diff options
author | bcook <> | 2015-01-19 20:21:40 +0000 |
---|---|---|
committer | bcook <> | 2015-01-19 20:21:40 +0000 |
commit | 1dd653753c9c694999d9de6c6468beeb2e0793f5 (patch) | |
tree | 184795d028e938e83e5050568117bc0542549b3f /src | |
parent | f1a5194b172185541e9828a950d827914e7679bd (diff) | |
download | openbsd-1dd653753c9c694999d9de6c6468beeb2e0793f5.tar.gz openbsd-1dd653753c9c694999d9de6c6468beeb2e0793f5.tar.bz2 openbsd-1dd653753c9c694999d9de6c6468beeb2e0793f5.zip |
Add arc4random/getentropy shims for NetBSD.
The latest NetBSD (6.1.5) arc4random does not appear to reseed the CRNG state
after a fork, so provide an override until the fork-safe version in CVS appears
in a release.
These are the same as the FreeBSD shims.
ok deraadt@
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libcrypto/arc4random/arc4random_netbsd.h | 86 | ||||
-rw-r--r-- | src/lib/libcrypto/arc4random/getentropy_netbsd.c | 64 | ||||
-rw-r--r-- | src/lib/libcrypto/crypto/arc4random_netbsd.h | 86 | ||||
-rw-r--r-- | src/lib/libcrypto/crypto/getentropy_netbsd.c | 64 |
4 files changed, 300 insertions, 0 deletions
diff --git a/src/lib/libcrypto/arc4random/arc4random_netbsd.h b/src/lib/libcrypto/arc4random/arc4random_netbsd.h new file mode 100644 index 0000000000..489e73a078 --- /dev/null +++ b/src/lib/libcrypto/arc4random/arc4random_netbsd.h | |||
@@ -0,0 +1,86 @@ | |||
1 | /* $OpenBSD: arc4random_netbsd.h,v 1.1 2015/01/19 20:21:40 bcook Exp $ */ | ||
2 | |||
3 | /* | ||
4 | * Copyright (c) 1996, David Mazieres <dm@uun.org> | ||
5 | * Copyright (c) 2008, Damien Miller <djm@openbsd.org> | ||
6 | * Copyright (c) 2013, Markus Friedl <markus@openbsd.org> | ||
7 | * Copyright (c) 2014, Theo de Raadt <deraadt@openbsd.org> | ||
8 | * | ||
9 | * Permission to use, copy, modify, and distribute this software for any | ||
10 | * purpose with or without fee is hereby granted, provided that the above | ||
11 | * copyright notice and this permission notice appear in all copies. | ||
12 | * | ||
13 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
14 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
15 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
16 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
17 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
18 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
19 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
20 | */ | ||
21 | |||
22 | /* | ||
23 | * Stub functions for portability. | ||
24 | */ | ||
25 | |||
26 | #include <sys/mman.h> | ||
27 | |||
28 | #include <pthread.h> | ||
29 | #include <signal.h> | ||
30 | |||
31 | static pthread_mutex_t arc4random_mtx = PTHREAD_MUTEX_INITIALIZER; | ||
32 | #define _ARC4_LOCK() pthread_mutex_lock(&arc4random_mtx) | ||
33 | #define _ARC4_UNLOCK() pthread_mutex_unlock(&arc4random_mtx) | ||
34 | |||
35 | /* | ||
36 | * Unfortunately, pthread_atfork() is broken on FreeBSD (at least 9 and 10) if | ||
37 | * a program does not link to -lthr. Callbacks registered with pthread_atfork() | ||
38 | * appear to fail silently. So, it is not always possible to detect a PID | ||
39 | * wraparound. | ||
40 | */ | ||
41 | #define _ARC4_ATFORK(f) pthread_atfork(NULL, NULL, (f)) | ||
42 | |||
43 | static inline void | ||
44 | _getentropy_fail(void) | ||
45 | { | ||
46 | raise(SIGKILL); | ||
47 | } | ||
48 | |||
49 | static volatile sig_atomic_t _rs_forked; | ||
50 | |||
51 | static inline void | ||
52 | _rs_forkhandler(void) | ||
53 | { | ||
54 | _rs_forked = 1; | ||
55 | } | ||
56 | |||
57 | static inline void | ||
58 | _rs_forkdetect(void) | ||
59 | { | ||
60 | static pid_t _rs_pid = 0; | ||
61 | pid_t pid = getpid(); | ||
62 | |||
63 | if (_rs_pid == 0 || _rs_pid != pid || _rs_forked) { | ||
64 | _rs_pid = pid; | ||
65 | _rs_forked = 0; | ||
66 | if (rs) | ||
67 | memset(rs, 0, sizeof(*rs)); | ||
68 | } | ||
69 | } | ||
70 | |||
71 | static inline int | ||
72 | _rs_allocate(struct _rs **rsp, struct _rsx **rsxp) | ||
73 | { | ||
74 | if ((*rsp = mmap(NULL, sizeof(**rsp), PROT_READ|PROT_WRITE, | ||
75 | MAP_ANON|MAP_PRIVATE, -1, 0)) == MAP_FAILED) | ||
76 | return -1; | ||
77 | |||
78 | if ((*rsxp = mmap(NULL, sizeof(**rsxp), PROT_READ|PROT_WRITE, | ||
79 | MAP_ANON|MAP_PRIVATE, -1, 0)) == MAP_FAILED) { | ||
80 | munmap(*rsp, sizeof(**rsp)); | ||
81 | return -1; | ||
82 | } | ||
83 | |||
84 | _ARC4_ATFORK(_rs_forkhandler); | ||
85 | return 0; | ||
86 | } | ||
diff --git a/src/lib/libcrypto/arc4random/getentropy_netbsd.c b/src/lib/libcrypto/arc4random/getentropy_netbsd.c new file mode 100644 index 0000000000..a9710ef923 --- /dev/null +++ b/src/lib/libcrypto/arc4random/getentropy_netbsd.c | |||
@@ -0,0 +1,64 @@ | |||
1 | /* $OpenBSD: getentropy_netbsd.c,v 1.1 2015/01/19 20:21:40 bcook Exp $ */ | ||
2 | |||
3 | /* | ||
4 | * Copyright (c) 2014 Pawel Jakub Dawidek <pjd@FreeBSD.org> | ||
5 | * Copyright (c) 2014 Brent Cook <bcook@openbsd.org> | ||
6 | * | ||
7 | * Permission to use, copy, modify, and distribute this software for any | ||
8 | * purpose with or without fee is hereby granted, provided that the above | ||
9 | * copyright notice and this permission notice appear in all copies. | ||
10 | * | ||
11 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
12 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
13 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
14 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
15 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
16 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
17 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
18 | * | ||
19 | * Emulation of getentropy(2) as documented at: | ||
20 | * http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man2/getentropy.2 | ||
21 | */ | ||
22 | |||
23 | #include <sys/types.h> | ||
24 | #include <sys/sysctl.h> | ||
25 | |||
26 | #include <errno.h> | ||
27 | #include <stddef.h> | ||
28 | |||
29 | /* | ||
30 | * Derived from lib/libc/gen/arc4random.c from FreeBSD. | ||
31 | */ | ||
32 | static size_t | ||
33 | getentropy_sysctl(u_char *buf, size_t size) | ||
34 | { | ||
35 | int mib[2]; | ||
36 | size_t len, done; | ||
37 | |||
38 | mib[0] = CTL_KERN; | ||
39 | mib[1] = KERN_ARND; | ||
40 | done = 0; | ||
41 | |||
42 | do { | ||
43 | len = size; | ||
44 | if (sysctl(mib, 2, buf, &len, NULL, 0) == -1) | ||
45 | return (done); | ||
46 | done += len; | ||
47 | buf += len; | ||
48 | size -= len; | ||
49 | } while (size > 0); | ||
50 | |||
51 | return (done); | ||
52 | } | ||
53 | |||
54 | int | ||
55 | getentropy(void *buf, size_t len) | ||
56 | { | ||
57 | if (len <= 256 && | ||
58 | getentropy_sysctl(buf, len) == len) { | ||
59 | return 0; | ||
60 | } | ||
61 | |||
62 | errno = EIO; | ||
63 | return -1; | ||
64 | } | ||
diff --git a/src/lib/libcrypto/crypto/arc4random_netbsd.h b/src/lib/libcrypto/crypto/arc4random_netbsd.h new file mode 100644 index 0000000000..489e73a078 --- /dev/null +++ b/src/lib/libcrypto/crypto/arc4random_netbsd.h | |||
@@ -0,0 +1,86 @@ | |||
1 | /* $OpenBSD: arc4random_netbsd.h,v 1.1 2015/01/19 20:21:40 bcook Exp $ */ | ||
2 | |||
3 | /* | ||
4 | * Copyright (c) 1996, David Mazieres <dm@uun.org> | ||
5 | * Copyright (c) 2008, Damien Miller <djm@openbsd.org> | ||
6 | * Copyright (c) 2013, Markus Friedl <markus@openbsd.org> | ||
7 | * Copyright (c) 2014, Theo de Raadt <deraadt@openbsd.org> | ||
8 | * | ||
9 | * Permission to use, copy, modify, and distribute this software for any | ||
10 | * purpose with or without fee is hereby granted, provided that the above | ||
11 | * copyright notice and this permission notice appear in all copies. | ||
12 | * | ||
13 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
14 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
15 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
16 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
17 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
18 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
19 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
20 | */ | ||
21 | |||
22 | /* | ||
23 | * Stub functions for portability. | ||
24 | */ | ||
25 | |||
26 | #include <sys/mman.h> | ||
27 | |||
28 | #include <pthread.h> | ||
29 | #include <signal.h> | ||
30 | |||
31 | static pthread_mutex_t arc4random_mtx = PTHREAD_MUTEX_INITIALIZER; | ||
32 | #define _ARC4_LOCK() pthread_mutex_lock(&arc4random_mtx) | ||
33 | #define _ARC4_UNLOCK() pthread_mutex_unlock(&arc4random_mtx) | ||
34 | |||
35 | /* | ||
36 | * Unfortunately, pthread_atfork() is broken on FreeBSD (at least 9 and 10) if | ||
37 | * a program does not link to -lthr. Callbacks registered with pthread_atfork() | ||
38 | * appear to fail silently. So, it is not always possible to detect a PID | ||
39 | * wraparound. | ||
40 | */ | ||
41 | #define _ARC4_ATFORK(f) pthread_atfork(NULL, NULL, (f)) | ||
42 | |||
43 | static inline void | ||
44 | _getentropy_fail(void) | ||
45 | { | ||
46 | raise(SIGKILL); | ||
47 | } | ||
48 | |||
49 | static volatile sig_atomic_t _rs_forked; | ||
50 | |||
51 | static inline void | ||
52 | _rs_forkhandler(void) | ||
53 | { | ||
54 | _rs_forked = 1; | ||
55 | } | ||
56 | |||
57 | static inline void | ||
58 | _rs_forkdetect(void) | ||
59 | { | ||
60 | static pid_t _rs_pid = 0; | ||
61 | pid_t pid = getpid(); | ||
62 | |||
63 | if (_rs_pid == 0 || _rs_pid != pid || _rs_forked) { | ||
64 | _rs_pid = pid; | ||
65 | _rs_forked = 0; | ||
66 | if (rs) | ||
67 | memset(rs, 0, sizeof(*rs)); | ||
68 | } | ||
69 | } | ||
70 | |||
71 | static inline int | ||
72 | _rs_allocate(struct _rs **rsp, struct _rsx **rsxp) | ||
73 | { | ||
74 | if ((*rsp = mmap(NULL, sizeof(**rsp), PROT_READ|PROT_WRITE, | ||
75 | MAP_ANON|MAP_PRIVATE, -1, 0)) == MAP_FAILED) | ||
76 | return -1; | ||
77 | |||
78 | if ((*rsxp = mmap(NULL, sizeof(**rsxp), PROT_READ|PROT_WRITE, | ||
79 | MAP_ANON|MAP_PRIVATE, -1, 0)) == MAP_FAILED) { | ||
80 | munmap(*rsp, sizeof(**rsp)); | ||
81 | return -1; | ||
82 | } | ||
83 | |||
84 | _ARC4_ATFORK(_rs_forkhandler); | ||
85 | return 0; | ||
86 | } | ||
diff --git a/src/lib/libcrypto/crypto/getentropy_netbsd.c b/src/lib/libcrypto/crypto/getentropy_netbsd.c new file mode 100644 index 0000000000..a9710ef923 --- /dev/null +++ b/src/lib/libcrypto/crypto/getentropy_netbsd.c | |||
@@ -0,0 +1,64 @@ | |||
1 | /* $OpenBSD: getentropy_netbsd.c,v 1.1 2015/01/19 20:21:40 bcook Exp $ */ | ||
2 | |||
3 | /* | ||
4 | * Copyright (c) 2014 Pawel Jakub Dawidek <pjd@FreeBSD.org> | ||
5 | * Copyright (c) 2014 Brent Cook <bcook@openbsd.org> | ||
6 | * | ||
7 | * Permission to use, copy, modify, and distribute this software for any | ||
8 | * purpose with or without fee is hereby granted, provided that the above | ||
9 | * copyright notice and this permission notice appear in all copies. | ||
10 | * | ||
11 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
12 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
13 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
14 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
15 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
16 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
17 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
18 | * | ||
19 | * Emulation of getentropy(2) as documented at: | ||
20 | * http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man2/getentropy.2 | ||
21 | */ | ||
22 | |||
23 | #include <sys/types.h> | ||
24 | #include <sys/sysctl.h> | ||
25 | |||
26 | #include <errno.h> | ||
27 | #include <stddef.h> | ||
28 | |||
29 | /* | ||
30 | * Derived from lib/libc/gen/arc4random.c from FreeBSD. | ||
31 | */ | ||
32 | static size_t | ||
33 | getentropy_sysctl(u_char *buf, size_t size) | ||
34 | { | ||
35 | int mib[2]; | ||
36 | size_t len, done; | ||
37 | |||
38 | mib[0] = CTL_KERN; | ||
39 | mib[1] = KERN_ARND; | ||
40 | done = 0; | ||
41 | |||
42 | do { | ||
43 | len = size; | ||
44 | if (sysctl(mib, 2, buf, &len, NULL, 0) == -1) | ||
45 | return (done); | ||
46 | done += len; | ||
47 | buf += len; | ||
48 | size -= len; | ||
49 | } while (size > 0); | ||
50 | |||
51 | return (done); | ||
52 | } | ||
53 | |||
54 | int | ||
55 | getentropy(void *buf, size_t len) | ||
56 | { | ||
57 | if (len <= 256 && | ||
58 | getentropy_sysctl(buf, len) == len) { | ||
59 | return 0; | ||
60 | } | ||
61 | |||
62 | errno = EIO; | ||
63 | return -1; | ||
64 | } | ||