#ifndef _GNU_SOURCE
#define _GNU_SOURCE
#endif
#include "internal/e_os.h"
#include <stdio.h>
#include "internal/cryptlib.h"
#include <openssl/rand.h>
#include <openssl/crypto.h>
#include "crypto/rand_pool.h"
#include "crypto/rand.h"
#include "internal/dso.h"
#include "internal/nelem.h"
#include "prov/seeding.h"
#ifndef OPENSSL_SYS_UEFI
#ifdef __linux
#include <sys/syscall.h>
#ifdef DEVRANDOM_WAIT
#include <sys/shm.h>
#include <sys/utsname.h>
#endif
#endif
#if defined(__FreeBSD__) || defined(__NetBSD__)
#include <sys/types.h>
#include <sys/sysctl.h>
#include <sys/param.h>
#endif
#if defined(__FreeBSD__) && __FreeBSD_version >= 1200061
#include <sys/random.h>
#endif
#if defined(__OpenBSD__)
#include <sys/param.h>
#endif
#if defined(__DragonFly__)
#include <sys/param.h>
#include <sys/random.h>
#endif
#endif
#if (defined(OPENSSL_SYS_UNIX) && !defined(OPENSSL_SYS_VXWORKS)) \
|| defined(__DJGPP__)
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <unistd.h>
#include <sys/time.h>
static uint64_t get_time_stamp(void);
#define TWO32TO64(a, b) ((((uint64_t)(a)) << 32) + (b))
#undef OSSL_POSIX_TIMER_OKAY
#if defined(_POSIX_TIMERS) && _POSIX_TIMERS - 0 > 0
#if defined(__GLIBC__)
#if defined(__GLIBC_PREREQ)
#if __GLIBC_PREREQ(2, 17)
#define OSSL_POSIX_TIMER_OKAY
#endif
#endif
#else
#define OSSL_POSIX_TIMER_OKAY
#endif
#endif
#endif
#if defined(OPENSSL_RAND_SEED_NONE)
#undef OPENSSL_RAND_SEED_OS
#undef OPENSSL_RAND_SEED_GETRANDOM
#undef OPENSSL_RAND_SEED_DEVRANDOM
#undef OPENSSL_RAND_SEED_RDTSC
#undef OPENSSL_RAND_SEED_RDCPU
#undef OPENSSL_RAND_SEED_EGD
#endif
#if defined(OPENSSL_SYS_UEFI) && !defined(OPENSSL_RAND_SEED_NONE)
#error "UEFI only supports seeding NONE"
#endif
#if !(defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_WIN32) \
|| defined(OPENSSL_SYS_VMS) || defined(OPENSSL_SYS_VXWORKS) \
|| defined(OPENSSL_SYS_UEFI))
#if defined(OPENSSL_SYS_VOS)
#ifndef OPENSSL_RAND_SEED_OS
#error "Unsupported seeding method configured; must be os"
#endif
#if defined(OPENSSL_SYS_VOS_HPPA) && defined(OPENSSL_SYS_VOS_IA32)
#error "Unsupported HP-PA and IA32 at the same time."
#endif
#if !defined(OPENSSL_SYS_VOS_HPPA) && !defined(OPENSSL_SYS_VOS_IA32)
#error "Must have one of HP-PA or IA32"
#endif
size_t ossl_pool_acquire_entropy(RAND_POOL *pool)
{
short int code;
int i, k;
size_t bytes_needed;
struct timespec ts;
unsigned char v;
#ifdef OPENSSL_SYS_VOS_HPPA
long duration;
extern void s$sleep(long *_duration, short int *_code);
#else
long long duration;
extern void s$sleep2(long long *_duration, short int *_code);
#endif
bytes_needed = ossl_rand_pool_bytes_needed(pool, 4 );
for (i = 0; i < bytes_needed; i++) {
for (k = 0; k < 99; k++)
ts.tv_nsec = random();
#ifdef OPENSSL_SYS_VOS_HPPA
duration = 1;
s$sleep(&duration, &code);
#else
duration = 1;
s$sleep2(&duration, &code);
#endif
clock_gettime(CLOCK_REALTIME, &ts);
v = (unsigned char)(ts.tv_nsec & 0xFF);
ossl_rand_pool_add(pool, arg, &v, sizeof(v), 2);
}
return ossl_rand_pool_entropy_available(pool);
}
void ossl_rand_pool_cleanup(void)
{
}
void ossl_rand_pool_keep_random_devices_open(int keep)
{
}
#else
#if defined(OPENSSL_RAND_SEED_EGD) && (defined(OPENSSL_NO_EGD) || !defined(DEVRANDOM_EGD))
#error "Seeding uses EGD but EGD is turned off or no device given"
#endif
#if defined(OPENSSL_RAND_SEED_DEVRANDOM) && !defined(DEVRANDOM)
#error "Seeding uses urandom but DEVRANDOM is not configured"
#endif
#if defined(OPENSSL_RAND_SEED_OS)
#if !defined(DEVRANDOM)
#error "OS seeding requires DEVRANDOM to be configured"
#endif
#define OPENSSL_RAND_SEED_GETRANDOM
#define OPENSSL_RAND_SEED_DEVRANDOM
#endif
#if (defined(__FreeBSD__) || defined(__NetBSD__)) && defined(KERN_ARND)
static ssize_t sysctl_random(char *buf, size_t buflen)
{
int mib[2];
size_t done = 0;
size_t len;
#if defined(__FreeBSD__)
if (!ossl_assert(buflen % sizeof(long) == 0)) {
errno = EINVAL;
return -1;
}
#endif
#if defined(__NetBSD__) && __NetBSD_Version__ < 400000000
errno = ENOSYS;
return -1;
#endif
mib[0] = CTL_KERN;
mib[1] = KERN_ARND;
do {
len = buflen > 256 ? 256 : buflen;
if (sysctl(mib, 2, buf, &len, NULL, 0) == -1)
return done > 0 ? done : -1;
done += len;
buf += len;
buflen -= len;
} while (buflen > 0);
return done;
}
#endif
#if defined(OPENSSL_RAND_SEED_GETRANDOM)
#if defined(__linux) && !defined(__NR_getrandom)
#if defined(__arm__)
#define __NR_getrandom (__NR_SYSCALL_BASE + 384)
#elif defined(__i386__)
#define __NR_getrandom 355
#elif defined(__x86_64__)
#if defined(__ILP32__)
#define __NR_getrandom (__X32_SYSCALL_BIT + 318)
#else
#define __NR_getrandom 318
#endif
#elif defined(__xtensa__)
#define __NR_getrandom 338
#elif defined(__s390__) || defined(__s390x__)
#define __NR_getrandom 349
#elif defined(__bfin__)
#define __NR_getrandom 389
#elif defined(__powerpc__)
#define __NR_getrandom 359
#elif defined(__mips__) || defined(__mips64)
#if _MIPS_SIM == _MIPS_SIM_ABI32
#define __NR_getrandom (__NR_Linux + 353)
#elif _MIPS_SIM == _MIPS_SIM_ABI64
#define __NR_getrandom (__NR_Linux + 313)
#elif _MIPS_SIM == _MIPS_SIM_NABI32
#define __NR_getrandom (__NR_Linux + 317)
#endif
#elif defined(__hppa__)
#define __NR_getrandom (__NR_Linux + 339)
#elif defined(__sparc__)
#define __NR_getrandom 347
#elif defined(__ia64__)
#define __NR_getrandom 1339
#elif defined(__alpha__)
#define __NR_getrandom 511
#elif defined(__sh__)
#if defined(__SH5__)
#define __NR_getrandom 373
#else
#define __NR_getrandom 384
#endif
#elif defined(__avr32__)
#define __NR_getrandom 317
#elif defined(__microblaze__)
#define __NR_getrandom 385
#elif defined(__m68k__)
#define __NR_getrandom 352
#elif defined(__cris__)
#define __NR_getrandom 356
#else
#define __NR_getrandom 278
#endif
#endif
static ssize_t syscall_random(void *buf, size_t buflen)
{
#if !defined(__DragonFly__) && !defined(__NetBSD__) && !defined(__FreeBSD__)
#if defined(__GNUC__) && __GNUC__ >= 2 && defined(__ELF__) && !defined(__hpux)
extern int getentropy(void *buffer, size_t length) __attribute__((weak));
if (getentropy != NULL) {
if (getentropy(buf, buflen) == 0)
return (ssize_t)buflen;
if (errno != ENOSYS)
return -1;
}
#elif defined(OPENSSL_APPLE_CRYPTO_RANDOM)
if (CCRandomGenerateBytes(buf, buflen) == kCCSuccess)
return (ssize_t)buflen;
return -1;
#else
union {
void *p;
int (*f)(void *buffer, size_t length);
} p_getentropy;
ERR_set_mark();
p_getentropy.p = DSO_global_lookup("getentropy");
ERR_pop_to_mark();
if (p_getentropy.p != NULL)
return p_getentropy.f(buf, buflen) == 0 ? (ssize_t)buflen : -1;
#endif
#endif
#if defined(__linux) && defined(__NR_getrandom)
return syscall(__NR_getrandom, buf, buflen, 0);
#elif (defined(__DragonFly__) && __DragonFly_version >= 500700) \
|| (defined(__NetBSD__) && __NetBSD_Version >= 1000000000) \
|| (defined(__FreeBSD__) && __FreeBSD_version >= 1200061)
return getrandom(buf, buflen, 0);
#elif (defined(__FreeBSD__) || defined(__NetBSD__)) && defined(KERN_ARND)
return sysctl_random(buf, buflen);
#elif defined(__wasi__)
if (getentropy(buf, buflen) == 0)
return (ssize_t)buflen;
return -1;
#else
errno = ENOSYS;
return -1;
#endif
}
#endif
#if defined(OPENSSL_RAND_SEED_DEVRANDOM)
static const char *random_device_paths[] = { DEVRANDOM };
static struct random_device {
int fd;
dev_t dev;
ino_t ino;
mode_t mode;
dev_t rdev;
} random_devices[OSSL_NELEM(random_device_paths)];
static int keep_random_devices_open = 1;
#if defined(__linux) && defined(DEVRANDOM_WAIT) \
&& defined(OPENSSL_RAND_SEED_GETRANDOM)
static void *shm_addr;
static void cleanup_shm(void)
{
shmdt(shm_addr);
}
static int wait_random_seeded(void)
{
static int seeded = OPENSSL_RAND_SEED_DEVRANDOM_SHM_ID < 0;
static const int kernel_version[] = { DEVRANDOM_SAFE_KERNEL };
int kernel[2];
int shm_id, fd, r;
char c, *p;
struct utsname un;
fd_set fds;
if (!seeded) {
if ((shm_id = shmget(OPENSSL_RAND_SEED_DEVRANDOM_SHM_ID, 1, 0)) == -1) {
if (uname(&un) == 0) {
kernel[0] = atoi(un.release);
p = strchr(un.release, '.');
kernel[1] = p == NULL ? 0 : atoi(p + 1);
if (kernel[0] > kernel_version[0]
|| (kernel[0] == kernel_version[0]
&& kernel[1] >= kernel_version[1])) {
return 0;
}
}
if ((fd = open(DEVRANDOM_WAIT, O_RDONLY)) != -1) {
if (DEVRANDM_WAIT_USE_SELECT && fd < FD_SETSIZE) {
FD_ZERO(&fds);
FD_SET(fd, &fds);
while ((r = select(fd + 1, &fds, NULL, NULL, NULL)) < 0
&& errno == EINTR)
;
} else {
while ((r = read(fd, &c, 1)) < 0 && errno == EINTR)
;
}
close(fd);
if (r == 1) {
seeded = 1;
shm_id = shmget(OPENSSL_RAND_SEED_DEVRANDOM_SHM_ID, 1,
IPC_CREAT | S_IRUSR | S_IRGRP | S_IROTH);
}
}
}
if (shm_id != -1) {
seeded = 1;
shm_addr = shmat(shm_id, NULL, SHM_RDONLY);
if (shm_addr != (void *)-1)
OPENSSL_atexit(&cleanup_shm);
}
}
return seeded;
}
#else
static int wait_random_seeded(void)
{
return 1;
}
#endif
static int check_random_device(struct random_device *rd)
{
struct stat st;
return rd->fd != -1
&& fstat(rd->fd, &st) != -1
&& rd->dev == st.st_dev
&& rd->ino == st.st_ino
&& ((rd->mode ^ st.st_mode) & ~(S_IRWXU | S_IRWXG | S_IRWXO)) == 0
&& rd->rdev == st.st_rdev;
}
static int get_random_device(size_t n)
{
struct stat st;
struct random_device *rd = &random_devices[n];
if (check_random_device(rd))
return rd->fd;
if ((rd->fd = open(random_device_paths[n], O_RDONLY)) == -1)
return rd->fd;
if (fstat(rd->fd, &st) != -1) {
rd->dev = st.st_dev;
rd->ino = st.st_ino;
rd->mode = st.st_mode;
rd->rdev = st.st_rdev;
} else {
close(rd->fd);
rd->fd = -1;
}
return rd->fd;
}
static void close_random_device(size_t n)
{
struct random_device *rd = &random_devices[n];
if (check_random_device(rd))
close(rd->fd);
rd->fd = -1;
}
int ossl_rand_pool_init(void)
{
size_t i;
for (i = 0; i < OSSL_NELEM(random_devices); i++)
random_devices[i].fd = -1;
return 1;
}
void ossl_rand_pool_cleanup(void)
{
size_t i;
for (i = 0; i < OSSL_NELEM(random_devices); i++)
close_random_device(i);
}
void ossl_rand_pool_keep_random_devices_open(int keep)
{
if (!keep)
ossl_rand_pool_cleanup();
keep_random_devices_open = keep;
}
#else
int ossl_rand_pool_init(void)
{
return 1;
}
void ossl_rand_pool_cleanup(void)
{
}
void ossl_rand_pool_keep_random_devices_open(int keep)
{
}
#endif
size_t ossl_pool_acquire_entropy(RAND_POOL *pool)
{
#if defined(OPENSSL_RAND_SEED_NONE)
return ossl_rand_pool_entropy_available(pool);
#else
size_t entropy_available = 0;
(void)entropy_available;
#if defined(OPENSSL_RAND_SEED_GETRANDOM)
{
size_t bytes_needed;
unsigned char *buffer;
ssize_t bytes;
int attempts = 3;
bytes_needed = ossl_rand_pool_bytes_needed(pool, 1 );
while (bytes_needed != 0 && attempts-- > 0) {
buffer = ossl_rand_pool_add_begin(pool, bytes_needed);
bytes = syscall_random(buffer, bytes_needed);
if (bytes > 0) {
ossl_rand_pool_add_end(pool, bytes, 8 * bytes);
bytes_needed -= bytes;
attempts = 3;
} else if (bytes < 0 && errno != EINTR) {
break;
}
}
}
entropy_available = ossl_rand_pool_entropy_available(pool);
if (entropy_available > 0)
return entropy_available;
#endif
#if defined(OPENSSL_RAND_SEED_DEVRANDOM)
if (wait_random_seeded()) {
size_t bytes_needed;
unsigned char *buffer;
size_t i;
bytes_needed = ossl_rand_pool_bytes_needed(pool, 1 );
for (i = 0; bytes_needed > 0 && i < OSSL_NELEM(random_device_paths);
i++) {
ssize_t bytes = 0;
int attempts = 3;
const int fd = get_random_device(i);
if (fd == -1)
continue;
while (bytes_needed != 0 && attempts-- > 0) {
buffer = ossl_rand_pool_add_begin(pool, bytes_needed);
bytes = read(fd, buffer, bytes_needed);
if (bytes > 0) {
ossl_rand_pool_add_end(pool, bytes, 8 * bytes);
bytes_needed -= bytes;
attempts = 3;
} else if (bytes < 0 && errno != EINTR) {
break;
}
}
if (bytes < 0 || !keep_random_devices_open)
close_random_device(i);
bytes_needed = ossl_rand_pool_bytes_needed(pool, 1);
}
entropy_available = ossl_rand_pool_entropy_available(pool);
if (entropy_available > 0)
return entropy_available;
}
#endif
#if defined(OPENSSL_RAND_SEED_RDTSC)
entropy_available = ossl_prov_acquire_entropy_from_tsc(pool);
if (entropy_available > 0)
return entropy_available;
#endif
#if defined(OPENSSL_RAND_SEED_RDCPU)
entropy_available = ossl_prov_acquire_entropy_from_cpu(pool);
if (entropy_available > 0)
return entropy_available;
#endif
#if defined(OPENSSL_RAND_SEED_EGD)
{
static const char *paths[] = { DEVRANDOM_EGD, NULL };
size_t bytes_needed;
unsigned char *buffer;
int i;
bytes_needed = ossl_rand_pool_bytes_needed(pool, 1 );
for (i = 0; bytes_needed > 0 && paths[i] != NULL; i++) {
size_t bytes = 0;
int num;
buffer = ossl_rand_pool_add_begin(pool, bytes_needed);
num = RAND_query_egd_bytes(paths[i],
buffer, (int)bytes_needed);
if (num == (int)bytes_needed)
bytes = bytes_needed;
ossl_rand_pool_add_end(pool, bytes, 8 * bytes);
bytes_needed = ossl_rand_pool_bytes_needed(pool, 1);
}
entropy_available = ossl_rand_pool_entropy_available(pool);
if (entropy_available > 0)
return entropy_available;
}
#endif
return ossl_rand_pool_entropy_available(pool);
#endif
}
#endif
#endif
#if (defined(OPENSSL_SYS_UNIX) && !defined(OPENSSL_SYS_VXWORKS)) \
|| defined(__DJGPP__)
int ossl_pool_add_nonce_data(RAND_POOL *pool)
{
struct {
pid_t pid;
CRYPTO_THREAD_ID tid;
uint64_t time;
} data;
memset(&data, 0, sizeof(data));
data.pid = getpid();
data.tid = CRYPTO_THREAD_get_current_id();
data.time = get_time_stamp();
return ossl_rand_pool_add(pool, (unsigned char *)&data, sizeof(data), 0);
}
static uint64_t get_time_stamp(void)
{
#if defined(OSSL_POSIX_TIMER_OKAY)
{
struct timespec ts;
if (clock_gettime(CLOCK_REALTIME, &ts) == 0)
return TWO32TO64(ts.tv_sec, ts.tv_nsec);
}
#endif
#if defined(__unix__) \
|| (defined(_POSIX_C_SOURCE) && _POSIX_C_SOURCE >= 200112L)
{
struct timeval tv;
if (gettimeofday(&tv, NULL) == 0)
return TWO32TO64(tv.tv_sec, tv.tv_usec);
}
#endif
return time(NULL);
}
#endif