123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196 |
- /*
- * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
- * Copyright (c) 2020, Peter Elliott <pelliott@serenityos.org>
- *
- * SPDX-License-Identifier: BSD-2-Clause
- */
- #pragma once
- #include <AK/Assertions.h>
- #include <AK/ByteBuffer.h>
- #include <AK/Types.h>
- #include <Kernel/Locking/Lockable.h>
- #include <Kernel/Locking/Mutex.h>
- #include <Kernel/StdLib.h>
- #include <LibCrypto/Cipher/AES.h>
- #include <LibCrypto/Cipher/Cipher.h>
- #include <LibCrypto/Hash/SHA2.h>
- namespace Kernel {
- template<typename CipherT, typename HashT, int KeySize>
- class FortunaPRNG {
- public:
- constexpr static size_t pool_count = 32;
- constexpr static size_t reseed_threshold = 16;
- using CipherType = CipherT;
- using BlockType = typename CipherT::BlockType;
- using HashType = HashT;
- using DigestType = typename HashT::DigestType;
- FortunaPRNG()
- : m_counter(ByteBuffer::create_zeroed(BlockType::block_size()))
- {
- }
- bool get_random_bytes(Bytes buffer)
- {
- SpinlockLocker lock(m_lock);
- if (!is_ready())
- return false;
- if (m_p0_len >= reseed_threshold) {
- this->reseed();
- }
- VERIFY(is_seeded());
- // FIXME: More than 2^20 bytes cannot be generated without refreshing the key.
- VERIFY(buffer.size() < (1 << 20));
- typename CipherType::CTRMode cipher(m_key, KeySize, Crypto::Cipher::Intent::Encryption);
- auto counter_span = m_counter.bytes();
- cipher.key_stream(buffer, counter_span, &counter_span);
- // Extract a new key from the prng stream.
- Bytes key_span = m_key.bytes();
- cipher.key_stream(key_span, counter_span, &counter_span);
- return true;
- }
- template<typename T>
- void add_random_event(const T& event_data, size_t pool)
- {
- pool %= pool_count;
- if (pool == 0) {
- m_p0_len++;
- }
- m_pools[pool].update(reinterpret_cast<const u8*>(&event_data), sizeof(T));
- }
- [[nodiscard]] bool is_seeded() const
- {
- return m_reseed_number > 0;
- }
- [[nodiscard]] bool is_ready() const
- {
- VERIFY(m_lock.is_locked());
- return is_seeded() || m_p0_len >= reseed_threshold;
- }
- Spinlock<u8>& get_lock() { return m_lock; }
- private:
- void reseed()
- {
- HashType new_key;
- new_key.update(m_key);
- for (size_t i = 0; i < pool_count; ++i) {
- if (m_reseed_number % (1u << i) == 0) {
- DigestType digest = m_pools[i].digest();
- new_key.update(digest.immutable_data(), digest.data_length());
- }
- }
- DigestType digest = new_key.digest();
- m_key = ByteBuffer::copy(digest.immutable_data(),
- digest.data_length());
- m_reseed_number++;
- m_p0_len = 0;
- }
- ByteBuffer m_counter;
- size_t m_reseed_number { 0 };
- size_t m_p0_len { 0 };
- ByteBuffer m_key;
- HashType m_pools[pool_count];
- Spinlock<u8> m_lock;
- };
- class KernelRng : public Lockable<FortunaPRNG<Crypto::Cipher::AESCipher, Crypto::Hash::SHA256, 256>> {
- AK_MAKE_ETERNAL;
- public:
- KernelRng();
- static KernelRng& the();
- void wait_for_entropy();
- void wake_if_ready();
- Spinlock<u8>& get_lock() { return resource().get_lock(); }
- private:
- WaitQueue m_seed_queue;
- };
- class EntropySource {
- template<typename T>
- struct Event {
- u64 timestamp;
- size_t source;
- T event_data;
- };
- public:
- enum class Static : size_t {
- Interrupts,
- MaxHardcodedSourceIndex,
- };
- EntropySource()
- : m_source(next_source++)
- {
- }
- EntropySource(Static hardcoded_source)
- : m_source(static_cast<size_t>(hardcoded_source))
- {
- }
- template<typename T>
- void add_random_event(const T& event_data)
- {
- auto& kernel_rng = KernelRng::the();
- SpinlockLocker lock(kernel_rng.get_lock());
- // We don't lock this because on the off chance a pool is corrupted, entropy isn't lost.
- Event<T> event = { read_tsc(), m_source, event_data };
- kernel_rng.resource().add_random_event(event, m_pool);
- m_pool++;
- kernel_rng.wake_if_ready();
- }
- private:
- static size_t next_source;
- size_t m_pool { 0 };
- size_t m_source;
- };
- // NOTE: These API's are primarily about expressing intent/needs in the calling code.
- // The only difference is that get_fast_random is guaranteed not to block.
- void get_fast_random_bytes(Bytes);
- bool get_good_random_bytes(Bytes bytes, bool allow_wait = true, bool fallback_to_fast = true);
- template<typename T>
- inline T get_fast_random()
- {
- T value;
- Bytes bytes { reinterpret_cast<u8*>(&value), sizeof(T) };
- get_fast_random_bytes(bytes);
- return value;
- }
- template<typename T>
- inline T get_good_random()
- {
- T value;
- Bytes bytes { reinterpret_cast<u8*>(&value), sizeof(T) };
- get_good_random_bytes(bytes);
- return value;
- }
- }
|