bionic/libc/netbsd/resolv/res_random.c

276 lines
7.3 KiB
C
Raw Normal View History

/* $OpenBSD: res_random.c,v 1.17 2008/04/13 00:28:35 djm Exp $ */
/*
* Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de>
* Copyright 2008 Damien Miller <djm@openbsd.org>
* Copyright 2008 Android Open Source Project (thread-safety)
* All rights reserved.
*
* Theo de Raadt <deraadt@openbsd.org> came up with the idea of using
* such a mathematical system to generate more random (yet non-repeating)
* ids to solve the resolver/named problem. But Niels designed the
* actual system based on the constraints.
*
* Later modified by Damien Miller to wrap the LCG output in a 15-bit
* permutation generator based on a Luby-Rackoff block cipher. This
* ensures the output is non-repeating and preserves the MSB twiddle
* trick, but makes it more resistant to LCG prediction.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
/*
* seed = random 15bit
* n = prime, g0 = generator to n,
* j = random so that gcd(j,n-1) == 1
* g = g0^j mod n will be a generator again.
*
* X[0] = random seed.
* X[n] = a*X[n-1]+b mod m is a Linear Congruential Generator
* with a = 7^(even random) mod m,
* b = random with gcd(b,m) == 1
* m = 31104 and a maximal period of m-1.
*
* The transaction id is determined by:
* id[n] = seed xor (g^X[n] mod n)
*
* Effectivly the id is restricted to the lower 15 bits, thus
* yielding two different cycles by toggling the msb on and off.
* This avoids reuse issues caused by reseeding.
*
* The output of this generator is then randomly permuted though a
* custom 15 bit Luby-Rackoff block cipher.
*/
#include <sys/types.h>
#include <netinet/in.h>
#include <sys/time.h>
#include "resolv_private.h"
#include <unistd.h>
#include <stdlib.h>
#include <string.h>
/* BIONIC-BEGIN */
static pthread_mutex_t _res_random_lock = PTHREAD_MUTEX_INITIALIZER;
#define _RES_RANDOM_LOCK() pthread_mutex_lock(&_res_random_lock)
#define _RES_RANDOM_UNLOCK() pthread_mutex_unlock(&_res_random_lock)
/* BIONIC-END */
#define RU_OUT 180 /* Time after wich will be reseeded */
#define RU_MAX 30000 /* Uniq cycle, avoid blackjack prediction */
#define RU_GEN 2 /* Starting generator */
#define RU_N 32749 /* RU_N-1 = 2*2*3*2729 */
#define RU_AGEN 7 /* determine ru_a as RU_AGEN^(2*rand) */
#define RU_M 31104 /* RU_M = 2^7*3^5 - don't change */
#define RU_ROUNDS 11 /* Number of rounds for permute (odd) */
struct prf_ctx {
/* PRF lookup table for odd rounds (7 bits input to 8 bits output) */
u_char prf7[(RU_ROUNDS / 2) * (1 << 7)];
/* PRF lookup table for even rounds (8 bits input to 7 bits output) */
u_char prf8[((RU_ROUNDS + 1) / 2) * (1 << 8)];
};
#define PFAC_N 3
const static u_int16_t pfacts[PFAC_N] = {
2,
3,
2729
};
static u_int16_t ru_x;
static u_int16_t ru_seed, ru_seed2;
static u_int16_t ru_a, ru_b;
static u_int16_t ru_g;
static u_int16_t ru_counter = 0;
static u_int16_t ru_msb = 0;
static struct prf_ctx *ru_prf = NULL;
static long ru_reseed;
static u_int16_t pmod(u_int16_t, u_int16_t, u_int16_t);
static void res_initid(void);
/*
* Do a fast modular exponation, returned value will be in the range
* of 0 - (mod-1)
*/
static u_int16_t
pmod(u_int16_t gen, u_int16_t exp, u_int16_t mod)
{
u_int16_t s, t, u;
s = 1;
t = gen;
u = exp;
while (u) {
if (u & 1)
s = (s * t) % mod;
u >>= 1;
t = (t * t) % mod;
}
return (s);
}
/*
* 15-bit permutation based on Luby-Rackoff block cipher
*/
u_int
permute15(u_int in)
{
int i;
u_int left, right, tmp;
if (ru_prf == NULL)
return in;
left = (in >> 8) & 0x7f;
right = in & 0xff;
/*
* Each round swaps the width of left and right. Even rounds have
* a 7-bit left, odd rounds have an 8-bit left. Since this uses an
* odd number of rounds, left is always 8 bits wide at the end.
*/
for (i = 0; i < RU_ROUNDS; i++) {
if ((i & 1) == 0)
tmp = ru_prf->prf8[(i << (8 - 1)) | right] & 0x7f;
else
tmp = ru_prf->prf7[((i - 1) << (7 - 1)) | right];
tmp ^= left;
left = right;
right = tmp;
}
return (right << 8) | left;
}
/*
* Initializes the seed and chooses a suitable generator. Also toggles
* the msb flag. The msb flag is used to generate two distinct
* cycles of random numbers and thus avoiding reuse of ids.
*
* This function is called from res_randomid() when needed, an
* application does not have to worry about it.
*/
static void
res_initid(void)
{
u_int16_t j, i;
u_int32_t tmp;
int noprime = 1;
struct timeval tv;
ru_x = arc4random_uniform(RU_M);
/* 15 bits of random seed */
tmp = arc4random();
ru_seed = (tmp >> 16) & 0x7FFF;
ru_seed2 = tmp & 0x7FFF;
/* Determine the LCG we use */
tmp = arc4random();
ru_b = (tmp & 0xfffe) | 1;
ru_a = pmod(RU_AGEN, (tmp >> 16) & 0xfffe, RU_M);
while (ru_b % 3 == 0)
ru_b += 2;
j = arc4random_uniform(RU_N);
/*
* Do a fast gcd(j,RU_N-1), so we can find a j with
* gcd(j, RU_N-1) == 1, giving a new generator for
* RU_GEN^j mod RU_N
*/
while (noprime) {
for (i = 0; i < PFAC_N; i++)
if (j % pfacts[i] == 0)
break;
if (i >= PFAC_N)
noprime = 0;
else
j = (j + 1) % RU_N;
}
ru_g = pmod(RU_GEN, j, RU_N);
ru_counter = 0;
/* Initialise PRF for Luby-Rackoff permutation */
if (ru_prf == NULL)
ru_prf = malloc(sizeof(*ru_prf));
if (ru_prf != NULL)
arc4random_buf(ru_prf, sizeof(*ru_prf));
gettimeofday(&tv, NULL);
ru_reseed = tv.tv_sec + RU_OUT;
ru_msb = ru_msb == 0x8000 ? 0 : 0x8000;
}
u_int
res_randomid(void)
{
struct timeval tv;
u_int result;
_RES_RANDOM_LOCK()
gettimeofday(&tv, NULL);
if (ru_counter >= RU_MAX || tv.tv_sec > ru_reseed)
res_initid();
/* Linear Congruential Generator */
ru_x = (ru_a * ru_x + ru_b) % RU_M;
ru_counter++;
result = permute15(ru_seed ^ pmod(ru_g, ru_seed2 + ru_x, RU_N)) | ru_msb;
_RES_RANDOM_UNLOCK()
return result;
}
#if 0
int
main(int argc, char **argv)
{
int i, n;
u_int16_t wert;
res_initid();
printf("Generator: %u\n", ru_g);
printf("Seed: %u\n", ru_seed);
printf("Reseed at %ld\n", ru_reseed);
printf("Ru_X: %u\n", ru_x);
printf("Ru_A: %u\n", ru_a);
printf("Ru_B: %u\n", ru_b);
n = argc > 1 ? atoi(argv[1]) : 60001;
for (i=0;i<n;i++) {
wert = res_randomid();
printf("%u\n", wert);
}
return 0;
}
#endif