SlunkCrypt/libslunkcrypt/src/junk.c

240 lines
5.6 KiB
C
Raw Normal View History

2020-10-13 15:04:59 +02:00
/******************************************************************************/
/* SlunkCrypt, by LoRd_MuldeR <MuldeR2@GMX.de> */
2020-10-13 15:04:59 +02:00
/* This work has been released under the CC0 1.0 Universal license! */
/******************************************************************************/
2020-11-04 23:17:59 +01:00
#ifdef _WIN32
# define WIN32_LEAN_AND_MEAN 1
# define _CRT_SECURE_NO_WARNINGS 1
#else
# define _GNU_SOURCE 1
#endif
2020-10-26 19:56:45 +01:00
/* Internal */
#include "slunkcrypt.h"
#include "compiler.h"
2020-10-13 15:04:59 +02:00
2020-10-26 19:56:45 +01:00
/* CRT */
#include <string.h>
#include <fcntl.h>
#include <limits.h>
/* Utils */
static INLINE size_t MIN_SIZE(const size_t a, const size_t b) { return (a > b) ? b : a; }
// ==========================================================================
// Platform compatibility
// ==========================================================================
2020-10-13 19:33:01 +02:00
#ifdef _WIN32
2020-10-21 21:58:46 +02:00
# include <Windows.h>
# include <io.h>
#else
2020-10-21 21:58:46 +02:00
# include <unistd.h>
# include <pthread.h>
2020-10-13 15:37:40 +02:00
#endif
/* detect destructor support */
#undef ATTRIB_DESTRUCTOR
#if defined(__GNUC__) || defined(__clang__)
# define ATTRIB_DESTRUCTOR __attribute__((destructor))
#endif
/* detect getentropy() support */
#undef GETENTROPY
#if (defined(__linux__) && (__linux__ >= 1)) || (defined(__FreeBSD__) && (__FreeBSD__ >= 12)) || (defined(__OpenBSD__) && (__OpenBSD__ >= 1))
# define GETENTROPY getentropy
#endif
/* detect explicit_bzero() support */
#undef EXPLICIT_BZERO
#if defined(_WIN32) && (_WIN32 >= 1) && defined(SecureZeroMemory)
# define EXPLICIT_BZERO SecureZeroMemory
#elif (defined(__linux__) && (__linux__ >= 1)) || (defined(__FreeBSD__) && (__FreeBSD__ >= 11)) || (defined(__OpenBSD__) && (__OpenBSD__ >= 1))
# define EXPLICIT_BZERO explicit_bzero
#endif
2020-10-26 19:56:45 +01:00
// ==========================================================================
2020-10-28 21:58:24 +01:00
// Call once support
2020-10-26 19:56:45 +01:00
// ==========================================================================
#ifdef _WIN32
2020-10-28 21:58:24 +01:00
# define CALL_ONCE win32_call_once
# define CALL_ONCE_TYPE volatile LONG
# define CALL_ONCE_INIT 0L
#else
2020-10-28 21:58:24 +01:00
# define CALL_ONCE pthread_once
# define CALL_ONCE_TYPE pthread_once_t
# define CALL_ONCE_INIT PTHREAD_ONCE_INIT
#endif
#ifdef _WIN32
2020-10-28 21:58:24 +01:00
static void win32_call_once(CALL_ONCE_TYPE *const control, void (*init_routine)(void))
2020-10-26 19:56:45 +01:00
{
LONG status;
while ((status = InterlockedCompareExchange(control, -1L, 0L)) != 0L)
2020-10-26 19:56:45 +01:00
{
if(status > 0L)
{
return; /*already initialized*/
}
SwitchToThread();
2020-10-26 19:56:45 +01:00
}
init_routine();
InterlockedExchange(control, 1L);
2020-10-26 19:56:45 +01:00
}
#endif
2020-10-26 19:56:45 +01:00
// ==========================================================================
// Random bytes
// ==========================================================================
#define MAX_COUNT 1048576U
/* Global state */
2020-10-28 21:58:24 +01:00
static CALL_ONCE_TYPE s_random_is_initialized = CALL_ONCE_INIT;
#if defined(_WIN32)
typedef BOOLEAN(WINAPI *ptr_genrandom_t)(void *buffer, ULONG length);
static HMODULE s_advapi32 = NULL;
static ptr_genrandom_t s_genrandom = NULL;
#else
static const char *const DEV_RANDOM[] = { "/dev/urandom", "/dev/arandom", "/dev/random", NULL };
static int s_random_fd = -1;
#endif
2020-10-28 21:58:24 +01:00
/* De-initialize CSRNG */
static void exit_random_source(void)
{
#ifdef _WIN32
if (s_genrandom)
{
s_genrandom = NULL;
}
if (s_advapi32)
{
FreeLibrary(s_advapi32);
s_advapi32 = NULL;
}
#else
if (s_random_fd >= 0)
{
close(s_random_fd);
s_random_fd = -1;
2020-10-26 19:56:45 +01:00
}
#endif
}
/* Initialize CSRNG */
static void init_random_source(void)
{
#ifdef _WIN32
if ((s_advapi32 = LoadLibraryW(L"advapi32.dll")))
{
s_genrandom = (ptr_genrandom_t) GetProcAddress(s_advapi32, "SystemFunction036");
}
#else
#if defined(GETENTROPY)
uint8_t temp;
if (GETENTROPY(&temp, sizeof(uint8_t)) >= 0)
{
goto init_completed;
}
#endif
for (size_t i = 0U; DEV_RANDOM[i]; ++i)
{
if ((s_random_fd = open(DEV_RANDOM[i], O_RDONLY)) >= 0)
2020-10-26 19:56:45 +01:00
{
goto init_completed;
2020-10-26 19:56:45 +01:00
}
}
init_completed: ;
#endif
#if !defined(ATTRIB_DESTRUCTOR)
2020-10-28 21:58:24 +01:00
atexit(exit_random_source);
#endif
}
/* Generate random bytes */
size_t slunkcrypt_random_bytes(uint8_t* const buffer, const size_t length)
{
size_t offset;
2020-10-28 21:58:24 +01:00
CALL_ONCE(&s_random_is_initialized, init_random_source);
#ifdef _WIN32
if (s_genrandom)
{
ULONG count;
for (offset = 0U; offset < length; offset += count)
{
count = (ULONG) MIN_SIZE(length - offset, MAX_COUNT);
if (!s_genrandom(buffer + offset, count))
{
break; /*failed*/
}
}
return offset;
2020-10-13 15:04:59 +02:00
}
return 0U;
#else
if (s_random_fd >= 0)
2020-10-13 15:04:59 +02:00
{
ssize_t count;
for (offset = 0; offset < length; offset += (size_t)count)
{
if (!((count = read(s_random_fd, buffer + offset, MIN_SIZE(length - offset, MAX_COUNT))) > 0))
{
break; /*failed*/
}
}
return offset;
2020-10-13 15:04:59 +02:00
}
#if defined(GETENTROPY)
else
{
size_t count;
for (offset = 0U; offset < length; offset += count)
{
count = MIN_SIZE(length - offset, 256U); /*the maximum permitted value is 256*/
if (GETENTROPY(buffer + offset, count) < 0)
{
break; /*failed*/
}
}
return offset;
}
#else
return 0U;
#endif
#endif
2020-10-13 15:04:59 +02:00
}
// ==========================================================================
// Zero memory
// ==========================================================================
2020-10-28 21:58:24 +01:00
void slunkcrypt_bzero(void* const buffer, const size_t length)
2020-10-13 15:04:59 +02:00
{
2020-10-28 21:58:24 +01:00
if ((buffer) && (length > 0U))
2020-10-14 13:14:47 +02:00
{
#if defined(EXPLICIT_BZERO)
EXPLICIT_BZERO(buffer, length);
2020-10-13 19:33:01 +02:00
#else
2020-10-28 21:58:24 +01:00
volatile uint8_t* ptr = (volatile uint8_t*) buffer;
2020-10-14 13:14:47 +02:00
for (size_t i = 0U; i < length; ++i)
{
2020-10-28 21:58:24 +01:00
ptr[i] = 0U;
2020-10-14 13:14:47 +02:00
}
2020-10-13 19:33:01 +02:00
#endif
2020-10-14 13:14:47 +02:00
}
2020-10-13 15:04:59 +02:00
}
2020-10-28 21:58:24 +01:00
// ==========================================================================
// Destructor
// ==========================================================================
#if defined(ATTRIB_DESTRUCTOR)
ATTRIB_DESTRUCTOR void slunkcrypt_destructor()
2020-10-28 21:58:24 +01:00
{
exit_random_source();
}
#endif