Author: des
Date: Tue Nov  4 23:02:19 2014
New Revision: 274103
URL: https://svnweb.freebsd.org/changeset/base/274103

Log:
  When reseeding the DPRNG, we're supposed to hash the current key and
  some accumulated entropy twice and use that as the new key.  Due to a
  typo, we were using the output of the first hash round instead of the
  second.  Correct this, but eliminate temp[] since we can reuse hash[].
  Also add comments explaining what is going on and why.
  
  Noticed by:   Sami Farin <sami.fa...@gmail.com>
  Reviewed by:  markm@
  Approved by:  so (des)

Modified:
  head/sys/dev/random/fortuna.c

Modified: head/sys/dev/random/fortuna.c
==============================================================================
--- head/sys/dev/random/fortuna.c       Tue Nov  4 23:02:16 2014        
(r274102)
+++ head/sys/dev/random/fortuna.c       Tue Nov  4 23:02:19 2014        
(r274103)
@@ -25,6 +25,17 @@
  *
  */
 
+/* This implementation of Fortuna is based on the descriptions found in
+ * ISBN 0-471-22357-3 "Practical Cryptography" by Ferguson and Schneier
+ * ("K&S").
+ *
+ * The above book is superceded by ISBN 978-0-470-47424-2 "Cryptography
+ * Engineering" by Ferguson, Schneier and Kohno ("FS&K").
+ *
+ * This code has not yet caught up with FS&K, but differences are not
+ * expected to be complex.
+ */
+
 #include <sys/cdefs.h>
 __FBSDID("$FreeBSD$");
 
@@ -234,27 +245,26 @@ static void
 reseed(uint8_t *junk, u_int length)
 {
        struct randomdev_hash context;
-       uint8_t hash[KEYSIZE], temp[KEYSIZE];
+       uint8_t hash[KEYSIZE];
 
        KASSERT(fortuna_state.minpoolsize > 0, ("random: Fortuna threshold = 
0"));
 #ifdef _KERNEL
        mtx_assert(&random_reseed_mtx, MA_OWNED);
 #endif
 
-       /* F&S - temp = H(K|s) */
+       /* F&S - K = Hd(K|s) where Hd(m) is H(H(m)) */
        randomdev_hash_init(&context);
+#if 0
+       /* FS&K defines Hd(m) as H(H(0^512|m)) */
+       randomdev_hash_iterate(&context, zero_region, KEYSIZE);
+#endif
        randomdev_hash_iterate(&context, &fortuna_state.key, 
sizeof(fortuna_state.key));
        randomdev_hash_iterate(&context, junk, length);
-       randomdev_hash_finish(&context, temp);
-
-       /* F&S - hash = H(temp) */
+       randomdev_hash_finish(&context, hash);
        randomdev_hash_init(&context);
-       randomdev_hash_iterate(&context, temp, KEYSIZE);
+       randomdev_hash_iterate(&context, hash, KEYSIZE);
        randomdev_hash_finish(&context, hash);
-
-       /* F&S - K = hash */
-       randomdev_encrypt_init(&fortuna_state.key, temp);
-       memset(temp, 0, sizeof(temp));
+       randomdev_encrypt_init(&fortuna_state.key, hash);
        memset(hash, 0, sizeof(hash));
 
        /* Unblock the device if it was blocked due to being unseeded */
_______________________________________________
svn-src-head@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/svn-src-head
To unsubscribe, send any mail to "svn-src-head-unsubscr...@freebsd.org"

Reply via email to