summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/rand/rand_unix.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libcrypto/rand/rand_unix.c')
-rw-r--r--src/lib/libcrypto/rand/rand_unix.c385
1 files changed, 385 insertions, 0 deletions
diff --git a/src/lib/libcrypto/rand/rand_unix.c b/src/lib/libcrypto/rand/rand_unix.c
new file mode 100644
index 0000000000..4bb9666e49
--- /dev/null
+++ b/src/lib/libcrypto/rand/rand_unix.c
@@ -0,0 +1,385 @@
1/* crypto/rand/rand_unix.c */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58/* ====================================================================
59 * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
60 *
61 * Redistribution and use in source and binary forms, with or without
62 * modification, are permitted provided that the following conditions
63 * are met:
64 *
65 * 1. Redistributions of source code must retain the above copyright
66 * notice, this list of conditions and the following disclaimer.
67 *
68 * 2. Redistributions in binary form must reproduce the above copyright
69 * notice, this list of conditions and the following disclaimer in
70 * the documentation and/or other materials provided with the
71 * distribution.
72 *
73 * 3. All advertising materials mentioning features or use of this
74 * software must display the following acknowledgment:
75 * "This product includes software developed by the OpenSSL Project
76 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
77 *
78 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
79 * endorse or promote products derived from this software without
80 * prior written permission. For written permission, please contact
81 * openssl-core@openssl.org.
82 *
83 * 5. Products derived from this software may not be called "OpenSSL"
84 * nor may "OpenSSL" appear in their names without prior written
85 * permission of the OpenSSL Project.
86 *
87 * 6. Redistributions of any form whatsoever must retain the following
88 * acknowledgment:
89 * "This product includes software developed by the OpenSSL Project
90 * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
91 *
92 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
93 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
94 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
95 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
96 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
97 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
98 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
99 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
100 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
101 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
102 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
103 * OF THE POSSIBILITY OF SUCH DAMAGE.
104 * ====================================================================
105 *
106 * This product includes cryptographic software written by Eric Young
107 * (eay@cryptsoft.com). This product includes software written by Tim
108 * Hudson (tjh@cryptsoft.com).
109 *
110 */
111#include <stdio.h>
112
113#define USE_SOCKETS
114#include "e_os.h"
115#include "cryptlib.h"
116#include <openssl/rand.h>
117#include "rand_lcl.h"
118
119#if !(defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_VMS) || defined(OPENSSL_SYS_OS2) || defined(OPENSSL_SYS_VXWORKS) || defined(OPENSSL_SYS_NETWARE))
120
121#include <sys/types.h>
122#include <sys/time.h>
123#include <sys/times.h>
124#include <sys/stat.h>
125#include <fcntl.h>
126#include <unistd.h>
127#include <time.h>
128#if defined(OPENSSL_SYS_LINUX) /* should actually be available virtually everywhere */
129# include <poll.h>
130#endif
131#include <limits.h>
132#ifndef FD_SETSIZE
133# define FD_SETSIZE (8*sizeof(fd_set))
134#endif
135
136#ifdef __VOS__
137int RAND_poll(void)
138{
139 unsigned char buf[ENTROPY_NEEDED];
140 pid_t curr_pid;
141 uid_t curr_uid;
142 static int first=1;
143 int i;
144 long rnd = 0;
145 struct timespec ts;
146 unsigned seed;
147
148/* The VOS random() function starts from a static seed so its
149 initial value is predictable. If random() returns the
150 initial value, reseed it with dynamic data. The VOS
151 real-time clock has a granularity of 1 nsec so it should be
152 reasonably difficult to predict its exact value. Do not
153 gratuitously reseed the PRNG because other code in this
154 process or thread may be using it. */
155
156 if (first) {
157 first = 0;
158 rnd = random ();
159 if (rnd == 1804289383) {
160 clock_gettime (CLOCK_REALTIME, &ts);
161 curr_pid = getpid();
162 curr_uid = getuid();
163 seed = ts.tv_sec ^ ts.tv_nsec ^ curr_pid ^ curr_uid;
164 srandom (seed);
165 }
166 }
167
168 for (i = 0; i < sizeof(buf); i++) {
169 if (i % 4 == 0)
170 rnd = random();
171 buf[i] = rnd;
172 rnd >>= 8;
173 }
174 RAND_add(buf, sizeof(buf), ENTROPY_NEEDED);
175 memset(buf, 0, sizeof(buf));
176
177 return 1;
178}
179#elif defined __OpenBSD__
180int RAND_poll(void)
181{
182 unsigned char buf[ENTROPY_NEEDED];
183
184 arc4random_buf(buf, sizeof(buf));
185 RAND_add(buf, sizeof(buf), sizeof(buf));
186 memset(buf, 0, sizeof(buf));
187
188 return 1;
189}
190#else /* !defined(__OpenBSD__) */
191int RAND_poll(void)
192{
193 unsigned long l;
194 pid_t curr_pid = getpid();
195#if defined(DEVRANDOM) || defined(DEVRANDOM_EGD)
196 unsigned char tmpbuf[ENTROPY_NEEDED];
197 int n = 0;
198#endif
199#ifdef DEVRANDOM
200 static const char *randomfiles[] = { DEVRANDOM };
201 struct stat randomstats[sizeof(randomfiles)/sizeof(randomfiles[0])];
202 int fd;
203 unsigned int i;
204#endif
205#ifdef DEVRANDOM_EGD
206 static const char *egdsockets[] = { DEVRANDOM_EGD, NULL };
207 const char **egdsocket = NULL;
208#endif
209
210#ifdef DEVRANDOM
211 memset(randomstats,0,sizeof(randomstats));
212 /* Use a random entropy pool device. Linux, FreeBSD and OpenBSD
213 * have this. Use /dev/urandom if you can as /dev/random may block
214 * if it runs out of random entries. */
215
216 for (i = 0; (i < sizeof(randomfiles)/sizeof(randomfiles[0])) &&
217 (n < ENTROPY_NEEDED); i++)
218 {
219 if ((fd = open(randomfiles[i], O_RDONLY
220#ifdef O_NONBLOCK
221 |O_NONBLOCK
222#endif
223#ifdef O_BINARY
224 |O_BINARY
225#endif
226#ifdef O_NOCTTY /* If it happens to be a TTY (god forbid), do not make it
227 our controlling tty */
228 |O_NOCTTY
229#endif
230 )) >= 0)
231 {
232 int usec = 10*1000; /* spend 10ms on each file */
233 int r;
234 unsigned int j;
235 struct stat *st=&randomstats[i];
236
237 /* Avoid using same input... Used to be O_NOFOLLOW
238 * above, but it's not universally appropriate... */
239 if (fstat(fd,st) != 0) { close(fd); continue; }
240 for (j=0;j<i;j++)
241 {
242 if (randomstats[j].st_ino==st->st_ino &&
243 randomstats[j].st_dev==st->st_dev)
244 break;
245 }
246 if (j<i) { close(fd); continue; }
247
248 do
249 {
250 int try_read = 0;
251
252#if defined(OPENSSL_SYS_BEOS_R5)
253 /* select() is broken in BeOS R5, so we simply
254 * try to read something and snooze if we couldn't */
255 try_read = 1;
256
257#elif defined(OPENSSL_SYS_LINUX)
258 /* use poll() */
259 struct pollfd pset;
260
261 pset.fd = fd;
262 pset.events = POLLIN;
263 pset.revents = 0;
264
265 if (poll(&pset, 1, usec / 1000) < 0)
266 usec = 0;
267 else
268 try_read = (pset.revents & POLLIN) != 0;
269
270#else
271 /* use select() */
272 fd_set fset;
273 struct timeval t;
274
275 t.tv_sec = 0;
276 t.tv_usec = usec;
277
278 if (FD_SETSIZE > 0 && (unsigned)fd >= FD_SETSIZE)
279 {
280 /* can't use select, so just try to read once anyway */
281 try_read = 1;
282 }
283 else
284 {
285 FD_ZERO(&fset);
286 FD_SET(fd, &fset);
287
288 if (select(fd+1,&fset,NULL,NULL,&t) >= 0)
289 {
290 usec = t.tv_usec;
291 if (FD_ISSET(fd, &fset))
292 try_read = 1;
293 }
294 else
295 usec = 0;
296 }
297#endif
298
299 if (try_read)
300 {
301 r = read(fd,(unsigned char *)tmpbuf+n, ENTROPY_NEEDED-n);
302 if (r > 0)
303 n += r;
304#if defined(OPENSSL_SYS_BEOS_R5)
305 if (r == 0)
306 snooze(t.tv_usec);
307#endif
308 }
309 else
310 r = -1;
311
312 /* Some Unixen will update t in select(), some
313 won't. For those who won't, or if we
314 didn't use select() in the first place,
315 give up here, otherwise, we will do
316 this once again for the remaining
317 time. */
318 if (usec == 10*1000)
319 usec = 0;
320 }
321 while ((r > 0 ||
322 (errno == EINTR || errno == EAGAIN)) && usec != 0 && n < ENTROPY_NEEDED);
323
324 close(fd);
325 }
326 }
327#endif /* defined(DEVRANDOM) */
328
329#ifdef DEVRANDOM_EGD
330 /* Use an EGD socket to read entropy from an EGD or PRNGD entropy
331 * collecting daemon. */
332
333 for (egdsocket = egdsockets; *egdsocket && n < ENTROPY_NEEDED; egdsocket++)
334 {
335 int r;
336
337 r = RAND_query_egd_bytes(*egdsocket, (unsigned char *)tmpbuf+n,
338 ENTROPY_NEEDED-n);
339 if (r > 0)
340 n += r;
341 }
342#endif /* defined(DEVRANDOM_EGD) */
343
344#if defined(DEVRANDOM) || defined(DEVRANDOM_EGD)
345 if (n > 0)
346 {
347 RAND_add(tmpbuf,sizeof tmpbuf,(double)n);
348 OPENSSL_cleanse(tmpbuf,n);
349 }
350#endif
351
352 /* put in some default random data, we need more than just this */
353 l=curr_pid;
354 RAND_add(&l,sizeof(l),0.0);
355 l=getuid();
356 RAND_add(&l,sizeof(l),0.0);
357
358 l=time(NULL);
359 RAND_add(&l,sizeof(l),0.0);
360
361#if defined(OPENSSL_SYS_BEOS)
362 {
363 system_info sysInfo;
364 get_system_info(&sysInfo);
365 RAND_add(&sysInfo,sizeof(sysInfo),0);
366 }
367#endif
368
369#if defined(DEVRANDOM) || defined(DEVRANDOM_EGD)
370 return 1;
371#else
372 return 0;
373#endif
374}
375
376#endif /* defined(__OpenBSD__) */
377#endif /* !(defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_VMS) || defined(OPENSSL_SYS_OS2) || defined(OPENSSL_SYS_VXWORKS) || defined(OPENSSL_SYS_NETWARE)) */
378
379
380#if defined(OPENSSL_SYS_VXWORKS)
381int RAND_poll(void)
382 {
383 return 0;
384 }
385#endif