summaryrefslogtreecommitdiffstats
path: root/rust/kernel/src/random.rs
blob: bd80c835749dacf4db707ea943d8934f2a936366 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
// SPDX-License-Identifier: GPL-2.0

use core::convert::TryInto;

use crate::{bindings, c_types, error};

/// Fills `dest` with random bytes generated from the kernel's CSPRNG. Ensures
/// that the CSPRNG has been seeded before generating any random bytes, and
/// will block until it's ready.
pub fn getrandom(dest: &mut [u8]) -> error::KernelResult<()> {
    let res = unsafe { bindings::wait_for_random_bytes() };
    if res != 0 {
        return Err(error::Error::from_kernel_errno(res));
    }

    unsafe {
        bindings::get_random_bytes(
            dest.as_mut_ptr() as *mut c_types::c_void,
            dest.len().try_into()?,
        );
    }
    Ok(())
}

/// Fills `dest` with random bytes generated from the kernel's CSPRNG. If the
/// CSPRNG is not yet seeded, returns an `Err(EAGAIN)` immediately.
pub fn getrandom_nonblock(dest: &mut [u8]) -> error::KernelResult<()> {
    if !unsafe { bindings::rng_is_initialized() } {
        return Err(error::Error::EAGAIN);
    }
    getrandom(dest)
}

/// Contributes the contents of `data` to the kernel's entropy pool. Does _not_
/// credit the kernel entropy counter though.
pub fn add_randomness(data: &[u8]) {
    unsafe {
        bindings::add_device_randomness(
            data.as_ptr() as *const c_types::c_void,
            data.len().try_into().unwrap(),
        );
    }
}