diff options
author | djm <> | 2022-07-31 05:10:36 +0000 |
---|---|---|
committer | djm <> | 2022-07-31 05:10:36 +0000 |
commit | adfeaa72918ca3bc0230a94687ef86320bca9ae4 (patch) | |
tree | c689da6c74016e0964c9f7d3c1bbdcac52523be7 | |
parent | ed0368b4d48f11a2d744f662b938e0cb557ca298 (diff) | |
download | openbsd-adfeaa72918ca3bc0230a94687ef86320bca9ae4.tar.gz openbsd-adfeaa72918ca3bc0230a94687ef86320bca9ae4.tar.bz2 openbsd-adfeaa72918ca3bc0230a94687ef86320bca9ae4.zip |
Randomise the rekey interval a little. Previously, the chacha20
instance would be rekeyed every 1.6MB. This makes it happen at a
random point somewhere in the 1-2MB range.
Feedback deraadt@ visa@, ok tb@ visa@
-rw-r--r-- | src/lib/libc/crypt/arc4random.c | 10 |
1 files changed, 8 insertions, 2 deletions
diff --git a/src/lib/libc/crypt/arc4random.c b/src/lib/libc/crypt/arc4random.c index 6cbab6e79b..61bf0edaaa 100644 --- a/src/lib/libc/crypt/arc4random.c +++ b/src/lib/libc/crypt/arc4random.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: arc4random.c,v 1.56 2022/02/28 21:56:29 dtucker Exp $ */ | 1 | /* $OpenBSD: arc4random.c,v 1.57 2022/07/31 05:10:36 djm Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Copyright (c) 1996, David Mazieres <dm@uun.org> | 4 | * Copyright (c) 1996, David Mazieres <dm@uun.org> |
@@ -49,6 +49,8 @@ | |||
49 | #define BLOCKSZ 64 | 49 | #define BLOCKSZ 64 |
50 | #define RSBUFSZ (16*BLOCKSZ) | 50 | #define RSBUFSZ (16*BLOCKSZ) |
51 | 51 | ||
52 | #define REKEY_BASE (1024*1024) /* NB. should be a power of 2 */ | ||
53 | |||
52 | /* Marked MAP_INHERIT_ZERO, so zero'd out in fork children. */ | 54 | /* Marked MAP_INHERIT_ZERO, so zero'd out in fork children. */ |
53 | static struct _rs { | 55 | static struct _rs { |
54 | size_t rs_have; /* valid bytes at end of rs_buf */ | 56 | size_t rs_have; /* valid bytes at end of rs_buf */ |
@@ -86,6 +88,7 @@ static void | |||
86 | _rs_stir(void) | 88 | _rs_stir(void) |
87 | { | 89 | { |
88 | u_char rnd[KEYSZ + IVSZ]; | 90 | u_char rnd[KEYSZ + IVSZ]; |
91 | uint32_t rekey_fuzz = 0; | ||
89 | 92 | ||
90 | if (getentropy(rnd, sizeof rnd) == -1) | 93 | if (getentropy(rnd, sizeof rnd) == -1) |
91 | _getentropy_fail(); | 94 | _getentropy_fail(); |
@@ -100,7 +103,10 @@ _rs_stir(void) | |||
100 | rs->rs_have = 0; | 103 | rs->rs_have = 0; |
101 | memset(rsx->rs_buf, 0, sizeof(rsx->rs_buf)); | 104 | memset(rsx->rs_buf, 0, sizeof(rsx->rs_buf)); |
102 | 105 | ||
103 | rs->rs_count = 1600000; | 106 | /* rekey interval should not be predictable */ |
107 | chacha_encrypt_bytes(&rsx->rs_chacha, (uint8_t *)&rekey_fuzz, | ||
108 | (uint8_t *)&rekey_fuzz, sizeof(rekey_fuzz)); | ||
109 | rs->rs_count = REKEY_BASE + (rekey_fuzz % REKEY_BASE); | ||
104 | } | 110 | } |
105 | 111 | ||
106 | static inline void | 112 | static inline void |