summaryrefslogtreecommitdiff
path: root/main.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'main.cpp')
-rw-r--r--main.cpp38
1 files changed, 37 insertions, 1 deletions
diff --git a/main.cpp b/main.cpp
index 8b355a22..ed1ca19c 100644
--- a/main.cpp
+++ b/main.cpp
@@ -34,7 +34,9 @@
#include <stdexcept>
#include <iostream>
-#ifdef _WIN32
+#include "node/Constants.hpp"
+
+#ifdef __WINDOWS__
#include <Windows.h>
#else
#include <unistd.h>
@@ -44,6 +46,8 @@
#include <signal.h>
#endif
+#include <openssl/rand.h>
+
#include "node/Node.hpp"
#include "node/Utils.hpp"
@@ -51,6 +55,36 @@
using namespace ZeroTier;
+// ---------------------------------------------------------------------------
+// Override libcrypto default RAND_ with Utils::getSecureRandom(), which uses
+// a system strong random source. This is because OpenSSL libcrypto's default
+// RAND_ implementation uses uninitialized memory as one of its entropy
+// sources, which plays havoc with all kinds of debuggers and auditing tools.
+
+static void _zeroTier_rand_cleanup() {}
+static void _zeroTier_rand_add(const void *buf, int num, double add_entropy) {}
+static int _zeroTier_rand_status() { return 1; }
+static void _zeroTier_rand_seed(const void *buf, int num) {}
+static int _zeroTier_rand_bytes(unsigned char *buf, int num)
+{
+ Utils::getSecureRandom(buf,num);
+ return 1;
+}
+static RAND_METHOD _zeroTierRandMethod = {
+ _zeroTier_rand_seed,
+ _zeroTier_rand_bytes,
+ _zeroTier_rand_cleanup,
+ _zeroTier_rand_add,
+ _zeroTier_rand_bytes,
+ _zeroTier_rand_status
+};
+static void _initLibCrypto()
+{
+ RAND_set_rand_method(&_zeroTierRandMethod);
+}
+
+// ---------------------------------------------------------------------------
+
static Node *node = (Node *)0;
static void printHelp(const char *cn,FILE *out)
@@ -81,6 +115,8 @@ int main(int argc,char **argv)
signal(SIGQUIT,&sighandlerQuit);
#endif
+ _initLibCrypto();
+
if (argc < 2) {
printHelp(argv[0],stderr);
return ZT_EXEC_RETURN_VALUE_NORMAL_TERMINATION;