diff options
| author | Denys Vlasenko <vda.linux@googlemail.com> | 2022-04-30 15:25:55 +0200 |
|---|---|---|
| committer | Denys Vlasenko <vda.linux@googlemail.com> | 2022-04-30 15:25:55 +0200 |
| commit | 282b61a64921775e5d167df942347a8a3cf984e7 (patch) | |
| tree | 8b2fe93945df65907de62ba25ecfaca7276c7704 /util-linux | |
| parent | 0fa16fc7a2e03d4fadae3cd52f59656277f29f9d (diff) | |
| download | busybox-w32-282b61a64921775e5d167df942347a8a3cf984e7.tar.gz busybox-w32-282b61a64921775e5d167df942347a8a3cf984e7.tar.bz2 busybox-w32-282b61a64921775e5d167df942347a8a3cf984e7.zip | |
seedrng: prepare read_new_seed() to not need a "success" retval
We do not expect /dev/[u]random to be not openable/readable.
If they are, just bail out (something is obviously very wrong).
function old new delta
seedrng_main 1077 1076 -1
.rodata 104939 104929 -10
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
Diffstat (limited to 'util-linux')
| -rw-r--r-- | util-linux/seedrng.c | 22 |
1 files changed, 12 insertions, 10 deletions
diff --git a/util-linux/seedrng.c b/util-linux/seedrng.c index 82c69b72b..3f4c5c0c8 100644 --- a/util-linux/seedrng.c +++ b/util-linux/seedrng.c | |||
| @@ -79,25 +79,27 @@ static int read_new_seed(uint8_t *seed, size_t len, bool *is_creditable) | |||
| 79 | { | 79 | { |
| 80 | ssize_t ret; | 80 | ssize_t ret; |
| 81 | 81 | ||
| 82 | *is_creditable = false; | ||
| 83 | ret = getrandom(seed, len, GRND_NONBLOCK); | 82 | ret = getrandom(seed, len, GRND_NONBLOCK); |
| 84 | if (ret == (ssize_t)len) { | 83 | if (ret == (ssize_t)len) { |
| 85 | *is_creditable = true; | 84 | *is_creditable = true; |
| 86 | return 0; | 85 | return 0; |
| 87 | } else if (ret < 0 && errno == ENOSYS) { | 86 | } |
| 87 | if (ret < 0 && errno == ENOSYS) { | ||
| 88 | struct pollfd random_fd = { | 88 | struct pollfd random_fd = { |
| 89 | .fd = open("/dev/random", O_RDONLY), | 89 | .fd = xopen("/dev/random", O_RDONLY), |
| 90 | .events = POLLIN | 90 | .events = POLLIN |
| 91 | }; | 91 | }; |
| 92 | if (random_fd.fd < 0) | ||
| 93 | return -1; | ||
| 94 | *is_creditable = poll(&random_fd, 1, 0) == 1; | 92 | *is_creditable = poll(&random_fd, 1, 0) == 1; |
| 95 | close(random_fd.fd); | 93 | close(random_fd.fd); |
| 96 | } else if (getrandom(seed, len, GRND_INSECURE) == (ssize_t)len) | 94 | } else { |
| 97 | return 0; | 95 | *is_creditable = false; |
| 98 | if (open_read_close("/dev/urandom", seed, len) == (ssize_t)len) | 96 | if (getrandom(seed, len, GRND_INSECURE) == (ssize_t)len) |
| 99 | return 0; | 97 | return 0; |
| 100 | return -1; | 98 | } |
| 99 | errno = 0; | ||
| 100 | if (open_read_close("/dev/urandom", seed, len) != (ssize_t)len) | ||
| 101 | bb_perror_msg_and_die("can't read '%s'", "/dev/urandom"); | ||
| 102 | return 0; | ||
| 101 | } | 103 | } |
| 102 | 104 | ||
| 103 | static void seed_rng(uint8_t *seed, size_t len, bool credit) | 105 | static void seed_rng(uint8_t *seed, size_t len, bool credit) |
