292 lines
7.5 KiB
C
Raw Normal View History

2017-07-20 19:35:53 +02:00
/***************************************************************************
* _ _ ____ _
* Project ___| | | | _ \| |
* / __| | | | |_) | |
* | (__| |_| | _ <| |___
* \___|\___/|_| \_\_____|
*
2023-07-02 19:51:09 +02:00
* Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
2017-07-20 19:35:53 +02:00
*
* This software is licensed as described in the file COPYING, which
* you should have received as part of this distribution. The terms
2021-09-14 00:13:48 +02:00
* are also available at https://curl.se/docs/copyright.html.
2017-07-20 19:35:53 +02:00
*
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
* copies of the Software, and permit persons to whom the Software is
* furnished to do so, under the terms of the COPYING file.
*
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
* KIND, either express or implied.
*
2022-11-16 20:14:03 +01:00
* SPDX-License-Identifier: curl
*
2017-07-20 19:35:53 +02:00
***************************************************************************/
#include "curl_setup.h"
2023-12-07 09:12:54 +01:00
#include <limits.h>
2017-07-20 19:35:53 +02:00
#ifdef HAVE_FCNTL_H
#include <fcntl.h>
#endif
2023-05-23 16:38:00 +02:00
#ifdef HAVE_ARPA_INET_H
#include <arpa/inet.h>
#endif
2017-07-20 19:35:53 +02:00
#include <curl/curl.h>
2023-12-07 09:12:54 +01:00
#include "urldata.h"
2017-07-20 19:35:53 +02:00
#include "vtls/vtls.h"
#include "sendf.h"
2023-05-23 16:38:00 +02:00
#include "timeval.h"
2017-07-20 19:35:53 +02:00
#include "rand.h"
2023-12-07 09:12:54 +01:00
#include "escape.h"
2017-07-20 19:35:53 +02:00
/* The last 3 #include files should be in this order */
#include "curl_printf.h"
#include "curl_memory.h"
#include "memdebug.h"
2024-04-14 22:45:38 +02:00
#ifdef _WIN32
2022-11-16 20:14:03 +01:00
2023-12-07 09:12:54 +01:00
#if defined(_WIN32_WINNT) && _WIN32_WINNT >= 0x600
2022-11-16 20:14:03 +01:00
# define HAVE_WIN_BCRYPTGENRANDOM
# include <bcrypt.h>
# ifdef _MSC_VER
# pragma comment(lib, "bcrypt.lib")
# endif
# ifndef BCRYPT_USE_SYSTEM_PREFERRED_RNG
# define BCRYPT_USE_SYSTEM_PREFERRED_RNG 0x00000002
# endif
# ifndef STATUS_SUCCESS
# define STATUS_SUCCESS ((NTSTATUS)0x00000000L)
# endif
#elif defined(USE_WIN32_CRYPTO)
# include <wincrypt.h>
# ifdef _MSC_VER
# pragma comment(lib, "advapi32.lib")
# endif
#endif
CURLcode Curl_win32_random(unsigned char *entropy, size_t length)
{
memset(entropy, 0, length);
#if defined(HAVE_WIN_BCRYPTGENRANDOM)
if(BCryptGenRandom(NULL, entropy, (ULONG)length,
BCRYPT_USE_SYSTEM_PREFERRED_RNG) != STATUS_SUCCESS)
return CURLE_FAILED_INIT;
return CURLE_OK;
#elif defined(USE_WIN32_CRYPTO)
{
HCRYPTPROV hCryptProv = 0;
if(!CryptAcquireContext(&hCryptProv, NULL, NULL, PROV_RSA_FULL,
CRYPT_VERIFYCONTEXT | CRYPT_SILENT))
return CURLE_FAILED_INIT;
if(!CryptGenRandom(hCryptProv, (DWORD)length, entropy)) {
CryptReleaseContext(hCryptProv, 0UL);
return CURLE_FAILED_INIT;
}
CryptReleaseContext(hCryptProv, 0UL);
}
return CURLE_OK;
#else
return CURLE_NOT_BUILT_IN;
#endif
}
#endif
2017-07-20 19:35:53 +02:00
static CURLcode randit(struct Curl_easy *data, unsigned int *rnd)
{
CURLcode result = CURLE_OK;
static unsigned int randseed;
static bool seeded = FALSE;
#ifdef CURLDEBUG
char *force_entropy = getenv("CURL_ENTROPY");
if(force_entropy) {
if(!seeded) {
unsigned int seed = 0;
size_t elen = strlen(force_entropy);
size_t clen = sizeof(seed);
size_t min = elen < clen ? elen : clen;
memcpy((char *)&seed, force_entropy, min);
randseed = ntohl(seed);
seeded = TRUE;
}
else
randseed++;
*rnd = randseed;
return CURLE_OK;
}
#endif
/* data may be NULL! */
result = Curl_ssl_random(data, (unsigned char *)rnd, sizeof(*rnd));
if(result != CURLE_NOT_BUILT_IN)
/* only if there is no random function in the TLS backend do the non crypto
version, otherwise return result */
return result;
/* ---- non-cryptographic version following ---- */
2024-04-14 22:45:38 +02:00
#ifdef _WIN32
2022-11-16 20:14:03 +01:00
if(!seeded) {
result = Curl_win32_random((unsigned char *)rnd, sizeof(*rnd));
if(result != CURLE_NOT_BUILT_IN)
return result;
}
#endif
2024-04-14 22:45:38 +02:00
#if defined(HAVE_ARC4RANDOM) && !defined(USE_OPENSSL)
if(!seeded) {
*rnd = (unsigned int)arc4random();
return CURLE_OK;
}
2023-07-02 19:51:09 +02:00
#endif
2024-04-14 22:45:38 +02:00
#if defined(RANDOM_FILE) && !defined(_WIN32)
2017-07-20 19:35:53 +02:00
if(!seeded) {
/* if there's a random file to read a seed from, use it */
int fd = open(RANDOM_FILE, O_RDONLY);
if(fd > -1) {
/* read random data into the randseed variable */
ssize_t nread = read(fd, &randseed, sizeof(randseed));
if(nread == sizeof(randseed))
seeded = TRUE;
close(fd);
}
}
#endif
if(!seeded) {
2018-04-23 21:13:27 +02:00
struct curltime now = Curl_now();
2022-08-04 22:12:04 +02:00
infof(data, "WARNING: using weak random seed");
2017-07-20 19:35:53 +02:00
randseed += (unsigned int)now.tv_usec + (unsigned int)now.tv_sec;
randseed = randseed * 1103515245 + 12345;
randseed = randseed * 1103515245 + 12345;
randseed = randseed * 1103515245 + 12345;
seeded = TRUE;
}
2024-04-14 22:45:38 +02:00
{
unsigned int r;
/* Return an unsigned 32-bit pseudo-random number. */
r = randseed = randseed * 1103515245 + 12345;
*rnd = (r << 16) | ((r >> 16) & 0xFFFF);
}
2017-07-20 19:35:53 +02:00
return CURLE_OK;
}
/*
2023-07-02 19:51:09 +02:00
* Curl_rand() stores 'num' number of random unsigned characters in the buffer
* 'rnd' points to.
2017-07-20 19:35:53 +02:00
*
* If libcurl is built without TLS support or with a TLS backend that lacks a
2023-12-07 09:12:54 +01:00
* proper random API (rustls or mbedTLS), this function will use "weak"
2022-11-16 20:14:03 +01:00
* random.
2017-07-20 19:35:53 +02:00
*
* When built *with* TLS support and a backend that offers strong random, it
* will return error if it cannot provide strong random values.
*
* NOTE: 'data' may be passed in as NULL when coming from external API without
* easy handle!
*
*/
CURLcode Curl_rand(struct Curl_easy *data, unsigned char *rnd, size_t num)
{
CURLcode result = CURLE_BAD_FUNCTION_ARGUMENT;
2024-04-14 22:45:38 +02:00
DEBUGASSERT(num);
2017-07-20 19:35:53 +02:00
while(num) {
unsigned int r;
size_t left = num < sizeof(unsigned int) ? num : sizeof(unsigned int);
result = randit(data, &r);
if(result)
return result;
while(left) {
*rnd++ = (unsigned char)(r & 0xFF);
r >>= 8;
--num;
--left;
}
}
return result;
}
/*
* Curl_rand_hex() fills the 'rnd' buffer with a given 'num' size with random
2022-11-16 20:14:03 +01:00
* hexadecimal digits PLUS a null-terminating byte. It must be an odd number
2017-07-20 19:35:53 +02:00
* size.
*/
CURLcode Curl_rand_hex(struct Curl_easy *data, unsigned char *rnd,
size_t num)
{
CURLcode result = CURLE_BAD_FUNCTION_ARGUMENT;
unsigned char buffer[128];
DEBUGASSERT(num > 1);
2018-04-23 21:13:27 +02:00
#ifdef __clang_analyzer__
2018-10-28 12:09:07 +01:00
/* This silences a scan-build warning about accessing this buffer with
2018-04-23 21:13:27 +02:00
uninitialized memory. */
memset(buffer, 0, sizeof(buffer));
#endif
2024-04-14 22:45:38 +02:00
if((num/2 >= sizeof(buffer)) || !(num&1)) {
2017-07-20 19:35:53 +02:00
/* make sure it fits in the local buffer and that it is an odd number! */
2024-04-14 22:45:38 +02:00
DEBUGF(infof(data, "invalid buffer size with Curl_rand_hex"));
2017-07-20 19:35:53 +02:00
return CURLE_BAD_FUNCTION_ARGUMENT;
2024-04-14 22:45:38 +02:00
}
2017-07-20 19:35:53 +02:00
2022-11-16 20:14:03 +01:00
num--; /* save one for null-termination */
2017-07-20 19:35:53 +02:00
result = Curl_rand(data, buffer, num/2);
if(result)
return result;
2023-12-07 09:12:54 +01:00
Curl_hexencode(buffer, num/2, rnd, num + 1);
return result;
}
/*
* Curl_rand_alnum() fills the 'rnd' buffer with a given 'num' size with random
* alphanumerical chars PLUS a null-terminating byte.
*/
static const char alnum[] =
"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789";
CURLcode Curl_rand_alnum(struct Curl_easy *data, unsigned char *rnd,
size_t num)
{
CURLcode result = CURLE_OK;
const int alnumspace = sizeof(alnum) - 1;
unsigned int r;
DEBUGASSERT(num > 1);
num--; /* save one for null-termination */
2017-07-20 19:35:53 +02:00
while(num) {
2023-12-07 09:12:54 +01:00
do {
result = randit(data, &r);
if(result)
return result;
} while(r >= (UINT_MAX - UINT_MAX % alnumspace));
*rnd++ = alnum[r % alnumspace];
num--;
2017-07-20 19:35:53 +02:00
}
*rnd = 0;
return result;
}