mirror of
https://gitlab.freedesktop.org/NetworkManager/NetworkManager.git
synced 2026-01-08 18:50:18 +01:00
Heavily inspired by systemd ([1]).
We now also have nm_random_get_bytes{,_full}() and
nm_random_get_crypto_bytes(), like systemd's random_bytes()
and crypto_random_bytes(), respectively.
Differences:
- instead of systemd's random_bytes(), our nm_random_get_bytes_full()
also estimates whether the output is of high quality. The caller
may find that interesting. Due to that, we will first try to call
getrandom(GRND_NONBLOCK) before getrandom(GRND_INSECURE). That is
reversed from systemd's random_bytes(), because we want to find
out whether we can get good random numbers. In most cases, kernel
should have entropy already, and it makes no difference.
Otherwise, heavily rework the code. It should be easy to understand
and correct.
There is also a major bugfix here. Previously, if getrandom() failed
with ENOSYS and we fell back to /dev/urandom, we would assume that we
have high quality random numbers. That assumption is not warranted.
Now instead poll on /dev/random to find out.
[1] a268e7f402/src/basic/random-util.c (L81)
19 lines
425 B
C
19 lines
425 B
C
/* SPDX-License-Identifier: LGPL-2.1-or-later */
|
|
/*
|
|
* Copyright (C) 2017 Red Hat, Inc.
|
|
*/
|
|
|
|
#ifndef __NM_RANDOM_UTILS_H__
|
|
#define __NM_RANDOM_UTILS_H__
|
|
|
|
void nm_random_get_bytes_full(void *p, size_t n, gboolean *out_high_quality);
|
|
|
|
static inline void
|
|
nm_random_get_bytes(void *p, size_t n)
|
|
{
|
|
nm_random_get_bytes_full(p, n, NULL);
|
|
}
|
|
|
|
int nm_random_get_crypto_bytes(void *p, size_t n);
|
|
|
|
#endif /* __NM_RANDOM_UTILS_H__ */
|