From 8d08da3a994f318c3d0bf0c70881f1f5b3dcfa4d Mon Sep 17 00:00:00 2001 From: Joshua Oreman Date: Mon, 29 Jun 2009 22:54:16 -0700 Subject: [PATCH] [crypto] Add a placeholder for a proper random number generator Currently it just calls random(). Signed-off-by: Marty Connor --- src/crypto/crandom.c | 55 +++++++++++++++++++++++++++++++++++++++ src/include/gpxe/crypto.h | 2 ++ 2 files changed, 57 insertions(+) create mode 100644 src/crypto/crandom.c diff --git a/src/crypto/crandom.c b/src/crypto/crandom.c new file mode 100644 index 00000000..9828482e --- /dev/null +++ b/src/crypto/crandom.c @@ -0,0 +1,55 @@ +/* + * Copyright (c) 2009 Joshua Oreman . + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License as + * published by the Free Software Foundation; either version 2 of the + * License, or any later version. + * + * This program is distributed in the hope that it will be useful, but + * WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + * General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. + */ + +FILE_LICENCE ( GPL2_OR_LATER ); + +/** @file + * + * Cryptographically strong random number generator + * + * Currently the cryptographic part is not implemented, and this just + * uses random(). + */ + +#include +#include + +/** + * Get cryptographically strong random bytes + * + * @v buf Buffer in which to store random bytes + * @v len Number of random bytes to generate + * + * @b WARNING: This function is currently underimplemented, and does + * not give numbers any stronger than random()! + */ +void get_random_bytes ( void *buf, size_t len ) +{ + u8 *bufp = buf; + + /* + * Somewhat arbitrarily, choose the 0x00FF0000-masked byte + * returned by random() as having good entropy. PRNGs often + * don't provide good entropy in lower bits, and the top byte + * might show a pattern because of sign issues. + */ + + while ( len-- ) { + *bufp++ = ( random() >> 16 ) & 0xFF; + } +} diff --git a/src/include/gpxe/crypto.h b/src/include/gpxe/crypto.h index 751ca05b..ecda5f6d 100644 --- a/src/include/gpxe/crypto.h +++ b/src/include/gpxe/crypto.h @@ -151,4 +151,6 @@ extern struct digest_algorithm digest_null; extern struct cipher_algorithm cipher_null; extern struct pubkey_algorithm pubkey_null; +void get_random_bytes ( void *buf, size_t len ); + #endif /* _GPXE_CRYPTO_H */