summary refs log tree commit diff
path: root/stdlib/arc4random.c
blob: 65547e79aaa9a250ada410afe12c3c26b48b0643 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
/* Pseudo Random Number Generator based on ChaCha20.
   Copyright (C) 2022 Free Software Foundation, Inc.
   This file is part of the GNU C Library.

   The GNU C Library is free software; you can redistribute it and/or
   modify it under the terms of the GNU Lesser General Public
   License as published by the Free Software Foundation; either
   version 2.1 of the License, or (at your option) any later version.

   The GNU C Library is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
   Lesser General Public License for more details.

   You should have received a copy of the GNU Lesser General Public
   License along with the GNU C Library; if not, see
   <https://www.gnu.org/licenses/>.  */

#include <arc4random.h>
#include <errno.h>
#include <not-cancel.h>
#include <stdio.h>
#include <stdlib.h>
#include <sys/mman.h>
#include <sys/param.h>
#include <sys/random.h>
#include <tls-internal.h>

/* arc4random keeps two counters: 'have' is the current valid bytes not yet
   consumed in 'buf' while 'count' is the maximum number of bytes until a
   reseed.

   Both the initial seed and reseed try to obtain entropy from the kernel
   and abort the process if none could be obtained.

   The state 'buf' improves the usage of the cipher calls, allowing to call
   optimized implementations (if the architecture provides it) and minimize
   function call overhead.  */

#include <chacha20.c>

/* Called from the fork function to reset the state.  */
void
__arc4random_fork_subprocess (void)
{
  struct arc4random_state_t *state = __glibc_tls_internal ()->rand_state;
  if (state != NULL)
    {
      explicit_bzero (state, sizeof (*state));
      /* Force key init.  */
      state->count = -1;
    }
}

/* Return the current thread random state or try to create one if there is
   none available.  In the case malloc can not allocate a state, arc4random
   will try to get entropy with arc4random_getentropy.  */
static struct arc4random_state_t *
arc4random_get_state (void)
{
  struct arc4random_state_t *state = __glibc_tls_internal ()->rand_state;
  if (state == NULL)
    {
      state = malloc (sizeof (struct arc4random_state_t));
      if (state != NULL)
	{
	  /* Force key initialization on first call.  */
	  state->count = -1;
	  __glibc_tls_internal ()->rand_state = state;
	}
    }
  return state;
}

static void
arc4random_getrandom_failure (void)
{
  __libc_fatal ("Fatal glibc error: cannot get entropy for arc4random\n");
}

static void
arc4random_rekey (struct arc4random_state_t *state, uint8_t *rnd, size_t rndlen)
{
  chacha20_crypt (state->ctx, state->buf, state->buf, sizeof state->buf);

  /* Mix optional user provided data.  */
  if (rnd != NULL)
    {
      size_t m = MIN (rndlen, CHACHA20_KEY_SIZE + CHACHA20_IV_SIZE);
      for (size_t i = 0; i < m; i++)
	state->buf[i] ^= rnd[i];
    }

  /* Immediately reinit for backtracking resistance.  */
  chacha20_init (state->ctx, state->buf, state->buf + CHACHA20_KEY_SIZE);
  explicit_bzero (state->buf, CHACHA20_KEY_SIZE + CHACHA20_IV_SIZE);
  state->have = sizeof (state->buf) - (CHACHA20_KEY_SIZE + CHACHA20_IV_SIZE);
}

static void
arc4random_getentropy (void *rnd, size_t len)
{
  if (__getrandom_nocancel (rnd, len, GRND_NONBLOCK) == len)
    return;

  int fd = TEMP_FAILURE_RETRY (__open64_nocancel ("/dev/urandom",
						  O_RDONLY | O_CLOEXEC));
  if (fd != -1)
    {
      uint8_t *p = rnd;
      uint8_t *end = p + len;
      do
	{
	  ssize_t ret = TEMP_FAILURE_RETRY (__read_nocancel (fd, p, end - p));
	  if (ret <= 0)
	    arc4random_getrandom_failure ();
	  p += ret;
	}
      while (p < end);

      if (__close_nocancel (fd) == 0)
	return;
    }
  arc4random_getrandom_failure ();
}

/* Check if the thread context STATE should be reseed with kernel entropy
   depending of requested LEN bytes.  If there is less than requested,
   the state is either initialized or reseeded, otherwise the internal
   counter subtract the requested length.  */
static void
arc4random_check_stir (struct arc4random_state_t *state, size_t len)
{
  if (state->count <= len || state->count == -1)
    {
      uint8_t rnd[CHACHA20_KEY_SIZE + CHACHA20_IV_SIZE];
      arc4random_getentropy (rnd, sizeof rnd);

      if (state->count == -1)
	chacha20_init (state->ctx, rnd, rnd + CHACHA20_KEY_SIZE);
      else
	arc4random_rekey (state, rnd, sizeof rnd);

      explicit_bzero (rnd, sizeof rnd);

      /* Invalidate the buf.  */
      state->have = 0;
      memset (state->buf, 0, sizeof state->buf);
      state->count = CHACHA20_RESEED_SIZE;
    }
  else
    state->count -= len;
}

void
__arc4random_buf (void *buffer, size_t len)
{
  struct arc4random_state_t *state = arc4random_get_state ();
  if (__glibc_unlikely (state == NULL))
    {
      arc4random_getentropy (buffer, len);
      return;
    }

  arc4random_check_stir (state, len);
  while (len > 0)
    {
      if (state->have > 0)
	{
	  size_t m = MIN (len, state->have);
	  uint8_t *ks = state->buf + sizeof (state->buf) - state->have;
	  memcpy (buffer, ks, m);
	  explicit_bzero (ks, m);
	  buffer += m;
	  len -= m;
	  state->have -= m;
	}
      if (state->have == 0)
	arc4random_rekey (state, NULL, 0);
    }
}
libc_hidden_def (__arc4random_buf)
weak_alias (__arc4random_buf, arc4random_buf)

uint32_t
__arc4random (void)
{
  uint32_t r;

  struct arc4random_state_t *state = arc4random_get_state ();
  if (__glibc_unlikely (state == NULL))
    {
      arc4random_getentropy (&r, sizeof (uint32_t));
      return r;
    }

  arc4random_check_stir (state, sizeof (uint32_t));
  if (state->have < sizeof (uint32_t))
    arc4random_rekey (state, NULL, 0);
  uint8_t *ks = state->buf + sizeof (state->buf) - state->have;
  memcpy (&r, ks, sizeof (uint32_t));
  memset (ks, 0, sizeof (uint32_t));
  state->have -= sizeof (uint32_t);

  return r;
}
libc_hidden_def (__arc4random)
weak_alias (__arc4random, arc4random)