-
Notifications
You must be signed in to change notification settings - Fork 87
/
entropy.rs
125 lines (105 loc) · 3.31 KB
/
entropy.rs
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
use core::mem::size_of;
use core::slice;
use hermit_sync::TicketMutex;
use crate::arch;
use crate::entropy::{self, Flags};
use crate::errno::EINVAL;
static PARK_MILLER_LEHMER_SEED: TicketMutex<u32> = TicketMutex::new(0);
const RAND_MAX: u64 = 2_147_483_647;
fn generate_park_miller_lehmer_random_number() -> u32 {
let mut seed = PARK_MILLER_LEHMER_SEED.lock();
let random = ((u64::from(*seed) * 48271) % RAND_MAX) as u32;
*seed = random;
random
}
unsafe extern "C" fn __sys_read_entropy(buf: *mut u8, len: usize, flags: u32) -> isize {
let Some(flags) = Flags::from_bits(flags) else {
return -EINVAL as isize;
};
let buf = unsafe {
// Cap the number of bytes to be read at a time to isize::MAX to uphold
// the safety guarantees of `from_raw_parts`.
let len = usize::min(len, isize::MAX as usize);
buf.write_bytes(0, len);
slice::from_raw_parts_mut(buf, len)
};
let ret = entropy::read(buf, flags);
if ret < 0 {
warn!("Unable to read entropy! Fallback to a naive implementation!");
for i in &mut *buf {
*i = (generate_park_miller_lehmer_random_number() & 0xFF)
.try_into()
.unwrap();
}
buf.len().try_into().unwrap()
} else {
ret
}
}
/// Fill `len` bytes in `buf` with cryptographically secure random data.
///
/// Returns either the number of bytes written to buf (a positive value) or
/// * `-EINVAL` if `flags` contains unknown flags.
/// * `-ENOSYS` if the system does not support random data generation.
#[no_mangle]
pub unsafe extern "C" fn sys_read_entropy(buf: *mut u8, len: usize, flags: u32) -> isize {
kernel_function!(__sys_read_entropy(buf, len, flags))
}
/// Create a cryptographicly secure 32bit random number with the support of
/// the underlying hardware. If the required hardware isn't available,
/// the function returns `-1`.
#[cfg(not(feature = "newlib"))]
#[no_mangle]
pub unsafe extern "C" fn sys_secure_rand32(value: *mut u32) -> i32 {
let mut buf = value.cast();
let mut len = size_of::<u32>();
while len != 0 {
let res = unsafe { sys_read_entropy(buf, len, 0) };
if res < 0 {
return -1;
}
buf = unsafe { buf.add(res as usize) };
len -= res as usize;
}
0
}
/// Create a cryptographicly secure 64bit random number with the support of
/// the underlying hardware. If the required hardware isn't available,
/// the function returns -1.
#[cfg(not(feature = "newlib"))]
#[no_mangle]
pub unsafe extern "C" fn sys_secure_rand64(value: *mut u64) -> i32 {
let mut buf = value.cast();
let mut len = size_of::<u64>();
while len != 0 {
let res = unsafe { sys_read_entropy(buf, len, 0) };
if res < 0 {
return -1;
}
buf = unsafe { buf.add(res as usize) };
len -= res as usize;
}
0
}
extern "C" fn __sys_rand() -> u32 {
generate_park_miller_lehmer_random_number()
}
/// The function computes a sequence of pseudo-random integers
/// in the range of 0 to RAND_MAX
#[no_mangle]
pub extern "C" fn sys_rand() -> u32 {
kernel_function!(__sys_rand())
}
extern "C" fn __sys_srand(seed: u32) {
*(PARK_MILLER_LEHMER_SEED.lock()) = seed;
}
/// The function sets its argument as the seed for a new sequence
/// of pseudo-random numbers to be returned by rand()
#[no_mangle]
pub extern "C" fn sys_srand(seed: u32) {
kernel_function!(__sys_srand(seed))
}
pub(crate) fn init_entropy() {
let seed: u32 = arch::processor::get_timestamp() as u32;
*PARK_MILLER_LEHMER_SEED.lock() = seed;
}