/* $OpenBSD: res_random.c,v 1.17 2008/04/13 00:28:35 djm Exp $ */ /* * Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de> * Copyright 2008 Damien Miller <djm@openbsd.org> * Copyright 2008 Android Open Source Project (thread-safety) * All rights reserved. * * Theo de Raadt <deraadt@openbsd.org> came up with the idea of using * such a mathematical system to generate more random (yet non-repeating) * ids to solve the resolver/named problem. But Niels designed the * actual system based on the constraints. * * Later modified by Damien Miller to wrap the LCG output in a 15-bit * permutation generator based on a Luby-Rackoff block cipher. This * ensures the output is non-repeating and preserves the MSB twiddle * trick, but makes it more resistant to LCG prediction. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ /* * seed = random 15bit * n = prime, g0 = generator to n, * j = random so that gcd(j,n-1) == 1 * g = g0^j mod n will be a generator again. * * X[0] = random seed. * X[n] = a*X[n-1]+b mod m is a Linear Congruential Generator * with a = 7^(even random) mod m, * b = random with gcd(b,m) == 1 * m = 31104 and a maximal period of m-1. * * The transaction id is determined by: * id[n] = seed xor (g^X[n] mod n) * * Effectivly the id is restricted to the lower 15 bits, thus * yielding two different cycles by toggling the msb on and off. * This avoids reuse issues caused by reseeding. * * The output of this generator is then randomly permuted though a * custom 15 bit Luby-Rackoff block cipher. */ #include <sys/types.h> #include <netinet/in.h> #include <sys/time.h> #include "resolv_private.h" #include <unistd.h> #include <stdlib.h> #include <string.h> /* BIONIC-BEGIN */ static pthread_mutex_t _res_random_lock = PTHREAD_MUTEX_INITIALIZER; #define _RES_RANDOM_LOCK() pthread_mutex_lock(&_res_random_lock) #define _RES_RANDOM_UNLOCK() pthread_mutex_unlock(&_res_random_lock) /* BIONIC-END */ #define RU_OUT 180 /* Time after wich will be reseeded */ #define RU_MAX 30000 /* Uniq cycle, avoid blackjack prediction */ #define RU_GEN 2 /* Starting generator */ #define RU_N 32749 /* RU_N-1 = 2*2*3*2729 */ #define RU_AGEN 7 /* determine ru_a as RU_AGEN^(2*rand) */ #define RU_M 31104 /* RU_M = 2^7*3^5 - don't change */ #define RU_ROUNDS 11 /* Number of rounds for permute (odd) */ struct prf_ctx { /* PRF lookup table for odd rounds (7 bits input to 8 bits output) */ u_char prf7[(RU_ROUNDS / 2) * (1 << 7)]; /* PRF lookup table for even rounds (8 bits input to 7 bits output) */ u_char prf8[((RU_ROUNDS + 1) / 2) * (1 << 8)]; }; #define PFAC_N 3 const static u_int16_t pfacts[PFAC_N] = { 2, 3, 2729 }; static u_int16_t ru_x; static u_int16_t ru_seed, ru_seed2; static u_int16_t ru_a, ru_b; static u_int16_t ru_g; static u_int16_t ru_counter = 0; static u_int16_t ru_msb = 0; static struct prf_ctx *ru_prf = NULL; static long ru_reseed; static u_int16_t pmod(u_int16_t, u_int16_t, u_int16_t); static void res_initid(void); /* * Do a fast modular exponation, returned value will be in the range * of 0 - (mod-1) */ static u_int16_t pmod(u_int16_t gen, u_int16_t exp, u_int16_t mod) { u_int16_t s, t, u; s = 1; t = gen; u = exp; while (u) { if (u & 1) s = (s * t) % mod; u >>= 1; t = (t * t) % mod; } return (s); } /* * 15-bit permutation based on Luby-Rackoff block cipher */ u_int permute15(u_int in) { int i; u_int left, right, tmp; if (ru_prf == NULL) return in; left = (in >> 8) & 0x7f; right = in & 0xff; /* * Each round swaps the width of left and right. Even rounds have * a 7-bit left, odd rounds have an 8-bit left. Since this uses an * odd number of rounds, left is always 8 bits wide at the end. */ for (i = 0; i < RU_ROUNDS; i++) { if ((i & 1) == 0) tmp = ru_prf->prf8[(i << (8 - 1)) | right] & 0x7f; else tmp = ru_prf->prf7[((i - 1) << (7 - 1)) | right]; tmp ^= left; left = right; right = tmp; } return (right << 8) | left; } /* * Initializes the seed and chooses a suitable generator. Also toggles * the msb flag. The msb flag is used to generate two distinct * cycles of random numbers and thus avoiding reuse of ids. * * This function is called from res_randomid() when needed, an * application does not have to worry about it. */ static void res_initid(void) { u_int16_t j, i; u_int32_t tmp; int noprime = 1; struct timeval tv; ru_x = arc4random_uniform(RU_M); /* 15 bits of random seed */ tmp = arc4random(); ru_seed = (tmp >> 16) & 0x7FFF; ru_seed2 = tmp & 0x7FFF; /* Determine the LCG we use */ tmp = arc4random(); ru_b = (tmp & 0xfffe) | 1; ru_a = pmod(RU_AGEN, (tmp >> 16) & 0xfffe, RU_M); while (ru_b % 3 == 0) ru_b += 2; j = arc4random_uniform(RU_N); /* * Do a fast gcd(j,RU_N-1), so we can find a j with * gcd(j, RU_N-1) == 1, giving a new generator for * RU_GEN^j mod RU_N */ while (noprime) { for (i = 0; i < PFAC_N; i++) if (j % pfacts[i] == 0) break; if (i >= PFAC_N) noprime = 0; else j = (j + 1) % RU_N; } ru_g = pmod(RU_GEN, j, RU_N); ru_counter = 0; /* Initialise PRF for Luby-Rackoff permutation */ if (ru_prf == NULL) ru_prf = malloc(sizeof(*ru_prf)); if (ru_prf != NULL) arc4random_buf(ru_prf, sizeof(*ru_prf)); gettimeofday(&tv, NULL); ru_reseed = tv.tv_sec + RU_OUT; ru_msb = ru_msb == 0x8000 ? 0 : 0x8000; } u_int res_randomid(void) { struct timeval tv; u_int result; _RES_RANDOM_LOCK() gettimeofday(&tv, NULL); if (ru_counter >= RU_MAX || tv.tv_sec > ru_reseed) res_initid(); /* Linear Congruential Generator */ ru_x = (ru_a * ru_x + ru_b) % RU_M; ru_counter++; result = permute15(ru_seed ^ pmod(ru_g, ru_seed2 + ru_x, RU_N)) | ru_msb; _RES_RANDOM_UNLOCK() return result; } #if 0 int main(int argc, char **argv) { int i, n; u_int16_t wert; res_initid(); printf("Generator: %u\n", ru_g); printf("Seed: %u\n", ru_seed); printf("Reseed at %ld\n", ru_reseed); printf("Ru_X: %u\n", ru_x); printf("Ru_A: %u\n", ru_a); printf("Ru_B: %u\n", ru_b); n = argc > 1 ? atoi(argv[1]) : 60001; for (i=0;i<n;i++) { wert = res_randomid(); printf("%u\n", wert); } return 0; } #endif