2020-06-15 14:18:57 +00:00
|
|
|
/*-*- mode:c;indent-tabs-mode:nil;c-basic-offset:2;tab-width:8;coding:utf-8 -*-│
|
|
|
|
│vi: set net ft=c ts=2 sts=2 sw=2 fenc=utf-8 :vi│
|
|
|
|
╞══════════════════════════════════════════════════════════════════════════════╡
|
|
|
|
│ Copyright 2020 Justine Alexandra Roberts Tunney │
|
|
|
|
│ │
|
2020-12-28 01:18:44 +00:00
|
|
|
│ Permission to use, copy, modify, and/or distribute this software for │
|
|
|
|
│ any purpose with or without fee is hereby granted, provided that the │
|
|
|
|
│ above copyright notice and this permission notice appear in all copies. │
|
2020-06-15 14:18:57 +00:00
|
|
|
│ │
|
2020-12-28 01:18:44 +00:00
|
|
|
│ THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL │
|
|
|
|
│ WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED │
|
|
|
|
│ WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE │
|
|
|
|
│ AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL │
|
|
|
|
│ DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR │
|
|
|
|
│ PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER │
|
|
|
|
│ TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR │
|
|
|
|
│ PERFORMANCE OF THIS SOFTWARE. │
|
2020-06-15 14:18:57 +00:00
|
|
|
╚─────────────────────────────────────────────────────────────────────────────*/
|
2022-11-06 02:49:41 +00:00
|
|
|
#include "libc/assert.h"
|
|
|
|
#include "libc/calls/blockcancel.internal.h"
|
2021-06-24 19:31:26 +00:00
|
|
|
#include "libc/calls/calls.h"
|
2022-11-06 02:49:41 +00:00
|
|
|
#include "libc/calls/cp.internal.h"
|
|
|
|
#include "libc/calls/internal.h"
|
2022-06-23 21:09:32 +00:00
|
|
|
#include "libc/calls/struct/sigaction.h"
|
|
|
|
#include "libc/calls/struct/sigset.h"
|
2022-05-23 22:06:11 +00:00
|
|
|
#include "libc/calls/syscall-sysv.internal.h"
|
|
|
|
#include "libc/calls/syscall_support-nt.internal.h"
|
2022-11-06 02:49:41 +00:00
|
|
|
#include "libc/calls/syscall_support-sysv.internal.h"
|
2021-06-24 19:31:26 +00:00
|
|
|
#include "libc/dce.h"
|
2020-06-15 14:18:57 +00:00
|
|
|
#include "libc/errno.h"
|
2022-11-06 02:49:41 +00:00
|
|
|
#include "libc/intrin/asan.internal.h"
|
|
|
|
#include "libc/intrin/asmflag.h"
|
2022-08-11 19:26:30 +00:00
|
|
|
#include "libc/intrin/bits.h"
|
2022-09-13 18:20:35 +00:00
|
|
|
#include "libc/intrin/strace.internal.h"
|
2022-11-06 02:49:41 +00:00
|
|
|
#include "libc/intrin/weaken.h"
|
|
|
|
#include "libc/macros.internal.h"
|
2021-06-24 19:31:26 +00:00
|
|
|
#include "libc/nexgen32e/kcpuids.h"
|
|
|
|
#include "libc/nexgen32e/rdtsc.h"
|
|
|
|
#include "libc/nexgen32e/vendor.internal.h"
|
|
|
|
#include "libc/nexgen32e/x86feature.h"
|
|
|
|
#include "libc/nexgen32e/x86info.h"
|
|
|
|
#include "libc/nt/runtime.h"
|
2020-06-15 14:18:57 +00:00
|
|
|
#include "libc/runtime/runtime.h"
|
2022-08-11 19:26:30 +00:00
|
|
|
#include "libc/stdio/rand.h"
|
|
|
|
#include "libc/stdio/xorshift.h"
|
2020-06-15 14:18:57 +00:00
|
|
|
#include "libc/str/str.h"
|
2021-06-24 19:31:26 +00:00
|
|
|
#include "libc/sysv/consts/at.h"
|
|
|
|
#include "libc/sysv/consts/auxv.h"
|
|
|
|
#include "libc/sysv/consts/grnd.h"
|
|
|
|
#include "libc/sysv/consts/o.h"
|
2022-06-23 21:09:32 +00:00
|
|
|
#include "libc/sysv/consts/sig.h"
|
2021-06-24 19:31:26 +00:00
|
|
|
#include "libc/sysv/errfuns.h"
|
2022-11-05 01:19:05 +00:00
|
|
|
#include "libc/thread/thread.h"
|
2021-06-24 19:31:26 +00:00
|
|
|
|
2023-07-26 20:54:49 +00:00
|
|
|
__static_yoink("rdrand_init");
|
2022-11-06 02:49:41 +00:00
|
|
|
|
|
|
|
int sys_getentropy(void *, size_t) asm("sys_getrandom");
|
|
|
|
|
2021-06-24 19:31:26 +00:00
|
|
|
static bool have_getrandom;
|
2020-06-15 14:18:57 +00:00
|
|
|
|
2022-11-06 02:49:41 +00:00
|
|
|
static bool GetRandomRdseed(uint64_t *out) {
|
|
|
|
int i;
|
|
|
|
char cf;
|
|
|
|
uint64_t x;
|
|
|
|
for (i = 0; i < 10; ++i) {
|
|
|
|
asm volatile(CFLAG_ASM("rdseed\t%1")
|
|
|
|
: CFLAG_CONSTRAINT(cf), "=r"(x)
|
|
|
|
: /* no inputs */
|
|
|
|
: "cc");
|
|
|
|
if (cf) {
|
|
|
|
*out = x;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
asm volatile("pause");
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool GetRandomRdrand(uint64_t *out) {
|
|
|
|
int i;
|
|
|
|
char cf;
|
|
|
|
uint64_t x;
|
|
|
|
for (i = 0; i < 10; ++i) {
|
|
|
|
asm volatile(CFLAG_ASM("rdrand\t%1")
|
|
|
|
: CFLAG_CONSTRAINT(cf), "=r"(x)
|
|
|
|
: /* no inputs */
|
|
|
|
: "cc");
|
|
|
|
if (cf) {
|
|
|
|
*out = x;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
asm volatile("pause");
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t GetRandomCpu(char *p, size_t n, int f, bool impl(uint64_t *)) {
|
|
|
|
uint64_t x;
|
|
|
|
size_t i, j;
|
|
|
|
for (i = 0; i < n; i += j) {
|
|
|
|
TryAgain:
|
|
|
|
if (!impl(&x)) {
|
|
|
|
if (f || i >= 256) break;
|
|
|
|
goto TryAgain;
|
|
|
|
}
|
|
|
|
for (j = 0; j < 8 && i + j < n; ++j) {
|
|
|
|
p[i + j] = x;
|
|
|
|
x >>= 8;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t GetRandomMetal(char *p, size_t n, int f) {
|
|
|
|
if (f & GRND_RANDOM) {
|
|
|
|
if (X86_HAVE(RDSEED)) {
|
|
|
|
return GetRandomCpu(p, n, f, GetRandomRdseed);
|
|
|
|
} else {
|
|
|
|
return enosys();
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (X86_HAVE(RDRND)) {
|
|
|
|
return GetRandomCpu(p, n, f, GetRandomRdrand);
|
|
|
|
} else {
|
|
|
|
return enosys();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void GetRandomEntropy(char *p, size_t n) {
|
2023-07-26 20:54:49 +00:00
|
|
|
unassert(n <= 256);
|
2022-11-06 02:49:41 +00:00
|
|
|
if (sys_getentropy(p, n)) notpossible;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void GetRandomArnd(char *p, size_t n) {
|
|
|
|
size_t m;
|
|
|
|
int cmd[2];
|
|
|
|
cmd[0] = 1; // CTL_KERN
|
|
|
|
cmd[1] = IsFreebsd() ? 37 : 81; // KERN_ARND
|
2023-07-26 20:54:49 +00:00
|
|
|
unassert((m = n) <= 256);
|
2022-11-06 02:49:41 +00:00
|
|
|
if (sys_sysctl(cmd, 2, p, &n, 0, 0) == -1) notpossible;
|
|
|
|
if (m != n) notpossible;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t GetRandomBsd(char *p, size_t n, void impl(char *, size_t)) {
|
|
|
|
errno_t e;
|
|
|
|
size_t m, i;
|
|
|
|
if (_weaken(pthread_testcancel_np) &&
|
|
|
|
(e = _weaken(pthread_testcancel_np)())) {
|
|
|
|
errno = e;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
for (i = 0;;) {
|
|
|
|
m = MIN(n - i, 256);
|
|
|
|
impl(p + i, m);
|
|
|
|
if ((i += m) == n) {
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
if (_weaken(pthread_testcancel)) {
|
|
|
|
_weaken(pthread_testcancel)();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t GetDevUrandom(char *p, size_t n) {
|
2022-11-05 01:19:05 +00:00
|
|
|
int fd;
|
|
|
|
ssize_t rc;
|
2022-11-06 02:49:41 +00:00
|
|
|
fd = sys_openat(AT_FDCWD, "/dev/urandom", O_RDONLY | O_CLOEXEC, 0);
|
2022-11-05 01:19:05 +00:00
|
|
|
if (fd == -1) return -1;
|
|
|
|
pthread_cleanup_push((void *)sys_close, (void *)(intptr_t)fd);
|
|
|
|
rc = sys_read(fd, p, n);
|
|
|
|
pthread_cleanup_pop(1);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2022-11-06 02:49:41 +00:00
|
|
|
ssize_t __getrandom(void *p, size_t n, unsigned f) {
|
|
|
|
ssize_t rc;
|
|
|
|
if (IsWindows()) {
|
2023-07-30 15:55:01 +00:00
|
|
|
if (_check_interrupts(kSigOpRestartable, 0)) {
|
|
|
|
return -1;
|
|
|
|
}
|
2022-11-06 02:49:41 +00:00
|
|
|
rc = RtlGenRandom(p, n) ? n : __winerr();
|
|
|
|
} else if (have_getrandom) {
|
|
|
|
if (IsXnu() || IsOpenbsd()) {
|
|
|
|
rc = GetRandomBsd(p, n, GetRandomEntropy);
|
2022-11-05 01:19:05 +00:00
|
|
|
} else {
|
2022-11-06 02:49:41 +00:00
|
|
|
BEGIN_CANCELLATION_POINT;
|
|
|
|
rc = sys_getrandom(p, n, f);
|
|
|
|
END_CANCELLATION_POINT;
|
2022-11-05 01:19:05 +00:00
|
|
|
}
|
2022-11-06 02:49:41 +00:00
|
|
|
} else if (IsFreebsd() || IsNetbsd()) {
|
|
|
|
rc = GetRandomBsd(p, n, GetRandomArnd);
|
|
|
|
} else if (IsMetal()) {
|
|
|
|
rc = GetRandomMetal(p, n, f);
|
|
|
|
} else {
|
|
|
|
BEGIN_CANCELLATION_POINT;
|
|
|
|
rc = GetDevUrandom(p, n);
|
|
|
|
END_CANCELLATION_POINT;
|
2022-11-05 01:19:05 +00:00
|
|
|
}
|
2022-11-06 02:49:41 +00:00
|
|
|
return rc;
|
2022-11-05 01:19:05 +00:00
|
|
|
}
|
|
|
|
|
2020-06-15 14:18:57 +00:00
|
|
|
/**
|
2021-06-24 19:31:26 +00:00
|
|
|
* Returns cryptographic random data.
|
|
|
|
*
|
2022-04-07 07:15:35 +00:00
|
|
|
* This random number seed generator obtains information from:
|
2021-06-24 19:31:26 +00:00
|
|
|
*
|
2021-08-15 07:05:27 +00:00
|
|
|
* - RtlGenRandom() on Windows
|
2021-06-24 19:31:26 +00:00
|
|
|
* - getentropy() on XNU and OpenBSD
|
2022-11-06 02:49:41 +00:00
|
|
|
* - getrandom() on Linux, FreeBSD, and NetBSD
|
|
|
|
* - sysctl(KERN_ARND) on older versions of FreeBSD and NetBSD
|
|
|
|
*
|
|
|
|
* Unlike getentropy() this function is interruptible. However EINTR
|
|
|
|
* shouldn't be possible if `f` is zero and `n` is no more than 256,
|
|
|
|
* noting that kernels are a bit vague with their promises here, and
|
|
|
|
* if you're willing to trade some performance for a more assurances
|
|
|
|
* that EINTR won't happen, then either consider using getentropy(),
|
|
|
|
* or using the `SA_RESTART` flag on your signal handlers.
|
2021-06-24 19:31:26 +00:00
|
|
|
*
|
2022-11-06 02:49:41 +00:00
|
|
|
* Unlike getentropy() you may specify an `n` greater than 256. When
|
|
|
|
* larger amounts are specified, the caller must be prepared for the
|
|
|
|
* case where fewer than `n` bytes are returned. In that case, it is
|
|
|
|
* likely that a signal delivery occured. Cancellations in mask mode
|
|
|
|
* also need to be suppressed while processing the bytes beyond 256.
|
|
|
|
* On BSD OSes, this entire process is uninterruptible so be careful
|
|
|
|
* when using large sizes if interruptibility is needed.
|
2020-06-15 14:18:57 +00:00
|
|
|
*
|
2022-11-06 02:49:41 +00:00
|
|
|
* Unlike getentropy() this function is a cancellation point. But it
|
|
|
|
* shouldn't be a problem, unless you're using masked mode, in which
|
|
|
|
* case extra care must be taken to consider the result.
|
2021-06-24 19:31:26 +00:00
|
|
|
*
|
2022-11-06 02:49:41 +00:00
|
|
|
* It's recommended that `f` be set to zero, although it may include
|
|
|
|
* the following flags:
|
|
|
|
*
|
|
|
|
* - `GRND_NONBLOCK` when you want to elevate the insecurity of your
|
|
|
|
* random data
|
|
|
|
*
|
|
|
|
* - `GRND_RANDOM` if you want to have the best possible chance your
|
|
|
|
* program will freeze and the system operator is paged to address
|
|
|
|
* the outage by driving to the data center and jiggling the mouse
|
2021-06-24 19:31:26 +00:00
|
|
|
*
|
2022-04-07 07:15:35 +00:00
|
|
|
* @note this function could block a nontrivial time on old computers
|
|
|
|
* @note this function is indeed intended for cryptography
|
|
|
|
* @note this function takes around 900 cycles
|
2022-10-02 21:58:14 +00:00
|
|
|
* @raise EINVAL if `f` is invalid
|
2022-11-06 02:49:41 +00:00
|
|
|
* @raise ECANCELED if thread was cancelled in masked mode
|
|
|
|
* @raise EFAULT if the `n` bytes at `p` aren't valid memory
|
|
|
|
* @raise EINTR if we needed to block and a signal was delivered instead
|
2022-11-04 08:04:43 +00:00
|
|
|
* @cancellationpoint
|
2021-06-24 19:31:26 +00:00
|
|
|
* @asyncsignalsafe
|
2022-03-25 14:11:44 +00:00
|
|
|
* @restartable
|
2021-06-24 19:31:26 +00:00
|
|
|
* @vforksafe
|
2020-06-15 14:18:57 +00:00
|
|
|
*/
|
2021-06-24 19:31:26 +00:00
|
|
|
ssize_t getrandom(void *p, size_t n, unsigned f) {
|
|
|
|
ssize_t rc;
|
2022-11-06 02:49:41 +00:00
|
|
|
if ((!p && n) || (IsAsan() && !__asan_is_valid(p, n))) {
|
|
|
|
rc = efault();
|
|
|
|
} else if ((f & ~(GRND_RANDOM | GRND_NONBLOCK))) {
|
2022-10-02 21:58:14 +00:00
|
|
|
rc = einval();
|
2021-09-28 05:58:51 +00:00
|
|
|
} else {
|
2022-11-06 02:49:41 +00:00
|
|
|
rc = __getrandom(p, n, f);
|
2020-06-15 14:18:57 +00:00
|
|
|
}
|
2022-11-06 02:49:41 +00:00
|
|
|
STRACE("getrandom(%p, %'zu, %#x) → %'ld% m", p, n, f, rc);
|
2020-06-15 14:18:57 +00:00
|
|
|
return rc;
|
|
|
|
}
|
2021-06-24 19:31:26 +00:00
|
|
|
|
2022-11-03 16:32:12 +00:00
|
|
|
__attribute__((__constructor__)) static textstartup void getrandom_init(void) {
|
2022-03-19 10:37:00 +00:00
|
|
|
int e, rc;
|
2022-11-06 02:49:41 +00:00
|
|
|
if (IsWindows() || IsMetal()) return;
|
|
|
|
BLOCK_CANCELLATIONS;
|
2022-10-17 18:02:04 +00:00
|
|
|
e = errno;
|
2022-03-19 10:37:00 +00:00
|
|
|
if (!(rc = sys_getrandom(0, 0, 0))) {
|
2021-06-24 19:31:26 +00:00
|
|
|
have_getrandom = true;
|
2022-11-03 16:32:12 +00:00
|
|
|
} else {
|
|
|
|
errno = e;
|
2021-06-24 19:31:26 +00:00
|
|
|
}
|
2022-11-06 02:49:41 +00:00
|
|
|
ALLOW_CANCELLATIONS;
|
2022-06-23 21:09:32 +00:00
|
|
|
STRACE("sys_getrandom(0,0,0) → %d% m", rc);
|
2021-06-24 19:31:26 +00:00
|
|
|
}
|