2 * IRC - Internet Relay Chat, ircd/random.c
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation; either version 1, or (at your option)
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write to the Free Software
16 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
25 #include "ircd_reply.h"
32 char localkey[9] = "12345678";
34 /* This devious-looking construct rolls a character to the left by r bits */
35 #define char_roll(c, r) (((c) << (r)) | ((c) >> (8 - (r))))
37 /* this routine is intended to be called by the feature subsystem; it takes
38 * a key as found in the .conf and mashes it up for the seed for the random
42 random_seed_set(struct Client* from, const char* const* fields, int count)
48 if (from) /* send an error */
49 return need_more_params(from, "SET");
51 log_write(LS_CONFIG, L_ERROR, 0, "Not enough fields in F line");
56 len = strlen(fields[0]);
58 /* logic is: go through loop at least 8 times, but use all bits of seed */
59 for (i = 0; i < (len < 8 ? 8 : len); i++, p++) {
60 if (!(i % len)) { /* if we've exceeded the string length, reset */
62 roll++; /* so latter part of string looks different from former */
65 /* set the appropriate location of localkey according to the following
66 * rules: first, roll current value by an amount depending on how many
67 * times we've touched this character. Then take seed value and roll
68 * it by an amount depending upon how many times we've touched that
69 * character. Finally, xor the values together.
71 localkey[i % 8] = char_roll(localkey[i % 8], (i / 8) % 8) ^
72 char_roll(*p, roll % 8);
78 /* this is like memcpy except it xors the areas in memory. */
80 memxor(void *dest, void *src, int n)
82 unsigned char *d = (unsigned char *)dest;
83 unsigned char *s = (unsigned char *)src;
90 * MD5 transform algorithm, taken from code written by Colin Plumb,
91 * and put into the public domain
93 * Kev: Taken from Ted T'so's /dev/random random.c code and modified to
94 * be slightly simpler. That code is released under a BSD-style copyright
95 * OR under the terms of the GNU Public License, which should be included
96 * at the top of this source file.
98 * record: Cleaned up to work with ircd. RANDOM_TOKEN is defined in
99 * setup.h by the make script; if people start to "guess" your cookies,
100 * consider recompiling your server with a different random token.
102 * Kev: Now the seed comes from the feature subsystem and is fed into a
103 * mash routine (random_set_seed) that depends on previous values of the
104 * localkey array; also, part of the output of the RNG is fed back into
105 * the localkey array. Finally, the time values are xor'd with the local
106 * key to enhance non-determinability of the data fed into the MD5 core.
109 /* The four core functions - F1 is optimized somewhat */
111 #define F1(x, y, z) (z ^ (x & (y ^ z)))
112 #define F2(x, y, z) F1(z, x, y)
113 #define F3(x, y, z) (x ^ y ^ z)
114 #define F4(x, y, z) (y ^ (x | ~z))
116 /* This is the central step in the MD5 algorithm. */
117 #define MD5STEP(f, w, x, y, z, data, s) \
118 ( w += f(x, y, z) + data, w = w<<s | w>>(32-s), w += x )
121 * The core of the MD5 algorithm, this alters an existing MD5 hash to
122 * reflect the addition of 16 longwords of new data. MD5Update blocks
123 * the data and converts bytes into longwords for this routine.
125 * original comment left in; this used to be called MD5Transform and took
126 * two arguments; I've internalized those arguments, creating the character
127 * array "localkey," which should contain 8 bytes of data. The function also
128 * originally returned nothing; now it returns an unsigned long that is the
129 * random number. It appears to be reallyrandom, so... -Kev
131 * I don't really know what this does. I tried to figure it out and got
132 * a headache. If you know what's good for you, you'll leave this stuff
133 * for the smart people and do something else. -record
135 unsigned int ircrandom(void)
137 unsigned int a, b, c, d;
138 unsigned char in[16];
141 gettimeofday(&tv, 0);
143 memcpy((void *)in, (void *)localkey, 8);
144 memcpy((void *)(in + 8), (void *)localkey, 8);
145 memxor((void *)(in + 8), (void *)&tv.tv_sec, 4);
146 memxor((void *)(in + 12), (void *)&tv.tv_usec, 4);
153 MD5STEP(F1, a, b, c, d, (int)in[0] + 0xd76aa478, 7);
154 MD5STEP(F1, d, a, b, c, (int)in[1] + 0xe8c7b756, 12);
155 MD5STEP(F1, c, d, a, b, (int)in[2] + 0x242070db, 17);
156 MD5STEP(F1, b, c, d, a, (int)in[3] + 0xc1bdceee, 22);
157 MD5STEP(F1, a, b, c, d, (int)in[4] + 0xf57c0faf, 7);
158 MD5STEP(F1, d, a, b, c, (int)in[5] + 0x4787c62a, 12);
159 MD5STEP(F1, c, d, a, b, (int)in[6] + 0xa8304613, 17);
160 MD5STEP(F1, b, c, d, a, (int)in[7] + 0xfd469501, 22);
161 MD5STEP(F1, a, b, c, d, (int)in[8] + 0x698098d8, 7);
162 MD5STEP(F1, d, a, b, c, (int)in[9] + 0x8b44f7af, 12);
163 MD5STEP(F1, c, d, a, b, (int)in[10] + 0xffff5bb1, 17);
164 MD5STEP(F1, b, c, d, a, (int)in[11] + 0x895cd7be, 22);
165 MD5STEP(F1, a, b, c, d, (int)in[12] + 0x6b901122, 7);
166 MD5STEP(F1, d, a, b, c, (int)in[13] + 0xfd987193, 12);
167 MD5STEP(F1, c, d, a, b, (int)in[14] + 0xa679438e, 17);
168 MD5STEP(F1, b, c, d, a, (int)in[15] + 0x49b40821, 22);
170 MD5STEP(F2, a, b, c, d, (int)in[1] + 0xf61e2562, 5);
171 MD5STEP(F2, d, a, b, c, (int)in[6] + 0xc040b340, 9);
172 MD5STEP(F2, c, d, a, b, (int)in[11] + 0x265e5a51, 14);
173 MD5STEP(F2, b, c, d, a, (int)in[0] + 0xe9b6c7aa, 20);
174 MD5STEP(F2, a, b, c, d, (int)in[5] + 0xd62f105d, 5);
175 MD5STEP(F2, d, a, b, c, (int)in[10] + 0x02441453, 9);
176 MD5STEP(F2, c, d, a, b, (int)in[15] + 0xd8a1e681, 14);
177 MD5STEP(F2, b, c, d, a, (int)in[4] + 0xe7d3fbc8, 20);
178 MD5STEP(F2, a, b, c, d, (int)in[9] + 0x21e1cde6, 5);
179 MD5STEP(F2, d, a, b, c, (int)in[14] + 0xc33707d6, 9);
180 MD5STEP(F2, c, d, a, b, (int)in[3] + 0xf4d50d87, 14);
181 MD5STEP(F2, b, c, d, a, (int)in[8] + 0x455a14ed, 20);
182 MD5STEP(F2, a, b, c, d, (int)in[13] + 0xa9e3e905, 5);
183 MD5STEP(F2, d, a, b, c, (int)in[2] + 0xfcefa3f8, 9);
184 MD5STEP(F2, c, d, a, b, (int)in[7] + 0x676f02d9, 14);
185 MD5STEP(F2, b, c, d, a, (int)in[12] + 0x8d2a4c8a, 20);
187 MD5STEP(F3, a, b, c, d, (int)in[5] + 0xfffa3942, 4);
188 MD5STEP(F3, d, a, b, c, (int)in[8] + 0x8771f681, 11);
189 MD5STEP(F3, c, d, a, b, (int)in[11] + 0x6d9d6122, 16);
190 MD5STEP(F3, b, c, d, a, (int)in[14] + 0xfde5380c, 23);
191 MD5STEP(F3, a, b, c, d, (int)in[1] + 0xa4beea44, 4);
192 MD5STEP(F3, d, a, b, c, (int)in[4] + 0x4bdecfa9, 11);
193 MD5STEP(F3, c, d, a, b, (int)in[7] + 0xf6bb4b60, 16);
194 MD5STEP(F3, b, c, d, a, (int)in[10] + 0xbebfbc70, 23);
195 MD5STEP(F3, a, b, c, d, (int)in[13] + 0x289b7ec6, 4);
196 MD5STEP(F3, d, a, b, c, (int)in[0] + 0xeaa127fa, 11);
197 MD5STEP(F3, c, d, a, b, (int)in[3] + 0xd4ef3085, 16);
198 MD5STEP(F3, b, c, d, a, (int)in[6] + 0x04881d05, 23);
199 MD5STEP(F3, a, b, c, d, (int)in[9] + 0xd9d4d039, 4);
200 MD5STEP(F3, d, a, b, c, (int)in[12] + 0xe6db99e5, 11);
201 MD5STEP(F3, c, d, a, b, (int)in[15] + 0x1fa27cf8, 16);
202 MD5STEP(F3, b, c, d, a, (int)in[2] + 0xc4ac5665, 23);
204 MD5STEP(F4, a, b, c, d, (int)in[0] + 0xf4292244, 6);
205 MD5STEP(F4, d, a, b, c, (int)in[7] + 0x432aff97, 10);
206 MD5STEP(F4, c, d, a, b, (int)in[14] + 0xab9423a7, 15);
207 MD5STEP(F4, b, c, d, a, (int)in[5] + 0xfc93a039, 21);
208 MD5STEP(F4, a, b, c, d, (int)in[12] + 0x655b59c3, 6);
209 MD5STEP(F4, d, a, b, c, (int)in[3] + 0x8f0ccc92, 10);
210 MD5STEP(F4, c, d, a, b, (int)in[10] + 0xffeff47d, 15);
211 MD5STEP(F4, b, c, d, a, (int)in[1] + 0x85845dd1, 21);
212 MD5STEP(F4, a, b, c, d, (int)in[8] + 0x6fa87e4f, 6);
213 MD5STEP(F4, d, a, b, c, (int)in[15] + 0xfe2ce6e0, 10);
214 MD5STEP(F4, c, d, a, b, (int)in[6] + 0xa3014314, 15);
215 MD5STEP(F4, b, c, d, a, (int)in[13] + 0x4e0811a1, 21);
216 MD5STEP(F4, a, b, c, d, (int)in[4] + 0xf7537e82, 6);
217 MD5STEP(F4, d, a, b, c, (int)in[11] + 0xbd3af235, 10);
218 MD5STEP(F4, c, d, a, b, (int)in[2] + 0x2ad7d2bb, 15);
219 MD5STEP(F4, b, c, d, a, (int)in[9] + 0xeb86d391, 21);
221 /* This feeds part of the output of the random number generator into the
222 * seed to further obscure any patterns
224 memxor((void *)localkey, (void *)&a, 4);
225 memxor((void *)(localkey + 4), (void *)&b, 4);
228 * We have 4 unsigned longs generated by the above sequence; this scrambles
229 * them together so that if there is any pattern, it will be obscured.
231 * a and b are now part of the state of the random number generator;
232 * returning them is a security hazard.