]>
Commit | Line | Data |
---|---|---|
416ed5a7 | 1 | /* |
9cd11896 | 2 | * Copyright (c) 1999,2000,2004 Damien Miller <djm@mindrot.org> |
416ed5a7 | 3 | * |
9cd11896 | 4 | * Permission to use, copy, modify, and distribute this software for any |
5 | * purpose with or without fee is hereby granted, provided that the above | |
6 | * copyright notice and this permission notice appear in all copies. | |
416ed5a7 | 7 | * |
9cd11896 | 8 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
9 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | |
10 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | |
11 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | |
12 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | |
13 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | |
14 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | |
416ed5a7 | 15 | */ |
16 | ||
17 | #include "includes.h" | |
28cb0a43 | 18 | |
19 | #include <sys/types.h> | |
f2265d5d | 20 | |
28cb0a43 | 21 | #include <string.h> |
f2265d5d | 22 | #include <stdarg.h> |
28cb0a43 | 23 | |
a701a70b | 24 | #include "log.h" |
416ed5a7 | 25 | |
26 | #ifndef HAVE_ARC4RANDOM | |
27 | ||
2f125ca1 | 28 | #include <openssl/rand.h> |
29 | #include <openssl/rc4.h> | |
a701a70b | 30 | #include <openssl/err.h> |
2f125ca1 | 31 | |
10fa00c8 | 32 | /* Size of key to use */ |
33 | #define SEED_SIZE 20 | |
34 | ||
35 | /* Number of bytes to reseed after */ | |
ddc49b5c | 36 | #define REKEY_BYTES (1 << 24) |
10fa00c8 | 37 | |
416ed5a7 | 38 | static int rc4_ready = 0; |
39 | static RC4_KEY rc4; | |
40 | ||
15606882 | 41 | unsigned int |
42 | arc4random(void) | |
416ed5a7 | 43 | { |
44 | unsigned int r = 0; | |
e339aa53 | 45 | static int first_time = 1; |
416ed5a7 | 46 | |
e339aa53 | 47 | if (rc4_ready <= 0) { |
af5ee4e4 | 48 | if (first_time) |
e339aa53 | 49 | seed_rng(); |
50 | first_time = 0; | |
416ed5a7 | 51 | arc4random_stir(); |
e339aa53 | 52 | } |
53 | ||
416ed5a7 | 54 | RC4(&rc4, sizeof(r), (unsigned char *)&r, (unsigned char *)&r); |
10fa00c8 | 55 | |
56 | rc4_ready -= sizeof(r); | |
416ed5a7 | 57 | |
58 | return(r); | |
59 | } | |
60 | ||
15606882 | 61 | void |
62 | arc4random_stir(void) | |
416ed5a7 | 63 | { |
10fa00c8 | 64 | unsigned char rand_buf[SEED_SIZE]; |
75d1f941 | 65 | int i; |
10fa00c8 | 66 | |
e339aa53 | 67 | memset(&rc4, 0, sizeof(rc4)); |
d8eb5247 | 68 | if (RAND_bytes(rand_buf, sizeof(rand_buf)) <= 0) |
e339aa53 | 69 | fatal("Couldn't obtain random bytes (error %ld)", |
70 | ERR_get_error()); | |
416ed5a7 | 71 | RC4_set_key(&rc4, sizeof(rand_buf), rand_buf); |
75d1f941 | 72 | |
73 | /* | |
74 | * Discard early keystream, as per recommendations in: | |
75 | * http://www.wisdom.weizmann.ac.il/~itsik/RC4/Papers/Rc4_ksa.ps | |
76 | */ | |
77 | for(i = 0; i <= 256; i += sizeof(rand_buf)) | |
78 | RC4(&rc4, sizeof(rand_buf), rand_buf, rand_buf); | |
79 | ||
416ed5a7 | 80 | memset(rand_buf, 0, sizeof(rand_buf)); |
e339aa53 | 81 | |
10fa00c8 | 82 | rc4_ready = REKEY_BYTES; |
416ed5a7 | 83 | } |
84 | #endif /* !HAVE_ARC4RANDOM */ |