]>
Commit | Line | Data |
---|---|---|
416ed5a7 | 1 | /* |
9cd11896 | 2 | * Copyright (c) 1999,2000,2004 Damien Miller <djm@mindrot.org> |
416ed5a7 | 3 | * |
9cd11896 | 4 | * Permission to use, copy, modify, and distribute this software for any |
5 | * purpose with or without fee is hereby granted, provided that the above | |
6 | * copyright notice and this permission notice appear in all copies. | |
416ed5a7 | 7 | * |
9cd11896 | 8 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
9 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | |
10 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | |
11 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | |
12 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | |
13 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | |
14 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | |
416ed5a7 | 15 | */ |
16 | ||
17 | #include "includes.h" | |
a701a70b | 18 | #include "log.h" |
416ed5a7 | 19 | |
0b202697 | 20 | RCSID("$Id$"); |
21 | ||
416ed5a7 | 22 | #ifndef HAVE_ARC4RANDOM |
23 | ||
2f125ca1 | 24 | #include <openssl/rand.h> |
25 | #include <openssl/rc4.h> | |
a701a70b | 26 | #include <openssl/err.h> |
2f125ca1 | 27 | |
10fa00c8 | 28 | /* Size of key to use */ |
29 | #define SEED_SIZE 20 | |
30 | ||
31 | /* Number of bytes to reseed after */ | |
ddc49b5c | 32 | #define REKEY_BYTES (1 << 24) |
10fa00c8 | 33 | |
416ed5a7 | 34 | static int rc4_ready = 0; |
35 | static RC4_KEY rc4; | |
36 | ||
15606882 | 37 | unsigned int |
38 | arc4random(void) | |
416ed5a7 | 39 | { |
40 | unsigned int r = 0; | |
e339aa53 | 41 | static int first_time = 1; |
416ed5a7 | 42 | |
e339aa53 | 43 | if (rc4_ready <= 0) { |
af5ee4e4 | 44 | if (first_time) |
e339aa53 | 45 | seed_rng(); |
46 | first_time = 0; | |
416ed5a7 | 47 | arc4random_stir(); |
e339aa53 | 48 | } |
49 | ||
416ed5a7 | 50 | RC4(&rc4, sizeof(r), (unsigned char *)&r, (unsigned char *)&r); |
10fa00c8 | 51 | |
52 | rc4_ready -= sizeof(r); | |
416ed5a7 | 53 | |
54 | return(r); | |
55 | } | |
56 | ||
15606882 | 57 | void |
58 | arc4random_stir(void) | |
416ed5a7 | 59 | { |
10fa00c8 | 60 | unsigned char rand_buf[SEED_SIZE]; |
75d1f941 | 61 | int i; |
10fa00c8 | 62 | |
e339aa53 | 63 | memset(&rc4, 0, sizeof(rc4)); |
d8eb5247 | 64 | if (RAND_bytes(rand_buf, sizeof(rand_buf)) <= 0) |
e339aa53 | 65 | fatal("Couldn't obtain random bytes (error %ld)", |
66 | ERR_get_error()); | |
416ed5a7 | 67 | RC4_set_key(&rc4, sizeof(rand_buf), rand_buf); |
75d1f941 | 68 | |
69 | /* | |
70 | * Discard early keystream, as per recommendations in: | |
71 | * http://www.wisdom.weizmann.ac.il/~itsik/RC4/Papers/Rc4_ksa.ps | |
72 | */ | |
73 | for(i = 0; i <= 256; i += sizeof(rand_buf)) | |
74 | RC4(&rc4, sizeof(rand_buf), rand_buf, rand_buf); | |
75 | ||
416ed5a7 | 76 | memset(rand_buf, 0, sizeof(rand_buf)); |
e339aa53 | 77 | |
10fa00c8 | 78 | rc4_ready = REKEY_BYTES; |
416ed5a7 | 79 | } |
80 | #endif /* !HAVE_ARC4RANDOM */ |