rand_lib.c 10.4 KB
Newer Older
R
Rich Salz 已提交
1
/*
R
Rich Salz 已提交
2
 * Copyright 1995-2017 The OpenSSL Project Authors. All Rights Reserved.
3
 *
R
Rich Salz 已提交
4 5 6 7
 * Licensed under the OpenSSL license (the "License").  You may not use
 * this file except in compliance with the License.  You can obtain a copy
 * in the file LICENSE in the source distribution or at
 * https://www.openssl.org/source/license.html
8 9 10 11
 */

#include <stdio.h>
#include <time.h>
12
#include "internal/cryptlib.h"
13
#include <openssl/opensslconf.h>
R
Rich Salz 已提交
14
#include "internal/rand_int.h"
R
Rich Salz 已提交
15
#include <openssl/engine.h>
16
#include "internal/thread_once.h"
R
Rich Salz 已提交
17
#include "rand_lcl.h"
18

19
#ifndef OPENSSL_NO_ENGINE
20
/* non-NULL if default_RAND_meth is ENGINE-provided */
R
Rich Salz 已提交
21 22
static ENGINE *funct_ref;
static CRYPTO_RWLOCK *rand_engine_lock;
23
#endif
R
Rich Salz 已提交
24 25 26
static CRYPTO_RWLOCK *rand_meth_lock;
static const RAND_METHOD *default_RAND_meth;
static CRYPTO_ONCE rand_init = CRYPTO_ONCE_STATIC_INIT;
R
Rich Salz 已提交
27
RAND_BYTES_BUFFER rand_bytes;
R
Rich Salz 已提交
28
int rand_fork_count;
29

R
Rich Salz 已提交
30 31 32
#ifdef OPENSSL_RAND_SEED_RDTSC
/*
 * IMPORTANT NOTE:  It is not currently possible to use this code
R
Rich Salz 已提交
33 34
 * because we are not sure about the amount of randomness it provides.
 * Some SP900 tests have been run, but there is internal skepticism.
R
Rich Salz 已提交
35 36 37 38 39 40 41 42 43 44
 * So for now this code is not used.
 */
# error "RDTSC enabled?  Should not be possible!"

/*
 * Since we get some randomness from the low-order bits of the
 * high-speec clock, it can help.  But don't return a status since
 * it's not sufficient to indicate whether or not the seeding was
 * done.
 */
45
void rand_read_tsc(RAND_poll_cb rand_add, void *arg)
R
Rich Salz 已提交
46 47 48 49
{
    unsigned char c;
    int i;

R
Rich Salz 已提交
50 51 52
    if ((OPENSSL_ia32cap_P[0] & (1 << 4)) != 0) {
        for (i = 0; i < TSC_READ_COUNT; i++) {
            c = (unsigned char)(OPENSSL_rdtsc() & 0xFF);
53
            rand_add(arg, &c, 1, 0.5);
R
Rich Salz 已提交
54
        }
R
Rich Salz 已提交
55 56 57 58 59
    }
}
#endif

#ifdef OPENSSL_RAND_SEED_RDCPU
R
Rich Salz 已提交
60 61
size_t OPENSSL_ia32_rdseed_bytes(char *buf, size_t len);
size_t OPENSSL_ia32_rdrand_bytes(char *buf, size_t len);
R
Rich Salz 已提交
62 63 64

extern unsigned int OPENSSL_ia32cap_P[];

65
int rand_read_cpu(RAND_poll_cb rand_add, void *arg)
R
Rich Salz 已提交
66
{
R
Rich Salz 已提交
67
    char buff[RANDOMNESS_NEEDED];
R
Rich Salz 已提交
68 69

    /* If RDSEED is available, use that. */
R
Rich Salz 已提交
70 71
    if ((OPENSSL_ia32cap_P[2] & (1 << 18)) != 0) {
        if (OPENSSL_ia32_rdseed_bytes(buff, sizeof(buff)) == sizeof(buff)) {
72
            rand_add(arg, buff, (int)sizeof(buff), sizeof(buff));
R
Rich Salz 已提交
73
            return 1;
R
Rich Salz 已提交
74
        }
R
Rich Salz 已提交
75 76 77 78
    }

    /* Second choice is RDRAND. */
    if ((OPENSSL_ia32cap_P[1] & (1 << (62 - 32))) != 0) {
R
Rich Salz 已提交
79
        if (OPENSSL_ia32_rdrand_bytes(buff, sizeof(buff)) == sizeof(buff)) {
80
            rand_add(arg, buff, (int)sizeof(buff), sizeof(buff));
R
Rich Salz 已提交
81
            return 1;
R
Rich Salz 已提交
82
        }
R
Rich Salz 已提交
83 84 85 86 87
    }

    return 0;
}
#endif
R
Rich Salz 已提交
88

R
Rich Salz 已提交
89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107

/*
 * DRBG has two sets of callbacks; we only discuss the "entropy" one
 * here.  When the DRBG needs additional randomness bits (called entropy
 * in the NIST document), it calls the get_entropy callback which fills in
 * a pointer and returns the number of bytes. When the DRBG is finished with
 * the buffer, it calls the cleanup_entropy callback, with the value of
 * the buffer that the get_entropy callback filled in.
 *
 * Get entropy from the system, via RAND_poll if needed.  The |entropy|
 * is the bits of randomness required, and is expected to fit into a buffer
 * of |min_len|..|max__len| size.  We assume we're getting high-quality
 * randomness from the system, and that |min_len| bytes will do.
 */
size_t drbg_entropy_from_system(RAND_DRBG *drbg,
                                unsigned char **pout,
                                int entropy, size_t min_len, size_t max_len)
{
    int i;
108
    unsigned char *randomness;
R
Rich Salz 已提交
109 110 111 112 113 114

    if (min_len > (size_t)drbg->size) {
        /* Should not happen.  See comment near RANDOMNESS_NEEDED. */
        min_len = drbg->size;
    }

115
    randomness = drbg->secure ? OPENSSL_secure_malloc(drbg->size)
R
Rich Salz 已提交
116 117
                                    : OPENSSL_malloc(drbg->size);

R
Rich Salz 已提交
118 119 120 121 122 123 124 125 126 127 128 129
    /* If we don't have enough, try to get more. */
    CRYPTO_THREAD_write_lock(rand_bytes.lock);
    for (i = RAND_POLL_RETRIES; rand_bytes.curr < min_len && --i >= 0; ) {
        CRYPTO_THREAD_unlock(rand_bytes.lock);
        RAND_poll();
        CRYPTO_THREAD_write_lock(rand_bytes.lock);
    }

    /* Get desired amount, but no more than we have. */
    if (min_len > rand_bytes.curr)
        min_len = rand_bytes.curr;
    if (min_len != 0) {
130
        memcpy(randomness, rand_bytes.buff, min_len);
R
Rich Salz 已提交
131 132 133 134 135 136
        /* Update amount left and shift it down. */
        rand_bytes.curr -= min_len;
        if (rand_bytes.curr != 0)
            memmove(rand_bytes.buff, &rand_bytes.buff[min_len], rand_bytes.curr);
    }
    CRYPTO_THREAD_unlock(rand_bytes.lock);
137
    *pout = randomness;
R
Rich Salz 已提交
138 139 140 141 142 143 144 145
    return min_len;
}

size_t drbg_entropy_from_parent(RAND_DRBG *drbg,
                                unsigned char **pout,
                                int entropy, size_t min_len, size_t max_len)
{
    int st;
146
    unsigned char *randomness;
147

R
Rich Salz 已提交
148 149 150 151 152
    if (min_len > (size_t)drbg->size) {
        /* Should not happen.  See comment near RANDOMNESS_NEEDED. */
        min_len = drbg->size;
    }

153
    randomness = drbg->secure ? OPENSSL_secure_malloc(drbg->size)
R
Rich Salz 已提交
154 155
                                    : OPENSSL_malloc(drbg->size);

R
Rich Salz 已提交
156
    /* Get random from parent, include our state as additional input. */
157
    st = RAND_DRBG_generate(drbg->parent, randomness, min_len, 0,
R
Rich Salz 已提交
158
                            (unsigned char *)drbg, sizeof(*drbg));
159 160
    if (st == 0) {
        drbg_release_entropy(drbg, randomness, min_len);
R
Rich Salz 已提交
161
        return 0;
162 163
    }
    *pout = randomness;
R
Rich Salz 已提交
164 165 166
    return min_len;
}

167
void drbg_release_entropy(RAND_DRBG *drbg, unsigned char *out, size_t outlen)
R
Rich Salz 已提交
168
{
R
Rich Salz 已提交
169
    if (drbg->secure)
170
        OPENSSL_secure_clear_free(out, outlen);
R
Rich Salz 已提交
171
    else
172
        OPENSSL_clear_free(out, outlen);
173 174
}

R
Rich Salz 已提交
175 176 177 178 179
void rand_fork()
{
    rand_fork_count++;
}

R
Rich Salz 已提交
180
DEFINE_RUN_ONCE_STATIC(do_rand_init)
181
{
182
    int ret = 1;
R
Rich Salz 已提交
183

184
#ifndef OPENSSL_NO_ENGINE
R
Rich Salz 已提交
185
    rand_engine_lock = CRYPTO_THREAD_glock_new("rand_engine");
186
    ret &= rand_engine_lock != NULL;
187
#endif
R
Rich Salz 已提交
188
    rand_meth_lock = CRYPTO_THREAD_glock_new("rand_meth");
189
    ret &= rand_meth_lock != NULL;
R
Rich Salz 已提交
190

R
Rich Salz 已提交
191
    rand_bytes.lock = CRYPTO_THREAD_glock_new("rand_bytes");
R
Rich Salz 已提交
192 193 194
    ret &= rand_bytes.lock != NULL;
    rand_bytes.curr = 0;
    rand_bytes.size = MAX_RANDOMNESS_HELD;
R
Rich Salz 已提交
195 196 197 198
    rand_bytes.secure = CRYPTO_secure_malloc_initialized();
    rand_bytes.buff = rand_bytes.secure
        ? OPENSSL_secure_malloc(rand_bytes.size)
        : OPENSSL_malloc(rand_bytes.size);
199
    ret &= rand_bytes.buff != NULL;
200
    return ret;
201
}
202

R
Rich Salz 已提交
203 204 205 206 207 208 209 210 211 212 213
void rand_cleanup_int(void)
{
    const RAND_METHOD *meth = default_RAND_meth;

    if (meth != NULL && meth->cleanup != NULL)
        meth->cleanup();
    RAND_set_rand_method(NULL);
#ifndef OPENSSL_NO_ENGINE
    CRYPTO_THREAD_lock_free(rand_engine_lock);
#endif
    CRYPTO_THREAD_lock_free(rand_meth_lock);
R
Rich Salz 已提交
214
    CRYPTO_THREAD_lock_free(rand_bytes.lock);
R
Rich Salz 已提交
215 216 217 218
    if (rand_bytes.secure)
        OPENSSL_secure_clear_free(rand_bytes.buff, rand_bytes.size);
    else
        OPENSSL_clear_free(rand_bytes.buff, rand_bytes.size);
R
Rich Salz 已提交
219 220 221 222 223 224 225 226 227 228 229 230 231 232
}

/*
 * RAND_poll_ex() gets a function pointer to call when it has random bytes.
 * RAND_poll() sets the function pointer to be a wrapper that calls RAND_add().
 */
static void call_rand_add(void* arg, const void *buf, int num, double r)
{
    RAND_add(buf, num, r);
}

int RAND_poll(void)
{
    return RAND_poll_ex(call_rand_add, NULL);
R
Rich Salz 已提交
233 234
}

235
int RAND_set_rand_method(const RAND_METHOD *meth)
236
{
R
Rich Salz 已提交
237
    if (!RUN_ONCE(&rand_init, do_rand_init))
238 239 240
        return 0;

    CRYPTO_THREAD_write_lock(rand_meth_lock);
241
#ifndef OPENSSL_NO_ENGINE
R
Rich Salz 已提交
242 243
    ENGINE_finish(funct_ref);
    funct_ref = NULL;
244
#endif
245
    default_RAND_meth = meth;
246
    CRYPTO_THREAD_unlock(rand_meth_lock);
247 248
    return 1;
}
249

250
const RAND_METHOD *RAND_get_rand_method(void)
251
{
252 253
    const RAND_METHOD *tmp_meth = NULL;

R
Rich Salz 已提交
254
    if (!RUN_ONCE(&rand_init, do_rand_init))
255 256 257
        return NULL;

    CRYPTO_THREAD_write_lock(rand_meth_lock);
R
Rich Salz 已提交
258
    if (default_RAND_meth == NULL) {
259
#ifndef OPENSSL_NO_ENGINE
R
Rich Salz 已提交
260 261 262 263 264
        ENGINE *e;

        /* If we have an engine that can do RAND, use it. */
        if ((e = ENGINE_get_default_RAND()) != NULL
                && (tmp_meth = ENGINE_get_RAND(e)) != NULL) {
265
            funct_ref = e;
R
Rich Salz 已提交
266 267 268
            default_RAND_meth = tmp_meth;
        } else {
            ENGINE_finish(e);
R
Rich Salz 已提交
269
            default_RAND_meth = &rand_meth;
R
Rich Salz 已提交
270 271
        }
#else
R
Rich Salz 已提交
272
        default_RAND_meth = &rand_meth;
273
#endif
274
    }
275 276 277
    tmp_meth = default_RAND_meth;
    CRYPTO_THREAD_unlock(rand_meth_lock);
    return tmp_meth;
278
}
279

280
#ifndef OPENSSL_NO_ENGINE
281
int RAND_set_rand_engine(ENGINE *engine)
282 283
{
    const RAND_METHOD *tmp_meth = NULL;
284

R
Rich Salz 已提交
285
    if (!RUN_ONCE(&rand_init, do_rand_init))
286 287
        return 0;

R
Rich Salz 已提交
288
    if (engine != NULL) {
289 290 291
        if (!ENGINE_init(engine))
            return 0;
        tmp_meth = ENGINE_get_RAND(engine);
R
Rich Salz 已提交
292
        if (tmp_meth == NULL) {
293 294 295 296
            ENGINE_finish(engine);
            return 0;
        }
    }
297
    CRYPTO_THREAD_write_lock(rand_engine_lock);
298 299 300
    /* This function releases any prior ENGINE so call it first */
    RAND_set_rand_method(tmp_meth);
    funct_ref = engine;
301
    CRYPTO_THREAD_unlock(rand_engine_lock);
302 303
    return 1;
}
304
#endif
305

306
void RAND_seed(const void *buf, int num)
307 308
{
    const RAND_METHOD *meth = RAND_get_rand_method();
R
Rich Salz 已提交
309 310

    if (meth->seed != NULL)
311 312
        meth->seed(buf, num);
}
313

R
Rich Salz 已提交
314
void RAND_add(const void *buf, int num, double randomness)
315 316
{
    const RAND_METHOD *meth = RAND_get_rand_method();
R
Rich Salz 已提交
317 318 319

    if (meth->add != NULL)
        meth->add(buf, num, randomness);
320
}
321

322 323 324 325 326 327 328 329
/*
 * This function is not part of RAND_METHOD, so if we're not using
 * the default method, then just call RAND_bytes().  Otherwise make
 * sure we're instantiated and use the private DRBG.
 */
int RAND_priv_bytes(unsigned char *buf, int num)
{
    const RAND_METHOD *meth = RAND_get_rand_method();
330
    RAND_DRBG *drbg;
331 332 333 334

    if (meth != RAND_OpenSSL())
        return RAND_bytes(buf, num);

335 336
    drbg = RAND_DRBG_get0_priv_global();
    if (drbg == NULL)
337 338
        return 0;

339
    return RAND_DRBG_generate(drbg, buf, num, 0, NULL, 0);
340 341
}

342
int RAND_bytes(unsigned char *buf, int num)
343 344
{
    const RAND_METHOD *meth = RAND_get_rand_method();
R
Rich Salz 已提交
345 346

    if (meth->bytes != NULL)
347
        return meth->bytes(buf, num);
R
Rich Salz 已提交
348
    RANDerr(RAND_F_RAND_BYTES, RAND_R_FUNC_NOT_IMPLEMENTED);
R
Rich Salz 已提交
349
    return -1;
350
}
351

352
#if OPENSSL_API_COMPAT < 0x10100000L
353
int RAND_pseudo_bytes(unsigned char *buf, int num)
354 355
{
    const RAND_METHOD *meth = RAND_get_rand_method();
R
Rich Salz 已提交
356 357

    if (meth->pseudorand != NULL)
358
        return meth->pseudorand(buf, num);
R
Rich Salz 已提交
359
    return -1;
360
}
M
Matt Caswell 已提交
361
#endif
362 363

int RAND_status(void)
364 365
{
    const RAND_METHOD *meth = RAND_get_rand_method();
R
Rich Salz 已提交
366 367

    if (meth->status != NULL)
368 369 370
        return meth->status();
    return 0;
}