diff options
author | obscuren <geffobscura@gmail.com> | 2015-02-14 06:31:20 +0800 |
---|---|---|
committer | obscuren <geffobscura@gmail.com> | 2015-02-14 06:31:20 +0800 |
commit | 12b2d5762996e37320712a3a9ba505a36bd8aca8 (patch) | |
tree | 479f4ded4908ad7049f2dcf98e836eb5d7f19c53 /crypto/randentropy/rand_entropy.go | |
parent | 95cfaa1b37c417de45cc754b0ade9746f15f0805 (diff) | |
parent | f35d62b75977231bb45d2e298c3f39744c875e67 (diff) | |
download | go-tangerine-12b2d5762996e37320712a3a9ba505a36bd8aca8.tar go-tangerine-12b2d5762996e37320712a3a9ba505a36bd8aca8.tar.gz go-tangerine-12b2d5762996e37320712a3a9ba505a36bd8aca8.tar.bz2 go-tangerine-12b2d5762996e37320712a3a9ba505a36bd8aca8.tar.lz go-tangerine-12b2d5762996e37320712a3a9ba505a36bd8aca8.tar.xz go-tangerine-12b2d5762996e37320712a3a9ba505a36bd8aca8.tar.zst go-tangerine-12b2d5762996e37320712a3a9ba505a36bd8aca8.zip |
Merge branch 'align_key_and_ecdsa_nonce_entropy' of https://github.com/Gustav-Simonsson/go-ethereum into Gustav-Simonsson-align_key_and_ecdsa_nonce_entropy
Diffstat (limited to 'crypto/randentropy/rand_entropy.go')
-rw-r--r-- | crypto/randentropy/rand_entropy.go | 84 |
1 files changed, 84 insertions, 0 deletions
diff --git a/crypto/randentropy/rand_entropy.go b/crypto/randentropy/rand_entropy.go new file mode 100644 index 000000000..b87fa564e --- /dev/null +++ b/crypto/randentropy/rand_entropy.go @@ -0,0 +1,84 @@ +package randentropy + +import ( + crand "crypto/rand" + "encoding/binary" + "github.com/ethereum/go-ethereum/crypto/sha3" + "io" + "os" + "strings" + "time" +) + +var Reader io.Reader = &randEntropy{} + +type randEntropy struct { +} + +func (*randEntropy) Read(bytes []byte) (n int, err error) { + readBytes := GetEntropyMixed(len(bytes)) + copy(bytes, readBytes) + return len(bytes), nil +} + +// TODO: copied from crypto.go , move to sha3 package? +func Sha3(data []byte) []byte { + d := sha3.NewKeccak256() + d.Write(data) + + return d.Sum(nil) +} + +// TODO: verify. this needs to be audited +// we start with crypt/rand, then XOR in additional entropy from OS +func GetEntropyMixed(n int) []byte { + startTime := time.Now().UnixNano() + // for each source, we take SHA3 of the source and use it as seed to math/rand + // then read bytes from it and XOR them onto the bytes read from crypto/rand + mainBuff := GetEntropyCSPRNG(n) + // 1. OS entropy sources + startTimeBytes := make([]byte, 32) + binary.PutVarint(startTimeBytes, startTime) + startTimeHash := Sha3(startTimeBytes) + mixBytes(mainBuff, startTimeHash) + + pid := os.Getpid() + pidBytes := make([]byte, 32) + binary.PutUvarint(pidBytes, uint64(pid)) + pidHash := Sha3(pidBytes) + mixBytes(mainBuff, pidHash) + + osEnv := os.Environ() + osEnvBytes := []byte(strings.Join(osEnv, "")) + osEnvHash := Sha3(osEnvBytes) + mixBytes(mainBuff, osEnvHash) + + // not all OS have hostname in env variables + osHostName, err := os.Hostname() + if err != nil { + osHostNameBytes := []byte(osHostName) + osHostNameHash := Sha3(osHostNameBytes) + mixBytes(mainBuff, osHostNameHash) + } + return mainBuff +} + +func GetEntropyCSPRNG(n int) []byte { + mainBuff := make([]byte, n) + _, err := io.ReadFull(crand.Reader, mainBuff) + if err != nil { + panic("reading from crypto/rand failed: " + err.Error()) + } + return mainBuff +} + +func mixBytes(buff []byte, mixBuff []byte) []byte { + bytesToMix := len(buff) + if bytesToMix > 32 { + bytesToMix = 32 + } + for i := 0; i < bytesToMix; i++ { + buff[i] ^= mixBuff[i] + } + return buff +} |