| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384 |
- /*-
- * Copyright (c) 2009-2010 Brad Penoff
- * Copyright (c) 2009-2010 Humaira Kamal
- * Copyright (c) 2011-2012 Irene Ruengeler
- * Copyright (c) 2011-2012 Michael Tuexen
- *
- * All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- *
- * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
- * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
- * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
- * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
- * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
- * SUCH DAMAGE.
- */
- /* __Userspace__ */
- #if defined(_WIN32)
- #if !defined(_CRT_RAND_S) && !defined(FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION)
- #define _CRT_RAND_S
- #endif
- #else
- #include <stdint.h>
- #include <netinet/sctp_os_userspace.h>
- #endif
- #ifdef INVARIANTS
- #include <netinet/sctp_pcb.h>
- #endif
- #include <user_environment.h>
- #include <sys/types.h>
- /* #include <sys/param.h> defines MIN */
- #if !defined(MIN)
- #define MIN(arg1,arg2) ((arg1) < (arg2) ? (arg1) : (arg2))
- #endif
- #define uHZ 1000
- /* See user_include/user_environment.h for comments about these variables */
- int maxsockets = 25600;
- int hz = uHZ;
- int ip_defttl = 64;
- int ipport_firstauto = 49152, ipport_lastauto = 65535;
- int nmbclusters = 65536;
- /* Source ip_output.c. extern'd in ip_var.h */
- u_short ip_id = 0; /*__Userspace__ TODO Should it be initialized to zero? */
- /* used in user_include/user_atomic.h in order to make the operations
- * defined there truly atomic
- */
- userland_mutex_t atomic_mtx;
- /* If the entropy device is not loaded, make a token effort to
- * provide _some_ kind of randomness. This should only be used
- * inside other RNG's, like arc4random(9).
- */
- #if defined(FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION)
- #include <string.h>
- void
- init_random(void)
- {
- return;
- }
- void
- read_random(void *buf, size_t size)
- {
- memset(buf, 'A', size);
- return;
- }
- void
- finish_random(void)
- {
- return;
- }
- /* This define can be used to optionally use OpenSSL's random number utility,
- * which is capable of bypassing the chromium sandbox which normally would
- * prevent opening files, including /dev/urandom.
- */
- #elif defined(SCTP_USE_OPENSSL_RAND)
- #include <openssl/rand.h>
- /* Requiring BoringSSL because it guarantees that RAND_bytes will succeed. */
- #ifndef OPENSSL_IS_BORINGSSL
- #error Only BoringSSL is supported with SCTP_USE_OPENSSL_RAND.
- #endif
- void
- init_random(void)
- {
- return;
- }
- void
- read_random(void *buf, size_t size)
- {
- RAND_bytes((uint8_t *)buf, size);
- return;
- }
- void
- finish_random(void)
- {
- return;
- }
- #elif defined(__FreeBSD__) || defined(__DragonFly__) || defined(__OpenBSD__) || defined(__NetBSD__) || defined(__APPLE__) || defined(__Bitrig__)
- #include <stdlib.h>
- void
- init_random(void)
- {
- return;
- }
- void
- read_random(void *buf, size_t size)
- {
- arc4random_buf(buf, size);
- return;
- }
- void
- finish_random(void)
- {
- return;
- }
- #elif defined(_WIN32)
- #include <stdlib.h>
- void
- init_random(void)
- {
- return;
- }
- void
- read_random(void *buf, size_t size)
- {
- unsigned int randval;
- size_t position, remaining;
- position = 0;
- while (position < size) {
- if (rand_s(&randval) == 0) {
- remaining = MIN(size - position, sizeof(unsigned int));
- memcpy((char *)buf + position, &randval, remaining);
- position += sizeof(unsigned int);
- }
- }
- return;
- }
- void
- finish_random(void)
- {
- return;
- }
- #elif (defined(__ANDROID__) && (__ANDROID_API__ < 28)) || defined(__QNX__) || defined(__EMSCRIPTEN__)
- #include <fcntl.h>
- static int fd = -1;
- void
- init_random(void)
- {
- fd = open("/dev/urandom", O_RDONLY);
- return;
- }
- void
- read_random(void *buf, size_t size)
- {
- size_t position;
- ssize_t n;
- position = 0;
- while (position < size) {
- n = read(fd, (char *)buf + position, size - position);
- if (n > 0) {
- position += n;
- }
- }
- return;
- }
- void
- finish_random(void)
- {
- close(fd);
- return;
- }
- #elif defined(__ANDROID__) && (__ANDROID_API__ >= 28)
- #include <sys/random.h>
- void
- init_random(void)
- {
- return;
- }
- void
- read_random(void *buf, size_t size)
- {
- size_t position;
- ssize_t n;
- position = 0;
- while (position < size) {
- n = getrandom((char *)buf + position, size - position, 0);
- if (n > 0) {
- position += n;
- }
- }
- return;
- }
- void
- finish_random(void)
- {
- return;
- }
- #elif defined(__linux__)
- #include <fcntl.h>
- #include <unistd.h>
- #include <sys/syscall.h>
- #if defined(__has_feature)
- #if __has_feature(memory_sanitizer)
- void __msan_unpoison(void *, size_t);
- #endif
- #endif
- #ifdef __NR_getrandom
- #if !defined(GRND_NONBLOCK)
- #define GRND_NONBLOCK 1
- #endif
- static int getrandom_available = 0;
- #endif
- static int fd = -1;
- void
- init_random(void)
- {
- #ifdef __NR_getrandom
- char dummy;
- ssize_t n = syscall(__NR_getrandom, &dummy, sizeof(dummy), GRND_NONBLOCK);
- if (n > 0 || errno == EINTR || errno == EAGAIN) {
- /* Either getrandom succeeded, was interrupted or is waiting for entropy;
- * all of which mean the syscall is available.
- */
- getrandom_available = 1;
- } else {
- #ifdef INVARIANTS
- if (errno != ENOSYS) {
- panic("getrandom syscall returned unexpected error: %d", errno);
- }
- #endif
- /* If the syscall isn't available, fall back to /dev/urandom. */
- #endif
- fd = open("/dev/urandom", O_RDONLY);
- #ifdef __NR_getrandom
- }
- #endif
- return;
- }
- void
- read_random(void *buf, size_t size)
- {
- size_t position;
- ssize_t n;
- position = 0;
- while (position < size) {
- #ifdef __NR_getrandom
- if (getrandom_available) {
- /* Using syscall directly because getrandom isn't present in glibc < 2.25.
- */
- n = syscall(__NR_getrandom, (char *)buf + position, size - position, 0);
- if (n > 0) {
- #if defined(__has_feature)
- #if __has_feature(memory_sanitizer)
- /* Need to do this because MSan doesn't realize that syscall has
- * initialized the output buffer.
- */
- __msan_unpoison(buf + position, n);
- #endif
- #endif
- position += n;
- } else if (errno != EINTR && errno != EAGAIN) {
- #ifdef INVARIANTS
- panic("getrandom syscall returned unexpected error: %d", errno);
- #endif
- }
- } else
- #endif /* __NR_getrandom */
- {
- n = read(fd, (char *)buf + position, size - position);
- if (n > 0) {
- position += n;
- }
- }
- }
- return;
- }
- void
- finish_random(void)
- {
- if (fd != -1) {
- close(fd);
- }
- return;
- }
- #elif defined(__Fuchsia__)
- #include <zircon/syscalls.h>
- void
- init_random(void)
- {
- return;
- }
- void
- read_random(void *buf, size_t size)
- {
- zx_cprng_draw(buf, size);
- return;
- }
- void
- finish_random(void)
- {
- return;
- }
- #elif defined(__native_client__)
- #include <nacl/nacl_random.h>
- void
- init_random(void)
- {
- return;
- }
- void
- read_random(void *buf, size_t size)
- {
- size_t position;
- size_t n;
- position = 0;
- while (position < size) {
- if (nacl_secure_random((char *)buf + position, size - position, &n) == 0)
- position += n;
- }
- }
- return;
- }
- void
- finish_random(void)
- {
- return;
- }
- #else
- #error "Unknown platform. Please provide platform specific RNG."
- #endif
|