X-Git-Url: https://tinc-vpn.org/git/browse?a=blobdiff_plain;f=src%2Fopenssl%2Fcrypto.c;h=c2df0af3e4cbae396742a6695f25c2aed2f1d618;hb=dcf9e6c3e444fd39318f8d5b261bdc22e5031f67;hp=5b866b0b0293c34c8198872f51fa4bbb59b80977;hpb=3df86ef17bce9f24c3dad79ccc2b17aa6e93ea34;p=tinc diff --git a/src/openssl/crypto.c b/src/openssl/crypto.c index 5b866b0b..c2df0af3 100644 --- a/src/openssl/crypto.c +++ b/src/openssl/crypto.c @@ -1,6 +1,6 @@ /* crypto.c -- Cryptographic miscellaneous functions and initialisation - Copyright (C) 2007-2014 Guus Sliepen + Copyright (C) 2007-2021 Guus Sliepen This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -20,7 +20,6 @@ #include "../system.h" #include -#include #include #include "../crypto.h" @@ -31,8 +30,11 @@ static int random_fd = -1; static void random_init(void) { random_fd = open("/dev/urandom", O_RDONLY); - if(random_fd < 0) + + if(random_fd < 0) { random_fd = open("/dev/random", O_RDONLY); + } + if(random_fd < 0) { fprintf(stderr, "Could not open source of random numbers: %s\n", strerror(errno)); abort(); @@ -43,15 +45,21 @@ static void random_exit(void) { close(random_fd); } -void randomize(void *out, size_t outlen) { +void randomize(void *vout, size_t outlen) { + uint8_t *out = vout; + while(outlen) { - size_t len = read(random_fd, out, outlen); + ssize_t len = read(random_fd, out, outlen); + if(len <= 0) { - if(errno == EAGAIN || errno == EINTR) + if(len == -1 && (errno == EAGAIN || errno == EINTR)) { continue; + } + fprintf(stderr, "Could not read random numbers: %s\n", strerror(errno)); abort(); } + out += len; outlen -= len; } @@ -62,14 +70,14 @@ void randomize(void *out, size_t outlen) { #include HCRYPTPROV prov; -void random_init(void) { +static void random_init(void) { if(!CryptAcquireContext(&prov, NULL, NULL, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT)) { fprintf(stderr, "CryptAcquireContext() failed!\n"); abort(); } } -void random_exit(void) { +static void random_exit(void) { CryptReleaseContext(prov, 0); } @@ -85,11 +93,9 @@ void randomize(void *out, size_t outlen) { void crypto_init(void) { random_init(); +#if OPENSSL_VERSION_MAJOR < 3 ENGINE_load_builtin_engines(); - ENGINE_register_all_complete(); - - ERR_load_crypto_strings(); - OpenSSL_add_all_algorithms(); +#endif if(!RAND_status()) { fprintf(stderr, "Not enough entropy for the PRNG!\n"); @@ -98,8 +104,5 @@ void crypto_init(void) { } void crypto_exit(void) { - EVP_cleanup(); - ERR_free_strings(); - ENGINE_cleanup(); random_exit(); }