]> andersk Git - openssh.git/blame - openbsd-compat/bsd-arc4random.c
- (dtucker) [auth-pam.c scard-opensc.c] Tinderbox says auth-pam.c uses
[openssh.git] / openbsd-compat / bsd-arc4random.c
CommitLineData
416ed5a7 1/*
9cd11896 2 * Copyright (c) 1999,2000,2004 Damien Miller <djm@mindrot.org>
416ed5a7 3 *
9cd11896 4 * Permission to use, copy, modify, and distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
416ed5a7 7 *
9cd11896 8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
416ed5a7 15 */
16
17#include "includes.h"
a701a70b 18#include "log.h"
416ed5a7 19
0b202697 20RCSID("$Id$");
21
416ed5a7 22#ifndef HAVE_ARC4RANDOM
23
2f125ca1 24#include <openssl/rand.h>
25#include <openssl/rc4.h>
a701a70b 26#include <openssl/err.h>
2f125ca1 27
10fa00c8 28/* Size of key to use */
29#define SEED_SIZE 20
30
31/* Number of bytes to reseed after */
ddc49b5c 32#define REKEY_BYTES (1 << 24)
10fa00c8 33
416ed5a7 34static int rc4_ready = 0;
35static RC4_KEY rc4;
36
37unsigned int arc4random(void)
38{
39 unsigned int r = 0;
e339aa53 40 static int first_time = 1;
416ed5a7 41
e339aa53 42 if (rc4_ready <= 0) {
af5ee4e4 43 if (first_time)
e339aa53 44 seed_rng();
45 first_time = 0;
416ed5a7 46 arc4random_stir();
e339aa53 47 }
48
416ed5a7 49 RC4(&rc4, sizeof(r), (unsigned char *)&r, (unsigned char *)&r);
10fa00c8 50
51 rc4_ready -= sizeof(r);
416ed5a7 52
53 return(r);
54}
55
56void arc4random_stir(void)
57{
10fa00c8 58 unsigned char rand_buf[SEED_SIZE];
10fa00c8 59
e339aa53 60 memset(&rc4, 0, sizeof(rc4));
d8eb5247 61 if (RAND_bytes(rand_buf, sizeof(rand_buf)) <= 0)
e339aa53 62 fatal("Couldn't obtain random bytes (error %ld)",
63 ERR_get_error());
416ed5a7 64 RC4_set_key(&rc4, sizeof(rand_buf), rand_buf);
9901cb37 65 RC4(&rc4, sizeof(rand_buf), rand_buf, rand_buf);
416ed5a7 66 memset(rand_buf, 0, sizeof(rand_buf));
e339aa53 67
10fa00c8 68 rc4_ready = REKEY_BYTES;
416ed5a7 69}
70#endif /* !HAVE_ARC4RANDOM */
This page took 0.165611 seconds and 5 git commands to generate.