rand_egd.c 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304
  1. /* crypto/rand/rand_egd.c */
  2. /* Written by Ulf Moeller and Lutz Jaenicke for the OpenSSL project. */
  3. /* ====================================================================
  4. * Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved.
  5. *
  6. * Redistribution and use in source and binary forms, with or without
  7. * modification, are permitted provided that the following conditions
  8. * are met:
  9. *
  10. * 1. Redistributions of source code must retain the above copyright
  11. * notice, this list of conditions and the following disclaimer.
  12. *
  13. * 2. Redistributions in binary form must reproduce the above copyright
  14. * notice, this list of conditions and the following disclaimer in
  15. * the documentation and/or other materials provided with the
  16. * distribution.
  17. *
  18. * 3. All advertising materials mentioning features or use of this
  19. * software must display the following acknowledgment:
  20. * "This product includes software developed by the OpenSSL Project
  21. * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
  22. *
  23. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  24. * endorse or promote products derived from this software without
  25. * prior written permission. For written permission, please contact
  26. * openssl-core@openssl.org.
  27. *
  28. * 5. Products derived from this software may not be called "OpenSSL"
  29. * nor may "OpenSSL" appear in their names without prior written
  30. * permission of the OpenSSL Project.
  31. *
  32. * 6. Redistributions of any form whatsoever must retain the following
  33. * acknowledgment:
  34. * "This product includes software developed by the OpenSSL Project
  35. * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
  36. *
  37. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  38. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  39. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  40. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  41. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  42. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  43. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  44. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  45. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  46. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  47. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  48. * OF THE POSSIBILITY OF SUCH DAMAGE.
  49. * ====================================================================
  50. *
  51. * This product includes cryptographic software written by Eric Young
  52. * (eay@cryptsoft.com). This product includes software written by Tim
  53. * Hudson (tjh@cryptsoft.com).
  54. *
  55. */
  56. #include <openssl/crypto.h>
  57. #include <openssl/e_os2.h>
  58. #include <openssl/rand.h>
  59. #include <openssl/buffer.h>
  60. /*
  61. * Query the EGD <URL: http://www.lothar.com/tech/crypto/>.
  62. *
  63. * This module supplies three routines:
  64. *
  65. * RAND_query_egd_bytes(path, buf, bytes)
  66. * will actually query "bytes" bytes of entropy form the egd-socket located
  67. * at path and will write them to buf (if supplied) or will directly feed
  68. * it to RAND_seed() if buf==NULL.
  69. * The number of bytes is not limited by the maximum chunk size of EGD,
  70. * which is 255 bytes. If more than 255 bytes are wanted, several chunks
  71. * of entropy bytes are requested. The connection is left open until the
  72. * query is competed.
  73. * RAND_query_egd_bytes() returns with
  74. * -1 if an error occured during connection or communication.
  75. * num the number of bytes read from the EGD socket. This number is either
  76. * the number of bytes requested or smaller, if the EGD pool is
  77. * drained and the daemon signals that the pool is empty.
  78. * This routine does not touch any RAND_status(). This is necessary, since
  79. * PRNG functions may call it during initialization.
  80. *
  81. * RAND_egd_bytes(path, bytes) will query "bytes" bytes and have them
  82. * used to seed the PRNG.
  83. * RAND_egd_bytes() is a wrapper for RAND_query_egd_bytes() with buf=NULL.
  84. * Unlike RAND_query_egd_bytes(), RAND_status() is used to test the
  85. * seed status so that the return value can reflect the seed state:
  86. * -1 if an error occured during connection or communication _or_
  87. * if the PRNG has still not received the required seeding.
  88. * num the number of bytes read from the EGD socket. This number is either
  89. * the number of bytes requested or smaller, if the EGD pool is
  90. * drained and the daemon signals that the pool is empty.
  91. *
  92. * RAND_egd(path) will query 255 bytes and use the bytes retreived to seed
  93. * the PRNG.
  94. * RAND_egd() is a wrapper for RAND_egd_bytes() with numbytes=255.
  95. */
  96. #if defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_VMS) || defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_VXWORKS) || defined(OPENSSL_SYS_NETWARE) || defined(OPENSSL_SYS_VOS) || defined(OPENSSL_SYS_BEOS)
  97. int RAND_query_egd_bytes(const char *path, unsigned char *buf, int bytes)
  98. {
  99. return(-1);
  100. }
  101. int RAND_egd(const char *path)
  102. {
  103. return(-1);
  104. }
  105. int RAND_egd_bytes(const char *path,int bytes)
  106. {
  107. return(-1);
  108. }
  109. #else
  110. #include <openssl/opensslconf.h>
  111. #include OPENSSL_UNISTD
  112. #include <sys/types.h>
  113. #include <sys/socket.h>
  114. #ifndef NO_SYS_UN_H
  115. # ifdef OPENSSL_SYS_VXWORKS
  116. # include <streams/un.h>
  117. # else
  118. # include <sys/un.h>
  119. # endif
  120. #else
  121. struct sockaddr_un {
  122. short sun_family; /* AF_UNIX */
  123. char sun_path[108]; /* path name (gag) */
  124. };
  125. #endif /* NO_SYS_UN_H */
  126. #include <string.h>
  127. #include <errno.h>
  128. #ifndef offsetof
  129. # define offsetof(TYPE, MEMBER) ((size_t) &((TYPE *)0)->MEMBER)
  130. #endif
  131. int RAND_query_egd_bytes(const char *path, unsigned char *buf, int bytes)
  132. {
  133. int ret = 0;
  134. struct sockaddr_un addr;
  135. int len, num, numbytes;
  136. int fd = -1;
  137. int success;
  138. unsigned char egdbuf[2], tempbuf[255], *retrievebuf;
  139. memset(&addr, 0, sizeof(addr));
  140. addr.sun_family = AF_UNIX;
  141. if (strlen(path) >= sizeof(addr.sun_path))
  142. return (-1);
  143. BUF_strlcpy(addr.sun_path,path,sizeof addr.sun_path);
  144. len = offsetof(struct sockaddr_un, sun_path) + strlen(path);
  145. fd = socket(AF_UNIX, SOCK_STREAM, 0);
  146. if (fd == -1) return (-1);
  147. success = 0;
  148. while (!success)
  149. {
  150. if (connect(fd, (struct sockaddr *)&addr, len) == 0)
  151. success = 1;
  152. else
  153. {
  154. switch (errno)
  155. {
  156. #ifdef EINTR
  157. case EINTR:
  158. #endif
  159. #ifdef EAGAIN
  160. case EAGAIN:
  161. #endif
  162. #ifdef EINPROGRESS
  163. case EINPROGRESS:
  164. #endif
  165. #ifdef EALREADY
  166. case EALREADY:
  167. #endif
  168. /* No error, try again */
  169. break;
  170. #ifdef EISCONN
  171. case EISCONN:
  172. success = 1;
  173. break;
  174. #endif
  175. default:
  176. goto err; /* failure */
  177. }
  178. }
  179. }
  180. while(bytes > 0)
  181. {
  182. egdbuf[0] = 1;
  183. egdbuf[1] = bytes < 255 ? bytes : 255;
  184. numbytes = 0;
  185. while (numbytes != 2)
  186. {
  187. num = write(fd, egdbuf + numbytes, 2 - numbytes);
  188. if (num >= 0)
  189. numbytes += num;
  190. else
  191. {
  192. switch (errno)
  193. {
  194. #ifdef EINTR
  195. case EINTR:
  196. #endif
  197. #ifdef EAGAIN
  198. case EAGAIN:
  199. #endif
  200. /* No error, try again */
  201. break;
  202. default:
  203. ret = -1;
  204. goto err; /* failure */
  205. }
  206. }
  207. }
  208. numbytes = 0;
  209. while (numbytes != 1)
  210. {
  211. num = read(fd, egdbuf, 1);
  212. if (num == 0)
  213. goto err; /* descriptor closed */
  214. else if (num > 0)
  215. numbytes += num;
  216. else
  217. {
  218. switch (errno)
  219. {
  220. #ifdef EINTR
  221. case EINTR:
  222. #endif
  223. #ifdef EAGAIN
  224. case EAGAIN:
  225. #endif
  226. /* No error, try again */
  227. break;
  228. default:
  229. ret = -1;
  230. goto err; /* failure */
  231. }
  232. }
  233. }
  234. if(egdbuf[0] == 0)
  235. goto err;
  236. if (buf)
  237. retrievebuf = buf + ret;
  238. else
  239. retrievebuf = tempbuf;
  240. numbytes = 0;
  241. while (numbytes != egdbuf[0])
  242. {
  243. num = read(fd, retrievebuf + numbytes, egdbuf[0] - numbytes);
  244. if (num == 0)
  245. goto err; /* descriptor closed */
  246. else if (num > 0)
  247. numbytes += num;
  248. else
  249. {
  250. switch (errno)
  251. {
  252. #ifdef EINTR
  253. case EINTR:
  254. #endif
  255. #ifdef EAGAIN
  256. case EAGAIN:
  257. #endif
  258. /* No error, try again */
  259. break;
  260. default:
  261. ret = -1;
  262. goto err; /* failure */
  263. }
  264. }
  265. }
  266. ret += egdbuf[0];
  267. bytes -= egdbuf[0];
  268. if (!buf)
  269. RAND_seed(tempbuf, egdbuf[0]);
  270. }
  271. err:
  272. if (fd != -1) close(fd);
  273. return(ret);
  274. }
  275. int RAND_egd_bytes(const char *path, int bytes)
  276. {
  277. int num, ret = 0;
  278. num = RAND_query_egd_bytes(path, NULL, bytes);
  279. if (num < 1) goto err;
  280. if (RAND_status() == 1)
  281. ret = num;
  282. err:
  283. return(ret);
  284. }
  285. int RAND_egd(const char *path)
  286. {
  287. return (RAND_egd_bytes(path, 255));
  288. }
  289. #endif