blob: c30dd675d6a0a76b05c6b4a106c4976962868826 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
|
// SPDX-License-Identifier: GPL-2.0
//! Random numbers.
//!
//! C header: [`include/linux/random.h`](../../../../include/linux/random.h)
use crate::{bindings, error::code::*, Error, Result};
/// Fills a byte slice with random bytes generated from the kernel's CSPRNG.
///
/// Ensures that the CSPRNG has been seeded before generating any random bytes,
/// and will block until it is ready.
pub fn getrandom(dest: &mut [u8]) -> Result {
let res = unsafe { bindings::wait_for_random_bytes() };
if res != 0 {
return Err(Error::from_kernel_errno(res));
}
unsafe {
bindings::get_random_bytes(dest.as_mut_ptr() as *mut core::ffi::c_void, dest.len());
}
Ok(())
}
/// Fills a byte slice with random bytes generated from the kernel's CSPRNG.
///
/// If the CSPRNG is not yet seeded, returns an `Err(EAGAIN)` immediately.
pub fn getrandom_nonblock(dest: &mut [u8]) -> Result {
if !unsafe { bindings::rng_is_initialized() } {
return Err(EAGAIN);
}
getrandom(dest)
}
/// Contributes the contents of a byte slice to the kernel's entropy pool.
///
/// Does *not* credit the kernel entropy counter though.
pub fn add_randomness(data: &[u8]) {
unsafe {
bindings::add_device_randomness(data.as_ptr() as *const core::ffi::c_void, data.len());
}
}
|