diff options
author | Simon Butcher <simon.butcher@arm.com> | 2018-11-04 18:48:04 +0000 |
---|---|---|
committer | Simon Butcher <simon.butcher@arm.com> | 2018-11-04 18:48:04 +0000 |
commit | 2705beaeeff39286664e68f6f9fdc158fd54aed8 (patch) | |
tree | 5c1bb1994d239934bb00a3a765eb3fc564954a18 | |
parent | 2b5be1e630dde3f2a87367ecedf2d8d7ad92715e (diff) | |
parent | 7e1f3bedd96f056d3305f2dfa390a4549ee68154 (diff) |
Merge remote-tracking branch 'public/pr/2095' into development-proposed
-rw-r--r-- | ChangeLog | 4 | ||||
-rw-r--r-- | library/ssl_tls.c | 1 | ||||
-rw-r--r-- | programs/aes/aescrypt2.c | 13 | ||||
-rw-r--r-- | programs/aes/crypt_and_hash.c | 13 |
4 files changed, 19 insertions, 12 deletions
@@ -34,6 +34,10 @@ Bugfix program programs/x509/cert_write. Fixes #1422. * Ignore IV in mbedtls_cipher_set_iv() when the cipher mode is MBEDTLS_MODE_ECB Fix for #1091 raised by ezdevelop + * Zeroize memory used for buffering or reassembling handshake messages + after use. + * Use `mbedtls_platform_zeroize()` instead of `memset()` for zeroization + of sensitive data in the example programs aescrypt2 and crypt_and_hash. Changes * Removed support for Yotta as a build tool. diff --git a/library/ssl_tls.c b/library/ssl_tls.c index bf43e889..82e65251 100644 --- a/library/ssl_tls.c +++ b/library/ssl_tls.c @@ -8801,6 +8801,7 @@ static void ssl_buffering_free_slot( mbedtls_ssl_context *ssl, if( hs_buf->is_valid == 1 ) { hs->buffering.total_bytes_buffered -= hs_buf->data_len; + mbedtls_platform_zeroize( hs_buf->data, hs_buf->data_len ); mbedtls_free( hs_buf->data ); memset( hs_buf, 0, sizeof( mbedtls_ssl_hs_buffer ) ); } diff --git a/programs/aes/aescrypt2.c b/programs/aes/aescrypt2.c index 69c40600..5725eb0f 100644 --- a/programs/aes/aescrypt2.c +++ b/programs/aes/aescrypt2.c @@ -43,6 +43,7 @@ #include "mbedtls/aes.h" #include "mbedtls/md.h" +#include "mbedtls/platform_util.h" #include <stdio.h> #include <stdlib.h> @@ -450,13 +451,13 @@ exit: the case when the user has missed or reordered some, in which case the key might not be in argv[4]. */ for( i = 0; i < (unsigned int) argc; i++ ) - memset( argv[i], 0, strlen( argv[i] ) ); + mbedtls_platform_zeroize( argv[i], strlen( argv[i] ) ); - memset( IV, 0, sizeof( IV ) ); - memset( key, 0, sizeof( key ) ); - memset( tmp, 0, sizeof( tmp ) ); - memset( buffer, 0, sizeof( buffer ) ); - memset( digest, 0, sizeof( digest ) ); + mbedtls_platform_zeroize( IV, sizeof( IV ) ); + mbedtls_platform_zeroize( key, sizeof( key ) ); + mbedtls_platform_zeroize( tmp, sizeof( tmp ) ); + mbedtls_platform_zeroize( buffer, sizeof( buffer ) ); + mbedtls_platform_zeroize( digest, sizeof( digest ) ); mbedtls_aes_free( &aes_ctx ); mbedtls_md_free( &sha_ctx ); diff --git a/programs/aes/crypt_and_hash.c b/programs/aes/crypt_and_hash.c index bc95eb9b..88b852b4 100644 --- a/programs/aes/crypt_and_hash.c +++ b/programs/aes/crypt_and_hash.c @@ -46,6 +46,7 @@ defined(MBEDTLS_FS_IO) #include "mbedtls/cipher.h" #include "mbedtls/md.h" +#include "mbedtls/platform_util.h" #include <stdio.h> #include <stdlib.h> @@ -547,13 +548,13 @@ exit: the case when the user has missed or reordered some, in which case the key might not be in argv[6]. */ for( i = 0; i < argc; i++ ) - memset( argv[i], 0, strlen( argv[i] ) ); + mbedtls_platform_zeroize( argv[i], strlen( argv[i] ) ); - memset( IV, 0, sizeof( IV ) ); - memset( key, 0, sizeof( key ) ); - memset( buffer, 0, sizeof( buffer ) ); - memset( output, 0, sizeof( output ) ); - memset( digest, 0, sizeof( digest ) ); + mbedtls_platform_zeroize( IV, sizeof( IV ) ); + mbedtls_platform_zeroize( key, sizeof( key ) ); + mbedtls_platform_zeroize( buffer, sizeof( buffer ) ); + mbedtls_platform_zeroize( output, sizeof( output ) ); + mbedtls_platform_zeroize( digest, sizeof( digest ) ); mbedtls_cipher_free( &cipher_ctx ); mbedtls_md_free( &md_ctx ); |