1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185
|
package Math::Prime::Util::Entropy;
use strict;
use warnings;
use Carp qw/carp croak confess/;
BEGIN {
$Math::Prime::Util::Entropy::AUTHORITY = 'cpan:DANAJ';
$Math::Prime::Util::Entropy::VERSION = '0.73';
}
sub _read_file {
my($file, $nbytes) = @_;
use Fcntl;
my($s, $buffer, $nread) = ('', '', 0);
return unless -r $file;
sysopen(my $fh, $file, O_RDONLY);
binmode $fh;
while ($nread < $nbytes) {
my $thisread = sysread $fh, $buffer, $nbytes-$nread;
last unless defined $thisread && $thisread > 0;
$s .= $buffer;
$nread += length($buffer);
}
return unless $nbytes == length($s);
return $s;
}
sub _try_urandom {
if (-r "/dev/urandom") {
return ('urandom', sub { _read_file("/dev/urandom",shift); }, 0, 1);
}
if (-r "/dev/random") {
return ('random', sub { _read_file("/dev/random",shift); }, 1, 1);
}
return;
}
sub _try_win32 {
return unless $^O eq 'MSWin32';
eval { require Win32; require Win32::API; require Win32::API::Type; 1; }
or return;
use constant CRYPT_SILENT => 0x40; # Never display a UI.
use constant PROV_RSA_FULL => 1; # Which service provider.
use constant VERIFY_CONTEXT => 0xF0000000; # Don't need existing keepairs
use constant W2K_MAJOR_VERSION => 5; # Windows 2000
use constant W2K_MINOR_VERSION => 0;
my ($major, $minor) = (Win32::GetOSVersion())[1, 2];
return if $major < W2K_MAJOR_VERSION;
if ($major == W2K_MAJOR_VERSION && $minor == W2K_MINOR_VERSION) {
# We are Windows 2000. Use the older CryptGenRandom interface.
my $crypt_acquire_context_a =
Win32::API->new('advapi32','CryptAcquireContextA','PPPNN','I');
return unless defined $crypt_acquire_context_a;
my $context = chr(0) x Win32::API::Type->sizeof('PULONG');
my $result = $crypt_acquire_context_a->Call(
$context, 0, 0, PROV_RSA_FULL, CRYPT_SILENT | VERIFY_CONTEXT );
return unless $result;
my $pack_type = Win32::API::Type::packing('PULONG');
$context = unpack $pack_type, $context;
my $crypt_gen_random =
Win32::API->new( 'advapi32', 'CryptGenRandom', 'NNP', 'I' );
return unless defined $crypt_gen_random;
return ('CryptGenRandom',
sub {
my $nbytes = shift;
my $buffer = chr(0) x $nbytes;
my $result = $crypt_gen_random->Call($context, $nbytes, $buffer);
croak "CryptGenRandom failed: $^E" unless $result;
return $buffer;
}, 0, 1); # Assume non-blocking and strong
} else {
my $rtlgenrand = Win32::API->new( 'advapi32', <<'_RTLGENRANDOM_PROTO_');
INT SystemFunction036(
PVOID RandomBuffer,
ULONG RandomBufferLength
)
_RTLGENRANDOM_PROTO_
return unless defined $rtlgenrand;
return ('RtlGenRand',
sub {
my $nbytes = shift;
my $buffer = chr(0) x $nbytes;
my $result = $rtlgenrand->Call($buffer, $nbytes);
croak "RtlGenRand failed: $^E" unless $result;
return $buffer;
}, 0, 1); # Assume non-blocking and strong
}
return;
}
sub _try_crypt_prng {
return unless eval { require Crypt::PRNG; 1; };
return ('Crypt::PRNG', sub { Crypt::PRNG::random_bytes(shift) }, 0, 1);
}
sub _try_crypt_random_seed {
return unless eval { require Crypt::Random::Seed; 1; };
return ('Crypt::Random::Seed', sub { my $source = Crypt::Random::Seed->new(NonBlocking=>1); return unless $source; $source->random_bytes(shift) }, 0, 1);
}
my $_method;
sub entropy_bytes {
my $nbytes = shift;
my @methodlist = ( \&_try_win32, # All we have for Windows
\&_try_urandom, # Best if available
\&_try_crypt_random_seed, # More sources, fallbacks
\&_try_crypt_prng, # Good CSPRNG, worse seeding
);
if (!defined $_method) {
foreach my $m (@methodlist) {
my ($name, $rsub, $isblocking, $isstrong) = $m->();
if (defined $name) {
$_method = $rsub;
last;
}
}
}
return unless defined $_method;
$_method->($nbytes);
}
1;
__END__
# ABSTRACT: Get a good random seed
=pod
=encoding utf8
=head1 NAME
Math::Prime::Util::Entropy - Get a good random seed
=head1 VERSION
Version 0.73
=head1 SYNOPSIS
=head1 DESCRIPTION
Provides a single method to get a good seed if possible. This is a streamlined
version of L<Crypt::Random::Seed>, with ideas from L<Bytes::Random::Secure::Tiny>.
=head2 entropy_bytes
Takes a number of bytes C<n> and returns either undef (no good seed available) or
a binary string with good entropy.
We try in order:
- the Win32 Crypto API
- /dev/urandom
- /dev/random
- L<Crypt::Random::Seed>
- L<Crypt::PRNG>
=head1 SEE ALSO
L<Math::Prime::Util>
L<Crypt::Random::Seed>
L<Bytes::Random::Secure>
L<Bytes::Random::Secure::Tiny>
L<Crypt::PRNG>
=head1 AUTHORS
Dana Jacobsen E<lt>dana@acm.orgE<gt>
=head1 COPYRIGHT
Copyright 2017 by Dana Jacobsen E<lt>dana@acm.orgE<gt>
This program is free software; you can redistribute it and/or modify it under the same terms as Perl itself.
=cut
|