rand_egd.c 8.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303
  1. /* crypto/rand/rand_egd.c */
  2. /* Written by Ulf Moeller and Lutz Jaenicke for the OpenSSL project. */
  3. /* ====================================================================
  4. * Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved.
  5. *
  6. * Redistribution and use in source and binary forms, with or without
  7. * modification, are permitted provided that the following conditions
  8. * are met:
  9. *
  10. * 1. Redistributions of source code must retain the above copyright
  11. * notice, this list of conditions and the following disclaimer.
  12. *
  13. * 2. Redistributions in binary form must reproduce the above copyright
  14. * notice, this list of conditions and the following disclaimer in
  15. * the documentation and/or other materials provided with the
  16. * distribution.
  17. *
  18. * 3. All advertising materials mentioning features or use of this
  19. * software must display the following acknowledgment:
  20. * "This product includes software developed by the OpenSSL Project
  21. * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
  22. *
  23. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  24. * endorse or promote products derived from this software without
  25. * prior written permission. For written permission, please contact
  26. * openssl-core@openssl.org.
  27. *
  28. * 5. Products derived from this software may not be called "OpenSSL"
  29. * nor may "OpenSSL" appear in their names without prior written
  30. * permission of the OpenSSL Project.
  31. *
  32. * 6. Redistributions of any form whatsoever must retain the following
  33. * acknowledgment:
  34. * "This product includes software developed by the OpenSSL Project
  35. * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
  36. *
  37. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  38. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  39. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  40. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  41. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  42. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  43. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  44. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  45. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  46. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  47. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  48. * OF THE POSSIBILITY OF SUCH DAMAGE.
  49. * ====================================================================
  50. *
  51. * This product includes cryptographic software written by Eric Young
  52. * (eay@cryptsoft.com). This product includes software written by Tim
  53. * Hudson (tjh@cryptsoft.com).
  54. *
  55. */
  56. #include <openssl/e_os2.h>
  57. #include <openssl/rand.h>
  58. #include <openssl/buffer.h>
  59. /*
  60. * Query the EGD <URL: http://www.lothar.com/tech/crypto/>.
  61. *
  62. * This module supplies three routines:
  63. *
  64. * RAND_query_egd_bytes(path, buf, bytes)
  65. * will actually query "bytes" bytes of entropy form the egd-socket located
  66. * at path and will write them to buf (if supplied) or will directly feed
  67. * it to RAND_seed() if buf==NULL.
  68. * The number of bytes is not limited by the maximum chunk size of EGD,
  69. * which is 255 bytes. If more than 255 bytes are wanted, several chunks
  70. * of entropy bytes are requested. The connection is left open until the
  71. * query is competed.
  72. * RAND_query_egd_bytes() returns with
  73. * -1 if an error occured during connection or communication.
  74. * num the number of bytes read from the EGD socket. This number is either
  75. * the number of bytes requested or smaller, if the EGD pool is
  76. * drained and the daemon signals that the pool is empty.
  77. * This routine does not touch any RAND_status(). This is necessary, since
  78. * PRNG functions may call it during initialization.
  79. *
  80. * RAND_egd_bytes(path, bytes) will query "bytes" bytes and have them
  81. * used to seed the PRNG.
  82. * RAND_egd_bytes() is a wrapper for RAND_query_egd_bytes() with buf=NULL.
  83. * Unlike RAND_query_egd_bytes(), RAND_status() is used to test the
  84. * seed status so that the return value can reflect the seed state:
  85. * -1 if an error occured during connection or communication _or_
  86. * if the PRNG has still not received the required seeding.
  87. * num the number of bytes read from the EGD socket. This number is either
  88. * the number of bytes requested or smaller, if the EGD pool is
  89. * drained and the daemon signals that the pool is empty.
  90. *
  91. * RAND_egd(path) will query 255 bytes and use the bytes retreived to seed
  92. * the PRNG.
  93. * RAND_egd() is a wrapper for RAND_egd_bytes() with numbytes=255.
  94. */
  95. #if defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_VMS) || defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_VXWORKS) || defined(OPENSSL_SYS_NETWARE) || defined(OPENSSL_SYS_VOS)
  96. int RAND_query_egd_bytes(const char *path, unsigned char *buf, int bytes)
  97. {
  98. return(-1);
  99. }
  100. int RAND_egd(const char *path)
  101. {
  102. return(-1);
  103. }
  104. int RAND_egd_bytes(const char *path,int bytes)
  105. {
  106. return(-1);
  107. }
  108. #else
  109. #include <openssl/opensslconf.h>
  110. #include OPENSSL_UNISTD
  111. #include <sys/types.h>
  112. #include <sys/socket.h>
  113. #ifndef NO_SYS_UN_H
  114. # ifdef OPENSSL_SYS_VXWORKS
  115. # include <streams/un.h>
  116. # else
  117. # include <sys/un.h>
  118. # endif
  119. #else
  120. struct sockaddr_un {
  121. short sun_family; /* AF_UNIX */
  122. char sun_path[108]; /* path name (gag) */
  123. };
  124. #endif /* NO_SYS_UN_H */
  125. #include <string.h>
  126. #include <errno.h>
  127. #ifndef offsetof
  128. # define offsetof(TYPE, MEMBER) ((size_t) &((TYPE *)0)->MEMBER)
  129. #endif
  130. int RAND_query_egd_bytes(const char *path, unsigned char *buf, int bytes)
  131. {
  132. int ret = 0;
  133. struct sockaddr_un addr;
  134. int len, num, numbytes;
  135. int fd = -1;
  136. int success;
  137. unsigned char egdbuf[2], tempbuf[255], *retrievebuf;
  138. memset(&addr, 0, sizeof(addr));
  139. addr.sun_family = AF_UNIX;
  140. if (strlen(path) >= sizeof(addr.sun_path))
  141. return (-1);
  142. BUF_strlcpy(addr.sun_path,path,sizeof addr.sun_path);
  143. len = offsetof(struct sockaddr_un, sun_path) + strlen(path);
  144. fd = socket(AF_UNIX, SOCK_STREAM, 0);
  145. if (fd == -1) return (-1);
  146. success = 0;
  147. while (!success)
  148. {
  149. if (connect(fd, (struct sockaddr *)&addr, len) == 0)
  150. success = 1;
  151. else
  152. {
  153. switch (errno)
  154. {
  155. #ifdef EINTR
  156. case EINTR:
  157. #endif
  158. #ifdef EAGAIN
  159. case EAGAIN:
  160. #endif
  161. #ifdef EINPROGRESS
  162. case EINPROGRESS:
  163. #endif
  164. #ifdef EALREADY
  165. case EALREADY:
  166. #endif
  167. /* No error, try again */
  168. break;
  169. #ifdef EISCONN
  170. case EISCONN:
  171. success = 1;
  172. break;
  173. #endif
  174. default:
  175. goto err; /* failure */
  176. }
  177. }
  178. }
  179. while(bytes > 0)
  180. {
  181. egdbuf[0] = 1;
  182. egdbuf[1] = bytes < 255 ? bytes : 255;
  183. numbytes = 0;
  184. while (numbytes != 2)
  185. {
  186. num = write(fd, egdbuf + numbytes, 2 - numbytes);
  187. if (num >= 0)
  188. numbytes += num;
  189. else
  190. {
  191. switch (errno)
  192. {
  193. #ifdef EINTR
  194. case EINTR:
  195. #endif
  196. #ifdef EAGAIN
  197. case EAGAIN:
  198. #endif
  199. /* No error, try again */
  200. break;
  201. default:
  202. ret = -1;
  203. goto err; /* failure */
  204. }
  205. }
  206. }
  207. numbytes = 0;
  208. while (numbytes != 1)
  209. {
  210. num = read(fd, egdbuf, 1);
  211. if (num == 0)
  212. goto err; /* descriptor closed */
  213. else if (num > 0)
  214. numbytes += num;
  215. else
  216. {
  217. switch (errno)
  218. {
  219. #ifdef EINTR
  220. case EINTR:
  221. #endif
  222. #ifdef EAGAIN
  223. case EAGAIN:
  224. #endif
  225. /* No error, try again */
  226. break;
  227. default:
  228. ret = -1;
  229. goto err; /* failure */
  230. }
  231. }
  232. }
  233. if(egdbuf[0] == 0)
  234. goto err;
  235. if (buf)
  236. retrievebuf = buf + ret;
  237. else
  238. retrievebuf = tempbuf;
  239. numbytes = 0;
  240. while (numbytes != egdbuf[0])
  241. {
  242. num = read(fd, retrievebuf + numbytes, egdbuf[0] - numbytes);
  243. if (num == 0)
  244. goto err; /* descriptor closed */
  245. else if (num > 0)
  246. numbytes += num;
  247. else
  248. {
  249. switch (errno)
  250. {
  251. #ifdef EINTR
  252. case EINTR:
  253. #endif
  254. #ifdef EAGAIN
  255. case EAGAIN:
  256. #endif
  257. /* No error, try again */
  258. break;
  259. default:
  260. ret = -1;
  261. goto err; /* failure */
  262. }
  263. }
  264. }
  265. ret += egdbuf[0];
  266. bytes -= egdbuf[0];
  267. if (!buf)
  268. RAND_seed(tempbuf, egdbuf[0]);
  269. }
  270. err:
  271. if (fd != -1) close(fd);
  272. return(ret);
  273. }
  274. int RAND_egd_bytes(const char *path, int bytes)
  275. {
  276. int num, ret = 0;
  277. num = RAND_query_egd_bytes(path, NULL, bytes);
  278. if (num < 1) goto err;
  279. if (RAND_status() == 1)
  280. ret = num;
  281. err:
  282. return(ret);
  283. }
  284. int RAND_egd(const char *path)
  285. {
  286. return (RAND_egd_bytes(path, 255));
  287. }
  288. #endif