Showing
7 changed files
with
240 additions
and
107 deletions
@@ -2,7 +2,9 @@ ACLOCAL_AMFLAGS = -I m4 | @@ -2,7 +2,9 @@ ACLOCAL_AMFLAGS = -I m4 | ||
2 | 2 | ||
3 | lib_LTLIBRARIES = libmodentropy.la | 3 | lib_LTLIBRARIES = libmodentropy.la |
4 | 4 | ||
5 | -libmodentropy_la_SOURCES = mod_entropy.c | 5 | +libmodentropy_la_SOURCES = mod_entropy.c \ |
6 | + mod_entropy_get_entropy_bits.c \ | ||
7 | + mod_entropy_add_entropy.c | ||
6 | libmodentropy_la_LDFLAGS = -lrt -lm | 8 | libmodentropy_la_LDFLAGS = -lrt -lm |
7 | 9 | ||
8 | install: libmodentropy.la | 10 | install: libmodentropy.la |
gentoo/ChangeLog
0 → 100644
gentoo/metadata.xml
0 → 100644
gentoo/mod_entropy-9999.ebuild
0 → 100644
1 | +EAPI=4 | ||
2 | + | ||
3 | +inherit eutils git autotools apache-module | ||
4 | + | ||
5 | +DESCRIPTION="a module to greate random data from incoming requests." | ||
6 | +SRC_URI="" | ||
7 | +EGIT_REPO_URI="git://redminie.weird-web-workers.org/var/lib/git/mod_entropy" | ||
8 | + | ||
9 | +HOMEPAGE="http://redmine.weird-web-workers.org/mod_entropy/" | ||
10 | + | ||
11 | +LICENSE="GPL-3" | ||
12 | +SLOT="0" | ||
13 | +KEYWORDS="~amd64 ~x86" | ||
14 | +IUSE="" | ||
15 | + | ||
16 | +need_apache2 | ||
17 | + | ||
18 | +DOCFILES="COPYING README NEWS ChangeLog" | ||
19 | + | ||
20 | +src_prepare() { | ||
21 | + eautoreconf | ||
22 | +} |
1 | /** | 1 | /** |
2 | + * \file | ||
3 | + * | ||
2 | * this filter generates a sha1 from the current microtime and request | 4 | * this filter generates a sha1 from the current microtime and request |
3 | * useses this to fill the linux random source. | 5 | * useses this to fill the linux random source. |
4 | * | 6 | * |
@@ -9,8 +11,22 @@ | @@ -9,8 +11,22 @@ | ||
9 | * | 11 | * |
10 | * Most time was spend in figuring out how to write apache modules. | 12 | * Most time was spend in figuring out how to write apache modules. |
11 | * | 13 | * |
12 | - * \author Georg Hopp <georg@steffers.org> | 14 | + * \author Georg Hopp <georg@steffers.org |
15 | + * | ||
16 | + * \copyright | ||
17 | + * Copyright © 2012 Georg Hopp | ||
18 | + * This program is free software: you can redistribute it and/or modify | ||
19 | + * it under the terms of the GNU General Public License as published by | ||
20 | + * the Free Software Foundation, either version 3 of the License, or | ||
21 | + * (at your option) any later version. | ||
22 | + * This program is distributed in the hope that it will be useful, | ||
23 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
24 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
25 | + * GNU General Public License for more details. | ||
26 | + * You should have received a copy of the GNU General Public License | ||
27 | + * along with this program. If not, see <http://www.gnu.org/licenses/>. | ||
13 | */ | 28 | */ |
29 | + | ||
14 | #define _POSIX_C_SOURCE 199309L | 30 | #define _POSIX_C_SOURCE 199309L |
15 | 31 | ||
16 | #include "httpd.h" | 32 | #include "httpd.h" |
@@ -24,69 +40,18 @@ | @@ -24,69 +40,18 @@ | ||
24 | #include "apr_sha1.h" | 40 | #include "apr_sha1.h" |
25 | 41 | ||
26 | #include <time.h> | 42 | #include <time.h> |
27 | -#include <math.h> | ||
28 | -#include <fcntl.h> | ||
29 | -#include <errno.h> | ||
30 | -#include <linux/random.h> | ||
31 | -#include <sys/ioctl.h> | ||
32 | -#include <sys/types.h> | ||
33 | -#include <sys/stat.h> | ||
34 | 43 | ||
35 | -#define min(x, y) ((x)<(y)?(x):(y)) | ||
36 | 44 | ||
45 | +int add_entropy(unsigned char *, size_t); | ||
37 | 46 | ||
38 | module AP_MODULE_DECLARE_DATA entropy_module; | 47 | module AP_MODULE_DECLARE_DATA entropy_module; |
39 | 48 | ||
40 | -char * getData(const char *, size_t); | ||
41 | 49 | ||
42 | /** | 50 | /** |
43 | - * This is taken from timer_entropyd and modified so | ||
44 | - * that the constant 1/log(2.0) is not calculated but | ||
45 | - * set directly. | ||
46 | - * | ||
47 | - * As far as i can say this correlates to the shannon | ||
48 | - * entropy algorithm with equal probabilities | ||
49 | - * for entropy where the entropy units are bits. | ||
50 | - * | ||
51 | - * But actually i am no mathemacian and my analysis capabilities | ||
52 | - * are limited. Additionally i have not analysed the linux random | ||
53 | - * character device code, so i trusted the code in timer_entropyd. | 51 | + * add header values to sha1 |
54 | */ | 52 | */ |
55 | static | 53 | static |
56 | int | 54 | int |
57 | -get_entropy(const unsigned char * data, size_t ndata) | ||
58 | -{ | ||
59 | - size_t byte_count[256]; | ||
60 | - size_t iterator; | ||
61 | - static double log2inv = 1.442695; //!< 1 / log(2.0): the entropy unit size | ||
62 | - double entropy = 0.0; | ||
63 | - | ||
64 | - memset(byte_count, 0, sizeof(byte_count)); | ||
65 | - | ||
66 | - /** | ||
67 | - * first get the amount each byte occurs in the array | ||
68 | - */ | ||
69 | - for (iterator = 0; iterator < ndata; iterator++) { | ||
70 | - byte_count[data[iterator]]++; | ||
71 | - } | ||
72 | - | ||
73 | - for (iterator = 0; iterator < 256; iterator++) { | ||
74 | - double probability = (double)byte_count[iterator] / (double)ndata; | ||
75 | - | ||
76 | - if (0.0 < probability) { | ||
77 | - entropy += probability * log2inv * (log(1.0 / probability)); | ||
78 | - } | ||
79 | - } | ||
80 | - | ||
81 | - entropy *= (double)ndata; | ||
82 | - entropy = (entropy < 0.0)? 0.0 : entropy; | ||
83 | - entropy = min((double)(ndata * 8), entropy); | ||
84 | - | ||
85 | - return entropy; | ||
86 | -} | ||
87 | - | ||
88 | -static | ||
89 | -int | ||
90 | header_do_print(void * rec, const char * key, const char * value) | 55 | header_do_print(void * rec, const char * key, const char * value) |
91 | { | 56 | { |
92 | apr_sha1_ctx_t * sha1_ctx = rec; | 57 | apr_sha1_ctx_t * sha1_ctx = rec; |
@@ -183,59 +148,11 @@ entropy_filter_in( | @@ -183,59 +148,11 @@ entropy_filter_in( | ||
183 | /** | 148 | /** |
184 | * fill /dev/random with sha1 from current request | 149 | * fill /dev/random with sha1 from current request |
185 | */ | 150 | */ |
186 | - { | ||
187 | - int i; | ||
188 | - int entropy = get_entropy(digest, APR_SHA1_DIGESTSIZE); | ||
189 | - int fd = open("/dev/random", O_WRONLY|O_NONBLOCK); | ||
190 | - struct rand_pool_info * output; | ||
191 | - | ||
192 | - output = (struct rand_pool_info *)malloc( | ||
193 | - sizeof(struct rand_pool_info) + APR_SHA1_DIGESTSIZE); | ||
194 | - | ||
195 | - output->entropy_count = entropy; | ||
196 | - output->buf_size = APR_SHA1_DIGESTSIZE; | ||
197 | - memcpy(output->buf, digest, APR_SHA1_DIGESTSIZE); | ||
198 | - | ||
199 | - fprintf(stderr, "sha1 so far: "); | ||
200 | - for (i=0; i<APR_SHA1_DIGESTSIZE; i++) { | ||
201 | - fprintf(stderr, "%02x", digest[i]); | ||
202 | - } | ||
203 | - fprintf(stderr, "\n"); | ||
204 | - fprintf(stderr, "entropy bits: %d\n", entropy); | ||
205 | - | ||
206 | - if (ioctl(fd, RNDADDENTROPY, output) == -1) { | ||
207 | - switch(errno) { | ||
208 | - case EBADF: | ||
209 | - fprintf(stderr, "ioctl failed: no valid file descriptor %d\n", fd); | ||
210 | - break; | ||
211 | - | ||
212 | - case EFAULT: | ||
213 | - fprintf(stderr, "ioctl failed: invalid argument: %p\n", output); | ||
214 | - break; | ||
215 | - | ||
216 | - case EINVAL: | ||
217 | - fprintf(stderr, "ioctl failed: invalid request\n", errno); | ||
218 | - break; | ||
219 | - | ||
220 | - case ENOTTY: | ||
221 | - fprintf(stderr, "ioctl failed: discriptor not associated to character device\n", errno); | ||
222 | - break; | ||
223 | - | ||
224 | - case EPERM: | ||
225 | - fprintf(stderr, "ioctl failed: invalid permissions\n", errno); | ||
226 | - break; | ||
227 | - | ||
228 | - default: | ||
229 | - fprintf(stderr, "ioctl(RNDADDENTROPY) failed: %d\n", errno); | ||
230 | - break; | ||
231 | - } | ||
232 | - } | ||
233 | - | ||
234 | - free(output); | ||
235 | - close(fd); | ||
236 | - } | ||
237 | - fflush(stderr); | 151 | + add_entropy(digest, APR_SHA1_DIGESTSIZE); |
238 | 152 | ||
153 | + /** | ||
154 | + * after we are done remove us from filter queue | ||
155 | + */ | ||
239 | ap_remove_input_filter(filter); | 156 | ap_remove_input_filter(filter); |
240 | 157 | ||
241 | return status; | 158 | return status; |
mod_entropy_add_entropy.c
0 → 100644
1 | +/** | ||
2 | + * \file | ||
3 | + * | ||
4 | + * This adds the generated random bytes (sha1 hash of request) to the | ||
5 | + * /dev/random | ||
6 | + * | ||
7 | + * \author Georg Hopp <georg@steffers.org | ||
8 | + * | ||
9 | + * \copyright | ||
10 | + * Copyright © 2012 Georg Hopp | ||
11 | + * This program is free software: you can redistribute it and/or modify | ||
12 | + * it under the terms of the GNU General Public License as published by | ||
13 | + * the Free Software Foundation, either version 3 of the License, or | ||
14 | + * (at your option) any later version. | ||
15 | + * This program is distributed in the hope that it will be useful, | ||
16 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
17 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
18 | + * GNU General Public License for more details. | ||
19 | + * You should have received a copy of the GNU General Public License | ||
20 | + * along with this program. If not, see <http://www.gnu.org/licenses/>. | ||
21 | + */ | ||
22 | + | ||
23 | +#include <fcntl.h> | ||
24 | +#include <errno.h> | ||
25 | +#include <stdlib.h> | ||
26 | +#include <string.h> | ||
27 | +#include <linux/random.h> | ||
28 | +#include <sys/ioctl.h> | ||
29 | +#include <sys/types.h> | ||
30 | +#include <sys/stat.h> | ||
31 | + | ||
32 | +int get_entropy_bits(unsigned char *, size_t); | ||
33 | + | ||
34 | +/** | ||
35 | + * fill /dev/random with sha1 from current request | ||
36 | + * | ||
37 | + * \todo add error handling... | ||
38 | + */ | ||
39 | +void | ||
40 | +add_entropy(const unsigned char * data, size_t ndata) | ||
41 | +{ | ||
42 | + int i; | ||
43 | + int fd; | ||
44 | + int entropy = get_entropy_bits(data, ndata); | ||
45 | + struct rand_pool_info * output; | ||
46 | + | ||
47 | + output = (struct rand_pool_info *)malloc( | ||
48 | + sizeof(struct rand_pool_info) + ndata); | ||
49 | + | ||
50 | + output->entropy_count = entropy; | ||
51 | + output->buf_size = ndata; | ||
52 | + memcpy(output->buf, data, ndata); | ||
53 | + | ||
54 | + fd = open("/dev/random", O_WRONLY|O_NONBLOCK); | ||
55 | + | ||
56 | + if (ioctl(fd, RNDADDENTROPY, output) == -1) { | ||
57 | + switch(errno) { | ||
58 | + case EBADF: | ||
59 | + fprintf(stderr, | ||
60 | + "ioctl failed: no valid file descriptor %d\n", | ||
61 | + fd); | ||
62 | + break; | ||
63 | + | ||
64 | + case EFAULT: | ||
65 | + fprintf(stderr, | ||
66 | + "ioctl failed: invalid argument: %p\n", | ||
67 | + output); | ||
68 | + break; | ||
69 | + | ||
70 | + case EINVAL: | ||
71 | + fprintf(stderr, | ||
72 | + "ioctl failed: invalid request\n", | ||
73 | + errno); | ||
74 | + break; | ||
75 | + | ||
76 | + case ENOTTY: | ||
77 | + fprintf(stderr, | ||
78 | + "ioctl failed: discriptor not associated to " | ||
79 | + "character device\n", | ||
80 | + errno); | ||
81 | + break; | ||
82 | + | ||
83 | + case EPERM: | ||
84 | + fprintf(stderr, | ||
85 | + "ioctl failed: invalid permissions\n", | ||
86 | + errno); | ||
87 | + break; | ||
88 | + | ||
89 | + default: | ||
90 | + fprintf(stderr, | ||
91 | + "ioctl(RNDADDENTROPY) failed: %d\n", | ||
92 | + errno); | ||
93 | + break; | ||
94 | + } | ||
95 | + } | ||
96 | + | ||
97 | + fflush(stderr); | ||
98 | + free(output); | ||
99 | + close(fd); | ||
100 | +} | ||
101 | + | ||
102 | +// vim: set ts=4 sw=4: |
mod_entropy_get_entropy_bits.c
0 → 100644
1 | +/** | ||
2 | + * \file | ||
3 | + * | ||
4 | + * calculate the available entropy. This is taken from timed_entropyd. | ||
5 | + * | ||
6 | + * \author Georg Hopp <georg@steffers.org | ||
7 | + * | ||
8 | + * \copyright | ||
9 | + * Copyright © 2012 Georg Hopp | ||
10 | + * This program is free software: you can redistribute it and/or modify | ||
11 | + * it under the terms of the GNU General Public License as published by | ||
12 | + * the Free Software Foundation, either version 3 of the License, or | ||
13 | + * (at your option) any later version. | ||
14 | + * This program is distributed in the hope that it will be useful, | ||
15 | + * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
16 | + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
17 | + * GNU General Public License for more details. | ||
18 | + * You should have received a copy of the GNU General Public License | ||
19 | + * along with this program. If not, see <http://www.gnu.org/licenses/>. | ||
20 | + */ | ||
21 | + | ||
22 | +#include <math.h> | ||
23 | + | ||
24 | +#define min(x, y) ((x)<(y)?(x):(y)) | ||
25 | + | ||
26 | +/** | ||
27 | + * This is taken from timer_entropyd and modified so | ||
28 | + * that the constant 1/log(2.0) is not calculated but | ||
29 | + * set directly. | ||
30 | + * | ||
31 | + * As far as i can say this correlates to the shannon | ||
32 | + * entropy algorithm with equal probabilities | ||
33 | + * for entropy where the entropy units are bits. | ||
34 | + * | ||
35 | + * But actually i am no mathemacian and my analysis capabilities | ||
36 | + * are limited. Additionally i have not analysed the linux random | ||
37 | + * character device code, so i trusted the code in timer_entropyd. | ||
38 | + */ | ||
39 | +int | ||
40 | +get_entropy_bits(const unsigned char * data, size_t ndata) | ||
41 | +{ | ||
42 | + size_t byte_count[256]; | ||
43 | + size_t iterator; | ||
44 | + static double log2inv = 1.442695; //!< 1 / log(2.0): the entropy unit size | ||
45 | + double entropy = 0.0; | ||
46 | + | ||
47 | + memset(byte_count, 0, sizeof(byte_count)); | ||
48 | + | ||
49 | + /** | ||
50 | + * first get the amount each byte occurs in the array | ||
51 | + */ | ||
52 | + for (iterator = 0; iterator < ndata; iterator++) { | ||
53 | + byte_count[data[iterator]]++; | ||
54 | + } | ||
55 | + | ||
56 | + /** | ||
57 | + * calculate the entropy value | ||
58 | + */ | ||
59 | + for (iterator = 0; iterator < 256; iterator++) { | ||
60 | + double probability = (double)byte_count[iterator] / (double)ndata; | ||
61 | + | ||
62 | + if (0.0 < probability) { | ||
63 | + entropy += probability * log2inv * (log(1.0 / probability)); | ||
64 | + } | ||
65 | + } | ||
66 | + | ||
67 | + /** | ||
68 | + * prepare for use with linux kernel ioctl RNDADDENTROPY | ||
69 | + */ | ||
70 | + entropy *= (double)ndata; | ||
71 | + entropy = (entropy < 0.0)? 0.0 : entropy; | ||
72 | + entropy = min((double)(ndata * 8), entropy); | ||
73 | + | ||
74 | + return entropy; | ||
75 | +} | ||
76 | + | ||
77 | +// vim: set ts=4 sw=4: |
Please
register
or
login
to post a comment