summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ChangeLog5
-rw-r--r--configure.ac6
-rw-r--r--openbsd-compat/bsd-arc4random.c65
-rw-r--r--openbsd-compat/openbsd-compat.h10
4 files changed, 82 insertions, 4 deletions
diff --git a/ChangeLog b/ChangeLog
index f466f481e..66145e52a 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -11,6 +11,9 @@
11 - djm@cvs.openbsd.org 2008/04/05 02:46:02 11 - djm@cvs.openbsd.org 2008/04/05 02:46:02
12 [sshd_config.5] 12 [sshd_config.5]
13 HostbasedAuthentication is supported under Match too 13 HostbasedAuthentication is supported under Match too
14 - (djm) [openbsd-compat/bsd-arc4random.c openbsd-compat/openbsd-compat.c]
15 [configure.ac] Implement arc4random_buf(), import implementation of
16 arc4random_uniform() from OpenBSD
14 17
1520080403 1820080403
16 - (djm) [openbsd-compat/bsd-poll.c] Include stdlib.h to avoid compile- 19 - (djm) [openbsd-compat/bsd-poll.c] Include stdlib.h to avoid compile-
@@ -3871,4 +3874,4 @@
3871 OpenServer 6 and add osr5bigcrypt support so when someone migrates 3874 OpenServer 6 and add osr5bigcrypt support so when someone migrates
3872 passwords between UnixWare and OpenServer they will still work. OK dtucker@ 3875 passwords between UnixWare and OpenServer they will still work. OK dtucker@
3873 3876
3874$Id: ChangeLog,v 1.4908 2008/05/19 04:29:08 djm Exp $ 3877$Id: ChangeLog,v 1.4909 2008/05/19 04:47:37 djm Exp $
diff --git a/configure.ac b/configure.ac
index 7b92bad1d..e6e916e82 100644
--- a/configure.ac
+++ b/configure.ac
@@ -1,4 +1,4 @@
1# $Id: configure.ac,v 1.397 2008/03/27 01:33:07 djm Exp $ 1# $Id: configure.ac,v 1.398 2008/05/19 04:47:37 djm Exp $
2# 2#
3# Copyright (c) 1999-2004 Damien Miller 3# Copyright (c) 1999-2004 Damien Miller
4# 4#
@@ -15,7 +15,7 @@
15# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 15# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16 16
17AC_INIT(OpenSSH, Portable, openssh-unix-dev@mindrot.org) 17AC_INIT(OpenSSH, Portable, openssh-unix-dev@mindrot.org)
18AC_REVISION($Revision: 1.397 $) 18AC_REVISION($Revision: 1.398 $)
19AC_CONFIG_SRCDIR([ssh.c]) 19AC_CONFIG_SRCDIR([ssh.c])
20 20
21AC_CONFIG_HEADER(config.h) 21AC_CONFIG_HEADER(config.h)
@@ -1288,6 +1288,8 @@ AC_ARG_WITH(audit,
1288dnl Checks for library functions. Please keep in alphabetical order 1288dnl Checks for library functions. Please keep in alphabetical order
1289AC_CHECK_FUNCS( \ 1289AC_CHECK_FUNCS( \
1290 arc4random \ 1290 arc4random \
1291 arc4random_buf \
1292 arc4random_uniform \
1291 asprintf \ 1293 asprintf \
1292 b64_ntop \ 1294 b64_ntop \
1293 __b64_ntop \ 1295 __b64_ntop \
diff --git a/openbsd-compat/bsd-arc4random.c b/openbsd-compat/bsd-arc4random.c
index d45fb182a..8bf31e5d3 100644
--- a/openbsd-compat/bsd-arc4random.c
+++ b/openbsd-compat/bsd-arc4random.c
@@ -82,3 +82,68 @@ arc4random_stir(void)
82 rc4_ready = REKEY_BYTES; 82 rc4_ready = REKEY_BYTES;
83} 83}
84#endif /* !HAVE_ARC4RANDOM */ 84#endif /* !HAVE_ARC4RANDOM */
85
86#ifndef ARC4RANDOM_BUF
87void
88arc4random_buf(void *_buf, size_t n)
89{
90 size_t i;
91 u_int32_t r;
92 char *buf = (char *)_buf;
93
94 for (i = 0; i < n; i++) {
95 if (i % 4 == 0)
96 r = arc4random();
97 buf[i] = r & 0xff;
98 r >>= 8;
99 }
100 i = r = 0;
101}
102#endif /* !HAVE_ARC4RANDOM_BUF */
103
104#ifndef ARC4RANDOM_UNIFORM
105/*
106 * Calculate a uniformly distributed random number less than upper_bound
107 * avoiding "modulo bias".
108 *
109 * Uniformity is achieved by generating new random numbers until the one
110 * returned is outside the range [0, 2**32 % upper_bound). This
111 * guarantees the selected random number will be inside
112 * [2**32 % upper_bound, 2**32) which maps back to [0, upper_bound)
113 * after reduction modulo upper_bound.
114 */
115u_int32_t
116arc4random_uniform(u_int32_t upper_bound)
117{
118 u_int32_t r, min;
119
120 if (upper_bound < 2)
121 return 0;
122
123#if (ULONG_MAX > 0xffffffffUL)
124 min = 0x100000000UL % upper_bound;
125#else
126 /* Calculate (2**32 % upper_bound) avoiding 64-bit math */
127 if (upper_bound > 0x80000000)
128 min = 1 + ~upper_bound; /* 2**32 - upper_bound */
129 else {
130 /* (2**32 - (x * 2)) % x == 2**32 % x when x <= 2**31 */
131 min = ((0xffffffff - (upper_bound << 2)) + 1) % upper_bound;
132 }
133#endif
134
135 /*
136 * This could theoretically loop forever but each retry has
137 * p > 0.5 (worst case, usually far better) of selecting a
138 * number inside the range we need, so it should rarely need
139 * to re-roll.
140 */
141 for (;;) {
142 r = arc4random();
143 if (r >= min)
144 break;
145 }
146
147 return r % upper_bound;
148}
149#endif /* !HAVE_ARC4RANDOM_UNIFORM */
diff --git a/openbsd-compat/openbsd-compat.h b/openbsd-compat/openbsd-compat.h
index 6406af19d..eb48b362b 100644
--- a/openbsd-compat/openbsd-compat.h
+++ b/openbsd-compat/openbsd-compat.h
@@ -1,4 +1,4 @@
1/* $Id: openbsd-compat.h,v 1.43 2007/06/25 12:15:13 dtucker Exp $ */ 1/* $Id: openbsd-compat.h,v 1.44 2008/05/19 04:47:37 djm Exp $ */
2 2
3/* 3/*
4 * Copyright (c) 1999-2003 Damien Miller. All rights reserved. 4 * Copyright (c) 1999-2003 Damien Miller. All rights reserved.
@@ -151,6 +151,14 @@ unsigned int arc4random(void);
151void arc4random_stir(void); 151void arc4random_stir(void);
152#endif /* !HAVE_ARC4RANDOM */ 152#endif /* !HAVE_ARC4RANDOM */
153 153
154#ifndef HAVE_ARC4RANDOM_BUF
155void arc4random_buf(void *, size_t);
156#endif
157
158#ifndef HAVE_ARC4RANDOM_UNIFORM
159u_int32_t arc4random_uniform(u_int32_t);
160#endif
161
154#ifndef HAVE_ASPRINTF 162#ifndef HAVE_ASPRINTF
155int asprintf(char **, const char *, ...); 163int asprintf(char **, const char *, ...);
156#endif 164#endif