[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@3.128.30.53: ~ $
/*
 * Copyright (C) Internet Systems Consortium, Inc. ("ISC")
 *
 * This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/.
 *
 * See the COPYRIGHT file distributed with this work for additional
 * information regarding copyright ownership.
 */

/* $Id: entropy.h,v 1.35 2009/10/19 02:37:08 marka Exp $ */

#ifndef ISC_ENTROPY_H
#define ISC_ENTROPY_H 1

/*****
 ***** Module Info
 *****/

/*! \file isc/entropy.h
 * \brief The entropy API
 *
 * \li MP:
 *	The entropy object is locked internally.  All callbacks into
 *	application-provided functions (for setup, gathering, and
 *	shutdown of sources) are guaranteed to be called with the
 *	entropy API lock held.  This means these functions are
 *	not permitted to call back into the entropy API.
 *
 * \li Reliability:
 *	No anticipated impact.
 *
 * \li Resources:
 *	A buffer, used as an entropy pool.
 *
 * \li Security:
 *	While this code is believed to implement good entropy gathering
 *	and distribution, it has not been reviewed by a cryptographic
 *	expert.
 *	Since the added entropy is only as good as the sources used,
 *	this module could hand out bad data and never know it.
 *
 * \li Standards:
 *	None.
 */

/***
 *** Imports
 ***/

#include <stdio.h>

#include <isc/lang.h>
#include <isc/types.h>

/*@{*/
/*% Entropy callback function. */
typedef isc_result_t (*isc_entropystart_t)(isc_entropysource_t *source,
					   void *arg, isc_boolean_t blocking);
typedef isc_result_t (*isc_entropyget_t)(isc_entropysource_t *source,
					 void *arg, isc_boolean_t blocking);
typedef void (*isc_entropystop_t)(isc_entropysource_t *source, void *arg);
/*@}*/

/***
 *** Flags.
 ***/

/*!
 * \brief
 *	Extract only "good" data; return failure if there is not enough
 *	data available and there are no sources which we can poll to get
 *	data, or those sources are empty.
 *
 *
 */
#define ISC_ENTROPY_GOODONLY	0x00000001U
/*!
 * \brief
 *	Extract as much good data as possible, but if there isn't enough
 *	at hand, return what is available.  This flag only makes sense
 *	when used with _GOODONLY.
 */
#define ISC_ENTROPY_PARTIAL	0x00000002U
/*!
 * \brief
 *	Block the task until data is available.  This is contrary to the
 *	ISC task system, where tasks should never block.  However, if
 *	this is a special purpose application where blocking a task is
 *	acceptable (say, an offline zone signer) this flag may be set.
 *	This flag only makes sense when used with _GOODONLY, and will
 *	block regardless of the setting for _PARTIAL.
 */
#define ISC_ENTROPY_BLOCKING	0x00000004U

/*!
 * \brief
 *	Estimate the amount of entropy contained in the sample pool.
 *	If this is not set, the source will be gathered and periodically
 *	mixed into the entropy pool, but no increment in contained entropy
 *	will be assumed.  This flag only makes sense on sample sources.
 */
#define ISC_ENTROPYSOURCE_ESTIMATE	0x00000001U

/*
 * For use with isc_entropy_usebestsource().
 */
/*!
 * \brief
 *	Use the keyboard as the only entropy source.
 */
#define ISC_ENTROPY_KEYBOARDYES		1
/*!
 * \brief
 *	Never use the keyboard as an entropy source.
 */
#define ISC_ENTROPY_KEYBOARDNO		2
/*!
 * \brief
 *	Use the keyboard as an entropy source only if opening the
 *	random device fails.
 */
#define ISC_ENTROPY_KEYBOARDMAYBE	3

ISC_LANG_BEGINDECLS

/***
 *** Functions
 ***/

isc_result_t
isc_entropy_create(isc_mem_t *mctx, isc_entropy_t **entp);
/*!<
 * \brief Create a new entropy object.
 */

void
isc_entropy_attach(isc_entropy_t *ent, isc_entropy_t **entp);
/*!<
 * Attaches to an entropy object.
 */

void
isc_entropy_detach(isc_entropy_t **entp);
/*!<
 * \brief Detaches from an entropy object.
 */

isc_result_t
isc_entropy_createfilesource(isc_entropy_t *ent, const char *fname);
/*!<
 * \brief Create a new entropy source from a file.
 *
 * The file is assumed to contain good randomness, and will be mixed directly
 * into the pool with every byte adding 8 bits of entropy.
 *
 * The file will be put into non-blocking mode, so it may be a device file,
 * such as /dev/random.  /dev/urandom should not be used here if it can
 * be avoided, since it will always provide data even if it isn't good.
 * We will make as much pseudorandom data as we need internally if our
 * caller asks for it.
 *
 * If we hit end-of-file, we will stop reading from this source.  Callers
 * who require strong random data will get failure when our pool drains.
 * The file will never be opened/read again once EOF is reached.
 */

void
isc_entropy_destroysource(isc_entropysource_t **sourcep);
/*!<
 * \brief Removes an entropy source from the entropy system.
 */

isc_result_t
isc_entropy_createsamplesource(isc_entropy_t *ent,
			       isc_entropysource_t **sourcep);
/*!<
 * \brief Create an entropy source that consists of samples.  Each sample is
 * added to the source via isc_entropy_addsamples(), below.
 */

isc_result_t
isc_entropy_createcallbacksource(isc_entropy_t *ent,
				 isc_entropystart_t start,
				 isc_entropyget_t get,
				 isc_entropystop_t stop,
				 void *arg,
				 isc_entropysource_t **sourcep);
/*!<
 * \brief Create an entropy source that is polled via a callback.
 *
 * This would
 * be used when keyboard input is used, or a GUI input method.  It can
 * also be used to hook in any external entropy source.
 *
 * Samples are added via isc_entropy_addcallbacksample(), below.
 * _addcallbacksample() is the only function which may be called from
 * within an entropy API callback function.
 */

void
isc_entropy_stopcallbacksources(isc_entropy_t *ent);
/*!<
 * \brief Call the stop functions for callback sources that have had their
 * start functions called.
 */

/*@{*/
isc_result_t
isc_entropy_addcallbacksample(isc_entropysource_t *source, isc_uint32_t sample,
			      isc_uint32_t extra);
isc_result_t
isc_entropy_addsample(isc_entropysource_t *source, isc_uint32_t sample,
		      isc_uint32_t extra);
/*!<
 * \brief Add a sample to the sample source.
 *
 * The sample MUST be a timestamp
 * that increases over time, with the exception of wrap-around for
 * extremely high resolution timers which will quickly wrap-around
 * a 32-bit integer.
 *
 * The "extra" parameter is used only to add a bit more unpredictable
 * data.  It is not used other than included in the hash of samples.
 *
 * When in an entropy API callback function, _addcallbacksource() must be
 * used.  At all other times, _addsample() must be used.
 */
/*@}*/

isc_result_t
isc_entropy_getdata(isc_entropy_t *ent, void *data, unsigned int length,
		    unsigned int *returned, unsigned int flags);
/*!<
 * \brief Extract data from the entropy pool.  This may load the pool from various
 * sources.
 *
 * Do this by stiring the pool and returning a part of hash as randomness.
 * Note that no secrets are given away here since parts of the hash are
 * xored together before returned.
 *
 * Honor the request from the caller to only return good data, any data,
 * etc.
 */

void
isc_entropy_putdata(isc_entropy_t *ent, void *data, unsigned int length,
		    isc_uint32_t entropy);
/*!<
 * \brief Add "length" bytes in "data" to the entropy pool, incrementing the
 * pool's entropy count by "entropy."
 *
 * These bytes will prime the pseudorandom portion even if no entropy is
 * actually added.
 */

void
isc_entropy_stats(isc_entropy_t *ent, FILE *out);
/*!<
 * \brief Dump some (trivial) stats to the stdio stream "out".
 */

unsigned int
isc_entropy_status(isc_entropy_t *end);
/*
 * Returns the number of bits the pool currently contains.  This is just
 * an estimate.
 */

isc_result_t
isc_entropy_usebestsource(isc_entropy_t *ectx, isc_entropysource_t **source,
			  const char *randomfile, int use_keyboard);
/*!<
 * \brief Use whatever source of entropy is best.
 *
 * Notes:
 *\li	If "randomfile" is not NULL, open it with
 *	isc_entropy_createfilesource().
 *
 *\li	If "randomfile" is NULL and the system's random device was detected
 *	when the program was configured and built, open that device with
 *	isc_entropy_createfilesource().
 *
 *\li	If "use_keyboard" is #ISC_ENTROPY_KEYBOARDYES, then always open
 *	the keyboard as an entropy source (possibly in addition to
 *	"randomfile" or the random device).
 *
 *\li	If "use_keyboard" is #ISC_ENTROPY_KEYBOARDMAYBE, open the keyboard only
 *	if opening the random file/device fails.  A message will be
 *	printed describing the need for keyboard input.
 *
 *\li	If "use_keyboard" is #ISC_ENTROPY_KEYBOARDNO, the keyboard will
 *	never be opened.
 *
 * Returns:
 *\li	#ISC_R_SUCCESS if at least one source of entropy could be started.
 *
 *\li	#ISC_R_NOENTROPY if use_keyboard is #ISC_ENTROPY_KEYBOARDNO and
 *	there is no random device pathname compiled into the program.
 *
 *\li	A return code from isc_entropy_createfilesource() or
 *	isc_entropy_createcallbacksource().
 */

ISC_LANG_ENDDECLS

#endif /* ISC_ENTROPY_H */

Filemanager

Name Type Size Permission Actions
aes.h File 1.05 KB 0644
app.h File 10.23 KB 0644
assertions.h File 2.78 KB 0644
atomic.h File 4.15 KB 0644
backtrace.h File 3.8 KB 0644
base32.h File 3.94 KB 0644
base64.h File 2.39 KB 0644
bind9.h File 849 B 0644
boolean.h File 746 B 0644
buffer.h File 25.69 KB 0644
bufferlist.h File 1.42 KB 0644
commandline.h File 1.69 KB 0644
condition.h File 1.44 KB 0644
counter.h File 1.88 KB 0644
crc64.h File 986 B 0644
deprecated.h File 622 B 0644
dir.h File 1.96 KB 0644
entropy.h File 8.76 KB 0644
errno.h File 658 B 0644
errno2result.h File 893 B 0644
error.h File 1.4 KB 0644
event.h File 2.98 KB 0644
eventclass.h File 1.35 KB 0644
file.h File 11.43 KB 0644
formatcheck.h File 892 B 0644
fsaccess.h File 7.25 KB 0644
hash.h File 7.52 KB 0644
heap.h File 5.14 KB 0644
hex.h File 2.33 KB 0644
hmacmd5.h File 1.75 KB 0644
hmacsha.h File 4.44 KB 0644
ht.h File 4.29 KB 0644
httpd.h File 2.26 KB 0644
int.h File 1.37 KB 0644
interfaceiter.h File 3.03 KB 0644
iterated_hash.h File 1.02 KB 0644
json.h File 1.42 KB 0644
keyboard.h File 976 B 0644
lang.h File 636 B 0644
lex.h File 9.42 KB 0644
lfsr.h File 2.88 KB 0644
lib.h File 1.04 KB 0644
likely.h File 718 B 0644
list.h File 5.65 KB 0644
log.h File 28.06 KB 0644
magic.h File 993 B 0644
md5.h File 2.34 KB 0644
mem.h File 20.63 KB 0644
meminfo.h File 690 B 0644
msgcat.h File 2.66 KB 0644
msgs.h File 8.22 KB 0644
mutex.h File 3.44 KB 0644
mutexblock.h File 1.34 KB 0644
net.h File 10.32 KB 0644
netaddr.h File 4.56 KB 0644
netdb.h File 862 B 0644
netscope.h File 947 B 0644
offset.h File 699 B 0644
once.h File 981 B 0644
ondestroy.h File 2.79 KB 0644
os.h File 670 B 0644
parseint.h File 1.49 KB 0644
platform.h File 9.31 KB 0644
pool.h File 3.42 KB 0644
portset.h File 3.21 KB 0644
print.h File 2.49 KB 0644
queue.h File 4.66 KB 0644
quota.h File 2.29 KB 0644
radix.h File 6.37 KB 0644
random.h File 2.99 KB 0644
ratelimiter.h File 3.38 KB 0644
refcount.h File 7.89 KB 0644
regex.h File 766 B 0644
region.h File 1.99 KB 0644
resource.h File 2.8 KB 0644
result.h File 4.62 KB 0644
resultclass.h File 1.56 KB 0644
rwlock.h File 3.6 KB 0644
safe.h File 1.21 KB 0644
serial.h File 1.4 KB 0644
sha1.h File 1.52 KB 0644
sha2.h File 5.65 KB 0644
sockaddr.h File 6 KB 0644
socket.h File 35.81 KB 0644
stat.h File 805 B 0644
stats.h File 3.02 KB 0644
stdio.h File 1.74 KB 0644
stdlib.h File 703 B 0644
stdtime.h File 1.3 KB 0644
strerror.h File 776 B 0644
string.h File 5.94 KB 0644
symtab.h File 4.21 KB 0644
syslog.h File 843 B 0644
task.h File 21.08 KB 0644
taskpool.h File 3.61 KB 0644
thread.h File 1.47 KB 0644
time.h File 8.66 KB 0644
timer.h File 10.54 KB 0644
tm.h File 894 B 0644
types.h File 5.54 KB 0644
util.h File 7.49 KB 0644
version.h File 688 B 0644
xml.h File 1.07 KB 0644