diff options
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libcrypto/arc4random/arc4random_netbsd.h | 86 | ||||
| -rw-r--r-- | src/lib/libcrypto/arc4random/getentropy_netbsd.c | 64 | ||||
| -rw-r--r-- | src/lib/libcrypto/crypto/arc4random_netbsd.h | 86 | ||||
| -rw-r--r-- | src/lib/libcrypto/crypto/getentropy_netbsd.c | 64 |
4 files changed, 300 insertions, 0 deletions
diff --git a/src/lib/libcrypto/arc4random/arc4random_netbsd.h b/src/lib/libcrypto/arc4random/arc4random_netbsd.h new file mode 100644 index 0000000000..489e73a078 --- /dev/null +++ b/src/lib/libcrypto/arc4random/arc4random_netbsd.h | |||
| @@ -0,0 +1,86 @@ | |||
| 1 | /* $OpenBSD: arc4random_netbsd.h,v 1.1 2015/01/19 20:21:40 bcook Exp $ */ | ||
| 2 | |||
| 3 | /* | ||
| 4 | * Copyright (c) 1996, David Mazieres <dm@uun.org> | ||
| 5 | * Copyright (c) 2008, Damien Miller <djm@openbsd.org> | ||
| 6 | * Copyright (c) 2013, Markus Friedl <markus@openbsd.org> | ||
| 7 | * Copyright (c) 2014, Theo de Raadt <deraadt@openbsd.org> | ||
| 8 | * | ||
| 9 | * Permission to use, copy, modify, and distribute this software for any | ||
| 10 | * purpose with or without fee is hereby granted, provided that the above | ||
| 11 | * copyright notice and this permission notice appear in all copies. | ||
| 12 | * | ||
| 13 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
| 14 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
| 15 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
| 16 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
| 17 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
| 18 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
| 19 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
| 20 | */ | ||
| 21 | |||
| 22 | /* | ||
| 23 | * Stub functions for portability. | ||
| 24 | */ | ||
| 25 | |||
| 26 | #include <sys/mman.h> | ||
| 27 | |||
| 28 | #include <pthread.h> | ||
| 29 | #include <signal.h> | ||
| 30 | |||
| 31 | static pthread_mutex_t arc4random_mtx = PTHREAD_MUTEX_INITIALIZER; | ||
| 32 | #define _ARC4_LOCK() pthread_mutex_lock(&arc4random_mtx) | ||
| 33 | #define _ARC4_UNLOCK() pthread_mutex_unlock(&arc4random_mtx) | ||
| 34 | |||
| 35 | /* | ||
| 36 | * Unfortunately, pthread_atfork() is broken on FreeBSD (at least 9 and 10) if | ||
| 37 | * a program does not link to -lthr. Callbacks registered with pthread_atfork() | ||
| 38 | * appear to fail silently. So, it is not always possible to detect a PID | ||
| 39 | * wraparound. | ||
| 40 | */ | ||
| 41 | #define _ARC4_ATFORK(f) pthread_atfork(NULL, NULL, (f)) | ||
| 42 | |||
| 43 | static inline void | ||
| 44 | _getentropy_fail(void) | ||
| 45 | { | ||
| 46 | raise(SIGKILL); | ||
| 47 | } | ||
| 48 | |||
| 49 | static volatile sig_atomic_t _rs_forked; | ||
| 50 | |||
| 51 | static inline void | ||
| 52 | _rs_forkhandler(void) | ||
| 53 | { | ||
| 54 | _rs_forked = 1; | ||
| 55 | } | ||
| 56 | |||
| 57 | static inline void | ||
| 58 | _rs_forkdetect(void) | ||
| 59 | { | ||
| 60 | static pid_t _rs_pid = 0; | ||
| 61 | pid_t pid = getpid(); | ||
| 62 | |||
| 63 | if (_rs_pid == 0 || _rs_pid != pid || _rs_forked) { | ||
| 64 | _rs_pid = pid; | ||
| 65 | _rs_forked = 0; | ||
| 66 | if (rs) | ||
| 67 | memset(rs, 0, sizeof(*rs)); | ||
| 68 | } | ||
| 69 | } | ||
| 70 | |||
| 71 | static inline int | ||
| 72 | _rs_allocate(struct _rs **rsp, struct _rsx **rsxp) | ||
| 73 | { | ||
| 74 | if ((*rsp = mmap(NULL, sizeof(**rsp), PROT_READ|PROT_WRITE, | ||
| 75 | MAP_ANON|MAP_PRIVATE, -1, 0)) == MAP_FAILED) | ||
| 76 | return -1; | ||
| 77 | |||
| 78 | if ((*rsxp = mmap(NULL, sizeof(**rsxp), PROT_READ|PROT_WRITE, | ||
| 79 | MAP_ANON|MAP_PRIVATE, -1, 0)) == MAP_FAILED) { | ||
| 80 | munmap(*rsp, sizeof(**rsp)); | ||
| 81 | return -1; | ||
| 82 | } | ||
| 83 | |||
| 84 | _ARC4_ATFORK(_rs_forkhandler); | ||
| 85 | return 0; | ||
| 86 | } | ||
diff --git a/src/lib/libcrypto/arc4random/getentropy_netbsd.c b/src/lib/libcrypto/arc4random/getentropy_netbsd.c new file mode 100644 index 0000000000..a9710ef923 --- /dev/null +++ b/src/lib/libcrypto/arc4random/getentropy_netbsd.c | |||
| @@ -0,0 +1,64 @@ | |||
| 1 | /* $OpenBSD: getentropy_netbsd.c,v 1.1 2015/01/19 20:21:40 bcook Exp $ */ | ||
| 2 | |||
| 3 | /* | ||
| 4 | * Copyright (c) 2014 Pawel Jakub Dawidek <pjd@FreeBSD.org> | ||
| 5 | * Copyright (c) 2014 Brent Cook <bcook@openbsd.org> | ||
| 6 | * | ||
| 7 | * Permission to use, copy, modify, and distribute this software for any | ||
| 8 | * purpose with or without fee is hereby granted, provided that the above | ||
| 9 | * copyright notice and this permission notice appear in all copies. | ||
| 10 | * | ||
| 11 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
| 12 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
| 13 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
| 14 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
| 15 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
| 16 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
| 17 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
| 18 | * | ||
| 19 | * Emulation of getentropy(2) as documented at: | ||
| 20 | * http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man2/getentropy.2 | ||
| 21 | */ | ||
| 22 | |||
| 23 | #include <sys/types.h> | ||
| 24 | #include <sys/sysctl.h> | ||
| 25 | |||
| 26 | #include <errno.h> | ||
| 27 | #include <stddef.h> | ||
| 28 | |||
| 29 | /* | ||
| 30 | * Derived from lib/libc/gen/arc4random.c from FreeBSD. | ||
| 31 | */ | ||
| 32 | static size_t | ||
| 33 | getentropy_sysctl(u_char *buf, size_t size) | ||
| 34 | { | ||
| 35 | int mib[2]; | ||
| 36 | size_t len, done; | ||
| 37 | |||
| 38 | mib[0] = CTL_KERN; | ||
| 39 | mib[1] = KERN_ARND; | ||
| 40 | done = 0; | ||
| 41 | |||
| 42 | do { | ||
| 43 | len = size; | ||
| 44 | if (sysctl(mib, 2, buf, &len, NULL, 0) == -1) | ||
| 45 | return (done); | ||
| 46 | done += len; | ||
| 47 | buf += len; | ||
| 48 | size -= len; | ||
| 49 | } while (size > 0); | ||
| 50 | |||
| 51 | return (done); | ||
| 52 | } | ||
| 53 | |||
| 54 | int | ||
| 55 | getentropy(void *buf, size_t len) | ||
| 56 | { | ||
| 57 | if (len <= 256 && | ||
| 58 | getentropy_sysctl(buf, len) == len) { | ||
| 59 | return 0; | ||
| 60 | } | ||
| 61 | |||
| 62 | errno = EIO; | ||
| 63 | return -1; | ||
| 64 | } | ||
diff --git a/src/lib/libcrypto/crypto/arc4random_netbsd.h b/src/lib/libcrypto/crypto/arc4random_netbsd.h new file mode 100644 index 0000000000..489e73a078 --- /dev/null +++ b/src/lib/libcrypto/crypto/arc4random_netbsd.h | |||
| @@ -0,0 +1,86 @@ | |||
| 1 | /* $OpenBSD: arc4random_netbsd.h,v 1.1 2015/01/19 20:21:40 bcook Exp $ */ | ||
| 2 | |||
| 3 | /* | ||
| 4 | * Copyright (c) 1996, David Mazieres <dm@uun.org> | ||
| 5 | * Copyright (c) 2008, Damien Miller <djm@openbsd.org> | ||
| 6 | * Copyright (c) 2013, Markus Friedl <markus@openbsd.org> | ||
| 7 | * Copyright (c) 2014, Theo de Raadt <deraadt@openbsd.org> | ||
| 8 | * | ||
| 9 | * Permission to use, copy, modify, and distribute this software for any | ||
| 10 | * purpose with or without fee is hereby granted, provided that the above | ||
| 11 | * copyright notice and this permission notice appear in all copies. | ||
| 12 | * | ||
| 13 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
| 14 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
| 15 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
| 16 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
| 17 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
| 18 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
| 19 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
| 20 | */ | ||
| 21 | |||
| 22 | /* | ||
| 23 | * Stub functions for portability. | ||
| 24 | */ | ||
| 25 | |||
| 26 | #include <sys/mman.h> | ||
| 27 | |||
| 28 | #include <pthread.h> | ||
| 29 | #include <signal.h> | ||
| 30 | |||
| 31 | static pthread_mutex_t arc4random_mtx = PTHREAD_MUTEX_INITIALIZER; | ||
| 32 | #define _ARC4_LOCK() pthread_mutex_lock(&arc4random_mtx) | ||
| 33 | #define _ARC4_UNLOCK() pthread_mutex_unlock(&arc4random_mtx) | ||
| 34 | |||
| 35 | /* | ||
| 36 | * Unfortunately, pthread_atfork() is broken on FreeBSD (at least 9 and 10) if | ||
| 37 | * a program does not link to -lthr. Callbacks registered with pthread_atfork() | ||
| 38 | * appear to fail silently. So, it is not always possible to detect a PID | ||
| 39 | * wraparound. | ||
| 40 | */ | ||
| 41 | #define _ARC4_ATFORK(f) pthread_atfork(NULL, NULL, (f)) | ||
| 42 | |||
| 43 | static inline void | ||
| 44 | _getentropy_fail(void) | ||
| 45 | { | ||
| 46 | raise(SIGKILL); | ||
| 47 | } | ||
| 48 | |||
| 49 | static volatile sig_atomic_t _rs_forked; | ||
| 50 | |||
| 51 | static inline void | ||
| 52 | _rs_forkhandler(void) | ||
| 53 | { | ||
| 54 | _rs_forked = 1; | ||
| 55 | } | ||
| 56 | |||
| 57 | static inline void | ||
| 58 | _rs_forkdetect(void) | ||
| 59 | { | ||
| 60 | static pid_t _rs_pid = 0; | ||
| 61 | pid_t pid = getpid(); | ||
| 62 | |||
| 63 | if (_rs_pid == 0 || _rs_pid != pid || _rs_forked) { | ||
| 64 | _rs_pid = pid; | ||
| 65 | _rs_forked = 0; | ||
| 66 | if (rs) | ||
| 67 | memset(rs, 0, sizeof(*rs)); | ||
| 68 | } | ||
| 69 | } | ||
| 70 | |||
| 71 | static inline int | ||
| 72 | _rs_allocate(struct _rs **rsp, struct _rsx **rsxp) | ||
| 73 | { | ||
| 74 | if ((*rsp = mmap(NULL, sizeof(**rsp), PROT_READ|PROT_WRITE, | ||
| 75 | MAP_ANON|MAP_PRIVATE, -1, 0)) == MAP_FAILED) | ||
| 76 | return -1; | ||
| 77 | |||
| 78 | if ((*rsxp = mmap(NULL, sizeof(**rsxp), PROT_READ|PROT_WRITE, | ||
| 79 | MAP_ANON|MAP_PRIVATE, -1, 0)) == MAP_FAILED) { | ||
| 80 | munmap(*rsp, sizeof(**rsp)); | ||
| 81 | return -1; | ||
| 82 | } | ||
| 83 | |||
| 84 | _ARC4_ATFORK(_rs_forkhandler); | ||
| 85 | return 0; | ||
| 86 | } | ||
diff --git a/src/lib/libcrypto/crypto/getentropy_netbsd.c b/src/lib/libcrypto/crypto/getentropy_netbsd.c new file mode 100644 index 0000000000..a9710ef923 --- /dev/null +++ b/src/lib/libcrypto/crypto/getentropy_netbsd.c | |||
| @@ -0,0 +1,64 @@ | |||
| 1 | /* $OpenBSD: getentropy_netbsd.c,v 1.1 2015/01/19 20:21:40 bcook Exp $ */ | ||
| 2 | |||
| 3 | /* | ||
| 4 | * Copyright (c) 2014 Pawel Jakub Dawidek <pjd@FreeBSD.org> | ||
| 5 | * Copyright (c) 2014 Brent Cook <bcook@openbsd.org> | ||
| 6 | * | ||
| 7 | * Permission to use, copy, modify, and distribute this software for any | ||
| 8 | * purpose with or without fee is hereby granted, provided that the above | ||
| 9 | * copyright notice and this permission notice appear in all copies. | ||
| 10 | * | ||
| 11 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
| 12 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
| 13 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
| 14 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
| 15 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
| 16 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
| 17 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
| 18 | * | ||
| 19 | * Emulation of getentropy(2) as documented at: | ||
| 20 | * http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man2/getentropy.2 | ||
| 21 | */ | ||
| 22 | |||
| 23 | #include <sys/types.h> | ||
| 24 | #include <sys/sysctl.h> | ||
| 25 | |||
| 26 | #include <errno.h> | ||
| 27 | #include <stddef.h> | ||
| 28 | |||
| 29 | /* | ||
| 30 | * Derived from lib/libc/gen/arc4random.c from FreeBSD. | ||
| 31 | */ | ||
| 32 | static size_t | ||
| 33 | getentropy_sysctl(u_char *buf, size_t size) | ||
| 34 | { | ||
| 35 | int mib[2]; | ||
| 36 | size_t len, done; | ||
| 37 | |||
| 38 | mib[0] = CTL_KERN; | ||
| 39 | mib[1] = KERN_ARND; | ||
| 40 | done = 0; | ||
| 41 | |||
| 42 | do { | ||
| 43 | len = size; | ||
| 44 | if (sysctl(mib, 2, buf, &len, NULL, 0) == -1) | ||
| 45 | return (done); | ||
| 46 | done += len; | ||
| 47 | buf += len; | ||
| 48 | size -= len; | ||
| 49 | } while (size > 0); | ||
| 50 | |||
| 51 | return (done); | ||
| 52 | } | ||
| 53 | |||
| 54 | int | ||
| 55 | getentropy(void *buf, size_t len) | ||
| 56 | { | ||
| 57 | if (len <= 256 && | ||
| 58 | getentropy_sysctl(buf, len) == len) { | ||
| 59 | return 0; | ||
| 60 | } | ||
| 61 | |||
| 62 | errno = EIO; | ||
| 63 | return -1; | ||
| 64 | } | ||
