2001-09-11 22:01:02 +02:00
|
|
|
/* fhandler_random.cc: code to access /dev/random and /dev/urandom
|
2000-05-03 17:39:10 +02:00
|
|
|
|
* child_info.h, cygheap.h, fhandler_clipboard.cc, fhandler_dsp.cc,
fhandler_floppy.cc, fhandler_mem.cc, fhandler_random.cc,
fhandler_tape.cc, fhandler_zero.cc, grp.cc, mmap.cc, passwd.cc,
pinfo.cc, pinfo.h, pipe.cc, sec_acl.cc, sec_helper.cc, security.cc,
security.h, thread.h, uinfo.cc, include/cygwin/acl.h: Fix copyright.
2002-02-10 14:50:13 +01:00
|
|
|
Copyright 2000, 2001, 2002 Red Hat, Inc.
|
2000-05-03 17:39:10 +02:00
|
|
|
|
|
|
|
Written by Corinna Vinschen (vinschen@cygnus.com)
|
|
|
|
|
|
|
|
This file is part of Cygwin.
|
|
|
|
|
|
|
|
This software is a copyrighted work licensed under the terms of the
|
|
|
|
Cygwin license. Please consult the file "CYGWIN_LICENSE" for
|
|
|
|
details. */
|
|
|
|
|
2000-08-02 18:28:18 +02:00
|
|
|
#include "winsup.h"
|
2000-07-24 13:33:02 +02:00
|
|
|
#include <limits.h>
|
2000-08-22 05:58:47 +02:00
|
|
|
#include "cygerrno.h"
|
2001-07-26 21:22:24 +02:00
|
|
|
#include "security.h"
|
2000-08-22 07:10:20 +02:00
|
|
|
#include "fhandler.h"
|
2000-05-03 17:39:10 +02:00
|
|
|
|
|
|
|
#define RANDOM 8
|
|
|
|
#define URANDOM 9
|
|
|
|
|
2000-07-24 13:33:02 +02:00
|
|
|
#define PSEUDO_MULTIPLIER (6364136223846793005LL)
|
2000-09-03 06:16:35 +02:00
|
|
|
#define PSEUDO_SHIFTVAL (21)
|
2000-07-24 13:33:02 +02:00
|
|
|
|
2001-10-13 19:23:35 +02:00
|
|
|
fhandler_dev_random::fhandler_dev_random (int nunit)
|
2002-09-22 05:38:57 +02:00
|
|
|
: fhandler_base (FH_RANDOM), unit (nunit), crypt_prov ((HCRYPTPROV) NULL)
|
2000-05-03 17:39:10 +02:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2001-10-04 04:34:20 +02:00
|
|
|
fhandler_dev_random::open (path_conv *, int flags, mode_t)
|
2000-05-03 17:39:10 +02:00
|
|
|
{
|
2002-07-01 21:03:26 +02:00
|
|
|
set_flags ((flags & ~O_TEXT) | O_BINARY);
|
2002-09-19 05:30:20 +02:00
|
|
|
set_nohandle (true);
|
2001-04-24 04:07:58 +02:00
|
|
|
set_open_status ();
|
2000-05-03 17:39:10 +02:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2000-07-24 13:33:02 +02:00
|
|
|
BOOL
|
|
|
|
fhandler_dev_random::crypt_gen_random (void *ptr, size_t len)
|
|
|
|
{
|
|
|
|
if (!crypt_prov
|
|
|
|
&& !CryptAcquireContext (&crypt_prov, NULL, MS_DEF_PROV, PROV_RSA_FULL,
|
2000-09-03 06:16:35 +02:00
|
|
|
CRYPT_VERIFYCONTEXT | CRYPT_MACHINE_KEYSET)
|
2000-07-24 13:33:02 +02:00
|
|
|
&& !CryptAcquireContext (&crypt_prov, NULL, MS_DEF_PROV, PROV_RSA_FULL,
|
2000-09-03 06:16:35 +02:00
|
|
|
CRYPT_VERIFYCONTEXT | CRYPT_MACHINE_KEYSET
|
|
|
|
| CRYPT_NEWKEYSET))
|
2000-07-24 13:33:02 +02:00
|
|
|
{
|
|
|
|
debug_printf ("%E = CryptAquireContext()");
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
if (!CryptGenRandom (crypt_prov, len, (BYTE *)ptr))
|
|
|
|
{
|
|
|
|
debug_printf ("%E = CryptGenRandom()");
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2000-05-03 17:39:10 +02:00
|
|
|
int
|
2000-07-24 13:33:02 +02:00
|
|
|
fhandler_dev_random::pseudo_write (const void *ptr, size_t len)
|
2000-05-03 17:39:10 +02:00
|
|
|
{
|
2000-07-24 13:33:02 +02:00
|
|
|
/* Use buffer to mess up the pseudo random number generator. */
|
|
|
|
for (size_t i = 0; i < len; ++i)
|
|
|
|
pseudo = (pseudo + ((unsigned char *)ptr)[i]) * PSEUDO_MULTIPLIER + 1;
|
2000-05-03 17:39:10 +02:00
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2000-07-24 13:33:02 +02:00
|
|
|
fhandler_dev_random::write (const void *ptr, size_t len)
|
2000-05-03 17:39:10 +02:00
|
|
|
{
|
|
|
|
if (!len)
|
|
|
|
return 0;
|
2000-07-24 13:33:02 +02:00
|
|
|
if (!ptr)
|
2000-05-03 17:39:10 +02:00
|
|
|
{
|
2000-07-24 13:33:02 +02:00
|
|
|
set_errno (EINVAL);
|
2000-05-03 17:39:10 +02:00
|
|
|
return -1;
|
|
|
|
}
|
2000-07-24 13:33:02 +02:00
|
|
|
|
|
|
|
/* Limit len to a value <= 512 since we don't want to overact.
|
|
|
|
Copy to local buffer because CryptGenRandom violates const. */
|
|
|
|
unsigned char buf[512];
|
|
|
|
size_t limited_len = len <= 512 ? len : 512;
|
|
|
|
memcpy (buf, ptr, limited_len);
|
|
|
|
|
|
|
|
/* Mess up system entropy source. Return error if device is /dev/random. */
|
|
|
|
if (!crypt_gen_random (buf, limited_len) && unit == RANDOM)
|
2000-05-03 17:39:10 +02:00
|
|
|
{
|
|
|
|
__seterrno ();
|
|
|
|
return -1;
|
|
|
|
}
|
2000-07-24 13:33:02 +02:00
|
|
|
/* Mess up the pseudo random number generator. */
|
|
|
|
pseudo_write (buf, limited_len);
|
2000-05-03 17:39:10 +02:00
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
2000-07-24 13:33:02 +02:00
|
|
|
int
|
|
|
|
fhandler_dev_random::pseudo_read (void *ptr, size_t len)
|
|
|
|
{
|
|
|
|
/* Use pseudo random number generator as fallback entropy source.
|
|
|
|
This multiplier was obtained from Knuth, D.E., "The Art of
|
|
|
|
Computer Programming," Vol 2, Seminumerical Algorithms, Third
|
|
|
|
Edition, Addison-Wesley, 1998, p. 106 (line 26) & p. 108 */
|
|
|
|
for (size_t i = 0; i < len; ++i)
|
|
|
|
{
|
|
|
|
pseudo = pseudo * PSEUDO_MULTIPLIER + 1;
|
|
|
|
((unsigned char *)ptr)[i] = (pseudo >> PSEUDO_SHIFTVAL) & UCHAR_MAX;
|
|
|
|
}
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
2002-12-14 05:01:32 +01:00
|
|
|
void __stdcall
|
|
|
|
fhandler_dev_random::read (void *ptr, size_t& len)
|
2000-07-24 13:33:02 +02:00
|
|
|
{
|
|
|
|
if (!len)
|
2002-12-14 05:01:32 +01:00
|
|
|
return;
|
|
|
|
|
2000-07-24 13:33:02 +02:00
|
|
|
if (!ptr)
|
|
|
|
{
|
|
|
|
set_errno (EINVAL);
|
2003-09-07 04:22:58 +02:00
|
|
|
len = (size_t) -1;
|
2002-12-14 05:01:32 +01:00
|
|
|
return;
|
2000-07-24 13:33:02 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (crypt_gen_random (ptr, len))
|
2002-12-14 05:01:32 +01:00
|
|
|
return;
|
|
|
|
|
2000-07-24 13:33:02 +02:00
|
|
|
/* If device is /dev/urandom, use pseudo number generator as fallback.
|
|
|
|
Don't do this for /dev/random since it's intended for uses that need
|
|
|
|
very high quality randomness. */
|
|
|
|
if (unit == URANDOM)
|
2002-12-14 05:01:32 +01:00
|
|
|
{
|
|
|
|
len = pseudo_read (ptr, len);
|
|
|
|
return;
|
|
|
|
}
|
2000-07-24 13:33:02 +02:00
|
|
|
|
|
|
|
__seterrno ();
|
2003-09-07 04:22:58 +02:00
|
|
|
len = (size_t) -1;
|
2000-07-24 13:33:02 +02:00
|
|
|
}
|
|
|
|
|
2003-04-01 18:11:41 +02:00
|
|
|
_off64_t
|
|
|
|
fhandler_dev_random::lseek (_off64_t, int)
|
2000-05-03 17:39:10 +02:00
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
fhandler_dev_random::close (void)
|
|
|
|
{
|
|
|
|
if (crypt_prov)
|
|
|
|
while (!CryptReleaseContext (crypt_prov, 0)
|
2000-09-03 06:16:35 +02:00
|
|
|
&& GetLastError () == ERROR_BUSY)
|
2002-09-22 05:38:57 +02:00
|
|
|
Sleep (10);
|
2000-05-03 17:39:10 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
fhandler_dev_random::dup (fhandler_base *child)
|
|
|
|
{
|
|
|
|
fhandler_dev_random *fhr = (fhandler_dev_random *) child;
|
|
|
|
fhr->unit = unit;
|
|
|
|
fhr->crypt_prov = (HCRYPTPROV)NULL;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
fhandler_dev_random::dump ()
|
|
|
|
{
|
2002-09-22 05:38:57 +02:00
|
|
|
paranoid_printf ("here, fhandler_dev_random");
|
2000-05-03 17:39:10 +02:00
|
|
|
}
|
|
|
|
|