123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167 |
- /*
- * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
- *
- * Licensed under the Apache License, Version 2.0 (the "License").
- * You may not use this file except in compliance with the License.
- * A copy of the License is located at
- *
- * http://aws.amazon.com/apache2.0
- *
- * or in the "license" file accompanying this file. This file is distributed
- * on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either
- * express or implied. See the License for the specific language governing
- * permissions and limitations under the License.
- */
- #pragma once
- #define s2n_likely(x) __builtin_expect(!!(x), 1)
- #define s2n_unlikely(x) __builtin_expect(!!(x), 0)
- /**
- * s2n_ensure provides low-level safety check functionality
- *
- * This should only consumed directly by s2n_safety.
- *
- * Note: This module can be replaced by static analyzer implementation
- * to insert additional safety checks.
- */
- /**
- * Ensures `cond` is true, otherwise `action` will be performed
- */
- #define __S2N_ENSURE(cond, action) \
- do { \
- if (!(cond)) { \
- action; \
- } \
- } while (0)
- #define __S2N_ENSURE_LIKELY(cond, action) \
- do { \
- if (s2n_unlikely(!(cond))) { \
- action; \
- } \
- } while (0)
- #ifdef NDEBUG
- #define __S2N_ENSURE_DEBUG(cond, action) \
- do { \
- } while (0)
- #else
- #define __S2N_ENSURE_DEBUG(cond, action) __S2N_ENSURE_LIKELY((cond), action)
- #endif
- #define __S2N_ENSURE_PRECONDITION(result) (s2n_likely(s2n_result_is_ok(result)) ? S2N_RESULT_OK : S2N_RESULT_ERROR)
- #ifdef NDEBUG
- #define __S2N_ENSURE_POSTCONDITION(result) (S2N_RESULT_OK)
- #else
- #define __S2N_ENSURE_POSTCONDITION(result) (s2n_likely(s2n_result_is_ok(result)) ? S2N_RESULT_OK : S2N_RESULT_ERROR)
- #endif
- #define __S2N_ENSURE_SAFE_MEMCPY(d, s, n, guard) \
- do { \
- __typeof(n) __tmp_n = (n); \
- if (s2n_likely(__tmp_n)) { \
- void *r = s2n_ensure_memcpy_trace((d), (s), (__tmp_n)); \
- guard(r); \
- } \
- } while (0)
- #define __S2N_ENSURE_SAFE_MEMSET(d, c, n, guard) \
- do { \
- __typeof(n) __tmp_n = (n); \
- if (s2n_likely(__tmp_n)) { \
- __typeof(d) __tmp_d = (d); \
- guard(__tmp_d); \
- memset(__tmp_d, (c), __tmp_n); \
- } \
- } while (0)
- #if defined(S2N_DIAGNOSTICS_PUSH_SUPPORTED) && defined(S2N_DIAGNOSTICS_POP_SUPPORTED)
- #define __S2N_ENSURE_CHECKED_RETURN(v) \
- do { \
- _Pragma("GCC diagnostic push") \
- _Pragma("GCC diagnostic error \"-Wconversion\"") return v; \
- _Pragma("GCC diagnostic pop") \
- } while (0)
- #else
- #define __S2N_ENSURE_CHECKED_RETURN(v) return v
- #endif
- /**
- * `restrict` is a part of the c99 standard and will work with any C compiler. If you're trying to
- * compile with a C++ compiler `restrict` is invalid. However some C++ compilers support the behavior
- * of `restrict` using the `__restrict__` keyword. Therefore if the compiler supports `__restrict__`
- * use it.
- *
- * This is helpful for the benchmarks in tests/benchmark which use Google's Benchmark library and
- * are all written in C++.
- *
- * https://gcc.gnu.org/onlinedocs/gcc/Restricted-Pointers.html
- *
- */
- #if defined(S2N___RESTRICT__SUPPORTED)
- void *s2n_ensure_memcpy_trace(void *__restrict__ to, const void *__restrict__ from, size_t size);
- #else
- void *s2n_ensure_memcpy_trace(void *restrict to, const void *restrict from, size_t size);
- #endif
- /**
- * These macros should not be used in validate functions.
- * All validate functions are also used in assumptions for CBMC proofs,
- * which should not contain __CPROVER_*_ok primitives. The use of these primitives
- * in assumptions may lead to spurious results.
- * When the code is being verified using CBMC, these properties are formally verified;
- * When the code is built in debug mode, they are checked as much as possible using assertions.
- * When the code is built in production mode, non-fatal properties are not checked.
- * Violations of these properties are undefined behaviour.
- */
- #ifdef CBMC
- #define S2N_MEM_IS_READABLE_CHECK(base, len) (((len) == 0) || __CPROVER_r_ok((base), (len)))
- #define S2N_MEM_IS_WRITABLE_CHECK(base, len) (((len) == 0) || __CPROVER_w_ok((base), (len)))
- #else
- /* the C runtime does not give a way to check these properties,
- * but we can at least check for nullness. */
- #define S2N_MEM_IS_READABLE_CHECK(base, len) (((len) == 0) || (base) != NULL)
- #define S2N_MEM_IS_WRITABLE_CHECK(base, len) (((len) == 0) || (base) != NULL)
- #endif /* CBMC */
- /**
- * These macros can safely be used in validate functions.
- */
- #define S2N_MEM_IS_READABLE(base, len) (((len) == 0) || (base) != NULL)
- #define S2N_MEM_IS_WRITABLE(base, len) (((len) == 0) || (base) != NULL)
- #define S2N_OBJECT_PTR_IS_READABLE(ptr) ((ptr) != NULL)
- #define S2N_OBJECT_PTR_IS_WRITABLE(ptr) ((ptr) != NULL)
- #define S2N_IMPLIES(a, b) (!(a) || (b))
- /**
- * If and only if (iff) is a biconditional logical connective between statements a and b.
- * Equivalent to (S2N_IMPLIES(a, b) && S2N_IMPLIES(b, a)).
- */
- #define S2N_IFF(a, b) (!!(a) == !!(b))
- /**
- * These macros are used to specify code contracts in CBMC proofs.
- * Define function contracts.
- * When the code is being verified using CBMC, these contracts are formally verified;
- * When the code is built in production mode, contracts are not checked.
- * Violations of the function contracts are undefined behaviour.
- */
- #ifdef CBMC
- #define CONTRACT_ASSIGNS(...) __CPROVER_assigns(__VA_ARGS__)
- #define CONTRACT_ASSIGNS_ERR(...) CONTRACT_ASSIGNS(__VA_ARGS__, _s2n_debug_info, s2n_errno)
- #define CONTRACT_REQUIRES(...) __CPROVER_requires(__VA_ARGS__)
- #define CONTRACT_ENSURES(...) __CPROVER_ensures(__VA_ARGS__)
- #define CONTRACT_INVARIANT(...) __CPROVER_loop_invariant(__VA_ARGS__)
- #define CONTRACT_RETURN_VALUE (__CPROVER_return_value)
- #else
- #define CONTRACT_ASSIGNS(...)
- #define CONTRACT_ASSIGNS_ERR(...)
- #define CONTRACT_REQUIRES(...)
- #define CONTRACT_ENSURES(...)
- #define CONTRACT_INVARIANT(...)
- #define CONTRACT_RETURN_VALUE
- #endif
|