Welcome to mirror list, hosted at ThFree Co, Russian Federation.

cygwin.com/git/newlib-cygwin.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'winsup/cygwin/fhandler/random.cc')
-rw-r--r--winsup/cygwin/fhandler/random.cc138
1 files changed, 138 insertions, 0 deletions
diff --git a/winsup/cygwin/fhandler/random.cc b/winsup/cygwin/fhandler/random.cc
new file mode 100644
index 000000000..495e3a94b
--- /dev/null
+++ b/winsup/cygwin/fhandler/random.cc
@@ -0,0 +1,138 @@
+/* fhandler_random.cc: code to access /dev/random and /dev/urandom
+
+This file is part of Cygwin.
+
+This software is a copyrighted work licensed under the terms of the
+Cygwin license. Please consult the file "CYGWIN_LICENSE" for
+details. */
+
+#include "winsup.h"
+#include <ntsecapi.h>
+#include <unistd.h>
+#include <sys/param.h>
+#include "cygerrno.h"
+#include "path.h"
+#include "fhandler.h"
+#include "sync.h"
+#include "dtable.h"
+#include "cygheap.h"
+#include "child_info.h"
+
+#define RANDOM 8
+#define URANDOM 9
+
+/* The system PRNG is reseeded after reading 128K bytes. */
+#define RESEED_INTERVAL (128 * 1024)
+
+#define PSEUDO_MULTIPLIER (6364136223846793005LL)
+#define PSEUDO_SHIFTVAL (21)
+
+int
+fhandler_dev_random::pseudo_write (const void *ptr, size_t len)
+{
+ /* Use buffer to mess up the pseudo random number generator. */
+ for (size_t i = 0; i < len; ++i)
+ pseudo = (pseudo + ((unsigned char *)ptr)[i]) * PSEUDO_MULTIPLIER + 1;
+ return len;
+}
+
+ssize_t
+fhandler_dev_random::write (const void *ptr, size_t len)
+{
+ if (!len)
+ return 0;
+ if (!ptr)
+ {
+ set_errno (EINVAL);
+ return -1;
+ }
+
+ /* Limit len to a value <= 4096 since we don't want to overact.
+ Copy to local buffer because RtlGenRandom violates const. */
+ size_t limited_len = MIN (len, 4096);
+ unsigned char buf[limited_len];
+
+ /* Mess up system entropy source. Return error if device is /dev/random. */
+ __try
+ {
+ memcpy (buf, ptr, limited_len);
+ if (!RtlGenRandom (buf, limited_len) && dev () == FH_RANDOM)
+ return -1;
+ /* Mess up the pseudo random number generator. */
+ pseudo_write (buf, limited_len);
+ }
+ __except (EFAULT)
+ {
+ len = -1;
+ }
+ __endtry
+ /* Note that we return len, not limited_len. No reason to confuse the
+ caller... */
+ return len;
+}
+
+int
+fhandler_dev_random::pseudo_read (void *ptr, size_t len)
+{
+ /* Use pseudo random number generator as fallback entropy source.
+ This multiplier was obtained from Knuth, D.E., "The Art of
+ Computer Programming," Vol 2, Seminumerical Algorithms, Third
+ Edition, Addison-Wesley, 1998, p. 106 (line 26) & p. 108 */
+ for (size_t i = 0; i < len; ++i)
+ {
+ pseudo = pseudo * PSEUDO_MULTIPLIER + 1;
+ ((unsigned char *)ptr)[i] = (pseudo >> PSEUDO_SHIFTVAL) & UCHAR_MAX;
+ }
+ return len;
+}
+
+void
+fhandler_dev_random::read (void *ptr, size_t& len)
+{
+ if (!len)
+ return;
+
+ if (!ptr)
+ {
+ set_errno (EINVAL);
+ len = (size_t) -1;
+ return;
+ }
+
+ __try
+ {
+ /* /dev/random has to provide high quality random numbers. Therefore we
+ re-seed the system PRNG for each block of 512 bytes. This results in
+ sufficiently random sequences, comparable to the Linux /dev/random. */
+ if (dev () == FH_RANDOM)
+ {
+ void *dummy = malloc (RESEED_INTERVAL);
+ if (!dummy)
+ {
+ __seterrno ();
+ len = (size_t) -1;
+ return;
+ }
+ for (size_t offset = 0; offset < len; offset += 512)
+ {
+ if (!RtlGenRandom (dummy, RESEED_INTERVAL) ||
+ !RtlGenRandom ((PBYTE) ptr + offset, len - offset))
+ {
+ len = (size_t) -1;
+ break;
+ }
+ }
+ free (dummy);
+ }
+
+ /* If device is /dev/urandom, just use system RNG as is, with our own
+ PRNG as fallback. */
+ else if (!RtlGenRandom (ptr, len))
+ len = pseudo_read (ptr, len);
+ }
+ __except (EFAULT)
+ {
+ len = (size_t) -1;
+ }
+ __endtry
+}