Showing
7 changed files
with
240 additions
and
107 deletions
... | ... | @@ -2,7 +2,9 @@ ACLOCAL_AMFLAGS = -I m4 |
2 | 2 | |
3 | 3 | lib_LTLIBRARIES = libmodentropy.la |
4 | 4 | |
5 | -libmodentropy_la_SOURCES = mod_entropy.c | |
5 | +libmodentropy_la_SOURCES = mod_entropy.c \ | |
6 | + mod_entropy_get_entropy_bits.c \ | |
7 | + mod_entropy_add_entropy.c | |
6 | 8 | libmodentropy_la_LDFLAGS = -lrt -lm |
7 | 9 | |
8 | 10 | install: libmodentropy.la | ... | ... |
gentoo/ChangeLog
0 → 100644
gentoo/metadata.xml
0 → 100644
gentoo/mod_entropy-9999.ebuild
0 → 100644
1 | +EAPI=4 | |
2 | + | |
3 | +inherit eutils git autotools apache-module | |
4 | + | |
5 | +DESCRIPTION="a module to greate random data from incoming requests." | |
6 | +SRC_URI="" | |
7 | +EGIT_REPO_URI="git://redminie.weird-web-workers.org/var/lib/git/mod_entropy" | |
8 | + | |
9 | +HOMEPAGE="http://redmine.weird-web-workers.org/mod_entropy/" | |
10 | + | |
11 | +LICENSE="GPL-3" | |
12 | +SLOT="0" | |
13 | +KEYWORDS="~amd64 ~x86" | |
14 | +IUSE="" | |
15 | + | |
16 | +need_apache2 | |
17 | + | |
18 | +DOCFILES="COPYING README NEWS ChangeLog" | |
19 | + | |
20 | +src_prepare() { | |
21 | + eautoreconf | |
22 | +} | ... | ... |
1 | 1 | /** |
2 | + * \file | |
3 | + * | |
2 | 4 | * this filter generates a sha1 from the current microtime and request |
3 | 5 | * useses this to fill the linux random source. |
4 | 6 | * |
... | ... | @@ -9,8 +11,22 @@ |
9 | 11 | * |
10 | 12 | * Most time was spend in figuring out how to write apache modules. |
11 | 13 | * |
12 | - * \author Georg Hopp <georg@steffers.org> | |
14 | + * \author Georg Hopp <georg@steffers.org | |
15 | + * | |
16 | + * \copyright | |
17 | + * Copyright © 2012 Georg Hopp | |
18 | + * This program is free software: you can redistribute it and/or modify | |
19 | + * it under the terms of the GNU General Public License as published by | |
20 | + * the Free Software Foundation, either version 3 of the License, or | |
21 | + * (at your option) any later version. | |
22 | + * This program is distributed in the hope that it will be useful, | |
23 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
24 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
25 | + * GNU General Public License for more details. | |
26 | + * You should have received a copy of the GNU General Public License | |
27 | + * along with this program. If not, see <http://www.gnu.org/licenses/>. | |
13 | 28 | */ |
29 | + | |
14 | 30 | #define _POSIX_C_SOURCE 199309L |
15 | 31 | |
16 | 32 | #include "httpd.h" |
... | ... | @@ -24,69 +40,18 @@ |
24 | 40 | #include "apr_sha1.h" |
25 | 41 | |
26 | 42 | #include <time.h> |
27 | -#include <math.h> | |
28 | -#include <fcntl.h> | |
29 | -#include <errno.h> | |
30 | -#include <linux/random.h> | |
31 | -#include <sys/ioctl.h> | |
32 | -#include <sys/types.h> | |
33 | -#include <sys/stat.h> | |
34 | 43 | |
35 | -#define min(x, y) ((x)<(y)?(x):(y)) | |
36 | 44 | |
45 | +int add_entropy(unsigned char *, size_t); | |
37 | 46 | |
38 | 47 | module AP_MODULE_DECLARE_DATA entropy_module; |
39 | 48 | |
40 | -char * getData(const char *, size_t); | |
41 | 49 | |
42 | 50 | /** |
43 | - * This is taken from timer_entropyd and modified so | |
44 | - * that the constant 1/log(2.0) is not calculated but | |
45 | - * set directly. | |
46 | - * | |
47 | - * As far as i can say this correlates to the shannon | |
48 | - * entropy algorithm with equal probabilities | |
49 | - * for entropy where the entropy units are bits. | |
50 | - * | |
51 | - * But actually i am no mathemacian and my analysis capabilities | |
52 | - * are limited. Additionally i have not analysed the linux random | |
53 | - * character device code, so i trusted the code in timer_entropyd. | |
51 | + * add header values to sha1 | |
54 | 52 | */ |
55 | 53 | static |
56 | 54 | int |
57 | -get_entropy(const unsigned char * data, size_t ndata) | |
58 | -{ | |
59 | - size_t byte_count[256]; | |
60 | - size_t iterator; | |
61 | - static double log2inv = 1.442695; //!< 1 / log(2.0): the entropy unit size | |
62 | - double entropy = 0.0; | |
63 | - | |
64 | - memset(byte_count, 0, sizeof(byte_count)); | |
65 | - | |
66 | - /** | |
67 | - * first get the amount each byte occurs in the array | |
68 | - */ | |
69 | - for (iterator = 0; iterator < ndata; iterator++) { | |
70 | - byte_count[data[iterator]]++; | |
71 | - } | |
72 | - | |
73 | - for (iterator = 0; iterator < 256; iterator++) { | |
74 | - double probability = (double)byte_count[iterator] / (double)ndata; | |
75 | - | |
76 | - if (0.0 < probability) { | |
77 | - entropy += probability * log2inv * (log(1.0 / probability)); | |
78 | - } | |
79 | - } | |
80 | - | |
81 | - entropy *= (double)ndata; | |
82 | - entropy = (entropy < 0.0)? 0.0 : entropy; | |
83 | - entropy = min((double)(ndata * 8), entropy); | |
84 | - | |
85 | - return entropy; | |
86 | -} | |
87 | - | |
88 | -static | |
89 | -int | |
90 | 55 | header_do_print(void * rec, const char * key, const char * value) |
91 | 56 | { |
92 | 57 | apr_sha1_ctx_t * sha1_ctx = rec; |
... | ... | @@ -183,59 +148,11 @@ entropy_filter_in( |
183 | 148 | /** |
184 | 149 | * fill /dev/random with sha1 from current request |
185 | 150 | */ |
186 | - { | |
187 | - int i; | |
188 | - int entropy = get_entropy(digest, APR_SHA1_DIGESTSIZE); | |
189 | - int fd = open("/dev/random", O_WRONLY|O_NONBLOCK); | |
190 | - struct rand_pool_info * output; | |
191 | - | |
192 | - output = (struct rand_pool_info *)malloc( | |
193 | - sizeof(struct rand_pool_info) + APR_SHA1_DIGESTSIZE); | |
194 | - | |
195 | - output->entropy_count = entropy; | |
196 | - output->buf_size = APR_SHA1_DIGESTSIZE; | |
197 | - memcpy(output->buf, digest, APR_SHA1_DIGESTSIZE); | |
198 | - | |
199 | - fprintf(stderr, "sha1 so far: "); | |
200 | - for (i=0; i<APR_SHA1_DIGESTSIZE; i++) { | |
201 | - fprintf(stderr, "%02x", digest[i]); | |
202 | - } | |
203 | - fprintf(stderr, "\n"); | |
204 | - fprintf(stderr, "entropy bits: %d\n", entropy); | |
205 | - | |
206 | - if (ioctl(fd, RNDADDENTROPY, output) == -1) { | |
207 | - switch(errno) { | |
208 | - case EBADF: | |
209 | - fprintf(stderr, "ioctl failed: no valid file descriptor %d\n", fd); | |
210 | - break; | |
211 | - | |
212 | - case EFAULT: | |
213 | - fprintf(stderr, "ioctl failed: invalid argument: %p\n", output); | |
214 | - break; | |
215 | - | |
216 | - case EINVAL: | |
217 | - fprintf(stderr, "ioctl failed: invalid request\n", errno); | |
218 | - break; | |
219 | - | |
220 | - case ENOTTY: | |
221 | - fprintf(stderr, "ioctl failed: discriptor not associated to character device\n", errno); | |
222 | - break; | |
223 | - | |
224 | - case EPERM: | |
225 | - fprintf(stderr, "ioctl failed: invalid permissions\n", errno); | |
226 | - break; | |
227 | - | |
228 | - default: | |
229 | - fprintf(stderr, "ioctl(RNDADDENTROPY) failed: %d\n", errno); | |
230 | - break; | |
231 | - } | |
232 | - } | |
233 | - | |
234 | - free(output); | |
235 | - close(fd); | |
236 | - } | |
237 | - fflush(stderr); | |
151 | + add_entropy(digest, APR_SHA1_DIGESTSIZE); | |
238 | 152 | |
153 | + /** | |
154 | + * after we are done remove us from filter queue | |
155 | + */ | |
239 | 156 | ap_remove_input_filter(filter); |
240 | 157 | |
241 | 158 | return status; | ... | ... |
mod_entropy_add_entropy.c
0 → 100644
1 | +/** | |
2 | + * \file | |
3 | + * | |
4 | + * This adds the generated random bytes (sha1 hash of request) to the | |
5 | + * /dev/random | |
6 | + * | |
7 | + * \author Georg Hopp <georg@steffers.org | |
8 | + * | |
9 | + * \copyright | |
10 | + * Copyright © 2012 Georg Hopp | |
11 | + * This program is free software: you can redistribute it and/or modify | |
12 | + * it under the terms of the GNU General Public License as published by | |
13 | + * the Free Software Foundation, either version 3 of the License, or | |
14 | + * (at your option) any later version. | |
15 | + * This program is distributed in the hope that it will be useful, | |
16 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
17 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
18 | + * GNU General Public License for more details. | |
19 | + * You should have received a copy of the GNU General Public License | |
20 | + * along with this program. If not, see <http://www.gnu.org/licenses/>. | |
21 | + */ | |
22 | + | |
23 | +#include <fcntl.h> | |
24 | +#include <errno.h> | |
25 | +#include <stdlib.h> | |
26 | +#include <string.h> | |
27 | +#include <linux/random.h> | |
28 | +#include <sys/ioctl.h> | |
29 | +#include <sys/types.h> | |
30 | +#include <sys/stat.h> | |
31 | + | |
32 | +int get_entropy_bits(unsigned char *, size_t); | |
33 | + | |
34 | +/** | |
35 | + * fill /dev/random with sha1 from current request | |
36 | + * | |
37 | + * \todo add error handling... | |
38 | + */ | |
39 | +void | |
40 | +add_entropy(const unsigned char * data, size_t ndata) | |
41 | +{ | |
42 | + int i; | |
43 | + int fd; | |
44 | + int entropy = get_entropy_bits(data, ndata); | |
45 | + struct rand_pool_info * output; | |
46 | + | |
47 | + output = (struct rand_pool_info *)malloc( | |
48 | + sizeof(struct rand_pool_info) + ndata); | |
49 | + | |
50 | + output->entropy_count = entropy; | |
51 | + output->buf_size = ndata; | |
52 | + memcpy(output->buf, data, ndata); | |
53 | + | |
54 | + fd = open("/dev/random", O_WRONLY|O_NONBLOCK); | |
55 | + | |
56 | + if (ioctl(fd, RNDADDENTROPY, output) == -1) { | |
57 | + switch(errno) { | |
58 | + case EBADF: | |
59 | + fprintf(stderr, | |
60 | + "ioctl failed: no valid file descriptor %d\n", | |
61 | + fd); | |
62 | + break; | |
63 | + | |
64 | + case EFAULT: | |
65 | + fprintf(stderr, | |
66 | + "ioctl failed: invalid argument: %p\n", | |
67 | + output); | |
68 | + break; | |
69 | + | |
70 | + case EINVAL: | |
71 | + fprintf(stderr, | |
72 | + "ioctl failed: invalid request\n", | |
73 | + errno); | |
74 | + break; | |
75 | + | |
76 | + case ENOTTY: | |
77 | + fprintf(stderr, | |
78 | + "ioctl failed: discriptor not associated to " | |
79 | + "character device\n", | |
80 | + errno); | |
81 | + break; | |
82 | + | |
83 | + case EPERM: | |
84 | + fprintf(stderr, | |
85 | + "ioctl failed: invalid permissions\n", | |
86 | + errno); | |
87 | + break; | |
88 | + | |
89 | + default: | |
90 | + fprintf(stderr, | |
91 | + "ioctl(RNDADDENTROPY) failed: %d\n", | |
92 | + errno); | |
93 | + break; | |
94 | + } | |
95 | + } | |
96 | + | |
97 | + fflush(stderr); | |
98 | + free(output); | |
99 | + close(fd); | |
100 | +} | |
101 | + | |
102 | +// vim: set ts=4 sw=4: | ... | ... |
mod_entropy_get_entropy_bits.c
0 → 100644
1 | +/** | |
2 | + * \file | |
3 | + * | |
4 | + * calculate the available entropy. This is taken from timed_entropyd. | |
5 | + * | |
6 | + * \author Georg Hopp <georg@steffers.org | |
7 | + * | |
8 | + * \copyright | |
9 | + * Copyright © 2012 Georg Hopp | |
10 | + * This program is free software: you can redistribute it and/or modify | |
11 | + * it under the terms of the GNU General Public License as published by | |
12 | + * the Free Software Foundation, either version 3 of the License, or | |
13 | + * (at your option) any later version. | |
14 | + * This program is distributed in the hope that it will be useful, | |
15 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
16 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
17 | + * GNU General Public License for more details. | |
18 | + * You should have received a copy of the GNU General Public License | |
19 | + * along with this program. If not, see <http://www.gnu.org/licenses/>. | |
20 | + */ | |
21 | + | |
22 | +#include <math.h> | |
23 | + | |
24 | +#define min(x, y) ((x)<(y)?(x):(y)) | |
25 | + | |
26 | +/** | |
27 | + * This is taken from timer_entropyd and modified so | |
28 | + * that the constant 1/log(2.0) is not calculated but | |
29 | + * set directly. | |
30 | + * | |
31 | + * As far as i can say this correlates to the shannon | |
32 | + * entropy algorithm with equal probabilities | |
33 | + * for entropy where the entropy units are bits. | |
34 | + * | |
35 | + * But actually i am no mathemacian and my analysis capabilities | |
36 | + * are limited. Additionally i have not analysed the linux random | |
37 | + * character device code, so i trusted the code in timer_entropyd. | |
38 | + */ | |
39 | +int | |
40 | +get_entropy_bits(const unsigned char * data, size_t ndata) | |
41 | +{ | |
42 | + size_t byte_count[256]; | |
43 | + size_t iterator; | |
44 | + static double log2inv = 1.442695; //!< 1 / log(2.0): the entropy unit size | |
45 | + double entropy = 0.0; | |
46 | + | |
47 | + memset(byte_count, 0, sizeof(byte_count)); | |
48 | + | |
49 | + /** | |
50 | + * first get the amount each byte occurs in the array | |
51 | + */ | |
52 | + for (iterator = 0; iterator < ndata; iterator++) { | |
53 | + byte_count[data[iterator]]++; | |
54 | + } | |
55 | + | |
56 | + /** | |
57 | + * calculate the entropy value | |
58 | + */ | |
59 | + for (iterator = 0; iterator < 256; iterator++) { | |
60 | + double probability = (double)byte_count[iterator] / (double)ndata; | |
61 | + | |
62 | + if (0.0 < probability) { | |
63 | + entropy += probability * log2inv * (log(1.0 / probability)); | |
64 | + } | |
65 | + } | |
66 | + | |
67 | + /** | |
68 | + * prepare for use with linux kernel ioctl RNDADDENTROPY | |
69 | + */ | |
70 | + entropy *= (double)ndata; | |
71 | + entropy = (entropy < 0.0)? 0.0 : entropy; | |
72 | + entropy = min((double)(ndata * 8), entropy); | |
73 | + | |
74 | + return entropy; | |
75 | +} | |
76 | + | |
77 | +// vim: set ts=4 sw=4: | ... | ... |
Please
register
or
login
to post a comment