing-Kang Chang template <typename T>
79*e7b1675dSTing-Kang Chang class SecretUniquePtr {
80*e7b1675dSTing-Kang Chang  private:
81*e7b1675dSTing-Kang Chang   using Value = std::unique_ptr<T, internal::SanitizingDeleter<T>>;
82*e7b1675dSTing-Kang Chang 
83*e7b1675dSTing-Kang Chang  public:
84*e7b1675dSTing-Kang Chang   using pointer = typename Value::pointer;
85*e7b1675dSTing-Kang Chang   using element_type = typename Value::element_type;
86*e7b1675dSTing-Kang Chang   using deleter_type = typename Value::deleter_type;
87*e7b1675dSTing-Kang Chang 
88*e7b1675dSTing-Kang Chang   SecretUniquePtr() = default;
89*e7b1675dSTing-Kang Chang 
get()90*e7b1675dSTing-Kang Chang   pointer get() const { return value_.get(); }
get_deleter()91*e7b1675dSTing-Kang Chang   deleter_type& get_deleter() { return value_.get_deleter(); }
get_deleter()92*e7b1675dSTing-Kang Chang   const deleter_type& get_deleter() const { return value_.get_deleter(); }
swap(SecretUniquePtr & other)93*e7b1675dSTing-Kang Chang   void swap(SecretUniquePtr& other) { value_.swap(other.value_); }
reset()94*e7b1675dSTing-Kang Chang   void reset() { value_.reset(); }
95*e7b1675dSTing-Kang Chang 
96*e7b1675dSTing-Kang Chang   typename std::add_lvalue_reference<T>::type operator*() const {
97*e7b1675dSTing-Kang Chang     return value_.operator*();
98*e7b1675dSTing-Kang Chang   }
99*e7b1675dSTing-Kang Chang   pointer operator->() const { return value_.operator->(); }
100*e7b1675dSTing-Kang Chang   explicit operator bool() const { return value_.operator bool(); }
101*e7b1675dSTing-Kang Chang 
102*e7b1675dSTing-Kang Chang  private:
103*e7b1675dSTing-Kang Chang   template <typename S, typename... Args>
104*e7b1675dSTing-Kang Chang   friend SecretUniquePtr<S> MakeSecretUniquePtr(Args&&... args);
SecretUniquePtr(Value && value)105*e7b1675dSTing-Kang Chang   explicit SecretUniquePtr(Value&& value) : value_(std::move(value)) {}
106*e7b1675dSTing-Kang Chang   Value value_;
107*e7b1675dSTing-Kang Chang };
108*e7b1675dSTing-Kang Chang 
109*e7b1675dSTing-Kang Chang template <typename T, typename... Args>
MakeSecretUniquePtr(Args &&...args)110*e7b1675dSTing-Kang Chang SecretUniquePtr<T> MakeSecretUniquePtr(Args&&... args) {
111*e7b1675dSTing-Kang Chang   T* ptr = internal::SanitizingAllocator<T>().allocate(1);
112*e7b1675dSTing-Kang Chang   new (ptr)
113*e7b1675dSTing-Kang Chang       T(std::forward<Args>(args)...);  // Invoke constructor "placement new"
114*e7b1675dSTing-Kang Chang   return SecretUniquePtr<T>({ptr, internal::SanitizingDeleter<T>()});
115*e7b1675dSTing-Kang Chang }
116*e7b1675dSTing-Kang Chang 
117*e7b1675dSTing-Kang Chang // Convenience conversion functions
SecretDataAsStringView(const SecretData & secret)118*e7b1675dSTing-Kang Chang inline absl::string_view SecretDataAsStringView(const SecretData& secret) {
119*e7b1675dSTing-Kang Chang   return {reinterpret_cast<const char*>(secret.data()), secret.size()};
120*e7b1675dSTing-Kang Chang }
121*e7b1675dSTing-Kang Chang 
SecretDataFromStringView(absl::string_view secret)122*e7b1675dSTing-Kang Chang inline SecretData SecretDataFromStringView(absl::string_view secret) {
123*e7b1675dSTing-Kang Chang   return {secret.begin(), secret.end()};
124*e7b1675dSTing-Kang Chang }
125*e7b1675dSTing-Kang Chang 
126*e7b1675dSTing-Kang Chang // The same as SecretUniquePtr, but with value semantics.
127*e7b1675dSTing-Kang Chang //
128*e7b1675dSTing-Kang Chang // NOTE: SecretValue<T> will only protect the data which is stored in the
129*e7b1675dSTing-Kang Chang // memory which a T object takes on the stack. In particular, std::string and
130*e7b1675dSTing-Kang Chang // std::vector SHOULD NOT be used as arguments of T: they allocate memory
131*e7b1675dSTing-Kang Chang // on the heap, and hence the data stored in them will NOT be protected.
132*e7b1675dSTing-Kang Chang template <typename T>
133*e7b1675dSTing-Kang Chang class SecretValue {
134*e7b1675dSTing-Kang Chang  public:
135*e7b1675dSTing-Kang Chang   explicit SecretValue(T t = T())
ptr_(MakeSecretUniquePtr<T> (std::move (t)))136*e7b1675dSTing-Kang Chang       : ptr_(MakeSecretUniquePtr<T>(std::move(t))) {}
137*e7b1675dSTing-Kang Chang 
SecretValue(const SecretValue & other)138*e7b1675dSTing-Kang Chang   SecretValue(const SecretValue& other) {
139*e7b1675dSTing-Kang Chang     ptr_ = MakeSecretUniquePtr<T>(*other.ptr_);
140*e7b1675dSTing-Kang Chang   }
141*e7b1675dSTing-Kang Chang 
142*e7b1675dSTing-Kang Chang   SecretValue& operator=(const SecretValue& other) {
143*e7b1675dSTing-Kang Chang     *ptr_ = *other.ptr_;
144*e7b1675dSTing-Kang Chang     return *this;
145*e7b1675dSTing-Kang Chang   }
146*e7b1675dSTing-Kang Chang 
value()147*e7b1675dSTing-Kang Chang   T& value() { return *ptr_; }
value()148*e7b1675dSTing-Kang Chang   const T& value() const { return *ptr_; }
149*e7b1675dSTing-Kang Chang 
150*e7b1675dSTing-Kang Chang  private:
151*e7b1675dSTing-Kang Chang   SecretUniquePtr<T> ptr_;
152*e7b1675dSTing-Kang Chang };
153*e7b1675dSTing-Kang Chang 
SafeZeroMemory(void * ptr,std::size_t size)154*e7b1675dSTing-Kang Chang inline void SafeZeroMemory(void* ptr, std::size_t size) {
155*e7b1675dSTing-Kang Chang   internal::SafeZeroMemory(ptr, size);
156*e7b1675dSTing-Kang Chang }
157*e7b1675dSTing-Kang Chang 
SafeZeroString(std::string * str)158*e7b1675dSTing-Kang Chang inline void SafeZeroString(std::string* str) {
159*e7b1675dSTing-Kang Chang   SafeZeroMemory(&(*str)[0], str->size());
160*e7b1675dSTing-Kang Chang }
161*e7b1675dSTing-Kang Chang 
162*e7b1675dSTing-Kang Chang }  // namespace util
163*e7b1675dSTing-Kang Chang }  // namespace tink
164*e7b1675dSTing-Kang Chang }  // namespace crypto
165*e7b1675dSTing-Kang Chang 
166*e7b1675dSTing-Kang Chang #endif  // TINK_UTIL_SECRET_DATA_H_
167