2014-12-20 22:52:39 +00:00
|
|
|
/*
|
|
|
|
* Crypto-quality random number functions
|
|
|
|
*
|
|
|
|
* Author: Harlan Stenn, 2014
|
|
|
|
*
|
|
|
|
* This file is Copyright (c) 2014 by Network Time Foundation.
|
|
|
|
* BSD terms apply: see the file COPYRIGHT in the distribution root for details.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "config.h"
|
|
|
|
#include <sys/types.h>
|
|
|
|
#ifdef HAVE_UNISTD_H
|
|
|
|
# include <unistd.h>
|
|
|
|
#endif
|
|
|
|
#include <stdio.h>
|
|
|
|
|
|
|
|
#include <l_stdlib.h>
|
|
|
|
#include <ntp_random.h>
|
2016-01-08 08:06:14 +00:00
|
|
|
#include "safecast.h"
|
2014-12-20 22:52:39 +00:00
|
|
|
|
|
|
|
#ifdef USE_OPENSSL_CRYPTO_RAND
|
|
|
|
#include <openssl/err.h>
|
|
|
|
#include <openssl/rand.h>
|
|
|
|
|
|
|
|
int crypto_rand_init = 0;
|
2015-02-05 20:53:33 +00:00
|
|
|
#else
|
|
|
|
|
|
|
|
# ifndef HAVE_ARC4RANDOM_BUF
|
|
|
|
static void
|
|
|
|
arc4random_buf(void *buf, size_t nbytes);
|
|
|
|
|
|
|
|
void
|
|
|
|
evutil_secure_rng_get_bytes(void *buf, size_t nbytes);
|
|
|
|
|
|
|
|
static void
|
|
|
|
arc4random_buf(void *buf, size_t nbytes)
|
|
|
|
{
|
|
|
|
evutil_secure_rng_get_bytes(buf, nbytes);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
# endif
|
2014-12-20 22:52:39 +00:00
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* As of late 2014, here's how we plan to provide cryptographic-quality
|
|
|
|
* random numbers:
|
|
|
|
*
|
|
|
|
* - If we are building with OpenSSL, use RAND_poll() and RAND_bytes().
|
|
|
|
* - Otherwise, use arc4random().
|
|
|
|
*
|
|
|
|
* Use of arc4random() can be forced using configure --disable-openssl-random
|
|
|
|
*
|
|
|
|
* We can count on arc4random existing, thru the OS or thru libevent.
|
|
|
|
* The quality of arc4random depends on the implementor.
|
|
|
|
*
|
|
|
|
* RAND_poll() doesn't show up until XXX. If it's not present, we
|
|
|
|
* need to either provide our own or use arc4random().
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* ntp_crypto_srandom:
|
|
|
|
*
|
|
|
|
* Initialize the random number generator, if needed by the underlying
|
|
|
|
* crypto random number generation mechanism.
|
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
|
|
|
ntp_crypto_srandom(
|
|
|
|
void
|
|
|
|
)
|
|
|
|
{
|
|
|
|
#ifdef USE_OPENSSL_CRYPTO_RAND
|
|
|
|
if (!crypto_rand_init) {
|
|
|
|
RAND_poll();
|
|
|
|
crypto_rand_init = 1;
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
/* No initialization needed for arc4random() */
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* ntp_crypto_random_buf:
|
|
|
|
*
|
|
|
|
* Returns 0 on success, -1 on error.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
ntp_crypto_random_buf(
|
|
|
|
void *buf,
|
|
|
|
size_t nbytes
|
|
|
|
)
|
|
|
|
{
|
|
|
|
#ifdef USE_OPENSSL_CRYPTO_RAND
|
|
|
|
int rc;
|
|
|
|
|
2016-01-08 08:06:14 +00:00
|
|
|
rc = RAND_bytes(buf, size2int_chk(nbytes));
|
2014-12-20 22:52:39 +00:00
|
|
|
if (1 != rc) {
|
|
|
|
unsigned long err;
|
|
|
|
char *err_str;
|
|
|
|
|
|
|
|
err = ERR_get_error();
|
|
|
|
err_str = ERR_error_string(err, NULL);
|
|
|
|
/* XXX: Log the error */
|
2015-02-05 20:53:33 +00:00
|
|
|
(void)&err_str;
|
2014-12-20 22:52:39 +00:00
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
#else
|
|
|
|
arc4random_buf(buf, nbytes);
|
|
|
|
return 0;
|
|
|
|
#endif
|
|
|
|
}
|