sortix-mirror/libc/stdlib/arc4random_buf.c

261 lines
7.2 KiB
C
Raw Normal View History

2014-07-19 19:08:25 +00:00
/* $OpenBSD: arc4random.c,v 1.48 2014/07/19 00:08:41 deraadt Exp $ */
/*
* Copyright (c) 1996, David Mazieres <dm@uun.org>
* Copyright (c) 2008, Damien Miller <djm@openbsd.org>
* Copyright (c) 2013, Markus Friedl <markus@openbsd.org>
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
/* $OpenBSD: chacha_private.h,v 1.2 2013/10/04 07:02:27 djm Exp $ */
/* Based on:
* chacha-merged.c version 20080118
* D. J. Bernstein
* Public domain.
*/
2015-05-10 20:24:45 +00:00
/* Adapted for Sortix libc by Jonas 'Sortie' Termansen in 2014, 2015. */
2014-07-19 19:08:25 +00:00
#include <assert.h>
#include <endian.h>
2016-02-28 11:11:02 +00:00
#include <pthread.h>
#include <stdbool.h>
2014-07-19 19:08:25 +00:00
#include <stdint.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
2016-02-28 11:11:02 +00:00
#ifdef __is_sortix_libk
#include <libk.h>
2015-05-10 20:24:45 +00:00
#endif
2014-07-19 19:08:25 +00:00
struct chacha
{
uint32_t input[16];
};
static inline uint32_t chacha_read_little_uint32(const unsigned char* buf)
{
return (uint32_t) buf[0] << 0 |
(uint32_t) buf[1] << 8 |
(uint32_t) buf[2] << 16 |
(uint32_t) buf[3] << 24;
}
static void chacha_keysetup(struct chacha* ctx, const unsigned char* key)
{
const unsigned char* sigma = (const unsigned char*) "expand 32-byte k";
ctx->input[0] = chacha_read_little_uint32(sigma + 0 * sizeof(uint32_t));
ctx->input[1] = chacha_read_little_uint32(sigma + 1 * sizeof(uint32_t));
ctx->input[2] = chacha_read_little_uint32(sigma + 2 * sizeof(uint32_t));
ctx->input[3] = chacha_read_little_uint32(sigma + 3 * sizeof(uint32_t));
ctx->input[4] = chacha_read_little_uint32(key + 0 * sizeof(uint32_t));
ctx->input[5] = chacha_read_little_uint32(key + 1 * sizeof(uint32_t));
ctx->input[6] = chacha_read_little_uint32(key + 2 * sizeof(uint32_t));
ctx->input[7] = chacha_read_little_uint32(key + 3 * sizeof(uint32_t));
ctx->input[8] = chacha_read_little_uint32(key + 4 * sizeof(uint32_t));
ctx->input[9] = chacha_read_little_uint32(key + 5 * sizeof(uint32_t));
ctx->input[10] = chacha_read_little_uint32(key + 6 * sizeof(uint32_t));
ctx->input[11] = chacha_read_little_uint32(key + 7 * sizeof(uint32_t));
}
static void chacha_ivsetup(struct chacha* ctx, const unsigned char* iv)
{
ctx->input[12] = 0;
ctx->input[13] = 0;
ctx->input[14] = chacha_read_little_uint32(iv + 0 * sizeof(uint32_t));
ctx->input[15] = chacha_read_little_uint32(iv + 1 * sizeof(uint32_t));
}
static inline uint32_t chacha_rotate(uint32_t v, uint32_t n)
{
return (v << n) | (v >> (32 - n));
}
static inline
void chacha_quarter_round(uint32_t* a, uint32_t* b, uint32_t* c, uint32_t* d)
{
*a = *a + *b;
*d = chacha_rotate(*d ^ *a, 16);
*c = *c + *d;
*b = chacha_rotate(*b ^ *c, 12);
*a = *a + *b;
*d = chacha_rotate(*d ^ *a, 8);
*c = *c + *d;
*b = chacha_rotate(*b ^ *c, 7);
}
static
void chacha_keystream(struct chacha* ctx,
unsigned char* keystream,
size_t size)
{
uint32_t work[16];
for ( size_t offset = 0; offset < size; )
{
size_t left = size - offset;
for ( size_t i = 0; i < 16; i++ )
work[i] = ctx->input[i];
/* NOTE: This is 20 in the OpenBSD version, but 8 in Bernstein's. */
/* TODO: Why decrement by 2 instead of 1? */
for ( int i = 20; 0 < i; i -= 2 )
{
chacha_quarter_round(&work[0], &work[4], &work[8], &work[12]);
chacha_quarter_round(&work[1], &work[5], &work[9], &work[13]);
chacha_quarter_round(&work[2], &work[6], &work[10], &work[14]);
chacha_quarter_round(&work[3], &work[7], &work[11], &work[15]);
chacha_quarter_round(&work[0], &work[5], &work[10], &work[15]);
chacha_quarter_round(&work[1], &work[6], &work[11], &work[12]);
chacha_quarter_round(&work[2], &work[7], &work[8], &work[13]);
chacha_quarter_round(&work[3], &work[4], &work[9], &work[14]);
}
for ( size_t i = 0; i < 16; i++ )
work[i] += ctx->input[i];
ctx->input[12] += 1;
if ( ctx->input[12] == 0 )
{
ctx->input[13] += 1;
/* Stopping at 2^70 bytes per nonce is user's responsibility. */
}
for ( size_t i = 0; i < 16; i++ )
work[i] = htole32(work[i]);
size_t amount = left < 64 ? left : 64;
memcpy(keystream + offset, work, amount);
offset += amount;
}
explicit_bzero(work, sizeof(work));
}
#define KEYSZ 32
#define IVSZ 8
2016-02-28 11:11:02 +00:00
#ifndef __is_sortix_libk
2014-07-19 19:08:25 +00:00
static pthread_mutex_t arc4random_mutex = PTHREAD_MUTEX_INITIALIZER;
2016-02-28 11:11:02 +00:00
#endif
2014-07-19 19:08:25 +00:00
/* TODO: Use address space randomization of libc global variables such that
these variables end up in unpredictable places. */
static bool rs_initialized = false;
2016-02-28 11:11:02 +00:00
#ifndef __is_sortix_libk
2014-07-19 19:08:25 +00:00
static pid_t rs_pid = 0;
2016-02-28 11:11:02 +00:00
#endif
2014-07-19 19:08:25 +00:00
static size_t rs_have = 0;
static size_t rs_count = 0;
static struct chacha rs_chacha;
static unsigned char rs_buf[16 * 64];
2016-02-28 11:11:02 +00:00
void arc4random_buf(void* buffer_ptr, size_t size)
2014-07-19 19:08:25 +00:00
{
Seed kernel entropy with randomness from the previous boot. The bootloader will now load the /boot/random.seed file if it exists, in which case the kernel will use it as the initial kernel entropy. The kernel warns if no random seed was loaded, unless the --no-random-seed option was given. This option is used for live environments that inherently have no prior secret state. The kernel initializes its entropy pool from the random seed as of the first things, so randomness is available very early on. init(8) will emit a fresh /boot/random.seed file on boot to avoid the same entropy being used twice. init(8) also writes out /boot/random.seed on system shutdown where the system has the most entropy. init(8) will warn if writing the file fails, except if /boot is a real-only filesystem, and keeping such state is impossible. The system administrator is then responsible for ensuring the bootloader somehow passes a fresh random seed on the next boot. /boot/random.seed must be owned by the root user and root group and must have file permissions 600 to avoid unprivileged users can read it. The file is passed to the kernel by the bootloader as a multiboot module with the command line --random-seed. If no random seed is loaded, the kernel attempts a poor quality fallback where it seeds the kernel arc4random(3) continuously with the current time. The timing variance may provide some effective entropy. There is no real kernel entropy gathering yet. The read of the CMOS real time clock is moved to an early point in the kernel boot, so the current time is available as fallback entropy. The kernel access of the random seed module is supposed to be infallible and happens before the kernel log is set up, but there is not yet a failsafe API for mapping single pages in the early kernel. sysupgrade(8) creates /boot/random.seed if it's absent as a temporary compatibility measure for people upgrading from the 1.0 release. The GRUB port will need to be upgraded with support for /boot/random.seed in the 10_sortix script. Installation with manual bootloader configuration will need to load the random seed with the --random-seed command line. With GRUB, this can be done with: module /boot/random.seed --random-seed
2016-08-20 00:27:33 +00:00
unsigned char entropy[KEYSZ + IVSZ];
2014-07-19 19:08:25 +00:00
unsigned char* buffer = (unsigned char*) buffer_ptr;
2016-02-28 11:11:02 +00:00
#ifdef __is_sortix_libk
libk_random_lock();
2014-07-19 19:08:25 +00:00
Seed kernel entropy with randomness from the previous boot. The bootloader will now load the /boot/random.seed file if it exists, in which case the kernel will use it as the initial kernel entropy. The kernel warns if no random seed was loaded, unless the --no-random-seed option was given. This option is used for live environments that inherently have no prior secret state. The kernel initializes its entropy pool from the random seed as of the first things, so randomness is available very early on. init(8) will emit a fresh /boot/random.seed file on boot to avoid the same entropy being used twice. init(8) also writes out /boot/random.seed on system shutdown where the system has the most entropy. init(8) will warn if writing the file fails, except if /boot is a real-only filesystem, and keeping such state is impossible. The system administrator is then responsible for ensuring the bootloader somehow passes a fresh random seed on the next boot. /boot/random.seed must be owned by the root user and root group and must have file permissions 600 to avoid unprivileged users can read it. The file is passed to the kernel by the bootloader as a multiboot module with the command line --random-seed. If no random seed is loaded, the kernel attempts a poor quality fallback where it seeds the kernel arc4random(3) continuously with the current time. The timing variance may provide some effective entropy. There is no real kernel entropy gathering yet. The read of the CMOS real time clock is moved to an early point in the kernel boot, so the current time is available as fallback entropy. The kernel access of the random seed module is supposed to be infallible and happens before the kernel log is set up, but there is not yet a failsafe API for mapping single pages in the early kernel. sysupgrade(8) creates /boot/random.seed if it's absent as a temporary compatibility measure for people upgrading from the 1.0 release. The GRUB port will need to be upgraded with support for /boot/random.seed in the 10_sortix script. Installation with manual bootloader configuration will need to load the random seed with the --random-seed command line. With GRUB, this can be done with: module /boot/random.seed --random-seed
2016-08-20 00:27:33 +00:00
if ( libk_hasentropy(sizeof(entropy)) )
2015-05-10 20:24:45 +00:00
{
rs_count = 0;
rs_have = 0;
memset(rs_buf, 0, sizeof(rs_buf));
}
2016-02-28 11:11:02 +00:00
#else
pthread_mutex_lock(&arc4random_mutex);
2015-05-10 20:24:45 +00:00
2014-07-19 19:08:25 +00:00
/* TODO: Employ zero-memory-on-fork semantics instead. */
/* pid_t are never reused on Sortix at the moment. */
if ( getpid() != rs_pid )
{
rs_count = 0;
rs_have = 0;
memset(rs_buf, 0, sizeof(rs_buf));
/* TODO: Should rs_chacha be zeroed as well? */
rs_pid = getpid();
}
2016-02-28 11:11:02 +00:00
#endif
2014-07-19 19:08:25 +00:00
while ( 0 < size )
{
size_t available = rs_have;
if ( size < available )
available = size;
if ( rs_count < available )
available = rs_count;
if ( 0 < available )
{
unsigned char* randomness = rs_buf + sizeof(rs_buf) - rs_have;
memcpy(buffer, randomness, available);
memset(randomness, 0, available);
rs_count -= available;
rs_have -= available;
buffer += available;
size -= available;
}
if ( rs_count == 0 )
{
2016-02-28 11:11:02 +00:00
#ifdef __is_sortix_libk
libk_getentropy(entropy, sizeof(entropy));
#else
2014-07-19 19:08:25 +00:00
getentropy(entropy, sizeof(entropy));
2016-02-28 11:11:02 +00:00
#endif
2014-07-19 19:08:25 +00:00
if ( rs_initialized )
{
unsigned char old_entropy[sizeof(entropy)];
chacha_keystream(&rs_chacha, old_entropy, sizeof(old_entropy));
for ( size_t i = 0; i < sizeof(entropy); i++ )
entropy[i] ^= old_entropy[i];
explicit_bzero(old_entropy, sizeof(old_entropy));
}
chacha_keysetup(&rs_chacha, entropy);
chacha_ivsetup(&rs_chacha, entropy + KEYSZ);
rs_initialized = true;
explicit_bzero(entropy, sizeof(entropy));
rs_have = 0;
memset(rs_buf, 0, sizeof(rs_buf));
rs_count = 1600000;
}
if ( rs_have == 0 )
{
chacha_keystream(&rs_chacha, rs_buf, sizeof(rs_buf));
chacha_keysetup(&rs_chacha, rs_buf);
chacha_ivsetup(&rs_chacha, rs_buf + KEYSZ);
rs_have = sizeof(rs_buf) - KEYSZ - IVSZ;
}
}
2016-02-28 11:11:02 +00:00
#ifdef __is_sortix_libk
libk_random_unlock();
#else
2014-07-19 19:08:25 +00:00
pthread_mutex_unlock(&arc4random_mutex);
2016-02-28 11:11:02 +00:00
#endif
2014-07-19 19:08:25 +00:00
}