2014-06-20 20:00:00 +01:00
|
|
|
/* Copyright (c) 2014, Google Inc.
|
|
|
|
*
|
|
|
|
* Permission to use, copy, modify, and/or distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
|
|
* copyright notice and this permission notice appear in all copies.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
|
|
|
|
* SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
|
|
|
|
* OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
|
|
|
|
* CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
|
|
|
|
|
2017-02-03 22:07:38 +00:00
|
|
|
#if !defined(_GNU_SOURCE)
|
2016-07-09 13:02:18 +01:00
|
|
|
#define _GNU_SOURCE /* needed for syscall() on Linux. */
|
2017-02-03 22:07:38 +00:00
|
|
|
#endif
|
2016-07-09 13:02:18 +01:00
|
|
|
|
2014-06-20 20:00:00 +01:00
|
|
|
#include <openssl/rand.h>
|
|
|
|
|
2017-01-14 00:46:16 +00:00
|
|
|
#if !defined(OPENSSL_WINDOWS) && !defined(OPENSSL_FUCHSIA) && \
|
|
|
|
!defined(BORINGSSL_UNSAFE_DETERMINISTIC_MODE)
|
2014-06-20 20:00:00 +01:00
|
|
|
|
|
|
|
#include <assert.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
2016-12-15 23:38:40 +00:00
|
|
|
#include <stdio.h>
|
2014-06-20 20:00:00 +01:00
|
|
|
#include <string.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
2016-07-09 13:02:18 +01:00
|
|
|
#if defined(OPENSSL_LINUX)
|
2017-04-11 23:48:13 +01:00
|
|
|
#include <linux/random.h>
|
|
|
|
#include <sys/ioctl.h>
|
2016-07-09 13:02:18 +01:00
|
|
|
#include <sys/syscall.h>
|
|
|
|
#endif
|
|
|
|
|
2014-06-20 20:00:00 +01:00
|
|
|
#include <openssl/thread.h>
|
|
|
|
#include <openssl/mem.h>
|
|
|
|
|
2015-04-13 19:04:21 +01:00
|
|
|
#include "internal.h"
|
|
|
|
#include "../internal.h"
|
|
|
|
|
2014-06-20 20:00:00 +01:00
|
|
|
|
2016-07-09 13:02:18 +01:00
|
|
|
#if defined(OPENSSL_LINUX)
|
|
|
|
|
|
|
|
#if defined(OPENSSL_X86_64)
|
|
|
|
#define EXPECTED_SYS_getrandom 318
|
|
|
|
#elif defined(OPENSSL_X86)
|
|
|
|
#define EXPECTED_SYS_getrandom 355
|
|
|
|
#elif defined(OPENSSL_AARCH64)
|
|
|
|
#define EXPECTED_SYS_getrandom 278
|
|
|
|
#elif defined(OPENSSL_ARM)
|
|
|
|
#define EXPECTED_SYS_getrandom 384
|
|
|
|
#elif defined(OPENSSL_PPC64LE)
|
|
|
|
#define EXPECTED_SYS_getrandom 359
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(EXPECTED_SYS_getrandom)
|
|
|
|
#define USE_SYS_getrandom
|
|
|
|
|
|
|
|
#if defined(SYS_getrandom)
|
|
|
|
|
|
|
|
#if SYS_getrandom != EXPECTED_SYS_getrandom
|
|
|
|
#error "system call number for getrandom is not the expected value"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#else /* SYS_getrandom */
|
|
|
|
|
|
|
|
#define SYS_getrandom EXPECTED_SYS_getrandom
|
|
|
|
|
|
|
|
#endif /* SYS_getrandom */
|
|
|
|
|
|
|
|
#endif /* EXPECTED_SYS_getrandom */
|
|
|
|
|
|
|
|
#if !defined(GRND_NONBLOCK)
|
|
|
|
#define GRND_NONBLOCK 1
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#endif /* OPENSSL_LINUX */
|
|
|
|
|
2015-09-03 22:18:08 +01:00
|
|
|
/* requested_lock is used to protect the |*_requested| variables. */
|
|
|
|
static struct CRYPTO_STATIC_MUTEX requested_lock = CRYPTO_STATIC_MUTEX_INIT;
|
2015-04-13 19:04:21 +01:00
|
|
|
|
2016-12-15 23:38:40 +00:00
|
|
|
/* The following constants are magic values of |urandom_fd|. */
|
|
|
|
static const int kUnset = -2;
|
|
|
|
static const int kHaveGetrandom = -3;
|
|
|
|
|
|
|
|
/* urandom_fd_requested is set by |RAND_set_urandom_fd|. It's protected by
|
2015-09-03 22:18:08 +01:00
|
|
|
* |requested_lock|. */
|
2016-12-15 23:38:40 +00:00
|
|
|
static int urandom_fd_requested = -2 /* kUnset */;
|
2014-06-20 20:00:00 +01:00
|
|
|
|
2015-09-03 22:18:08 +01:00
|
|
|
/* urandom_fd is a file descriptor to /dev/urandom. It's protected by |once|. */
|
2016-12-15 23:38:40 +00:00
|
|
|
static int urandom_fd = -2 /* kUnset */;
|
2014-06-20 20:00:00 +01:00
|
|
|
|
2015-09-03 22:18:08 +01:00
|
|
|
static CRYPTO_once_t once = CRYPTO_ONCE_INIT;
|
2014-06-20 20:00:00 +01:00
|
|
|
|
2015-09-03 22:18:08 +01:00
|
|
|
/* init_once initializes the state of this module to values previously
|
|
|
|
* requested. This is the only function that modifies |urandom_fd| and
|
|
|
|
* |urandom_buffering|, whose values may be read safely after calling the
|
|
|
|
* once. */
|
|
|
|
static void init_once(void) {
|
|
|
|
CRYPTO_STATIC_MUTEX_lock_read(&requested_lock);
|
|
|
|
int fd = urandom_fd_requested;
|
2016-05-24 16:28:36 +01:00
|
|
|
CRYPTO_STATIC_MUTEX_unlock_read(&requested_lock);
|
2014-06-20 20:00:00 +01:00
|
|
|
|
2016-07-09 13:02:18 +01:00
|
|
|
#if defined(USE_SYS_getrandom)
|
|
|
|
uint8_t dummy;
|
2016-12-15 23:38:40 +00:00
|
|
|
long getrandom_ret =
|
|
|
|
syscall(SYS_getrandom, &dummy, sizeof(dummy), GRND_NONBLOCK);
|
|
|
|
|
|
|
|
if (getrandom_ret == 1) {
|
|
|
|
urandom_fd = kHaveGetrandom;
|
|
|
|
return;
|
|
|
|
} else if (getrandom_ret == -1 && errno == EAGAIN) {
|
|
|
|
fprintf(stderr,
|
|
|
|
"getrandom indicates that the entropy pool has not been "
|
|
|
|
"initialized. Rather than continue with poor entropy, this process "
|
|
|
|
"will block until entropy is available.\n");
|
|
|
|
do {
|
|
|
|
getrandom_ret =
|
|
|
|
syscall(SYS_getrandom, &dummy, sizeof(dummy), 0 /* no flags */);
|
|
|
|
} while (getrandom_ret == -1 && errno == EINTR);
|
|
|
|
|
|
|
|
if (getrandom_ret == 1) {
|
|
|
|
urandom_fd = kHaveGetrandom;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* USE_SYS_getrandom */
|
2016-11-22 23:57:27 +00:00
|
|
|
|
2016-12-15 23:38:40 +00:00
|
|
|
if (fd == kUnset) {
|
2015-09-03 22:18:08 +01:00
|
|
|
do {
|
|
|
|
fd = open("/dev/urandom", O_RDONLY);
|
|
|
|
} while (fd == -1 && errno == EINTR);
|
|
|
|
}
|
2014-06-20 20:00:00 +01:00
|
|
|
|
2015-09-03 22:18:08 +01:00
|
|
|
if (fd < 0) {
|
|
|
|
abort();
|
2014-06-20 20:00:00 +01:00
|
|
|
}
|
2015-09-03 22:18:08 +01:00
|
|
|
|
2017-04-11 23:48:13 +01:00
|
|
|
#if defined(BORINGSSL_FIPS)
|
|
|
|
/* In FIPS mode we ensure that the kernel has sufficient entropy before
|
|
|
|
* continuing. This is automatically handled by getrandom, which requires
|
|
|
|
* that the entropy pool has been initialised, but for urandom we have to
|
|
|
|
* poll. */
|
|
|
|
int first_iteration = 1;
|
|
|
|
for (;;) {
|
|
|
|
int entropy_bits;
|
|
|
|
if (ioctl(fd, RNDGETENTCNT, &entropy_bits)) {
|
|
|
|
fprintf(stderr,
|
|
|
|
"RNDGETENTCNT on /dev/urandom failed. We cannot continue in this "
|
|
|
|
"case when in FIPS mode.\n");
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
|
|
|
static const int kBitsNeeded = 256;
|
|
|
|
if (entropy_bits >= kBitsNeeded) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (first_iteration) {
|
|
|
|
fprintf(stderr,
|
|
|
|
"The kernel entropy pool contains too few bits: have %d, want "
|
|
|
|
"%d. This process is built in FIPS mode and will block until "
|
|
|
|
"sufficient entropy is available.\n", entropy_bits, kBitsNeeded);
|
|
|
|
}
|
|
|
|
first_iteration = 0;
|
|
|
|
|
|
|
|
usleep(250000);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2015-09-03 22:18:08 +01:00
|
|
|
int flags = fcntl(fd, F_GETFD);
|
|
|
|
if (flags == -1) {
|
2015-12-14 23:54:19 +00:00
|
|
|
/* Native Client doesn't implement |fcntl|. */
|
|
|
|
if (errno != ENOSYS) {
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
flags |= FD_CLOEXEC;
|
|
|
|
if (fcntl(fd, F_SETFD, flags) == -1) {
|
|
|
|
abort();
|
|
|
|
}
|
2014-06-20 20:00:00 +01:00
|
|
|
}
|
2015-09-03 22:18:08 +01:00
|
|
|
urandom_fd = fd;
|
2014-06-20 20:00:00 +01:00
|
|
|
}
|
|
|
|
|
2015-06-30 18:52:59 +01:00
|
|
|
void RAND_set_urandom_fd(int fd) {
|
2015-09-03 22:18:08 +01:00
|
|
|
fd = dup(fd);
|
|
|
|
if (fd < 0) {
|
2015-06-30 18:52:59 +01:00
|
|
|
abort();
|
|
|
|
}
|
2015-09-03 22:18:08 +01:00
|
|
|
|
|
|
|
CRYPTO_STATIC_MUTEX_lock_write(&requested_lock);
|
|
|
|
urandom_fd_requested = fd;
|
2016-05-24 16:28:36 +01:00
|
|
|
CRYPTO_STATIC_MUTEX_unlock_write(&requested_lock);
|
2015-09-03 22:18:08 +01:00
|
|
|
|
|
|
|
CRYPTO_once(&once, init_once);
|
2016-12-15 23:38:40 +00:00
|
|
|
if (urandom_fd == kHaveGetrandom) {
|
|
|
|
close(fd);
|
|
|
|
} else if (urandom_fd != fd) {
|
2015-09-03 22:18:08 +01:00
|
|
|
abort(); // Already initialized.
|
2015-06-30 18:52:59 +01:00
|
|
|
}
|
2015-09-03 22:18:08 +01:00
|
|
|
}
|
|
|
|
|
2016-12-15 23:45:11 +00:00
|
|
|
#if defined(USE_SYS_getrandom) && defined(__has_feature)
|
|
|
|
#if __has_feature(memory_sanitizer)
|
|
|
|
void __msan_unpoison(void *, size_t);
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
2016-07-09 13:02:18 +01:00
|
|
|
/* fill_with_entropy writes |len| bytes of entropy into |out|. It returns one
|
|
|
|
* on success and zero on error. */
|
|
|
|
static char fill_with_entropy(uint8_t *out, size_t len) {
|
2014-06-20 20:00:00 +01:00
|
|
|
while (len > 0) {
|
2016-12-15 23:45:11 +00:00
|
|
|
ssize_t r;
|
|
|
|
|
2016-12-15 23:38:40 +00:00
|
|
|
if (urandom_fd == kHaveGetrandom) {
|
|
|
|
#if defined(USE_SYS_getrandom)
|
|
|
|
do {
|
|
|
|
r = syscall(SYS_getrandom, out, len, 0 /* no flags */);
|
|
|
|
} while (r == -1 && errno == EINTR);
|
2016-12-15 23:45:11 +00:00
|
|
|
|
|
|
|
#if defined(__has_feature)
|
|
|
|
#if __has_feature(memory_sanitizer)
|
|
|
|
if (r > 0) {
|
|
|
|
/* MSAN doesn't recognise |syscall| and thus doesn't notice that we
|
|
|
|
* have initialised the output buffer. */
|
|
|
|
__msan_unpoison(out, r);
|
|
|
|
}
|
|
|
|
#endif /* memory_sanitizer */
|
|
|
|
#endif /*__has_feature */
|
|
|
|
|
|
|
|
#else /* USE_SYS_getrandom */
|
2016-12-15 23:38:40 +00:00
|
|
|
abort();
|
|
|
|
#endif
|
|
|
|
} else {
|
|
|
|
do {
|
|
|
|
r = read(urandom_fd, out, len);
|
|
|
|
} while (r == -1 && errno == EINTR);
|
|
|
|
}
|
2014-06-20 20:00:00 +01:00
|
|
|
|
|
|
|
if (r <= 0) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
out += r;
|
|
|
|
len -= r;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2015-09-03 22:18:08 +01:00
|
|
|
/* CRYPTO_sysrand puts |requested| random bytes into |out|. */
|
|
|
|
void CRYPTO_sysrand(uint8_t *out, size_t requested) {
|
|
|
|
if (requested == 0) {
|
|
|
|
return;
|
|
|
|
}
|
2014-06-20 20:00:00 +01:00
|
|
|
|
2015-09-03 22:18:08 +01:00
|
|
|
CRYPTO_once(&once, init_once);
|
2014-06-20 20:00:00 +01:00
|
|
|
|
2016-07-09 13:02:18 +01:00
|
|
|
if (!fill_with_entropy(out, requested)) {
|
2015-09-03 22:18:08 +01:00
|
|
|
abort();
|
|
|
|
}
|
2014-06-20 20:00:00 +01:00
|
|
|
}
|
|
|
|
|
2017-01-14 00:46:16 +00:00
|
|
|
#endif /* !OPENSSL_WINDOWS && !defined(OPENSSL_FUCHSIA) && \
|
|
|
|
!BORINGSSL_UNSAFE_DETERMINISTIC_MODE */
|