summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authordjm <>2022-07-31 05:10:36 +0000
committerdjm <>2022-07-31 05:10:36 +0000
commitadfeaa72918ca3bc0230a94687ef86320bca9ae4 (patch)
treec689da6c74016e0964c9f7d3c1bbdcac52523be7
parented0368b4d48f11a2d744f662b938e0cb557ca298 (diff)
downloadopenbsd-adfeaa72918ca3bc0230a94687ef86320bca9ae4.tar.gz
openbsd-adfeaa72918ca3bc0230a94687ef86320bca9ae4.tar.bz2
openbsd-adfeaa72918ca3bc0230a94687ef86320bca9ae4.zip
Randomise the rekey interval a little. Previously, the chacha20
instance would be rekeyed every 1.6MB. This makes it happen at a random point somewhere in the 1-2MB range. Feedback deraadt@ visa@, ok tb@ visa@
-rw-r--r--src/lib/libc/crypt/arc4random.c10
1 files changed, 8 insertions, 2 deletions
diff --git a/src/lib/libc/crypt/arc4random.c b/src/lib/libc/crypt/arc4random.c
index 6cbab6e79b..61bf0edaaa 100644
--- a/src/lib/libc/crypt/arc4random.c
+++ b/src/lib/libc/crypt/arc4random.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: arc4random.c,v 1.56 2022/02/28 21:56:29 dtucker Exp $ */ 1/* $OpenBSD: arc4random.c,v 1.57 2022/07/31 05:10:36 djm Exp $ */
2 2
3/* 3/*
4 * Copyright (c) 1996, David Mazieres <dm@uun.org> 4 * Copyright (c) 1996, David Mazieres <dm@uun.org>
@@ -49,6 +49,8 @@
49#define BLOCKSZ 64 49#define BLOCKSZ 64
50#define RSBUFSZ (16*BLOCKSZ) 50#define RSBUFSZ (16*BLOCKSZ)
51 51
52#define REKEY_BASE (1024*1024) /* NB. should be a power of 2 */
53
52/* Marked MAP_INHERIT_ZERO, so zero'd out in fork children. */ 54/* Marked MAP_INHERIT_ZERO, so zero'd out in fork children. */
53static struct _rs { 55static struct _rs {
54 size_t rs_have; /* valid bytes at end of rs_buf */ 56 size_t rs_have; /* valid bytes at end of rs_buf */
@@ -86,6 +88,7 @@ static void
86_rs_stir(void) 88_rs_stir(void)
87{ 89{
88 u_char rnd[KEYSZ + IVSZ]; 90 u_char rnd[KEYSZ + IVSZ];
91 uint32_t rekey_fuzz = 0;
89 92
90 if (getentropy(rnd, sizeof rnd) == -1) 93 if (getentropy(rnd, sizeof rnd) == -1)
91 _getentropy_fail(); 94 _getentropy_fail();
@@ -100,7 +103,10 @@ _rs_stir(void)
100 rs->rs_have = 0; 103 rs->rs_have = 0;
101 memset(rsx->rs_buf, 0, sizeof(rsx->rs_buf)); 104 memset(rsx->rs_buf, 0, sizeof(rsx->rs_buf));
102 105
103 rs->rs_count = 1600000; 106 /* rekey interval should not be predictable */
107 chacha_encrypt_bytes(&rsx->rs_chacha, (uint8_t *)&rekey_fuzz,
108 (uint8_t *)&rekey_fuzz, sizeof(rekey_fuzz));
109 rs->rs_count = REKEY_BASE + (rekey_fuzz % REKEY_BASE);
104} 110}
105 111
106static inline void 112static inline void