Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Have mbedtls_mpi_core_exp_mod() take a temporary instead of allocating memory #6733

Merged

Conversation

tom-cosgrove-arm
Copy link
Contributor

@tom-cosgrove-arm tom-cosgrove-arm commented Dec 6, 2022

This is the last PR needed for #6293

Based on top of #6731 (which now has two approvals, just waiting for CI to complete before it can go in)

The new content of this PR is the final commit

Gatekeeper checklist

  • changelog not required - there will be a final "new bignum" changelog later
  • backport done, or not required
  • tests updated as necessary

…ry form

Signed-off-by: Tom Cosgrove <tom.cosgrove@arm.com>
Signed-off-by: Tom Cosgrove <tom.cosgrove@arm.com>
Signed-off-by: Tom Cosgrove <tom.cosgrove@arm.com>
…g memory

Last PR needed for Mbed-TLS#6293

Signed-off-by: Tom Cosgrove <tom.cosgrove@arm.com>
@tom-cosgrove-arm tom-cosgrove-arm added needs-review Every commit must be reviewed by at least two team members, component-crypto Crypto primitives and low-level interfaces needs-ci Needs to pass CI tests needs-preceding-pr Requires another PR to be merged first needs-reviewer This PR needs someone to pick it up for review priority-high High priority - will be reviewed soon labels Dec 6, 2022
@minosgalanakis minosgalanakis self-requested a review December 6, 2022 14:43
const mbedtls_mpi_uint *N, size_t AN_limbs,
const mbedtls_mpi_uint *E, size_t E_limbs,
const mbedtls_mpi_uint *RR );
size_t mbedtls_mpi_core_exp_mod_working_limbs( size_t AN_limbs, size_t E_limbs );
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I am a bit concerned by this helper function. I appreciate that we are sensible and only using it during testing, and I can see how helpfull it is to abstract memory allocation math, from the higher layers.

But my concern is that it is a function that people will invoke right before allocating a memory block.

This is a core method so we should not be adding extra checking but we could document that there is not overflow detection, especially for AN_limbs < (SIZE_MAX - 1) / 2.

Please note that SIZE_MAX is a moving target since it is implementation defined.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The parameters are sizes of existing bignum objects. The size of bignum objects should be limited by MBEDTLS_MPI_MAX_LIMBS, which is small enough for the calculation not to overflow. So this function doesn't really need special warnings.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A static assertion on MBEDTLS_MPI_MAX_LIMBS could be useful, in the unlikely case users set it to an unreasonable value, or in case users want to use the library on a platform with 16-bit size_t (which we do not officially support, and such users would be very unlikely to enlarge MBEDTLS_MPI_MAX_LIMBS). But that's only a defense against a configuration mistake that isn't particularly likely. I think anything more than that is overkill.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So how about if I add

 * \warning        No error checking is performed on the value of the inputs,
 *                 so "caveat caller". With the current algorithm, overflow can
 *                 occur (depends on the value of \p E_limbs, too) if
 *                 `AN_limbs > (SIZE_MAX / sizeof(mbedtls_mpi_uint) - 1) / 67`.
 *                 In practice, with MPIs having a maximum of MBEDTLS_MPI_MAX_LIMBS
 *                 limbs, we are several orders of magnitude away from this.
 *                 Further, the number of limbs will usually be determined by
 *                 the modulus, which will normally be under our control.

to the documentation of mbedtls_mpi_core_exp_mod_working_limbs()?

Copy link
Contributor

@minosgalanakis minosgalanakis left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Reviewing latest commit 0a0dded

Looks good, with a minor documentation request

@gilles-peskine-arm gilles-peskine-arm self-requested a review December 6, 2022 15:51
@gilles-peskine-arm gilles-peskine-arm removed the needs-reviewer This PR needs someone to pick it up for review label Dec 6, 2022
Copy link
Contributor

@gilles-peskine-arm gilles-peskine-arm left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

const mbedtls_mpi_uint *N, size_t AN_limbs,
const mbedtls_mpi_uint *E, size_t E_limbs,
const mbedtls_mpi_uint *RR );
size_t mbedtls_mpi_core_exp_mod_working_limbs( size_t AN_limbs, size_t E_limbs );
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The parameters are sizes of existing bignum objects. The size of bignum objects should be limited by MBEDTLS_MPI_MAX_LIMBS, which is small enough for the calculation not to overflow. So this function doesn't really need special warnings.

@tom-cosgrove-arm
Copy link
Contributor Author

CI green apart from OpenCI

@tom-cosgrove-arm tom-cosgrove-arm added approved Design and code approved - may be waiting for CI or backports and removed needs-ci Needs to pass CI tests needs-review Every commit must be reviewed by at least two team members, labels Dec 7, 2022
@yanesca yanesca removed the needs-preceding-pr Requires another PR to be merged first label Dec 7, 2022
@yanesca yanesca merged commit d45924d into Mbed-TLS:development Dec 7, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Design and code approved - may be waiting for CI or backports component-crypto Crypto primitives and low-level interfaces priority-high High priority - will be reviewed soon
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants