SlunkCrypt/libMCrypt/src/internal.c

95 lines
2.1 KiB
C
Raw Normal View History

2020-10-13 15:04:59 +02:00
/******************************************************************************/
/* MCrypt, by LoRd_MuldeR <MuldeR2@GMX.de> */
/* This work has been released under the CC0 1.0 Universal license! */
/******************************************************************************/
#ifdef _WIN32
#define _CRT_RAND_S 1
2020-10-13 19:33:01 +02:00
#define WIN32_LEAN_AND_MEAN 1
2020-10-13 15:04:59 +02:00
#endif
2020-10-13 19:33:01 +02:00
#include <mcrypt.h>
2020-10-13 15:04:59 +02:00
2020-10-13 19:33:01 +02:00
#ifdef _WIN32
#include <Windows.h>
#else
2020-10-13 15:37:40 +02:00
#include <unistd.h>
#include <fcntl.h>
#if (defined(__GLIBC__) && defined(__GLIBC_MINOR__) && (__GLIBC__ >= 2) && (__GLIBC_MINOR__ >= 25)) || (defined(__FreeBSD__) && (__FreeBSD__ >= 12))
#define HAVE_GENRANDOM_SYSCALL 1
#include <sys/random.h>
#else
#undef HAVE_GENRANDOM_SYSCALL
#endif
2020-10-13 19:33:01 +02:00
#if (defined(__GLIBC__) && defined(__GLIBC_MINOR__) && (__GLIBC__ >= 2) && (__GLIBC_MINOR__ >= 25)) || (defined(__FreeBSD__) && (__FreeBSD__ >= 11))
#define HAVE_EXPLICIT_BZERO 1
#include <string.h>
#else
#undef HAVE_EXPLICIT_BZERO
#endif
2020-10-13 15:37:40 +02:00
#endif
2020-10-13 15:04:59 +02:00
int mcrypt_random_bytes(uint8_t* const buffer, const size_t length)
{
#ifdef _WIN32
size_t pos = 0U;
while (pos < length)
{
const size_t bytes_left = length - pos;
const size_t bytes_copy = (bytes_left < sizeof(uint32_t)) ? bytes_left : sizeof(uint32_t);
uint32_t temp;
if (rand_s(&temp) != 0)
{
return -1;
}
for (size_t i = 0; i < bytes_copy; ++i)
{
buffer[pos++] = (uint8_t)(temp & 0xFF);
temp >>= 8;
}
}
return 0;
#else
#ifdef HAVE_GENRANDOM_SYSCALL
if (getrandom(buffer, length, 0U) >= length)
{
return 0;
}
return -1;
#else
static const char* const PATH[] = { "/dev/urandom", "/dev/arandom", "/dev/random" };
2020-10-13 15:04:59 +02:00
int result = -1;
for (size_t i = 0; (i < 3U) && (result < 0); ++i)
2020-10-13 15:04:59 +02:00
{
const int fd = open(PATH[i], O_RDONLY);
if (fd >= 0)
{
2020-10-13 15:37:40 +02:00
if (read(fd, buffer, length) >= length)
2020-10-13 15:04:59 +02:00
{
result = 0;
}
close(fd);
}
}
return result;
#endif
2020-10-13 15:04:59 +02:00
#endif
}
2020-10-13 19:33:01 +02:00
void mcrypt_bzero(void* const ptr, const size_t length)
2020-10-13 15:04:59 +02:00
{
2020-10-13 19:33:01 +02:00
#ifdef _WIN32
SecureZeroMemory(ptr, length);
#else
#ifdef HAVE_EXPLICIT_BZERO
explicit_bzero(ptr, length);
#else
2020-10-13 15:04:59 +02:00
volatile uint8_t* buffer = ptr;
for (size_t i = 0U; i < length; ++i)
{
buffer[i] = 0U;
}
2020-10-13 19:33:01 +02:00
#endif
#endif
2020-10-13 15:04:59 +02:00
}