|
|
|
@ -5,14 +5,17 @@
@@ -5,14 +5,17 @@
|
|
|
|
|
|
|
|
|
|
#include "random.h" |
|
|
|
|
|
|
|
|
|
#include "crypto/sha512.h" |
|
|
|
|
#include "support/cleanse.h" |
|
|
|
|
#ifdef WIN32 |
|
|
|
|
#include "compat.h" // for Windows API |
|
|
|
|
#include <wincrypt.h> |
|
|
|
|
#endif |
|
|
|
|
#include "serialize.h" // for begin_ptr(vec) |
|
|
|
|
#include "util.h" // for LogPrint() |
|
|
|
|
#include "utilstrencodings.h" // for GetTime() |
|
|
|
|
|
|
|
|
|
#include <stdlib.h> |
|
|
|
|
#include <limits> |
|
|
|
|
|
|
|
|
|
#ifndef WIN32 |
|
|
|
@ -22,6 +25,12 @@
@@ -22,6 +25,12 @@
|
|
|
|
|
#include <openssl/err.h> |
|
|
|
|
#include <openssl/rand.h> |
|
|
|
|
|
|
|
|
|
static void RandFailure() |
|
|
|
|
{ |
|
|
|
|
LogPrintf("Failed to read randomness, aborting\n"); |
|
|
|
|
abort(); |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
static inline int64_t GetPerformanceCounter() |
|
|
|
|
{ |
|
|
|
|
int64_t nCounter = 0; |
|
|
|
@ -43,7 +52,7 @@ void RandAddSeed()
@@ -43,7 +52,7 @@ void RandAddSeed()
|
|
|
|
|
memory_cleanse((void*)&nCounter, sizeof(nCounter)); |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
void RandAddSeedPerfmon() |
|
|
|
|
static void RandAddSeedPerfmon() |
|
|
|
|
{ |
|
|
|
|
RandAddSeed(); |
|
|
|
|
|
|
|
|
@ -83,14 +92,65 @@ void RandAddSeedPerfmon()
@@ -83,14 +92,65 @@ void RandAddSeedPerfmon()
|
|
|
|
|
#endif |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
/** Get 32 bytes of system entropy. */ |
|
|
|
|
static void GetOSRand(unsigned char *ent32) |
|
|
|
|
{ |
|
|
|
|
#ifdef WIN32 |
|
|
|
|
HCRYPTPROV hProvider; |
|
|
|
|
int ret = CryptAcquireContextW(&hProvider, NULL, NULL, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT); |
|
|
|
|
if (!ret) { |
|
|
|
|
RandFailure(); |
|
|
|
|
} |
|
|
|
|
ret = CryptGenRandom(hProvider, 32, ent32); |
|
|
|
|
if (!ret) { |
|
|
|
|
RandFailure(); |
|
|
|
|
} |
|
|
|
|
CryptReleaseContext(hProvider, 0); |
|
|
|
|
#else |
|
|
|
|
int f = open("/dev/urandom", O_RDONLY); |
|
|
|
|
if (f == -1) { |
|
|
|
|
RandFailure(); |
|
|
|
|
} |
|
|
|
|
int have = 0; |
|
|
|
|
do { |
|
|
|
|
ssize_t n = read(f, ent32 + have, 32 - have); |
|
|
|
|
if (n <= 0 || n + have > 32) { |
|
|
|
|
RandFailure(); |
|
|
|
|
} |
|
|
|
|
have += n; |
|
|
|
|
} while (have < 32); |
|
|
|
|
close(f); |
|
|
|
|
#endif |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
void GetRandBytes(unsigned char* buf, int num) |
|
|
|
|
{ |
|
|
|
|
if (RAND_bytes(buf, num) != 1) { |
|
|
|
|
LogPrintf("%s: OpenSSL RAND_bytes() failed with error: %s\n", __func__, ERR_error_string(ERR_get_error(), NULL)); |
|
|
|
|
assert(false); |
|
|
|
|
RandFailure(); |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
void GetStrongRandBytes(unsigned char* out, int num) |
|
|
|
|
{ |
|
|
|
|
assert(num <= 32); |
|
|
|
|
CSHA512 hasher; |
|
|
|
|
unsigned char buf[64]; |
|
|
|
|
|
|
|
|
|
// First source: OpenSSL's RNG
|
|
|
|
|
RandAddSeedPerfmon(); |
|
|
|
|
GetRandBytes(buf, 32); |
|
|
|
|
hasher.Write(buf, 32); |
|
|
|
|
|
|
|
|
|
// Second source: OS RNG
|
|
|
|
|
GetOSRand(buf); |
|
|
|
|
hasher.Write(buf, 32); |
|
|
|
|
|
|
|
|
|
// Produce output
|
|
|
|
|
hasher.Finalize(buf); |
|
|
|
|
memcpy(out, buf, num); |
|
|
|
|
memory_cleanse(buf, 64); |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
uint64_t GetRand(uint64_t nMax) |
|
|
|
|
{ |
|
|
|
|
if (nMax == 0) |
|
|
|
|