]> andersk Git - openssh.git/blame - openbsd-compat/bsd-arc4random.c
- (dtucker) [configure.ac openbsd-compat/openbsd-compat.h] Check for
[openssh.git] / openbsd-compat / bsd-arc4random.c
CommitLineData
416ed5a7 1/*
9cd11896 2 * Copyright (c) 1999,2000,2004 Damien Miller <djm@mindrot.org>
416ed5a7 3 *
9cd11896 4 * Permission to use, copy, modify, and distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
416ed5a7 7 *
9cd11896 8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
416ed5a7 15 */
16
17#include "includes.h"
28cb0a43 18
19#include <sys/types.h>
f2265d5d 20
28cb0a43 21#include <string.h>
f2265d5d 22#include <stdarg.h>
28cb0a43 23
a701a70b 24#include "log.h"
416ed5a7 25
26#ifndef HAVE_ARC4RANDOM
27
2f125ca1 28#include <openssl/rand.h>
29#include <openssl/rc4.h>
a701a70b 30#include <openssl/err.h>
2f125ca1 31
10fa00c8 32/* Size of key to use */
33#define SEED_SIZE 20
34
35/* Number of bytes to reseed after */
ddc49b5c 36#define REKEY_BYTES (1 << 24)
10fa00c8 37
416ed5a7 38static int rc4_ready = 0;
39static RC4_KEY rc4;
40
15606882 41unsigned int
42arc4random(void)
416ed5a7 43{
44 unsigned int r = 0;
e339aa53 45 static int first_time = 1;
416ed5a7 46
e339aa53 47 if (rc4_ready <= 0) {
af5ee4e4 48 if (first_time)
e339aa53 49 seed_rng();
50 first_time = 0;
416ed5a7 51 arc4random_stir();
e339aa53 52 }
53
416ed5a7 54 RC4(&rc4, sizeof(r), (unsigned char *)&r, (unsigned char *)&r);
10fa00c8 55
56 rc4_ready -= sizeof(r);
416ed5a7 57
58 return(r);
59}
60
15606882 61void
62arc4random_stir(void)
416ed5a7 63{
10fa00c8 64 unsigned char rand_buf[SEED_SIZE];
75d1f941 65 int i;
10fa00c8 66
e339aa53 67 memset(&rc4, 0, sizeof(rc4));
d8eb5247 68 if (RAND_bytes(rand_buf, sizeof(rand_buf)) <= 0)
e339aa53 69 fatal("Couldn't obtain random bytes (error %ld)",
70 ERR_get_error());
416ed5a7 71 RC4_set_key(&rc4, sizeof(rand_buf), rand_buf);
75d1f941 72
73 /*
74 * Discard early keystream, as per recommendations in:
75 * http://www.wisdom.weizmann.ac.il/~itsik/RC4/Papers/Rc4_ksa.ps
76 */
77 for(i = 0; i <= 256; i += sizeof(rand_buf))
78 RC4(&rc4, sizeof(rand_buf), rand_buf, rand_buf);
79
416ed5a7 80 memset(rand_buf, 0, sizeof(rand_buf));
e339aa53 81
10fa00c8 82 rc4_ready = REKEY_BYTES;
416ed5a7 83}
84#endif /* !HAVE_ARC4RANDOM */
This page took 0.267301 seconds and 5 git commands to generate.