d049b1f2af
Using uint8_t* merely requires useless casts for use with other types to be filled with randomness. Reviewed-by: Laurent Vivier <lvivier@redhat.com> Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com> Reviewed-by: Daniel P. Berrangé <berrange@redhat.com> Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
115 lines
3.1 KiB
C
115 lines
3.1 KiB
C
/*
|
|
* QEMU Crypto random number provider
|
|
*
|
|
* Copyright (c) 2015-2016 Red Hat, Inc.
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
|
|
#include "qemu/osdep.h"
|
|
|
|
#include "crypto/random.h"
|
|
#include "qapi/error.h"
|
|
|
|
#ifdef _WIN32
|
|
#include <wincrypt.h>
|
|
static HCRYPTPROV hCryptProv;
|
|
#else
|
|
# ifdef CONFIG_GETRANDOM
|
|
# include <sys/random.h>
|
|
# endif
|
|
/* This is -1 for getrandom(), or a file handle for /dev/{u,}random. */
|
|
static int fd;
|
|
#endif
|
|
|
|
int qcrypto_random_init(Error **errp)
|
|
{
|
|
#ifdef _WIN32
|
|
if (!CryptAcquireContext(&hCryptProv, NULL, NULL, PROV_RSA_FULL,
|
|
CRYPT_SILENT | CRYPT_VERIFYCONTEXT)) {
|
|
error_setg_win32(errp, GetLastError(),
|
|
"Unable to create cryptographic provider");
|
|
return -1;
|
|
}
|
|
#else
|
|
# ifdef CONFIG_GETRANDOM
|
|
if (getrandom(NULL, 0, 0) == 0) {
|
|
/* Use getrandom() */
|
|
fd = -1;
|
|
return 0;
|
|
}
|
|
/* Fall through to /dev/urandom case. */
|
|
# endif
|
|
fd = open("/dev/urandom", O_RDONLY | O_CLOEXEC);
|
|
if (fd == -1 && errno == ENOENT) {
|
|
fd = open("/dev/random", O_RDONLY | O_CLOEXEC);
|
|
}
|
|
if (fd < 0) {
|
|
error_setg_errno(errp, errno, "No /dev/urandom or /dev/random");
|
|
return -1;
|
|
}
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
int qcrypto_random_bytes(void *buf,
|
|
size_t buflen,
|
|
Error **errp)
|
|
{
|
|
#ifdef _WIN32
|
|
if (!CryptGenRandom(hCryptProv, buflen, buf)) {
|
|
error_setg_win32(errp, GetLastError(),
|
|
"Unable to read random bytes");
|
|
return -1;
|
|
}
|
|
#else
|
|
# ifdef CONFIG_GETRANDOM
|
|
if (likely(fd < 0)) {
|
|
while (1) {
|
|
ssize_t got = getrandom(buf, buflen, 0);
|
|
if (likely(got == buflen)) {
|
|
return 0;
|
|
}
|
|
if (got >= 0) {
|
|
buflen -= got;
|
|
buf += got;
|
|
} else if (errno != EINTR) {
|
|
error_setg_errno(errp, errno, "getrandom");
|
|
return -1;
|
|
}
|
|
}
|
|
}
|
|
/* Fall through to /dev/urandom case. */
|
|
# endif
|
|
while (1) {
|
|
ssize_t got = read(fd, buf, buflen);
|
|
if (likely(got == buflen)) {
|
|
return 0;
|
|
}
|
|
if (got > 0) {
|
|
buflen -= got;
|
|
buf += got;
|
|
} else if (got == 0) {
|
|
error_setg(errp, "Unexpected EOF reading random bytes");
|
|
return -1;
|
|
} else if (errno != EINTR) {
|
|
error_setg_errno(errp, errno, "Unable to read random bytes");
|
|
return -1;
|
|
}
|
|
}
|
|
#endif
|
|
return 0;
|
|
}
|