openldap/libraries/liblutil/entropy.c

171 lines
3.9 KiB
C
Raw Normal View History

2003-11-26 07:17:08 +08:00
/* entropy.c -- routines for providing pseudo-random data */
/* $OpenLDAP$ */
2003-11-26 07:17:08 +08:00
/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
*
2009-01-22 08:40:04 +08:00
* Copyright 1999-2009 The OpenLDAP Foundation.
2003-11-26 07:17:08 +08:00
* Portions Copyright 1999-2003 Kurt D. Zeilenga.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted only as authorized by the OpenLDAP
* Public License.
*
* A copy of this license is available in the file LICENSE in the
* top-level directory of the distribution or, alternatively, at
* <http://www.OpenLDAP.org/license.html>.
*/
/* This work was initially developed by Kurt D. Zeilenga for
* inclusion in OpenLDAP Software based, in part, on publically
* available works (as noted below).
*/
1999-10-27 07:00:30 +08:00
#include "portable.h"
1999-10-27 12:41:38 +08:00
#include <ac/string.h>
#include <ac/time.h>
#include <ac/unistd.h>
1999-10-27 12:41:38 +08:00
#ifdef HAVE_PROCESS_H
#include <process.h>
#endif
1999-10-27 07:00:30 +08:00
#include <fcntl.h>
#include <lutil.h>
#include <lutil_md5.h>
1999-10-27 07:00:30 +08:00
/*
1999-10-27 07:04:44 +08:00
* lutil_entropy() provides nbytes of entropy in buf.
* Quality offerred is suitable for one-time uses, such as "once" keys.
1999-10-29 01:42:46 +08:00
* Values may not be suitable for multi-time uses.
*
* Note: Callers are encouraged to provide additional bytes of
* of entropy in the buf argument. This information is used in
* fallback mode to improve the quality of bytes returned.
1999-10-29 01:42:46 +08:00
*
* This routinue should be extended to support additional sources
* of entropy.
*/
2000-10-14 10:14:38 +08:00
int lutil_entropy( unsigned char *buf, ber_len_t nbytes )
{
if( nbytes == 0 ) return 0;
#ifdef URANDOM_DEVICE
2002-06-04 00:43:57 +08:00
#define URANDOM_NREADS 4
/* Linux and *BSD offer a urandom device */
{
2002-06-04 00:43:57 +08:00
int rc, fd, n=0;
fd = open( URANDOM_DEVICE, O_RDONLY );
if( fd < 0 ) return -1;
2002-06-04 00:43:57 +08:00
do {
rc = read( fd, buf, nbytes );
if( rc <= 0 ) break;
buf+=rc;
nbytes-=rc;
2002-06-04 00:43:57 +08:00
if( ++n >= URANDOM_NREADS ) break;
} while( nbytes > 0 );
2002-06-04 00:43:57 +08:00
close(fd);
return nbytes > 0 ? -1 : 0;
1999-10-27 12:41:38 +08:00
}
#elif PROV_RSA_FULL
{
/* Not used since _WIN32_WINNT not set... */
HCRYPTPROV hProv = 0;
/* Get handle to user default provider */
if(!CryptAcquireContext(&hProv, NULL, NULL, PROV_RSA_FULL, 0)) {
return -1;
}
/* Generate random initialization vector */
if(!CryptGenRandom(hProv, (DWORD) nbytes, (BYTE *) buf)) {
return -1;
}
/* Release provider handle */
if(hProv != 0) CryptReleaseContext(hProv, 0);
return 0;
}
#else
{
/* based upon Phil Karn's "practical randomness" idea
1999-10-29 01:42:46 +08:00
* but implementation 100% OpenLDAP. So don't blame Phil.
*
* Worse case is that this is a MD5 hash of a counter, if
* MD5 is a strong cryptographic hash, this should be fairly
* resistant to attack
*/
/*
1999-10-28 06:00:29 +08:00
* the caller may need to provide external synchronization OR
* provide entropy (in buf) to ensure quality results as
* access to this counter may not be atomic.
*/
static int counter = 0;
1999-12-13 12:53:59 +08:00
ber_len_t n;
struct rdata_s {
1999-10-27 07:54:39 +08:00
int counter;
2000-10-18 08:28:39 +08:00
unsigned char *buf;
struct rdata_s *stack;
pid_t pid;
#ifdef HAVE_GETTIMEOFDAY
struct timeval tv;
#else
time_t time;
#endif
1999-10-28 06:00:29 +08:00
unsigned long junk; /* purposely not initialized */
} rdata;
/* make sure rdata differs for each process */
1999-10-27 07:54:39 +08:00
rdata.pid = getpid();
/* make sure rdata differs for each program */
rdata.buf = buf;
rdata.stack = &rdata;
for( n = 0; n < nbytes; n += 16 ) {
struct lutil_MD5Context ctx;
unsigned char digest[16];
1999-10-28 06:00:29 +08:00
/* poor resolution */
#ifdef HAVE_GETTIMEOFDAY
1999-10-28 05:53:41 +08:00
(void) gettimeofday( &rdata.tv, NULL );
#else
(void) time( &rdata.time );
#endif
/* make sure rdata differs */
1999-10-27 07:54:39 +08:00
rdata.counter = ++counter;
rdata.pid++;
rdata.junk++;
lutil_MD5Init( &ctx );
2000-10-18 08:28:39 +08:00
lutil_MD5Update( &ctx, (unsigned char *) &rdata, sizeof( rdata ) );
1999-10-28 06:00:29 +08:00
/* allow caller to provided additional entropy */
2000-10-18 08:28:39 +08:00
lutil_MD5Update( &ctx, buf, nbytes );
lutil_MD5Final( digest, &ctx );
AC_MEMCPY( &buf[n], digest,
nbytes - n >= 16 ? 16 : nbytes - n );
}
return 0;
}
#endif
return -1;
}