Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
4ec2d4d2
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
4ec2d4d2
编写于
2月 24, 2000
作者:
U
Ulf Möller
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Support EGD.
上级
5921ea3b
变更
9
显示空白变更内容
内联
并排
Showing
9 changed file
with
229 addition
and
54 deletion
+229
-54
CHANGES
CHANGES
+6
-0
apps/app_rand.c
apps/app_rand.c
+12
-3
crypto/rand/Makefile.ssl
crypto/rand/Makefile.ssl
+2
-2
crypto/rand/md_rand.c
crypto/rand/md_rand.c
+55
-46
crypto/rand/rand.h
crypto/rand/rand.h
+2
-0
crypto/rand/rand_egd.c
crypto/rand/rand_egd.c
+108
-0
doc/crypto/RAND_add.pod
doc/crypto/RAND_add.pod
+8
-2
doc/crypto/RAND_egd.pod
doc/crypto/RAND_egd.pod
+31
-0
doc/crypto/rand.pod
doc/crypto/rand.pod
+5
-1
未找到文件。
CHANGES
浏览文件 @
4ec2d4d2
...
...
@@ -4,6 +4,12 @@
Changes between 0.9.4 and 0.9.5 [xx XXX 2000]
*) Support EGD <http://www.lothar.com/tech/crypto/>. New functions
RAND_egd() and RAND_status(). In the command line application,
the EGD socket can be specified like a seed file using RANDFILE
or -rand.
[Ulf Möller]
*) Allow the string CERTIFICATE to be tolerated in PKCS#7 structures.
Some CAs (e.g. Verisign) distribute certificates in this form.
[Steve Henson]
...
...
apps/app_rand.c
浏览文件 @
4ec2d4d2
...
...
@@ -115,6 +115,7 @@
static
int
seeded
=
0
;
static
int
egdsocket
=
0
;
int
app_RAND_load_file
(
const
char
*
file
,
BIO
*
bio_e
,
int
dont_warn
)
{
...
...
@@ -130,12 +131,19 @@ int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn)
if
(
file
==
NULL
)
file
=
RAND_file_name
(
buffer
,
sizeof
buffer
);
else
if
(
RAND_egd
(
file
)
>
0
)
{
/* we try if the given filename is an EGD socket.
if it is, we don't write anything back to the file. */
egdsocket
=
1
;
return
1
;
}
if
(
file
==
NULL
||
!
RAND_load_file
(
file
,
-
1
))
{
if
(
!
dont_warn
)
if
(
RAND_status
()
==
0
&&
!
dont_warn
)
{
BIO_printf
(
bio_e
,
"unable to load 'random state'
\n
"
);
BIO_printf
(
bio_e
,
"
What this means i
s that the random number generator has not been seeded
\n
"
);
BIO_printf
(
bio_e
,
"
This mean
s that the random number generator has not been seeded
\n
"
);
BIO_printf
(
bio_e
,
"with much random data.
\n
"
);
if
(
consider_randfile
)
/* explanation does not apply when a file is explicitly named */
{
...
...
@@ -165,6 +173,7 @@ long app_RAND_load_files(char *name)
name
=
p
+
1
;
if
(
*
n
==
'\0'
)
break
;
tot
+=
RAND_egd
(
n
);
tot
+=
RAND_load_file
(
n
,
1024L
*
1024L
);
if
(
last
)
break
;
}
...
...
@@ -177,7 +186,7 @@ int app_RAND_write_file(const char *file, BIO *bio_e)
{
char
buffer
[
200
];
if
(
!
seeded
)
if
(
egdsocket
||
!
seeded
)
/* If we did not manage to read the seed file,
* we should not write a low-entropy seed file back --
* it would suppress a crucial warning the next time
...
...
crypto/rand/Makefile.ssl
浏览文件 @
4ec2d4d2
...
...
@@ -22,8 +22,8 @@ TEST= randtest.c
APPS
=
LIB
=
$(TOP)
/libcrypto.a
LIBSRC
=
md_rand.c randfile.c rand_lib.c rand_err.c
LIBOBJ
=
md_rand.o randfile.o rand_lib.o rand_err.o
LIBSRC
=
md_rand.c randfile.c rand_lib.c rand_err.c
rand_egd.c
LIBOBJ
=
md_rand.o randfile.o rand_lib.o rand_err.o
rand_egd.o
SRC
=
$(LIBSRC)
...
...
crypto/rand/md_rand.c
浏览文件 @
4ec2d4d2
...
...
@@ -139,6 +139,7 @@ static unsigned char state[STATE_SIZE+MD_DIGEST_LENGTH];
static
unsigned
char
md
[
MD_DIGEST_LENGTH
];
static
long
md_count
[
2
]
=
{
0
,
0
};
static
double
entropy
=
0
;
static
int
initialized
=
0
;
const
char
*
RAND_version
=
"RAND"
OPENSSL_VERSION_PTEXT
;
...
...
@@ -295,6 +296,51 @@ static void ssleay_rand_seed(const void *buf, int num)
ssleay_rand_add
(
buf
,
num
,
num
);
}
static
void
ssleay_rand_initialize
(
void
)
{
unsigned
long
l
;
#ifndef GETPID_IS_MEANINGLESS
pid_t
curr_pid
=
getpid
();
#endif
#ifdef DEVRANDOM
FILE
*
fh
;
#endif
CRYPTO_w_unlock
(
CRYPTO_LOCK_RAND
);
/* put in some default random data, we need more than just this */
#ifndef GETPID_IS_MEANINGLESS
l
=
curr_pid
;
RAND_add
(
&
l
,
sizeof
(
l
),
0
);
l
=
getuid
();
RAND_add
(
&
l
,
sizeof
(
l
),
0
);
#endif
l
=
time
(
NULL
);
RAND_add
(
&
l
,
sizeof
(
l
),
0
);
#ifdef DEVRANDOM
/* Use a random entropy pool device. Linux and FreeBSD have
* this. Use /dev/urandom if you can as /dev/random will block
* if it runs out of random entries. */
if
((
fh
=
fopen
(
DEVRANDOM
,
"r"
))
!=
NULL
)
{
unsigned
char
tmpbuf
[
ENTROPY_NEEDED
];
int
n
;
n
=
fread
((
unsigned
char
*
)
tmpbuf
,
1
,
ENTROPY_NEEDED
,
fh
);
fclose
(
fh
);
RAND_add
(
tmpbuf
,
sizeof
tmpbuf
,
n
);
memset
(
tmpbuf
,
0
,
n
);
}
#endif
#ifdef PURIFY
memset
(
state
,
0
,
STATE_SIZE
);
memset
(
md
,
0
,
MD_DIGEST_LENGTH
);
#endif
CRYPTO_w_lock
(
CRYPTO_LOCK_RAND
);
initialized
=
1
;
}
static
int
ssleay_rand_bytes
(
unsigned
char
*
buf
,
int
num
)
{
int
i
,
j
,
k
,
st_num
,
st_idx
;
...
...
@@ -302,14 +348,9 @@ static int ssleay_rand_bytes(unsigned char *buf, int num)
long
md_c
[
2
];
unsigned
char
local_md
[
MD_DIGEST_LENGTH
];
MD_CTX
m
;
static
int
init
=
1
;
unsigned
long
l
;
#ifndef GETPID_IS_MEANINGLESS
pid_t
curr_pid
=
getpid
();
#endif
#ifdef DEVRANDOM
FILE
*
fh
;
#endif
#ifdef PREDICT
{
...
...
@@ -342,47 +383,8 @@ static int ssleay_rand_bytes(unsigned char *buf, int num)
CRYPTO_w_lock
(
CRYPTO_LOCK_RAND
);
if
(
init
)
{
CRYPTO_w_unlock
(
CRYPTO_LOCK_RAND
);
/* put in some default random data, we need more than
* just this */
RAND_add
(
&
m
,
sizeof
(
m
),
0
);
#ifndef GETPID_IS_MEANINGLESS
l
=
curr_pid
;
RAND_add
(
&
l
,
sizeof
(
l
),
0
);
l
=
getuid
();
RAND_add
(
&
l
,
sizeof
(
l
),
0
);
#endif
l
=
time
(
NULL
);
RAND_add
(
&
l
,
sizeof
(
l
),
0
);
#ifdef DEVRANDOM
/*
* Use a random entropy pool device.
* Linux 1.3.x and FreeBSD-Current has
* this. Use /dev/urandom if you can
* as /dev/random will block if it runs out
* of random entries.
*/
if
((
fh
=
fopen
(
DEVRANDOM
,
"r"
))
!=
NULL
)
{
unsigned
char
tmpbuf
[
ENTROPY_NEEDED
];
int
n
;
n
=
fread
((
unsigned
char
*
)
tmpbuf
,
1
,
ENTROPY_NEEDED
,
fh
);
fclose
(
fh
);
RAND_add
(
tmpbuf
,
sizeof
tmpbuf
,
n
);
memset
(
tmpbuf
,
0
,
n
);
}
#endif
#ifdef PURIFY
memset
(
state
,
0
,
STATE_SIZE
);
memset
(
md
,
0
,
MD_DIGEST_LENGTH
);
#endif
CRYPTO_w_lock
(
CRYPTO_LOCK_RAND
);
init
=
0
;
}
if
(
!
initialized
)
ssleay_rand_initialize
();
ok
=
(
entropy
>=
ENTROPY_NEEDED
);
...
...
@@ -473,6 +475,13 @@ static int ssleay_rand_pseudo_bytes(unsigned char *buf, int num)
return
(
ret
);
}
int
RAND_status
(
void
)
{
if
(
!
initialized
)
ssleay_rand_initialize
();
return
(
entropy
>=
ENTROPY_NEEDED
);
}
#ifdef WINDOWS
#include <windows.h>
#include <openssl/rand.h>
...
...
crypto/rand/rand.h
浏览文件 @
4ec2d4d2
...
...
@@ -83,6 +83,8 @@ void RAND_add(const void *buf,int num,double entropy);
int
RAND_load_file
(
const
char
*
file
,
long
max_bytes
);
int
RAND_write_file
(
const
char
*
file
);
const
char
*
RAND_file_name
(
char
*
file
,
int
num
);
int
RAND_status
(
void
);
int
RAND_egd
(
const
char
*
path
);
#ifdef WINDOWS
void
RAND_screen
(
void
);
#endif
...
...
crypto/rand/rand_egd.c
0 → 100644
浏览文件 @
4ec2d4d2
/* crypto/rand/rand_egd.c */
/* Written by Ulf Moeller for the OpenSSL project. */
/* ====================================================================
* Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* 3. All advertising materials mentioning features or use of this
* software must display the following acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
*
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
* endorse or promote products derived from this software without
* prior written permission. For written permission, please contact
* openssl-core@openssl.org.
*
* 5. Products derived from this software may not be called "OpenSSL"
* nor may "OpenSSL" appear in their names without prior written
* permission of the OpenSSL Project.
*
* 6. Redistributions of any form whatsoever must retain the following
* acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
*
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
* OF THE POSSIBILITY OF SUCH DAMAGE.
* ====================================================================
*
* This product includes cryptographic software written by Eric Young
* (eay@cryptsoft.com). This product includes software written by Tim
* Hudson (tjh@cryptsoft.com).
*
*/
#include <openssl/rand.h>
/* Query the EGD <URL: http://www.lothar.com/tech/crypto/>.
*/
#if defined(WIN32) || defined(VMS)
int
RAND_egd
(
const
char
*
path
)
{
return
(
-
1
);
}
#else
#include <openssl/opensslconf.h>
#include OPENSSL_UNISTD
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/un.h>
#ifndef offsetof
# define offsetof(TYPE, MEMBER) ((size_t) &((TYPE *)0)->MEMBER)
#endif
int
RAND_egd
(
const
char
*
path
)
{
int
ret
=
-
1
;
struct
sockaddr_un
addr
;
int
len
,
num
;
int
fd
=
-
1
;
unsigned
char
buf
[
256
];
memset
(
&
addr
,
0
,
sizeof
(
addr
));
addr
.
sun_family
=
AF_UNIX
;
if
(
strlen
(
path
)
>
sizeof
(
addr
.
sun_path
))
return
(
-
1
);
strcpy
(
addr
.
sun_path
,
path
);
len
=
offsetof
(
struct
sockaddr_un
,
sun_path
)
+
strlen
(
path
);
fd
=
socket
(
AF_UNIX
,
SOCK_STREAM
,
0
);
if
(
fd
==
-
1
)
return
(
-
1
);
if
(
connect
(
fd
,
&
addr
,
len
)
==
-
1
)
goto
err
;
buf
[
0
]
=
1
;
buf
[
1
]
=
255
;
write
(
fd
,
buf
,
2
);
if
(
read
(
fd
,
buf
,
1
)
!=
1
)
goto
err
;
num
=
read
(
fd
,
buf
,
255
);
if
(
num
<
1
)
goto
err
;
RAND_seed
(
buf
,
num
);
if
(
RAND_status
()
==
1
)
ret
=
num
;
err:
if
(
fd
!=
-
1
)
close
(
fd
);
return
(
ret
);
}
#endif
doc/crypto/RAND_add.pod
浏览文件 @
4ec2d4d2
...
...
@@ -12,6 +12,8 @@ RAND_add, RAND_seed, RAND_screen - Add entropy to the PRNG
void RAND_add(const void *buf, int num, double entropy);
int RAND_status(void);
void RAND_screen(void);
=head1 DESCRIPTION
...
...
@@ -46,7 +48,10 @@ used on servers that run without user interaction.
=head1 RETURN VALUES
These functions do not return values.
RAND_status() returns 1 if the PRNG has been seeded with enough data,
0 otherwise.
The other functions do not return values.
=head1 SEE ALSO
...
...
@@ -55,6 +60,7 @@ L<rand(3)|rand(3)>, L<RAND_load_file(3)|RAND_load_file(3)>, L<RAND_cleanup(3)|RA
=head1 HISTORY
RAND_seed() and RAND_screen() are available in all versions of SSLeay
and OpenSSL. RAND_add() was added in OpenSSL 0.9.5.
and OpenSSL. RAND_add() and RAND_status() have been added in OpenSSL
0.9.5.
=cut
doc/crypto/RAND_egd.pod
0 → 100644
浏览文件 @
4ec2d4d2
=pod
=head1 NAME
RAND_egd - Query entropy gathering daemon
=head1 SYNOPSIS
#include <openssl/rand.h>
int RAND_egd(const char *path);
=head1 DESCRIPTION
RAND_egd() queries the entropy gathering daemon EGD on socket B<path>.
=head1 RETURN VALUES
RAND_egd() returns the number of bytes read from the daemon on
success, and -1 if the connection failed or the daemon did not return
enough data to fully seed the PRNG.
=head1 SEE ALSO
L<rand(3)|rand(3)>, L<RAND_add(3)|RAND_add(3)>, L<RAND_cleanup(3)|RAND_cleanup(3)>
=head1 HISTORY
RAND_egd() is available since OpenSSL 0.9.5.
=cut
doc/crypto/rand.pod
浏览文件 @
4ec2d4d2
...
...
@@ -13,12 +13,15 @@ rand - Pseudo-random number generator
void RAND_seed(const void *buf,int num);
void RAND_add(const void *buf,int num,int entropy);
int RAND_status(void);
void RAND_screen(void);
int RAND_load_file(const char *file,long max_bytes);
int RAND_write_file(const char *file);
const char *RAND_file_name(char *file,int num);
int RAND_egd(const char *path);
void RAND_set_rand_method(RAND_METHOD *meth);
RAND_METHOD *RAND_get_rand_method(void);
RAND_METHOD *RAND_SSLeay(void);
...
...
@@ -147,7 +150,8 @@ L<RAND_add(3)|RAND_add(3)>).
=head1 SEE ALSO
L<BN_rand(3)|BN_rand(3)>, L<RAND_add(3)|RAND_add(3)>,
L<RAND_load_file(3)|RAND_load_file(3)>, L<RAND_bytes(3)|RAND_bytes(3)>,
L<RAND_load_file(3)|RAND_load_file(3)>, L<RAND_egd(3)|RAND_egd(3)>,
L<RAND_bytes(3)|RAND_bytes(3)>,
L<RAND_set_rand_method(3)|RAND_set_rand_method(3)>,
L<RAND_cleanup(3)|RAND_cleanup(3)>
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录