aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/randentropy/rand_entropy.go
diff options
context:
space:
mode:
authorGustav Simonsson <gustav.simonsson@gmail.com>2015-02-05 00:06:06 +0800
committerGustav Simonsson <gustav.simonsson@gmail.com>2015-02-11 05:49:28 +0800
commit8c056aebe10c8c56f7c25889780b04e00f9ca00b (patch)
tree9186028c43f33dec61d21924866248da2c559330 /crypto/randentropy/rand_entropy.go
parente40c1c62ce0c2d9567066d84ea74fd24b424a81a (diff)
downloadgo-tangerine-8c056aebe10c8c56f7c25889780b04e00f9ca00b.tar
go-tangerine-8c056aebe10c8c56f7c25889780b04e00f9ca00b.tar.gz
go-tangerine-8c056aebe10c8c56f7c25889780b04e00f9ca00b.tar.bz2
go-tangerine-8c056aebe10c8c56f7c25889780b04e00f9ca00b.tar.lz
go-tangerine-8c056aebe10c8c56f7c25889780b04e00f9ca00b.tar.xz
go-tangerine-8c056aebe10c8c56f7c25889780b04e00f9ca00b.tar.zst
go-tangerine-8c056aebe10c8c56f7c25889780b04e00f9ca00b.zip
Set both key generation and ECDSA nonce to use mixed entropy
* Move random entropy functions to new package randentropy * Add function to get n bytes entropy where up to first 32 bytes are mixed with OS entropy sources
Diffstat (limited to 'crypto/randentropy/rand_entropy.go')
-rw-r--r--crypto/randentropy/rand_entropy.go82
1 files changed, 82 insertions, 0 deletions
diff --git a/crypto/randentropy/rand_entropy.go b/crypto/randentropy/rand_entropy.go
new file mode 100644
index 000000000..28181030c
--- /dev/null
+++ b/crypto/randentropy/rand_entropy.go
@@ -0,0 +1,82 @@
+package randentropy
+
+import (
+ crand "crypto/rand"
+ "encoding/binary"
+ "github.com/ethereum/go-ethereum/crypto/sha3"
+ "io"
+ "os"
+ "strings"
+ "time"
+)
+
+type RandEntropy struct {
+}
+
+func (*RandEntropy) Read(bytes []byte) (n int, err error) {
+ readBytes := GetEntropyMixed(len(bytes))
+ copy(bytes, readBytes)
+ return len(bytes), nil
+}
+
+// TODO: copied from crypto.go , move to sha3 package?
+func Sha3(data []byte) []byte {
+ d := sha3.NewKeccak256()
+ d.Write(data)
+
+ return d.Sum(nil)
+}
+
+// TODO: verify. this needs to be audited
+// we start with crypt/rand, then XOR in additional entropy from OS
+func GetEntropyMixed(n int) []byte {
+ startTime := time.Now().UnixNano()
+ // for each source, we take SHA3 of the source and use it as seed to math/rand
+ // then read bytes from it and XOR them onto the bytes read from crypto/rand
+ mainBuff := GetEntropyCSPRNG(n)
+ // 1. OS entropy sources
+ startTimeBytes := make([]byte, 32)
+ binary.PutVarint(startTimeBytes, startTime)
+ startTimeHash := Sha3(startTimeBytes)
+ mixBytes(mainBuff, startTimeHash)
+
+ pid := os.Getpid()
+ pidBytes := make([]byte, 32)
+ binary.PutUvarint(pidBytes, uint64(pid))
+ pidHash := Sha3(pidBytes)
+ mixBytes(mainBuff, pidHash)
+
+ osEnv := os.Environ()
+ osEnvBytes := []byte(strings.Join(osEnv, ""))
+ osEnvHash := Sha3(osEnvBytes)
+ mixBytes(mainBuff, osEnvHash)
+
+ // not all OS have hostname in env variables
+ osHostName, err := os.Hostname()
+ if err != nil {
+ osHostNameBytes := []byte(osHostName)
+ osHostNameHash := Sha3(osHostNameBytes)
+ mixBytes(mainBuff, osHostNameHash)
+ }
+ return mainBuff
+}
+
+func GetEntropyCSPRNG(n int) []byte {
+ mainBuff := make([]byte, n)
+ _, err := io.ReadFull(crand.Reader, mainBuff)
+ if err != nil {
+ panic("reading from crypto/rand failed: " + err.Error())
+ }
+ return mainBuff
+}
+
+func mixBytes(buff []byte, mixBuff []byte) []byte {
+ bytesToMix := len(buff)
+ if bytesToMix > 32 {
+ bytesToMix = 32
+ }
+ for i := 0; i < bytesToMix; i++ {
+ buff[i] ^= mixBuff[i]
+ }
+ return buff
+}