2014-11-08 20:31:05 -05:00
|
|
|
# -*- coding: us-ascii -*-
|
2013-05-20 07:37:04 -04:00
|
|
|
begin
|
|
|
|
require 'openssl'
|
|
|
|
rescue LoadError
|
|
|
|
end
|
|
|
|
|
|
|
|
# == Secure random number generator interface.
|
2007-06-09 21:42:51 -04:00
|
|
|
#
|
2007-06-14 01:40:16 -04:00
|
|
|
# This library is an interface for secure random number generator which is
|
|
|
|
# suitable for generating session key in HTTP cookies, etc.
|
2007-06-09 21:42:51 -04:00
|
|
|
#
|
2014-01-31 16:12:49 -05:00
|
|
|
# You can use this library in your application by requiring it:
|
|
|
|
#
|
|
|
|
# require 'securerandom'
|
|
|
|
#
|
2007-06-09 21:42:51 -04:00
|
|
|
# It supports following secure random number generators.
|
|
|
|
#
|
|
|
|
# * openssl
|
|
|
|
# * /dev/urandom
|
2008-01-06 04:11:34 -05:00
|
|
|
# * Win32
|
2007-06-09 21:42:51 -04:00
|
|
|
#
|
2013-05-20 07:37:04 -04:00
|
|
|
# === Examples
|
|
|
|
#
|
|
|
|
# Hexadecimal string.
|
|
|
|
#
|
2014-01-31 16:12:49 -05:00
|
|
|
# require 'securerandom'
|
|
|
|
#
|
2013-05-20 07:37:04 -04:00
|
|
|
# p SecureRandom.hex(10) #=> "52750b30ffbc7de3b362"
|
|
|
|
# p SecureRandom.hex(10) #=> "92b15d6c8dc4beb5f559"
|
|
|
|
# p SecureRandom.hex(13) #=> "39b290146bea6ce975c37cfc23"
|
|
|
|
#
|
|
|
|
# Base64 string.
|
|
|
|
#
|
|
|
|
# p SecureRandom.base64(10) #=> "EcmTPZwWRAozdA=="
|
|
|
|
# p SecureRandom.base64(10) #=> "KO1nIU+p9DKxGg=="
|
|
|
|
# p SecureRandom.base64(12) #=> "7kJSM/MzBJI+75j8"
|
|
|
|
#
|
|
|
|
# Binary string.
|
|
|
|
#
|
|
|
|
# p SecureRandom.random_bytes(10) #=> "\016\t{\370g\310pbr\301"
|
|
|
|
# p SecureRandom.random_bytes(10) #=> "\323U\030TO\234\357\020\a\337"
|
2007-06-09 21:42:51 -04:00
|
|
|
module SecureRandom
|
2014-11-08 14:59:01 -05:00
|
|
|
if /mswin|mingw/ =~ RUBY_PLATFORM
|
2014-11-08 14:02:48 -05:00
|
|
|
require "fiddle/import"
|
|
|
|
|
2014-11-08 14:59:01 -05:00
|
|
|
module AdvApi32 # :nodoc:
|
|
|
|
extend Fiddle::Importer
|
|
|
|
dlload "advapi32"
|
|
|
|
extern "int CryptAcquireContext(void*, void*, void*, unsigned long, unsigned long)"
|
|
|
|
extern "int CryptGenRandom(void*, unsigned long, void*)"
|
2014-11-08 14:02:48 -05:00
|
|
|
|
2014-11-08 14:59:01 -05:00
|
|
|
def self.get_provider
|
|
|
|
hProvStr = " " * Fiddle::SIZEOF_VOIDP
|
|
|
|
prov_rsa_full = 1
|
|
|
|
crypt_verifycontext = 0xF0000000
|
|
|
|
|
|
|
|
if CryptAcquireContext(hProvStr, nil, nil, prov_rsa_full, crypt_verifycontext) == 0
|
|
|
|
raise SystemCallError, "CryptAcquireContext failed: #{lastWin32ErrorMessage}"
|
|
|
|
end
|
|
|
|
type = Fiddle::SIZEOF_VOIDP == Fiddle::SIZEOF_LONG_LONG ? 'q' : 'l'
|
|
|
|
hProv, = hProvStr.unpack(type)
|
|
|
|
hProv
|
2014-11-08 14:02:48 -05:00
|
|
|
end
|
|
|
|
|
2014-11-08 14:59:01 -05:00
|
|
|
def self.gen_random(n)
|
|
|
|
@hProv ||= get_provider
|
|
|
|
bytes = " ".force_encoding("ASCII-8BIT") * n
|
|
|
|
if CryptGenRandom(@hProv, bytes.size, bytes) == 0
|
|
|
|
raise SystemCallError, "CryptGenRandom failed: #{Kernel32.last_error_message}"
|
|
|
|
end
|
|
|
|
bytes
|
|
|
|
end
|
2014-11-08 14:02:48 -05:00
|
|
|
end
|
|
|
|
|
2014-11-08 14:59:01 -05:00
|
|
|
module Kernel32 # :nodoc:
|
|
|
|
extend Fiddle::Importer
|
|
|
|
dlload "kernel32"
|
|
|
|
extern "unsigned long GetLastError()"
|
|
|
|
extern "unsigned long FormatMessageA(unsigned long, void*, unsigned long, unsigned long, void*, unsigned long, void*)"
|
|
|
|
|
|
|
|
# Following code is based on David Garamond's GUID library for Ruby.
|
|
|
|
def self.last_error_message
|
|
|
|
format_message_ignore_inserts = 0x00000200
|
|
|
|
format_message_from_system = 0x00001000
|
|
|
|
|
|
|
|
code = GetLastError()
|
|
|
|
msg = "\0" * 1024
|
|
|
|
len = FormatMessageA(format_message_ignore_inserts + format_message_from_system, 0, code, 0, msg, 1024, nil)
|
|
|
|
msg[0, len].force_encoding("filesystem").tr("\r", '').chomp
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2014-11-08 14:02:48 -05:00
|
|
|
|
2007-06-09 21:42:51 -04:00
|
|
|
# SecureRandom.random_bytes generates a random binary string.
|
|
|
|
#
|
2010-09-11 15:55:08 -04:00
|
|
|
# The argument _n_ specifies the length of the result string.
|
2007-06-09 21:42:51 -04:00
|
|
|
#
|
2013-11-07 13:04:05 -05:00
|
|
|
# If _n_ is not specified or is nil, 16 is assumed.
|
2007-06-09 22:47:41 -04:00
|
|
|
# It may be larger in future.
|
|
|
|
#
|
2009-02-15 02:58:31 -05:00
|
|
|
# The result may contain any byte: "\x00" - "\xff".
|
|
|
|
#
|
|
|
|
# p SecureRandom.random_bytes #=> "\xD8\\\xE0\xF4\r\xB2\xFC*WM\xFF\x83\x18\xF45\xB6"
|
|
|
|
# p SecureRandom.random_bytes #=> "m\xDC\xFC/\a\x00Uf\xB2\xB2P\xBD\xFF6S\x97"
|
|
|
|
#
|
2007-06-09 21:42:51 -04:00
|
|
|
# If secure random number generator is not available,
|
|
|
|
# NotImplementedError is raised.
|
|
|
|
def self.random_bytes(n=nil)
|
2012-05-07 07:15:28 -04:00
|
|
|
n = n ? n.to_int : 16
|
2014-11-08 22:16:24 -05:00
|
|
|
gen_random(n)
|
|
|
|
end
|
2008-01-06 04:11:34 -05:00
|
|
|
|
2014-11-08 22:16:24 -05:00
|
|
|
if defined? OpenSSL::Random
|
|
|
|
def self.gen_random(n)
|
2013-07-11 00:01:47 -04:00
|
|
|
@pid = 0 unless defined?(@pid)
|
2011-06-13 05:36:48 -04:00
|
|
|
pid = $$
|
2013-07-11 00:01:47 -04:00
|
|
|
unless @pid == pid
|
2013-08-31 01:07:56 -04:00
|
|
|
now = Process.clock_gettime(Process::CLOCK_REALTIME, :nanosecond)
|
|
|
|
ary = [now, @pid, pid]
|
2013-04-02 11:09:36 -04:00
|
|
|
OpenSSL::Random.random_add(ary.join("").to_s, 0.0)
|
2011-06-13 05:36:48 -04:00
|
|
|
@pid = pid
|
|
|
|
end
|
2007-06-09 21:42:51 -04:00
|
|
|
return OpenSSL::Random.random_bytes(n)
|
|
|
|
end
|
2014-11-08 22:16:24 -05:00
|
|
|
elsif defined?(AdvApi32)
|
|
|
|
def self.gen_random(n)
|
2014-11-08 15:01:24 -05:00
|
|
|
return AdvApi32.gen_random(n)
|
|
|
|
end
|
|
|
|
|
2014-11-08 22:16:24 -05:00
|
|
|
def self.lastWin32ErrorMessage # :nodoc:
|
|
|
|
# for compatibility
|
|
|
|
return Kernel32.last_error_message
|
|
|
|
end
|
|
|
|
else
|
|
|
|
def self.gen_random(n)
|
2007-06-09 21:42:51 -04:00
|
|
|
flags = File::RDONLY
|
|
|
|
flags |= File::NONBLOCK if defined? File::NONBLOCK
|
|
|
|
flags |= File::NOCTTY if defined? File::NOCTTY
|
|
|
|
begin
|
|
|
|
File.open("/dev/urandom", flags) {|f|
|
|
|
|
unless f.stat.chardev?
|
2014-11-08 22:16:24 -05:00
|
|
|
break
|
2007-06-09 21:42:51 -04:00
|
|
|
end
|
2012-01-02 06:54:52 -05:00
|
|
|
ret = f.read(n)
|
2013-07-11 00:01:47 -04:00
|
|
|
unless ret.length == n
|
2012-05-07 07:15:46 -04:00
|
|
|
raise NotImplementedError, "Unexpected partial read from random device: only #{ret.length} for #{n} bytes"
|
2007-06-09 21:42:51 -04:00
|
|
|
end
|
|
|
|
return ret
|
|
|
|
}
|
|
|
|
rescue Errno::ENOENT
|
2008-01-06 04:11:34 -05:00
|
|
|
end
|
|
|
|
|
2014-11-08 22:16:24 -05:00
|
|
|
raise NotImplementedError, "No random device"
|
|
|
|
end
|
2007-06-09 21:42:51 -04:00
|
|
|
end
|
|
|
|
|
2013-09-20 10:40:08 -04:00
|
|
|
# SecureRandom.hex generates a random hexadecimal string.
|
2007-06-09 21:42:51 -04:00
|
|
|
#
|
2013-09-20 10:40:08 -04:00
|
|
|
# The argument _n_ specifies the length, in bytes, of the random number to be generated.
|
|
|
|
# The length of the resulting hexadecimal string is twice _n_.
|
2007-06-09 21:42:51 -04:00
|
|
|
#
|
2013-11-07 13:04:05 -05:00
|
|
|
# If _n_ is not specified or is nil, 16 is assumed.
|
2007-06-09 22:47:41 -04:00
|
|
|
# It may be larger in future.
|
|
|
|
#
|
2009-02-15 02:58:31 -05:00
|
|
|
# The result may contain 0-9 and a-f.
|
|
|
|
#
|
|
|
|
# p SecureRandom.hex #=> "eb693ec8252cd630102fd0d0fb7c3485"
|
|
|
|
# p SecureRandom.hex #=> "91dc3bfb4de5b11d029d376634589b61"
|
|
|
|
#
|
2007-06-09 21:42:51 -04:00
|
|
|
# If secure random number generator is not available,
|
|
|
|
# NotImplementedError is raised.
|
|
|
|
def self.hex(n=nil)
|
|
|
|
random_bytes(n).unpack("H*")[0]
|
|
|
|
end
|
|
|
|
|
|
|
|
# SecureRandom.base64 generates a random base64 string.
|
|
|
|
#
|
2013-11-07 13:04:05 -05:00
|
|
|
# The argument _n_ specifies the length, in bytes, of the random number
|
|
|
|
# to be generated. The length of the result string is about 4/3 of _n_.
|
2007-06-09 21:42:51 -04:00
|
|
|
#
|
2013-11-07 13:04:05 -05:00
|
|
|
# If _n_ is not specified or is nil, 16 is assumed.
|
2007-06-09 22:47:41 -04:00
|
|
|
# It may be larger in future.
|
|
|
|
#
|
2009-02-15 02:58:31 -05:00
|
|
|
# The result may contain A-Z, a-z, 0-9, "+", "/" and "=".
|
|
|
|
#
|
|
|
|
# p SecureRandom.base64 #=> "/2BuBuLf3+WfSKyQbRcc/A=="
|
|
|
|
# p SecureRandom.base64 #=> "6BbW0pxO0YENxn38HMUbcQ=="
|
|
|
|
#
|
2007-06-09 21:42:51 -04:00
|
|
|
# If secure random number generator is not available,
|
|
|
|
# NotImplementedError is raised.
|
2009-02-15 02:58:31 -05:00
|
|
|
#
|
2010-09-11 15:55:08 -04:00
|
|
|
# See RFC 3548 for the definition of base64.
|
2007-06-09 21:42:51 -04:00
|
|
|
def self.base64(n=nil)
|
|
|
|
[random_bytes(n)].pack("m*").delete("\n")
|
|
|
|
end
|
|
|
|
|
2009-02-15 02:58:31 -05:00
|
|
|
# SecureRandom.urlsafe_base64 generates a random URL-safe base64 string.
|
|
|
|
#
|
2013-11-07 13:04:05 -05:00
|
|
|
# The argument _n_ specifies the length, in bytes, of the random number
|
|
|
|
# to be generated. The length of the result string is about 4/3 of _n_.
|
2009-02-15 02:58:31 -05:00
|
|
|
#
|
2013-11-07 13:04:05 -05:00
|
|
|
# If _n_ is not specified or is nil, 16 is assumed.
|
2009-02-15 02:58:31 -05:00
|
|
|
# It may be larger in future.
|
|
|
|
#
|
2009-03-06 09:36:33 -05:00
|
|
|
# The boolean argument _padding_ specifies the padding.
|
|
|
|
# If it is false or nil, padding is not generated.
|
|
|
|
# Otherwise padding is generated.
|
|
|
|
# By default, padding is not generated because "=" may be used as a URL delimiter.
|
2009-02-15 02:58:31 -05:00
|
|
|
#
|
2009-03-02 11:56:40 -05:00
|
|
|
# The result may contain A-Z, a-z, 0-9, "-" and "_".
|
2009-03-06 09:36:33 -05:00
|
|
|
# "=" is also used if _padding_ is true.
|
2009-03-02 11:56:40 -05:00
|
|
|
#
|
|
|
|
# p SecureRandom.urlsafe_base64 #=> "b4GOKm4pOYU_-BOXcrUGDg"
|
|
|
|
# p SecureRandom.urlsafe_base64 #=> "UZLdOkzop70Ddx-IJR0ABg"
|
2009-02-15 02:58:31 -05:00
|
|
|
#
|
2009-03-06 09:36:33 -05:00
|
|
|
# p SecureRandom.urlsafe_base64(nil, true) #=> "i0XQ-7gglIsHGV2_BNPrdQ=="
|
|
|
|
# p SecureRandom.urlsafe_base64(nil, true) #=> "-M8rLhr7JEpJlqFGUMmOxg=="
|
|
|
|
#
|
2009-02-15 02:58:31 -05:00
|
|
|
# If secure random number generator is not available,
|
|
|
|
# NotImplementedError is raised.
|
|
|
|
#
|
2010-09-11 15:55:08 -04:00
|
|
|
# See RFC 3548 for the definition of URL-safe base64.
|
2009-03-06 09:36:33 -05:00
|
|
|
def self.urlsafe_base64(n=nil, padding=false)
|
2009-02-15 02:58:31 -05:00
|
|
|
s = [random_bytes(n)].pack("m*")
|
|
|
|
s.delete!("\n")
|
|
|
|
s.tr!("+/", "-_")
|
2013-07-11 00:01:47 -04:00
|
|
|
s.delete!("=") unless padding
|
2009-02-15 02:58:31 -05:00
|
|
|
s
|
|
|
|
end
|
|
|
|
|
2007-06-09 21:42:51 -04:00
|
|
|
# SecureRandom.random_number generates a random number.
|
|
|
|
#
|
2010-09-11 15:55:08 -04:00
|
|
|
# If a positive integer is given as _n_,
|
2007-06-09 21:42:51 -04:00
|
|
|
# SecureRandom.random_number returns an integer:
|
|
|
|
# 0 <= SecureRandom.random_number(n) < n.
|
|
|
|
#
|
2009-02-15 02:58:31 -05:00
|
|
|
# p SecureRandom.random_number(100) #=> 15
|
|
|
|
# p SecureRandom.random_number(100) #=> 88
|
|
|
|
#
|
2007-06-09 21:42:51 -04:00
|
|
|
# If 0 is given or an argument is not given,
|
2010-09-11 15:55:08 -04:00
|
|
|
# SecureRandom.random_number returns a float:
|
2007-06-09 21:42:51 -04:00
|
|
|
# 0.0 <= SecureRandom.random_number() < 1.0.
|
2009-02-15 02:58:31 -05:00
|
|
|
#
|
|
|
|
# p SecureRandom.random_number #=> 0.596506046187744
|
|
|
|
# p SecureRandom.random_number #=> 0.350621695741409
|
|
|
|
#
|
2007-06-09 21:42:51 -04:00
|
|
|
def self.random_number(n=0)
|
|
|
|
if 0 < n
|
2014-08-08 07:00:47 -04:00
|
|
|
if defined? OpenSSL::BN
|
|
|
|
OpenSSL::BN.rand_range(n).to_i
|
|
|
|
else
|
|
|
|
hex = n.to_s(16)
|
|
|
|
hex = '0' + hex if (hex.length & 1) == 1
|
|
|
|
bin = [hex].pack("H*")
|
|
|
|
mask = bin[0].ord
|
|
|
|
mask |= mask >> 1
|
|
|
|
mask |= mask >> 2
|
|
|
|
mask |= mask >> 4
|
|
|
|
begin
|
|
|
|
rnd = SecureRandom.random_bytes(bin.length)
|
|
|
|
rnd[0] = (rnd[0].ord & mask).chr
|
|
|
|
end until rnd < bin
|
|
|
|
rnd.unpack("H*")[0].hex
|
|
|
|
end
|
2007-06-09 21:42:51 -04:00
|
|
|
else
|
|
|
|
# assumption: Float::MANT_DIG <= 64
|
2014-08-08 07:00:47 -04:00
|
|
|
if defined? OpenSSL::BN
|
|
|
|
i64 = OpenSSL::BN.rand(64, -1).to_i
|
|
|
|
else
|
|
|
|
i64 = SecureRandom.random_bytes(8).unpack("Q")[0]
|
|
|
|
end
|
2007-06-09 21:42:51 -04:00
|
|
|
Math.ldexp(i64 >> (64-Float::MANT_DIG), -Float::MANT_DIG)
|
|
|
|
end
|
|
|
|
end
|
2008-01-06 04:11:34 -05:00
|
|
|
|
2009-03-01 07:59:59 -05:00
|
|
|
# SecureRandom.uuid generates a v4 random UUID (Universally Unique IDentifier).
|
2009-02-15 02:58:31 -05:00
|
|
|
#
|
|
|
|
# p SecureRandom.uuid #=> "2d931510-d99f-494a-8c67-87feb05e1594"
|
2009-08-19 16:21:19 -04:00
|
|
|
# p SecureRandom.uuid #=> "bad85eb9-0713-4da7-8d36-07a8e4b00eab"
|
2009-02-15 02:58:31 -05:00
|
|
|
# p SecureRandom.uuid #=> "62936e70-1815-439b-bf89-8492855a7e6b"
|
|
|
|
#
|
2009-04-26 11:47:24 -04:00
|
|
|
# The version 4 UUID is purely random (except the version).
|
|
|
|
# It doesn't contain meaningful information such as MAC address, time, etc.
|
|
|
|
#
|
|
|
|
# See RFC 4122 for details of UUID.
|
|
|
|
#
|
2009-01-28 22:20:26 -05:00
|
|
|
def self.uuid
|
2009-01-28 23:16:17 -05:00
|
|
|
ary = self.random_bytes(16).unpack("NnnnnN")
|
|
|
|
ary[2] = (ary[2] & 0x0fff) | 0x4000
|
|
|
|
ary[3] = (ary[3] & 0x3fff) | 0x8000
|
2009-01-28 22:20:26 -05:00
|
|
|
"%08x-%04x-%04x-%04x-%04x%08x" % ary
|
|
|
|
end
|
2007-06-09 21:42:51 -04:00
|
|
|
end
|