aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJason A. Donenfeld <Jason@zx2c4.com>2022-04-20 15:22:55 +0200
committerBernhard Reutner-Fischer <rep.dot.nop@gmail.com>2022-04-20 15:22:55 +0200
commit453857899616acf1c77d0d02a4c2989b2cf5f1eb (patch)
tree179d561514be46d29955ca1db5b1c5def695efa4
parent4b407bacd4c1628782d24c3e044e43780bb057a4 (diff)
downloadbusybox-w32-453857899616acf1c77d0d02a4c2989b2cf5f1eb.tar.gz
busybox-w32-453857899616acf1c77d0d02a4c2989b2cf5f1eb.tar.bz2
busybox-w32-453857899616acf1c77d0d02a4c2989b2cf5f1eb.zip
seedrng: use libbb functions
- Make extensive use of libbb.h functions, which simplify a lot of code and reduce binary size considerably. - Use the already existing PID_FILE_PATH variable. function old new delta seed_from_file_if_exists 697 533 -164 .rodata 108665 108484 -181 seedrng_main 1463 1218 -245 ------------------------------------------------------------------------------ (add/remove: 0/0 grow/shrink: 0/3 up/down: 0/-590) Total: -590 bytes text data bss dec hex filename 977035 4227 1848 983110 f0046 busybox_old 976445 4227 1848 982520 efdf8 busybox_unstripped Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com> Signed-off-by: Bernhard Reutner-Fischer <rep.dot.nop@gmail.com>
-rw-r--r--util-linux/seedrng.c148
1 files changed, 59 insertions, 89 deletions
diff --git a/util-linux/seedrng.c b/util-linux/seedrng.c
index 2950acde0..d82a942aa 100644
--- a/util-linux/seedrng.c
+++ b/util-linux/seedrng.c
@@ -6,7 +6,7 @@
6 */ 6 */
7 7
8//config:config SEEDRNG 8//config:config SEEDRNG
9//config: bool "seedrng (3.8 kb)" 9//config: bool "seedrng (2.6 kb)"
10//config: default y 10//config: default y
11//config: help 11//config: help
12//config: Seed the kernel RNG from seed files, meant to be called 12//config: Seed the kernel RNG from seed files, meant to be called
@@ -50,53 +50,38 @@
50#define GRND_INSECURE 0x0004 /* Apparently some headers don't ship with this yet. */ 50#define GRND_INSECURE 0x0004 /* Apparently some headers don't ship with this yet. */
51#endif 51#endif
52 52
53#ifndef LOCALSTATEDIR 53#if ENABLE_PID_FILE_PATH
54#define LOCALSTATEDIR "/var/lib" 54#define PID_FILE_PATH CONFIG_PID_FILE_PATH
55#endif 55#else
56#ifndef RUNSTATEDIR 56#define PID_FILE_PATH "/var/run"
57#define RUNSTATEDIR "/var/run"
58#endif 57#endif
59 58
60#define DEFAULT_SEED_DIR LOCALSTATEDIR "/seedrng" 59#define DEFAULT_SEED_DIR "/var/lib/seedrng"
61#define DEFAULT_LOCK_FILE RUNSTATEDIR "/seedrng.lock" 60#define DEFAULT_LOCK_FILE PID_FILE_PATH "/seedrng.lock"
62#define CREDITABLE_SEED_NAME "seed.credit" 61#define CREDITABLE_SEED_NAME "seed.credit"
63#define NON_CREDITABLE_SEED_NAME "seed.no-credit" 62#define NON_CREDITABLE_SEED_NAME "seed.no-credit"
64 63
65static char *seed_dir, *lock_file, *creditable_seed, *non_creditable_seed; 64static char *seed_dir, *lock_file, *creditable_seed, *non_creditable_seed;
66 65
67enum seedrng_lengths { 66enum seedrng_lengths {
68 MAX_SEED_LEN = 512, 67 MIN_SEED_LEN = SHA256_OUTSIZE,
69 MIN_SEED_LEN = SHA256_OUTSIZE 68 MAX_SEED_LEN = 512
70}; 69};
71 70
72#ifndef DIV_ROUND_UP
73#define DIV_ROUND_UP(n, d) (((n) + (d) - 1) / (d))
74#endif
75
76static size_t determine_optimal_seed_len(void) 71static size_t determine_optimal_seed_len(void)
77{ 72{
78 size_t ret = 0;
79 char poolsize_str[11] = { 0 }; 73 char poolsize_str[11] = { 0 };
80 int fd = open("/proc/sys/kernel/random/poolsize", O_RDONLY);
81 74
82 if (fd < 0 || read(fd, poolsize_str, sizeof(poolsize_str) - 1) < 0) { 75 if (open_read_close("/proc/sys/kernel/random/poolsize", poolsize_str, sizeof(poolsize_str) - 1) < 0) {
83 fprintf(stderr, "WARNING: Unable to determine pool size, falling back to %u bits: %s\n", MIN_SEED_LEN * 8, strerror(errno)); 76 bb_perror_msg("unable to determine pool size, falling back to %u bits", MIN_SEED_LEN * 8);
84 ret = MIN_SEED_LEN; 77 return MIN_SEED_LEN;
85 } else 78 }
86 ret = DIV_ROUND_UP(strtoul(poolsize_str, NULL, 10), 8); 79 return MAX(MIN((bb_strtoul(poolsize_str, NULL, 10) + 7) / 8, MAX_SEED_LEN), MIN_SEED_LEN);
87 if (fd >= 0)
88 close(fd);
89 if (ret < MIN_SEED_LEN)
90 ret = MIN_SEED_LEN;
91 else if (ret > MAX_SEED_LEN)
92 ret = MAX_SEED_LEN;
93 return ret;
94} 80}
95 81
96static int read_new_seed(uint8_t *seed, size_t len, bool *is_creditable) 82static int read_new_seed(uint8_t *seed, size_t len, bool *is_creditable)
97{ 83{
98 ssize_t ret; 84 ssize_t ret;
99 int urandom_fd;
100 85
101 *is_creditable = false; 86 *is_creditable = false;
102 ret = getrandom(seed, len, GRND_NONBLOCK); 87 ret = getrandom(seed, len, GRND_NONBLOCK);
@@ -109,21 +94,16 @@ static int read_new_seed(uint8_t *seed, size_t len, bool *is_creditable)
109 .events = POLLIN 94 .events = POLLIN
110 }; 95 };
111 if (random_fd.fd < 0) 96 if (random_fd.fd < 0)
112 return -errno; 97 return -1;
113 *is_creditable = poll(&random_fd, 1, 0) == 1; 98 *is_creditable = safe_poll(&random_fd, 1, 0) == 1;
114 close(random_fd.fd); 99 close(random_fd.fd);
115 } else if (getrandom(seed, len, GRND_INSECURE) == (ssize_t)len) 100 } else if (getrandom(seed, len, GRND_INSECURE) == (ssize_t)len)
116 return 0; 101 return 0;
117 urandom_fd = open("/dev/urandom", O_RDONLY); 102 if (open_read_close("/dev/urandom", seed, len) == (ssize_t)len)
118 if (urandom_fd < 0) 103 return 0;
119 return -errno; 104 if (!errno)
120 ret = read(urandom_fd, seed, len); 105 errno = EIO;
121 if (ret == (ssize_t)len) 106 return -1;
122 ret = 0;
123 else
124 ret = -errno ? -errno : -EIO;
125 close(urandom_fd);
126 return ret;
127} 107}
128 108
129static int seed_rng(uint8_t *seed, size_t len, bool credit) 109static int seed_rng(uint8_t *seed, size_t len, bool credit)
@@ -138,69 +118,63 @@ static int seed_rng(uint8_t *seed, size_t len, bool credit)
138 }; 118 };
139 int random_fd, ret; 119 int random_fd, ret;
140 120
141 if (len > sizeof(req.buffer)) 121 if (len > sizeof(req.buffer)) {
142 return -EFBIG; 122 errno = EFBIG;
123 return -1;
124 }
143 memcpy(req.buffer, seed, len); 125 memcpy(req.buffer, seed, len);
144 126
145 random_fd = open("/dev/random", O_RDWR); 127 random_fd = open("/dev/random", O_RDWR);
146 if (random_fd < 0) 128 if (random_fd < 0)
147 return -errno; 129 return -1;
148 ret = ioctl(random_fd, RNDADDENTROPY, &req); 130 ret = ioctl(random_fd, RNDADDENTROPY, &req);
149 if (ret) 131 if (ret)
150 ret = -errno ? -errno : -EIO; 132 ret = -errno ? -errno : -EIO;
151 close(random_fd); 133 close(random_fd);
152 return ret; 134 errno = -ret;
135 return ret ? -1 : 0;
153} 136}
154 137
155static int seed_from_file_if_exists(const char *filename, bool credit, sha256_ctx_t *hash) 138static int seed_from_file_if_exists(const char *filename, bool credit, sha256_ctx_t *hash)
156{ 139{
157 uint8_t seed[MAX_SEED_LEN]; 140 uint8_t seed[MAX_SEED_LEN];
158 ssize_t seed_len; 141 ssize_t seed_len;
159 int fd, dfd, ret = 0; 142 int dfd = -1, ret = 0;
160 143
161 fd = open(filename, O_RDONLY);
162 if (fd < 0 && errno == ENOENT)
163 return 0;
164 else if (fd < 0) {
165 ret = -errno;
166 fprintf(stderr, "ERROR: Unable to open seed file: %s\n", strerror(errno));
167 return ret;
168 }
169 dfd = open(seed_dir, O_DIRECTORY | O_RDONLY); 144 dfd = open(seed_dir, O_DIRECTORY | O_RDONLY);
170 if (dfd < 0) { 145 if (dfd < 0) {
171 ret = -errno; 146 ret = -errno;
172 close(fd); 147 bb_simple_perror_msg("unable to open seed directory");
173 fprintf(stderr, "ERROR: Unable to open seed directory: %s\n", strerror(errno)); 148 goto out;
174 return ret;
175 } 149 }
176 seed_len = read(fd, seed, sizeof(seed)); 150 seed_len = open_read_close(filename, seed, sizeof(seed));
177 if (seed_len < 0) { 151 if (seed_len < 0) {
178 ret = -errno; 152 if (errno != ENOENT) {
179 fprintf(stderr, "ERROR: Unable to read seed file: %s\n", strerror(errno)); 153 ret = -errno;
180 } 154 bb_simple_perror_msg("unable to read seed file");
181 close(fd); 155 }
182 if (ret) { 156 goto out;
183 close(dfd);
184 return ret;
185 } 157 }
186 if ((unlink(filename) < 0 || fsync(dfd) < 0) && seed_len) { 158 if ((unlink(filename) < 0 || fsync(dfd) < 0) && seed_len) {
187 ret = -errno; 159 ret = -errno;
188 fprintf(stderr, "ERROR: Unable to remove seed after reading, so not seeding: %s\n", strerror(errno)); 160 bb_simple_perror_msg("unable to remove seed after reading, so not seeding");
161 goto out;
189 } 162 }
190 close(dfd);
191 if (ret)
192 return ret;
193 if (!seed_len) 163 if (!seed_len)
194 return 0; 164 goto out;
195 165
196 sha256_hash(hash, &seed_len, sizeof(seed_len)); 166 sha256_hash(hash, &seed_len, sizeof(seed_len));
197 sha256_hash(hash, seed, seed_len); 167 sha256_hash(hash, seed, seed_len);
198 168
199 fprintf(stdout, "Seeding %zd bits %s crediting\n", seed_len * 8, credit ? "and" : "without"); 169 printf("Seeding %zd bits %s crediting\n", seed_len * 8, credit ? "and" : "without");
200 ret = seed_rng(seed, seed_len, credit); 170 ret = seed_rng(seed, seed_len, credit);
201 if (ret < 0) 171 if (ret < 0)
202 fprintf(stderr, "ERROR: Unable to seed: %s\n", strerror(-ret)); 172 bb_simple_perror_msg("unable to seed");
203 return ret; 173out:
174 if (dfd >= 0)
175 close(dfd);
176 errno = -ret;
177 return ret ? -1 : 0;
204} 178}
205 179
206int seedrng_main(int argc, char *argv[]) MAIN_EXTERNALLY_VISIBLE; 180int seedrng_main(int argc, char *argv[]) MAIN_EXTERNALLY_VISIBLE;
@@ -236,14 +210,12 @@ int seedrng_main(int argc UNUSED_PARAM, char *argv[])
236 if (!(opt & OPT_l) || !lock_file) 210 if (!(opt & OPT_l) || !lock_file)
237 lock_file = xstrdup(DEFAULT_LOCK_FILE); 211 lock_file = xstrdup(DEFAULT_LOCK_FILE);
238 skip_credit = opt & OPT_n; 212 skip_credit = opt & OPT_n;
239 creditable_seed = xasprintf("%s/%s", seed_dir, CREDITABLE_SEED_NAME); 213 creditable_seed = concat_path_file(seed_dir, CREDITABLE_SEED_NAME);
240 non_creditable_seed = xasprintf("%s/%s", seed_dir, NON_CREDITABLE_SEED_NAME); 214 non_creditable_seed = concat_path_file(seed_dir, NON_CREDITABLE_SEED_NAME);
241 215
242 umask(0077); 216 umask(0077);
243 if (getuid()) { 217 if (getuid())
244 fprintf(stderr, "ERROR: This program requires root\n"); 218 bb_simple_error_msg_and_die("this program requires root");
245 return 1;
246 }
247 219
248 sha256_begin(&hash); 220 sha256_begin(&hash);
249 sha256_hash(&hash, seedrng_prefix, strlen(seedrng_prefix)); 221 sha256_hash(&hash, seedrng_prefix, strlen(seedrng_prefix));
@@ -252,14 +224,12 @@ int seedrng_main(int argc UNUSED_PARAM, char *argv[])
252 sha256_hash(&hash, &realtime, sizeof(realtime)); 224 sha256_hash(&hash, &realtime, sizeof(realtime));
253 sha256_hash(&hash, &boottime, sizeof(boottime)); 225 sha256_hash(&hash, &boottime, sizeof(boottime));
254 226
255 if (mkdir(seed_dir, 0700) < 0 && errno != EEXIST) { 227 if (mkdir(seed_dir, 0700) < 0 && errno != EEXIST)
256 fprintf(stderr, "ERROR: Unable to create \"%s\" directory: %s\n", seed_dir, strerror(errno)); 228 bb_simple_perror_msg_and_die("unable to create seed directory");
257 return 1;
258 }
259 229
260 lock = open(lock_file, O_WRONLY | O_CREAT, 0000); 230 lock = open(lock_file, O_WRONLY | O_CREAT, 0000);
261 if (lock < 0 || flock(lock, LOCK_EX) < 0) { 231 if (lock < 0 || flock(lock, LOCK_EX) < 0) {
262 fprintf(stderr, "ERROR: Unable to open lock file: %s\n", strerror(errno)); 232 bb_simple_perror_msg("unable to open lock file");
263 program_ret = 1; 233 program_ret = 1;
264 goto out; 234 goto out;
265 } 235 }
@@ -274,7 +244,7 @@ int seedrng_main(int argc UNUSED_PARAM, char *argv[])
274 new_seed_len = determine_optimal_seed_len(); 244 new_seed_len = determine_optimal_seed_len();
275 ret = read_new_seed(new_seed, new_seed_len, &new_seed_creditable); 245 ret = read_new_seed(new_seed, new_seed_len, &new_seed_creditable);
276 if (ret < 0) { 246 if (ret < 0) {
277 fprintf(stderr, "ERROR: Unable to read new seed: %s\n", strerror(-ret)); 247 bb_simple_perror_msg("unable to read new seed");
278 new_seed_len = SHA256_OUTSIZE; 248 new_seed_len = SHA256_OUTSIZE;
279 strncpy((char *)new_seed, seedrng_failure, new_seed_len); 249 strncpy((char *)new_seed, seedrng_failure, new_seed_len);
280 program_ret |= 1 << 3; 250 program_ret |= 1 << 3;
@@ -283,20 +253,20 @@ int seedrng_main(int argc UNUSED_PARAM, char *argv[])
283 sha256_hash(&hash, new_seed, new_seed_len); 253 sha256_hash(&hash, new_seed, new_seed_len);
284 sha256_end(&hash, new_seed + new_seed_len - SHA256_OUTSIZE); 254 sha256_end(&hash, new_seed + new_seed_len - SHA256_OUTSIZE);
285 255
286 fprintf(stdout, "Saving %zu bits of %s seed for next boot\n", new_seed_len * 8, new_seed_creditable ? "creditable" : "non-creditable"); 256 printf("Saving %zu bits of %s seed for next boot\n", new_seed_len * 8, new_seed_creditable ? "creditable" : "non-creditable");
287 fd = open(non_creditable_seed, O_WRONLY | O_CREAT | O_TRUNC, 0400); 257 fd = open(non_creditable_seed, O_WRONLY | O_CREAT | O_TRUNC, 0400);
288 if (fd < 0) { 258 if (fd < 0) {
289 fprintf(stderr, "ERROR: Unable to open seed file for writing: %s\n", strerror(errno)); 259 bb_simple_perror_msg("unable to open seed file for writing");
290 program_ret |= 1 << 4; 260 program_ret |= 1 << 4;
291 goto out; 261 goto out;
292 } 262 }
293 if (write(fd, new_seed, new_seed_len) != (ssize_t)new_seed_len || fsync(fd) < 0) { 263 if (write(fd, new_seed, new_seed_len) != (ssize_t)new_seed_len || fsync(fd) < 0) {
294 fprintf(stderr, "ERROR: Unable to write seed file: %s\n", strerror(errno)); 264 bb_simple_perror_msg("unable to write seed file");
295 program_ret |= 1 << 5; 265 program_ret |= 1 << 5;
296 goto out; 266 goto out;
297 } 267 }
298 if (new_seed_creditable && rename(non_creditable_seed, creditable_seed) < 0) { 268 if (new_seed_creditable && rename(non_creditable_seed, creditable_seed) < 0) {
299 fprintf(stderr, "WARNING: Unable to make new seed creditable: %s\n", strerror(errno)); 269 bb_simple_perror_msg("unable to make new seed creditable");
300 program_ret |= 1 << 6; 270 program_ret |= 1 << 6;
301 } 271 }
302out: 272out: