mirror of
https://gitlab.freedesktop.org/NetworkManager/NetworkManager.git
synced 2026-02-28 05:10:32 +01:00
core: block to get good random bytes for "/var/lib/NetworkManager/secret_key"
_host_id_read() is the only place where we really care to have good
random numbers, because that is the secret key that we persist to disk.
Previously, we tried only nm_random_get_bytes_full(), which is a best
effort to get strong random numbers. If it fails to generate those,
it would simply remember the generated key in memory and proceed, but not
persist it to disk.
nm_random_get_bytes_full() does not block waiting for good numbers.
Change that. Now, first call nm_random_get_crypto_bytes(), which would
block and try hard to get good random numbers. Only if that fails,
fallback to nm_random_get_bytes_full() as before. The difference is of
course only in early boot, when we might not yet have entropy. In that
case, I think it's better for NetworkManager to block.
(cherry picked from commit 67a5cf7675)
This commit is contained in:
parent
4ca7c9057a
commit
b4bc5e62d2
1 changed files with 4 additions and 1 deletions
|
|
@ -2815,7 +2815,10 @@ _host_id_read(guint8 **out_host_id, gsize *out_host_id_len)
|
|||
int base64_save = 0;
|
||||
gsize len;
|
||||
|
||||
nm_random_get_bytes_full(rnd_buf, sizeof(rnd_buf), &success);
|
||||
if (nm_random_get_crypto_bytes(rnd_buf, sizeof(rnd_buf)) < 0)
|
||||
nm_random_get_bytes_full(rnd_buf, sizeof(rnd_buf), &success);
|
||||
else
|
||||
success = TRUE;
|
||||
|
||||
/* Our key is really binary data. But since we anyway generate a random seed
|
||||
* (with 32 random bytes), don't write it in binary, but instead create
|
||||
|
|
|
|||
Loading…
Add table
Reference in a new issue