dnscrypt-proxy 1.6.0
[tomato.git] / release / src / router / dnscrypt / src / libevent-modified / evutil_rand.c
bloba3f72fa71445040d13822d390ed23ca302819b39
1 /*
2 * Copyright (c) 2007-2012 Niels Provos and Nick Mathewson
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
6 * are met:
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
12 * 3. The name of the author may not be used to endorse or promote products
13 * derived from this software without specific prior written permission.
15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
16 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
17 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
18 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
19 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
20 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
21 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
22 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
24 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 /* This file has our secure PRNG code. On platforms that have arc4random(),
28 * we just use that. Otherwise, we include arc4random.c as a bunch of static
29 * functions, and wrap it lightly. We don't expose the arc4random*() APIs
30 * because A) they aren't in our namespace, and B) it's not nice to name your
31 * APIs after their implementations. We keep them in a separate file
32 * so that other people can rip it out and use it for whatever.
35 #include "event2/event-config.h"
37 #include <limits.h>
39 #include "util-internal.h"
40 #include "evthread-internal.h"
42 #ifdef _EVENT_HAVE_ARC4RANDOM
43 #include <stdlib.h>
44 #include <string.h>
45 int
46 evutil_secure_rng_set_urandom_device_file(char *fname)
48 (void) fname;
49 return -1;
51 int
52 evutil_secure_rng_init(void)
54 /* call arc4random() now to force it to self-initialize */
55 (void) arc4random();
56 return 0;
58 int
59 evutil_secure_rng_global_setup_locks_(const int enable_locks)
61 return 0;
64 static void
65 ev_arc4random_buf(void *buf, size_t n)
67 #if defined(_EVENT_HAVE_ARC4RANDOM_BUF) && !defined(__APPLE__)
68 arc4random_buf(buf, n);
69 return;
70 #else
71 unsigned char *b = buf;
73 #if defined(_EVENT_HAVE_ARC4RANDOM_BUF)
74 /* OSX 10.7 introducd arc4random_buf, so if you build your program
75 * there, you'll get surprised when older versions of OSX fail to run.
76 * To solve this, we can check whether the function pointer is set,
77 * and fall back otherwise. (OSX does this using some linker
78 * trickery.)
81 void (*tptr)(void *,size_t) =
82 (void (*)(void*,size_t))arc4random_buf;
83 if (tptr != NULL) {
84 arc4random_buf(buf, n);
85 return;
88 #endif
89 /* Make sure that we start out with b at a 4-byte alignment; plenty
90 * of CPUs care about this for 32-bit access. */
91 if (n >= 4 && ((ev_uintptr_t)b) & 3) {
92 ev_uint32_t u = arc4random();
93 int n_bytes = 4 - (((ev_uintptr_t)b) & 3);
94 memcpy(b, &u, n_bytes);
95 b += n_bytes;
96 n -= n_bytes;
98 while (n >= 4) {
99 *(ev_uint32_t*)b = arc4random();
100 b += 4;
101 n -= 4;
103 if (n) {
104 ev_uint32_t u = arc4random();
105 memcpy(b, &u, n);
107 #endif
110 #else /* !_EVENT_HAVE_ARC4RANDOM { */
112 #ifdef _EVENT_ssize_t
113 #define ssize_t _EVENT_SSIZE_t
114 #endif
115 #define ARC4RANDOM_EXPORT static
116 #define _ARC4_LOCK() EVLOCK_LOCK(arc4rand_lock, 0)
117 #define _ARC4_UNLOCK() EVLOCK_UNLOCK(arc4rand_lock, 0)
118 #ifndef _EVENT_DISABLE_THREAD_SUPPORT
119 static void *arc4rand_lock;
120 #endif
122 #define ARC4RANDOM_UINT32 ev_uint32_t
123 #define ARC4RANDOM_NOSTIR
124 #define ARC4RANDOM_NORANDOM
125 #define ARC4RANDOM_NOUNIFORM
127 #include "./arc4random.c"
129 #ifndef _EVENT_DISABLE_THREAD_SUPPORT
131 evutil_secure_rng_global_setup_locks_(const int enable_locks)
133 EVTHREAD_SETUP_GLOBAL_LOCK(arc4rand_lock, 0);
134 return 0;
136 #endif
139 evutil_secure_rng_set_urandom_device_file(char *fname)
141 #ifdef TRY_SEED_URANDOM
142 _ARC4_LOCK();
143 arc4random_urandom_filename = fname;
144 _ARC4_UNLOCK();
145 #endif
146 return 0;
150 evutil_secure_rng_init(void)
152 int val;
154 _ARC4_LOCK();
155 if (!arc4_seeded_ok)
156 arc4_stir();
157 val = arc4_seeded_ok ? 0 : -1;
158 _ARC4_UNLOCK();
159 return val;
162 static void
163 ev_arc4random_buf(void *buf, size_t n)
165 arc4random_buf(buf, n);
168 #endif /* } !_EVENT_HAVE_ARC4RANDOM */
170 void
171 evutil_secure_rng_get_bytes(void *buf, size_t n)
173 ev_arc4random_buf(buf, n);
176 void
177 evutil_secure_rng_add_bytes(const char *buf, size_t n)
179 arc4random_addrandom((unsigned char*)buf,
180 n>(size_t)INT_MAX ? INT_MAX : (int)n);