2020-10-13 15:04:59 +02:00
|
|
|
/******************************************************************************/
|
2020-10-19 21:56:12 +02:00
|
|
|
/* SlunkCrypt, by LoRd_MuldeR <MuldeR2@GMX.de> */
|
2020-10-13 15:04:59 +02:00
|
|
|
/* This work has been released under the CC0 1.0 Universal license! */
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2020-10-26 19:56:45 +01:00
|
|
|
/* Internal */
|
|
|
|
#include "../include/slunkcrypt.h"
|
2020-10-13 15:04:59 +02:00
|
|
|
|
2020-10-26 19:56:45 +01:00
|
|
|
/* CRT */
|
|
|
|
#include <string.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <limits.h>
|
|
|
|
|
|
|
|
/* Platform compatibility */
|
2020-10-13 19:33:01 +02:00
|
|
|
#ifdef _WIN32
|
2020-10-21 21:58:46 +02:00
|
|
|
# define WIN32_LEAN_AND_MEAN 1
|
|
|
|
# include <Windows.h>
|
2020-10-26 19:56:45 +01:00
|
|
|
# define SCHED_YIELD() Sleep(1U)
|
|
|
|
# define COMPARE_AND_SWAP(PTR,OLD,NEW) InterlockedCompareExchange((PTR),(NEW),(OLD))
|
|
|
|
# define ATOMIC_STORE(PTR,VAL) InterlockedExchange((PTR),(VAL))
|
2020-10-22 16:52:34 +02:00
|
|
|
# if defined(SecureZeroMemory)
|
|
|
|
# define HAVE_SECURE_ZERO_MEMORY 1
|
|
|
|
# else
|
|
|
|
# define HAVE_SECURE_ZERO_MEMORY 0
|
|
|
|
# endif
|
|
|
|
# define HAVE_GETRANDOM 0
|
|
|
|
# define HAVE_EXPLICIT_BZERO 0
|
2020-10-21 19:29:37 +02:00
|
|
|
#else
|
2020-10-21 21:58:46 +02:00
|
|
|
# include <unistd.h>
|
2020-10-26 19:56:45 +01:00
|
|
|
# include <sched.h>
|
|
|
|
# define SCHED_YIELD() sched_yield()
|
|
|
|
# if defined(__GNUC__) || defined(__clang__) || defined(__INTEL_COMPILER)
|
|
|
|
# define COMPARE_AND_SWAP(PTR,OLD,NEW) __sync_val_compare_and_swap((PTR),(OLD),(NEW))
|
|
|
|
# define ATOMIC_STORE(PTR,VAL) __atomic_store_n((PTR),(VAL),__ATOMIC_RELEASE)
|
|
|
|
# else
|
|
|
|
# define COMPARE_AND_SWAP(PTR,OLD,NEW) ((OLD))
|
|
|
|
# define ATOMIC_STORE(PTR,VAL) do { *(PTR) = (VAL); } while(0)
|
|
|
|
# endif
|
2020-10-22 16:52:34 +02:00
|
|
|
# if defined(__GLIBC__) && (__GLIBC__ >= 2) && (__GLIBC_MINOR__ >= 25)
|
|
|
|
# define HAVE_GETRANDOM 1
|
|
|
|
# define HAVE_EXPLICIT_BZERO 1
|
|
|
|
# elif defined(__FreeBSD__) && (__FreeBSD__ >= 12)
|
|
|
|
# define HAVE_GETRANDOM 1
|
|
|
|
# define HAVE_EXPLICIT_BZERO 1
|
|
|
|
# elif defined(__FreeBSD__) && (__FreeBSD__ >= 11)
|
|
|
|
# define HAVE_GETRANDOM 0
|
|
|
|
# define HAVE_EXPLICIT_BZERO 1
|
|
|
|
# else
|
|
|
|
# define HAVE_GETRANDOM 0
|
|
|
|
# define HAVE_EXPLICIT_BZERO 0
|
|
|
|
# endif
|
|
|
|
# if HAVE_GETRANDOM
|
2020-10-21 21:58:46 +02:00
|
|
|
# include <sys/random.h>
|
|
|
|
# endif
|
2020-10-13 15:37:40 +02:00
|
|
|
#endif
|
|
|
|
|
2020-10-26 19:56:45 +01:00
|
|
|
// ==========================================================================
|
|
|
|
// Critical sections
|
|
|
|
// ==========================================================================
|
|
|
|
|
|
|
|
static int enter_critsec(volatile long *const lock, const int flag)
|
|
|
|
{
|
|
|
|
const long expected = flag ? 0L : 1L;
|
|
|
|
long status;
|
|
|
|
while ((status = COMPARE_AND_SWAP(lock, expected, -1L)) < 0L)
|
|
|
|
{
|
|
|
|
SCHED_YIELD();
|
|
|
|
}
|
|
|
|
return (status == expected);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void leave_critsec(volatile long *const lock, const int flag)
|
|
|
|
{
|
|
|
|
ATOMIC_STORE(lock, flag ? 1L : 0L);
|
|
|
|
}
|
|
|
|
|
2020-10-22 16:52:34 +02:00
|
|
|
// ==========================================================================
|
2020-10-22 18:01:59 +02:00
|
|
|
// (De)Initialization
|
2020-10-22 16:52:34 +02:00
|
|
|
// ==========================================================================
|
|
|
|
|
2020-10-26 19:56:45 +01:00
|
|
|
static volatile long s_initialized = 0L;
|
|
|
|
|
2020-10-22 16:52:34 +02:00
|
|
|
#if defined(_WIN32)
|
2020-10-21 21:58:46 +02:00
|
|
|
typedef BOOLEAN(WINAPI *genrandom_t)(void*, ULONG);
|
2020-10-22 18:01:59 +02:00
|
|
|
static HMODULE s_advapi32 = NULL;
|
|
|
|
static genrandom_t s_genrandom = NULL;
|
|
|
|
#elif !HAVE_GETRANDOM
|
|
|
|
static const char *const DEV_RANDOM[] = { "/dev/urandom", "/dev/arandom", "/dev/random", NULL };
|
|
|
|
static int s_random_fd = -1;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
void slunkcrypt_startup(void)
|
2020-10-21 19:29:37 +02:00
|
|
|
{
|
2020-10-26 19:56:45 +01:00
|
|
|
if (enter_critsec(&s_initialized, 1))
|
2020-10-21 19:29:37 +02:00
|
|
|
{
|
2020-10-26 19:56:45 +01:00
|
|
|
#if defined(_WIN32)
|
|
|
|
if ((s_advapi32 = LoadLibraryW(L"advapi32.dll")))
|
|
|
|
{
|
|
|
|
s_genrandom = (genrandom_t)GetProcAddress(s_advapi32, "SystemFunction036");
|
|
|
|
}
|
2020-10-22 18:01:59 +02:00
|
|
|
#elif !HAVE_GETRANDOM
|
2020-10-26 19:56:45 +01:00
|
|
|
for (size_t i = 0U; (s_random_fd < 0) && DEV_RANDOM[i]; ++i)
|
|
|
|
{
|
|
|
|
s_random_fd = open(DEV_RANDOM[i], O_RDONLY);
|
|
|
|
}
|
2020-10-22 18:01:59 +02:00
|
|
|
#endif
|
2020-10-26 19:56:45 +01:00
|
|
|
leave_critsec(&s_initialized, 1);
|
|
|
|
}
|
2020-10-21 19:29:37 +02:00
|
|
|
}
|
2020-10-22 18:01:59 +02:00
|
|
|
|
|
|
|
void slunkcrypt_cleanup(void)
|
2020-10-22 16:52:34 +02:00
|
|
|
{
|
2020-10-26 19:56:45 +01:00
|
|
|
if (enter_critsec(&s_initialized, 0))
|
2020-10-22 16:52:34 +02:00
|
|
|
{
|
2020-10-26 19:56:45 +01:00
|
|
|
#if defined(_WIN32)
|
|
|
|
s_genrandom = NULL;
|
|
|
|
if (s_advapi32)
|
|
|
|
{
|
|
|
|
FreeLibrary(s_advapi32);
|
|
|
|
s_advapi32 = NULL;
|
|
|
|
}
|
2020-10-22 18:01:59 +02:00
|
|
|
#elif !HAVE_GETRANDOM
|
2020-10-26 19:56:45 +01:00
|
|
|
if (s_random_fd >= 0)
|
|
|
|
{
|
|
|
|
close(s_random_fd);
|
|
|
|
s_random_fd = -1;
|
|
|
|
}
|
2020-10-21 19:29:37 +02:00
|
|
|
#endif
|
2020-10-26 19:56:45 +01:00
|
|
|
leave_critsec(&s_initialized, 0);
|
|
|
|
}
|
2020-10-22 18:01:59 +02:00
|
|
|
}
|
2020-10-21 19:29:37 +02:00
|
|
|
|
2020-10-22 16:52:34 +02:00
|
|
|
// ==========================================================================
|
2020-10-22 18:01:59 +02:00
|
|
|
// Auxiliary functions
|
2020-10-22 16:52:34 +02:00
|
|
|
// ==========================================================================
|
|
|
|
|
2020-10-21 19:29:37 +02:00
|
|
|
int slunkcrypt_random_bytes(uint8_t* const buffer, const size_t length)
|
|
|
|
{
|
2020-10-22 16:52:34 +02:00
|
|
|
#if defined(_WIN32)
|
2020-10-21 19:29:37 +02:00
|
|
|
if ((length <= ((size_t)ULONG_MAX)))
|
|
|
|
{
|
2020-10-22 18:01:59 +02:00
|
|
|
if (s_genrandom)
|
2020-10-13 15:04:59 +02:00
|
|
|
{
|
2020-10-22 18:01:59 +02:00
|
|
|
return s_genrandom(buffer, (ULONG)length) ? 0 : (-1);
|
2020-10-13 15:04:59 +02:00
|
|
|
}
|
|
|
|
}
|
2020-10-21 19:29:37 +02:00
|
|
|
return -1;
|
2020-10-22 16:52:34 +02:00
|
|
|
#elif HAVE_GETRANDOM
|
2020-10-13 17:42:22 +02:00
|
|
|
if (getrandom(buffer, length, 0U) >= length)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
#else
|
2020-10-22 18:01:59 +02:00
|
|
|
if (s_random_fd >= 0)
|
2020-10-13 15:04:59 +02:00
|
|
|
{
|
2020-10-22 18:01:59 +02:00
|
|
|
if (read(s_random_fd, buffer, length) >= length)
|
2020-10-13 15:04:59 +02:00
|
|
|
{
|
2020-10-22 16:52:34 +02:00
|
|
|
return 0;
|
2020-10-13 15:04:59 +02:00
|
|
|
}
|
|
|
|
}
|
2020-10-22 16:52:34 +02:00
|
|
|
return -1;
|
2020-10-13 17:42:22 +02:00
|
|
|
#endif
|
2020-10-13 15:04:59 +02:00
|
|
|
}
|
|
|
|
|
2020-10-19 21:56:12 +02:00
|
|
|
void slunkcrypt_bzero(void* const ptr, const size_t length)
|
2020-10-13 15:04:59 +02:00
|
|
|
{
|
2020-10-14 13:14:47 +02:00
|
|
|
if ((ptr) && (length > 0U))
|
|
|
|
{
|
2020-10-22 16:52:34 +02:00
|
|
|
#if HAVE_SECURE_ZERO_MEMORY
|
2020-10-14 13:14:47 +02:00
|
|
|
SecureZeroMemory(ptr, length);
|
2020-10-22 16:52:34 +02:00
|
|
|
#elif HAVE_EXPLICIT_BZERO
|
2020-10-14 13:14:47 +02:00
|
|
|
explicit_bzero(ptr, length);
|
2020-10-13 19:33:01 +02:00
|
|
|
#else
|
2020-10-21 17:07:03 +02:00
|
|
|
volatile uint8_t *buffer = (volatile uint8_t*)ptr;
|
2020-10-14 13:14:47 +02:00
|
|
|
for (size_t i = 0U; i < length; ++i)
|
|
|
|
{
|
|
|
|
buffer[i] = 0U;
|
|
|
|
}
|
2020-10-13 19:33:01 +02:00
|
|
|
#endif
|
2020-10-14 13:14:47 +02:00
|
|
|
}
|
2020-10-13 15:04:59 +02:00
|
|
|
}
|