| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178 | 
							- /*
 
-  * sshrand.c: manage the global live PRNG instance.
 
-  */
 
- #include "putty.h"
 
- #include "ssh.h"
 
- #include "storage.h"
 
- #include <assert.h>
 
- /* Collect environmental noise every 5 minutes */
 
- #define NOISE_REGULAR_INTERVAL (5*60*TICKSPERSEC)
 
- int random_active = 0;
 
- #ifdef FUZZING
 
- /*
 
-  * Special dummy version of the RNG for use when fuzzing.
 
-  */
 
- void random_add_noise(NoiseSourceId source, const void *noise, int length) { }
 
- void random_ref(void) { }
 
- void random_setup_custom(const ssh_hashalg *hash) { }
 
- void random_unref(void) { }
 
- void random_read(void *out, size_t size)
 
- {
 
-     memset(out, 0x45, size); /* Chosen by eight fair coin tosses */
 
- }
 
- void random_get_savedata(void **data, int *len) { }
 
- #else /* !FUZZING */
 
- /* Dummy structure for the sake of having something to expire_timer_context */
 
- static struct random_timer_context { int dummy; } random_timer_ctx;
 
- static prng *global_prng;
 
- static unsigned long next_noise_collection;
 
- void random_add_noise(NoiseSourceId source, const void *noise, int length)
 
- {
 
-     WINSCP_PUTTY_SECTION_ENTER;
 
-     if (!random_active)
 
-         return;
 
-     prng_add_entropy(global_prng, source, make_ptrlen(noise, length));
 
-     WINSCP_PUTTY_SECTION_LEAVE;
 
- }
 
- static void random_timer(void *ctx, unsigned long now)
 
- {
 
-     unreachable_internal(); // WINSCP
 
-     WINSCP_PUTTY_SECTION_ENTER;
 
-     if (random_active > 0 && now == next_noise_collection) {
 
-         noise_regular();
 
-         next_noise_collection =
 
-             schedule_timer(NOISE_REGULAR_INTERVAL, random_timer,
 
-                            &random_timer_ctx);
 
-     }
 
-     WINSCP_PUTTY_SECTION_LEAVE;
 
- }
 
- static void random_seed_callback(void *noise, int length)
 
- {
 
-     WINSCP_PUTTY_SECTION_ENTER;
 
-     put_data(global_prng, noise, length);
 
-     WINSCP_PUTTY_SECTION_LEAVE;
 
- }
 
- static void random_create(const ssh_hashalg *hashalg)
 
- {
 
-     assert(!global_prng);
 
-     global_prng = prng_new(hashalg);
 
-     prng_seed_begin(global_prng);
 
-     noise_get_heavy(random_seed_callback);
 
-     prng_seed_finish(global_prng);
 
-     next_noise_collection =
 
-         schedule_timer(NOISE_REGULAR_INTERVAL, random_timer,
 
-                        &random_timer_ctx);
 
-     /* noise_get_heavy probably read our random seed file.
 
-      * Therefore (in fact, even if it didn't), we should write a
 
-      * fresh one, in case another instance of ourself starts up
 
-      * before we finish, and also in case an attacker gets hold of
 
-      * the seed data we used. */
 
-     random_save_seed();
 
- }
 
- void random_save_seed(void)
 
- {
 
-     int len;
 
-     void *data;
 
-     if (random_active) {
 
-         random_get_savedata(&data, &len);
 
-         write_random_seed(data, len);
 
-         sfree(data);
 
-     }
 
- }
 
- void random_ref(void)
 
- {
 
-     WINSCP_PUTTY_SECTION_ENTER;
 
-     if (!random_active++)
 
-         random_create(&ssh_sha256);
 
-     WINSCP_PUTTY_SECTION_LEAVE;
 
- }
 
- void random_setup_custom(const ssh_hashalg *hash)
 
- {
 
-     unreachable_internal(); // used by PuTTYgen only
 
-     WINSCP_PUTTY_SECTION_ENTER;
 
-     random_active++;
 
-     random_create(hash);
 
-     WINSCP_PUTTY_SECTION_LEAVE;
 
- }
 
- void random_reseed(ptrlen seed)
 
- {
 
-     unreachable_internal(); // used by PuTTYgen only
 
-     WINSCP_PUTTY_SECTION_ENTER;
 
-     prng_seed_begin(global_prng);
 
-     put_datapl(global_prng, seed);
 
-     prng_seed_finish(global_prng);
 
-     WINSCP_PUTTY_SECTION_LEAVE;
 
- }
 
- // Never called directly in WINSCP
 
- void random_clear(void)
 
- {
 
-     if (global_prng) {
 
-         #ifndef WINSCP
 
-         // We control this on our own in PuttyFinalize()
 
-         random_save_seed();
 
-         #endif
 
-         expire_timer_context(&random_timer_ctx);
 
-         prng_free(global_prng);
 
-         global_prng = NULL;
 
-         random_active = 0;
 
-     }
 
- }
 
- void random_unref(void)
 
- {
 
-     WINSCP_PUTTY_SECTION_ENTER;
 
-     assert(random_active > 0);
 
-     if (--random_active == 0)
 
-         random_clear();
 
-     WINSCP_PUTTY_SECTION_LEAVE;
 
- }
 
- void random_read(void *buf, size_t size)
 
- {
 
-     WINSCP_PUTTY_SECTION_ENTER;
 
-     assert(random_active > 0);
 
-     prng_read(global_prng, buf, size);
 
-     WINSCP_PUTTY_SECTION_LEAVE;
 
- }
 
- void random_get_savedata(void **data, int *len)
 
- {
 
-     WINSCP_PUTTY_SECTION_ENTER; // though called from our finalizer, when the app is single threaded only
 
-     { // WINSCP
 
-     void *buf = snewn(global_prng->savesize, char);
 
-     random_read(buf, global_prng->savesize);
 
-     *len = global_prng->savesize;
 
-     *data = buf;
 
-     } // WINSCP
 
-     WINSCP_PUTTY_SECTION_LEAVE;
 
- }
 
- size_t random_seed_bits(void)
 
- {
 
-     assert(random_active > 0);
 
-     return prng_seed_bits(global_prng);
 
- }
 
- #endif /* FUZZING */
 
 
  |