diff options
-rw-r--r-- | debian/patches/random0001-xxx-standalone-random-translator.patch | 3254 | ||||
-rw-r--r-- | debian/patches/series | 1 |
2 files changed, 0 insertions, 3255 deletions
diff --git a/debian/patches/random0001-xxx-standalone-random-translator.patch b/debian/patches/random0001-xxx-standalone-random-translator.patch deleted file mode 100644 index e3417277..00000000 --- a/debian/patches/random0001-xxx-standalone-random-translator.patch +++ /dev/null @@ -1,3254 +0,0 @@ -From c12e4a9db255f2d7eaf86abae4f8dea0d4bb76ab Mon Sep 17 00:00:00 2001 -From: Justus Winter <4winter@informatik.uni-hamburg.de> -Date: Thu, 12 Nov 2015 22:16:49 +0100 -Subject: [PATCH hurd] xxx standalone random translator - ---- - Makefile | 1 - - random/Makefile | 30 -- - random/TODO | 11 - - random/gnupg-bithelp.h | 41 --- - random/gnupg-glue.h | 40 --- - random/gnupg-random.c | 810 ------------------------------------------------- - random/gnupg-random.h | 47 --- - random/gnupg-rmd.h | 38 --- - random/gnupg-rmd160.c | 656 --------------------------------------- - random/random.c | 650 --------------------------------------- - random/random.h | 32 -- - sutils/MAKEDEV.sh | 6 +- - trans/Makefile | 7 +- - trans/random.c | 722 +++++++++++++++++++++++++++++++++++++++++++ - 14 files changed, 731 insertions(+), 2360 deletions(-) - delete mode 100644 random/Makefile - delete mode 100644 random/TODO - delete mode 100644 random/gnupg-bithelp.h - delete mode 100644 random/gnupg-glue.h - delete mode 100644 random/gnupg-random.c - delete mode 100644 random/gnupg-random.h - delete mode 100644 random/gnupg-rmd.h - delete mode 100644 random/gnupg-rmd160.c - delete mode 100644 random/random.c - delete mode 100644 random/random.h - create mode 100644 trans/random.c - -diff --git a/Makefile b/Makefile -index 3178740..6544cd2 100644 ---- a/Makefile -+++ b/Makefile -@@ -38,7 +38,6 @@ prog-subdirs = auth proc exec term \ - hostmux usermux ftpfs trans \ - console-client utils sutils \ - benchmarks fstests \ -- random \ - procfs \ - startup \ - init \ -diff --git a/random/Makefile b/random/Makefile -deleted file mode 100644 -index 0949b63..0000000 ---- a/random/Makefile -+++ /dev/null -@@ -1,30 +0,0 @@ --# --# Copyright (C) 1994,95,96,97,99,2000,2001 Free Software Foundation, Inc. --# --# This program is free software; you can redistribute it and/or --# modify it under the terms of the GNU General Public License as --# published by the Free Software Foundation; either version 2, or (at --# your option) any later version. --# --# This program is distributed in the hope that it will be useful, but --# WITHOUT ANY WARRANTY; without even the implied warranty of --# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU --# General Public License for more details. --# --# You should have received a copy of the GNU General Public License --# along with this program; if not, write to the Free Software --# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -- --dir := random --makemode := server -- --CFLAGS += -D__HURD__ -- --target = random --SRCS = random.c gnupg-random.c gnupg-rmd160.c --OBJS = $(SRCS:.c=.o) startup_notifyServer.o --LCLHDRS = gnupg-random.h gnupg-rmd.h gnupg-bithelp.h random.h --HURDLIBS = trivfs ports fshelp ihash shouldbeinlibc --OTHERLIBS = -lpthread -- --include ../Makeconf -diff --git a/random/TODO b/random/TODO -deleted file mode 100644 -index 9cc57ab..0000000 ---- a/random/TODO -+++ /dev/null -@@ -1,11 +0,0 @@ --* read_poll uses random_poll until the pool is filled. This is ian -- issue at first initialization, as this requries POOLSIZE good random (level 1 from -- gather_random) even in level 0 and 1. -- For now, the code is only applied to level 2. Eventually, readable_pool -- should be fixed to return 0 if initialization is not done yet and not enough bytes -- are available. Otherwise it enters an infinite loop. -- --* Permissions? -- --* Off by one error in gather_random/io_write? I can only get GATHERBUFSIZE - 1 -- bytes from it. -diff --git a/random/gnupg-bithelp.h b/random/gnupg-bithelp.h -deleted file mode 100644 -index 188db16..0000000 ---- a/random/gnupg-bithelp.h -+++ /dev/null -@@ -1,41 +0,0 @@ --/* bithelp.h - Some bit manipulation helpers -- * Copyright (C) 1999 Free Software Foundation, Inc. -- * -- * This file is part of GnuPG. -- * -- * GnuPG is free software; you can redistribute it and/or modify -- * it under the terms of the GNU General Public License as published by -- * the Free Software Foundation; either version 2 of the License, or -- * (at your option) any later version. -- * -- * GnuPG is distributed in the hope that it will be useful, -- * but WITHOUT ANY WARRANTY; without even the implied warranty of -- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -- * GNU General Public License for more details. -- * -- * You should have received a copy of the GNU General Public License -- * along with this program; if not, write to the Free Software -- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA -- */ --#ifndef G10_BITHELP_H --#define G10_BITHELP_H -- -- --/**************** -- * Rotate a 32 bit integer by n bytes -- */ --#if defined(__GNUC__) && defined(__i386__) --static inline u32 --rol( u32 x, int n) --{ -- __asm__("roll %%cl,%0" -- :"=r" (x) -- :"0" (x),"c" (n)); -- return x; --} --#else -- #define rol(x,n) ( ((x) << (n)) | ((x) >> (32-(n))) ) --#endif -- -- --#endif /*G10_BITHELP_H*/ -diff --git a/random/gnupg-glue.h b/random/gnupg-glue.h -deleted file mode 100644 -index cbf0a10..0000000 ---- a/random/gnupg-glue.h -+++ /dev/null -@@ -1,40 +0,0 @@ --#ifndef __GNUPG_GLUE_H__ --#define __GNUPG_GLUE_H__ -- --#include <sys/types.h> --#include <random.h> -- --#define SIZEOF_UNSIGNED_LONG 4 --typedef unsigned int u32; --typedef unsigned char byte; -- --/* GnuPG's config.h */ --#define HAVE_GETTIMEOFDAY 1 --#define HAVE_GETRUSAGE 1 --#define HAVE_RAND 1 -- --/* GnuPG's memory.h */ --#define m_alloc malloc --#define m_alloc_secure malloc --#define m_alloc_clear(x) calloc(x, 1) --#define m_alloc_secure_clear(x) calloc(x, 1) --#define m_free free --#define m_strdup strdup -- --/* GnuPG's dynaload.h */ --#define dynload_getfnc_fast_random_poll() (0) --#define dynload_getfnc_gather_random() &gather_random --int --gather_random( void (*add)(const void*, size_t, int), int requester, -- size_t length, int level ); -- --/* GnuPG's miscellaneous stuff. */ --#define BUG() assert(0) --#define _(x) x --#define make_timestamp() time(0) --#define tty_printf printf --#define log_info(format, args...) printf(format , ## args) --#define log_fatal(format, args...) { printf(format , ## args) ; exit(2); } --#define DIM(v) (sizeof(v)/sizeof((v)[0])) -- --#endif /* __GNUPG_GLUE_H__ */ -diff --git a/random/gnupg-random.c b/random/gnupg-random.c -deleted file mode 100644 -index 54ee3c5..0000000 ---- a/random/gnupg-random.c -+++ /dev/null -@@ -1,810 +0,0 @@ --/* random.c - random number generator -- * Copyright (C) 1998, 1999, 2000, 2001 Free Software Foundation, Inc. -- * -- * This file is part of GnuPG. -- * -- * GnuPG is free software; you can redistribute it and/or modify -- * it under the terms of the GNU General Public License as published by -- * the Free Software Foundation; either version 2 of the License, or -- * (at your option) any later version. -- * -- * GnuPG is distributed in the hope that it will be useful, -- * but WITHOUT ANY WARRANTY; without even the implied warranty of -- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -- * GNU General Public License for more details. -- * -- * You should have received a copy of the GNU General Public License -- * along with this program; if not, write to the Free Software -- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA -- */ -- -- --/**************** -- * This random number generator is modelled after the one described -- * in Peter Gutmann's Paper: "Software Generation of Practically -- * Strong Random Numbers". -- */ -- --#ifndef __HURD__ --#include <config.h> --#else --#include "gnupg-glue.h" --#endif --#include <stdio.h> --#include <stdlib.h> --#include <assert.h> --#include <errno.h> --#include <string.h> --#include <time.h> --#include <sys/time.h> --#include <sys/types.h> --#include <sys/stat.h> --#include <unistd.h> --#include <fcntl.h> --#ifdef HAVE_GETHRTIME -- #include <sys/times.h> --#endif --#ifdef HAVE_GETTIMEOFDAY -- #include <sys/times.h> --#endif --#ifdef HAVE_GETRUSAGE -- #include <sys/resource.h> --#endif --#ifdef __MINGW32__ -- #include <process.h> --#endif --#ifndef __HURD__ --#include "util.h" --#endif --#ifndef __HURD__ --#include "rmd.h" --#include "ttyio.h" --#include "i18n.h" --#include "random.h" --#include "rand-internal.h" --#include "dynload.h" --#else --#include "gnupg-rmd.h" --#include "gnupg-random.h" --#endif -- --#ifndef RAND_MAX /* for SunOS */ -- #define RAND_MAX 32767 --#endif -- -- --#if SIZEOF_UNSIGNED_LONG == 8 -- #define ADD_VALUE 0xa5a5a5a5a5a5a5a5 --#elif SIZEOF_UNSIGNED_LONG == 4 -- #define ADD_VALUE 0xa5a5a5a5 --#else -- #error weird size for an unsigned long --#endif -- --#define BLOCKLEN 64 /* hash this amount of bytes */ --#define DIGESTLEN 20 /* into a digest of this length (rmd160) */ --/* poolblocks is the number of digests which make up the pool -- * and poolsize must be a multiple of the digest length -- * to make the AND operations faster, the size should also be -- * a multiple of ulong -- */ --#define POOLBLOCKS 30 --#define POOLSIZE (POOLBLOCKS*DIGESTLEN) --#if (POOLSIZE % SIZEOF_UNSIGNED_LONG) -- #error Please make sure that poolsize is a multiple of ulong --#endif --#define POOLWORDS (POOLSIZE / SIZEOF_UNSIGNED_LONG) -- -- --static int is_initialized; --#define MASK_LEVEL(a) do {if( a > 2 ) a = 2; else if( a < 0 ) a = 0; } while(0) --static char *rndpool; /* allocated size is POOLSIZE+BLOCKLEN */ --static char *keypool; /* allocated size is POOLSIZE+BLOCKLEN */ --static size_t pool_readpos; --static size_t pool_writepos; --static int pool_filled; --static int pool_balance; --static int just_mixed; --static int did_initial_extra_seeding; --static char *seed_file_name; --static int allow_seed_file_update; -- --static int secure_alloc; --static int quick_test; --static int faked_rng; -- -- --#ifndef __HURD__ --static void read_pool( byte *buffer, size_t length, int level ); --#else --int read_pool( byte *buffer, size_t length, int level ); --#endif --static void add_randomness( const void *buffer, size_t length, int source ); --static void random_poll(void); --#ifndef __HURD__ --static void read_random_source( int requester, size_t length, int level); --#else --static int read_random_source( int requester, size_t length, int level); --#endif --static int gather_faked( void (*add)(const void*, size_t, int), int requester, -- size_t length, int level ); -- --static struct { -- ulong mixrnd; -- ulong mixkey; -- ulong slowpolls; -- ulong fastpolls; -- ulong getbytes1; -- ulong ngetbytes1; -- ulong getbytes2; -- ulong ngetbytes2; -- ulong addbytes; -- ulong naddbytes; --} rndstats; -- --static void --initialize(void) --{ -- /* The data buffer is allocated somewhat larger, so that -- * we can use this extra space (which is allocated in secure memory) -- * as a temporary hash buffer */ -- rndpool = secure_alloc ? m_alloc_secure_clear(POOLSIZE+BLOCKLEN) -- : m_alloc_clear(POOLSIZE+BLOCKLEN); -- keypool = secure_alloc ? m_alloc_secure_clear(POOLSIZE+BLOCKLEN) -- : m_alloc_clear(POOLSIZE+BLOCKLEN); -- is_initialized = 1; --#ifndef __HURD__ -- cipher_modules_constructor(); --#endif --} -- --static void --burn_stack (int bytes) --{ -- char buf[128]; -- -- memset (buf, 0, sizeof buf); -- bytes -= sizeof buf; -- if (bytes > 0) -- burn_stack (bytes); --} -- --void --random_dump_stats() --{ -- fprintf(stderr, -- "random usage: poolsize=%d mixed=%lu polls=%lu/%lu added=%lu/%lu\n" -- " outmix=%lu getlvl1=%lu/%lu getlvl2=%lu/%lu\n", -- POOLSIZE, rndstats.mixrnd, rndstats.slowpolls, rndstats.fastpolls, -- rndstats.naddbytes, rndstats.addbytes, -- rndstats.mixkey, rndstats.ngetbytes1, rndstats.getbytes1, -- rndstats.ngetbytes2, rndstats.getbytes2 ); --} -- --void --secure_random_alloc() --{ -- secure_alloc = 1; --} -- -- --int --quick_random_gen( int onoff ) --{ -- int last; -- -- read_random_source(0,0,0); /* init */ -- last = quick_test; -- if( onoff != -1 ) -- quick_test = onoff; -- return faked_rng? 1 : last; --} -- -- --/**************** -- * Fill the buffer with LENGTH bytes of cryptographically strong -- * random bytes. level 0 is not very strong, 1 is strong enough -- * for most usage, 2 is good for key generation stuff but may be very slow. -- */ --void --randomize_buffer( byte *buffer, size_t length, int level ) --{ -- char *p = get_random_bits( length*8, level, 1 ); -- memcpy( buffer, p, length ); -- m_free(p); --} -- -- --int --random_is_faked() --{ -- if( !is_initialized ) -- initialize(); -- return faked_rng || quick_test; --} -- --/**************** -- * Return a pointer to a randomized buffer of level 0 and LENGTH bits -- * caller must free the buffer. -- * Note: The returned value is rounded up to bytes. -- */ --byte * --get_random_bits( size_t nbits, int level, int secure ) --{ -- byte *buf, *p; -- size_t nbytes = (nbits+7)/8; -- -- if( quick_test && level > 1 ) -- level = 1; -- MASK_LEVEL(level); -- if( level == 1 ) { -- rndstats.getbytes1 += nbytes; -- rndstats.ngetbytes1++; -- } -- else if( level >= 2 ) { -- rndstats.getbytes2 += nbytes; -- rndstats.ngetbytes2++; -- } -- -- buf = secure && secure_alloc ? m_alloc_secure( nbytes ) : m_alloc( nbytes ); -- for( p = buf; nbytes > 0; ) { -- size_t n = nbytes > POOLSIZE? POOLSIZE : nbytes; --#ifdef __HURD__ -- n = --#endif -- read_pool( p, n, level ); -- nbytes -= n; -- p += n; -- -- } -- return buf; --} -- -- --/**************** -- * Mix the pool -- */ --static void --mix_pool(byte *pool) --{ -- char *hashbuf = pool + POOLSIZE; -- char *p, *pend; -- int i, n; -- RMD160_CONTEXT md; -- -- rmd160_init( &md ); -- #if DIGESTLEN != 20 -- #error must have a digest length of 20 for ripe-md-160 -- #endif -- /* loop over the pool */ -- pend = pool + POOLSIZE; -- memcpy(hashbuf, pend - DIGESTLEN, DIGESTLEN ); -- memcpy(hashbuf+DIGESTLEN, pool, BLOCKLEN-DIGESTLEN); -- rmd160_mixblock( &md, hashbuf); -- memcpy(pool, hashbuf, 20 ); -- -- p = pool; -- for( n=1; n < POOLBLOCKS; n++ ) { -- memcpy(hashbuf, p, DIGESTLEN ); -- -- p += DIGESTLEN; -- if( p+DIGESTLEN+BLOCKLEN < pend ) -- memcpy(hashbuf+DIGESTLEN, p+DIGESTLEN, BLOCKLEN-DIGESTLEN); -- else { -- char *pp = p+DIGESTLEN; -- for(i=DIGESTLEN; i < BLOCKLEN; i++ ) { -- if( pp >= pend ) -- pp = pool; -- hashbuf[i] = *pp++; -- } -- } -- -- rmd160_mixblock( &md, hashbuf); -- memcpy(p, hashbuf, 20 ); -- } -- burn_stack (200); /* for the rmd160_mixblock() */ --} -- -- --void --set_random_seed_file( const char *name ) --{ -- if( seed_file_name ) -- BUG(); -- seed_file_name = m_strdup( name ); --} -- --/**************** -- * Read in a seed form the random_seed file -- * and return true if this was successful -- */ --static int --read_seed_file() --{ -- int fd; -- struct stat sb; -- unsigned char buffer[POOLSIZE]; -- int n; -- -- if( !seed_file_name ) -- return 0; -- -- #ifdef HAVE_DOSISH_SYSTEM -- fd = open( seed_file_name, O_RDONLY | O_BINARY ); -- #else -- fd = open( seed_file_name, O_RDONLY ); -- #endif -- if( fd == -1 && errno == ENOENT) { -- allow_seed_file_update = 1; -- return 0; -- } -- -- if( fd == -1 ) { -- log_info(_("can't open `%s': %s\n"), seed_file_name, strerror(errno) ); -- return 0; -- } -- if( fstat( fd, &sb ) ) { -- log_info(_("can't stat `%s': %s\n"), seed_file_name, strerror(errno) ); -- close(fd); -- return 0; -- } -- if( !S_ISREG(sb.st_mode) ) { -- log_info(_("`%s' is not a regular file - ignored\n"), seed_file_name ); -- close(fd); -- return 0; -- } -- if( !sb.st_size ) { -- log_info(_("note: random_seed file is empty\n") ); -- close(fd); -- allow_seed_file_update = 1; -- return 0; -- } -- if( sb.st_size != POOLSIZE ) { -- log_info(_("warning: invalid size of random_seed file - not used\n") ); -- close(fd); -- return 0; -- } -- do { -- n = read( fd, buffer, POOLSIZE ); -- } while( n == -1 && errno == EINTR ); -- if( n != POOLSIZE ) { -- log_fatal(_("can't read `%s': %s\n"), seed_file_name,strerror(errno) ); -- close(fd); -- return 0; -- } -- -- close(fd); -- -- add_randomness( buffer, POOLSIZE, 0 ); -- /* add some minor entropy to the pool now (this will also force a mixing) */ -- { pid_t x = getpid(); -- add_randomness( &x, sizeof(x), 0 ); -- } -- { time_t x = time(NULL); -- add_randomness( &x, sizeof(x), 0 ); -- } -- { clock_t x = clock(); -- add_randomness( &x, sizeof(x), 0 ); -- } -- /* And read a few bytes from our entropy source. By using -- * a level of 0 this will not block and might not return anything -- * with some entropy drivers, however the rndlinux driver will use -- * /dev/urandom and return some stuff - Do not read to much as we -- * want to be friendly to the scare system entropy resource. */ -- read_random_source( 0, 16, 0 ); -- -- allow_seed_file_update = 1; -- return 1; --} -- --void --update_random_seed_file() --{ -- ulong *sp, *dp; -- int fd, i; -- -- if( !seed_file_name || !is_initialized || !pool_filled ) -- return; -- if( !allow_seed_file_update ) { -- log_info(_("note: random_seed file not updated\n")); -- return; -- } -- -- -- /* copy the entropy pool to a scratch pool and mix both of them */ -- for(i=0,dp=(ulong*)keypool, sp=(ulong*)rndpool; -- i < POOLWORDS; i++, dp++, sp++ ) { -- *dp = *sp + ADD_VALUE; -- } -- mix_pool(rndpool); rndstats.mixrnd++; -- mix_pool(keypool); rndstats.mixkey++; -- -- #ifdef HAVE_DOSISH_SYSTEM -- fd = open( seed_file_name, O_WRONLY|O_CREAT|O_TRUNC|O_BINARY, -- S_IRUSR|S_IWUSR ); -- #else -- fd = open( seed_file_name, O_WRONLY|O_CREAT|O_TRUNC, S_IRUSR|S_IWUSR ); -- #endif -- if( fd == -1 ) { -- log_info(_("can't create `%s': %s\n"), seed_file_name, strerror(errno) ); -- return; -- } -- do { -- i = write( fd, keypool, POOLSIZE ); -- } while( i == -1 && errno == EINTR ); -- if( i != POOLSIZE ) { -- log_info(_("can't write `%s': %s\n"), seed_file_name, strerror(errno) ); -- } -- if( close(fd) ) -- log_info(_("can't close `%s': %s\n"), seed_file_name, strerror(errno) ); --} -- --#ifdef __HURD__ --int readable_pool( size_t length, int level ) --{ -- size_t needed = 0; -- size_t my_balance = pool_balance; -- size_t available = (gatherwpos - gatherrpos + GATHERBUFSIZE) % GATHERBUFSIZE; -- -- if (length > POOLSIZE) -- length = POOLSIZE; -- -- if (level < 2) -- return length; -- -- if( !pool_filled ) { -- if( read_seed_file() ) -- pool_filled = 1; -- } -- -- if (!did_initial_extra_seeding) -- { -- /* Take account for initial extra seeding. */ -- needed = length; -- if (needed < POOLSIZE/2) -- needed = POOLSIZE/2; -- my_balance = needed; -- -- if (!pool_filled && pool_writepos + needed < POOLSIZE) -- { -- /* If the pool is not filled yet, we couldn't read the seed -- file. Too bad. We will now have to take account for so many -- random_poll()s as fit into the remaining pool. */ -- -- needed += (POOLSIZE - pool_writepos + needed + POOLSIZE/5 - 1) / (POOLSIZE/5); -- } -- } -- else -- { -- if (!pool_filled) -- needed += (POOLSIZE - pool_writepos + needed + POOLSIZE/5 - 1) / (POOLSIZE/5); -- } -- -- /* NEEDED contains the bytes needed for initialization, MY_BALANCE the resulting -- available bytes. */ -- if (available < needed) -- return 0; -- return available + my_balance - needed; --} --#endif -- --#ifndef __HURD__ --static void --#else --int --#endif --read_pool( byte *buffer, size_t length, int level ) --{ -- int i; -- ulong *sp, *dp; -- -- if( length > POOLSIZE ) { --#ifndef __HURD__ -- log_fatal(_("too many random bits requested; the limit is %d\n"), -- POOLSIZE*8-1 ); --#else -- length = POOLSIZE; --#endif -- } -- -- if( !pool_filled ) { -- if( read_seed_file() ) -- pool_filled = 1; -- } -- -- /* For level 2 quality (key generation) we alwas make -- * sure that the pool has been seeded enough initially */ -- if( level == 2 && !did_initial_extra_seeding ) { -- size_t needed; -- -- pool_balance = 0; -- needed = length - pool_balance; -- if( needed < POOLSIZE/2 ) -- needed = POOLSIZE/2; -- else if( needed > POOLSIZE ) -- BUG(); --#ifdef __HURD__ -- needed = --#endif -- read_random_source( 3, needed, 2 ); --#ifdef __HURD__ -- if (! needed) -- return 0; -- /* XXX This will succeed with needed < POOLSIZE/2 even. But -- erroring out will waste the random we already got. */ --#endif -- pool_balance += needed; -- did_initial_extra_seeding=1; -- } -- -- /* for level 2 make sure that there is enough random in the pool */ -- if( level == 2 && pool_balance < length ) { -- size_t needed; -- -- if( pool_balance < 0 ) -- pool_balance = 0; -- needed = length - pool_balance; -- if( needed > POOLSIZE ) -- BUG(); --#ifdef __HURD__ -- needed = --#endif -- read_random_source( 3, needed, 2 ); -- pool_balance += needed; -- } -- --#ifdef __HURD__ -- /* XXX This makes level 0 and 1 worse than needed at first start up. */ -- if (level == 2) --#endif -- /* make sure the pool is filled */ -- while( !pool_filled ) -- random_poll(); -- -- /* do always a fast random poll */ -- fast_random_poll(); -- -- if( !level ) { /* no need for cryptographic strong random */ -- /* create a new pool */ -- for(i=0,dp=(ulong*)keypool, sp=(ulong*)rndpool; -- i < POOLWORDS; i++, dp++, sp++ ) -- *dp = *sp + ADD_VALUE; -- /* must mix both pools */ -- mix_pool(rndpool); rndstats.mixrnd++; -- mix_pool(keypool); rndstats.mixkey++; -- memcpy( buffer, keypool, length ); -- return length; -- } -- else { --#ifdef __HURD__ -- int amount; --#endif -- /* mix the pool (if add_randomness() didn't it) */ -- if( !just_mixed ) { -- mix_pool(rndpool); -- rndstats.mixrnd++; -- } -- /* create a new pool */ -- for(i=0,dp=(ulong*)keypool, sp=(ulong*)rndpool; -- i < POOLWORDS; i++, dp++, sp++ ) -- *dp = *sp + ADD_VALUE; -- /* and mix both pools */ -- mix_pool(rndpool); rndstats.mixrnd++; -- mix_pool(keypool); rndstats.mixkey++; -- /* read the required data -- * we use a readpointer to read from a different position each -- * time */ --#ifdef __HURD__ -- if (level == 2 && length > pool_balance) -- length = pool_balance; -- amount = length; --#endif -- while( length-- ) { -- *buffer++ = keypool[pool_readpos++]; -- if( pool_readpos >= POOLSIZE ) -- pool_readpos = 0; -- pool_balance--; -- } -- if( pool_balance < 0 ) -- pool_balance = 0; -- /* and clear the keypool */ -- memset( keypool, 0, POOLSIZE ); --#ifdef __HURD__ -- return amount; --#endif -- } --} -- -- --/**************** -- * Add LENGTH bytes of randomness from buffer to the pool. -- * source may be used to specify the randomness source. -- * Source is: -- * 0 - used ony for initialization -- * 1 - fast random poll function -- * 2 - normal poll function -- * 3 - used when level 2 random quality has been requested -- * to do an extra pool seed. -- */ --static void --add_randomness( const void *buffer, size_t length, int source ) --{ -- const byte *p = buffer; -- -- if( !is_initialized ) -- initialize(); -- rndstats.addbytes += length; -- rndstats.naddbytes++; -- while( length-- ) { -- rndpool[pool_writepos++] = *p++; -- if( pool_writepos >= POOLSIZE ) { -- if( source > 1 ) -- pool_filled = 1; -- pool_writepos = 0; -- mix_pool(rndpool); rndstats.mixrnd++; -- just_mixed = !length; -- } -- } --} -- -- -- --static void --random_poll() --{ -- rndstats.slowpolls++; -- read_random_source( 2, POOLSIZE/5, 1 ); --} -- -- --void --fast_random_poll() --{ -- static void (*fnc)( void (*)(const void*, size_t, int), int) = NULL; -- static int initialized = 0; -- -- rndstats.fastpolls++; -- if( !initialized ) { -- if( !is_initialized ) -- initialize(); -- initialized = 1; -- fnc = dynload_getfnc_fast_random_poll(); -- } -- if( fnc ) { -- (*fnc)( add_randomness, 1 ); -- return; -- } -- -- /* fall back to the generic function */ -- #if HAVE_GETHRTIME -- { hrtime_t tv; -- tv = gethrtime(); -- add_randomness( &tv, sizeof(tv), 1 ); -- } -- #elif HAVE_GETTIMEOFDAY -- { struct timeval tv; -- if( gettimeofday( &tv, NULL ) ) -- BUG(); -- add_randomness( &tv.tv_sec, sizeof(tv.tv_sec), 1 ); -- add_randomness( &tv.tv_usec, sizeof(tv.tv_usec), 1 ); -- } -- #elif HAVE_CLOCK_GETTIME -- { struct timespec tv; -- if( clock_gettime( CLOCK_REALTIME, &tv ) == -1 ) -- BUG(); -- add_randomness( &tv.tv_sec, sizeof(tv.tv_sec), 1 ); -- add_randomness( &tv.tv_nsec, sizeof(tv.tv_nsec), 1 ); -- } -- #else /* use times */ -- #ifndef HAVE_DOSISH_SYSTEM -- { struct tms buf; -- times( &buf ); -- add_randomness( &buf, sizeof buf, 1 ); -- } -- #endif -- #endif -- #ifdef HAVE_GETRUSAGE -- #ifndef RUSAGE_SELF -- #ifdef __GCC__ -- #warning There is no RUSAGE_SELF on this system -- #endif -- #else -- { struct rusage buf; -- /* QNX/Neutrino does return ENOSYS - so we just ignore it and -- * add whatever is in buf. In a chroot environment it might not -- * work at all (i.e. because /proc/ is not accessible), so we better -- * ognore all error codes and hope for the best -- */ -- getrusage( RUSAGE_SELF, &buf ); -- -- add_randomness( &buf, sizeof buf, 1 ); -- memset( &buf, 0, sizeof buf ); -- } -- #endif -- #endif -- /* time and clock are available on all systems - so -- * we better do it just in case one of the above functions -- * didn't work */ -- { time_t x = time(NULL); -- add_randomness( &x, sizeof(x), 1 ); -- } -- { clock_t x = clock(); -- add_randomness( &x, sizeof(x), 1 ); -- } --} -- -- --#ifndef __HURD__ --static void --#else --static int --#endif --read_random_source( int requester, size_t length, int level ) --{ -- static int (*fnc)(void (*)(const void*, size_t, int), int, -- size_t, int) = NULL; --#ifdef __HURD__ -- int got; --#endif -- if( !fnc ) { -- if( !is_initialized ) -- initialize(); -- fnc = dynload_getfnc_gather_random(); -- if( !fnc ) { -- faked_rng = 1; -- fnc = gather_faked; -- } -- if( !requester && !length && !level ) --#ifndef __HURD__ -- return; /* init only */ --#else -- return 0; --#endif -- } --#ifndef __HURD__ -- if( (*fnc)( add_randomness, requester, length, level ) < 0 ) -- log_fatal("No way to gather entropy for the RNG\n"); --#else -- got = (*fnc)( add_randomness, requester, length, level ); -- if (got < 0) -- log_fatal("No way to gather entropy for the RNG\n"); -- return got; --#endif --} -- -- --static int --gather_faked( void (*add)(const void*, size_t, int), int requester, -- size_t length, int level ) --{ -- static int initialized=0; -- size_t n; -- char *buffer, *p; -- -- if( !initialized ) { -- log_info(_("WARNING: using insecure random number generator!!\n")); -- tty_printf(_("The random number generator is only a kludge to let\n" -- "it run - it is in no way a strong RNG!\n\n" -- "DON'T USE ANY DATA GENERATED BY THIS PROGRAM!!\n\n")); -- initialized=1; -- #ifdef HAVE_RAND -- srand(make_timestamp()*getpid()); -- #else -- srandom(make_timestamp()*getpid()); -- #endif -- } -- printf("WAITING FOR %i bytes.\n", length); -- p = buffer = m_alloc( length ); -- n = length; -- #ifdef HAVE_RAND -- while( n-- ) -- *p++ = ((unsigned)(1 + (int) (256.0*rand()/(RAND_MAX+1.0)))-1); -- #else -- while( n-- ) -- *p++ = ((unsigned)(1 + (int) (256.0*random()/(RAND_MAX+1.0)))-1); -- #endif -- add_randomness( buffer, length, requester ); -- m_free(buffer); -- return 0; /* okay */ --} -- -diff --git a/random/gnupg-random.h b/random/gnupg-random.h -deleted file mode 100644 -index ee18feb..0000000 ---- a/random/gnupg-random.h -+++ /dev/null -@@ -1,47 +0,0 @@ --/* random.h - random functions -- * Copyright (C) 1998, 1999, 2000, 2001 Free Software Foundation, Inc. -- * -- * This file is part of GnuPG. -- * -- * GnuPG is free software; you can redistribute it and/or modify -- * it under the terms of the GNU General Public License as published by -- * the Free Software Foundation; either version 2 of the License, or -- * (at your option) any later version. -- * -- * GnuPG is distributed in the hope that it will be useful, -- * but WITHOUT ANY WARRANTY; without even the implied warranty of -- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -- * GNU General Public License for more details. -- * -- * You should have received a copy of the GNU General Public License -- * along with this program; if not, write to the Free Software -- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA -- */ --#ifndef G10_RANDOM_H --#define G10_RANDOM_H -- --#ifndef __HURD__ --#include "types.h" --#else --#include "gnupg-glue.h" --int read_pool (byte *, size_t, int); --int readable_pool (size_t, int); --#endif -- --/*-- random.c --*/ --void random_dump_stats(void); --void secure_random_alloc(void); --void set_random_seed_file(const char *); --void update_random_seed_file(void); --int quick_random_gen( int onoff ); --int random_is_faked(void); --void randomize_buffer( byte *buffer, size_t length, int level ); --byte *get_random_bits( size_t nbits, int level, int secure ); --void fast_random_poll( void ); -- --/*-- rndw32.c --*/ --#ifdef USE_STATIC_RNDW32 --void rndw32_set_dll_name( const char *name ); --#endif -- --#endif /*G10_RANDOM_H*/ -diff --git a/random/gnupg-rmd.h b/random/gnupg-rmd.h -deleted file mode 100644 -index 2446fc7..0000000 ---- a/random/gnupg-rmd.h -+++ /dev/null -@@ -1,38 +0,0 @@ --/* rmd.h - RIPE-MD hash functions -- * Copyright (C) 1998, 1999, 2000, 2001 Free Software Foundation, Inc. -- * -- * This file is part of GnuPG. -- * -- * GnuPG is free software; you can redistribute it and/or modify -- * it under the terms of the GNU General Public License as published by -- * the Free Software Foundation; either version 2 of the License, or -- * (at your option) any later version. -- * -- * GnuPG is distributed in the hope that it will be useful, -- * but WITHOUT ANY WARRANTY; without even the implied warranty of -- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -- * GNU General Public License for more details. -- * -- * You should have received a copy of the GNU General Public License -- * along with this program; if not, write to the Free Software -- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA -- */ --#ifndef G10_RMD_H --#define G10_RMD_H -- --#ifdef __HURD__ --#include "gnupg-glue.h" --#endif -- --/* we need this here because random.c must have direct access */ --typedef struct { -- u32 h0,h1,h2,h3,h4; -- u32 nblocks; -- byte buf[64]; -- int count; --} RMD160_CONTEXT; -- --void rmd160_init( RMD160_CONTEXT *hd ); --void rmd160_mixblock( RMD160_CONTEXT *hd, char *buffer ); -- --#endif /*G10_RMD_H*/ -diff --git a/random/gnupg-rmd160.c b/random/gnupg-rmd160.c -deleted file mode 100644 -index 6610768..0000000 ---- a/random/gnupg-rmd160.c -+++ /dev/null -@@ -1,656 +0,0 @@ --/* rmd160.c - RIPE-MD160 -- * Copyright (C) 1998, 1999, 2000, 2001 Free Software Foundation, Inc. -- * -- * This file is part of GnuPG. -- * -- * GnuPG is free software; you can redistribute it and/or modify -- * it under the terms of the GNU General Public License as published by -- * the Free Software Foundation; either version 2 of the License, or -- * (at your option) any later version. -- * -- * GnuPG is distributed in the hope that it will be useful, -- * but WITHOUT ANY WARRANTY; without even the implied warranty of -- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -- * GNU General Public License for more details. -- * -- * You should have received a copy of the GNU General Public License -- * along with this program; if not, write to the Free Software -- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA -- */ -- --#ifndef __HURD__ --#include <config.h> --#endif --#include <stdio.h> --#include <stdlib.h> --#include <string.h> --#include <assert.h> --#ifndef __HURD__ --#include "util.h" --#include "memory.h" --#include "rmd.h" --#include "cipher.h" /* only used for the rmd160_hash_buffer() prototype */ --#include "dynload.h" -- --#include "bithelp.h" --#else --#include "gnupg-rmd.h" --#include "gnupg-bithelp.h" --#endif -- -- --/********************************* -- * RIPEMD-160 is not patented, see (as of 25.10.97) -- * http://www.esat.kuleuven.ac.be/~bosselae/ripemd160.html -- * Note that the code uses Little Endian byteorder, which is good for -- * 386 etc, but we must add some conversion when used on a big endian box. -- * -- * -- * Pseudo-code for RIPEMD-160 -- * -- * RIPEMD-160 is an iterative hash function that operates on 32-bit words. -- * The round function takes as input a 5-word chaining variable and a 16-word -- * message block and maps this to a new chaining variable. All operations are -- * defined on 32-bit words. Padding is identical to that of MD4. -- * -- * -- * RIPEMD-160: definitions -- * -- * -- * nonlinear functions at bit level: exor, mux, -, mux, - -- * -- * f(j, x, y, z) = x XOR y XOR z (0 <= j <= 15) -- * f(j, x, y, z) = (x AND y) OR (NOT(x) AND z) (16 <= j <= 31) -- * f(j, x, y, z) = (x OR NOT(y)) XOR z (32 <= j <= 47) -- * f(j, x, y, z) = (x AND z) OR (y AND NOT(z)) (48 <= j <= 63) -- * f(j, x, y, z) = x XOR (y OR NOT(z)) (64 <= j <= 79) -- * -- * -- * added constants (hexadecimal) -- * -- * K(j) = 0x00000000 (0 <= j <= 15) -- * K(j) = 0x5A827999 (16 <= j <= 31) int(2**30 x sqrt(2)) -- * K(j) = 0x6ED9EBA1 (32 <= j <= 47) int(2**30 x sqrt(3)) -- * K(j) = 0x8F1BBCDC (48 <= j <= 63) int(2**30 x sqrt(5)) -- * K(j) = 0xA953FD4E (64 <= j <= 79) int(2**30 x sqrt(7)) -- * K'(j) = 0x50A28BE6 (0 <= j <= 15) int(2**30 x cbrt(2)) -- * K'(j) = 0x5C4DD124 (16 <= j <= 31) int(2**30 x cbrt(3)) -- * K'(j) = 0x6D703EF3 (32 <= j <= 47) int(2**30 x cbrt(5)) -- * K'(j) = 0x7A6D76E9 (48 <= j <= 63) int(2**30 x cbrt(7)) -- * K'(j) = 0x00000000 (64 <= j <= 79) -- * -- * -- * selection of message word -- * -- * r(j) = j (0 <= j <= 15) -- * r(16..31) = 7, 4, 13, 1, 10, 6, 15, 3, 12, 0, 9, 5, 2, 14, 11, 8 -- * r(32..47) = 3, 10, 14, 4, 9, 15, 8, 1, 2, 7, 0, 6, 13, 11, 5, 12 -- * r(48..63) = 1, 9, 11, 10, 0, 8, 12, 4, 13, 3, 7, 15, 14, 5, 6, 2 -- * r(64..79) = 4, 0, 5, 9, 7, 12, 2, 10, 14, 1, 3, 8, 11, 6, 15, 13 -- * r0(0..15) = 5, 14, 7, 0, 9, 2, 11, 4, 13, 6, 15, 8, 1, 10, 3, 12 -- * r0(16..31)= 6, 11, 3, 7, 0, 13, 5, 10, 14, 15, 8, 12, 4, 9, 1, 2 -- * r0(32..47)= 15, 5, 1, 3, 7, 14, 6, 9, 11, 8, 12, 2, 10, 0, 4, 13 -- * r0(48..63)= 8, 6, 4, 1, 3, 11, 15, 0, 5, 12, 2, 13, 9, 7, 10, 14 -- * r0(64..79)= 12, 15, 10, 4, 1, 5, 8, 7, 6, 2, 13, 14, 0, 3, 9, 11 -- * -- * -- * amount for rotate left (rol) -- * -- * s(0..15) = 11, 14, 15, 12, 5, 8, 7, 9, 11, 13, 14, 15, 6, 7, 9, 8 -- * s(16..31) = 7, 6, 8, 13, 11, 9, 7, 15, 7, 12, 15, 9, 11, 7, 13, 12 -- * s(32..47) = 11, 13, 6, 7, 14, 9, 13, 15, 14, 8, 13, 6, 5, 12, 7, 5 -- * s(48..63) = 11, 12, 14, 15, 14, 15, 9, 8, 9, 14, 5, 6, 8, 6, 5, 12 -- * s(64..79) = 9, 15, 5, 11, 6, 8, 13, 12, 5, 12, 13, 14, 11, 8, 5, 6 -- * s'(0..15) = 8, 9, 9, 11, 13, 15, 15, 5, 7, 7, 8, 11, 14, 14, 12, 6 -- * s'(16..31)= 9, 13, 15, 7, 12, 8, 9, 11, 7, 7, 12, 7, 6, 15, 13, 11 -- * s'(32..47)= 9, 7, 15, 11, 8, 6, 6, 14, 12, 13, 5, 14, 13, 13, 7, 5 -- * s'(48..63)= 15, 5, 8, 11, 14, 14, 6, 14, 6, 9, 12, 9, 12, 5, 15, 8 -- * s'(64..79)= 8, 5, 12, 9, 12, 5, 14, 6, 8, 13, 6, 5, 15, 13, 11, 11 -- * -- * -- * initial value (hexadecimal) -- * -- * h0 = 0x67452301; h1 = 0xEFCDAB89; h2 = 0x98BADCFE; h3 = 0x10325476; -- * h4 = 0xC3D2E1F0; -- * -- * -- * RIPEMD-160: pseudo-code -- * -- * It is assumed that the message after padding consists of t 16-word blocks -- * that will be denoted with X[i][j], with 0 <= i <= t-1 and 0 <= j <= 15. -- * The symbol [+] denotes addition modulo 2**32 and rol_s denotes cyclic left -- * shift (rotate) over s positions. -- * -- * -- * for i := 0 to t-1 { -- * A := h0; B := h1; C := h2; D = h3; E = h4; -- * A' := h0; B' := h1; C' := h2; D' = h3; E' = h4; -- * for j := 0 to 79 { -- * T := rol_s(j)(A [+] f(j, B, C, D) [+] X[i][r(j)] [+] K(j)) [+] E; -- * A := E; E := D; D := rol_10(C); C := B; B := T; -- * T := rol_s'(j)(A' [+] f(79-j, B', C', D') [+] X[i][r'(j)] -- [+] K'(j)) [+] E'; -- * A' := E'; E' := D'; D' := rol_10(C'); C' := B'; B' := T; -- * } -- * T := h1 [+] C [+] D'; h1 := h2 [+] D [+] E'; h2 := h3 [+] E [+] A'; -- * h3 := h4 [+] A [+] B'; h4 := h0 [+] B [+] C'; h0 := T; -- * } -- */ -- --/* Some examples: -- * "" 9c1185a5c5e9fc54612808977ee8f548b2258d31 -- * "a" 0bdc9d2d256b3ee9daae347be6f4dc835a467ffe -- * "abc" 8eb208f7e05d987a9b044a8e98c6b087f15a0bfc -- * "message digest" 5d0689ef49d2fae572b881b123a85ffa21595f36 -- * "a...z" f71c27109c692c1b56bbdceb5b9d2865b3708dbc -- * "abcdbcde...nopq" 12a053384a9c0c88e405a06c27dcf49ada62eb2b -- * "A...Za...z0...9" b0e20b6e3116640286ed3a87a5713079b21f5189 -- * 8 times "1234567890" 9b752e45573d4b39f4dbd3323cab82bf63326bfb -- * 1 million times "a" 52783243c1697bdbe16d37f97f68f08325dc1528 -- */ -- --static void --burn_stack (int bytes) --{ -- char buf[150]; -- -- memset (buf, 0, sizeof buf); -- bytes -= sizeof buf; -- if (bytes > 0) -- burn_stack (bytes); --} -- -- -- --void --rmd160_init( RMD160_CONTEXT *hd ) --{ -- hd->h0 = 0x67452301; -- hd->h1 = 0xEFCDAB89; -- hd->h2 = 0x98BADCFE; -- hd->h3 = 0x10325476; -- hd->h4 = 0xC3D2E1F0; -- hd->nblocks = 0; -- hd->count = 0; --} -- -- -- --/**************** -- * Transform the message X which consists of 16 32-bit-words -- */ --static void --transform( RMD160_CONTEXT *hd, byte *data ) --{ -- u32 a,b,c,d,e,aa,bb,cc,dd,ee,t; -- #ifdef BIG_ENDIAN_HOST -- u32 x[16]; -- { int i; -- byte *p2, *p1; -- for(i=0, p1=data, p2=(byte*)x; i < 16; i++, p2 += 4 ) { -- p2[3] = *p1++; -- p2[2] = *p1++; -- p2[1] = *p1++; -- p2[0] = *p1++; -- } -- } -- #else -- #if 0 -- u32 *x =(u32*)data; -- #else -- /* this version is better because it is always aligned; -- * The performance penalty on a 586-100 is about 6% which -- * is acceptable - because the data is more local it might -- * also be possible that this is faster on some machines. -- * This function (when compiled with -02 on gcc 2.7.2) -- * executes on a 586-100 (39.73 bogomips) at about 1900kb/sec; -- * [measured with a 4MB data and "gpgm --print-md rmd160"] */ -- u32 x[16]; -- memcpy( x, data, 64 ); -- #endif -- #endif -- -- --#define K0 0x00000000 --#define K1 0x5A827999 --#define K2 0x6ED9EBA1 --#define K3 0x8F1BBCDC --#define K4 0xA953FD4E --#define KK0 0x50A28BE6 --#define KK1 0x5C4DD124 --#define KK2 0x6D703EF3 --#define KK3 0x7A6D76E9 --#define KK4 0x00000000 --#define F0(x,y,z) ( (x) ^ (y) ^ (z) ) --#define F1(x,y,z) ( ((x) & (y)) | (~(x) & (z)) ) --#define F2(x,y,z) ( ((x) | ~(y)) ^ (z) ) --#define F3(x,y,z) ( ((x) & (z)) | ((y) & ~(z)) ) --#define F4(x,y,z) ( (x) ^ ((y) | ~(z)) ) --#define R(a,b,c,d,e,f,k,r,s) do { t = a + f(b,c,d) + k + x[r]; \ -- a = rol(t,s) + e; \ -- c = rol(c,10); \ -- } while(0) -- -- /* left lane */ -- a = hd->h0; -- b = hd->h1; -- c = hd->h2; -- d = hd->h3; -- e = hd->h4; -- R( a, b, c, d, e, F0, K0, 0, 11 ); -- R( e, a, b, c, d, F0, K0, 1, 14 ); -- R( d, e, a, b, c, F0, K0, 2, 15 ); -- R( c, d, e, a, b, F0, K0, 3, 12 ); -- R( b, c, d, e, a, F0, K0, 4, 5 ); -- R( a, b, c, d, e, F0, K0, 5, 8 ); -- R( e, a, b, c, d, F0, K0, 6, 7 ); -- R( d, e, a, b, c, F0, K0, 7, 9 ); -- R( c, d, e, a, b, F0, K0, 8, 11 ); -- R( b, c, d, e, a, F0, K0, 9, 13 ); -- R( a, b, c, d, e, F0, K0, 10, 14 ); -- R( e, a, b, c, d, F0, K0, 11, 15 ); -- R( d, e, a, b, c, F0, K0, 12, 6 ); -- R( c, d, e, a, b, F0, K0, 13, 7 ); -- R( b, c, d, e, a, F0, K0, 14, 9 ); -- R( a, b, c, d, e, F0, K0, 15, 8 ); -- R( e, a, b, c, d, F1, K1, 7, 7 ); -- R( d, e, a, b, c, F1, K1, 4, 6 ); -- R( c, d, e, a, b, F1, K1, 13, 8 ); -- R( b, c, d, e, a, F1, K1, 1, 13 ); -- R( a, b, c, d, e, F1, K1, 10, 11 ); -- R( e, a, b, c, d, F1, K1, 6, 9 ); -- R( d, e, a, b, c, F1, K1, 15, 7 ); -- R( c, d, e, a, b, F1, K1, 3, 15 ); -- R( b, c, d, e, a, F1, K1, 12, 7 ); -- R( a, b, c, d, e, F1, K1, 0, 12 ); -- R( e, a, b, c, d, F1, K1, 9, 15 ); -- R( d, e, a, b, c, F1, K1, 5, 9 ); -- R( c, d, e, a, b, F1, K1, 2, 11 ); -- R( b, c, d, e, a, F1, K1, 14, 7 ); -- R( a, b, c, d, e, F1, K1, 11, 13 ); -- R( e, a, b, c, d, F1, K1, 8, 12 ); -- R( d, e, a, b, c, F2, K2, 3, 11 ); -- R( c, d, e, a, b, F2, K2, 10, 13 ); -- R( b, c, d, e, a, F2, K2, 14, 6 ); -- R( a, b, c, d, e, F2, K2, 4, 7 ); -- R( e, a, b, c, d, F2, K2, 9, 14 ); -- R( d, e, a, b, c, F2, K2, 15, 9 ); -- R( c, d, e, a, b, F2, K2, 8, 13 ); -- R( b, c, d, e, a, F2, K2, 1, 15 ); -- R( a, b, c, d, e, F2, K2, 2, 14 ); -- R( e, a, b, c, d, F2, K2, 7, 8 ); -- R( d, e, a, b, c, F2, K2, 0, 13 ); -- R( c, d, e, a, b, F2, K2, 6, 6 ); -- R( b, c, d, e, a, F2, K2, 13, 5 ); -- R( a, b, c, d, e, F2, K2, 11, 12 ); -- R( e, a, b, c, d, F2, K2, 5, 7 ); -- R( d, e, a, b, c, F2, K2, 12, 5 ); -- R( c, d, e, a, b, F3, K3, 1, 11 ); -- R( b, c, d, e, a, F3, K3, 9, 12 ); -- R( a, b, c, d, e, F3, K3, 11, 14 ); -- R( e, a, b, c, d, F3, K3, 10, 15 ); -- R( d, e, a, b, c, F3, K3, 0, 14 ); -- R( c, d, e, a, b, F3, K3, 8, 15 ); -- R( b, c, d, e, a, F3, K3, 12, 9 ); -- R( a, b, c, d, e, F3, K3, 4, 8 ); -- R( e, a, b, c, d, F3, K3, 13, 9 ); -- R( d, e, a, b, c, F3, K3, 3, 14 ); -- R( c, d, e, a, b, F3, K3, 7, 5 ); -- R( b, c, d, e, a, F3, K3, 15, 6 ); -- R( a, b, c, d, e, F3, K3, 14, 8 ); -- R( e, a, b, c, d, F3, K3, 5, 6 ); -- R( d, e, a, b, c, F3, K3, 6, 5 ); -- R( c, d, e, a, b, F3, K3, 2, 12 ); -- R( b, c, d, e, a, F4, K4, 4, 9 ); -- R( a, b, c, d, e, F4, K4, 0, 15 ); -- R( e, a, b, c, d, F4, K4, 5, 5 ); -- R( d, e, a, b, c, F4, K4, 9, 11 ); -- R( c, d, e, a, b, F4, K4, 7, 6 ); -- R( b, c, d, e, a, F4, K4, 12, 8 ); -- R( a, b, c, d, e, F4, K4, 2, 13 ); -- R( e, a, b, c, d, F4, K4, 10, 12 ); -- R( d, e, a, b, c, F4, K4, 14, 5 ); -- R( c, d, e, a, b, F4, K4, 1, 12 ); -- R( b, c, d, e, a, F4, K4, 3, 13 ); -- R( a, b, c, d, e, F4, K4, 8, 14 ); -- R( e, a, b, c, d, F4, K4, 11, 11 ); -- R( d, e, a, b, c, F4, K4, 6, 8 ); -- R( c, d, e, a, b, F4, K4, 15, 5 ); -- R( b, c, d, e, a, F4, K4, 13, 6 ); -- -- aa = a; bb = b; cc = c; dd = d; ee = e; -- -- /* right lane */ -- a = hd->h0; -- b = hd->h1; -- c = hd->h2; -- d = hd->h3; -- e = hd->h4; -- R( a, b, c, d, e, F4, KK0, 5, 8); -- R( e, a, b, c, d, F4, KK0, 14, 9); -- R( d, e, a, b, c, F4, KK0, 7, 9); -- R( c, d, e, a, b, F4, KK0, 0, 11); -- R( b, c, d, e, a, F4, KK0, 9, 13); -- R( a, b, c, d, e, F4, KK0, 2, 15); -- R( e, a, b, c, d, F4, KK0, 11, 15); -- R( d, e, a, b, c, F4, KK0, 4, 5); -- R( c, d, e, a, b, F4, KK0, 13, 7); -- R( b, c, d, e, a, F4, KK0, 6, 7); -- R( a, b, c, d, e, F4, KK0, 15, 8); -- R( e, a, b, c, d, F4, KK0, 8, 11); -- R( d, e, a, b, c, F4, KK0, 1, 14); -- R( c, d, e, a, b, F4, KK0, 10, 14); -- R( b, c, d, e, a, F4, KK0, 3, 12); -- R( a, b, c, d, e, F4, KK0, 12, 6); -- R( e, a, b, c, d, F3, KK1, 6, 9); -- R( d, e, a, b, c, F3, KK1, 11, 13); -- R( c, d, e, a, b, F3, KK1, 3, 15); -- R( b, c, d, e, a, F3, KK1, 7, 7); -- R( a, b, c, d, e, F3, KK1, 0, 12); -- R( e, a, b, c, d, F3, KK1, 13, 8); -- R( d, e, a, b, c, F3, KK1, 5, 9); -- R( c, d, e, a, b, F3, KK1, 10, 11); -- R( b, c, d, e, a, F3, KK1, 14, 7); -- R( a, b, c, d, e, F3, KK1, 15, 7); -- R( e, a, b, c, d, F3, KK1, 8, 12); -- R( d, e, a, b, c, F3, KK1, 12, 7); -- R( c, d, e, a, b, F3, KK1, 4, 6); -- R( b, c, d, e, a, F3, KK1, 9, 15); -- R( a, b, c, d, e, F3, KK1, 1, 13); -- R( e, a, b, c, d, F3, KK1, 2, 11); -- R( d, e, a, b, c, F2, KK2, 15, 9); -- R( c, d, e, a, b, F2, KK2, 5, 7); -- R( b, c, d, e, a, F2, KK2, 1, 15); -- R( a, b, c, d, e, F2, KK2, 3, 11); -- R( e, a, b, c, d, F2, KK2, 7, 8); -- R( d, e, a, b, c, F2, KK2, 14, 6); -- R( c, d, e, a, b, F2, KK2, 6, 6); -- R( b, c, d, e, a, F2, KK2, 9, 14); -- R( a, b, c, d, e, F2, KK2, 11, 12); -- R( e, a, b, c, d, F2, KK2, 8, 13); -- R( d, e, a, b, c, F2, KK2, 12, 5); -- R( c, d, e, a, b, F2, KK2, 2, 14); -- R( b, c, d, e, a, F2, KK2, 10, 13); -- R( a, b, c, d, e, F2, KK2, 0, 13); -- R( e, a, b, c, d, F2, KK2, 4, 7); -- R( d, e, a, b, c, F2, KK2, 13, 5); -- R( c, d, e, a, b, F1, KK3, 8, 15); -- R( b, c, d, e, a, F1, KK3, 6, 5); -- R( a, b, c, d, e, F1, KK3, 4, 8); -- R( e, a, b, c, d, F1, KK3, 1, 11); -- R( d, e, a, b, c, F1, KK3, 3, 14); -- R( c, d, e, a, b, F1, KK3, 11, 14); -- R( b, c, d, e, a, F1, KK3, 15, 6); -- R( a, b, c, d, e, F1, KK3, 0, 14); -- R( e, a, b, c, d, F1, KK3, 5, 6); -- R( d, e, a, b, c, F1, KK3, 12, 9); -- R( c, d, e, a, b, F1, KK3, 2, 12); -- R( b, c, d, e, a, F1, KK3, 13, 9); -- R( a, b, c, d, e, F1, KK3, 9, 12); -- R( e, a, b, c, d, F1, KK3, 7, 5); -- R( d, e, a, b, c, F1, KK3, 10, 15); -- R( c, d, e, a, b, F1, KK3, 14, 8); -- R( b, c, d, e, a, F0, KK4, 12, 8); -- R( a, b, c, d, e, F0, KK4, 15, 5); -- R( e, a, b, c, d, F0, KK4, 10, 12); -- R( d, e, a, b, c, F0, KK4, 4, 9); -- R( c, d, e, a, b, F0, KK4, 1, 12); -- R( b, c, d, e, a, F0, KK4, 5, 5); -- R( a, b, c, d, e, F0, KK4, 8, 14); -- R( e, a, b, c, d, F0, KK4, 7, 6); -- R( d, e, a, b, c, F0, KK4, 6, 8); -- R( c, d, e, a, b, F0, KK4, 2, 13); -- R( b, c, d, e, a, F0, KK4, 13, 6); -- R( a, b, c, d, e, F0, KK4, 14, 5); -- R( e, a, b, c, d, F0, KK4, 0, 15); -- R( d, e, a, b, c, F0, KK4, 3, 13); -- R( c, d, e, a, b, F0, KK4, 9, 11); -- R( b, c, d, e, a, F0, KK4, 11, 11); -- -- -- t = hd->h1 + d + cc; -- hd->h1 = hd->h2 + e + dd; -- hd->h2 = hd->h3 + a + ee; -- hd->h3 = hd->h4 + b + aa; -- hd->h4 = hd->h0 + c + bb; -- hd->h0 = t; --} -- -- --/* Update the message digest with the contents -- * of INBUF with length INLEN. -- */ --static void --rmd160_write( RMD160_CONTEXT *hd, byte *inbuf, size_t inlen) --{ -- if( hd->count == 64 ) { /* flush the buffer */ -- transform( hd, hd->buf ); -- burn_stack (108+5*sizeof(void*)); -- hd->count = 0; -- hd->nblocks++; -- } -- if( !inbuf ) -- return; -- if( hd->count ) { -- for( ; inlen && hd->count < 64; inlen-- ) -- hd->buf[hd->count++] = *inbuf++; -- rmd160_write( hd, NULL, 0 ); -- if( !inlen ) -- return; -- } -- -- while( inlen >= 64 ) { -- transform( hd, inbuf ); -- hd->count = 0; -- hd->nblocks++; -- inlen -= 64; -- inbuf += 64; -- } -- burn_stack (108+5*sizeof(void*)); -- for( ; inlen && hd->count < 64; inlen-- ) -- hd->buf[hd->count++] = *inbuf++; --} -- --/**************** -- * Apply the rmd160 transform function on the buffer which must have -- * a length 64 bytes. Do not use this function together with the -- * other functions, use rmd160_init to initialize internal variables. -- * Returns: 16 bytes in buffer with the mixed contentes of buffer. -- */ --void --rmd160_mixblock( RMD160_CONTEXT *hd, char *buffer ) --{ -- char *p = buffer; -- transform( hd, buffer ); -- #define X(a) do { *(u32*)p = hd->h##a ; p += 4; } while(0) -- X(0); -- X(1); -- X(2); -- X(3); -- X(4); -- #undef X --} -- -- --/* The routine terminates the computation -- */ -- --static void --rmd160_final( RMD160_CONTEXT *hd ) --{ -- u32 t, msb, lsb; -- byte *p; -- -- rmd160_write(hd, NULL, 0); /* flush */; -- -- t = hd->nblocks; -- /* multiply by 64 to make a byte count */ -- lsb = t << 6; -- msb = t >> 26; -- /* add the count */ -- t = lsb; -- if( (lsb += hd->count) < t ) -- msb++; -- /* multiply by 8 to make a bit count */ -- t = lsb; -- lsb <<= 3; -- msb <<= 3; -- msb |= t >> 29; -- -- if( hd->count < 56 ) { /* enough room */ -- hd->buf[hd->count++] = 0x80; /* pad */ -- while( hd->count < 56 ) -- hd->buf[hd->count++] = 0; /* pad */ -- } -- else { /* need one extra block */ -- hd->buf[hd->count++] = 0x80; /* pad character */ -- while( hd->count < 64 ) -- hd->buf[hd->count++] = 0; -- rmd160_write(hd, NULL, 0); /* flush */; -- memset(hd->buf, 0, 56 ); /* fill next block with zeroes */ -- } -- /* append the 64 bit count */ -- hd->buf[56] = lsb ; -- hd->buf[57] = lsb >> 8; -- hd->buf[58] = lsb >> 16; -- hd->buf[59] = lsb >> 24; -- hd->buf[60] = msb ; -- hd->buf[61] = msb >> 8; -- hd->buf[62] = msb >> 16; -- hd->buf[63] = msb >> 24; -- transform( hd, hd->buf ); -- burn_stack (108+5*sizeof(void*)); -- -- p = hd->buf; -- #ifdef BIG_ENDIAN_HOST -- #define X(a) do { *p++ = hd->h##a ; *p++ = hd->h##a >> 8; \ -- *p++ = hd->h##a >> 16; *p++ = hd->h##a >> 24; } while(0) -- #else /* little endian */ -- #define X(a) do { *(u32*)p = hd->h##a ; p += 4; } while(0) -- #endif -- X(0); -- X(1); -- X(2); -- X(3); -- X(4); -- #undef X --} -- --static byte * --rmd160_read( RMD160_CONTEXT *hd ) --{ -- return hd->buf; --} -- -- -- --/**************** -- * Shortcut functions which puts the hash value of the supplied buffer -- * into outbuf which must have a size of 20 bytes. -- */ --void --rmd160_hash_buffer( char *outbuf, const char *buffer, size_t length ) --{ -- RMD160_CONTEXT hd; -- -- rmd160_init( &hd ); -- rmd160_write( &hd, (byte*)buffer, length ); -- rmd160_final( &hd ); -- memcpy( outbuf, hd.buf, 20 ); --} -- -- --/**************** -- * Return some information about the algorithm. We need algo here to -- * distinguish different flavors of the algorithm. -- * Returns: A pointer to string describing the algorithm or NULL if -- * the ALGO is invalid. -- */ --static const char * --rmd160_get_info( int algo, size_t *contextsize, -- byte **r_asnoid, int *r_asnlen, int *r_mdlen, -- void (**r_init)( void *c ), -- void (**r_write)( void *c, byte *buf, size_t nbytes ), -- void (**r_final)( void *c ), -- byte *(**r_read)( void *c ) -- ) --{ -- static byte asn[15] = /* Object ID is 1.3.36.3.2.1 */ -- { 0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2b, 0x24, 0x03, -- 0x02, 0x01, 0x05, 0x00, 0x04, 0x14 }; -- -- if( algo != 3 ) -- return NULL; -- -- *contextsize = sizeof(RMD160_CONTEXT); -- *r_asnoid = asn; -- *r_asnlen = DIM(asn); -- *r_mdlen = 20; -- *(void (**)(RMD160_CONTEXT *))r_init = rmd160_init; -- *(void (**)(RMD160_CONTEXT *, byte*, size_t))r_write = rmd160_write; -- *(void (**)(RMD160_CONTEXT *))r_final = rmd160_final; -- *(byte *(**)(RMD160_CONTEXT *))r_read = rmd160_read; -- -- return "RIPEMD160"; --} -- -- --#ifndef IS_MODULE --static --#endif --const char * const gnupgext_version = "RMD160 ($Revision: 1.17.2.4 $)"; -- --static struct { -- int class; -- int version; -- int value; -- void (*func)(void); --} func_table[] = { -- { 10, 1, 0, (void(*)(void))rmd160_get_info }, -- { 11, 1, 3 }, --}; -- -- --#ifndef IS_MODULE --static --#endif --void * --gnupgext_enum_func( int what, int *sequence, int *class, int *vers ) --{ -- void *ret; -- int i = *sequence; -- -- do { -- if( i >= DIM(func_table) || i < 0 ) { -- return NULL; -- } -- *class = func_table[i].class; -- *vers = func_table[i].version; -- switch( *class ) { -- case 11: -- case 21: -- case 31: -- ret = &func_table[i].value; -- break; -- default: -- ret = func_table[i].func; -- break; -- } -- i++; -- } while( what && what != *class ); -- -- *sequence = i; -- return ret; --} -- -- -- --#ifndef __HURD__ --#ifndef IS_MODULE --void --rmd160_constructor(void) --{ -- register_internal_cipher_extension( gnupgext_version, gnupgext_enum_func ); --} --#endif --#endif -diff --git a/random/random.c b/random/random.c -deleted file mode 100644 -index 8f76c5b..0000000 ---- a/random/random.c -+++ /dev/null -@@ -1,650 +0,0 @@ --/* random.c - A single-file translator providing random data -- Copyright (C) 1998, 1999, 2001 Free Software Foundation, Inc. -- -- This program is free software; you can redistribute it and/or -- modify it under the terms of the GNU General Public License as -- published by the Free Software Foundation; either version 2, or (at -- your option) any later version. -- -- This program is distributed in the hope that it will be useful, but -- WITHOUT ANY WARRANTY; without even the implied warranty of -- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU -- General Public License for more details. -- -- You should have received a copy of the GNU General Public License -- along with this program; if not, write to the Free Software -- Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ -- --#define _GNU_SOURCE 1 -- --#include <hurd/paths.h> --#include <hurd/trivfs.h> --#include <hurd/startup.h> --#include <stdio.h> --#include <stdlib.h> --#include <argp.h> --#include <argz.h> --#include <error.h> --#include <string.h> --#include <fcntl.h> --#include <sys/mman.h> --#include <pthread.h> --#include <assert.h> -- --#include <version.h> -- --#include "random.h" --#include "gnupg-random.h" -- --/* Our control port. */ --struct trivfs_control *fsys; -- --int read_blocked; /* For read and select. */ --pthread_cond_t wait; /* For read and select. */ --pthread_cond_t select_alert; /* For read and select. */ -- -- --/* The quality of randomness we provide. -- 0: Very weak randomness based on time() and getrusage(). -- No external random data is used. -- 1: Pseudo random numbers based on all available real random -- numbers. -- 2: Strong random numbers with a somewhat guaranteed entropy. --*/ --#define DEFAULT_LEVEL 2 --static int level = DEFAULT_LEVEL; -- --/* Name of file to use as seed. */ --static char *seed_file; -- --/* The random bytes we collected. */ --char gatherbuf[GATHERBUFSIZE]; -- --/* The current positions in gatherbuf[]. */ --int gatherrpos; --int gatherwpos; -- --/* XXX Yuk Yuk. */ --#define POOLSIZE 600 -- --/* Take up to length bytes from gather_random if available. If -- nothing is available, sleep until something becomes available. -- Must be called with global_lock held. */ --int --gather_random( void (*add)(const void*, size_t, int), int requester, -- size_t length, int level ) --{ -- int avail = (gatherwpos - gatherrpos + GATHERBUFSIZE) % GATHERBUFSIZE; -- int first = GATHERBUFSIZE - gatherrpos; -- int second = length - first; -- -- /* If level is zero, we should not block and not add anything -- to the pool. */ -- if( !level ) -- return 0; -- -- /* io_read() should guarantee that there is always data available. */ -- if (level == 2) -- assert (avail); -- -- if (length > avail) -- length = avail; -- -- if (first > length) -- first = length; -- (*add) (&gatherbuf[gatherrpos], first, requester); -- gatherrpos = (gatherrpos + first) % GATHERBUFSIZE; -- if (second > 0) -- { -- (*add) (&gatherbuf[gatherrpos], second, requester); -- gatherrpos += second; -- } -- return length; --} -- -- --const char *argp_program_version = STANDARD_HURD_VERSION (random); -- --/* This lock protects the GnuPG code. */ --static pthread_mutex_t global_lock; -- --/* Trivfs hooks. */ --int trivfs_fstype = FSTYPE_MISC; --int trivfs_fsid = 0; -- --int trivfs_allow_open = O_READ | O_WRITE; -- --int trivfs_support_read = 1; --int trivfs_support_write = 1; --int trivfs_support_exec = 0; -- --void --trivfs_modify_stat (struct trivfs_protid *cred, struct stat *st) --{ -- /* Mark the node as a read-only plain file. */ -- st->st_mode &= ~S_IFMT; -- st->st_mode |= (S_IFCHR); -- st->st_size = 0; --} -- --error_t --trivfs_goaway (struct trivfs_control *cntl, int flags) --{ -- update_random_seed_file (); -- exit (0); --} -- --/* Read data from an IO object. If offset is -1, read from the object -- maintained file pointer. If the object is not seekable, offset is -- ignored. The amount desired to be read is in AMOUNT. */ --error_t --trivfs_S_io_read (struct trivfs_protid *cred, -- mach_port_t reply, mach_msg_type_name_t reply_type, -- data_t *data, mach_msg_type_number_t *data_len, -- loff_t offs, mach_msg_type_number_t amount) --{ -- error_t err; -- mach_msg_type_number_t read_amount = 0; -- void *buf = NULL; -- size_t length; -- -- /* Deny access if they have bad credentials. */ -- if (! cred) -- return EOPNOTSUPP; -- else if (! (cred->po->openmodes & O_READ)) -- return EBADF; -- -- pthread_mutex_lock (&global_lock); -- -- while (amount > 0) -- { -- mach_msg_type_number_t new_amount; -- /* XXX: It would be nice to fix readable_pool to work for sizes -- greater than the POOLSIZE. Otherwise we risk detecting too -- late that we run out of entropy and all that entropy is -- wasted. */ -- while (readable_pool (amount, level) == 0) -- { -- if (cred->po->openmodes & O_NONBLOCK) -- { -- pthread_mutex_unlock (&global_lock); -- err = EWOULDBLOCK; -- goto errout; -- } -- read_blocked = 1; -- if (pthread_hurd_cond_wait_np (&wait, &global_lock)) -- { -- pthread_mutex_unlock (&global_lock); -- err = EINTR; -- goto errout; -- } -- /* See term/users.c for possible race? */ -- } -- -- /* Possibly allocate a new buffer. */ -- if (*data_len < amount) -- { -- *data = mmap (0, amount, PROT_READ|PROT_WRITE, -- MAP_ANON, 0, 0); -- -- if (*data == MAP_FAILED) -- { -- pthread_mutex_unlock (&global_lock); -- return errno; -- } -- -- /* Keep track of our map in case of errors. */ -- buf = *data, length = amount; -- -- /* Update DATA_LEN to reflect the new buffers size. */ -- *data_len = amount; -- } -- -- new_amount = read_pool (((byte *) *data) + read_amount, amount, level); -- read_amount += new_amount; -- amount -= new_amount; -- } -- -- /* Set atime, see term/users.c */ -- -- pthread_mutex_unlock (&global_lock); -- *data_len = read_amount; -- return 0; -- -- errout: -- if (buf) -- munmap (buf, length); -- return err; --} -- --/* Write data to an IO object. If offset is -1, write at the object -- maintained file pointer. If the object is not seekable, offset is -- ignored. The amount successfully written is returned in amount. A -- given user should not have more than one outstanding io_write on an -- object at a time; servers implement congestion control by delaying -- responses to io_write. Servers may drop data (returning ENOBUFS) -- if they receive more than one write when not prepared for it. */ --error_t --trivfs_S_io_write (struct trivfs_protid *cred, -- mach_port_t reply, -- mach_msg_type_name_t replytype, -- data_t data, -- mach_msg_type_number_t datalen, -- loff_t offset, -- mach_msg_type_number_t *amount) --{ -- int i = 0; -- /* Deny access if they have bad credentials. */ -- if (! cred) -- return EOPNOTSUPP; -- else if (! (cred->po->openmodes & O_WRITE)) -- return EBADF; -- -- pthread_mutex_lock (&global_lock); -- -- while (i < datalen) -- { -- gatherbuf[gatherwpos] = data[i++]; -- gatherwpos = (gatherwpos + 1) % GATHERBUFSIZE; -- if (gatherrpos == gatherwpos) -- /* Overrun. */ -- gatherrpos = (gatherrpos + 1) % GATHERBUFSIZE; -- } -- *amount = datalen; -- -- if (datalen > 0 && read_blocked) -- { -- read_blocked = 0; -- pthread_cond_broadcast (&wait); -- pthread_cond_broadcast (&select_alert); -- } -- -- pthread_mutex_unlock (&global_lock); -- return 0; --} -- --/* Tell how much data can be read from the object without blocking for -- a "long time" (this should be the same meaning of "long time" used -- by the nonblocking flag. */ --kern_return_t --trivfs_S_io_readable (struct trivfs_protid *cred, -- mach_port_t reply, mach_msg_type_name_t replytype, -- mach_msg_type_number_t *amount) --{ -- /* Deny access if they have bad credentials. */ -- if (! cred) -- return EOPNOTSUPP; -- else if (! (cred->po->openmodes & O_READ)) -- return EBADF; -- -- pthread_mutex_lock (&global_lock); -- -- /* XXX: Before initialization, the amount depends on the amount we -- want to read. Assume some medium value. */ -- *amount = readable_pool (POOLSIZE/2, level); -- -- pthread_mutex_unlock (&global_lock); -- -- return 0; --} -- --/* SELECT_TYPE is the bitwise OR of SELECT_READ, SELECT_WRITE, and SELECT_URG. -- Block until one of the indicated types of i/o can be done "quickly", and -- return the types that are then available. ID_TAG is returned as passed; it -- is just for the convenience of the user in matching up reply messages with -- specific requests sent. */ --error_t --trivfs_S_io_select (struct trivfs_protid *cred, -- mach_port_t reply, -- mach_msg_type_name_t reply_type, -- int *type) --{ -- if (!cred) -- return EOPNOTSUPP; -- -- /* We only deal with SELECT_READ and SELECT_WRITE here. */ -- if (*type & ~(SELECT_READ | SELECT_WRITE)) -- return EINVAL; -- -- if (*type == 0) -- return 0; -- -- pthread_mutex_lock (&global_lock); -- -- while (1) -- { -- /* XXX Before initialization, readable_pool depends on length. */ -- int avail = readable_pool (POOLSIZE/2, level); -- -- if (avail != 0 || *type & SELECT_WRITE) -- { -- *type = (avail ? SELECT_READ : 0) | (*type & SELECT_WRITE); -- pthread_mutex_unlock (&global_lock); -- return 0; -- } -- -- ports_interrupt_self_on_port_death (cred, reply); -- read_blocked = 1; -- -- if (pthread_hurd_cond_wait_np (&select_alert, &global_lock)) -- { -- *type = 0; -- pthread_mutex_unlock (&global_lock); -- return EINTR; -- } -- } --} -- -- --/* Change current read/write offset */ --error_t --trivfs_S_io_seek (struct trivfs_protid *cred, -- mach_port_t reply, mach_msg_type_name_t reply_type, -- loff_t offs, int whence, loff_t *new_offs) --{ -- if (! cred) -- return EOPNOTSUPP; -- -- /* Not seekable. */ -- return ESPIPE; --} -- --/* Change the size of the file. If the size increases, new blocks are -- zero-filled. After successful return, it is safe to reference mapped -- areas of the file up to NEW_SIZE. */ --error_t --trivfs_S_file_set_size (struct trivfs_protid *cred, -- mach_port_t reply, mach_msg_type_name_t reply_type, -- loff_t size) --{ -- if (!cred) -- return EOPNOTSUPP; -- -- return size == 0 ? 0 : EINVAL; --} -- --/* These four routines modify the O_APPEND, O_ASYNC, O_FSYNC, and -- O_NONBLOCK bits for the IO object. In addition, io_get_openmodes -- will tell you which of O_READ, O_WRITE, and O_EXEC the object can -- be used for. The O_ASYNC bit affects icky async I/O; good async -- I/O is done through io_async which is orthogonal to these calls. */ --error_t --trivfs_S_io_set_all_openmodes(struct trivfs_protid *cred, -- mach_port_t reply, -- mach_msg_type_name_t reply_type, -- int mode) --{ -- if (!cred) -- return EOPNOTSUPP; -- -- return 0; --} -- --error_t --trivfs_S_io_set_some_openmodes (struct trivfs_protid *cred, -- mach_port_t reply, -- mach_msg_type_name_t reply_type, -- int bits) --{ -- if (!cred) -- return EOPNOTSUPP; -- -- return 0; --} -- --error_t --trivfs_S_io_get_owner (struct trivfs_protid *cred, -- mach_port_t reply, -- mach_msg_type_name_t reply_type, -- pid_t *owner) --{ -- if (!cred) -- return EOPNOTSUPP; -- -- *owner = 0; -- return 0; --} -- --error_t --trivfs_S_io_mod_owner (struct trivfs_protid *cred, -- mach_port_t reply, mach_msg_type_name_t reply_type, -- pid_t owner) --{ -- if (!cred) -- return EOPNOTSUPP; -- -- return EINVAL; --} -- --/* Return objects mapping the data underlying this memory object. If -- the object can be read then memobjrd will be provided; if the -- object can be written then memobjwr will be provided. For objects -- where read data and write data are the same, these objects will be -- equal, otherwise they will be disjoint. Servers are permitted to -- implement io_map but not io_map_cntl. Some objects do not provide -- mapping; they will set none of the ports and return an error. Such -- objects can still be accessed by io_read and io_write. */ --error_t --trivfs_S_io_map(struct trivfs_protid *cred, -- mach_port_t reply, mach_msg_type_name_t reply_type, -- mach_port_t *rdobj, -- mach_msg_type_name_t *rdtype, -- mach_port_t *wrobj, -- mach_msg_type_name_t *wrtype) --{ -- if (!cred) -- return EOPNOTSUPP; -- -- return EINVAL; --} -- -- --int --random_demuxer (mach_msg_header_t *inp, -- mach_msg_header_t *outp) --{ -- extern int startup_notify_server (mach_msg_header_t *, mach_msg_header_t *); -- -- return (trivfs_demuxer (inp, outp) -- || startup_notify_server (inp, outp)); --} -- -- --/* Options processing. We accept the same options on the command line -- and from fsys_set_options. */ -- --static const struct argp_option options[] = --{ -- {"weak", 'w', 0, 0, "Output weak pseudo random data"}, -- {"fast", 'f', 0, 0, "Output cheap random data fast"}, -- {"secure", 's', 0, 0, "Output cryptographically secure random"}, -- {"seed-file", 'S', "FILE", 0, "Use FILE to remember the seed"}, -- {0} --}; -- --static error_t --parse_opt (int opt, char *arg, struct argp_state *state) --{ -- switch (opt) -- { -- default: -- return ARGP_ERR_UNKNOWN; -- case ARGP_KEY_INIT: -- case ARGP_KEY_SUCCESS: -- case ARGP_KEY_ERROR: -- break; -- -- case 'w': -- { -- level = 0; -- break; -- } -- case 'f': -- { -- level = 1; -- break; -- } -- case 's': -- { -- level = 2; -- break; -- } -- case 'S': -- { -- seed_file = strdup (arg); -- set_random_seed_file (arg); -- } -- } -- return 0; --} -- --/* This will be called from libtrivfs to help construct the answer -- to an fsys_get_options RPC. */ --error_t --trivfs_append_args (struct trivfs_control *fsys, -- char **argz, size_t *argz_len) --{ -- error_t err = 0; -- char *opt; -- -- pthread_mutex_lock (&global_lock); -- switch (level) -- { -- case 0: -- opt = "--weak"; -- break; -- -- case 1: -- opt = "--fast"; -- break; -- -- default: -- opt = "--secure"; -- } -- if (level != DEFAULT_LEVEL) -- err = argz_add (argz, argz_len, opt); -- -- if (!err && seed_file) -- { -- if (asprintf (&opt, "--seed-file=%s", seed_file) < 0) -- err = ENOMEM; -- else -- { -- err = argz_add (argz, argz_len, opt); -- free (opt); -- } -- } -- pthread_mutex_unlock (&global_lock); -- -- return err; --} -- --static struct argp random_argp = --{ options, parse_opt, 0, -- "A translator providing random output." }; -- --/* Setting this variable makes libtrivfs use our argp to -- parse options passed in an fsys_set_options RPC. */ --struct argp *trivfs_runtime_argp = &random_argp; -- --struct port_class *shutdown_notify_class; -- --/* The system is going down; destroy all the extant port rights. That -- will cause net channels and such to close promptly. */ --error_t --S_startup_dosync (mach_port_t handle) --{ -- struct port_info *inpi = ports_lookup_port (fsys->pi.bucket, handle, -- shutdown_notify_class); -- -- if (!inpi) -- return EOPNOTSUPP; -- -- update_random_seed_file (); -- return 0; --} -- --void --sigterm_handler (int signo) --{ -- update_random_seed_file (); -- signal (SIGTERM, SIG_DFL); -- raise (SIGTERM); --} -- --static error_t --arrange_shutdown_notification () --{ -- error_t err; -- mach_port_t initport, notify; -- struct port_info *pi; -- -- shutdown_notify_class = ports_create_class (0, 0); -- -- signal (SIGTERM, sigterm_handler); -- -- /* Arrange to get notified when the system goes down, -- but if we fail for some reason, just silently give up. No big deal. */ -- -- err = ports_create_port (shutdown_notify_class, fsys->pi.bucket, -- sizeof (struct port_info), &pi); -- if (err) -- return err; -- -- initport = file_name_lookup (_SERVERS_STARTUP, 0, 0); -- if (! MACH_PORT_VALID (initport)) -- return errno; -- -- notify = ports_get_send_right (pi); -- ports_port_deref (pi); -- err = startup_request_notification (initport, notify, -- MACH_MSG_TYPE_MAKE_SEND, -- program_invocation_short_name); -- -- mach_port_deallocate (mach_task_self (), notify); -- mach_port_deallocate (mach_task_self (), initport); -- return err; --} -- -- --int --main (int argc, char **argv) --{ -- error_t err; -- mach_port_t bootstrap; -- -- /* Initialize the lock that will protect everything. -- We must do this before argp_parse, because parse_opt (above) will -- use the lock. */ -- pthread_mutex_init (&global_lock, NULL); -- -- /* The conditions are used to implement proper read/select -- behaviour. */ -- pthread_cond_init (&wait, NULL); -- pthread_cond_init (&select_alert, NULL); -- -- /* We use the same argp for options available at startup -- as for options we'll accept in an fsys_set_options RPC. */ -- argp_parse (&random_argp, argc, argv, 0, 0, 0); -- -- task_get_bootstrap_port (mach_task_self (), &bootstrap); -- if (bootstrap == MACH_PORT_NULL) -- error (1, 0, "Must be started as a translator"); -- -- /* Reply to our parent */ -- err = trivfs_startup (bootstrap, 0, 0, 0, 0, 0, &fsys); -- mach_port_deallocate (mach_task_self (), bootstrap); -- if (err) -- error (3, err, "trivfs_startup"); -- -- err = arrange_shutdown_notification (); -- if (err) -- error (0, err, "Cannot request shutdown notification"); -- -- /* Launch. */ -- ports_manage_port_operations_multithread (fsys->pi.bucket, random_demuxer, -- 10 * 1000, /* idle thread */ -- 10 * 60 * 1000, /* idle server */ -- 0); -- return 0; --} -diff --git a/random/random.h b/random/random.h -deleted file mode 100644 -index a38a417..0000000 ---- a/random/random.h -+++ /dev/null -@@ -1,32 +0,0 @@ --/* random.c - A single-file translator providing random data -- Copyright (C) 1998, 1999, 2001 Free Software Foundation, Inc. -- -- This program is free software; you can redistribute it and/or -- modify it under the terms of the GNU General Public License as -- published by the Free Software Foundation; either version 2, or (at -- your option) any later version. -- -- This program is distributed in the hope that it will be useful, but -- WITHOUT ANY WARRANTY; without even the implied warranty of -- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU -- General Public License for more details. -- -- You should have received a copy of the GNU General Public License -- along with this program; if not, write to the Free Software -- Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ -- --#ifndef __RANDOM_H__ --#define __RANDOM_H__ -- --/* How many random bytes to gather at most. -- XXX: Should be at least POOLSIZE. */ --#define GATHERBUFSIZE 32768 -- --/* The random bytes we collected. */ --extern char gatherbuf[GATHERBUFSIZE]; -- --/* The current positions in gatherbuf[]. */ --extern int gatherrpos; --extern int gatherwpos; -- --#endif -diff --git a/sutils/MAKEDEV.sh b/sutils/MAKEDEV.sh -index 1baec15..9fd4b1d 100644 ---- a/sutils/MAKEDEV.sh -+++ b/sutils/MAKEDEV.sh -@@ -100,7 +100,7 @@ mkdev() { - ;; - - std) -- mkdev console tty urandom null zero full fd time mem klog shm -+ mkdev console tty random urandom null zero full fd time mem klog shm - ;; - console|com[0-9]) - st $I root 600 /hurd/term ${DEVDIR}/$I device $I;; -@@ -111,8 +111,10 @@ mkdev() { - ${DEVDIR}/vcs/`echo $I | sed -e s/tty//`/console;; - lpr[0-9]) - st $I root 660 /hurd/streamio "$I";; -+ random) -+ st $I root 644 /hurd/random --secure --seed-file /var/lib/random-seed;; - urandom) -- st $I root 644 /hurd/random --fast --seed-file /var/lib/random-seed;; -+ st $I root 644 /hurd/random --fast --seed-file /var/lib/urandom-seed;; - null) - st $I root 666 /hurd/null;; - full) -diff --git a/trans/Makefile b/trans/Makefile -index ce1eae7..ec0586e 100644 ---- a/trans/Makefile -+++ b/trans/Makefile -@@ -21,14 +21,14 @@ makemode := servers - - targets = symlink firmlink ifsock magic null fifo new-fifo fwd crash \ - password hello hello-mt streamio fakeroot proxy-defpager remap \ -- mtab -+ mtab random - SRCS = ifsock.c symlink.c magic.c null.c fifo.c new-fifo.c fwd.c \ - crash.c firmlink.c password.c hello.c hello-mt.c streamio.c \ - fakeroot.c proxy-defpager.c remap.c mtab.c - OBJS = $(SRCS:.c=.o) fsysServer.o ifsockServer.o passwordServer.o \ - crashServer.o crash_replyUser.o msgServer.o \ - default_pagerServer.o default_pagerUser.o \ -- device_replyServer.o elfcore.o -+ device_replyServer.o elfcore.o startup_notifyServer.o - HURDLIBS = ports netfs trivfs iohelp fshelp pipe ihash shouldbeinlibc - LDLIBS += -lpthread - password-LDLIBS = -lcrypt -@@ -51,6 +51,8 @@ device_reply-MIGSFLAGS="-DMACH_PAYLOAD_TO_PORT=ports_payload_get_name" - # libports. Disable the default payload to port conversion. - fsys-MIGSFLAGS = "-DHURD_DEFAULT_PAYLOAD_TO_PORT=1" - -+random-LDLIBS = -lgcrypt -+ - include ../Makeconf - - vpath elfcore.c $(top_srcdir)/exec -@@ -71,6 +73,7 @@ hello: ../libtrivfs/libtrivfs.a ../libfshelp/libfshelp.a ../libports/libports.a - fakeroot: ../libnetfs/libnetfs.a ../libfshelp/libfshelp.a ../libiohelp/libiohelp.a ../libports/libports.a ../libihash/libihash.a - remap: ../libtrivfs/libtrivfs.a ../libfshelp/libfshelp.a ../libports/libports.a ../libihash/libihash.a - mtab: ../libtrivfs/libtrivfs.a ../libfshelp/libfshelp.a ../libports/libports.a ../libihash/libihash.a fsUser.o -+random: ../libtrivfs/libtrivfs.a ../libports/libports.a ../libihash/libihash.a startup_notifyServer.o mach_debugUser.o - $(targets): ../libshouldbeinlibc/libshouldbeinlibc.a - - $(targets): %: %.o -diff --git a/trans/random.c b/trans/random.c -new file mode 100644 -index 0000000..0419912 ---- /dev/null -+++ b/trans/random.c -@@ -0,0 +1,722 @@ -+/* random.c - A single-file translator providing random data -+ Copyright (C) 1998, 1999, 2001, 2015 Free Software Foundation, Inc. -+ -+ This program is free software; you can redistribute it and/or -+ modify it under the terms of the GNU General Public License as -+ published by the Free Software Foundation; either version 2, or (at -+ your option) any later version. -+ -+ This program is distributed in the hope that it will be useful, but -+ WITHOUT ANY WARRANTY; without even the implied warranty of -+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU -+ General Public License for more details. -+ -+ You should have received a copy of the GNU General Public License -+ along with this program; if not, write to the Free Software -+ Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ -+ -+#include <argp.h> -+#include <argz.h> -+#include <assert.h> -+#include <error.h> -+#include <fcntl.h> -+#include <gcrypt.h> -+#include <hurd/paths.h> -+#include <hurd/startup.h> -+#include <hurd/trivfs.h> -+#include <mach_debug/mach_debug_types.h> -+#include <pthread.h> -+#include <stdio.h> -+#include <stdlib.h> -+#include <string.h> -+#include <sys/mman.h> -+#include <sys/stat.h> -+#include <unistd.h> -+#include <version.h> -+ -+#include "mach_debug_U.h" -+ -+/* Our control port. */ -+struct trivfs_control *fsys; -+ -+int read_blocked; /* For read and select. */ -+pthread_cond_t wait; /* For read and select. */ -+pthread_cond_t select_alert; /* For read and select. */ -+ -+/* The quality of randomness we provide. If URANDOM is set, return -+ unlimited random data. */ -+static int urandom; -+ -+/* Name of file to use as seed. */ -+static char *seed_file; -+ -+/* Entropy management. */ -+ -+/* Libgcrypts pool size limits the amount of entropy. */ -+static const size_t entropy_limit = 600; -+ -+/* Estimate of available entropy measured in bytes. */ -+static size_t entropy; -+ -+/* Protected by this lock. */ -+static pthread_mutex_t entropy_lock; -+ -+static error_t -+entropy_add (const void *buf, size_t length, float factor) -+{ -+ gcry_error_t cerr; -+ size_t new_entropy; -+ pthread_mutex_lock (&entropy_lock); -+ -+ cerr = gcry_random_add_bytes (buf, length, -1); -+ if (cerr) -+ { -+ pthread_mutex_unlock (&entropy_lock); -+ error (0, 0, "Failed to add random bytes: %s", -+ gcry_strerror (cerr)); -+ return EINVAL; -+ } -+ new_entropy = (size_t) ((float) length * factor); -+ entropy += new_entropy; -+ -+ if (entropy > entropy_limit) -+ entropy = entropy_limit; -+ -+ if (new_entropy > 0 && read_blocked) -+ { -+ read_blocked = 0; -+ pthread_cond_broadcast (&wait); -+ pthread_cond_broadcast (&select_alert); -+ } -+ -+ pthread_mutex_unlock (&entropy_lock); -+ return 0; -+} -+ -+static void -+update_random_seed_file (void) -+{ -+ gcry_error_t cerr; -+ cerr = gcry_control (GCRYCTL_UPDATE_RANDOM_SEED_FILE, seed_file, 0); -+ if (cerr) -+ error (0, 0, "Updating random seed file %s failed: %s", -+ seed_file, gcry_strerror (cerr)); -+} -+ -+static void -+initialize_gcrypt (void) -+{ -+ unsigned int seed; -+ gcry_error_t cerr; -+ -+ if (! gcry_check_version (GCRYPT_VERSION)) -+ error (1, 0, "libgcrypt version mismatch\n"); -+ -+ cerr = gcry_control (GCRYCTL_SET_PREFERRED_RNG_TYPE, -+ GCRY_RNG_TYPE_STANDARD, 0); -+ if (cerr) -+ error (1, 0, "Selecting preferred rng type failed: %s", -+ gcry_strerror (cerr)); -+ -+ if (seed_file) -+ { -+ struct stat s; -+ -+ /* Hack! XXX use relative path */ -+ if (seed_file[0] == '/') -+ { -+ chdir ("/"); -+ seed_file += 1; -+ } -+ -+ cerr = gcry_control (GCRYCTL_SET_RANDOM_SEED_FILE, seed_file, 0); -+ if (cerr) -+ error (1, 0, "Setting seed file %s failed: %s", -+ seed_file, gcry_strerror (cerr)); -+ -+ if (stat (seed_file, &s) == 0) -+ /* Libgcrypt will read the seed file on demand. Set entropy -+ accordingly. */ -+ entropy = s.st_size; -+ } -+ -+ cerr = gcry_control (GCRYCTL_INITIALIZATION_FINISHED, 0); -+ if (cerr) -+ error (1, 0, "Finalizing gcrypt failed: %s", -+ gcry_strerror (cerr)); -+ -+ /* Hack! Trick libgcrypt into assuming /dev/urandom is not -+ available by diddling with the root directory. */ -+ { -+ file_t root, var; -+ root = getcrdir (); -+ var = file_name_lookup ("/var", 0, 0); -+ setcrdir (var); -+ -+ /* Randomize SEED. Forces the random subsystem to be -+ initialized. */ -+ gcry_randomize (&seed, sizeof seed, GCRY_STRONG_RANDOM); -+ -+ setcrdir (root); -+ mach_port_deallocate (mach_task_self (), var); -+ } -+ -+ /* Initialize the libcs RNG. */ -+ srandom (seed); -+} -+ -+static void -+gather_slab_info (void) -+{ -+ error_t err; -+ cache_info_array_t cache_info; -+ mach_msg_type_number_t cache_info_count, i; -+ -+ cache_info = NULL; -+ cache_info_count = 0; -+ -+ err = host_slab_info (mach_host_self(), &cache_info, &cache_info_count); -+ if (err) -+ { -+ error (0, err, "host_slab_info"); -+ return; -+ } -+ -+ for (i = 0; i < cache_info_count; i++) -+ if (cache_info[i].nr_bufs > 500) -+ entropy_add (&cache_info[i].nr_objs, sizeof cache_info[i].nr_objs, -+ 0.25); -+ -+ vm_deallocate (mach_task_self (), -+ (vm_address_t) cache_info, -+ cache_info_count * sizeof *cache_info); -+} -+ -+static void * -+gather_thread (void *args) -+{ -+ while (1) -+ { -+ gather_slab_info (); -+ usleep ( -+ (useconds_t) (1000000. * (1. -+ + (float) random () / (float) RAND_MAX))); -+ } -+ -+ assert (! "reached"); -+} -+ -+error_t -+start_gather_thread (void) -+{ -+ error_t err; -+ pthread_t thread; -+ -+ err = pthread_create (&thread, NULL, gather_thread, NULL); -+ if (err) -+ return err; -+ -+ err = pthread_detach (thread); -+ return err; -+} -+ -+const char *argp_program_version = STANDARD_HURD_VERSION (random); -+ -+/* Trivfs hooks. */ -+int trivfs_fstype = FSTYPE_MISC; -+int trivfs_fsid = 0; -+ -+int trivfs_allow_open = O_READ | O_WRITE; -+ -+int trivfs_support_read = 1; -+int trivfs_support_write = 1; -+int trivfs_support_exec = 0; -+ -+void -+trivfs_modify_stat (struct trivfs_protid *cred, struct stat *st) -+{ -+ /* Mark the node as a read-only plain file. */ -+ st->st_mode &= ~((unsigned) S_IFMT); -+ st->st_mode |= (S_IFCHR); -+ st->st_size = 0; -+} -+ -+error_t -+trivfs_goaway (struct trivfs_control *cntl, int flags) -+{ -+ update_random_seed_file (); -+ exit (0); -+} -+ -+/* Read data from an IO object. If offset is -1, read from the object -+ maintained file pointer. If the object is not seekable, offset is -+ ignored. The amount desired to be read is in AMOUNT. */ -+error_t -+trivfs_S_io_read (struct trivfs_protid *cred, -+ mach_port_t reply, mach_msg_type_name_t reply_type, -+ data_t *data, mach_msg_type_number_t *data_len, -+ loff_t offs, mach_msg_type_number_t amount) -+{ -+ error_t err; -+ void *buf = NULL; -+ size_t length = 0; -+ -+ if (! cred) -+ return EOPNOTSUPP; -+ else if (! (cred->po->openmodes & O_READ)) -+ return EBADF; -+ -+ pthread_mutex_lock (&entropy_lock); -+ -+ if (amount > 0) -+ { -+ while (! urandom && amount > entropy) -+ { -+ if (cred->po->openmodes & O_NONBLOCK) -+ { -+ err = EWOULDBLOCK; -+ goto errout; -+ } -+ read_blocked = 1; -+ if (pthread_hurd_cond_wait_np (&wait, &entropy_lock)) -+ { -+ err = EINTR; -+ goto errout; -+ } -+ /* See term/users.c for possible race? */ -+ } -+ -+ /* Possibly allocate a new buffer. */ -+ if (*data_len < amount) -+ { -+ *data = mmap (0, amount, PROT_READ|PROT_WRITE, -+ MAP_ANON, 0, 0); -+ -+ if (*data == MAP_FAILED) -+ { -+ pthread_mutex_unlock (&entropy_lock); -+ return errno; -+ } -+ -+ /* Keep track of our map in case of errors. */ -+ buf = *data, length = amount; -+ -+ /* Update DATA_LEN to reflect the new buffers size. */ -+ *data_len = amount; -+ } -+ -+ if (! urandom) -+ assert (entropy >= amount); -+ -+ if (entropy >= amount) -+ entropy -= amount; -+ else -+ entropy = 0; -+ -+ gcry_randomize ((unsigned char *) *data, amount, GCRY_STRONG_RANDOM); -+ } -+ -+ /* Set atime, see term/users.c */ -+ -+ pthread_mutex_unlock (&entropy_lock); -+ *data_len = amount; -+ return 0; -+ -+ errout: -+ pthread_mutex_unlock (&entropy_lock); -+ if (buf) -+ munmap (buf, length); -+ return err; -+} -+ -+/* Write data to an IO object. If offset is -1, write at the object -+ maintained file pointer. If the object is not seekable, offset is -+ ignored. The amount successfully written is returned in amount. A -+ given user should not have more than one outstanding io_write on an -+ object at a time; servers implement congestion control by delaying -+ responses to io_write. Servers may drop data (returning ENOBUFS) -+ if they receive more than one write when not prepared for it. */ -+error_t -+trivfs_S_io_write (struct trivfs_protid *cred, -+ mach_port_t reply, -+ mach_msg_type_name_t replytype, -+ data_t data, -+ mach_msg_type_number_t datalen, -+ loff_t offset, -+ mach_msg_type_number_t *amount) -+{ -+ error_t err; -+ -+ /* Deny access if they have bad credentials. */ -+ if (! cred) -+ return EOPNOTSUPP; -+ else if (! (cred->po->openmodes & O_WRITE)) -+ return EBADF; -+ -+ err = entropy_add (data, datalen, 0); -+ *amount = datalen; -+ return err; -+} -+ -+/* Tell how much data can be read from the object without blocking for -+ a "long time" (this should be the same meaning of "long time" used -+ by the nonblocking flag. */ -+kern_return_t -+trivfs_S_io_readable (struct trivfs_protid *cred, -+ mach_port_t reply, mach_msg_type_name_t replytype, -+ mach_msg_type_number_t *amount) -+{ -+ /* Deny access if they have bad credentials. */ -+ if (! cred) -+ return EOPNOTSUPP; -+ else if (! (cred->po->openmodes & O_READ)) -+ return EBADF; -+ -+ pthread_mutex_lock (&entropy_lock); -+ -+ *amount = entropy; -+ -+ pthread_mutex_unlock (&entropy_lock); -+ -+ return 0; -+} -+ -+/* SELECT_TYPE is the bitwise OR of SELECT_READ, SELECT_WRITE, and SELECT_URG. -+ Block until one of the indicated types of i/o can be done "quickly", and -+ return the types that are then available. ID_TAG is returned as passed; it -+ is just for the convenience of the user in matching up reply messages with -+ specific requests sent. */ -+error_t -+trivfs_S_io_select (struct trivfs_protid *cred, -+ mach_port_t reply, -+ mach_msg_type_name_t reply_type, -+ int *type) -+{ -+ if (!cred) -+ return EOPNOTSUPP; -+ -+ /* We only deal with SELECT_READ and SELECT_WRITE here. */ -+ if (*type & ~(SELECT_READ | SELECT_WRITE)) -+ return EINVAL; -+ -+ if (*type == 0) -+ return 0; -+ -+ pthread_mutex_lock (&entropy_lock); -+ -+ while (1) -+ { -+ if (entropy > 0 || *type & SELECT_WRITE) -+ { -+ *type = (entropy > 0 ? SELECT_READ : 0) | (*type & SELECT_WRITE); -+ pthread_mutex_unlock (&entropy_lock); -+ return 0; -+ } -+ -+ ports_interrupt_self_on_port_death (cred, reply); -+ read_blocked = 1; -+ -+ if (pthread_hurd_cond_wait_np (&select_alert, &entropy_lock)) -+ { -+ *type = 0; -+ pthread_mutex_unlock (&entropy_lock); -+ return EINTR; -+ } -+ } -+} -+ -+ -+/* Change current read/write offset */ -+error_t -+trivfs_S_io_seek (struct trivfs_protid *cred, -+ mach_port_t reply, mach_msg_type_name_t reply_type, -+ loff_t offs, int whence, loff_t *new_offs) -+{ -+ if (! cred) -+ return EOPNOTSUPP; -+ -+ /* Not seekable. */ -+ return ESPIPE; -+} -+ -+/* Change the size of the file. If the size increases, new blocks are -+ zero-filled. After successful return, it is safe to reference mapped -+ areas of the file up to NEW_SIZE. */ -+error_t -+trivfs_S_file_set_size (struct trivfs_protid *cred, -+ mach_port_t reply, mach_msg_type_name_t reply_type, -+ loff_t size) -+{ -+ if (!cred) -+ return EOPNOTSUPP; -+ -+ return size == 0 ? 0 : EINVAL; -+} -+ -+/* These four routines modify the O_APPEND, O_ASYNC, O_FSYNC, and -+ O_NONBLOCK bits for the IO object. In addition, io_get_openmodes -+ will tell you which of O_READ, O_WRITE, and O_EXEC the object can -+ be used for. The O_ASYNC bit affects icky async I/O; good async -+ I/O is done through io_async which is orthogonal to these calls. */ -+error_t -+trivfs_S_io_set_all_openmodes(struct trivfs_protid *cred, -+ mach_port_t reply, -+ mach_msg_type_name_t reply_type, -+ int mode) -+{ -+ if (!cred) -+ return EOPNOTSUPP; -+ -+ return 0; -+} -+ -+error_t -+trivfs_S_io_set_some_openmodes (struct trivfs_protid *cred, -+ mach_port_t reply, -+ mach_msg_type_name_t reply_type, -+ int bits) -+{ -+ if (!cred) -+ return EOPNOTSUPP; -+ -+ return 0; -+} -+ -+error_t -+trivfs_S_io_get_owner (struct trivfs_protid *cred, -+ mach_port_t reply, -+ mach_msg_type_name_t reply_type, -+ pid_t *owner) -+{ -+ if (!cred) -+ return EOPNOTSUPP; -+ -+ *owner = 0; -+ return 0; -+} -+ -+error_t -+trivfs_S_io_mod_owner (struct trivfs_protid *cred, -+ mach_port_t reply, mach_msg_type_name_t reply_type, -+ pid_t owner) -+{ -+ if (!cred) -+ return EOPNOTSUPP; -+ -+ return EINVAL; -+} -+ -+/* Return objects mapping the data underlying this memory object. If -+ the object can be read then memobjrd will be provided; if the -+ object can be written then memobjwr will be provided. For objects -+ where read data and write data are the same, these objects will be -+ equal, otherwise they will be disjoint. Servers are permitted to -+ implement io_map but not io_map_cntl. Some objects do not provide -+ mapping; they will set none of the ports and return an error. Such -+ objects can still be accessed by io_read and io_write. */ -+error_t -+trivfs_S_io_map(struct trivfs_protid *cred, -+ mach_port_t reply, mach_msg_type_name_t reply_type, -+ mach_port_t *rdobj, -+ mach_msg_type_name_t *rdtype, -+ mach_port_t *wrobj, -+ mach_msg_type_name_t *wrtype) -+{ -+ if (!cred) -+ return EOPNOTSUPP; -+ -+ return EINVAL; -+} -+ -+ -+int -+random_demuxer (mach_msg_header_t *inp, -+ mach_msg_header_t *outp) -+{ -+ extern int startup_notify_server (mach_msg_header_t *, mach_msg_header_t *); -+ -+ return (trivfs_demuxer (inp, outp) -+ || startup_notify_server (inp, outp)); -+} -+ -+ -+/* Options processing. We accept the same options on the command line -+ and from fsys_set_options. */ -+ -+static const struct argp_option options[] = -+{ -+ {"fast", 'f', 0, 0, "Output cheap random data fast"}, -+ {"secure", 's', 0, 0, -+ "Output cryptographically secure random (the default)"}, -+ {"seed-file", 'S', "FILE", 0, "Use FILE to remember the seed"}, -+ {0} -+}; -+ -+static error_t -+parse_opt (int opt, char *arg, struct argp_state *state) -+{ -+ switch (opt) -+ { -+ default: -+ return ARGP_ERR_UNKNOWN; -+ case ARGP_KEY_INIT: -+ case ARGP_KEY_SUCCESS: -+ case ARGP_KEY_ERROR: -+ break; -+ -+ case 'f': -+ urandom = 1; -+ break; -+ -+ case 's': -+ urandom = 0; -+ break; -+ -+ case 'S': -+ seed_file = strdup (arg); -+ break; -+ } -+ return 0; -+} -+ -+/* This will be called from libtrivfs to help construct the answer -+ to an fsys_get_options RPC. */ -+error_t -+trivfs_append_args (struct trivfs_control *fsys, -+ char **argz, size_t *argz_len) -+{ -+ error_t err = 0; -+ char *opt; -+ -+ err = argz_add (argz, argz_len, urandom ? "--fast" : "--secure"); -+ if (err) -+ return err; -+ -+ if (seed_file) -+ { -+ if (asprintf (&opt, "--seed-file=%s", seed_file) < 0) -+ err = ENOMEM; -+ else -+ { -+ err = argz_add (argz, argz_len, opt); -+ free (opt); -+ } -+ } -+ -+ return err; -+} -+ -+static struct argp random_argp = -+{ options, parse_opt, 0, -+ "A translator providing random output." }; -+ -+/* Setting this variable makes libtrivfs use our argp to -+ parse options passed in an fsys_set_options RPC. */ -+struct argp *trivfs_runtime_argp = &random_argp; -+ -+struct port_class *shutdown_notify_class; -+ -+/* The system is going down; destroy all the extant port rights. That -+ will cause net channels and such to close promptly. */ -+error_t -+S_startup_dosync (mach_port_t handle) -+{ -+ struct port_info *inpi = ports_lookup_port (fsys->pi.bucket, handle, -+ shutdown_notify_class); -+ -+ if (!inpi) -+ return EOPNOTSUPP; -+ -+ update_random_seed_file (); -+ return 0; -+} -+ -+void -+sigterm_handler (int signo) -+{ -+ update_random_seed_file (); -+ signal (SIGTERM, SIG_DFL); -+ raise (SIGTERM); -+} -+ -+static error_t -+arrange_shutdown_notification () -+{ -+ error_t err; -+ mach_port_t initport, notify; -+ struct port_info *pi; -+ -+ shutdown_notify_class = ports_create_class (0, 0); -+ -+ signal (SIGTERM, sigterm_handler); -+ -+ /* Arrange to get notified when the system goes down, -+ but if we fail for some reason, just silently give up. No big deal. */ -+ -+ err = ports_create_port (shutdown_notify_class, fsys->pi.bucket, -+ sizeof (struct port_info), &pi); -+ if (err) -+ return err; -+ -+ initport = file_name_lookup (_SERVERS_STARTUP, 0, 0); -+ if (! MACH_PORT_VALID (initport)) -+ return errno; -+ -+ notify = ports_get_send_right (pi); -+ ports_port_deref (pi); -+ err = startup_request_notification (initport, notify, -+ MACH_MSG_TYPE_MAKE_SEND, -+ program_invocation_short_name); -+ -+ mach_port_deallocate (mach_task_self (), notify); -+ mach_port_deallocate (mach_task_self (), initport); -+ return err; -+} -+ -+int -+main (int argc, char **argv) -+{ -+ error_t err; -+ mach_port_t bootstrap; -+ -+ /* Initialize the lock that will protect everything. -+ We must do this before argp_parse, because parse_opt (above) will -+ use the lock. */ -+ pthread_mutex_init (&entropy_lock, NULL); -+ -+ /* The conditions are used to implement proper read/select -+ behaviour. */ -+ pthread_cond_init (&wait, NULL); -+ pthread_cond_init (&select_alert, NULL); -+ -+ /* We use the same argp for options available at startup -+ as for options we'll accept in an fsys_set_options RPC. */ -+ argp_parse (&random_argp, argc, argv, 0, 0, 0); -+ -+ initialize_gcrypt (); -+ -+ task_get_bootstrap_port (mach_task_self (), &bootstrap); -+ if (bootstrap == MACH_PORT_NULL) -+ error (1, 0, "Must be started as a translator"); -+ -+ /* Reply to our parent */ -+ err = trivfs_startup (bootstrap, 0, 0, 0, 0, 0, &fsys); -+ mach_port_deallocate (mach_task_self (), bootstrap); -+ if (err) -+ error (3, err, "trivfs_startup"); -+ -+ err = arrange_shutdown_notification (); -+ if (err) -+ error (0, err, "Cannot request shutdown notification"); -+ -+ err = start_gather_thread (); -+ if (err) -+ error (0, err, "Starting gatherer thread failed"); -+ -+ /* Launch. */ -+ ports_manage_port_operations_multithread (fsys->pi.bucket, random_demuxer, -+ 10 * 1000, /* idle thread */ -+ 10 * 60 * 1000, /* idle server */ -+ 0); -+ return 0; -+} --- -2.1.4 - diff --git a/debian/patches/series b/debian/patches/series index 8b4fa423..11ed9d3c 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -1,4 +1,3 @@ -random0001-xxx-standalone-random-translator.patch diskfs_no_inherit_dir_group.patch init_try_runsystem.gnu.patch makedev.diff |