diff options
author | Jason A. Donenfeld <Jason@zx2c4.com> | 2022-04-20 15:22:55 +0200 |
---|---|---|
committer | Bernhard Reutner-Fischer <rep.dot.nop@gmail.com> | 2022-04-20 15:22:55 +0200 |
commit | 453857899616acf1c77d0d02a4c2989b2cf5f1eb (patch) | |
tree | 179d561514be46d29955ca1db5b1c5def695efa4 | |
parent | 4b407bacd4c1628782d24c3e044e43780bb057a4 (diff) | |
download | busybox-w32-453857899616acf1c77d0d02a4c2989b2cf5f1eb.tar.gz busybox-w32-453857899616acf1c77d0d02a4c2989b2cf5f1eb.tar.bz2 busybox-w32-453857899616acf1c77d0d02a4c2989b2cf5f1eb.zip |
seedrng: use libbb functions
- Make extensive use of libbb.h functions, which simplify a lot of code
and reduce binary size considerably.
- Use the already existing PID_FILE_PATH variable.
function old new delta
seed_from_file_if_exists 697 533 -164
.rodata 108665 108484 -181
seedrng_main 1463 1218 -245
------------------------------------------------------------------------------
(add/remove: 0/0 grow/shrink: 0/3 up/down: 0/-590) Total: -590 bytes
text data bss dec hex filename
977035 4227 1848 983110 f0046 busybox_old
976445 4227 1848 982520 efdf8 busybox_unstripped
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
Signed-off-by: Bernhard Reutner-Fischer <rep.dot.nop@gmail.com>
-rw-r--r-- | util-linux/seedrng.c | 148 |
1 files changed, 59 insertions, 89 deletions
diff --git a/util-linux/seedrng.c b/util-linux/seedrng.c index 2950acde0..d82a942aa 100644 --- a/util-linux/seedrng.c +++ b/util-linux/seedrng.c | |||
@@ -6,7 +6,7 @@ | |||
6 | */ | 6 | */ |
7 | 7 | ||
8 | //config:config SEEDRNG | 8 | //config:config SEEDRNG |
9 | //config: bool "seedrng (3.8 kb)" | 9 | //config: bool "seedrng (2.6 kb)" |
10 | //config: default y | 10 | //config: default y |
11 | //config: help | 11 | //config: help |
12 | //config: Seed the kernel RNG from seed files, meant to be called | 12 | //config: Seed the kernel RNG from seed files, meant to be called |
@@ -50,53 +50,38 @@ | |||
50 | #define GRND_INSECURE 0x0004 /* Apparently some headers don't ship with this yet. */ | 50 | #define GRND_INSECURE 0x0004 /* Apparently some headers don't ship with this yet. */ |
51 | #endif | 51 | #endif |
52 | 52 | ||
53 | #ifndef LOCALSTATEDIR | 53 | #if ENABLE_PID_FILE_PATH |
54 | #define LOCALSTATEDIR "/var/lib" | 54 | #define PID_FILE_PATH CONFIG_PID_FILE_PATH |
55 | #endif | 55 | #else |
56 | #ifndef RUNSTATEDIR | 56 | #define PID_FILE_PATH "/var/run" |
57 | #define RUNSTATEDIR "/var/run" | ||
58 | #endif | 57 | #endif |
59 | 58 | ||
60 | #define DEFAULT_SEED_DIR LOCALSTATEDIR "/seedrng" | 59 | #define DEFAULT_SEED_DIR "/var/lib/seedrng" |
61 | #define DEFAULT_LOCK_FILE RUNSTATEDIR "/seedrng.lock" | 60 | #define DEFAULT_LOCK_FILE PID_FILE_PATH "/seedrng.lock" |
62 | #define CREDITABLE_SEED_NAME "seed.credit" | 61 | #define CREDITABLE_SEED_NAME "seed.credit" |
63 | #define NON_CREDITABLE_SEED_NAME "seed.no-credit" | 62 | #define NON_CREDITABLE_SEED_NAME "seed.no-credit" |
64 | 63 | ||
65 | static char *seed_dir, *lock_file, *creditable_seed, *non_creditable_seed; | 64 | static char *seed_dir, *lock_file, *creditable_seed, *non_creditable_seed; |
66 | 65 | ||
67 | enum seedrng_lengths { | 66 | enum seedrng_lengths { |
68 | MAX_SEED_LEN = 512, | 67 | MIN_SEED_LEN = SHA256_OUTSIZE, |
69 | MIN_SEED_LEN = SHA256_OUTSIZE | 68 | MAX_SEED_LEN = 512 |
70 | }; | 69 | }; |
71 | 70 | ||
72 | #ifndef DIV_ROUND_UP | ||
73 | #define DIV_ROUND_UP(n, d) (((n) + (d) - 1) / (d)) | ||
74 | #endif | ||
75 | |||
76 | static size_t determine_optimal_seed_len(void) | 71 | static size_t determine_optimal_seed_len(void) |
77 | { | 72 | { |
78 | size_t ret = 0; | ||
79 | char poolsize_str[11] = { 0 }; | 73 | char poolsize_str[11] = { 0 }; |
80 | int fd = open("/proc/sys/kernel/random/poolsize", O_RDONLY); | ||
81 | 74 | ||
82 | if (fd < 0 || read(fd, poolsize_str, sizeof(poolsize_str) - 1) < 0) { | 75 | if (open_read_close("/proc/sys/kernel/random/poolsize", poolsize_str, sizeof(poolsize_str) - 1) < 0) { |
83 | fprintf(stderr, "WARNING: Unable to determine pool size, falling back to %u bits: %s\n", MIN_SEED_LEN * 8, strerror(errno)); | 76 | bb_perror_msg("unable to determine pool size, falling back to %u bits", MIN_SEED_LEN * 8); |
84 | ret = MIN_SEED_LEN; | 77 | return MIN_SEED_LEN; |
85 | } else | 78 | } |
86 | ret = DIV_ROUND_UP(strtoul(poolsize_str, NULL, 10), 8); | 79 | return MAX(MIN((bb_strtoul(poolsize_str, NULL, 10) + 7) / 8, MAX_SEED_LEN), MIN_SEED_LEN); |
87 | if (fd >= 0) | ||
88 | close(fd); | ||
89 | if (ret < MIN_SEED_LEN) | ||
90 | ret = MIN_SEED_LEN; | ||
91 | else if (ret > MAX_SEED_LEN) | ||
92 | ret = MAX_SEED_LEN; | ||
93 | return ret; | ||
94 | } | 80 | } |
95 | 81 | ||
96 | static int read_new_seed(uint8_t *seed, size_t len, bool *is_creditable) | 82 | static int read_new_seed(uint8_t *seed, size_t len, bool *is_creditable) |
97 | { | 83 | { |
98 | ssize_t ret; | 84 | ssize_t ret; |
99 | int urandom_fd; | ||
100 | 85 | ||
101 | *is_creditable = false; | 86 | *is_creditable = false; |
102 | ret = getrandom(seed, len, GRND_NONBLOCK); | 87 | ret = getrandom(seed, len, GRND_NONBLOCK); |
@@ -109,21 +94,16 @@ static int read_new_seed(uint8_t *seed, size_t len, bool *is_creditable) | |||
109 | .events = POLLIN | 94 | .events = POLLIN |
110 | }; | 95 | }; |
111 | if (random_fd.fd < 0) | 96 | if (random_fd.fd < 0) |
112 | return -errno; | 97 | return -1; |
113 | *is_creditable = poll(&random_fd, 1, 0) == 1; | 98 | *is_creditable = safe_poll(&random_fd, 1, 0) == 1; |
114 | close(random_fd.fd); | 99 | close(random_fd.fd); |
115 | } else if (getrandom(seed, len, GRND_INSECURE) == (ssize_t)len) | 100 | } else if (getrandom(seed, len, GRND_INSECURE) == (ssize_t)len) |
116 | return 0; | 101 | return 0; |
117 | urandom_fd = open("/dev/urandom", O_RDONLY); | 102 | if (open_read_close("/dev/urandom", seed, len) == (ssize_t)len) |
118 | if (urandom_fd < 0) | 103 | return 0; |
119 | return -errno; | 104 | if (!errno) |
120 | ret = read(urandom_fd, seed, len); | 105 | errno = EIO; |
121 | if (ret == (ssize_t)len) | 106 | return -1; |
122 | ret = 0; | ||
123 | else | ||
124 | ret = -errno ? -errno : -EIO; | ||
125 | close(urandom_fd); | ||
126 | return ret; | ||
127 | } | 107 | } |
128 | 108 | ||
129 | static int seed_rng(uint8_t *seed, size_t len, bool credit) | 109 | static int seed_rng(uint8_t *seed, size_t len, bool credit) |
@@ -138,69 +118,63 @@ static int seed_rng(uint8_t *seed, size_t len, bool credit) | |||
138 | }; | 118 | }; |
139 | int random_fd, ret; | 119 | int random_fd, ret; |
140 | 120 | ||
141 | if (len > sizeof(req.buffer)) | 121 | if (len > sizeof(req.buffer)) { |
142 | return -EFBIG; | 122 | errno = EFBIG; |
123 | return -1; | ||
124 | } | ||
143 | memcpy(req.buffer, seed, len); | 125 | memcpy(req.buffer, seed, len); |
144 | 126 | ||
145 | random_fd = open("/dev/random", O_RDWR); | 127 | random_fd = open("/dev/random", O_RDWR); |
146 | if (random_fd < 0) | 128 | if (random_fd < 0) |
147 | return -errno; | 129 | return -1; |
148 | ret = ioctl(random_fd, RNDADDENTROPY, &req); | 130 | ret = ioctl(random_fd, RNDADDENTROPY, &req); |
149 | if (ret) | 131 | if (ret) |
150 | ret = -errno ? -errno : -EIO; | 132 | ret = -errno ? -errno : -EIO; |
151 | close(random_fd); | 133 | close(random_fd); |
152 | return ret; | 134 | errno = -ret; |
135 | return ret ? -1 : 0; | ||
153 | } | 136 | } |
154 | 137 | ||
155 | static int seed_from_file_if_exists(const char *filename, bool credit, sha256_ctx_t *hash) | 138 | static int seed_from_file_if_exists(const char *filename, bool credit, sha256_ctx_t *hash) |
156 | { | 139 | { |
157 | uint8_t seed[MAX_SEED_LEN]; | 140 | uint8_t seed[MAX_SEED_LEN]; |
158 | ssize_t seed_len; | 141 | ssize_t seed_len; |
159 | int fd, dfd, ret = 0; | 142 | int dfd = -1, ret = 0; |
160 | 143 | ||
161 | fd = open(filename, O_RDONLY); | ||
162 | if (fd < 0 && errno == ENOENT) | ||
163 | return 0; | ||
164 | else if (fd < 0) { | ||
165 | ret = -errno; | ||
166 | fprintf(stderr, "ERROR: Unable to open seed file: %s\n", strerror(errno)); | ||
167 | return ret; | ||
168 | } | ||
169 | dfd = open(seed_dir, O_DIRECTORY | O_RDONLY); | 144 | dfd = open(seed_dir, O_DIRECTORY | O_RDONLY); |
170 | if (dfd < 0) { | 145 | if (dfd < 0) { |
171 | ret = -errno; | 146 | ret = -errno; |
172 | close(fd); | 147 | bb_simple_perror_msg("unable to open seed directory"); |
173 | fprintf(stderr, "ERROR: Unable to open seed directory: %s\n", strerror(errno)); | 148 | goto out; |
174 | return ret; | ||
175 | } | 149 | } |
176 | seed_len = read(fd, seed, sizeof(seed)); | 150 | seed_len = open_read_close(filename, seed, sizeof(seed)); |
177 | if (seed_len < 0) { | 151 | if (seed_len < 0) { |
178 | ret = -errno; | 152 | if (errno != ENOENT) { |
179 | fprintf(stderr, "ERROR: Unable to read seed file: %s\n", strerror(errno)); | 153 | ret = -errno; |
180 | } | 154 | bb_simple_perror_msg("unable to read seed file"); |
181 | close(fd); | 155 | } |
182 | if (ret) { | 156 | goto out; |
183 | close(dfd); | ||
184 | return ret; | ||
185 | } | 157 | } |
186 | if ((unlink(filename) < 0 || fsync(dfd) < 0) && seed_len) { | 158 | if ((unlink(filename) < 0 || fsync(dfd) < 0) && seed_len) { |
187 | ret = -errno; | 159 | ret = -errno; |
188 | fprintf(stderr, "ERROR: Unable to remove seed after reading, so not seeding: %s\n", strerror(errno)); | 160 | bb_simple_perror_msg("unable to remove seed after reading, so not seeding"); |
161 | goto out; | ||
189 | } | 162 | } |
190 | close(dfd); | ||
191 | if (ret) | ||
192 | return ret; | ||
193 | if (!seed_len) | 163 | if (!seed_len) |
194 | return 0; | 164 | goto out; |
195 | 165 | ||
196 | sha256_hash(hash, &seed_len, sizeof(seed_len)); | 166 | sha256_hash(hash, &seed_len, sizeof(seed_len)); |
197 | sha256_hash(hash, seed, seed_len); | 167 | sha256_hash(hash, seed, seed_len); |
198 | 168 | ||
199 | fprintf(stdout, "Seeding %zd bits %s crediting\n", seed_len * 8, credit ? "and" : "without"); | 169 | printf("Seeding %zd bits %s crediting\n", seed_len * 8, credit ? "and" : "without"); |
200 | ret = seed_rng(seed, seed_len, credit); | 170 | ret = seed_rng(seed, seed_len, credit); |
201 | if (ret < 0) | 171 | if (ret < 0) |
202 | fprintf(stderr, "ERROR: Unable to seed: %s\n", strerror(-ret)); | 172 | bb_simple_perror_msg("unable to seed"); |
203 | return ret; | 173 | out: |
174 | if (dfd >= 0) | ||
175 | close(dfd); | ||
176 | errno = -ret; | ||
177 | return ret ? -1 : 0; | ||
204 | } | 178 | } |
205 | 179 | ||
206 | int seedrng_main(int argc, char *argv[]) MAIN_EXTERNALLY_VISIBLE; | 180 | int seedrng_main(int argc, char *argv[]) MAIN_EXTERNALLY_VISIBLE; |
@@ -236,14 +210,12 @@ int seedrng_main(int argc UNUSED_PARAM, char *argv[]) | |||
236 | if (!(opt & OPT_l) || !lock_file) | 210 | if (!(opt & OPT_l) || !lock_file) |
237 | lock_file = xstrdup(DEFAULT_LOCK_FILE); | 211 | lock_file = xstrdup(DEFAULT_LOCK_FILE); |
238 | skip_credit = opt & OPT_n; | 212 | skip_credit = opt & OPT_n; |
239 | creditable_seed = xasprintf("%s/%s", seed_dir, CREDITABLE_SEED_NAME); | 213 | creditable_seed = concat_path_file(seed_dir, CREDITABLE_SEED_NAME); |
240 | non_creditable_seed = xasprintf("%s/%s", seed_dir, NON_CREDITABLE_SEED_NAME); | 214 | non_creditable_seed = concat_path_file(seed_dir, NON_CREDITABLE_SEED_NAME); |
241 | 215 | ||
242 | umask(0077); | 216 | umask(0077); |
243 | if (getuid()) { | 217 | if (getuid()) |
244 | fprintf(stderr, "ERROR: This program requires root\n"); | 218 | bb_simple_error_msg_and_die("this program requires root"); |
245 | return 1; | ||
246 | } | ||
247 | 219 | ||
248 | sha256_begin(&hash); | 220 | sha256_begin(&hash); |
249 | sha256_hash(&hash, seedrng_prefix, strlen(seedrng_prefix)); | 221 | sha256_hash(&hash, seedrng_prefix, strlen(seedrng_prefix)); |
@@ -252,14 +224,12 @@ int seedrng_main(int argc UNUSED_PARAM, char *argv[]) | |||
252 | sha256_hash(&hash, &realtime, sizeof(realtime)); | 224 | sha256_hash(&hash, &realtime, sizeof(realtime)); |
253 | sha256_hash(&hash, &boottime, sizeof(boottime)); | 225 | sha256_hash(&hash, &boottime, sizeof(boottime)); |
254 | 226 | ||
255 | if (mkdir(seed_dir, 0700) < 0 && errno != EEXIST) { | 227 | if (mkdir(seed_dir, 0700) < 0 && errno != EEXIST) |
256 | fprintf(stderr, "ERROR: Unable to create \"%s\" directory: %s\n", seed_dir, strerror(errno)); | 228 | bb_simple_perror_msg_and_die("unable to create seed directory"); |
257 | return 1; | ||
258 | } | ||
259 | 229 | ||
260 | lock = open(lock_file, O_WRONLY | O_CREAT, 0000); | 230 | lock = open(lock_file, O_WRONLY | O_CREAT, 0000); |
261 | if (lock < 0 || flock(lock, LOCK_EX) < 0) { | 231 | if (lock < 0 || flock(lock, LOCK_EX) < 0) { |
262 | fprintf(stderr, "ERROR: Unable to open lock file: %s\n", strerror(errno)); | 232 | bb_simple_perror_msg("unable to open lock file"); |
263 | program_ret = 1; | 233 | program_ret = 1; |
264 | goto out; | 234 | goto out; |
265 | } | 235 | } |
@@ -274,7 +244,7 @@ int seedrng_main(int argc UNUSED_PARAM, char *argv[]) | |||
274 | new_seed_len = determine_optimal_seed_len(); | 244 | new_seed_len = determine_optimal_seed_len(); |
275 | ret = read_new_seed(new_seed, new_seed_len, &new_seed_creditable); | 245 | ret = read_new_seed(new_seed, new_seed_len, &new_seed_creditable); |
276 | if (ret < 0) { | 246 | if (ret < 0) { |
277 | fprintf(stderr, "ERROR: Unable to read new seed: %s\n", strerror(-ret)); | 247 | bb_simple_perror_msg("unable to read new seed"); |
278 | new_seed_len = SHA256_OUTSIZE; | 248 | new_seed_len = SHA256_OUTSIZE; |
279 | strncpy((char *)new_seed, seedrng_failure, new_seed_len); | 249 | strncpy((char *)new_seed, seedrng_failure, new_seed_len); |
280 | program_ret |= 1 << 3; | 250 | program_ret |= 1 << 3; |
@@ -283,20 +253,20 @@ int seedrng_main(int argc UNUSED_PARAM, char *argv[]) | |||
283 | sha256_hash(&hash, new_seed, new_seed_len); | 253 | sha256_hash(&hash, new_seed, new_seed_len); |
284 | sha256_end(&hash, new_seed + new_seed_len - SHA256_OUTSIZE); | 254 | sha256_end(&hash, new_seed + new_seed_len - SHA256_OUTSIZE); |
285 | 255 | ||
286 | fprintf(stdout, "Saving %zu bits of %s seed for next boot\n", new_seed_len * 8, new_seed_creditable ? "creditable" : "non-creditable"); | 256 | printf("Saving %zu bits of %s seed for next boot\n", new_seed_len * 8, new_seed_creditable ? "creditable" : "non-creditable"); |
287 | fd = open(non_creditable_seed, O_WRONLY | O_CREAT | O_TRUNC, 0400); | 257 | fd = open(non_creditable_seed, O_WRONLY | O_CREAT | O_TRUNC, 0400); |
288 | if (fd < 0) { | 258 | if (fd < 0) { |
289 | fprintf(stderr, "ERROR: Unable to open seed file for writing: %s\n", strerror(errno)); | 259 | bb_simple_perror_msg("unable to open seed file for writing"); |
290 | program_ret |= 1 << 4; | 260 | program_ret |= 1 << 4; |
291 | goto out; | 261 | goto out; |
292 | } | 262 | } |
293 | if (write(fd, new_seed, new_seed_len) != (ssize_t)new_seed_len || fsync(fd) < 0) { | 263 | if (write(fd, new_seed, new_seed_len) != (ssize_t)new_seed_len || fsync(fd) < 0) { |
294 | fprintf(stderr, "ERROR: Unable to write seed file: %s\n", strerror(errno)); | 264 | bb_simple_perror_msg("unable to write seed file"); |
295 | program_ret |= 1 << 5; | 265 | program_ret |= 1 << 5; |
296 | goto out; | 266 | goto out; |
297 | } | 267 | } |
298 | if (new_seed_creditable && rename(non_creditable_seed, creditable_seed) < 0) { | 268 | if (new_seed_creditable && rename(non_creditable_seed, creditable_seed) < 0) { |
299 | fprintf(stderr, "WARNING: Unable to make new seed creditable: %s\n", strerror(errno)); | 269 | bb_simple_perror_msg("unable to make new seed creditable"); |
300 | program_ret |= 1 << 6; | 270 | program_ret |= 1 << 6; |
301 | } | 271 | } |
302 | out: | 272 | out: |