rand_egd.c 7.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286
  1. /* crypto/rand/rand_egd.c */
  2. /* Written by Ulf Moeller and Lutz Jaenicke for the OpenSSL project. */
  3. /* ====================================================================
  4. * Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved.
  5. *
  6. * Redistribution and use in source and binary forms, with or without
  7. * modification, are permitted provided that the following conditions
  8. * are met:
  9. *
  10. * 1. Redistributions of source code must retain the above copyright
  11. * notice, this list of conditions and the following disclaimer.
  12. *
  13. * 2. Redistributions in binary form must reproduce the above copyright
  14. * notice, this list of conditions and the following disclaimer in
  15. * the documentation and/or other materials provided with the
  16. * distribution.
  17. *
  18. * 3. All advertising materials mentioning features or use of this
  19. * software must display the following acknowledgment:
  20. * "This product includes software developed by the OpenSSL Project
  21. * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
  22. *
  23. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  24. * endorse or promote products derived from this software without
  25. * prior written permission. For written permission, please contact
  26. * openssl-core@openssl.org.
  27. *
  28. * 5. Products derived from this software may not be called "OpenSSL"
  29. * nor may "OpenSSL" appear in their names without prior written
  30. * permission of the OpenSSL Project.
  31. *
  32. * 6. Redistributions of any form whatsoever must retain the following
  33. * acknowledgment:
  34. * "This product includes software developed by the OpenSSL Project
  35. * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
  36. *
  37. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  38. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  39. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  40. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  41. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  42. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  43. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  44. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  45. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  46. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  47. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  48. * OF THE POSSIBILITY OF SUCH DAMAGE.
  49. * ====================================================================
  50. *
  51. * This product includes cryptographic software written by Eric Young
  52. * (eay@cryptsoft.com). This product includes software written by Tim
  53. * Hudson (tjh@cryptsoft.com).
  54. *
  55. */
  56. #include <openssl/rand.h>
  57. /*
  58. * Query the EGD <URL: http://www.lothar.com/tech/crypto/>.
  59. *
  60. * This module supplies three routines:
  61. *
  62. * RAND_query_egd_bytes(path, buf, bytes)
  63. * will actually query "bytes" bytes of entropy form the egd-socket located
  64. * at path and will write them to buf (if supplied) or will directly feed
  65. * it to RAND_seed() if buf==NULL.
  66. * The number of bytes is not limited by the maximum chunk size of EGD,
  67. * which is 255 bytes. If more than 255 bytes are wanted, several chunks
  68. * of entropy bytes are requested. The connection is left open until the
  69. * query is competed.
  70. * RAND_query_egd_bytes() returns with
  71. * -1 if an error occured during connection or communication.
  72. * num the number of bytes read from the EGD socket. This number is either
  73. * the number of bytes requested or smaller, if the EGD pool is
  74. * drained and the daemon signals that the pool is empty.
  75. * This routine does not touch any RAND_status(). This is necessary, since
  76. * PRNG functions may call it during initialization.
  77. *
  78. * RAND_egd_bytes(path, bytes) will query "bytes" bytes and have them
  79. * used to seed the PRNG.
  80. * RAND_egd_bytes() is a wrapper for RAND_query_egd_bytes() with buf=NULL.
  81. * Unlike RAND_query_egd_bytes(), RAND_status() is used to test the
  82. * seed status so that the return value can reflect the seed state:
  83. * -1 if an error occured during connection or communication _or_
  84. * if the PRNG has still not received the required seeding.
  85. * num the number of bytes read from the EGD socket. This number is either
  86. * the number of bytes requested or smaller, if the EGD pool is
  87. * drained and the daemon signals that the pool is empty.
  88. *
  89. * RAND_egd(path) will query 255 bytes and use the bytes retreived to seed
  90. * the PRNG.
  91. * RAND_egd() is a wrapper for RAND_egd_bytes() with numbytes=255.
  92. */
  93. #if defined(OPENSSL_SYS_WIN32) || defined(VMS) || defined(__VMS)
  94. int RAND_query_egd_bytes(const char *path, unsigned char *buf, int bytes)
  95. {
  96. return(-1);
  97. }
  98. int RAND_egd(const char *path)
  99. {
  100. return(-1);
  101. }
  102. int RAND_egd_bytes(const char *path,int bytes)
  103. {
  104. return(-1);
  105. }
  106. #else
  107. #include <openssl/opensslconf.h>
  108. #include OPENSSL_UNISTD
  109. #include <sys/types.h>
  110. #include <sys/socket.h>
  111. #include <sys/un.h>
  112. #include <string.h>
  113. #include <errno.h>
  114. #ifndef offsetof
  115. # define offsetof(TYPE, MEMBER) ((size_t) &((TYPE *)0)->MEMBER)
  116. #endif
  117. int RAND_query_egd_bytes(const char *path, unsigned char *buf, int bytes)
  118. {
  119. int ret = 0;
  120. struct sockaddr_un addr;
  121. int len, num, numbytes;
  122. int fd = -1;
  123. int success;
  124. unsigned char egdbuf[2], tempbuf[255], *retrievebuf;
  125. memset(&addr, 0, sizeof(addr));
  126. addr.sun_family = AF_UNIX;
  127. if (strlen(path) > sizeof(addr.sun_path))
  128. return (-1);
  129. strcpy(addr.sun_path,path);
  130. len = offsetof(struct sockaddr_un, sun_path) + strlen(path);
  131. fd = socket(AF_UNIX, SOCK_STREAM, 0);
  132. if (fd == -1) return (-1);
  133. success = 0;
  134. while (!success)
  135. {
  136. if (connect(fd, (struct sockaddr *)&addr, len) == 0)
  137. success = 1;
  138. else
  139. {
  140. switch (errno)
  141. {
  142. #ifdef EINTR
  143. case EINTR:
  144. #endif
  145. #ifdef EAGAIN
  146. case EAGAIN:
  147. #endif
  148. #ifdef EINPROGRESS
  149. case EINPROGRESS:
  150. #endif
  151. #ifdef EALREADY
  152. case EALREADY:
  153. #endif
  154. /* No error, try again */
  155. break;
  156. #ifdef EISCONN
  157. case EISCONN:
  158. success = 1;
  159. break;
  160. #endif
  161. default:
  162. goto err; /* failure */
  163. }
  164. }
  165. }
  166. while(bytes > 0)
  167. {
  168. egdbuf[0] = 1;
  169. egdbuf[1] = bytes < 255 ? bytes : 255;
  170. numbytes = 0;
  171. while (numbytes != 2)
  172. {
  173. num = write(fd, egdbuf + numbytes, 2 - numbytes);
  174. if (num >= 0)
  175. numbytes += num;
  176. else
  177. {
  178. switch (errno)
  179. {
  180. #ifdef EINTR
  181. case EINTR:
  182. #endif
  183. #ifdef EAGAIN
  184. case EAGAIN:
  185. #endif
  186. /* No error, try again */
  187. break;
  188. default:
  189. ret = -1;
  190. goto err; /* failure */
  191. }
  192. }
  193. }
  194. numbytes = 0;
  195. while (numbytes != 1)
  196. {
  197. num = read(fd, egdbuf, 1);
  198. if (num >= 0)
  199. numbytes += num;
  200. else
  201. {
  202. switch (errno)
  203. {
  204. #ifdef EINTR
  205. case EINTR:
  206. #endif
  207. #ifdef EAGAIN
  208. case EAGAIN:
  209. #endif
  210. /* No error, try again */
  211. break;
  212. default:
  213. ret = -1;
  214. goto err; /* failure */
  215. }
  216. }
  217. }
  218. if(egdbuf[0] == 0)
  219. goto err;
  220. if (buf)
  221. retrievebuf = buf + ret;
  222. else
  223. retrievebuf = tempbuf;
  224. numbytes = 0;
  225. while (numbytes != egdbuf[0])
  226. {
  227. num = read(fd, retrievebuf + numbytes, egdbuf[0] - numbytes);
  228. if (num >= 0)
  229. numbytes += num;
  230. else
  231. {
  232. switch (errno)
  233. {
  234. #ifdef EINTR
  235. case EINTR:
  236. #endif
  237. #ifdef EAGAIN
  238. case EAGAIN:
  239. #endif
  240. /* No error, try again */
  241. break;
  242. default:
  243. ret = -1;
  244. goto err; /* failure */
  245. }
  246. }
  247. }
  248. ret += egdbuf[0];
  249. bytes -= egdbuf[0];
  250. if (!buf)
  251. RAND_seed(tempbuf, egdbuf[0]);
  252. }
  253. err:
  254. if (fd != -1) close(fd);
  255. return(ret);
  256. }
  257. int RAND_egd_bytes(const char *path, int bytes)
  258. {
  259. int num, ret = 0;
  260. num = RAND_query_egd_bytes(path, NULL, bytes);
  261. if (num < 1) goto err;
  262. if (RAND_status() == 1)
  263. ret = num;
  264. err:
  265. return(ret);
  266. }
  267. int RAND_egd(const char *path)
  268. {
  269. return (RAND_egd_bytes(path, 255));
  270. }
  271. #endif