| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | =pod | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =head1 NAME | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-01-28 12:16:47 +08:00
										 |  |  | CRYPTO_secure_malloc_init, CRYPTO_secure_malloc_initialized, | 
					
						
							|  |  |  | CRYPTO_secure_malloc_done, OPENSSL_secure_malloc, CRYPTO_secure_malloc, | 
					
						
							|  |  |  | OPENSSL_secure_zalloc, CRYPTO_secure_zalloc, OPENSSL_secure_free, | 
					
						
							| 
									
										
										
										
											2017-07-29 19:07:33 +08:00
										 |  |  | CRYPTO_secure_free, OPENSSL_secure_clear_free, | 
					
						
							|  |  |  | CRYPTO_secure_clear_free, OPENSSL_secure_actual_size, | 
					
						
							| 
									
										
										
										
											2019-11-26 22:16:41 +08:00
										 |  |  | CRYPTO_secure_allocated, | 
					
						
							| 
									
										
										
										
											2017-01-17 03:41:03 +08:00
										 |  |  | CRYPTO_secure_used - secure heap storage | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | =head1 SYNOPSIS | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |  #include <openssl/crypto.h> | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-02-05 07:09:29 +08:00
										 |  |  |  int CRYPTO_secure_malloc_init(size_t size, size_t minsize); | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  |  int CRYPTO_secure_malloc_initialized(); | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-04-12 04:03:42 +08:00
										 |  |  |  int CRYPTO_secure_malloc_done(); | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-04-12 04:03:42 +08:00
										 |  |  |  void *OPENSSL_secure_malloc(size_t num); | 
					
						
							|  |  |  |  void *CRYPTO_secure_malloc(size_t num, const char *file, int line); | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-04-12 04:03:42 +08:00
										 |  |  |  void *OPENSSL_secure_zalloc(size_t num); | 
					
						
							|  |  |  |  void *CRYPTO_secure_zalloc(size_t num, const char *file, int line); | 
					
						
							| 
									
										
										
										
											2016-01-28 12:16:47 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  |  void OPENSSL_secure_free(void* ptr); | 
					
						
							| 
									
										
										
										
											2016-02-17 09:32:27 +08:00
										 |  |  |  void CRYPTO_secure_free(void *ptr, const char *, int); | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-07-29 19:07:33 +08:00
										 |  |  |  void OPENSSL_secure_clear_free(void* ptr, size_t num); | 
					
						
							|  |  |  |  void CRYPTO_secure_clear_free(void *ptr, size_t num, const char *, int); | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  |  size_t OPENSSL_secure_actual_size(const void *ptr); | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-11-26 22:16:41 +08:00
										 |  |  |  int CRYPTO_secure_allocated(const void *ptr); | 
					
						
							| 
									
										
										
										
											2017-01-17 03:41:03 +08:00
										 |  |  |  size_t CRYPTO_secure_used(); | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | =head1 DESCRIPTION | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | In order to help protect applications (particularly long-running servers) | 
					
						
							|  |  |  | from pointer overruns or underruns that could return arbitrary data from | 
					
						
							|  |  |  | the program's dynamic memory area, where keys and other sensitive | 
					
						
							|  |  |  | information might be stored, OpenSSL supports the concept of a "secure heap." | 
					
						
							|  |  |  | The level and type of security guarantees depend on the operating system. | 
					
						
							|  |  |  | It is a good idea to review the code and see if it addresses your | 
					
						
							|  |  |  | threat model and concerns. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | If a secure heap is used, then private key B<BIGNUM> values are stored there. | 
					
						
							|  |  |  | This protects long-term storage of private keys, but will not necessarily | 
					
						
							|  |  |  | put all intermediate values and computations there. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-01-28 12:16:47 +08:00
										 |  |  | CRYPTO_secure_malloc_init() creates the secure heap, with the specified | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | C<size> in bytes. The C<minsize> parameter is the minimum size to | 
					
						
							| 
									
										
										
										
											2020-02-22 08:35:26 +08:00
										 |  |  | allocate from the heap or zero to use a reasonable default value. | 
					
						
							|  |  |  | Both C<size> and, if specified, C<minsize> must be a power of two and | 
					
						
							|  |  |  | C<minsize> should generally be small, for example 16 or 32. | 
					
						
							|  |  |  | C<minsize> must be less than a quarter of C<size> in any case. | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-01-28 12:16:47 +08:00
										 |  |  | CRYPTO_secure_malloc_initialized() indicates whether or not the secure | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | heap as been initialized and is available. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-01-28 12:16:47 +08:00
										 |  |  | CRYPTO_secure_malloc_done() releases the heap and makes the memory unavailable | 
					
						
							| 
									
										
										
										
											2016-04-12 04:03:42 +08:00
										 |  |  | to the process if all secure memory has been freed. | 
					
						
							| 
									
										
										
										
											2016-05-20 20:11:46 +08:00
										 |  |  | It can take noticeably long to complete. | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-01-28 12:16:47 +08:00
										 |  |  | OPENSSL_secure_malloc() allocates C<num> bytes from the heap. | 
					
						
							|  |  |  | If CRYPTO_secure_malloc_init() is not called, this is equivalent to | 
					
						
							|  |  |  | calling OPENSSL_malloc(). | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | It is a macro that expands to | 
					
						
							| 
									
										
										
										
											2016-01-28 12:16:47 +08:00
										 |  |  | CRYPTO_secure_malloc() and adds the C<__FILE__> and C<__LINE__> parameters. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | OPENSSL_secure_zalloc() and CRYPTO_secure_zalloc() are like | 
					
						
							|  |  |  | OPENSSL_secure_malloc() and CRYPTO_secure_malloc(), respectively, | 
					
						
							|  |  |  | except that they call memset() to zero the memory before returning. | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-01-28 12:16:47 +08:00
										 |  |  | OPENSSL_secure_free() releases the memory at C<ptr> back to the heap. | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | It must be called with a value previously obtained from | 
					
						
							| 
									
										
										
										
											2016-01-28 12:16:47 +08:00
										 |  |  | OPENSSL_secure_malloc(). | 
					
						
							|  |  |  | If CRYPTO_secure_malloc_init() is not called, this is equivalent to | 
					
						
							|  |  |  | calling OPENSSL_free(). | 
					
						
							|  |  |  | It exists for consistency with OPENSSL_secure_malloc() , and | 
					
						
							| 
									
										
										
										
											2016-02-17 09:32:27 +08:00
										 |  |  | is a macro that expands to CRYPTO_secure_free() and adds the C<__FILE__> | 
					
						
							|  |  |  | and C<__LINE__> parameters.. | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-07-29 19:07:33 +08:00
										 |  |  | OPENSSL_secure_clear_free() is similar to OPENSSL_secure_free() except | 
					
						
							|  |  |  | that it has an additional C<num> parameter which is used to clear | 
					
						
							|  |  |  | the memory if it was not allocated from the secure heap. | 
					
						
							|  |  |  | If CRYPTO_secure_malloc_init() is not called, this is equivalent to | 
					
						
							|  |  |  | calling OPENSSL_clear_free(). | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-01-28 12:16:47 +08:00
										 |  |  | OPENSSL_secure_actual_size() tells the actual size allocated to the | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | pointer; implementations may allocate more space than initially | 
					
						
							|  |  |  | requested, in order to "round up" and reduce secure heap fragmentation. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-11-26 22:16:41 +08:00
										 |  |  | OPENSSL_secure_allocated() tells if a pointer is allocated in the secure heap. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-04-12 04:03:42 +08:00
										 |  |  | CRYPTO_secure_used() returns the number of bytes allocated in the | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | secure heap. | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | =head1 RETURN VALUES | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-01-28 12:16:47 +08:00
										 |  |  | CRYPTO_secure_malloc_init() returns 0 on failure, 1 if successful, | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | and 2 if successful but the heap could not be protected by memory | 
					
						
							|  |  |  | mapping. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-01-28 12:16:47 +08:00
										 |  |  | CRYPTO_secure_malloc_initialized() returns 1 if the secure heap is | 
					
						
							|  |  |  | available (that is, if CRYPTO_secure_malloc_init() has been called, | 
					
						
							| 
									
										
										
										
											2016-04-12 04:03:42 +08:00
										 |  |  | but CRYPTO_secure_malloc_done() has not been called or failed) or 0 if not. | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-01-28 12:16:47 +08:00
										 |  |  | OPENSSL_secure_malloc() and OPENSSL_secure_zalloc() return a pointer into | 
					
						
							|  |  |  | the secure heap of the requested size, or C<NULL> if memory could not be | 
					
						
							|  |  |  | allocated. | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-03-20 23:51:06 +08:00
										 |  |  | CRYPTO_secure_allocated() returns 1 if the pointer is in the secure heap, or 0 if not. | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-04-12 04:03:42 +08:00
										 |  |  | CRYPTO_secure_malloc_done() returns 1 if the secure memory area is released, or 0 if not. | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-07-29 19:07:33 +08:00
										 |  |  | OPENSSL_secure_free() and OPENSSL_secure_clear_free() return no values. | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | =head1 SEE ALSO | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-01-08 04:06:38 +08:00
										 |  |  | L<OPENSSL_malloc(3)>, | 
					
						
							| 
									
										
										
										
											2016-11-11 16:33:09 +08:00
										 |  |  | L<BN_new(3)> | 
					
						
							| 
									
										
										
										
											2015-04-25 04:39:40 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-07-29 19:07:33 +08:00
										 |  |  | =head1 HISTORY | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-12-09 08:02:36 +08:00
										 |  |  | The OPENSSL_secure_clear_free() function was added in OpenSSL 1.1.0g. | 
					
						
							| 
									
										
										
										
											2017-07-29 19:07:33 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-02-05 07:09:29 +08:00
										 |  |  | The second argument to CRYPTO_secure_malloc_init() was changed from an B<int> to | 
					
						
							|  |  |  | a B<size_t> in OpenSSL 3.0. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-05-18 23:44:05 +08:00
										 |  |  | =head1 COPYRIGHT | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-04-23 20:55:52 +08:00
										 |  |  | Copyright 2015-2020 The OpenSSL Project Authors. All Rights Reserved. | 
					
						
							| 
									
										
										
										
											2016-05-18 23:44:05 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-12-06 21:04:44 +08:00
										 |  |  | Licensed under the Apache License 2.0 (the "License").  You may not use | 
					
						
							| 
									
										
										
										
											2016-05-18 23:44:05 +08:00
										 |  |  | this file except in compliance with the License.  You can obtain a copy | 
					
						
							|  |  |  | in the file LICENSE in the source distribution or at | 
					
						
							|  |  |  | L<https://www.openssl.org/source/license.html>. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =cut |