summaryrefslogtreecommitdiff
path: root/debian
diff options
context:
space:
mode:
authorJustus Winter <4winter@informatik.uni-hamburg.de>2015-11-27 19:04:02 +0100
committerJustus Winter <4winter@informatik.uni-hamburg.de>2015-11-27 19:04:02 +0100
commit0b15396767873044cc30cfca03f3ae324e03a36f (patch)
tree7c4af93d27bcb851f9c316dd0dfab2f1588bf2d2 /debian
parent248c87f2ed7f3daaec3d8fef53ee4bb02c1bb837 (diff)
add patch series
Diffstat (limited to 'debian')
-rw-r--r--debian/patches/makedev.diff4
-rw-r--r--debian/patches/random0001-xxx-standalone-random-translator.patch3209
-rw-r--r--debian/patches/series2
3 files changed, 3212 insertions, 3 deletions
diff --git a/debian/patches/makedev.diff b/debian/patches/makedev.diff
index e4f7371d..73ab6c9b 100644
--- a/debian/patches/makedev.diff
+++ b/debian/patches/makedev.diff
@@ -10,8 +10,8 @@ there.
;;
std)
-- mkdev console tty urandom null zero full fd time mem klog shm
-+ mkdev console tty urandom null zero full fd time mem klog
+- mkdev console tty random urandom null zero full fd time mem klog shm
++ mkdev console tty random urandom null zero full fd time mem klog
;;
console|com[0-9])
st $I root 600 /hurd/term ${DEVDIR}/$I device $I;;
diff --git a/debian/patches/random0001-xxx-standalone-random-translator.patch b/debian/patches/random0001-xxx-standalone-random-translator.patch
new file mode 100644
index 00000000..54ad5e07
--- /dev/null
+++ b/debian/patches/random0001-xxx-standalone-random-translator.patch
@@ -0,0 +1,3209 @@
+From 79d0a389ba6e9aacc93839538c27a81424a92521 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Thu, 12 Nov 2015 22:16:49 +0100
+Subject: [PATCH hurd] xxx standalone random translator
+
+---
+ Makefile | 1 -
+ random/Makefile | 30 --
+ random/TODO | 11 -
+ random/gnupg-bithelp.h | 41 ---
+ random/gnupg-glue.h | 40 ---
+ random/gnupg-random.c | 810 -------------------------------------------------
+ random/gnupg-random.h | 47 ---
+ random/gnupg-rmd.h | 38 ---
+ random/gnupg-rmd160.c | 656 ---------------------------------------
+ random/random.c | 650 ---------------------------------------
+ random/random.h | 32 --
+ sutils/MAKEDEV.sh | 6 +-
+ trans/Makefile | 7 +-
+ trans/random.c | 677 +++++++++++++++++++++++++++++++++++++++++
+ 14 files changed, 686 insertions(+), 2360 deletions(-)
+ delete mode 100644 random/Makefile
+ delete mode 100644 random/TODO
+ delete mode 100644 random/gnupg-bithelp.h
+ delete mode 100644 random/gnupg-glue.h
+ delete mode 100644 random/gnupg-random.c
+ delete mode 100644 random/gnupg-random.h
+ delete mode 100644 random/gnupg-rmd.h
+ delete mode 100644 random/gnupg-rmd160.c
+ delete mode 100644 random/random.c
+ delete mode 100644 random/random.h
+ create mode 100644 trans/random.c
+
+diff --git a/Makefile b/Makefile
+index 3178740..6544cd2 100644
+--- a/Makefile
++++ b/Makefile
+@@ -38,7 +38,6 @@ prog-subdirs = auth proc exec term \
+ hostmux usermux ftpfs trans \
+ console-client utils sutils \
+ benchmarks fstests \
+- random \
+ procfs \
+ startup \
+ init \
+diff --git a/random/Makefile b/random/Makefile
+deleted file mode 100644
+index 0949b63..0000000
+--- a/random/Makefile
++++ /dev/null
+@@ -1,30 +0,0 @@
+-#
+-# Copyright (C) 1994,95,96,97,99,2000,2001 Free Software Foundation, Inc.
+-#
+-# This program is free software; you can redistribute it and/or
+-# modify it under the terms of the GNU General Public License as
+-# published by the Free Software Foundation; either version 2, or (at
+-# your option) any later version.
+-#
+-# This program is distributed in the hope that it will be useful, but
+-# WITHOUT ANY WARRANTY; without even the implied warranty of
+-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+-# General Public License for more details.
+-#
+-# You should have received a copy of the GNU General Public License
+-# along with this program; if not, write to the Free Software
+-# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+-
+-dir := random
+-makemode := server
+-
+-CFLAGS += -D__HURD__
+-
+-target = random
+-SRCS = random.c gnupg-random.c gnupg-rmd160.c
+-OBJS = $(SRCS:.c=.o) startup_notifyServer.o
+-LCLHDRS = gnupg-random.h gnupg-rmd.h gnupg-bithelp.h random.h
+-HURDLIBS = trivfs ports fshelp ihash shouldbeinlibc
+-OTHERLIBS = -lpthread
+-
+-include ../Makeconf
+diff --git a/random/TODO b/random/TODO
+deleted file mode 100644
+index 9cc57ab..0000000
+--- a/random/TODO
++++ /dev/null
+@@ -1,11 +0,0 @@
+-* read_poll uses random_poll until the pool is filled. This is ian
+- issue at first initialization, as this requries POOLSIZE good random (level 1 from
+- gather_random) even in level 0 and 1.
+- For now, the code is only applied to level 2. Eventually, readable_pool
+- should be fixed to return 0 if initialization is not done yet and not enough bytes
+- are available. Otherwise it enters an infinite loop.
+-
+-* Permissions?
+-
+-* Off by one error in gather_random/io_write? I can only get GATHERBUFSIZE - 1
+- bytes from it.
+diff --git a/random/gnupg-bithelp.h b/random/gnupg-bithelp.h
+deleted file mode 100644
+index 188db16..0000000
+--- a/random/gnupg-bithelp.h
++++ /dev/null
+@@ -1,41 +0,0 @@
+-/* bithelp.h - Some bit manipulation helpers
+- * Copyright (C) 1999 Free Software Foundation, Inc.
+- *
+- * This file is part of GnuPG.
+- *
+- * GnuPG is free software; you can redistribute it and/or modify
+- * it under the terms of the GNU General Public License as published by
+- * the Free Software Foundation; either version 2 of the License, or
+- * (at your option) any later version.
+- *
+- * GnuPG is distributed in the hope that it will be useful,
+- * but WITHOUT ANY WARRANTY; without even the implied warranty of
+- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+- * GNU General Public License for more details.
+- *
+- * You should have received a copy of the GNU General Public License
+- * along with this program; if not, write to the Free Software
+- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
+- */
+-#ifndef G10_BITHELP_H
+-#define G10_BITHELP_H
+-
+-
+-/****************
+- * Rotate a 32 bit integer by n bytes
+- */
+-#if defined(__GNUC__) && defined(__i386__)
+-static inline u32
+-rol( u32 x, int n)
+-{
+- __asm__("roll %%cl,%0"
+- :"=r" (x)
+- :"0" (x),"c" (n));
+- return x;
+-}
+-#else
+- #define rol(x,n) ( ((x) << (n)) | ((x) >> (32-(n))) )
+-#endif
+-
+-
+-#endif /*G10_BITHELP_H*/
+diff --git a/random/gnupg-glue.h b/random/gnupg-glue.h
+deleted file mode 100644
+index cbf0a10..0000000
+--- a/random/gnupg-glue.h
++++ /dev/null
+@@ -1,40 +0,0 @@
+-#ifndef __GNUPG_GLUE_H__
+-#define __GNUPG_GLUE_H__
+-
+-#include <sys/types.h>
+-#include <random.h>
+-
+-#define SIZEOF_UNSIGNED_LONG 4
+-typedef unsigned int u32;
+-typedef unsigned char byte;
+-
+-/* GnuPG's config.h */
+-#define HAVE_GETTIMEOFDAY 1
+-#define HAVE_GETRUSAGE 1
+-#define HAVE_RAND 1
+-
+-/* GnuPG's memory.h */
+-#define m_alloc malloc
+-#define m_alloc_secure malloc
+-#define m_alloc_clear(x) calloc(x, 1)
+-#define m_alloc_secure_clear(x) calloc(x, 1)
+-#define m_free free
+-#define m_strdup strdup
+-
+-/* GnuPG's dynaload.h */
+-#define dynload_getfnc_fast_random_poll() (0)
+-#define dynload_getfnc_gather_random() &gather_random
+-int
+-gather_random( void (*add)(const void*, size_t, int), int requester,
+- size_t length, int level );
+-
+-/* GnuPG's miscellaneous stuff. */
+-#define BUG() assert(0)
+-#define _(x) x
+-#define make_timestamp() time(0)
+-#define tty_printf printf
+-#define log_info(format, args...) printf(format , ## args)
+-#define log_fatal(format, args...) { printf(format , ## args) ; exit(2); }
+-#define DIM(v) (sizeof(v)/sizeof((v)[0]))
+-
+-#endif /* __GNUPG_GLUE_H__ */
+diff --git a/random/gnupg-random.c b/random/gnupg-random.c
+deleted file mode 100644
+index 54ee3c5..0000000
+--- a/random/gnupg-random.c
++++ /dev/null
+@@ -1,810 +0,0 @@
+-/* random.c - random number generator
+- * Copyright (C) 1998, 1999, 2000, 2001 Free Software Foundation, Inc.
+- *
+- * This file is part of GnuPG.
+- *
+- * GnuPG is free software; you can redistribute it and/or modify
+- * it under the terms of the GNU General Public License as published by
+- * the Free Software Foundation; either version 2 of the License, or
+- * (at your option) any later version.
+- *
+- * GnuPG is distributed in the hope that it will be useful,
+- * but WITHOUT ANY WARRANTY; without even the implied warranty of
+- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+- * GNU General Public License for more details.
+- *
+- * You should have received a copy of the GNU General Public License
+- * along with this program; if not, write to the Free Software
+- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
+- */
+-
+-
+-/****************
+- * This random number generator is modelled after the one described
+- * in Peter Gutmann's Paper: "Software Generation of Practically
+- * Strong Random Numbers".
+- */
+-
+-#ifndef __HURD__
+-#include <config.h>
+-#else
+-#include "gnupg-glue.h"
+-#endif
+-#include <stdio.h>
+-#include <stdlib.h>
+-#include <assert.h>
+-#include <errno.h>
+-#include <string.h>
+-#include <time.h>
+-#include <sys/time.h>
+-#include <sys/types.h>
+-#include <sys/stat.h>
+-#include <unistd.h>
+-#include <fcntl.h>
+-#ifdef HAVE_GETHRTIME
+- #include <sys/times.h>
+-#endif
+-#ifdef HAVE_GETTIMEOFDAY
+- #include <sys/times.h>
+-#endif
+-#ifdef HAVE_GETRUSAGE
+- #include <sys/resource.h>
+-#endif
+-#ifdef __MINGW32__
+- #include <process.h>
+-#endif
+-#ifndef __HURD__
+-#include "util.h"
+-#endif
+-#ifndef __HURD__
+-#include "rmd.h"
+-#include "ttyio.h"
+-#include "i18n.h"
+-#include "random.h"
+-#include "rand-internal.h"
+-#include "dynload.h"
+-#else
+-#include "gnupg-rmd.h"
+-#include "gnupg-random.h"
+-#endif
+-
+-#ifndef RAND_MAX /* for SunOS */
+- #define RAND_MAX 32767
+-#endif
+-
+-
+-#if SIZEOF_UNSIGNED_LONG == 8
+- #define ADD_VALUE 0xa5a5a5a5a5a5a5a5
+-#elif SIZEOF_UNSIGNED_LONG == 4
+- #define ADD_VALUE 0xa5a5a5a5
+-#else
+- #error weird size for an unsigned long
+-#endif
+-
+-#define BLOCKLEN 64 /* hash this amount of bytes */
+-#define DIGESTLEN 20 /* into a digest of this length (rmd160) */
+-/* poolblocks is the number of digests which make up the pool
+- * and poolsize must be a multiple of the digest length
+- * to make the AND operations faster, the size should also be
+- * a multiple of ulong
+- */
+-#define POOLBLOCKS 30
+-#define POOLSIZE (POOLBLOCKS*DIGESTLEN)
+-#if (POOLSIZE % SIZEOF_UNSIGNED_LONG)
+- #error Please make sure that poolsize is a multiple of ulong
+-#endif
+-#define POOLWORDS (POOLSIZE / SIZEOF_UNSIGNED_LONG)
+-
+-
+-static int is_initialized;
+-#define MASK_LEVEL(a) do {if( a > 2 ) a = 2; else if( a < 0 ) a = 0; } while(0)
+-static char *rndpool; /* allocated size is POOLSIZE+BLOCKLEN */
+-static char *keypool; /* allocated size is POOLSIZE+BLOCKLEN */
+-static size_t pool_readpos;
+-static size_t pool_writepos;
+-static int pool_filled;
+-static int pool_balance;
+-static int just_mixed;
+-static int did_initial_extra_seeding;
+-static char *seed_file_name;
+-static int allow_seed_file_update;
+-
+-static int secure_alloc;
+-static int quick_test;
+-static int faked_rng;
+-
+-
+-#ifndef __HURD__
+-static void read_pool( byte *buffer, size_t length, int level );
+-#else
+-int read_pool( byte *buffer, size_t length, int level );
+-#endif
+-static void add_randomness( const void *buffer, size_t length, int source );
+-static void random_poll(void);
+-#ifndef __HURD__
+-static void read_random_source( int requester, size_t length, int level);
+-#else
+-static int read_random_source( int requester, size_t length, int level);
+-#endif
+-static int gather_faked( void (*add)(const void*, size_t, int), int requester,
+- size_t length, int level );
+-
+-static struct {
+- ulong mixrnd;
+- ulong mixkey;
+- ulong slowpolls;
+- ulong fastpolls;
+- ulong getbytes1;
+- ulong ngetbytes1;
+- ulong getbytes2;
+- ulong ngetbytes2;
+- ulong addbytes;
+- ulong naddbytes;
+-} rndstats;
+-
+-static void
+-initialize(void)
+-{
+- /* The data buffer is allocated somewhat larger, so that
+- * we can use this extra space (which is allocated in secure memory)
+- * as a temporary hash buffer */
+- rndpool = secure_alloc ? m_alloc_secure_clear(POOLSIZE+BLOCKLEN)
+- : m_alloc_clear(POOLSIZE+BLOCKLEN);
+- keypool = secure_alloc ? m_alloc_secure_clear(POOLSIZE+BLOCKLEN)
+- : m_alloc_clear(POOLSIZE+BLOCKLEN);
+- is_initialized = 1;
+-#ifndef __HURD__
+- cipher_modules_constructor();
+-#endif
+-}
+-
+-static void
+-burn_stack (int bytes)
+-{
+- char buf[128];
+-
+- memset (buf, 0, sizeof buf);
+- bytes -= sizeof buf;
+- if (bytes > 0)
+- burn_stack (bytes);
+-}
+-
+-void
+-random_dump_stats()
+-{
+- fprintf(stderr,
+- "random usage: poolsize=%d mixed=%lu polls=%lu/%lu added=%lu/%lu\n"
+- " outmix=%lu getlvl1=%lu/%lu getlvl2=%lu/%lu\n",
+- POOLSIZE, rndstats.mixrnd, rndstats.slowpolls, rndstats.fastpolls,
+- rndstats.naddbytes, rndstats.addbytes,
+- rndstats.mixkey, rndstats.ngetbytes1, rndstats.getbytes1,
+- rndstats.ngetbytes2, rndstats.getbytes2 );
+-}
+-
+-void
+-secure_random_alloc()
+-{
+- secure_alloc = 1;
+-}
+-
+-
+-int
+-quick_random_gen( int onoff )
+-{
+- int last;
+-
+- read_random_source(0,0,0); /* init */
+- last = quick_test;
+- if( onoff != -1 )
+- quick_test = onoff;
+- return faked_rng? 1 : last;
+-}
+-
+-
+-/****************
+- * Fill the buffer with LENGTH bytes of cryptographically strong
+- * random bytes. level 0 is not very strong, 1 is strong enough
+- * for most usage, 2 is good for key generation stuff but may be very slow.
+- */
+-void
+-randomize_buffer( byte *buffer, size_t length, int level )
+-{
+- char *p = get_random_bits( length*8, level, 1 );
+- memcpy( buffer, p, length );
+- m_free(p);
+-}
+-
+-
+-int
+-random_is_faked()
+-{
+- if( !is_initialized )
+- initialize();
+- return faked_rng || quick_test;
+-}
+-
+-/****************
+- * Return a pointer to a randomized buffer of level 0 and LENGTH bits
+- * caller must free the buffer.
+- * Note: The returned value is rounded up to bytes.
+- */
+-byte *
+-get_random_bits( size_t nbits, int level, int secure )
+-{
+- byte *buf, *p;
+- size_t nbytes = (nbits+7)/8;
+-
+- if( quick_test && level > 1 )
+- level = 1;
+- MASK_LEVEL(level);
+- if( level == 1 ) {
+- rndstats.getbytes1 += nbytes;
+- rndstats.ngetbytes1++;
+- }
+- else if( level >= 2 ) {
+- rndstats.getbytes2 += nbytes;
+- rndstats.ngetbytes2++;
+- }
+-
+- buf = secure && secure_alloc ? m_alloc_secure( nbytes ) : m_alloc( nbytes );
+- for( p = buf; nbytes > 0; ) {
+- size_t n = nbytes > POOLSIZE? POOLSIZE : nbytes;
+-#ifdef __HURD__
+- n =
+-#endif
+- read_pool( p, n, level );
+- nbytes -= n;
+- p += n;
+-
+- }
+- return buf;
+-}
+-
+-
+-/****************
+- * Mix the pool
+- */
+-static void
+-mix_pool(byte *pool)
+-{
+- char *hashbuf = pool + POOLSIZE;
+- char *p, *pend;
+- int i, n;
+- RMD160_CONTEXT md;
+-
+- rmd160_init( &md );
+- #if DIGESTLEN != 20
+- #error must have a digest length of 20 for ripe-md-160
+- #endif
+- /* loop over the pool */
+- pend = pool + POOLSIZE;
+- memcpy(hashbuf, pend - DIGESTLEN, DIGESTLEN );
+- memcpy(hashbuf+DIGESTLEN, pool, BLOCKLEN-DIGESTLEN);
+- rmd160_mixblock( &md, hashbuf);
+- memcpy(pool, hashbuf, 20 );
+-
+- p = pool;
+- for( n=1; n < POOLBLOCKS; n++ ) {
+- memcpy(hashbuf, p, DIGESTLEN );
+-
+- p += DIGESTLEN;
+- if( p+DIGESTLEN+BLOCKLEN < pend )
+- memcpy(hashbuf+DIGESTLEN, p+DIGESTLEN, BLOCKLEN-DIGESTLEN);
+- else {
+- char *pp = p+DIGESTLEN;
+- for(i=DIGESTLEN; i < BLOCKLEN; i++ ) {
+- if( pp >= pend )
+- pp = pool;
+- hashbuf[i] = *pp++;
+- }
+- }
+-
+- rmd160_mixblock( &md, hashbuf);
+- memcpy(p, hashbuf, 20 );
+- }
+- burn_stack (200); /* for the rmd160_mixblock() */
+-}
+-
+-
+-void
+-set_random_seed_file( const char *name )
+-{
+- if( seed_file_name )
+- BUG();
+- seed_file_name = m_strdup( name );
+-}
+-
+-/****************
+- * Read in a seed form the random_seed file
+- * and return true if this was successful
+- */
+-static int
+-read_seed_file()
+-{
+- int fd;
+- struct stat sb;
+- unsigned char buffer[POOLSIZE];
+- int n;
+-
+- if( !seed_file_name )
+- return 0;
+-
+- #ifdef HAVE_DOSISH_SYSTEM
+- fd = open( seed_file_name, O_RDONLY | O_BINARY );
+- #else
+- fd = open( seed_file_name, O_RDONLY );
+- #endif
+- if( fd == -1 && errno == ENOENT) {
+- allow_seed_file_update = 1;
+- return 0;
+- }
+-
+- if( fd == -1 ) {
+- log_info(_("can't open `%s': %s\n"), seed_file_name, strerror(errno) );
+- return 0;
+- }
+- if( fstat( fd, &sb ) ) {
+- log_info(_("can't stat `%s': %s\n"), seed_file_name, strerror(errno) );
+- close(fd);
+- return 0;
+- }
+- if( !S_ISREG(sb.st_mode) ) {
+- log_info(_("`%s' is not a regular file - ignored\n"), seed_file_name );
+- close(fd);
+- return 0;
+- }
+- if( !sb.st_size ) {
+- log_info(_("note: random_seed file is empty\n") );
+- close(fd);
+- allow_seed_file_update = 1;
+- return 0;
+- }
+- if( sb.st_size != POOLSIZE ) {
+- log_info(_("warning: invalid size of random_seed file - not used\n") );
+- close(fd);
+- return 0;
+- }
+- do {
+- n = read( fd, buffer, POOLSIZE );
+- } while( n == -1 && errno == EINTR );
+- if( n != POOLSIZE ) {
+- log_fatal(_("can't read `%s': %s\n"), seed_file_name,strerror(errno) );
+- close(fd);
+- return 0;
+- }
+-
+- close(fd);
+-
+- add_randomness( buffer, POOLSIZE, 0 );
+- /* add some minor entropy to the pool now (this will also force a mixing) */
+- { pid_t x = getpid();
+- add_randomness( &x, sizeof(x), 0 );
+- }
+- { time_t x = time(NULL);
+- add_randomness( &x, sizeof(x), 0 );
+- }
+- { clock_t x = clock();
+- add_randomness( &x, sizeof(x), 0 );
+- }
+- /* And read a few bytes from our entropy source. By using
+- * a level of 0 this will not block and might not return anything
+- * with some entropy drivers, however the rndlinux driver will use
+- * /dev/urandom and return some stuff - Do not read to much as we
+- * want to be friendly to the scare system entropy resource. */
+- read_random_source( 0, 16, 0 );
+-
+- allow_seed_file_update = 1;
+- return 1;
+-}
+-
+-void
+-update_random_seed_file()
+-{
+- ulong *sp, *dp;
+- int fd, i;
+-
+- if( !seed_file_name || !is_initialized || !pool_filled )
+- return;
+- if( !allow_seed_file_update ) {
+- log_info(_("note: random_seed file not updated\n"));
+- return;
+- }
+-
+-
+- /* copy the entropy pool to a scratch pool and mix both of them */
+- for(i=0,dp=(ulong*)keypool, sp=(ulong*)rndpool;
+- i < POOLWORDS; i++, dp++, sp++ ) {
+- *dp = *sp + ADD_VALUE;
+- }
+- mix_pool(rndpool); rndstats.mixrnd++;
+- mix_pool(keypool); rndstats.mixkey++;
+-
+- #ifdef HAVE_DOSISH_SYSTEM
+- fd = open( seed_file_name, O_WRONLY|O_CREAT|O_TRUNC|O_BINARY,
+- S_IRUSR|S_IWUSR );
+- #else
+- fd = open( seed_file_name, O_WRONLY|O_CREAT|O_TRUNC, S_IRUSR|S_IWUSR );
+- #endif
+- if( fd == -1 ) {
+- log_info(_("can't create `%s': %s\n"), seed_file_name, strerror(errno) );
+- return;
+- }
+- do {
+- i = write( fd, keypool, POOLSIZE );
+- } while( i == -1 && errno == EINTR );
+- if( i != POOLSIZE ) {
+- log_info(_("can't write `%s': %s\n"), seed_file_name, strerror(errno) );
+- }
+- if( close(fd) )
+- log_info(_("can't close `%s': %s\n"), seed_file_name, strerror(errno) );
+-}
+-
+-#ifdef __HURD__
+-int readable_pool( size_t length, int level )
+-{
+- size_t needed = 0;
+- size_t my_balance = pool_balance;
+- size_t available = (gatherwpos - gatherrpos + GATHERBUFSIZE) % GATHERBUFSIZE;
+-
+- if (length > POOLSIZE)
+- length = POOLSIZE;
+-
+- if (level < 2)
+- return length;
+-
+- if( !pool_filled ) {
+- if( read_seed_file() )
+- pool_filled = 1;
+- }
+-
+- if (!did_initial_extra_seeding)
+- {
+- /* Take account for initial extra seeding. */
+- needed = length;
+- if (needed < POOLSIZE/2)
+- needed = POOLSIZE/2;
+- my_balance = needed;
+-
+- if (!pool_filled && pool_writepos + needed < POOLSIZE)
+- {
+- /* If the pool is not filled yet, we couldn't read the seed
+- file. Too bad. We will now have to take account for so many
+- random_poll()s as fit into the remaining pool. */
+-
+- needed += (POOLSIZE - pool_writepos + needed + POOLSIZE/5 - 1) / (POOLSIZE/5);
+- }
+- }
+- else
+- {
+- if (!pool_filled)
+- needed += (POOLSIZE - pool_writepos + needed + POOLSIZE/5 - 1) / (POOLSIZE/5);
+- }
+-
+- /* NEEDED contains the bytes needed for initialization, MY_BALANCE the resulting
+- available bytes. */
+- if (available < needed)
+- return 0;
+- return available + my_balance - needed;
+-}
+-#endif
+-
+-#ifndef __HURD__
+-static void
+-#else
+-int
+-#endif
+-read_pool( byte *buffer, size_t length, int level )
+-{
+- int i;
+- ulong *sp, *dp;
+-
+- if( length > POOLSIZE ) {
+-#ifndef __HURD__
+- log_fatal(_("too many random bits requested; the limit is %d\n"),
+- POOLSIZE*8-1 );
+-#else
+- length = POOLSIZE;
+-#endif
+- }
+-
+- if( !pool_filled ) {
+- if( read_seed_file() )
+- pool_filled = 1;
+- }
+-
+- /* For level 2 quality (key generation) we alwas make
+- * sure that the pool has been seeded enough initially */
+- if( level == 2 && !did_initial_extra_seeding ) {
+- size_t needed;
+-
+- pool_balance = 0;
+- needed = length - pool_balance;
+- if( needed < POOLSIZE/2 )
+- needed = POOLSIZE/2;
+- else if( needed > POOLSIZE )
+- BUG();
+-#ifdef __HURD__
+- needed =
+-#endif
+- read_random_source( 3, needed, 2 );
+-#ifdef __HURD__
+- if (! needed)
+- return 0;
+- /* XXX This will succeed with needed < POOLSIZE/2 even. But
+- erroring out will waste the random we already got. */
+-#endif
+- pool_balance += needed;
+- did_initial_extra_seeding=1;
+- }
+-
+- /* for level 2 make sure that there is enough random in the pool */
+- if( level == 2 && pool_balance < length ) {
+- size_t needed;
+-
+- if( pool_balance < 0 )
+- pool_balance = 0;
+- needed = length - pool_balance;
+- if( needed > POOLSIZE )
+- BUG();
+-#ifdef __HURD__
+- needed =
+-#endif
+- read_random_source( 3, needed, 2 );
+- pool_balance += needed;
+- }
+-
+-#ifdef __HURD__
+- /* XXX This makes level 0 and 1 worse than needed at first start up. */
+- if (level == 2)
+-#endif
+- /* make sure the pool is filled */
+- while( !pool_filled )
+- random_poll();
+-
+- /* do always a fast random poll */
+- fast_random_poll();
+-
+- if( !level ) { /* no need for cryptographic strong random */
+- /* create a new pool */
+- for(i=0,dp=(ulong*)keypool, sp=(ulong*)rndpool;
+- i < POOLWORDS; i++, dp++, sp++ )
+- *dp = *sp + ADD_VALUE;
+- /* must mix both pools */
+- mix_pool(rndpool); rndstats.mixrnd++;
+- mix_pool(keypool); rndstats.mixkey++;
+- memcpy( buffer, keypool, length );
+- return length;
+- }
+- else {
+-#ifdef __HURD__
+- int amount;
+-#endif
+- /* mix the pool (if add_randomness() didn't it) */
+- if( !just_mixed ) {
+- mix_pool(rndpool);
+- rndstats.mixrnd++;
+- }
+- /* create a new pool */
+- for(i=0,dp=(ulong*)keypool, sp=(ulong*)rndpool;
+- i < POOLWORDS; i++, dp++, sp++ )
+- *dp = *sp + ADD_VALUE;
+- /* and mix both pools */
+- mix_pool(rndpool); rndstats.mixrnd++;
+- mix_pool(keypool); rndstats.mixkey++;
+- /* read the required data
+- * we use a readpointer to read from a different position each
+- * time */
+-#ifdef __HURD__
+- if (level == 2 && length > pool_balance)
+- length = pool_balance;
+- amount = length;
+-#endif
+- while( length-- ) {
+- *buffer++ = keypool[pool_readpos++];
+- if( pool_readpos >= POOLSIZE )
+- pool_readpos = 0;
+- pool_balance--;
+- }
+- if( pool_balance < 0 )
+- pool_balance = 0;
+- /* and clear the keypool */
+- memset( keypool, 0, POOLSIZE );
+-#ifdef __HURD__
+- return amount;
+-#endif
+- }
+-}
+-
+-
+-/****************
+- * Add LENGTH bytes of randomness from buffer to the pool.
+- * source may be used to specify the randomness source.
+- * Source is:
+- * 0 - used ony for initialization
+- * 1 - fast random poll function
+- * 2 - normal poll function
+- * 3 - used when level 2 random quality has been requested
+- * to do an extra pool seed.
+- */
+-static void
+-add_randomness( const void *buffer, size_t length, int source )
+-{
+- const byte *p = buffer;
+-
+- if( !is_initialized )
+- initialize();
+- rndstats.addbytes += length;
+- rndstats.naddbytes++;
+- while( length-- ) {
+- rndpool[pool_writepos++] = *p++;
+- if( pool_writepos >= POOLSIZE ) {
+- if( source > 1 )
+- pool_filled = 1;
+- pool_writepos = 0;
+- mix_pool(rndpool); rndstats.mixrnd++;
+- just_mixed = !length;
+- }
+- }
+-}
+-
+-
+-
+-static void
+-random_poll()
+-{
+- rndstats.slowpolls++;
+- read_random_source( 2, POOLSIZE/5, 1 );
+-}
+-
+-
+-void
+-fast_random_poll()
+-{
+- static void (*fnc)( void (*)(const void*, size_t, int), int) = NULL;
+- static int initialized = 0;
+-
+- rndstats.fastpolls++;
+- if( !initialized ) {
+- if( !is_initialized )
+- initialize();
+- initialized = 1;
+- fnc = dynload_getfnc_fast_random_poll();
+- }
+- if( fnc ) {
+- (*fnc)( add_randomness, 1 );
+- return;
+- }
+-
+- /* fall back to the generic function */
+- #if HAVE_GETHRTIME
+- { hrtime_t tv;
+- tv = gethrtime();
+- add_randomness( &tv, sizeof(tv), 1 );
+- }
+- #elif HAVE_GETTIMEOFDAY
+- { struct timeval tv;
+- if( gettimeofday( &tv, NULL ) )
+- BUG();
+- add_randomness( &tv.tv_sec, sizeof(tv.tv_sec), 1 );
+- add_randomness( &tv.tv_usec, sizeof(tv.tv_usec), 1 );
+- }
+- #elif HAVE_CLOCK_GETTIME
+- { struct timespec tv;
+- if( clock_gettime( CLOCK_REALTIME, &tv ) == -1 )
+- BUG();
+- add_randomness( &tv.tv_sec, sizeof(tv.tv_sec), 1 );
+- add_randomness( &tv.tv_nsec, sizeof(tv.tv_nsec), 1 );
+- }
+- #else /* use times */
+- #ifndef HAVE_DOSISH_SYSTEM
+- { struct tms buf;
+- times( &buf );
+- add_randomness( &buf, sizeof buf, 1 );
+- }
+- #endif
+- #endif
+- #ifdef HAVE_GETRUSAGE
+- #ifndef RUSAGE_SELF
+- #ifdef __GCC__
+- #warning There is no RUSAGE_SELF on this system
+- #endif
+- #else
+- { struct rusage buf;
+- /* QNX/Neutrino does return ENOSYS - so we just ignore it and
+- * add whatever is in buf. In a chroot environment it might not
+- * work at all (i.e. because /proc/ is not accessible), so we better
+- * ognore all error codes and hope for the best
+- */
+- getrusage( RUSAGE_SELF, &buf );
+-
+- add_randomness( &buf, sizeof buf, 1 );
+- memset( &buf, 0, sizeof buf );
+- }
+- #endif
+- #endif
+- /* time and clock are available on all systems - so
+- * we better do it just in case one of the above functions
+- * didn't work */
+- { time_t x = time(NULL);
+- add_randomness( &x, sizeof(x), 1 );
+- }
+- { clock_t x = clock();
+- add_randomness( &x, sizeof(x), 1 );
+- }
+-}
+-
+-
+-#ifndef __HURD__
+-static void
+-#else
+-static int
+-#endif
+-read_random_source( int requester, size_t length, int level )
+-{
+- static int (*fnc)(void (*)(const void*, size_t, int), int,
+- size_t, int) = NULL;
+-#ifdef __HURD__
+- int got;
+-#endif
+- if( !fnc ) {
+- if( !is_initialized )
+- initialize();
+- fnc = dynload_getfnc_gather_random();
+- if( !fnc ) {
+- faked_rng = 1;
+- fnc = gather_faked;
+- }
+- if( !requester && !length && !level )
+-#ifndef __HURD__
+- return; /* init only */
+-#else
+- return 0;
+-#endif
+- }
+-#ifndef __HURD__
+- if( (*fnc)( add_randomness, requester, length, level ) < 0 )
+- log_fatal("No way to gather entropy for the RNG\n");
+-#else
+- got = (*fnc)( add_randomness, requester, length, level );
+- if (got < 0)
+- log_fatal("No way to gather entropy for the RNG\n");
+- return got;
+-#endif
+-}
+-
+-
+-static int
+-gather_faked( void (*add)(const void*, size_t, int), int requester,
+- size_t length, int level )
+-{
+- static int initialized=0;
+- size_t n;
+- char *buffer, *p;
+-
+- if( !initialized ) {
+- log_info(_("WARNING: using insecure random number generator!!\n"));
+- tty_printf(_("The random number generator is only a kludge to let\n"
+- "it run - it is in no way a strong RNG!\n\n"
+- "DON'T USE ANY DATA GENERATED BY THIS PROGRAM!!\n\n"));
+- initialized=1;
+- #ifdef HAVE_RAND
+- srand(make_timestamp()*getpid());
+- #else
+- srandom(make_timestamp()*getpid());
+- #endif
+- }
+- printf("WAITING FOR %i bytes.\n", length);
+- p = buffer = m_alloc( length );
+- n = length;
+- #ifdef HAVE_RAND
+- while( n-- )
+- *p++ = ((unsigned)(1 + (int) (256.0*rand()/(RAND_MAX+1.0)))-1);
+- #else
+- while( n-- )
+- *p++ = ((unsigned)(1 + (int) (256.0*random()/(RAND_MAX+1.0)))-1);
+- #endif
+- add_randomness( buffer, length, requester );
+- m_free(buffer);
+- return 0; /* okay */
+-}
+-
+diff --git a/random/gnupg-random.h b/random/gnupg-random.h
+deleted file mode 100644
+index ee18feb..0000000
+--- a/random/gnupg-random.h
++++ /dev/null
+@@ -1,47 +0,0 @@
+-/* random.h - random functions
+- * Copyright (C) 1998, 1999, 2000, 2001 Free Software Foundation, Inc.
+- *
+- * This file is part of GnuPG.
+- *
+- * GnuPG is free software; you can redistribute it and/or modify
+- * it under the terms of the GNU General Public License as published by
+- * the Free Software Foundation; either version 2 of the License, or
+- * (at your option) any later version.
+- *
+- * GnuPG is distributed in the hope that it will be useful,
+- * but WITHOUT ANY WARRANTY; without even the implied warranty of
+- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+- * GNU General Public License for more details.
+- *
+- * You should have received a copy of the GNU General Public License
+- * along with this program; if not, write to the Free Software
+- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
+- */
+-#ifndef G10_RANDOM_H
+-#define G10_RANDOM_H
+-
+-#ifndef __HURD__
+-#include "types.h"
+-#else
+-#include "gnupg-glue.h"
+-int read_pool (byte *, size_t, int);
+-int readable_pool (size_t, int);
+-#endif
+-
+-/*-- random.c --*/
+-void random_dump_stats(void);
+-void secure_random_alloc(void);
+-void set_random_seed_file(const char *);
+-void update_random_seed_file(void);
+-int quick_random_gen( int onoff );
+-int random_is_faked(void);
+-void randomize_buffer( byte *buffer, size_t length, int level );
+-byte *get_random_bits( size_t nbits, int level, int secure );
+-void fast_random_poll( void );
+-
+-/*-- rndw32.c --*/
+-#ifdef USE_STATIC_RNDW32
+-void rndw32_set_dll_name( const char *name );
+-#endif
+-
+-#endif /*G10_RANDOM_H*/
+diff --git a/random/gnupg-rmd.h b/random/gnupg-rmd.h
+deleted file mode 100644
+index 2446fc7..0000000
+--- a/random/gnupg-rmd.h
++++ /dev/null
+@@ -1,38 +0,0 @@
+-/* rmd.h - RIPE-MD hash functions
+- * Copyright (C) 1998, 1999, 2000, 2001 Free Software Foundation, Inc.
+- *
+- * This file is part of GnuPG.
+- *
+- * GnuPG is free software; you can redistribute it and/or modify
+- * it under the terms of the GNU General Public License as published by
+- * the Free Software Foundation; either version 2 of the License, or
+- * (at your option) any later version.
+- *
+- * GnuPG is distributed in the hope that it will be useful,
+- * but WITHOUT ANY WARRANTY; without even the implied warranty of
+- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+- * GNU General Public License for more details.
+- *
+- * You should have received a copy of the GNU General Public License
+- * along with this program; if not, write to the Free Software
+- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
+- */
+-#ifndef G10_RMD_H
+-#define G10_RMD_H
+-
+-#ifdef __HURD__
+-#include "gnupg-glue.h"
+-#endif
+-
+-/* we need this here because random.c must have direct access */
+-typedef struct {
+- u32 h0,h1,h2,h3,h4;
+- u32 nblocks;
+- byte buf[64];
+- int count;
+-} RMD160_CONTEXT;
+-
+-void rmd160_init( RMD160_CONTEXT *hd );
+-void rmd160_mixblock( RMD160_CONTEXT *hd, char *buffer );
+-
+-#endif /*G10_RMD_H*/
+diff --git a/random/gnupg-rmd160.c b/random/gnupg-rmd160.c
+deleted file mode 100644
+index 6610768..0000000
+--- a/random/gnupg-rmd160.c
++++ /dev/null
+@@ -1,656 +0,0 @@
+-/* rmd160.c - RIPE-MD160
+- * Copyright (C) 1998, 1999, 2000, 2001 Free Software Foundation, Inc.
+- *
+- * This file is part of GnuPG.
+- *
+- * GnuPG is free software; you can redistribute it and/or modify
+- * it under the terms of the GNU General Public License as published by
+- * the Free Software Foundation; either version 2 of the License, or
+- * (at your option) any later version.
+- *
+- * GnuPG is distributed in the hope that it will be useful,
+- * but WITHOUT ANY WARRANTY; without even the implied warranty of
+- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+- * GNU General Public License for more details.
+- *
+- * You should have received a copy of the GNU General Public License
+- * along with this program; if not, write to the Free Software
+- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
+- */
+-
+-#ifndef __HURD__
+-#include <config.h>
+-#endif
+-#include <stdio.h>
+-#include <stdlib.h>
+-#include <string.h>
+-#include <assert.h>
+-#ifndef __HURD__
+-#include "util.h"
+-#include "memory.h"
+-#include "rmd.h"
+-#include "cipher.h" /* only used for the rmd160_hash_buffer() prototype */
+-#include "dynload.h"
+-
+-#include "bithelp.h"
+-#else
+-#include "gnupg-rmd.h"
+-#include "gnupg-bithelp.h"
+-#endif
+-
+-
+-/*********************************
+- * RIPEMD-160 is not patented, see (as of 25.10.97)
+- * http://www.esat.kuleuven.ac.be/~bosselae/ripemd160.html
+- * Note that the code uses Little Endian byteorder, which is good for
+- * 386 etc, but we must add some conversion when used on a big endian box.
+- *
+- *
+- * Pseudo-code for RIPEMD-160
+- *
+- * RIPEMD-160 is an iterative hash function that operates on 32-bit words.
+- * The round function takes as input a 5-word chaining variable and a 16-word
+- * message block and maps this to a new chaining variable. All operations are
+- * defined on 32-bit words. Padding is identical to that of MD4.
+- *
+- *
+- * RIPEMD-160: definitions
+- *
+- *
+- * nonlinear functions at bit level: exor, mux, -, mux, -
+- *
+- * f(j, x, y, z) = x XOR y XOR z (0 <= j <= 15)
+- * f(j, x, y, z) = (x AND y) OR (NOT(x) AND z) (16 <= j <= 31)
+- * f(j, x, y, z) = (x OR NOT(y)) XOR z (32 <= j <= 47)
+- * f(j, x, y, z) = (x AND z) OR (y AND NOT(z)) (48 <= j <= 63)
+- * f(j, x, y, z) = x XOR (y OR NOT(z)) (64 <= j <= 79)
+- *
+- *
+- * added constants (hexadecimal)
+- *
+- * K(j) = 0x00000000 (0 <= j <= 15)
+- * K(j) = 0x5A827999 (16 <= j <= 31) int(2**30 x sqrt(2))
+- * K(j) = 0x6ED9EBA1 (32 <= j <= 47) int(2**30 x sqrt(3))
+- * K(j) = 0x8F1BBCDC (48 <= j <= 63) int(2**30 x sqrt(5))
+- * K(j) = 0xA953FD4E (64 <= j <= 79) int(2**30 x sqrt(7))
+- * K'(j) = 0x50A28BE6 (0 <= j <= 15) int(2**30 x cbrt(2))
+- * K'(j) = 0x5C4DD124 (16 <= j <= 31) int(2**30 x cbrt(3))
+- * K'(j) = 0x6D703EF3 (32 <= j <= 47) int(2**30 x cbrt(5))
+- * K'(j) = 0x7A6D76E9 (48 <= j <= 63) int(2**30 x cbrt(7))
+- * K'(j) = 0x00000000 (64 <= j <= 79)
+- *
+- *
+- * selection of message word
+- *
+- * r(j) = j (0 <= j <= 15)
+- * r(16..31) = 7, 4, 13, 1, 10, 6, 15, 3, 12, 0, 9, 5, 2, 14, 11, 8
+- * r(32..47) = 3, 10, 14, 4, 9, 15, 8, 1, 2, 7, 0, 6, 13, 11, 5, 12
+- * r(48..63) = 1, 9, 11, 10, 0, 8, 12, 4, 13, 3, 7, 15, 14, 5, 6, 2
+- * r(64..79) = 4, 0, 5, 9, 7, 12, 2, 10, 14, 1, 3, 8, 11, 6, 15, 13
+- * r0(0..15) = 5, 14, 7, 0, 9, 2, 11, 4, 13, 6, 15, 8, 1, 10, 3, 12
+- * r0(16..31)= 6, 11, 3, 7, 0, 13, 5, 10, 14, 15, 8, 12, 4, 9, 1, 2
+- * r0(32..47)= 15, 5, 1, 3, 7, 14, 6, 9, 11, 8, 12, 2, 10, 0, 4, 13
+- * r0(48..63)= 8, 6, 4, 1, 3, 11, 15, 0, 5, 12, 2, 13, 9, 7, 10, 14
+- * r0(64..79)= 12, 15, 10, 4, 1, 5, 8, 7, 6, 2, 13, 14, 0, 3, 9, 11
+- *
+- *
+- * amount for rotate left (rol)
+- *
+- * s(0..15) = 11, 14, 15, 12, 5, 8, 7, 9, 11, 13, 14, 15, 6, 7, 9, 8
+- * s(16..31) = 7, 6, 8, 13, 11, 9, 7, 15, 7, 12, 15, 9, 11, 7, 13, 12
+- * s(32..47) = 11, 13, 6, 7, 14, 9, 13, 15, 14, 8, 13, 6, 5, 12, 7, 5
+- * s(48..63) = 11, 12, 14, 15, 14, 15, 9, 8, 9, 14, 5, 6, 8, 6, 5, 12
+- * s(64..79) = 9, 15, 5, 11, 6, 8, 13, 12, 5, 12, 13, 14, 11, 8, 5, 6
+- * s'(0..15) = 8, 9, 9, 11, 13, 15, 15, 5, 7, 7, 8, 11, 14, 14, 12, 6
+- * s'(16..31)= 9, 13, 15, 7, 12, 8, 9, 11, 7, 7, 12, 7, 6, 15, 13, 11
+- * s'(32..47)= 9, 7, 15, 11, 8, 6, 6, 14, 12, 13, 5, 14, 13, 13, 7, 5
+- * s'(48..63)= 15, 5, 8, 11, 14, 14, 6, 14, 6, 9, 12, 9, 12, 5, 15, 8
+- * s'(64..79)= 8, 5, 12, 9, 12, 5, 14, 6, 8, 13, 6, 5, 15, 13, 11, 11
+- *
+- *
+- * initial value (hexadecimal)
+- *
+- * h0 = 0x67452301; h1 = 0xEFCDAB89; h2 = 0x98BADCFE; h3 = 0x10325476;
+- * h4 = 0xC3D2E1F0;
+- *
+- *
+- * RIPEMD-160: pseudo-code
+- *
+- * It is assumed that the message after padding consists of t 16-word blocks
+- * that will be denoted with X[i][j], with 0 <= i <= t-1 and 0 <= j <= 15.
+- * The symbol [+] denotes addition modulo 2**32 and rol_s denotes cyclic left
+- * shift (rotate) over s positions.
+- *
+- *
+- * for i := 0 to t-1 {
+- * A := h0; B := h1; C := h2; D = h3; E = h4;
+- * A' := h0; B' := h1; C' := h2; D' = h3; E' = h4;
+- * for j := 0 to 79 {
+- * T := rol_s(j)(A [+] f(j, B, C, D) [+] X[i][r(j)] [+] K(j)) [+] E;
+- * A := E; E := D; D := rol_10(C); C := B; B := T;
+- * T := rol_s'(j)(A' [+] f(79-j, B', C', D') [+] X[i][r'(j)]
+- [+] K'(j)) [+] E';
+- * A' := E'; E' := D'; D' := rol_10(C'); C' := B'; B' := T;
+- * }
+- * T := h1 [+] C [+] D'; h1 := h2 [+] D [+] E'; h2 := h3 [+] E [+] A';
+- * h3 := h4 [+] A [+] B'; h4 := h0 [+] B [+] C'; h0 := T;
+- * }
+- */
+-
+-/* Some examples:
+- * "" 9c1185a5c5e9fc54612808977ee8f548b2258d31
+- * "a" 0bdc9d2d256b3ee9daae347be6f4dc835a467ffe
+- * "abc" 8eb208f7e05d987a9b044a8e98c6b087f15a0bfc
+- * "message digest" 5d0689ef49d2fae572b881b123a85ffa21595f36
+- * "a...z" f71c27109c692c1b56bbdceb5b9d2865b3708dbc
+- * "abcdbcde...nopq" 12a053384a9c0c88e405a06c27dcf49ada62eb2b
+- * "A...Za...z0...9" b0e20b6e3116640286ed3a87a5713079b21f5189
+- * 8 times "1234567890" 9b752e45573d4b39f4dbd3323cab82bf63326bfb
+- * 1 million times "a" 52783243c1697bdbe16d37f97f68f08325dc1528
+- */
+-
+-static void
+-burn_stack (int bytes)
+-{
+- char buf[150];
+-
+- memset (buf, 0, sizeof buf);
+- bytes -= sizeof buf;
+- if (bytes > 0)
+- burn_stack (bytes);
+-}
+-
+-
+-
+-void
+-rmd160_init( RMD160_CONTEXT *hd )
+-{
+- hd->h0 = 0x67452301;
+- hd->h1 = 0xEFCDAB89;
+- hd->h2 = 0x98BADCFE;
+- hd->h3 = 0x10325476;
+- hd->h4 = 0xC3D2E1F0;
+- hd->nblocks = 0;
+- hd->count = 0;
+-}
+-
+-
+-
+-/****************
+- * Transform the message X which consists of 16 32-bit-words
+- */
+-static void
+-transform( RMD160_CONTEXT *hd, byte *data )
+-{
+- u32 a,b,c,d,e,aa,bb,cc,dd,ee,t;
+- #ifdef BIG_ENDIAN_HOST
+- u32 x[16];
+- { int i;
+- byte *p2, *p1;
+- for(i=0, p1=data, p2=(byte*)x; i < 16; i++, p2 += 4 ) {
+- p2[3] = *p1++;
+- p2[2] = *p1++;
+- p2[1] = *p1++;
+- p2[0] = *p1++;
+- }
+- }
+- #else
+- #if 0
+- u32 *x =(u32*)data;
+- #else
+- /* this version is better because it is always aligned;
+- * The performance penalty on a 586-100 is about 6% which
+- * is acceptable - because the data is more local it might
+- * also be possible that this is faster on some machines.
+- * This function (when compiled with -02 on gcc 2.7.2)
+- * executes on a 586-100 (39.73 bogomips) at about 1900kb/sec;
+- * [measured with a 4MB data and "gpgm --print-md rmd160"] */
+- u32 x[16];
+- memcpy( x, data, 64 );
+- #endif
+- #endif
+-
+-
+-#define K0 0x00000000
+-#define K1 0x5A827999
+-#define K2 0x6ED9EBA1
+-#define K3 0x8F1BBCDC
+-#define K4 0xA953FD4E
+-#define KK0 0x50A28BE6
+-#define KK1 0x5C4DD124
+-#define KK2 0x6D703EF3
+-#define KK3 0x7A6D76E9
+-#define KK4 0x00000000
+-#define F0(x,y,z) ( (x) ^ (y) ^ (z) )
+-#define F1(x,y,z) ( ((x) & (y)) | (~(x) & (z)) )
+-#define F2(x,y,z) ( ((x) | ~(y)) ^ (z) )
+-#define F3(x,y,z) ( ((x) & (z)) | ((y) & ~(z)) )
+-#define F4(x,y,z) ( (x) ^ ((y) | ~(z)) )
+-#define R(a,b,c,d,e,f,k,r,s) do { t = a + f(b,c,d) + k + x[r]; \
+- a = rol(t,s) + e; \
+- c = rol(c,10); \
+- } while(0)
+-
+- /* left lane */
+- a = hd->h0;
+- b = hd->h1;
+- c = hd->h2;
+- d = hd->h3;
+- e = hd->h4;
+- R( a, b, c, d, e, F0, K0, 0, 11 );
+- R( e, a, b, c, d, F0, K0, 1, 14 );
+- R( d, e, a, b, c, F0, K0, 2, 15 );
+- R( c, d, e, a, b, F0, K0, 3, 12 );
+- R( b, c, d, e, a, F0, K0, 4, 5 );
+- R( a, b, c, d, e, F0, K0, 5, 8 );
+- R( e, a, b, c, d, F0, K0, 6, 7 );
+- R( d, e, a, b, c, F0, K0, 7, 9 );
+- R( c, d, e, a, b, F0, K0, 8, 11 );
+- R( b, c, d, e, a, F0, K0, 9, 13 );
+- R( a, b, c, d, e, F0, K0, 10, 14 );
+- R( e, a, b, c, d, F0, K0, 11, 15 );
+- R( d, e, a, b, c, F0, K0, 12, 6 );
+- R( c, d, e, a, b, F0, K0, 13, 7 );
+- R( b, c, d, e, a, F0, K0, 14, 9 );
+- R( a, b, c, d, e, F0, K0, 15, 8 );
+- R( e, a, b, c, d, F1, K1, 7, 7 );
+- R( d, e, a, b, c, F1, K1, 4, 6 );
+- R( c, d, e, a, b, F1, K1, 13, 8 );
+- R( b, c, d, e, a, F1, K1, 1, 13 );
+- R( a, b, c, d, e, F1, K1, 10, 11 );
+- R( e, a, b, c, d, F1, K1, 6, 9 );
+- R( d, e, a, b, c, F1, K1, 15, 7 );
+- R( c, d, e, a, b, F1, K1, 3, 15 );
+- R( b, c, d, e, a, F1, K1, 12, 7 );
+- R( a, b, c, d, e, F1, K1, 0, 12 );
+- R( e, a, b, c, d, F1, K1, 9, 15 );
+- R( d, e, a, b, c, F1, K1, 5, 9 );
+- R( c, d, e, a, b, F1, K1, 2, 11 );
+- R( b, c, d, e, a, F1, K1, 14, 7 );
+- R( a, b, c, d, e, F1, K1, 11, 13 );
+- R( e, a, b, c, d, F1, K1, 8, 12 );
+- R( d, e, a, b, c, F2, K2, 3, 11 );
+- R( c, d, e, a, b, F2, K2, 10, 13 );
+- R( b, c, d, e, a, F2, K2, 14, 6 );
+- R( a, b, c, d, e, F2, K2, 4, 7 );
+- R( e, a, b, c, d, F2, K2, 9, 14 );
+- R( d, e, a, b, c, F2, K2, 15, 9 );
+- R( c, d, e, a, b, F2, K2, 8, 13 );
+- R( b, c, d, e, a, F2, K2, 1, 15 );
+- R( a, b, c, d, e, F2, K2, 2, 14 );
+- R( e, a, b, c, d, F2, K2, 7, 8 );
+- R( d, e, a, b, c, F2, K2, 0, 13 );
+- R( c, d, e, a, b, F2, K2, 6, 6 );
+- R( b, c, d, e, a, F2, K2, 13, 5 );
+- R( a, b, c, d, e, F2, K2, 11, 12 );
+- R( e, a, b, c, d, F2, K2, 5, 7 );
+- R( d, e, a, b, c, F2, K2, 12, 5 );
+- R( c, d, e, a, b, F3, K3, 1, 11 );
+- R( b, c, d, e, a, F3, K3, 9, 12 );
+- R( a, b, c, d, e, F3, K3, 11, 14 );
+- R( e, a, b, c, d, F3, K3, 10, 15 );
+- R( d, e, a, b, c, F3, K3, 0, 14 );
+- R( c, d, e, a, b, F3, K3, 8, 15 );
+- R( b, c, d, e, a, F3, K3, 12, 9 );
+- R( a, b, c, d, e, F3, K3, 4, 8 );
+- R( e, a, b, c, d, F3, K3, 13, 9 );
+- R( d, e, a, b, c, F3, K3, 3, 14 );
+- R( c, d, e, a, b, F3, K3, 7, 5 );
+- R( b, c, d, e, a, F3, K3, 15, 6 );
+- R( a, b, c, d, e, F3, K3, 14, 8 );
+- R( e, a, b, c, d, F3, K3, 5, 6 );
+- R( d, e, a, b, c, F3, K3, 6, 5 );
+- R( c, d, e, a, b, F3, K3, 2, 12 );
+- R( b, c, d, e, a, F4, K4, 4, 9 );
+- R( a, b, c, d, e, F4, K4, 0, 15 );
+- R( e, a, b, c, d, F4, K4, 5, 5 );
+- R( d, e, a, b, c, F4, K4, 9, 11 );
+- R( c, d, e, a, b, F4, K4, 7, 6 );
+- R( b, c, d, e, a, F4, K4, 12, 8 );
+- R( a, b, c, d, e, F4, K4, 2, 13 );
+- R( e, a, b, c, d, F4, K4, 10, 12 );
+- R( d, e, a, b, c, F4, K4, 14, 5 );
+- R( c, d, e, a, b, F4, K4, 1, 12 );
+- R( b, c, d, e, a, F4, K4, 3, 13 );
+- R( a, b, c, d, e, F4, K4, 8, 14 );
+- R( e, a, b, c, d, F4, K4, 11, 11 );
+- R( d, e, a, b, c, F4, K4, 6, 8 );
+- R( c, d, e, a, b, F4, K4, 15, 5 );
+- R( b, c, d, e, a, F4, K4, 13, 6 );
+-
+- aa = a; bb = b; cc = c; dd = d; ee = e;
+-
+- /* right lane */
+- a = hd->h0;
+- b = hd->h1;
+- c = hd->h2;
+- d = hd->h3;
+- e = hd->h4;
+- R( a, b, c, d, e, F4, KK0, 5, 8);
+- R( e, a, b, c, d, F4, KK0, 14, 9);
+- R( d, e, a, b, c, F4, KK0, 7, 9);
+- R( c, d, e, a, b, F4, KK0, 0, 11);
+- R( b, c, d, e, a, F4, KK0, 9, 13);
+- R( a, b, c, d, e, F4, KK0, 2, 15);
+- R( e, a, b, c, d, F4, KK0, 11, 15);
+- R( d, e, a, b, c, F4, KK0, 4, 5);
+- R( c, d, e, a, b, F4, KK0, 13, 7);
+- R( b, c, d, e, a, F4, KK0, 6, 7);
+- R( a, b, c, d, e, F4, KK0, 15, 8);
+- R( e, a, b, c, d, F4, KK0, 8, 11);
+- R( d, e, a, b, c, F4, KK0, 1, 14);
+- R( c, d, e, a, b, F4, KK0, 10, 14);
+- R( b, c, d, e, a, F4, KK0, 3, 12);
+- R( a, b, c, d, e, F4, KK0, 12, 6);
+- R( e, a, b, c, d, F3, KK1, 6, 9);
+- R( d, e, a, b, c, F3, KK1, 11, 13);
+- R( c, d, e, a, b, F3, KK1, 3, 15);
+- R( b, c, d, e, a, F3, KK1, 7, 7);
+- R( a, b, c, d, e, F3, KK1, 0, 12);
+- R( e, a, b, c, d, F3, KK1, 13, 8);
+- R( d, e, a, b, c, F3, KK1, 5, 9);
+- R( c, d, e, a, b, F3, KK1, 10, 11);
+- R( b, c, d, e, a, F3, KK1, 14, 7);
+- R( a, b, c, d, e, F3, KK1, 15, 7);
+- R( e, a, b, c, d, F3, KK1, 8, 12);
+- R( d, e, a, b, c, F3, KK1, 12, 7);
+- R( c, d, e, a, b, F3, KK1, 4, 6);
+- R( b, c, d, e, a, F3, KK1, 9, 15);
+- R( a, b, c, d, e, F3, KK1, 1, 13);
+- R( e, a, b, c, d, F3, KK1, 2, 11);
+- R( d, e, a, b, c, F2, KK2, 15, 9);
+- R( c, d, e, a, b, F2, KK2, 5, 7);
+- R( b, c, d, e, a, F2, KK2, 1, 15);
+- R( a, b, c, d, e, F2, KK2, 3, 11);
+- R( e, a, b, c, d, F2, KK2, 7, 8);
+- R( d, e, a, b, c, F2, KK2, 14, 6);
+- R( c, d, e, a, b, F2, KK2, 6, 6);
+- R( b, c, d, e, a, F2, KK2, 9, 14);
+- R( a, b, c, d, e, F2, KK2, 11, 12);
+- R( e, a, b, c, d, F2, KK2, 8, 13);
+- R( d, e, a, b, c, F2, KK2, 12, 5);
+- R( c, d, e, a, b, F2, KK2, 2, 14);
+- R( b, c, d, e, a, F2, KK2, 10, 13);
+- R( a, b, c, d, e, F2, KK2, 0, 13);
+- R( e, a, b, c, d, F2, KK2, 4, 7);
+- R( d, e, a, b, c, F2, KK2, 13, 5);
+- R( c, d, e, a, b, F1, KK3, 8, 15);
+- R( b, c, d, e, a, F1, KK3, 6, 5);
+- R( a, b, c, d, e, F1, KK3, 4, 8);
+- R( e, a, b, c, d, F1, KK3, 1, 11);
+- R( d, e, a, b, c, F1, KK3, 3, 14);
+- R( c, d, e, a, b, F1, KK3, 11, 14);
+- R( b, c, d, e, a, F1, KK3, 15, 6);
+- R( a, b, c, d, e, F1, KK3, 0, 14);
+- R( e, a, b, c, d, F1, KK3, 5, 6);
+- R( d, e, a, b, c, F1, KK3, 12, 9);
+- R( c, d, e, a, b, F1, KK3, 2, 12);
+- R( b, c, d, e, a, F1, KK3, 13, 9);
+- R( a, b, c, d, e, F1, KK3, 9, 12);
+- R( e, a, b, c, d, F1, KK3, 7, 5);
+- R( d, e, a, b, c, F1, KK3, 10, 15);
+- R( c, d, e, a, b, F1, KK3, 14, 8);
+- R( b, c, d, e, a, F0, KK4, 12, 8);
+- R( a, b, c, d, e, F0, KK4, 15, 5);
+- R( e, a, b, c, d, F0, KK4, 10, 12);
+- R( d, e, a, b, c, F0, KK4, 4, 9);
+- R( c, d, e, a, b, F0, KK4, 1, 12);
+- R( b, c, d, e, a, F0, KK4, 5, 5);
+- R( a, b, c, d, e, F0, KK4, 8, 14);
+- R( e, a, b, c, d, F0, KK4, 7, 6);
+- R( d, e, a, b, c, F0, KK4, 6, 8);
+- R( c, d, e, a, b, F0, KK4, 2, 13);
+- R( b, c, d, e, a, F0, KK4, 13, 6);
+- R( a, b, c, d, e, F0, KK4, 14, 5);
+- R( e, a, b, c, d, F0, KK4, 0, 15);
+- R( d, e, a, b, c, F0, KK4, 3, 13);
+- R( c, d, e, a, b, F0, KK4, 9, 11);
+- R( b, c, d, e, a, F0, KK4, 11, 11);
+-
+-
+- t = hd->h1 + d + cc;
+- hd->h1 = hd->h2 + e + dd;
+- hd->h2 = hd->h3 + a + ee;
+- hd->h3 = hd->h4 + b + aa;
+- hd->h4 = hd->h0 + c + bb;
+- hd->h0 = t;
+-}
+-
+-
+-/* Update the message digest with the contents
+- * of INBUF with length INLEN.
+- */
+-static void
+-rmd160_write( RMD160_CONTEXT *hd, byte *inbuf, size_t inlen)
+-{
+- if( hd->count == 64 ) { /* flush the buffer */
+- transform( hd, hd->buf );
+- burn_stack (108+5*sizeof(void*));
+- hd->count = 0;
+- hd->nblocks++;
+- }
+- if( !inbuf )
+- return;
+- if( hd->count ) {
+- for( ; inlen && hd->count < 64; inlen-- )
+- hd->buf[hd->count++] = *inbuf++;
+- rmd160_write( hd, NULL, 0 );
+- if( !inlen )
+- return;
+- }
+-
+- while( inlen >= 64 ) {
+- transform( hd, inbuf );
+- hd->count = 0;
+- hd->nblocks++;
+- inlen -= 64;
+- inbuf += 64;
+- }
+- burn_stack (108+5*sizeof(void*));
+- for( ; inlen && hd->count < 64; inlen-- )
+- hd->buf[hd->count++] = *inbuf++;
+-}
+-
+-/****************
+- * Apply the rmd160 transform function on the buffer which must have
+- * a length 64 bytes. Do not use this function together with the
+- * other functions, use rmd160_init to initialize internal variables.
+- * Returns: 16 bytes in buffer with the mixed contentes of buffer.
+- */
+-void
+-rmd160_mixblock( RMD160_CONTEXT *hd, char *buffer )
+-{
+- char *p = buffer;
+- transform( hd, buffer );
+- #define X(a) do { *(u32*)p = hd->h##a ; p += 4; } while(0)
+- X(0);
+- X(1);
+- X(2);
+- X(3);
+- X(4);
+- #undef X
+-}
+-
+-
+-/* The routine terminates the computation
+- */
+-
+-static void
+-rmd160_final( RMD160_CONTEXT *hd )
+-{
+- u32 t, msb, lsb;
+- byte *p;
+-
+- rmd160_write(hd, NULL, 0); /* flush */;
+-
+- t = hd->nblocks;
+- /* multiply by 64 to make a byte count */
+- lsb = t << 6;
+- msb = t >> 26;
+- /* add the count */
+- t = lsb;
+- if( (lsb += hd->count) < t )
+- msb++;
+- /* multiply by 8 to make a bit count */
+- t = lsb;
+- lsb <<= 3;
+- msb <<= 3;
+- msb |= t >> 29;
+-
+- if( hd->count < 56 ) { /* enough room */
+- hd->buf[hd->count++] = 0x80; /* pad */
+- while( hd->count < 56 )
+- hd->buf[hd->count++] = 0; /* pad */
+- }
+- else { /* need one extra block */
+- hd->buf[hd->count++] = 0x80; /* pad character */
+- while( hd->count < 64 )
+- hd->buf[hd->count++] = 0;
+- rmd160_write(hd, NULL, 0); /* flush */;
+- memset(hd->buf, 0, 56 ); /* fill next block with zeroes */
+- }
+- /* append the 64 bit count */
+- hd->buf[56] = lsb ;
+- hd->buf[57] = lsb >> 8;
+- hd->buf[58] = lsb >> 16;
+- hd->buf[59] = lsb >> 24;
+- hd->buf[60] = msb ;
+- hd->buf[61] = msb >> 8;
+- hd->buf[62] = msb >> 16;
+- hd->buf[63] = msb >> 24;
+- transform( hd, hd->buf );
+- burn_stack (108+5*sizeof(void*));
+-
+- p = hd->buf;
+- #ifdef BIG_ENDIAN_HOST
+- #define X(a) do { *p++ = hd->h##a ; *p++ = hd->h##a >> 8; \
+- *p++ = hd->h##a >> 16; *p++ = hd->h##a >> 24; } while(0)
+- #else /* little endian */
+- #define X(a) do { *(u32*)p = hd->h##a ; p += 4; } while(0)
+- #endif
+- X(0);
+- X(1);
+- X(2);
+- X(3);
+- X(4);
+- #undef X
+-}
+-
+-static byte *
+-rmd160_read( RMD160_CONTEXT *hd )
+-{
+- return hd->buf;
+-}
+-
+-
+-
+-/****************
+- * Shortcut functions which puts the hash value of the supplied buffer
+- * into outbuf which must have a size of 20 bytes.
+- */
+-void
+-rmd160_hash_buffer( char *outbuf, const char *buffer, size_t length )
+-{
+- RMD160_CONTEXT hd;
+-
+- rmd160_init( &hd );
+- rmd160_write( &hd, (byte*)buffer, length );
+- rmd160_final( &hd );
+- memcpy( outbuf, hd.buf, 20 );
+-}
+-
+-
+-/****************
+- * Return some information about the algorithm. We need algo here to
+- * distinguish different flavors of the algorithm.
+- * Returns: A pointer to string describing the algorithm or NULL if
+- * the ALGO is invalid.
+- */
+-static const char *
+-rmd160_get_info( int algo, size_t *contextsize,
+- byte **r_asnoid, int *r_asnlen, int *r_mdlen,
+- void (**r_init)( void *c ),
+- void (**r_write)( void *c, byte *buf, size_t nbytes ),
+- void (**r_final)( void *c ),
+- byte *(**r_read)( void *c )
+- )
+-{
+- static byte asn[15] = /* Object ID is 1.3.36.3.2.1 */
+- { 0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2b, 0x24, 0x03,
+- 0x02, 0x01, 0x05, 0x00, 0x04, 0x14 };
+-
+- if( algo != 3 )
+- return NULL;
+-
+- *contextsize = sizeof(RMD160_CONTEXT);
+- *r_asnoid = asn;
+- *r_asnlen = DIM(asn);
+- *r_mdlen = 20;
+- *(void (**)(RMD160_CONTEXT *))r_init = rmd160_init;
+- *(void (**)(RMD160_CONTEXT *, byte*, size_t))r_write = rmd160_write;
+- *(void (**)(RMD160_CONTEXT *))r_final = rmd160_final;
+- *(byte *(**)(RMD160_CONTEXT *))r_read = rmd160_read;
+-
+- return "RIPEMD160";
+-}
+-
+-
+-#ifndef IS_MODULE
+-static
+-#endif
+-const char * const gnupgext_version = "RMD160 ($Revision: 1.17.2.4 $)";
+-
+-static struct {
+- int class;
+- int version;
+- int value;
+- void (*func)(void);
+-} func_table[] = {
+- { 10, 1, 0, (void(*)(void))rmd160_get_info },
+- { 11, 1, 3 },
+-};
+-
+-
+-#ifndef IS_MODULE
+-static
+-#endif
+-void *
+-gnupgext_enum_func( int what, int *sequence, int *class, int *vers )
+-{
+- void *ret;
+- int i = *sequence;
+-
+- do {
+- if( i >= DIM(func_table) || i < 0 ) {
+- return NULL;
+- }
+- *class = func_table[i].class;
+- *vers = func_table[i].version;
+- switch( *class ) {
+- case 11:
+- case 21:
+- case 31:
+- ret = &func_table[i].value;
+- break;
+- default:
+- ret = func_table[i].func;
+- break;
+- }
+- i++;
+- } while( what && what != *class );
+-
+- *sequence = i;
+- return ret;
+-}
+-
+-
+-
+-#ifndef __HURD__
+-#ifndef IS_MODULE
+-void
+-rmd160_constructor(void)
+-{
+- register_internal_cipher_extension( gnupgext_version, gnupgext_enum_func );
+-}
+-#endif
+-#endif
+diff --git a/random/random.c b/random/random.c
+deleted file mode 100644
+index 8f76c5b..0000000
+--- a/random/random.c
++++ /dev/null
+@@ -1,650 +0,0 @@
+-/* random.c - A single-file translator providing random data
+- Copyright (C) 1998, 1999, 2001 Free Software Foundation, Inc.
+-
+- This program is free software; you can redistribute it and/or
+- modify it under the terms of the GNU General Public License as
+- published by the Free Software Foundation; either version 2, or (at
+- your option) any later version.
+-
+- This program is distributed in the hope that it will be useful, but
+- WITHOUT ANY WARRANTY; without even the implied warranty of
+- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+- General Public License for more details.
+-
+- You should have received a copy of the GNU General Public License
+- along with this program; if not, write to the Free Software
+- Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */
+-
+-#define _GNU_SOURCE 1
+-
+-#include <hurd/paths.h>
+-#include <hurd/trivfs.h>
+-#include <hurd/startup.h>
+-#include <stdio.h>
+-#include <stdlib.h>
+-#include <argp.h>
+-#include <argz.h>
+-#include <error.h>
+-#include <string.h>
+-#include <fcntl.h>
+-#include <sys/mman.h>
+-#include <pthread.h>
+-#include <assert.h>
+-
+-#include <version.h>
+-
+-#include "random.h"
+-#include "gnupg-random.h"
+-
+-/* Our control port. */
+-struct trivfs_control *fsys;
+-
+-int read_blocked; /* For read and select. */
+-pthread_cond_t wait; /* For read and select. */
+-pthread_cond_t select_alert; /* For read and select. */
+-
+-
+-/* The quality of randomness we provide.
+- 0: Very weak randomness based on time() and getrusage().
+- No external random data is used.
+- 1: Pseudo random numbers based on all available real random
+- numbers.
+- 2: Strong random numbers with a somewhat guaranteed entropy.
+-*/
+-#define DEFAULT_LEVEL 2
+-static int level = DEFAULT_LEVEL;
+-
+-/* Name of file to use as seed. */
+-static char *seed_file;
+-
+-/* The random bytes we collected. */
+-char gatherbuf[GATHERBUFSIZE];
+-
+-/* The current positions in gatherbuf[]. */
+-int gatherrpos;
+-int gatherwpos;
+-
+-/* XXX Yuk Yuk. */
+-#define POOLSIZE 600
+-
+-/* Take up to length bytes from gather_random if available. If
+- nothing is available, sleep until something becomes available.
+- Must be called with global_lock held. */
+-int
+-gather_random( void (*add)(const void*, size_t, int), int requester,
+- size_t length, int level )
+-{
+- int avail = (gatherwpos - gatherrpos + GATHERBUFSIZE) % GATHERBUFSIZE;
+- int first = GATHERBUFSIZE - gatherrpos;
+- int second = length - first;
+-
+- /* If level is zero, we should not block and not add anything
+- to the pool. */
+- if( !level )
+- return 0;
+-
+- /* io_read() should guarantee that there is always data available. */
+- if (level == 2)
+- assert (avail);
+-
+- if (length > avail)
+- length = avail;
+-
+- if (first > length)
+- first = length;
+- (*add) (&gatherbuf[gatherrpos], first, requester);
+- gatherrpos = (gatherrpos + first) % GATHERBUFSIZE;
+- if (second > 0)
+- {
+- (*add) (&gatherbuf[gatherrpos], second, requester);
+- gatherrpos += second;
+- }
+- return length;
+-}
+-
+-
+-const char *argp_program_version = STANDARD_HURD_VERSION (random);
+-
+-/* This lock protects the GnuPG code. */
+-static pthread_mutex_t global_lock;
+-
+-/* Trivfs hooks. */
+-int trivfs_fstype = FSTYPE_MISC;
+-int trivfs_fsid = 0;
+-
+-int trivfs_allow_open = O_READ | O_WRITE;
+-
+-int trivfs_support_read = 1;
+-int trivfs_support_write = 1;
+-int trivfs_support_exec = 0;
+-
+-void
+-trivfs_modify_stat (struct trivfs_protid *cred, struct stat *st)
+-{
+- /* Mark the node as a read-only plain file. */
+- st->st_mode &= ~S_IFMT;
+- st->st_mode |= (S_IFCHR);
+- st->st_size = 0;
+-}
+-
+-error_t
+-trivfs_goaway (struct trivfs_control *cntl, int flags)
+-{
+- update_random_seed_file ();
+- exit (0);
+-}
+-
+-/* Read data from an IO object. If offset is -1, read from the object
+- maintained file pointer. If the object is not seekable, offset is
+- ignored. The amount desired to be read is in AMOUNT. */
+-error_t
+-trivfs_S_io_read (struct trivfs_protid *cred,
+- mach_port_t reply, mach_msg_type_name_t reply_type,
+- data_t *data, mach_msg_type_number_t *data_len,
+- loff_t offs, mach_msg_type_number_t amount)
+-{
+- error_t err;
+- mach_msg_type_number_t read_amount = 0;
+- void *buf = NULL;
+- size_t length;
+-
+- /* Deny access if they have bad credentials. */
+- if (! cred)
+- return EOPNOTSUPP;
+- else if (! (cred->po->openmodes & O_READ))
+- return EBADF;
+-
+- pthread_mutex_lock (&global_lock);
+-
+- while (amount > 0)
+- {
+- mach_msg_type_number_t new_amount;
+- /* XXX: It would be nice to fix readable_pool to work for sizes
+- greater than the POOLSIZE. Otherwise we risk detecting too
+- late that we run out of entropy and all that entropy is
+- wasted. */
+- while (readable_pool (amount, level) == 0)
+- {
+- if (cred->po->openmodes & O_NONBLOCK)
+- {
+- pthread_mutex_unlock (&global_lock);
+- err = EWOULDBLOCK;
+- goto errout;
+- }
+- read_blocked = 1;
+- if (pthread_hurd_cond_wait_np (&wait, &global_lock))
+- {
+- pthread_mutex_unlock (&global_lock);
+- err = EINTR;
+- goto errout;
+- }
+- /* See term/users.c for possible race? */
+- }
+-
+- /* Possibly allocate a new buffer. */
+- if (*data_len < amount)
+- {
+- *data = mmap (0, amount, PROT_READ|PROT_WRITE,
+- MAP_ANON, 0, 0);
+-
+- if (*data == MAP_FAILED)
+- {
+- pthread_mutex_unlock (&global_lock);
+- return errno;
+- }
+-
+- /* Keep track of our map in case of errors. */
+- buf = *data, length = amount;
+-
+- /* Update DATA_LEN to reflect the new buffers size. */
+- *data_len = amount;
+- }
+-
+- new_amount = read_pool (((byte *) *data) + read_amount, amount, level);
+- read_amount += new_amount;
+- amount -= new_amount;
+- }
+-
+- /* Set atime, see term/users.c */
+-
+- pthread_mutex_unlock (&global_lock);
+- *data_len = read_amount;
+- return 0;
+-
+- errout:
+- if (buf)
+- munmap (buf, length);
+- return err;
+-}
+-
+-/* Write data to an IO object. If offset is -1, write at the object
+- maintained file pointer. If the object is not seekable, offset is
+- ignored. The amount successfully written is returned in amount. A
+- given user should not have more than one outstanding io_write on an
+- object at a time; servers implement congestion control by delaying
+- responses to io_write. Servers may drop data (returning ENOBUFS)
+- if they receive more than one write when not prepared for it. */
+-error_t
+-trivfs_S_io_write (struct trivfs_protid *cred,
+- mach_port_t reply,
+- mach_msg_type_name_t replytype,
+- data_t data,
+- mach_msg_type_number_t datalen,
+- loff_t offset,
+- mach_msg_type_number_t *amount)
+-{
+- int i = 0;
+- /* Deny access if they have bad credentials. */
+- if (! cred)
+- return EOPNOTSUPP;
+- else if (! (cred->po->openmodes & O_WRITE))
+- return EBADF;
+-
+- pthread_mutex_lock (&global_lock);
+-
+- while (i < datalen)
+- {
+- gatherbuf[gatherwpos] = data[i++];
+- gatherwpos = (gatherwpos + 1) % GATHERBUFSIZE;
+- if (gatherrpos == gatherwpos)
+- /* Overrun. */
+- gatherrpos = (gatherrpos + 1) % GATHERBUFSIZE;
+- }
+- *amount = datalen;
+-
+- if (datalen > 0 && read_blocked)
+- {
+- read_blocked = 0;
+- pthread_cond_broadcast (&wait);
+- pthread_cond_broadcast (&select_alert);
+- }
+-
+- pthread_mutex_unlock (&global_lock);
+- return 0;
+-}
+-
+-/* Tell how much data can be read from the object without blocking for
+- a "long time" (this should be the same meaning of "long time" used
+- by the nonblocking flag. */
+-kern_return_t
+-trivfs_S_io_readable (struct trivfs_protid *cred,
+- mach_port_t reply, mach_msg_type_name_t replytype,
+- mach_msg_type_number_t *amount)
+-{
+- /* Deny access if they have bad credentials. */
+- if (! cred)
+- return EOPNOTSUPP;
+- else if (! (cred->po->openmodes & O_READ))
+- return EBADF;
+-
+- pthread_mutex_lock (&global_lock);
+-
+- /* XXX: Before initialization, the amount depends on the amount we
+- want to read. Assume some medium value. */
+- *amount = readable_pool (POOLSIZE/2, level);
+-
+- pthread_mutex_unlock (&global_lock);
+-
+- return 0;
+-}
+-
+-/* SELECT_TYPE is the bitwise OR of SELECT_READ, SELECT_WRITE, and SELECT_URG.
+- Block until one of the indicated types of i/o can be done "quickly", and
+- return the types that are then available. ID_TAG is returned as passed; it
+- is just for the convenience of the user in matching up reply messages with
+- specific requests sent. */
+-error_t
+-trivfs_S_io_select (struct trivfs_protid *cred,
+- mach_port_t reply,
+- mach_msg_type_name_t reply_type,
+- int *type)
+-{
+- if (!cred)
+- return EOPNOTSUPP;
+-
+- /* We only deal with SELECT_READ and SELECT_WRITE here. */
+- if (*type & ~(SELECT_READ | SELECT_WRITE))
+- return EINVAL;
+-
+- if (*type == 0)
+- return 0;
+-
+- pthread_mutex_lock (&global_lock);
+-
+- while (1)
+- {
+- /* XXX Before initialization, readable_pool depends on length. */
+- int avail = readable_pool (POOLSIZE/2, level);
+-
+- if (avail != 0 || *type & SELECT_WRITE)
+- {
+- *type = (avail ? SELECT_READ : 0) | (*type & SELECT_WRITE);
+- pthread_mutex_unlock (&global_lock);
+- return 0;
+- }
+-
+- ports_interrupt_self_on_port_death (cred, reply);
+- read_blocked = 1;
+-
+- if (pthread_hurd_cond_wait_np (&select_alert, &global_lock))
+- {
+- *type = 0;
+- pthread_mutex_unlock (&global_lock);
+- return EINTR;
+- }
+- }
+-}
+-
+-
+-/* Change current read/write offset */
+-error_t
+-trivfs_S_io_seek (struct trivfs_protid *cred,
+- mach_port_t reply, mach_msg_type_name_t reply_type,
+- loff_t offs, int whence, loff_t *new_offs)
+-{
+- if (! cred)
+- return EOPNOTSUPP;
+-
+- /* Not seekable. */
+- return ESPIPE;
+-}
+-
+-/* Change the size of the file. If the size increases, new blocks are
+- zero-filled. After successful return, it is safe to reference mapped
+- areas of the file up to NEW_SIZE. */
+-error_t
+-trivfs_S_file_set_size (struct trivfs_protid *cred,
+- mach_port_t reply, mach_msg_type_name_t reply_type,
+- loff_t size)
+-{
+- if (!cred)
+- return EOPNOTSUPP;
+-
+- return size == 0 ? 0 : EINVAL;
+-}
+-
+-/* These four routines modify the O_APPEND, O_ASYNC, O_FSYNC, and
+- O_NONBLOCK bits for the IO object. In addition, io_get_openmodes
+- will tell you which of O_READ, O_WRITE, and O_EXEC the object can
+- be used for. The O_ASYNC bit affects icky async I/O; good async
+- I/O is done through io_async which is orthogonal to these calls. */
+-error_t
+-trivfs_S_io_set_all_openmodes(struct trivfs_protid *cred,
+- mach_port_t reply,
+- mach_msg_type_name_t reply_type,
+- int mode)
+-{
+- if (!cred)
+- return EOPNOTSUPP;
+-
+- return 0;
+-}
+-
+-error_t
+-trivfs_S_io_set_some_openmodes (struct trivfs_protid *cred,
+- mach_port_t reply,
+- mach_msg_type_name_t reply_type,
+- int bits)
+-{
+- if (!cred)
+- return EOPNOTSUPP;
+-
+- return 0;
+-}
+-
+-error_t
+-trivfs_S_io_get_owner (struct trivfs_protid *cred,
+- mach_port_t reply,
+- mach_msg_type_name_t reply_type,
+- pid_t *owner)
+-{
+- if (!cred)
+- return EOPNOTSUPP;
+-
+- *owner = 0;
+- return 0;
+-}
+-
+-error_t
+-trivfs_S_io_mod_owner (struct trivfs_protid *cred,
+- mach_port_t reply, mach_msg_type_name_t reply_type,
+- pid_t owner)
+-{
+- if (!cred)
+- return EOPNOTSUPP;
+-
+- return EINVAL;
+-}
+-
+-/* Return objects mapping the data underlying this memory object. If
+- the object can be read then memobjrd will be provided; if the
+- object can be written then memobjwr will be provided. For objects
+- where read data and write data are the same, these objects will be
+- equal, otherwise they will be disjoint. Servers are permitted to
+- implement io_map but not io_map_cntl. Some objects do not provide
+- mapping; they will set none of the ports and return an error. Such
+- objects can still be accessed by io_read and io_write. */
+-error_t
+-trivfs_S_io_map(struct trivfs_protid *cred,
+- mach_port_t reply, mach_msg_type_name_t reply_type,
+- mach_port_t *rdobj,
+- mach_msg_type_name_t *rdtype,
+- mach_port_t *wrobj,
+- mach_msg_type_name_t *wrtype)
+-{
+- if (!cred)
+- return EOPNOTSUPP;
+-
+- return EINVAL;
+-}
+-
+-
+-int
+-random_demuxer (mach_msg_header_t *inp,
+- mach_msg_header_t *outp)
+-{
+- extern int startup_notify_server (mach_msg_header_t *, mach_msg_header_t *);
+-
+- return (trivfs_demuxer (inp, outp)
+- || startup_notify_server (inp, outp));
+-}
+-
+-
+-/* Options processing. We accept the same options on the command line
+- and from fsys_set_options. */
+-
+-static const struct argp_option options[] =
+-{
+- {"weak", 'w', 0, 0, "Output weak pseudo random data"},
+- {"fast", 'f', 0, 0, "Output cheap random data fast"},
+- {"secure", 's', 0, 0, "Output cryptographically secure random"},
+- {"seed-file", 'S', "FILE", 0, "Use FILE to remember the seed"},
+- {0}
+-};
+-
+-static error_t
+-parse_opt (int opt, char *arg, struct argp_state *state)
+-{
+- switch (opt)
+- {
+- default:
+- return ARGP_ERR_UNKNOWN;
+- case ARGP_KEY_INIT:
+- case ARGP_KEY_SUCCESS:
+- case ARGP_KEY_ERROR:
+- break;
+-
+- case 'w':
+- {
+- level = 0;
+- break;
+- }
+- case 'f':
+- {
+- level = 1;
+- break;
+- }
+- case 's':
+- {
+- level = 2;
+- break;
+- }
+- case 'S':
+- {
+- seed_file = strdup (arg);
+- set_random_seed_file (arg);
+- }
+- }
+- return 0;
+-}
+-
+-/* This will be called from libtrivfs to help construct the answer
+- to an fsys_get_options RPC. */
+-error_t
+-trivfs_append_args (struct trivfs_control *fsys,
+- char **argz, size_t *argz_len)
+-{
+- error_t err = 0;
+- char *opt;
+-
+- pthread_mutex_lock (&global_lock);
+- switch (level)
+- {
+- case 0:
+- opt = "--weak";
+- break;
+-
+- case 1:
+- opt = "--fast";
+- break;
+-
+- default:
+- opt = "--secure";
+- }
+- if (level != DEFAULT_LEVEL)
+- err = argz_add (argz, argz_len, opt);
+-
+- if (!err && seed_file)
+- {
+- if (asprintf (&opt, "--seed-file=%s", seed_file) < 0)
+- err = ENOMEM;
+- else
+- {
+- err = argz_add (argz, argz_len, opt);
+- free (opt);
+- }
+- }
+- pthread_mutex_unlock (&global_lock);
+-
+- return err;
+-}
+-
+-static struct argp random_argp =
+-{ options, parse_opt, 0,
+- "A translator providing random output." };
+-
+-/* Setting this variable makes libtrivfs use our argp to
+- parse options passed in an fsys_set_options RPC. */
+-struct argp *trivfs_runtime_argp = &random_argp;
+-
+-struct port_class *shutdown_notify_class;
+-
+-/* The system is going down; destroy all the extant port rights. That
+- will cause net channels and such to close promptly. */
+-error_t
+-S_startup_dosync (mach_port_t handle)
+-{
+- struct port_info *inpi = ports_lookup_port (fsys->pi.bucket, handle,
+- shutdown_notify_class);
+-
+- if (!inpi)
+- return EOPNOTSUPP;
+-
+- update_random_seed_file ();
+- return 0;
+-}
+-
+-void
+-sigterm_handler (int signo)
+-{
+- update_random_seed_file ();
+- signal (SIGTERM, SIG_DFL);
+- raise (SIGTERM);
+-}
+-
+-static error_t
+-arrange_shutdown_notification ()
+-{
+- error_t err;
+- mach_port_t initport, notify;
+- struct port_info *pi;
+-
+- shutdown_notify_class = ports_create_class (0, 0);
+-
+- signal (SIGTERM, sigterm_handler);
+-
+- /* Arrange to get notified when the system goes down,
+- but if we fail for some reason, just silently give up. No big deal. */
+-
+- err = ports_create_port (shutdown_notify_class, fsys->pi.bucket,
+- sizeof (struct port_info), &pi);
+- if (err)
+- return err;
+-
+- initport = file_name_lookup (_SERVERS_STARTUP, 0, 0);
+- if (! MACH_PORT_VALID (initport))
+- return errno;
+-
+- notify = ports_get_send_right (pi);
+- ports_port_deref (pi);
+- err = startup_request_notification (initport, notify,
+- MACH_MSG_TYPE_MAKE_SEND,
+- program_invocation_short_name);
+-
+- mach_port_deallocate (mach_task_self (), notify);
+- mach_port_deallocate (mach_task_self (), initport);
+- return err;
+-}
+-
+-
+-int
+-main (int argc, char **argv)
+-{
+- error_t err;
+- mach_port_t bootstrap;
+-
+- /* Initialize the lock that will protect everything.
+- We must do this before argp_parse, because parse_opt (above) will
+- use the lock. */
+- pthread_mutex_init (&global_lock, NULL);
+-
+- /* The conditions are used to implement proper read/select
+- behaviour. */
+- pthread_cond_init (&wait, NULL);
+- pthread_cond_init (&select_alert, NULL);
+-
+- /* We use the same argp for options available at startup
+- as for options we'll accept in an fsys_set_options RPC. */
+- argp_parse (&random_argp, argc, argv, 0, 0, 0);
+-
+- task_get_bootstrap_port (mach_task_self (), &bootstrap);
+- if (bootstrap == MACH_PORT_NULL)
+- error (1, 0, "Must be started as a translator");
+-
+- /* Reply to our parent */
+- err = trivfs_startup (bootstrap, 0, 0, 0, 0, 0, &fsys);
+- mach_port_deallocate (mach_task_self (), bootstrap);
+- if (err)
+- error (3, err, "trivfs_startup");
+-
+- err = arrange_shutdown_notification ();
+- if (err)
+- error (0, err, "Cannot request shutdown notification");
+-
+- /* Launch. */
+- ports_manage_port_operations_multithread (fsys->pi.bucket, random_demuxer,
+- 10 * 1000, /* idle thread */
+- 10 * 60 * 1000, /* idle server */
+- 0);
+- return 0;
+-}
+diff --git a/random/random.h b/random/random.h
+deleted file mode 100644
+index a38a417..0000000
+--- a/random/random.h
++++ /dev/null
+@@ -1,32 +0,0 @@
+-/* random.c - A single-file translator providing random data
+- Copyright (C) 1998, 1999, 2001 Free Software Foundation, Inc.
+-
+- This program is free software; you can redistribute it and/or
+- modify it under the terms of the GNU General Public License as
+- published by the Free Software Foundation; either version 2, or (at
+- your option) any later version.
+-
+- This program is distributed in the hope that it will be useful, but
+- WITHOUT ANY WARRANTY; without even the implied warranty of
+- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+- General Public License for more details.
+-
+- You should have received a copy of the GNU General Public License
+- along with this program; if not, write to the Free Software
+- Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */
+-
+-#ifndef __RANDOM_H__
+-#define __RANDOM_H__
+-
+-/* How many random bytes to gather at most.
+- XXX: Should be at least POOLSIZE. */
+-#define GATHERBUFSIZE 32768
+-
+-/* The random bytes we collected. */
+-extern char gatherbuf[GATHERBUFSIZE];
+-
+-/* The current positions in gatherbuf[]. */
+-extern int gatherrpos;
+-extern int gatherwpos;
+-
+-#endif
+diff --git a/sutils/MAKEDEV.sh b/sutils/MAKEDEV.sh
+index 1baec15..9fd4b1d 100644
+--- a/sutils/MAKEDEV.sh
++++ b/sutils/MAKEDEV.sh
+@@ -100,7 +100,7 @@ mkdev() {
+ ;;
+
+ std)
+- mkdev console tty urandom null zero full fd time mem klog shm
++ mkdev console tty random urandom null zero full fd time mem klog shm
+ ;;
+ console|com[0-9])
+ st $I root 600 /hurd/term ${DEVDIR}/$I device $I;;
+@@ -111,8 +111,10 @@ mkdev() {
+ ${DEVDIR}/vcs/`echo $I | sed -e s/tty//`/console;;
+ lpr[0-9])
+ st $I root 660 /hurd/streamio "$I";;
++ random)
++ st $I root 644 /hurd/random --secure --seed-file /var/lib/random-seed;;
+ urandom)
+- st $I root 644 /hurd/random --fast --seed-file /var/lib/random-seed;;
++ st $I root 644 /hurd/random --fast --seed-file /var/lib/urandom-seed;;
+ null)
+ st $I root 666 /hurd/null;;
+ full)
+diff --git a/trans/Makefile b/trans/Makefile
+index ce1eae7..ec0586e 100644
+--- a/trans/Makefile
++++ b/trans/Makefile
+@@ -21,14 +21,14 @@ makemode := servers
+
+ targets = symlink firmlink ifsock magic null fifo new-fifo fwd crash \
+ password hello hello-mt streamio fakeroot proxy-defpager remap \
+- mtab
++ mtab random
+ SRCS = ifsock.c symlink.c magic.c null.c fifo.c new-fifo.c fwd.c \
+ crash.c firmlink.c password.c hello.c hello-mt.c streamio.c \
+ fakeroot.c proxy-defpager.c remap.c mtab.c
+ OBJS = $(SRCS:.c=.o) fsysServer.o ifsockServer.o passwordServer.o \
+ crashServer.o crash_replyUser.o msgServer.o \
+ default_pagerServer.o default_pagerUser.o \
+- device_replyServer.o elfcore.o
++ device_replyServer.o elfcore.o startup_notifyServer.o
+ HURDLIBS = ports netfs trivfs iohelp fshelp pipe ihash shouldbeinlibc
+ LDLIBS += -lpthread
+ password-LDLIBS = -lcrypt
+@@ -51,6 +51,8 @@ device_reply-MIGSFLAGS="-DMACH_PAYLOAD_TO_PORT=ports_payload_get_name"
+ # libports. Disable the default payload to port conversion.
+ fsys-MIGSFLAGS = "-DHURD_DEFAULT_PAYLOAD_TO_PORT=1"
+
++random-LDLIBS = -lgcrypt
++
+ include ../Makeconf
+
+ vpath elfcore.c $(top_srcdir)/exec
+@@ -71,6 +73,7 @@ hello: ../libtrivfs/libtrivfs.a ../libfshelp/libfshelp.a ../libports/libports.a
+ fakeroot: ../libnetfs/libnetfs.a ../libfshelp/libfshelp.a ../libiohelp/libiohelp.a ../libports/libports.a ../libihash/libihash.a
+ remap: ../libtrivfs/libtrivfs.a ../libfshelp/libfshelp.a ../libports/libports.a ../libihash/libihash.a
+ mtab: ../libtrivfs/libtrivfs.a ../libfshelp/libfshelp.a ../libports/libports.a ../libihash/libihash.a fsUser.o
++random: ../libtrivfs/libtrivfs.a ../libports/libports.a ../libihash/libihash.a startup_notifyServer.o mach_debugUser.o
+ $(targets): ../libshouldbeinlibc/libshouldbeinlibc.a
+
+ $(targets): %: %.o
+diff --git a/trans/random.c b/trans/random.c
+new file mode 100644
+index 0000000..f619260
+--- /dev/null
++++ b/trans/random.c
+@@ -0,0 +1,677 @@
++/* random.c - A single-file translator providing random data
++ Copyright (C) 1998, 1999, 2001, 2015 Free Software Foundation, Inc.
++
++ This program is free software; you can redistribute it and/or
++ modify it under the terms of the GNU General Public License as
++ published by the Free Software Foundation; either version 2, or (at
++ your option) any later version.
++
++ This program is distributed in the hope that it will be useful, but
++ WITHOUT ANY WARRANTY; without even the implied warranty of
++ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
++ General Public License for more details.
++
++ You should have received a copy of the GNU General Public License
++ along with this program; if not, write to the Free Software
++ Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */
++
++#include <argp.h>
++#include <argz.h>
++#include <assert.h>
++#include <error.h>
++#include <fcntl.h>
++#include <gcrypt.h>
++#include <hurd/paths.h>
++#include <hurd/startup.h>
++#include <hurd/trivfs.h>
++#include <mach_debug/mach_debug_types.h>
++#include <pthread.h>
++#include <stdio.h>
++#include <stdlib.h>
++#include <string.h>
++#include <sys/mman.h>
++#include <sys/stat.h>
++#include <unistd.h>
++#include <version.h>
++
++#include "mach_debug_U.h"
++
++/* Our control port. */
++struct trivfs_control *fsys;
++
++int read_blocked; /* For read and select. */
++pthread_cond_t wait; /* For read and select. */
++pthread_cond_t select_alert; /* For read and select. */
++
++/* The quality of randomness we provide. If URANDOM is set, return
++ unlimited random data. */
++static int urandom;
++
++/* Name of file to use as seed. */
++static char *seed_file;
++
++/* Entropy management. */
++
++/* Estimate of available entropy measured in bytes. */
++static size_t entropy;
++
++/* Protected by this lock. */
++static pthread_mutex_t entropy_lock;
++
++static error_t
++entropy_add (const void *buf, size_t length, float factor)
++{
++ gcry_error_t cerr;
++ size_t new_entropy;
++ pthread_mutex_lock (&entropy_lock);
++
++ cerr = gcry_random_add_bytes (buf, length, -1);
++ if (cerr)
++ {
++ pthread_mutex_unlock (&entropy_lock);
++ error (0, 0, "Failed to add random bytes: %s",
++ gcry_strerror (cerr));
++ return EINVAL;
++ }
++ new_entropy = (size_t) ((float) length * factor);
++ entropy += new_entropy;
++
++ if (new_entropy > 0 && read_blocked)
++ {
++ read_blocked = 0;
++ pthread_cond_broadcast (&wait);
++ pthread_cond_broadcast (&select_alert);
++ }
++
++ pthread_mutex_unlock (&entropy_lock);
++ return 0;
++}
++
++static void
++update_random_seed_file (void)
++{
++ gcry_error_t cerr;
++ cerr = gcry_control (GCRYCTL_UPDATE_RANDOM_SEED_FILE, seed_file, 0);
++ if (cerr)
++ error (0, 0, "Updating random seed file %s failed: %s",
++ seed_file, gcry_strerror (cerr));
++}
++
++static void
++initialize_gcrypt (void)
++{
++ gcry_error_t cerr;
++ struct stat s;
++
++ if (! gcry_check_version (GCRYPT_VERSION))
++ error (1, 0, "libgcrypt version mismatch\n");
++
++ cerr = gcry_control (GCRYCTL_SET_PREFERRED_RNG_TYPE,
++ GCRY_RNG_TYPE_STANDARD, 0);
++ if (cerr)
++ error (1, 0, "Selecting preferred rng type failed: %s",
++ gcry_strerror (cerr));
++
++ cerr = gcry_control (GCRYCTL_SET_RANDOM_SEED_FILE, seed_file, 0);
++ if (cerr)
++ error (1, 0, "Setting seed file %s failed: %s",
++ seed_file, gcry_strerror (cerr));
++
++ cerr = gcry_control (GCRYCTL_INITIALIZATION_FINISHED, 0);
++ if (cerr)
++ error (1, 0, "Finalizing gcrypt failed: %s",
++ gcry_strerror (cerr));
++
++ if (stat (seed_file, &s) == 0)
++ /* Libgcrypt will read the seed file on demand. Set entropy
++ accordingly. */
++ entropy = s.st_size;
++}
++
++static void
++gather_slab_info (void)
++{
++ error_t err;
++ cache_info_array_t cache_info;
++ mach_msg_type_number_t cache_info_count, i;
++
++ cache_info = NULL;
++ cache_info_count = 0;
++
++ err = host_slab_info (mach_host_self(), &cache_info, &cache_info_count);
++ if (err)
++ {
++ error (0, err, "host_slab_info");
++ return;
++ }
++
++ for (i = 0; i < cache_info_count; i++)
++ if (cache_info[i].nr_bufs > 500)
++ entropy_add (&cache_info[i].nr_objs, sizeof cache_info[i].nr_objs,
++ 0.25);
++
++ vm_deallocate (mach_task_self (),
++ (vm_address_t) cache_info,
++ cache_info_count * sizeof *cache_info);
++}
++
++static void *
++gather_thread (void *args)
++{
++ while (1)
++ {
++ gather_slab_info ();
++ sleep (1); /* XXX vary sleep time */
++ }
++
++ assert (! "reached");
++}
++
++error_t
++start_gather_thread (void)
++{
++ error_t err;
++ pthread_t thread;
++
++ err = pthread_create (&thread, NULL, gather_thread, NULL);
++ if (err)
++ return err;
++
++ err = pthread_detach (thread);
++ return err;
++}
++
++const char *argp_program_version = STANDARD_HURD_VERSION (random);
++
++/* Trivfs hooks. */
++int trivfs_fstype = FSTYPE_MISC;
++int trivfs_fsid = 0;
++
++int trivfs_allow_open = O_READ | O_WRITE;
++
++int trivfs_support_read = 1;
++int trivfs_support_write = 1;
++int trivfs_support_exec = 0;
++
++void
++trivfs_modify_stat (struct trivfs_protid *cred, struct stat *st)
++{
++ /* Mark the node as a read-only plain file. */
++ st->st_mode &= ~((unsigned) S_IFMT);
++ st->st_mode |= (S_IFCHR);
++ st->st_size = 0;
++}
++
++error_t
++trivfs_goaway (struct trivfs_control *cntl, int flags)
++{
++ update_random_seed_file ();
++ exit (0);
++}
++
++/* Read data from an IO object. If offset is -1, read from the object
++ maintained file pointer. If the object is not seekable, offset is
++ ignored. The amount desired to be read is in AMOUNT. */
++error_t
++trivfs_S_io_read (struct trivfs_protid *cred,
++ mach_port_t reply, mach_msg_type_name_t reply_type,
++ data_t *data, mach_msg_type_number_t *data_len,
++ loff_t offs, mach_msg_type_number_t amount)
++{
++ error_t err;
++ void *buf = NULL;
++ size_t length = 0;
++
++ if (! cred)
++ return EOPNOTSUPP;
++ else if (! (cred->po->openmodes & O_READ))
++ return EBADF;
++
++ pthread_mutex_lock (&entropy_lock);
++
++ if (amount > 0)
++ {
++ while (! urandom && amount > entropy)
++ {
++ if (cred->po->openmodes & O_NONBLOCK)
++ {
++ err = EWOULDBLOCK;
++ goto errout;
++ }
++ read_blocked = 1;
++ if (pthread_hurd_cond_wait_np (&wait, &entropy_lock))
++ {
++ err = EINTR;
++ goto errout;
++ }
++ /* See term/users.c for possible race? */
++ }
++
++ /* Possibly allocate a new buffer. */
++ if (*data_len < amount)
++ {
++ *data = mmap (0, amount, PROT_READ|PROT_WRITE,
++ MAP_ANON, 0, 0);
++
++ if (*data == MAP_FAILED)
++ {
++ pthread_mutex_unlock (&entropy_lock);
++ return errno;
++ }
++
++ /* Keep track of our map in case of errors. */
++ buf = *data, length = amount;
++
++ /* Update DATA_LEN to reflect the new buffers size. */
++ *data_len = amount;
++ }
++
++ assert (entropy >= amount);
++ gcry_randomize ((unsigned char *) *data, amount, GCRY_STRONG_RANDOM);
++ entropy -= amount;
++ }
++
++ /* Set atime, see term/users.c */
++
++ pthread_mutex_unlock (&entropy_lock);
++ *data_len = amount;
++ return 0;
++
++ errout:
++ pthread_mutex_unlock (&entropy_lock);
++ if (buf)
++ munmap (buf, length);
++ return err;
++}
++
++/* Write data to an IO object. If offset is -1, write at the object
++ maintained file pointer. If the object is not seekable, offset is
++ ignored. The amount successfully written is returned in amount. A
++ given user should not have more than one outstanding io_write on an
++ object at a time; servers implement congestion control by delaying
++ responses to io_write. Servers may drop data (returning ENOBUFS)
++ if they receive more than one write when not prepared for it. */
++error_t
++trivfs_S_io_write (struct trivfs_protid *cred,
++ mach_port_t reply,
++ mach_msg_type_name_t replytype,
++ data_t data,
++ mach_msg_type_number_t datalen,
++ loff_t offset,
++ mach_msg_type_number_t *amount)
++{
++ error_t err;
++
++ /* Deny access if they have bad credentials. */
++ if (! cred)
++ return EOPNOTSUPP;
++ else if (! (cred->po->openmodes & O_WRITE))
++ return EBADF;
++
++ err = entropy_add (data, datalen, 0);
++ *amount = datalen;
++ return err;
++}
++
++/* Tell how much data can be read from the object without blocking for
++ a "long time" (this should be the same meaning of "long time" used
++ by the nonblocking flag. */
++kern_return_t
++trivfs_S_io_readable (struct trivfs_protid *cred,
++ mach_port_t reply, mach_msg_type_name_t replytype,
++ mach_msg_type_number_t *amount)
++{
++ /* Deny access if they have bad credentials. */
++ if (! cred)
++ return EOPNOTSUPP;
++ else if (! (cred->po->openmodes & O_READ))
++ return EBADF;
++
++ pthread_mutex_lock (&entropy_lock);
++
++ *amount = entropy;
++
++ pthread_mutex_unlock (&entropy_lock);
++
++ return 0;
++}
++
++/* SELECT_TYPE is the bitwise OR of SELECT_READ, SELECT_WRITE, and SELECT_URG.
++ Block until one of the indicated types of i/o can be done "quickly", and
++ return the types that are then available. ID_TAG is returned as passed; it
++ is just for the convenience of the user in matching up reply messages with
++ specific requests sent. */
++error_t
++trivfs_S_io_select (struct trivfs_protid *cred,
++ mach_port_t reply,
++ mach_msg_type_name_t reply_type,
++ int *type)
++{
++ if (!cred)
++ return EOPNOTSUPP;
++
++ /* We only deal with SELECT_READ and SELECT_WRITE here. */
++ if (*type & ~(SELECT_READ | SELECT_WRITE))
++ return EINVAL;
++
++ if (*type == 0)
++ return 0;
++
++ pthread_mutex_lock (&entropy_lock);
++
++ while (1)
++ {
++ if (entropy > 0 || *type & SELECT_WRITE)
++ {
++ *type = (entropy > 0 ? SELECT_READ : 0) | (*type & SELECT_WRITE);
++ pthread_mutex_unlock (&entropy_lock);
++ return 0;
++ }
++
++ ports_interrupt_self_on_port_death (cred, reply);
++ read_blocked = 1;
++
++ if (pthread_hurd_cond_wait_np (&select_alert, &entropy_lock))
++ {
++ *type = 0;
++ pthread_mutex_unlock (&entropy_lock);
++ return EINTR;
++ }
++ }
++}
++
++
++/* Change current read/write offset */
++error_t
++trivfs_S_io_seek (struct trivfs_protid *cred,
++ mach_port_t reply, mach_msg_type_name_t reply_type,
++ loff_t offs, int whence, loff_t *new_offs)
++{
++ if (! cred)
++ return EOPNOTSUPP;
++
++ /* Not seekable. */
++ return ESPIPE;
++}
++
++/* Change the size of the file. If the size increases, new blocks are
++ zero-filled. After successful return, it is safe to reference mapped
++ areas of the file up to NEW_SIZE. */
++error_t
++trivfs_S_file_set_size (struct trivfs_protid *cred,
++ mach_port_t reply, mach_msg_type_name_t reply_type,
++ loff_t size)
++{
++ if (!cred)
++ return EOPNOTSUPP;
++
++ return size == 0 ? 0 : EINVAL;
++}
++
++/* These four routines modify the O_APPEND, O_ASYNC, O_FSYNC, and
++ O_NONBLOCK bits for the IO object. In addition, io_get_openmodes
++ will tell you which of O_READ, O_WRITE, and O_EXEC the object can
++ be used for. The O_ASYNC bit affects icky async I/O; good async
++ I/O is done through io_async which is orthogonal to these calls. */
++error_t
++trivfs_S_io_set_all_openmodes(struct trivfs_protid *cred,
++ mach_port_t reply,
++ mach_msg_type_name_t reply_type,
++ int mode)
++{
++ if (!cred)
++ return EOPNOTSUPP;
++
++ return 0;
++}
++
++error_t
++trivfs_S_io_set_some_openmodes (struct trivfs_protid *cred,
++ mach_port_t reply,
++ mach_msg_type_name_t reply_type,
++ int bits)
++{
++ if (!cred)
++ return EOPNOTSUPP;
++
++ return 0;
++}
++
++error_t
++trivfs_S_io_get_owner (struct trivfs_protid *cred,
++ mach_port_t reply,
++ mach_msg_type_name_t reply_type,
++ pid_t *owner)
++{
++ if (!cred)
++ return EOPNOTSUPP;
++
++ *owner = 0;
++ return 0;
++}
++
++error_t
++trivfs_S_io_mod_owner (struct trivfs_protid *cred,
++ mach_port_t reply, mach_msg_type_name_t reply_type,
++ pid_t owner)
++{
++ if (!cred)
++ return EOPNOTSUPP;
++
++ return EINVAL;
++}
++
++/* Return objects mapping the data underlying this memory object. If
++ the object can be read then memobjrd will be provided; if the
++ object can be written then memobjwr will be provided. For objects
++ where read data and write data are the same, these objects will be
++ equal, otherwise they will be disjoint. Servers are permitted to
++ implement io_map but not io_map_cntl. Some objects do not provide
++ mapping; they will set none of the ports and return an error. Such
++ objects can still be accessed by io_read and io_write. */
++error_t
++trivfs_S_io_map(struct trivfs_protid *cred,
++ mach_port_t reply, mach_msg_type_name_t reply_type,
++ mach_port_t *rdobj,
++ mach_msg_type_name_t *rdtype,
++ mach_port_t *wrobj,
++ mach_msg_type_name_t *wrtype)
++{
++ if (!cred)
++ return EOPNOTSUPP;
++
++ return EINVAL;
++}
++
++
++int
++random_demuxer (mach_msg_header_t *inp,
++ mach_msg_header_t *outp)
++{
++ extern int startup_notify_server (mach_msg_header_t *, mach_msg_header_t *);
++
++ return (trivfs_demuxer (inp, outp)
++ || startup_notify_server (inp, outp));
++}
++
++
++/* Options processing. We accept the same options on the command line
++ and from fsys_set_options. */
++
++static const struct argp_option options[] =
++{
++ {"fast", 'f', 0, 0, "Output cheap random data fast"},
++ {"secure", 's', 0, 0,
++ "Output cryptographically secure random (the default)"},
++ {"seed-file", 'S', "FILE", 0, "Use FILE to remember the seed"},
++ {0}
++};
++
++static error_t
++parse_opt (int opt, char *arg, struct argp_state *state)
++{
++ switch (opt)
++ {
++ default:
++ return ARGP_ERR_UNKNOWN;
++ case ARGP_KEY_INIT:
++ case ARGP_KEY_SUCCESS:
++ case ARGP_KEY_ERROR:
++ break;
++
++ case 'f':
++ urandom = 1;
++ break;
++
++ case 's':
++ urandom = 0;
++ break;
++
++ case 'S':
++ seed_file = strdup (arg);
++ break;
++ }
++ return 0;
++}
++
++/* This will be called from libtrivfs to help construct the answer
++ to an fsys_get_options RPC. */
++error_t
++trivfs_append_args (struct trivfs_control *fsys,
++ char **argz, size_t *argz_len)
++{
++ error_t err = 0;
++ char *opt;
++
++ err = argz_add (argz, argz_len, urandom ? "--fast" : "--secure");
++ if (err)
++ return err;
++
++ if (seed_file)
++ {
++ if (asprintf (&opt, "--seed-file=%s", seed_file) < 0)
++ err = ENOMEM;
++ else
++ {
++ err = argz_add (argz, argz_len, opt);
++ free (opt);
++ }
++ }
++
++ return err;
++}
++
++static struct argp random_argp =
++{ options, parse_opt, 0,
++ "A translator providing random output." };
++
++/* Setting this variable makes libtrivfs use our argp to
++ parse options passed in an fsys_set_options RPC. */
++struct argp *trivfs_runtime_argp = &random_argp;
++
++struct port_class *shutdown_notify_class;
++
++/* The system is going down; destroy all the extant port rights. That
++ will cause net channels and such to close promptly. */
++error_t
++S_startup_dosync (mach_port_t handle)
++{
++ struct port_info *inpi = ports_lookup_port (fsys->pi.bucket, handle,
++ shutdown_notify_class);
++
++ if (!inpi)
++ return EOPNOTSUPP;
++
++ update_random_seed_file ();
++ return 0;
++}
++
++void
++sigterm_handler (int signo)
++{
++ update_random_seed_file ();
++ signal (SIGTERM, SIG_DFL);
++ raise (SIGTERM);
++}
++
++static error_t
++arrange_shutdown_notification ()
++{
++ error_t err;
++ mach_port_t initport, notify;
++ struct port_info *pi;
++
++ shutdown_notify_class = ports_create_class (0, 0);
++
++ signal (SIGTERM, sigterm_handler);
++
++ /* Arrange to get notified when the system goes down,
++ but if we fail for some reason, just silently give up. No big deal. */
++
++ err = ports_create_port (shutdown_notify_class, fsys->pi.bucket,
++ sizeof (struct port_info), &pi);
++ if (err)
++ return err;
++
++ initport = file_name_lookup (_SERVERS_STARTUP, 0, 0);
++ if (! MACH_PORT_VALID (initport))
++ return errno;
++
++ notify = ports_get_send_right (pi);
++ ports_port_deref (pi);
++ err = startup_request_notification (initport, notify,
++ MACH_MSG_TYPE_MAKE_SEND,
++ program_invocation_short_name);
++
++ mach_port_deallocate (mach_task_self (), notify);
++ mach_port_deallocate (mach_task_self (), initport);
++ return err;
++}
++
++int
++main (int argc, char **argv)
++{
++ error_t err;
++ mach_port_t bootstrap;
++
++ /* Initialize the lock that will protect everything.
++ We must do this before argp_parse, because parse_opt (above) will
++ use the lock. */
++ pthread_mutex_init (&entropy_lock, NULL);
++
++ /* The conditions are used to implement proper read/select
++ behaviour. */
++ pthread_cond_init (&wait, NULL);
++ pthread_cond_init (&select_alert, NULL);
++
++ /* We use the same argp for options available at startup
++ as for options we'll accept in an fsys_set_options RPC. */
++ argp_parse (&random_argp, argc, argv, 0, 0, 0);
++
++ initialize_gcrypt ();
++
++ task_get_bootstrap_port (mach_task_self (), &bootstrap);
++ if (bootstrap == MACH_PORT_NULL)
++ error (1, 0, "Must be started as a translator");
++
++ /* Reply to our parent */
++ err = trivfs_startup (bootstrap, 0, 0, 0, 0, 0, &fsys);
++ mach_port_deallocate (mach_task_self (), bootstrap);
++ if (err)
++ error (3, err, "trivfs_startup");
++
++ err = arrange_shutdown_notification ();
++ if (err)
++ error (0, err, "Cannot request shutdown notification");
++
++ err = start_gather_thread ();
++ if (err)
++ error (0, err, "Starting gatherer thread failed");
++
++ /* Launch. */
++ ports_manage_port_operations_multithread (fsys->pi.bucket, random_demuxer,
++ 10 * 1000, /* idle thread */
++ 10 * 60 * 1000, /* idle server */
++ 0);
++ return 0;
++}
+--
+2.1.4
+
diff --git a/debian/patches/series b/debian/patches/series
index a41abc52..af8a7de5 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -9,7 +9,6 @@ stat_round.patch
external.patch
console_ignore_bdf_err.patch
posix-sigcodes.patch
-random-default-fast.patch
libexec.patch
run.patch
mount.patch
@@ -66,3 +65,4 @@ nodeihash0002-xxx-fix-node-iteration.patch
translators-list0001-libfshelp-acquire-references-to-control-ports.patch
translators-list0002-libfshelp-improve-translator-list.patch
translators-list0003-add-iteration.patch
+random0001-xxx-standalone-random-translator.patch