1 /**
2  * \file constant_flow.h
3  *
4  * \brief   This file contains tools to ensure tested code has constant flow.
5  */
6 
7 /*
8  *  Copyright The Mbed TLS Contributors
9  *  SPDX-License-Identifier: Apache-2.0
10  *
11  *  Licensed under the Apache License, Version 2.0 (the "License"); you may
12  *  not use this file except in compliance with the License.
13  *  You may obtain a copy of the License at
14  *
15  *  http://www.apache.org/licenses/LICENSE-2.0
16  *
17  *  Unless required by applicable law or agreed to in writing, software
18  *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
19  *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20  *  See the License for the specific language governing permissions and
21  *  limitations under the License.
22  */
23 
24 #ifndef TEST_CONSTANT_FLOW_H
25 #define TEST_CONSTANT_FLOW_H
26 
27 #include "mbedtls/build_info.h"
28 
29 /*
30  * This file defines the two macros
31  *
32  *  #define TEST_CF_SECRET(ptr, size)
33  *  #define TEST_CF_PUBLIC(ptr, size)
34  *
35  * that can be used in tests to mark a memory area as secret (no branch or
36  * memory access should depend on it) or public (default, only needs to be
37  * marked explicitly when it was derived from secret data).
38  *
39  * Arguments:
40  * - ptr: a pointer to the memory area to be marked
41  * - size: the size in bytes of the memory area
42  *
43  * Implementation:
44  * The basic idea is that of ctgrind <https://github.com/agl/ctgrind>: we can
45  * re-use tools that were designed for checking use of uninitialized memory.
46  * This file contains two implementations: one based on MemorySanitizer, the
47  * other on valgrind's memcheck. If none of them is enabled, dummy macros that
48  * do nothing are defined for convenience.
49  *
50  * \note #TEST_CF_SECRET must be called directly from within a .function file,
51  *       not indirectly via a macro defined under tests/include or a function
52  *       under tests/src. This is because we only run Valgrind for constant
53  *       flow on test suites that have greppable annotations inside them (see
54  *       `skip_suites_without_constant_flow` in `tests/scripts/all.sh`).
55  */
56 
57 #if defined(MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN)
58 #include <sanitizer/msan_interface.h>
59 
60 /* Use macros to avoid messing up with origin tracking */
61 #define TEST_CF_SECRET  __msan_allocated_memory
62 // void __msan_allocated_memory(const volatile void* data, size_t size);
63 #define TEST_CF_PUBLIC  __msan_unpoison
64 // void __msan_unpoison(const volatile void *a, size_t size);
65 
66 #elif defined(MBEDTLS_TEST_CONSTANT_FLOW_VALGRIND)
67 #include <valgrind/memcheck.h>
68 
69 #define TEST_CF_SECRET  VALGRIND_MAKE_MEM_UNDEFINED
70 // VALGRIND_MAKE_MEM_UNDEFINED(_qzz_addr, _qzz_len)
71 #define TEST_CF_PUBLIC  VALGRIND_MAKE_MEM_DEFINED
72 // VALGRIND_MAKE_MEM_DEFINED(_qzz_addr, _qzz_len)
73 
74 #else /* MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN ||
75          MBEDTLS_TEST_CONSTANT_FLOW_VALGRIND */
76 
77 #define TEST_CF_SECRET(ptr, size)
78 #define TEST_CF_PUBLIC(ptr, size)
79 
80 #endif /* MBEDTLS_TEST_CONSTANT_FLOW_MEMSAN ||
81           MBEDTLS_TEST_CONSTANT_FLOW_VALGRIND */
82 
83 #endif /* TEST_CONSTANT_FLOW_H */
84