line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package Crypt::Random::Seed; |
2
|
8
|
|
|
8
|
|
8224
|
use strict; |
|
8
|
|
|
|
|
16
|
|
|
8
|
|
|
|
|
281
|
|
3
|
8
|
|
|
8
|
|
44
|
use warnings; |
|
8
|
|
|
|
|
15
|
|
|
8
|
|
|
|
|
206
|
|
4
|
8
|
|
|
8
|
|
55
|
use Fcntl; |
|
8
|
|
|
|
|
12
|
|
|
8
|
|
|
|
|
3380
|
|
5
|
8
|
|
|
8
|
|
57
|
use Carp qw/carp croak/; |
|
8
|
|
|
|
|
16
|
|
|
8
|
|
|
|
|
803
|
|
6
|
|
|
|
|
|
|
|
7
|
|
|
|
|
|
|
# cert insists on using constant, but regular critic doesn't like it. |
8
|
|
|
|
|
|
|
## no critic (constant) |
9
|
|
|
|
|
|
|
|
10
|
|
|
|
|
|
|
BEGIN { |
11
|
8
|
|
|
8
|
|
20
|
$Crypt::Random::Seed::AUTHORITY = 'cpan:DANAJ'; |
12
|
8
|
|
|
|
|
360
|
$Crypt::Random::Seed::VERSION = '0.03'; |
13
|
|
|
|
|
|
|
} |
14
|
|
|
|
|
|
|
|
15
|
8
|
|
|
8
|
|
66
|
use base qw( Exporter ); |
|
8
|
|
|
|
|
24
|
|
|
8
|
|
|
|
|
2125
|
|
16
|
|
|
|
|
|
|
our @EXPORT_OK = qw( ); |
17
|
|
|
|
|
|
|
our %EXPORT_TAGS = (all => [ @EXPORT_OK ]); |
18
|
|
|
|
|
|
|
# Export nothing by default |
19
|
|
|
|
|
|
|
|
20
|
8
|
|
|
8
|
|
54
|
use constant UINT32_SIZE => 4; |
|
8
|
|
|
|
|
17
|
|
|
8
|
|
|
|
|
45254
|
|
21
|
|
|
|
|
|
|
|
22
|
|
|
|
|
|
|
# These are the pre-defined names. We don't let user methods use these. |
23
|
|
|
|
|
|
|
my %defined_methods = map { $_ => 1 } |
24
|
|
|
|
|
|
|
(qw(CryptGenRandom RtlGenRand EGD /dev/random /dev/urandom |
25
|
|
|
|
|
|
|
TESHA2-strong TESHA2-weak)); |
26
|
|
|
|
|
|
|
# If given one of these names as whitelist/blacklist, we add these also. |
27
|
|
|
|
|
|
|
my %name_aliases = ( |
28
|
|
|
|
|
|
|
'Win32' => [qw(RtlGenRand CryptGenRandom)], |
29
|
|
|
|
|
|
|
'TESHA2' => [qw(TESHA2-strong TESHA2-weak)], |
30
|
|
|
|
|
|
|
); |
31
|
|
|
|
|
|
|
|
32
|
|
|
|
|
|
|
sub new { |
33
|
15
|
|
|
15
|
1
|
4634
|
my ($class, %params) = @_; |
34
|
15
|
|
|
|
|
32
|
my $self = {}; |
35
|
|
|
|
|
|
|
|
36
|
|
|
|
|
|
|
# Trying to handle strong vs. weak is fraught with complication, so just |
37
|
|
|
|
|
|
|
# remove the idea entirely. |
38
|
15
|
50
|
|
|
|
50
|
if (defined $params{Weak}) { |
39
|
|
|
|
|
|
|
# In this release, just silently don't use it. |
40
|
0
|
|
|
|
|
0
|
delete $params{Weak}; |
41
|
|
|
|
|
|
|
} |
42
|
|
|
|
|
|
|
|
43
|
15
|
50
|
|
|
|
42
|
if (defined $params{Source}) { |
44
|
0
|
0
|
|
|
|
0
|
if (ref($params{Source}) eq 'CODE') { |
|
|
0
|
|
|
|
|
|
45
|
0
|
|
|
|
|
0
|
$self->{Name} = 'User'; |
46
|
0
|
|
|
|
|
0
|
$self->{SourceSub} = $params{Source}; |
47
|
|
|
|
|
|
|
# We don't know if it is blocking or strong, assume neither |
48
|
0
|
|
|
|
|
0
|
$self->{Blocking} = 0; |
49
|
0
|
|
|
|
|
0
|
$self->{Strong} = 0; |
50
|
|
|
|
|
|
|
} elsif (ref($params{Source}) eq 'ARRAY') { |
51
|
0
|
|
|
|
|
0
|
($self->{Name}, $self->{SourceSub}, $self->{Blocking}, $self->{Strong}) |
52
|
0
|
|
|
|
|
0
|
= @{$params{Source}}; |
53
|
|
|
|
|
|
|
# For sanity, don't let them redefine the standard names. |
54
|
0
|
0
|
|
|
|
0
|
croak "Invalid name: $self->{Name}. Name reserved." |
55
|
|
|
|
|
|
|
if defined $defined_methods{$self->{Name}}; |
56
|
|
|
|
|
|
|
} else { |
57
|
0
|
|
|
|
|
0
|
croak "Invalid 'Source'. Should be code or array reference."; |
58
|
|
|
|
|
|
|
} |
59
|
|
|
|
|
|
|
} else { |
60
|
|
|
|
|
|
|
# This is a sorted list -- the first one that returns true gets used. |
61
|
15
|
|
|
|
|
76
|
my @methodlist = ( |
62
|
|
|
|
|
|
|
\&_try_win32, |
63
|
|
|
|
|
|
|
\&_try_egd, |
64
|
|
|
|
|
|
|
\&_try_dev_random, |
65
|
|
|
|
|
|
|
\&_try_dev_urandom, |
66
|
|
|
|
|
|
|
\&_try_tesha2, |
67
|
|
|
|
|
|
|
); |
68
|
|
|
|
|
|
|
|
69
|
15
|
|
|
|
|
26
|
my %whitelist; |
70
|
15
|
|
|
|
|
23
|
my $have_whitelist = 0; |
71
|
15
|
100
|
|
|
|
45
|
if (defined $params{Only}) { |
72
|
3
|
100
|
|
|
|
224
|
croak "Parameter 'Only' must be an array ref" unless ref($params{Only}) eq 'ARRAY'; |
73
|
2
|
|
|
|
|
3
|
$have_whitelist = 1; |
74
|
2
|
|
|
|
|
5
|
$whitelist{$_} = 1 for @{$params{Only}}; |
|
2
|
|
|
|
|
8
|
|
75
|
2
|
|
|
|
|
12
|
while ( my($name, $list) = each %name_aliases) { |
76
|
4
|
100
|
|
|
|
24
|
@whitelist{@$list} = (1) x scalar @$list if $whitelist{$name}; |
77
|
|
|
|
|
|
|
} |
78
|
|
|
|
|
|
|
} |
79
|
14
|
|
|
|
|
17
|
my %blacklist; |
80
|
14
|
100
|
|
|
|
67
|
if (defined $params{Never}) { |
81
|
2
|
100
|
|
|
|
210
|
croak "Parameter 'Never' must be an array ref" unless ref($params{Never}) eq 'ARRAY'; |
82
|
1
|
|
|
|
|
2
|
$blacklist{$_} = 1 for @{$params{Never}}; |
|
1
|
|
|
|
|
4
|
|
83
|
1
|
|
|
|
|
8
|
while ( my($name, $list) = each %name_aliases) { |
84
|
2
|
50
|
|
|
|
11
|
@blacklist{@$list} = (1) x scalar @$list if $blacklist{$name}; |
85
|
|
|
|
|
|
|
} |
86
|
|
|
|
|
|
|
} |
87
|
|
|
|
|
|
|
|
88
|
13
|
|
|
|
|
28
|
foreach my $m (@methodlist) { |
89
|
47
|
|
|
|
|
124
|
my ($name, $rsub, $isblocking, $isstrong) = $m->(); |
90
|
47
|
100
|
|
|
|
118
|
next unless defined $name; |
91
|
21
|
50
|
66
|
|
|
165
|
next if $isblocking && ($params{NonBlocking} || $params{Nonblocking} || $params{nonblocking}); |
|
|
|
66
|
|
|
|
|
92
|
|
|
|
|
|
|
#next if !$isstrong && !$params{Weak}; |
93
|
18
|
100
|
|
|
|
48
|
next if $blacklist{$name}; |
94
|
17
|
100
|
100
|
|
|
80
|
next if $have_whitelist && !$whitelist{$name}; |
95
|
12
|
|
|
|
|
28
|
$self->{Name} = $name; |
96
|
12
|
|
|
|
|
21
|
$self->{SourceSub} = $rsub; |
97
|
12
|
|
|
|
|
23
|
$self->{Blocking} = $isblocking; |
98
|
12
|
|
|
|
|
18
|
$self->{Strong} = $isstrong; |
99
|
12
|
|
|
|
|
39
|
last; |
100
|
|
|
|
|
|
|
} |
101
|
|
|
|
|
|
|
} |
102
|
|
|
|
|
|
|
# Couldn't find anything appropriate |
103
|
13
|
100
|
|
|
|
43
|
return unless defined $self->{SourceSub}; |
104
|
|
|
|
|
|
|
|
105
|
12
|
|
|
|
|
28
|
bless $self, $class; |
106
|
12
|
|
|
|
|
39
|
return $self; |
107
|
|
|
|
|
|
|
} |
108
|
|
|
|
|
|
|
|
109
|
|
|
|
|
|
|
# Nothing special to do on destroy |
110
|
|
|
|
|
|
|
#sub DESTROY { |
111
|
|
|
|
|
|
|
# my $self = shift; |
112
|
|
|
|
|
|
|
# delete $self->{$_} for keys $self; |
113
|
|
|
|
|
|
|
# return; |
114
|
|
|
|
|
|
|
#} |
115
|
|
|
|
|
|
|
|
116
|
|
|
|
|
|
|
sub name { |
117
|
5
|
|
|
5
|
1
|
1104
|
my $self = shift; |
118
|
5
|
|
|
|
|
34
|
return $self->{Name}; |
119
|
|
|
|
|
|
|
} |
120
|
|
|
|
|
|
|
sub is_blocking { |
121
|
0
|
|
|
0
|
1
|
0
|
my $self = shift; |
122
|
0
|
|
|
|
|
0
|
return $self->{Blocking}; |
123
|
|
|
|
|
|
|
} |
124
|
|
|
|
|
|
|
sub is_strong { |
125
|
0
|
|
|
0
|
1
|
0
|
my $self = shift; |
126
|
0
|
|
|
|
|
0
|
return $self->{Strong}; |
127
|
|
|
|
|
|
|
} |
128
|
|
|
|
|
|
|
sub random_bytes { |
129
|
2
|
|
|
2
|
1
|
7
|
my ($self, $nbytes) = @_; |
130
|
2
|
50
|
33
|
|
|
12
|
return '' unless defined $nbytes && int($nbytes) > 0; |
131
|
2
|
|
|
|
|
9
|
my $rsub = $self->{SourceSub}; |
132
|
2
|
50
|
|
|
|
8
|
return unless defined $rsub; |
133
|
2
|
|
|
|
|
5
|
return $rsub->(int($nbytes)); |
134
|
|
|
|
|
|
|
} |
135
|
|
|
|
|
|
|
sub random_values { |
136
|
7
|
|
|
7
|
1
|
2651
|
my ($self, $nvalues) = @_; |
137
|
7
|
100
|
100
|
|
|
39
|
return unless defined $nvalues && int($nvalues) > 0; |
138
|
2
|
|
|
|
|
9
|
my $rsub = $self->{SourceSub}; |
139
|
2
|
50
|
|
|
|
7
|
return unless defined $rsub; |
140
|
2
|
|
|
|
|
7
|
return unpack( 'L*', $rsub->(UINT32_SIZE * int($nvalues)) ); |
141
|
|
|
|
|
|
|
} |
142
|
|
|
|
|
|
|
|
143
|
|
|
|
|
|
|
|
144
|
|
|
|
|
|
|
sub _try_tesha2 { |
145
|
2
|
50
|
|
2
|
|
3
|
eval { require Crypt::Random::TESHA2; Crypt::Random::TESHA2->import(); 1; } |
|
2
|
|
|
|
|
1028
|
|
|
2
|
|
|
|
|
21265
|
|
|
2
|
|
|
|
|
88
|
|
146
|
|
|
|
|
|
|
or return; |
147
|
2
|
|
|
|
|
7
|
my $isstrong = Crypt::Random::TESHA2::is_strong(); |
148
|
2
|
50
|
|
|
|
16
|
my $name = join('-', 'TESHA2', ($isstrong) ? 'strong' : 'weak'); |
149
|
2
|
|
|
|
|
9
|
return ($name, \&Crypt::Random::TESHA2::random_bytes, 0, 1); |
150
|
|
|
|
|
|
|
} |
151
|
|
|
|
|
|
|
|
152
|
|
|
|
|
|
|
sub _try_dev_urandom { |
153
|
6
|
50
|
|
6
|
|
167
|
return unless -r "/dev/urandom"; |
154
|
6
|
|
|
2
|
|
29
|
return ('/dev/urandom', sub { __read_file('/dev/urandom', @_); }, 0, 0); |
|
2
|
|
|
|
|
7
|
|
155
|
|
|
|
|
|
|
} |
156
|
|
|
|
|
|
|
|
157
|
|
|
|
|
|
|
sub _try_dev_random { |
158
|
13
|
50
|
|
13
|
|
311
|
return unless -r "/dev/random"; |
159
|
|
|
|
|
|
|
# FreeBSD's /dev/random is 256-bit Yarrow non-blocking. |
160
|
|
|
|
|
|
|
# Is it 'strong'? Debatable -- we'll say it is. |
161
|
13
|
50
|
|
|
|
49
|
my $blocking = ($^O eq 'freebsd') ? 0 : 1; |
162
|
13
|
|
|
2
|
|
79
|
return ('/dev/random', sub { __read_file('/dev/random', @_); }, $blocking, 1); |
|
2
|
|
|
|
|
6
|
|
163
|
|
|
|
|
|
|
} |
164
|
|
|
|
|
|
|
|
165
|
|
|
|
|
|
|
sub __read_file { |
166
|
4
|
|
|
4
|
|
6
|
my ($file, $nbytes) = @_; |
167
|
4
|
50
|
33
|
|
|
19
|
return unless defined $nbytes && $nbytes > 0; |
168
|
4
|
|
|
|
|
173
|
sysopen(my $fh, $file, O_RDONLY); |
169
|
4
|
|
|
|
|
13
|
binmode $fh; |
170
|
4
|
|
|
|
|
7
|
my($s, $buffer, $nread) = ('', '', 0); |
171
|
4
|
|
|
|
|
12
|
while ($nread < $nbytes) { |
172
|
4
|
|
|
|
|
57
|
my $thisread = sysread $fh, $buffer, $nbytes-$nread; |
173
|
|
|
|
|
|
|
# Count EOF as an error. |
174
|
4
|
50
|
33
|
|
|
19
|
croak "Error reading $file: $!\n" unless defined $thisread && $thisread > 0; |
175
|
4
|
|
|
|
|
8
|
$s .= $buffer; |
176
|
4
|
|
|
|
|
11
|
$nread += length($buffer); |
177
|
|
|
|
|
|
|
#die unless $nread == length($s); # assert |
178
|
|
|
|
|
|
|
} |
179
|
4
|
50
|
|
|
|
13
|
croak "Internal file read error: wanted $nbytes, read $nread" |
180
|
|
|
|
|
|
|
unless $nbytes == length($s); # assert |
181
|
4
|
|
|
|
|
51
|
return $s; |
182
|
|
|
|
|
|
|
} |
183
|
|
|
|
|
|
|
|
184
|
|
|
|
|
|
|
# Most of this is taken without notice from Crypt::URandom 0.28 and |
185
|
|
|
|
|
|
|
# Crypt::Random::Source::Strong::Win32 0.07. |
186
|
|
|
|
|
|
|
# Kudos to David Dick and Max Kanat-Alexander for doing all the work. |
187
|
|
|
|
|
|
|
# |
188
|
|
|
|
|
|
|
# See some documentation here: |
189
|
|
|
|
|
|
|
# http://msdn.microsoft.com/en-us/library/aa379942.aspx |
190
|
|
|
|
|
|
|
# where they note that the output of these is really a well seeded CSPRNG: |
191
|
|
|
|
|
|
|
# either FIPS 186-2 (older) or AES-CTR (Vista SP1 and newer). |
192
|
|
|
|
|
|
|
|
193
|
|
|
|
|
|
|
sub _try_win32 { |
194
|
13
|
50
|
|
13
|
|
68
|
return unless $^O eq 'MSWin32'; |
195
|
|
|
|
|
|
|
# Cygwin has /dev/random at least as far back as 2000. |
196
|
0
|
0
|
|
|
|
0
|
eval { require Win32; require Win32::API; require Win32::API::Type; 1; } |
|
0
|
|
|
|
|
0
|
|
|
0
|
|
|
|
|
0
|
|
|
0
|
|
|
|
|
0
|
|
|
0
|
|
|
|
|
0
|
|
197
|
|
|
|
|
|
|
or return; |
198
|
|
|
|
|
|
|
|
199
|
8
|
|
|
8
|
|
80
|
use constant CRYPT_SILENT => 0x40; # Never display a UI. |
|
8
|
|
|
|
|
16
|
|
|
8
|
|
|
|
|
528
|
|
200
|
8
|
|
|
8
|
|
38
|
use constant PROV_RSA_FULL => 1; # Which service provider. |
|
8
|
|
|
|
|
17
|
|
|
8
|
|
|
|
|
401
|
|
201
|
8
|
|
|
8
|
|
47
|
use constant VERIFY_CONTEXT => 0xF0000000; # Don't need existing keypairs. |
|
8
|
|
|
|
|
95
|
|
|
8
|
|
|
|
|
348
|
|
202
|
8
|
|
|
8
|
|
120
|
use constant W2K_MAJOR_VERSION => 5; # Windows 2000 |
|
8
|
|
|
|
|
12
|
|
|
8
|
|
|
|
|
455
|
|
203
|
8
|
|
|
8
|
|
113
|
use constant W2K_MINOR_VERSION => 0; |
|
8
|
|
|
|
|
13
|
|
|
8
|
|
|
|
|
10428
|
|
204
|
|
|
|
|
|
|
|
205
|
0
|
|
|
|
|
0
|
my ($major, $minor) = (Win32::GetOSVersion())[1, 2]; |
206
|
0
|
0
|
|
|
|
0
|
return if $major < W2K_MAJOR_VERSION; |
207
|
|
|
|
|
|
|
|
208
|
0
|
0
|
0
|
|
|
0
|
if ($major == W2K_MAJOR_VERSION && $minor == W2K_MINOR_VERSION) { |
209
|
|
|
|
|
|
|
# We are Windows 2000. Use the older CryptGenRandom interface. |
210
|
0
|
|
|
|
|
0
|
my $crypt_acquire_context_a = |
211
|
|
|
|
|
|
|
Win32::API->new( 'advapi32', 'CryptAcquireContextA', 'PPPNN', |
212
|
|
|
|
|
|
|
'I' ); |
213
|
0
|
0
|
|
|
|
0
|
return unless defined $crypt_acquire_context_a; |
214
|
0
|
|
|
|
|
0
|
my $context = chr(0) x Win32::API::Type->sizeof('PULONG'); |
215
|
0
|
|
|
|
|
0
|
my $result = $crypt_acquire_context_a->Call( |
216
|
|
|
|
|
|
|
$context, 0, 0, PROV_RSA_FULL, CRYPT_SILENT | VERIFY_CONTEXT ); |
217
|
0
|
0
|
|
|
|
0
|
return unless $result; |
218
|
0
|
|
|
|
|
0
|
my $pack_type = Win32::API::Type::packing('PULONG'); |
219
|
0
|
|
|
|
|
0
|
$context = unpack $pack_type, $context; |
220
|
0
|
|
|
|
|
0
|
my $crypt_gen_random = |
221
|
|
|
|
|
|
|
Win32::API->new( 'advapi32', 'CryptGenRandom', 'NNP', 'I' ); |
222
|
0
|
0
|
|
|
|
0
|
return unless defined $crypt_gen_random; |
223
|
|
|
|
|
|
|
return ('CryptGenRandom', |
224
|
|
|
|
|
|
|
sub { |
225
|
0
|
|
|
0
|
|
0
|
my $nbytes = shift; |
226
|
0
|
|
|
|
|
0
|
my $buffer = chr(0) x $nbytes; |
227
|
0
|
|
|
|
|
0
|
my $result = $crypt_gen_random->Call($context, $nbytes, $buffer); |
228
|
0
|
0
|
|
|
|
0
|
croak "CryptGenRandom failed: $^E" unless $result; |
229
|
0
|
|
|
|
|
0
|
return $buffer; |
230
|
|
|
|
|
|
|
}, |
231
|
0
|
|
|
|
|
0
|
0, 1); # Assume non-blocking and strong |
232
|
|
|
|
|
|
|
} else { |
233
|
0
|
|
|
|
|
0
|
my $rtlgenrand = Win32::API->new( 'advapi32', <<'_RTLGENRANDOM_PROTO_'); |
234
|
|
|
|
|
|
|
INT SystemFunction036( |
235
|
|
|
|
|
|
|
PVOID RandomBuffer, |
236
|
|
|
|
|
|
|
ULONG RandomBufferLength |
237
|
|
|
|
|
|
|
) |
238
|
|
|
|
|
|
|
_RTLGENRANDOM_PROTO_ |
239
|
0
|
0
|
|
|
|
0
|
return unless defined $rtlgenrand; |
240
|
|
|
|
|
|
|
return ('RtlGenRand', |
241
|
|
|
|
|
|
|
sub { |
242
|
0
|
|
|
0
|
|
0
|
my $nbytes = shift; |
243
|
0
|
|
|
|
|
0
|
my $buffer = chr(0) x $nbytes; |
244
|
0
|
|
|
|
|
0
|
my $result = $rtlgenrand->Call($buffer, $nbytes); |
245
|
0
|
0
|
|
|
|
0
|
croak "RtlGenRand failed: $^E" unless $result; |
246
|
0
|
|
|
|
|
0
|
return $buffer; |
247
|
|
|
|
|
|
|
}, |
248
|
0
|
|
|
|
|
0
|
0, 1); # Assume non-blocking and strong |
249
|
|
|
|
|
|
|
} |
250
|
0
|
|
|
|
|
0
|
return; |
251
|
|
|
|
|
|
|
} |
252
|
|
|
|
|
|
|
|
253
|
|
|
|
|
|
|
sub _try_egd { |
254
|
|
|
|
|
|
|
# For locations, we'll look in the files OpenSSL's RAND_egd looks, as well |
255
|
|
|
|
|
|
|
# as /etc/entropy which egd 0.9 recommends. This also works with PRNGD. |
256
|
|
|
|
|
|
|
# PRNGD uses a seed+CSPRNG so is non-blocking, but we can't tell them apart. |
257
|
13
|
|
|
13
|
|
27
|
foreach my $device (qw( /var/run/egd-pool /dev/egd-pool /etc/egd-pool /etc/entropy )) { |
258
|
52
|
50
|
33
|
|
|
1147
|
next unless -r $device && -S $device; |
259
|
0
|
0
|
|
|
|
0
|
eval { require IO::Socket; 1; } or return; |
|
0
|
|
|
|
|
0
|
|
|
0
|
|
|
|
|
0
|
|
260
|
|
|
|
|
|
|
# We're looking for a socket that returns the entropy available when given |
261
|
|
|
|
|
|
|
# that command. Set timeout to 1 to prevent hanging -- if it is a socket |
262
|
|
|
|
|
|
|
# but won't return the available entropy in under a second, move on. |
263
|
0
|
|
|
|
|
0
|
my $socket = IO::Socket::UNIX->new(Peer => $device, Timeout => 1); |
264
|
0
|
0
|
|
|
|
0
|
next unless $socket; |
265
|
0
|
0
|
|
|
|
0
|
$socket->syswrite( pack("C", 0x00), 1) or next; |
266
|
0
|
0
|
|
|
|
0
|
die if $socket->error; |
267
|
0
|
|
|
|
|
0
|
my($entropy_string, $nread); |
268
|
|
|
|
|
|
|
# Sadly this doesn't honor the timeout. We'll have to do an eval / alarm. |
269
|
|
|
|
|
|
|
# We only timeout here if this is a live socket to a sleeping process. |
270
|
0
|
|
|
|
|
0
|
eval { |
271
|
0
|
|
|
0
|
|
0
|
local $SIG{ALRM} = sub { die "alarm\n" }; |
|
0
|
|
|
|
|
0
|
|
272
|
0
|
|
|
|
|
0
|
alarm 1; |
273
|
0
|
|
|
|
|
0
|
$nread = $socket->sysread($entropy_string, 4); |
274
|
0
|
|
|
|
|
0
|
alarm 0; |
275
|
|
|
|
|
|
|
}; |
276
|
0
|
0
|
|
|
|
0
|
if ($@) { |
277
|
0
|
0
|
|
|
|
0
|
die unless $@ eq "alarm\n"; |
278
|
0
|
|
|
|
|
0
|
next; |
279
|
|
|
|
|
|
|
} |
280
|
0
|
0
|
0
|
|
|
0
|
next unless defined $nread && $nread == 4; |
281
|
0
|
|
|
|
|
0
|
my $entropy_avail = unpack("N", $entropy_string); |
282
|
0
|
|
|
0
|
|
0
|
return ('EGD', sub { __read_egd($device, @_); }, 1, 1); |
|
0
|
|
|
|
|
0
|
|
283
|
|
|
|
|
|
|
} |
284
|
13
|
|
|
|
|
30
|
return; |
285
|
|
|
|
|
|
|
} |
286
|
|
|
|
|
|
|
|
287
|
|
|
|
|
|
|
sub __read_egd { |
288
|
0
|
|
|
0
|
|
|
my ($device, $nbytes) = @_; |
289
|
0
|
0
|
|
|
|
|
return unless defined $device; |
290
|
0
|
0
|
0
|
|
|
|
return unless defined $nbytes && int($nbytes) > 0; |
291
|
0
|
0
|
0
|
|
|
|
croak "$device doesn't exist!" unless -r $device && -S $device; |
292
|
0
|
|
|
|
|
|
my $socket = IO::Socket::UNIX->new(Peer => $device); |
293
|
0
|
0
|
|
|
|
|
croak "Can't talk to EGD on $device. $!" unless $socket; |
294
|
0
|
|
|
|
|
|
my($s, $buffer, $toread) = ('', '', $nbytes); |
295
|
0
|
|
|
|
|
|
while ($toread > 0) { |
296
|
0
|
0
|
|
|
|
|
my $this_request = ($toread > 255) ? 255 : $toread; |
297
|
|
|
|
|
|
|
# Use the blocking interface. |
298
|
0
|
|
|
|
|
|
$socket->syswrite( pack("CC", 0x02, $this_request), 2); |
299
|
0
|
|
|
|
|
|
my $this_grant = $socket->sysread($buffer, $this_request); |
300
|
0
|
0
|
0
|
|
|
|
croak "Error reading EDG data from $device: $!\n" |
301
|
|
|
|
|
|
|
unless defined $this_grant && $this_grant == $this_request; |
302
|
0
|
|
|
|
|
|
$s .= $buffer; |
303
|
0
|
|
|
|
|
|
$toread -= length($buffer); |
304
|
|
|
|
|
|
|
} |
305
|
0
|
0
|
|
|
|
|
croak "Internal EGD read error: wanted $nbytes, read ", length($s), "" |
306
|
|
|
|
|
|
|
unless $nbytes == length($s); # assert |
307
|
0
|
|
|
|
|
|
return $s; |
308
|
|
|
|
|
|
|
} |
309
|
|
|
|
|
|
|
|
310
|
|
|
|
|
|
|
1; |
311
|
|
|
|
|
|
|
|
312
|
|
|
|
|
|
|
__END__ |