From: "Philippe Mathieu-Daudé" <philmd@redhat.com>
To: Richard Henderson <richard.henderson@linaro.org>, qemu-devel@nongnu.org
Cc: Gerd Hoffmann <kraxel@redhat.com>
Subject: Re: [Qemu-devel] [PATCH v3 08/23] ui/vnc: Use gcrypto_random_bytes for start_auth_vnc
Date: Thu, 11 Apr 2019 11:40:21 +0200 [thread overview]
Message-ID: <73b0d19e-aad2-b9f0-1f12-64889e77521d@redhat.com> (raw)
In-Reply-To: <20190315032629.21234-9-richard.henderson@linaro.org>
On 3/15/19 4:26 AM, Richard Henderson wrote:
> Use a better interface for random numbers than rand().
> Fail gracefully if for some reason we cannot use the crypto system.
>
> Cc: Gerd Hoffmann <kraxel@redhat.com>
> Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
> ---
> v2: Use qcrypto_random_bytes, not qemu_getrandom, as there is
> no need for deterministic results for this interface.
> v3: Fail gracefully in the event qcrypto_random_bytes fails.
> ---
> ui/vnc.c | 22 +++++++++++-----------
> 1 file changed, 11 insertions(+), 11 deletions(-)
>
> diff --git a/ui/vnc.c b/ui/vnc.c
> index 785edf3af1..d83f4a6ff9 100644
> --- a/ui/vnc.c
> +++ b/ui/vnc.c
> @@ -43,6 +43,7 @@
> #include "crypto/hash.h"
> #include "crypto/tlscredsanon.h"
> #include "crypto/tlscredsx509.h"
> +#include "crypto/random.h"
> #include "qom/object_interfaces.h"
> #include "qemu/cutils.h"
> #include "io/dns-resolver.h"
> @@ -2547,16 +2548,6 @@ static void authentication_failed(VncState *vs)
> vnc_client_error(vs);
> }
>
> -static void make_challenge(VncState *vs)
> -{
> - int i;
> -
> - srand(time(NULL)+getpid()+getpid()*987654+rand());
> -
> - for (i = 0 ; i < sizeof(vs->challenge) ; i++)
> - vs->challenge[i] = (int) (256.0*rand()/(RAND_MAX+1.0));
> -}
> -
> static int protocol_client_auth_vnc(VncState *vs, uint8_t *data, size_t len)
> {
> unsigned char response[VNC_AUTH_CHALLENGE_SIZE];
> @@ -2628,7 +2619,16 @@ reject:
>
> void start_auth_vnc(VncState *vs)
> {
> - make_challenge(vs);
> + Error *err = NULL;
> +
> + if (qcrypto_random_bytes(vs->challenge, sizeof(vs->challenge), &err)) {
> + trace_vnc_auth_fail(vs, vs->auth, "cannot get random bytes",
> + error_get_pretty(err));
> + error_free(err);
> + authentication_failed(vs);
> + return;
> + }
> +
> /* Send client a 'random' challenge */
> vnc_write(vs, vs->challenge, sizeof(vs->challenge));
> vnc_flush(vs);
>
next prev parent reply other threads:[~2019-04-11 9:40 UTC|newest]
Thread overview: 35+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20190315032629.21234-1-richard.henderson@linaro.org>
[not found] ` <20190315032629.21234-5-richard.henderson@linaro.org>
2019-04-11 9:36 ` [Qemu-devel] [PATCH v3 04/23] crypto: Use O_CLOEXEC in qcrypto_random_init Philippe Mathieu-Daudé
2019-04-11 9:36 ` Philippe Mathieu-Daudé
[not found] ` <20190315032629.21234-8-richard.henderson@linaro.org>
2019-04-11 9:39 ` [Qemu-devel] [PATCH v3 07/23] ui/vnc: Split out authentication_failure Philippe Mathieu-Daudé
2019-04-11 9:39 ` Philippe Mathieu-Daudé
[not found] ` <20190315032629.21234-9-richard.henderson@linaro.org>
2019-04-11 9:40 ` Philippe Mathieu-Daudé [this message]
2019-04-11 9:40 ` [Qemu-devel] [PATCH v3 08/23] ui/vnc: Use gcrypto_random_bytes for start_auth_vnc Philippe Mathieu-Daudé
[not found] ` <20190315032629.21234-10-richard.henderson@linaro.org>
2019-04-11 9:42 ` [Qemu-devel] [PATCH v3 09/23] util: Add qemu_guest_getrandom and associated routines Philippe Mathieu-Daudé
2019-04-11 9:42 ` Philippe Mathieu-Daudé
[not found] ` <20190315032629.21234-11-richard.henderson@linaro.org>
2019-04-11 9:43 ` [Qemu-devel] [PATCH v3 10/23] cpus: Initialize pseudo-random seeds for all guest cpus Philippe Mathieu-Daudé
2019-04-11 9:43 ` Philippe Mathieu-Daudé
[not found] ` <20190315032629.21234-12-richard.henderson@linaro.org>
2019-04-11 9:44 ` [Qemu-devel] [PATCH v3 11/23] linux-user: " Philippe Mathieu-Daudé
2019-04-11 9:44 ` Philippe Mathieu-Daudé
[not found] ` <20190315032629.21234-13-richard.henderson@linaro.org>
2019-04-11 9:49 ` [Qemu-devel] [PATCH v3 12/23] linux-user: Call qcrypto_init if not using -seed Philippe Mathieu-Daudé
2019-04-11 9:49 ` Philippe Mathieu-Daudé
2019-04-13 6:44 ` Richard Henderson
2019-04-13 6:44 ` Richard Henderson
2019-04-15 10:23 ` Philippe Mathieu-Daudé
2019-04-15 10:23 ` Philippe Mathieu-Daudé
2019-04-15 10:28 ` Daniel P. Berrangé
2019-04-15 10:28 ` Daniel P. Berrangé
[not found] ` <20190315032629.21234-15-richard.henderson@linaro.org>
2019-04-11 9:50 ` [Qemu-devel] [PATCH v3 14/23] linux-user/aarch64: Use qemu_guest_getrandom for PAUTH keys Philippe Mathieu-Daudé
2019-04-11 9:50 ` Philippe Mathieu-Daudé
[not found] ` <20190315032629.21234-16-richard.henderson@linaro.org>
2019-04-11 9:51 ` [Qemu-devel] [PATCH v3 15/23] linux-user: Remove srand call Philippe Mathieu-Daudé
2019-04-11 9:51 ` Philippe Mathieu-Daudé
[not found] ` <20190315032629.21234-17-richard.henderson@linaro.org>
2019-04-11 9:51 ` [Qemu-devel] [PATCH v3 16/23] aspeed/scu: Use qemu_guest_getrandom_nofail Philippe Mathieu-Daudé
2019-04-11 9:51 ` Philippe Mathieu-Daudé
[not found] ` <20190315032629.21234-19-richard.henderson@linaro.org>
2019-04-11 9:52 ` [Qemu-devel] [PATCH v3 18/23] hw/misc/bcm2835_rng: " Philippe Mathieu-Daudé
2019-04-11 9:52 ` Philippe Mathieu-Daudé
[not found] ` <20190315032629.21234-20-richard.henderson@linaro.org>
2019-04-11 9:53 ` [Qemu-devel] [PATCH v3 19/23] hw/misc/exynos4210_rng: Use qemu_guest_getrandom Philippe Mathieu-Daudé
2019-04-11 9:53 ` Philippe Mathieu-Daudé
[not found] ` <20190315032629.21234-21-richard.henderson@linaro.org>
2019-04-11 9:54 ` [Qemu-devel] [PATCH v3 20/23] target/arm: Put all PAC keys into a structure Philippe Mathieu-Daudé
2019-04-11 9:54 ` Philippe Mathieu-Daudé
[not found] ` <20190315032629.21234-2-richard.henderson@linaro.org>
2019-04-29 12:57 ` [Qemu-devel] [PATCH v3 01/23] crypto: Merge crypto-obj-y into libqemuutil.a Peter Maydell
2019-04-29 12:57 ` Peter Maydell
2019-05-06 17:01 ` Richard Henderson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=73b0d19e-aad2-b9f0-1f12-64889e77521d@redhat.com \
--to=philmd@redhat.com \
--cc=kraxel@redhat.com \
--cc=qemu-devel@nongnu.org \
--cc=richard.henderson@linaro.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).