summary refs log tree commit diff stats
path: root/crypto/random-platform.c
diff options
context:
space:
mode:
authorDaniel P. Berrange <berrange@redhat.com>2016-07-21 10:37:14 +0100
committerDaniel P. Berrange <berrange@redhat.com>2016-07-21 10:46:27 +0100
commitf3c8355c7aaa89a5c5676756d4ba6139ea26b446 (patch)
tree310a074c7ebc5b1d61c2d069736fa3cc0dc0c03a /crypto/random-platform.c
parente66b05e9ca471715388182613217503160ed7a4d (diff)
downloadfocaccia-qemu-f3c8355c7aaa89a5c5676756d4ba6139ea26b446.tar.gz
focaccia-qemu-f3c8355c7aaa89a5c5676756d4ba6139ea26b446.zip
crypto: use /dev/[u]random as a final fallback random source
If neither gcrypt or gnutls are available to provide a
cryptographic random number generator, fallback to consuming
bytes directly from /dev/[u]random.

Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
Diffstat (limited to 'crypto/random-platform.c')
-rw-r--r--crypto/random-platform.c64
1 files changed, 64 insertions, 0 deletions
diff --git a/crypto/random-platform.c b/crypto/random-platform.c
new file mode 100644
index 0000000000..82b755afad
--- /dev/null
+++ b/crypto/random-platform.c
@@ -0,0 +1,64 @@
+/*
+ * QEMU Crypto random number provider
+ *
+ * Copyright (c) 2015-2016 Red Hat, Inc.
+ *
+ * This library is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 2 of the License, or (at your option) any later version.
+ *
+ * This library is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this library; if not, see <http://www.gnu.org/licenses/>.
+ *
+ */
+
+#include "qemu/osdep.h"
+
+#include "crypto/random.h"
+
+int qcrypto_random_bytes(uint8_t *buf G_GNUC_UNUSED,
+                         size_t buflen G_GNUC_UNUSED,
+                         Error **errp)
+{
+    int fd;
+    int ret = -1;
+    int got;
+
+    /* TBD perhaps also add support for BSD getentropy / Linux
+     * getrandom syscalls directly */
+    fd = open("/dev/urandom", O_RDONLY);
+    if (fd == -1 && errno == ENOENT) {
+        fd = open("/dev/random", O_RDONLY);
+    }
+
+    if (fd < 0) {
+        error_setg(errp, "No /dev/urandom or /dev/random found");
+        return -1;
+    }
+
+    while (buflen > 0) {
+        got = read(fd, buf, buflen);
+        if (got < 0) {
+            error_setg_errno(errp, errno,
+                             "Unable to read random bytes");
+            goto cleanup;
+        } else if (!got) {
+            error_setg(errp,
+                       "Unexpected EOF reading random bytes");
+            goto cleanup;
+        }
+        buflen -= got;
+        buf += got;
+    }
+
+    ret = 0;
+ cleanup:
+    close(fd);
+    return ret;
+}