* devices.in (dev_storage): Map /dev/random and /dev/urandom to
\Device\Null. * devices.cc: Regenerate. * fhandler.h (fhandler_dev_random::open): Drop declaration. (fhandler_dev_random::close): Ditto. (fhandler_dev_random::crypt_gen_random): Convert to static method. * fhandler_random.cc (fhandler_dev_random::open): Remove so that default fhandler_base::open is used to open \Device\Null. (fhandler_dev_random::close): Ditto. * fhandler_socket.cc (entropy_source): Delete. (fhandler_socket::af_local_set_secret): Remove entropy_source code and call fhandler_dev_random::crypt_gen_random directly instead.
This commit is contained in:
parent
8ef76ab6f9
commit
494c626414
|
@ -1,3 +1,18 @@
|
||||||
|
2013-10-25 Corinna Vinschen <corinna@vinschen.de>
|
||||||
|
|
||||||
|
* devices.in (dev_storage): Map /dev/random and /dev/urandom to
|
||||||
|
\Device\Null.
|
||||||
|
* devices.cc: Regenerate.
|
||||||
|
* fhandler.h (fhandler_dev_random::open): Drop declaration.
|
||||||
|
(fhandler_dev_random::close): Ditto.
|
||||||
|
(fhandler_dev_random::crypt_gen_random): Convert to static method.
|
||||||
|
* fhandler_random.cc (fhandler_dev_random::open): Remove so that default
|
||||||
|
fhandler_base::open is used to open \Device\Null.
|
||||||
|
(fhandler_dev_random::close): Ditto.
|
||||||
|
* fhandler_socket.cc (entropy_source): Delete.
|
||||||
|
(fhandler_socket::af_local_set_secret): Remove entropy_source code and
|
||||||
|
call fhandler_dev_random::crypt_gen_random directly instead.
|
||||||
|
|
||||||
2013-10-24 Corinna Vinschen <corinna@vinschen.de>
|
2013-10-24 Corinna Vinschen <corinna@vinschen.de>
|
||||||
|
|
||||||
* fhandler.h (fhandler_dev_zero::lseek): Convert to inline method.
|
* fhandler.h (fhandler_dev_zero::lseek): Convert to inline method.
|
||||||
|
|
|
@ -439,7 +439,7 @@ const _RDATA device dev_storage[] =
|
||||||
{"/dev/pty61", BRACK(FHDEV(DEV_PTYS_MAJOR, 61)), "/dev/pty61", exists_pty, S_IFCHR, true},
|
{"/dev/pty61", BRACK(FHDEV(DEV_PTYS_MAJOR, 61)), "/dev/pty61", exists_pty, S_IFCHR, true},
|
||||||
{"/dev/pty62", BRACK(FHDEV(DEV_PTYS_MAJOR, 62)), "/dev/pty62", exists_pty, S_IFCHR, true},
|
{"/dev/pty62", BRACK(FHDEV(DEV_PTYS_MAJOR, 62)), "/dev/pty62", exists_pty, S_IFCHR, true},
|
||||||
{"/dev/pty63", BRACK(FHDEV(DEV_PTYS_MAJOR, 63)), "/dev/pty63", exists_pty, S_IFCHR, true},
|
{"/dev/pty63", BRACK(FHDEV(DEV_PTYS_MAJOR, 63)), "/dev/pty63", exists_pty, S_IFCHR, true},
|
||||||
{"/dev/random", BRACK(FH_RANDOM), "/dev/random", exists, S_IFCHR, true},
|
{"/dev/random", BRACK(FH_RANDOM), "\\Device\\Null", exists_ntdev, S_IFCHR, true},
|
||||||
{"/dev/scd0", BRACK(FHDEV(DEV_CDROM_MAJOR, 0)), "\\Device\\CdRom0", exists_ntdev, S_IFBLK, true},
|
{"/dev/scd0", BRACK(FHDEV(DEV_CDROM_MAJOR, 0)), "\\Device\\CdRom0", exists_ntdev, S_IFBLK, true},
|
||||||
{"/dev/scd1", BRACK(FHDEV(DEV_CDROM_MAJOR, 1)), "\\Device\\CdRom1", exists_ntdev, S_IFBLK, true},
|
{"/dev/scd1", BRACK(FHDEV(DEV_CDROM_MAJOR, 1)), "\\Device\\CdRom1", exists_ntdev, S_IFBLK, true},
|
||||||
{"/dev/scd2", BRACK(FHDEV(DEV_CDROM_MAJOR, 2)), "\\Device\\CdRom2", exists_ntdev, S_IFBLK, true},
|
{"/dev/scd2", BRACK(FHDEV(DEV_CDROM_MAJOR, 2)), "\\Device\\CdRom2", exists_ntdev, S_IFBLK, true},
|
||||||
|
@ -2713,7 +2713,7 @@ const _RDATA device dev_storage[] =
|
||||||
{"/dev/ttyS61", BRACK(FHDEV(DEV_SERIAL_MAJOR, 61)), "\\??\\COM62", exists_ntdev, S_IFCHR, true},
|
{"/dev/ttyS61", BRACK(FHDEV(DEV_SERIAL_MAJOR, 61)), "\\??\\COM62", exists_ntdev, S_IFCHR, true},
|
||||||
{"/dev/ttyS62", BRACK(FHDEV(DEV_SERIAL_MAJOR, 62)), "\\??\\COM63", exists_ntdev, S_IFCHR, true},
|
{"/dev/ttyS62", BRACK(FHDEV(DEV_SERIAL_MAJOR, 62)), "\\??\\COM63", exists_ntdev, S_IFCHR, true},
|
||||||
{"/dev/ttyS63", BRACK(FHDEV(DEV_SERIAL_MAJOR, 63)), "\\??\\COM64", exists_ntdev, S_IFCHR, true},
|
{"/dev/ttyS63", BRACK(FHDEV(DEV_SERIAL_MAJOR, 63)), "\\??\\COM64", exists_ntdev, S_IFCHR, true},
|
||||||
{"/dev/urandom", BRACK(FH_URANDOM), "/dev/urandom", exists, S_IFCHR, true},
|
{"/dev/urandom", BRACK(FH_URANDOM), "\\Device\\Null", exists_ntdev, S_IFCHR, true},
|
||||||
{"/dev/windows", BRACK(FH_WINDOWS), "/dev/windows", exists, S_IFCHR, true},
|
{"/dev/windows", BRACK(FH_WINDOWS), "/dev/windows", exists, S_IFCHR, true},
|
||||||
{"/dev/zero", BRACK(FH_ZERO), "\\Device\\Null", exists_ntdev, S_IFCHR, true},
|
{"/dev/zero", BRACK(FH_ZERO), "\\Device\\Null", exists_ntdev, S_IFCHR, true},
|
||||||
{":fifo", BRACK(FH_FIFO), "/dev/fifo", exists_internal, S_IFCHR, false},
|
{":fifo", BRACK(FH_FIFO), "/dev/fifo", exists_internal, S_IFCHR, false},
|
||||||
|
|
|
@ -154,8 +154,8 @@ const device dev_error_storage =
|
||||||
"/dev/null", BRACK(FH_NULL), "\\Device\\Null", exists_ntdev, S_IFCHR
|
"/dev/null", BRACK(FH_NULL), "\\Device\\Null", exists_ntdev, S_IFCHR
|
||||||
"/dev/zero", BRACK(FH_ZERO), "\\Device\\Null", exists_ntdev, S_IFCHR
|
"/dev/zero", BRACK(FH_ZERO), "\\Device\\Null", exists_ntdev, S_IFCHR
|
||||||
"/dev/full", BRACK(FH_FULL), "\\Device\\Null", exists_ntdev, S_IFCHR
|
"/dev/full", BRACK(FH_FULL), "\\Device\\Null", exists_ntdev, S_IFCHR
|
||||||
"/dev/random", BRACK(FH_RANDOM), "/dev/random", exists, S_IFCHR
|
"/dev/random", BRACK(FH_RANDOM), "\\Device\\Null", exists_ntdev, S_IFCHR
|
||||||
"/dev/urandom", BRACK(FH_URANDOM), "/dev/urandom", exists, S_IFCHR, =urandom_dev
|
"/dev/urandom", BRACK(FH_URANDOM), "\\Device\\Null", exists_ntdev, S_IFCHR, =urandom_dev
|
||||||
"/dev/clipboard", BRACK(FH_CLIPBOARD), "/dev/clipboard", exists, S_IFCHR
|
"/dev/clipboard", BRACK(FH_CLIPBOARD), "/dev/clipboard", exists, S_IFCHR
|
||||||
"/dev/com%(1-16)d", BRACK(FHDEV(DEV_SERIAL_MAJOR, {$1 - 1})), "\\??\\COM{$1}", exists_ntdev_silent, S_IFCHR
|
"/dev/com%(1-16)d", BRACK(FHDEV(DEV_SERIAL_MAJOR, {$1 - 1})), "\\??\\COM{$1}", exists_ntdev_silent, S_IFCHR
|
||||||
"/dev/ttyS%(0-63)d", BRACK(FHDEV(DEV_SERIAL_MAJOR, {$1})), "\\??\\COM{$1 + 1}", exists_ntdev, S_IFCHR
|
"/dev/ttyS%(0-63)d", BRACK(FHDEV(DEV_SERIAL_MAJOR, {$1})), "\\??\\COM{$1 + 1}", exists_ntdev, S_IFCHR
|
||||||
|
|
|
@ -1654,16 +1654,15 @@ class fhandler_dev_random: public fhandler_base
|
||||||
protected:
|
protected:
|
||||||
uint32_t pseudo;
|
uint32_t pseudo;
|
||||||
|
|
||||||
bool crypt_gen_random (void *ptr, size_t len);
|
|
||||||
int pseudo_write (const void *ptr, size_t len);
|
int pseudo_write (const void *ptr, size_t len);
|
||||||
int pseudo_read (void *ptr, size_t len);
|
int pseudo_read (void *ptr, size_t len);
|
||||||
|
|
||||||
public:
|
public:
|
||||||
int open (int flags, mode_t mode = 0);
|
|
||||||
ssize_t __stdcall write (const void *ptr, size_t len);
|
ssize_t __stdcall write (const void *ptr, size_t len);
|
||||||
void __reg3 read (void *ptr, size_t& len);
|
void __reg3 read (void *ptr, size_t& len);
|
||||||
off_t lseek (off_t, int) { return 0; }
|
off_t lseek (off_t, int) { return 0; }
|
||||||
int close ();
|
|
||||||
|
static bool crypt_gen_random (void *ptr, size_t len);
|
||||||
|
|
||||||
fhandler_dev_random () : fhandler_base () {}
|
fhandler_dev_random () : fhandler_base () {}
|
||||||
fhandler_dev_random (void *) {}
|
fhandler_dev_random (void *) {}
|
||||||
|
|
|
@ -28,15 +28,6 @@ details. */
|
||||||
#define PSEUDO_MULTIPLIER (6364136223846793005LL)
|
#define PSEUDO_MULTIPLIER (6364136223846793005LL)
|
||||||
#define PSEUDO_SHIFTVAL (21)
|
#define PSEUDO_SHIFTVAL (21)
|
||||||
|
|
||||||
int
|
|
||||||
fhandler_dev_random::open (int flags, mode_t)
|
|
||||||
{
|
|
||||||
set_flags ((flags & ~O_TEXT) | O_BINARY);
|
|
||||||
nohandle (true);
|
|
||||||
set_open_status ();
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* There's a bug in ntsecapi.h (Mingw as well as MSFT). SystemFunction036
|
/* There's a bug in ntsecapi.h (Mingw as well as MSFT). SystemFunction036
|
||||||
is, in fact, a WINAPI function, but it's not defined as such. Therefore
|
is, in fact, a WINAPI function, but it's not defined as such. Therefore
|
||||||
we have to do it correctly here. */
|
we have to do it correctly here. */
|
||||||
|
@ -149,9 +140,3 @@ fhandler_dev_random::read (void *ptr, size_t& len)
|
||||||
else if (!crypt_gen_random (ptr, len))
|
else if (!crypt_gen_random (ptr, len))
|
||||||
len = pseudo_read (ptr, len);
|
len = pseudo_read (ptr, len);
|
||||||
}
|
}
|
||||||
|
|
||||||
int
|
|
||||||
fhandler_dev_random::close ()
|
|
||||||
{
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
|
@ -48,8 +48,6 @@ extern "C" {
|
||||||
int sscanf (const char *, const char *, ...);
|
int sscanf (const char *, const char *, ...);
|
||||||
} /* End of "C" section */
|
} /* End of "C" section */
|
||||||
|
|
||||||
fhandler_dev_random* entropy_source;
|
|
||||||
|
|
||||||
static inline mode_t
|
static inline mode_t
|
||||||
adjust_socket_file_mode (mode_t mode)
|
adjust_socket_file_mode (mode_t mode)
|
||||||
{
|
{
|
||||||
|
@ -445,25 +443,9 @@ fhandler_socket::af_local_copy (fhandler_socket *sock)
|
||||||
void
|
void
|
||||||
fhandler_socket::af_local_set_secret (char *buf)
|
fhandler_socket::af_local_set_secret (char *buf)
|
||||||
{
|
{
|
||||||
if (!entropy_source)
|
if (!fhandler_dev_random::crypt_gen_random (connect_secret,
|
||||||
{
|
sizeof (connect_secret)))
|
||||||
void *buf = malloc (sizeof (fhandler_dev_random));
|
bzero ((char*) connect_secret, sizeof (connect_secret));
|
||||||
entropy_source = new (buf) fhandler_dev_random ();
|
|
||||||
entropy_source->dev () = *urandom_dev;
|
|
||||||
}
|
|
||||||
if (entropy_source &&
|
|
||||||
!entropy_source->open (O_RDONLY))
|
|
||||||
{
|
|
||||||
delete entropy_source;
|
|
||||||
entropy_source = NULL;
|
|
||||||
}
|
|
||||||
if (entropy_source)
|
|
||||||
{
|
|
||||||
size_t len = sizeof (connect_secret);
|
|
||||||
entropy_source->read (connect_secret, len);
|
|
||||||
if (len != sizeof (connect_secret))
|
|
||||||
bzero ((char*) connect_secret, sizeof (connect_secret));
|
|
||||||
}
|
|
||||||
__small_sprintf (buf, "%08x-%08x-%08x-%08x",
|
__small_sprintf (buf, "%08x-%08x-%08x-%08x",
|
||||||
connect_secret [0], connect_secret [1],
|
connect_secret [0], connect_secret [1],
|
||||||
connect_secret [2], connect_secret [3]);
|
connect_secret [2], connect_secret [3]);
|
||||||
|
|
|
@ -7,9 +7,9 @@ What changed:
|
||||||
|
|
||||||
- Slightly improve randomness of /dev/random emulation.
|
- Slightly improve randomness of /dev/random emulation.
|
||||||
|
|
||||||
- Allow to use advisory locking on any device which is backed by an OS handle.
|
- Allow to use advisory locking on any device which is backed by an OS
|
||||||
Right now this excludes /dev/clipboard, /dev/dsp, /dev/random, /dev/urandom,
|
handle. Right now this excludes /dev/clipboard, /dev/dsp, as well as
|
||||||
as well as almost all virtual files under /proc.
|
almost all virtual files under /proc.
|
||||||
|
|
||||||
|
|
||||||
Bug fixes:
|
Bug fixes:
|
||||||
|
|
Loading…
Reference in New Issue