/* * utils_safe_memory - safe memory helpers * * Copyright (C) 2009-2021 Red Hat, Inc. All rights reserved. * Copyright (C) 2009-2021 Milan Broz * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version 2 * of the License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. */ #include #include #include "libcryptsetup.h" struct safe_allocation { size_t size; char data[0]; }; /* * Replacement for memset(s, 0, n) on stack that can be optimized out * Also used in safe allocations for explicit memory wipe. */ void crypt_safe_memzero(void *data, size_t size) { #ifdef HAVE_EXPLICIT_BZERO explicit_bzero(data, size); #else volatile uint8_t *p = (volatile uint8_t *)data; while(size--) *p++ = 0; #endif } /* safe allocations */ void *crypt_safe_alloc(size_t size) { struct safe_allocation *alloc; if (!size || size > (SIZE_MAX - offsetof(struct safe_allocation, data))) return NULL; alloc = malloc(size + offsetof(struct safe_allocation, data)); if (!alloc) return NULL; alloc->size = size; crypt_safe_memzero(&alloc->data, size); /* coverity[leaked_storage] */ return &alloc->data; } void crypt_safe_free(void *data) { struct safe_allocation *alloc; volatile size_t *s; if (!data) return; alloc = (struct safe_allocation *) ((char *)data - offsetof(struct safe_allocation, data)); crypt_safe_memzero(data, alloc->size); s = (volatile size_t *)&alloc->size; *s = 0x55aa55aa; free(alloc); } void *crypt_safe_realloc(void *data, size_t size) { struct safe_allocation *alloc; void *new_data; new_data = crypt_safe_alloc(size); if (new_data && data) { alloc = (struct safe_allocation *) ((char *)data - offsetof(struct safe_allocation, data)); if (size > alloc->size) size = alloc->size; memcpy(new_data, data, size); } crypt_safe_free(data); return new_data; }