mps_common.h 7.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181
  1. /*
  2. * Copyright The Mbed TLS Contributors
  3. * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
  4. */
  5. /**
  6. * \file mps_common.h
  7. *
  8. * \brief Common functions and macros used by MPS
  9. */
  10. #ifndef MBEDTLS_MPS_COMMON_H
  11. #define MBEDTLS_MPS_COMMON_H
  12. #include "mps_error.h"
  13. #include <stdio.h>
  14. /**
  15. * \name SECTION: MPS Configuration
  16. *
  17. * \{
  18. */
  19. /*! This flag controls whether the MPS-internal components
  20. * (reader, writer, Layer 1-3) perform validation of the
  21. * expected abstract state at the entry of API calls.
  22. *
  23. * Context: All MPS API functions impose assumptions/preconditions on the
  24. * context on which they operate. For example, every structure has a notion of
  25. * state integrity which is established by `xxx_init()` and preserved by any
  26. * calls to the MPS API which satisfy their preconditions and either succeed,
  27. * or fail with an error code which is explicitly documented to not corrupt
  28. * structure integrity (such as WANT_READ and WANT_WRITE);
  29. * apart from `xxx_init()` any function assumes state integrity as a
  30. * precondition (but usually more). If any of the preconditions is violated,
  31. * the function's behavior is entirely undefined.
  32. * In addition to state integrity, all MPS structures have a more refined
  33. * notion of abstract state that the API operates on. For example, all layers
  34. * have a notion of 'abstract read state' which indicates if incoming data has
  35. * been passed to the user, e.g. through mps_l2_read_start() for Layer 2
  36. * or mps_l3_read() in Layer 3. After such a call, it doesn't make sense to
  37. * call these reading functions again until the incoming data has been
  38. * explicitly 'consumed', e.g. through mps_l2_read_consume() for Layer 2 or
  39. * mps_l3_read_consume() on Layer 3. However, even if it doesn't make sense,
  40. * it's a design choice whether the API should fail gracefully on such
  41. * non-sensical calls or not, and that's what this option is about:
  42. *
  43. * This option determines whether the expected abstract state
  44. * is part of the API preconditions or not: If the option is set,
  45. * then the abstract state is not part of the precondition and is
  46. * thus required to be validated by the implementation. If an unexpected
  47. * abstract state is encountered, the implementation must fail gracefully
  48. * with error #MBEDTLS_ERR_MPS_OPERATION_UNEXPECTED.
  49. * Conversely, if this option is not set, then the expected abstract state
  50. * is included in the preconditions of the respective API calls, and
  51. * an implementation's behaviour is undefined if the abstract state is
  52. * not as expected.
  53. *
  54. * For example: Enabling this makes mps_l2_read_done() fail if
  55. * no incoming record is currently open; disabling this would
  56. * lead to undefined behavior in this case.
  57. *
  58. * Comment this to remove state validation.
  59. */
  60. #define MBEDTLS_MPS_STATE_VALIDATION
  61. /*! This flag enables/disables assertions on the internal state of MPS.
  62. *
  63. * Assertions are sanity checks that should never trigger when MPS
  64. * is used within the bounds of its API and preconditions.
  65. *
  66. * Enabling this increases security by limiting the scope of
  67. * potential bugs, but comes at the cost of increased code size.
  68. *
  69. * Note: So far, there is no guiding principle as to what
  70. * expected conditions merit an assertion, and which don't.
  71. *
  72. * Comment this to disable assertions.
  73. */
  74. #define MBEDTLS_MPS_ENABLE_ASSERTIONS
  75. /*! This flag controls whether tracing for MPS should be enabled. */
  76. //#define MBEDTLS_MPS_ENABLE_TRACE
  77. #if defined(MBEDTLS_MPS_STATE_VALIDATION)
  78. #define MBEDTLS_MPS_STATE_VALIDATE_RAW(cond, string) \
  79. do \
  80. { \
  81. if (!(cond)) \
  82. { \
  83. MBEDTLS_MPS_TRACE(MBEDTLS_MPS_TRACE_TYPE_ERROR, string); \
  84. MBEDTLS_MPS_TRACE_RETURN(MBEDTLS_ERR_MPS_OPERATION_UNEXPECTED); \
  85. } \
  86. } while (0)
  87. #else /* MBEDTLS_MPS_STATE_VALIDATION */
  88. #define MBEDTLS_MPS_STATE_VALIDATE_RAW(cond, string) \
  89. do \
  90. { \
  91. (cond); \
  92. } while (0)
  93. #endif /* MBEDTLS_MPS_STATE_VALIDATION */
  94. #if defined(MBEDTLS_MPS_ENABLE_ASSERTIONS)
  95. #define MBEDTLS_MPS_ASSERT_RAW(cond, string) \
  96. do \
  97. { \
  98. if (!(cond)) \
  99. { \
  100. MBEDTLS_MPS_TRACE(MBEDTLS_MPS_TRACE_TYPE_ERROR, string); \
  101. MBEDTLS_MPS_TRACE_RETURN(MBEDTLS_ERR_MPS_INTERNAL_ERROR); \
  102. } \
  103. } while (0)
  104. #else /* MBEDTLS_MPS_ENABLE_ASSERTIONS */
  105. #define MBEDTLS_MPS_ASSERT_RAW(cond, string) do {} while (0)
  106. #endif /* MBEDTLS_MPS_ENABLE_ASSERTIONS */
  107. /* \} name SECTION: MPS Configuration */
  108. /**
  109. * \name SECTION: Common types
  110. *
  111. * Various common types used throughout MPS.
  112. * \{
  113. */
  114. /** \brief The type of buffer sizes and offsets used in MPS structures.
  115. *
  116. * This is an unsigned integer type that should be large enough to
  117. * hold the length of any buffer or message processed by MPS.
  118. *
  119. * The reason to pick a value as small as possible here is
  120. * to reduce the size of MPS structures.
  121. *
  122. * \warning Care has to be taken when using a narrower type
  123. * than ::mbedtls_mps_size_t here because of
  124. * potential truncation during conversion.
  125. *
  126. * \warning Handshake messages in TLS may be up to 2^24 ~ 16Mb in size.
  127. * If mbedtls_mps_[opt_]stored_size_t is smaller than that, the
  128. * maximum handshake message is restricted accordingly.
  129. *
  130. * For now, we use the default type of size_t throughout, and the use of
  131. * smaller types or different types for ::mbedtls_mps_size_t and
  132. * ::mbedtls_mps_stored_size_t is not yet supported.
  133. *
  134. */
  135. typedef size_t mbedtls_mps_stored_size_t;
  136. #define MBEDTLS_MPS_STORED_SIZE_MAX (SIZE_MAX)
  137. /** \brief The type of buffer sizes and offsets used in the MPS API
  138. * and implementation.
  139. *
  140. * This must be at least as wide as ::mbedtls_stored_size_t but
  141. * may be chosen to be strictly larger if more suitable for the
  142. * target architecture.
  143. *
  144. * For example, in a test build for ARM Thumb, using uint_fast16_t
  145. * instead of uint16_t reduced the code size from 1060 Byte to 962 Byte,
  146. * so almost 10%.
  147. */
  148. typedef size_t mbedtls_mps_size_t;
  149. #define MBEDTLS_MPS_SIZE_MAX (SIZE_MAX)
  150. #if MBEDTLS_MPS_STORED_SIZE_MAX > MBEDTLS_MPS_SIZE_MAX
  151. #error "Misconfiguration of mbedtls_mps_size_t and mbedtls_mps_stored_size_t."
  152. #endif
  153. /* \} SECTION: Common types */
  154. #endif /* MBEDTLS_MPS_COMMON_H */