summaryrefslogtreecommitdiff
path: root/toxcore/crypto_core_mem.c
blob: b8c0bd9b9869bbd47dc47183b85142cd08395b0f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
/*
 * ISC License
 *
 * Copyright (c) 2013-2016
 * Frank Denis <j at pureftpd dot org>
 *
 * Permission to use, copy, modify, and/or distribute this software for any
 * purpose with or without fee is hereby granted, provided that the above
 * copyright notice and this permission notice appear in all copies.
 *
 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 */
#ifdef HAVE_CONFIG_H
#include "config.h"
#endif

#include "crypto_core.h"

#ifndef VANILLA_NACL
/* We use libsodium by default. */
#include <sodium.h>
#else
#if defined(_WIN32) || defined(__WIN32__) || defined(WIN32)
#include <windows.h>
#include <wincrypt.h>
#endif
#endif


void crypto_memzero(void *data, size_t length)
{
#ifndef VANILLA_NACL
    sodium_memzero(data, length);
#elif defined(_WIN32)
    SecureZeroMemory(data, length);
#elif defined(HAVE_MEMSET_S)

    if (length > 0U) {
        errno_t code = memset_s(data, (rsize_t) length, 0, (rsize_t) length);

        if (code != 0) {
            abort(); /* LCOV_EXCL_LINE */
        }
    }

#elif defined(HAVE_EXPLICIT_BZERO)
    explicit_bzero(data, length);
#else
    //!TOKSTYLE-
    volatile uint8_t *volatile pnt = data;
    //!TOKSTYLE+
    size_t i = (size_t) 0U;

    while (i < length) {
        pnt[i] = 0U;
        ++i;
    }

#endif
}

int32_t crypto_memcmp(const uint8_t *p1, const uint8_t *p2, size_t length)
{
#ifndef VANILLA_NACL
    return sodium_memcmp(p1, p2, length);
#else
    //!TOKSTYLE-
    const volatile uint8_t *volatile b1 = p1;
    const volatile uint8_t *volatile b2 = p2;
    //!TOKSTYLE+

    size_t i;
    uint8_t d = (uint8_t) 0U;

    for (i = 0U; i < length; ++i) {
        d |= b1[i] ^ b2[i];
    }

    return (1 & ((d - 1) >> 8)) - 1;
#endif
}