/******************************************************************************/ /* SlunkCrypt, by LoRd_MuldeR */ /* This work has been released under the CC0 1.0 Universal license! */ /******************************************************************************/ #ifdef _WIN32 # define WIN32_LEAN_AND_MEAN 1 # define _CRT_SECURE_NO_WARNINGS 1 #else # define _GNU_SOURCE 1 #endif /* Internal */ #include "slunkcrypt.h" #include "compiler.h" /* CRT */ #include #include #include /* PThread */ #if defined(_MSC_VER) && !defined(_DLL) # define PTW32_STATIC_LIB 1 #endif #include /* Utils */ static INLINE size_t MIN_SIZE(const size_t a, const size_t b) { return (a > b) ? b : a; } // ========================================================================== // Platform compatibility // ========================================================================== #ifdef _WIN32 # include # include #else # include # include #endif /* detect compiler destructor support */ #undef HAVE_ATTRIB_DESTRUCTOR #if defined(__GNUC__) || defined(__clang__) # define HAVE_ATTRIB_DESTRUCTOR 1 #endif /* detect getentropy() or RtlGenRandom() support */ #undef HAVE_GETENTROPY #undef HAVE_WIN32RTLGENRANDOM #if defined(_WIN32) # define HAVE_WIN32RTLGENRANDOM 1 #elif (defined(__linux__) && !defined(__UCLIBC__)) || (defined(__FreeBSD__) && (__FreeBSD__ >= 12)) || defined(__OpenBSD__) || (defined(__sun) && defined(__SVR4)) # define HAVE_GETENTROPY 1 #else # pragma message("Function getentropy() is *not* available -> using fallback!") #endif /* detect explicit_bzero() or SecureZeroMemory() support */ #undef EXPLICIT_BZERO #if defined(_WIN32) && defined(SecureZeroMemory) # define EXPLICIT_BZERO SecureZeroMemory #elif (defined(__linux__) && !defined(__UCLIBC__)) || (defined(__FreeBSD__) && (__FreeBSD__ >= 11)) || defined(__OpenBSD__) || (defined(__sun) && defined(__SVR4)) # define EXPLICIT_BZERO explicit_bzero #else # pragma message("Function explicit_bzero() is *not* available -> using fallback!") #endif // ========================================================================== // Random bytes // ========================================================================== #define MAX_COUNT 1048576U /* Global state */ static pthread_once_t s_random_is_initialized = PTHREAD_ONCE_INIT; #if defined(_WIN32) typedef BOOLEAN(WINAPI *ptr_genrandom_t)(void *buffer, ULONG length); static HMODULE s_advapi32 = NULL; static ptr_genrandom_t s_genrandom = NULL; #else static const char *const DEV_RANDOM[] = { "/dev/urandom", "/dev/arandom", "/dev/random", NULL }; static int s_random_fd = -1; #endif /* De-initialize CSRNG */ static void exit_random_source(void) { #ifdef _WIN32 if (s_genrandom) { s_genrandom = NULL; } if (s_advapi32) { FreeLibrary(s_advapi32); s_advapi32 = NULL; } #else if (s_random_fd >= 0) { close(s_random_fd); s_random_fd = -1; } #endif } /* Initialize CSRNG */ static void init_random_source(void) { #ifdef HAVE_WIN32RTLGENRANDOM if ((s_advapi32 = LoadLibraryW(L"advapi32.dll"))) { s_genrandom = (ptr_genrandom_t) GetProcAddress(s_advapi32, "SystemFunction036"); } #else #if defined(HAVE_GETENTROPY) uint8_t temp; if (getentropy(&temp, sizeof(uint8_t)) >= 0) { goto init_completed; } #endif for (size_t i = 0U; DEV_RANDOM[i]; ++i) { if ((s_random_fd = open(DEV_RANDOM[i], O_RDONLY)) >= 0) { goto init_completed; } } init_completed: ; #endif #if !defined(HAVE_ATTRIB_DESTRUCTOR) atexit(exit_random_source); #endif } /* Generate random bytes */ size_t slunkcrypt_random_bytes(uint8_t *const buffer, const size_t length) { size_t offset; pthread_once(&s_random_is_initialized, init_random_source); #ifdef HAVE_WIN32RTLGENRANDOM if (s_genrandom) { ULONG count; for (offset = 0U; offset < length; offset += count) { count = (ULONG) MIN_SIZE(length - offset, MAX_COUNT); if (!s_genrandom(buffer + offset, count)) { break; /*failed*/ } } return offset; } return 0U; #else if (s_random_fd >= 0) { ssize_t count; for (offset = 0; offset < length; offset += (size_t)count) { if (!((count = read(s_random_fd, buffer + offset, MIN_SIZE(length - offset, MAX_COUNT))) > 0)) { break; /*failed*/ } } return offset; } #if defined(HAVE_GETENTROPY) else { size_t count; for (offset = 0U; offset < length; offset += count) { count = MIN_SIZE(length - offset, 256U); /*the maximum permitted value is 256*/ if (getentropy(buffer + offset, count) < 0) { break; /*failed*/ } } return offset; } #else return 0U; #endif #endif } // ========================================================================== // Zero memory // ========================================================================== void slunkcrypt_bzero(void* const buffer, const size_t length) { if ((buffer) && (length > 0U)) { #if defined(EXPLICIT_BZERO) EXPLICIT_BZERO(buffer, length); #else volatile uint8_t* ptr = (volatile uint8_t*) buffer; for (size_t i = 0U; i < length; ++i) { ptr[i] = 0U; } #endif } } // ========================================================================== // Destructor // ========================================================================== #if defined(HAVE_ATTRIB_DESTRUCTOR) __attribute__((destructor)) void slunkcrypt_destructor() { exit_random_source(); } #endif