xref: /openbsd-src/lib/libcrypto/arc4random/getentropy_netbsd.c (revision 87afc19ed9256ae3cb7c5266911abf02218c2a35)
1*87afc19eSderaadt /*	$OpenBSD: getentropy_netbsd.c,v 1.4 2020/10/12 22:08:33 deraadt Exp $	*/
229a36ee6Sbcook 
329a36ee6Sbcook /*
429a36ee6Sbcook  * Copyright (c) 2014 Pawel Jakub Dawidek <pjd@FreeBSD.org>
529a36ee6Sbcook  * Copyright (c) 2014 Brent Cook <bcook@openbsd.org>
629a36ee6Sbcook  *
729a36ee6Sbcook  * Permission to use, copy, modify, and distribute this software for any
829a36ee6Sbcook  * purpose with or without fee is hereby granted, provided that the above
929a36ee6Sbcook  * copyright notice and this permission notice appear in all copies.
1029a36ee6Sbcook  *
1129a36ee6Sbcook  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
1229a36ee6Sbcook  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
1329a36ee6Sbcook  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
1429a36ee6Sbcook  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
1529a36ee6Sbcook  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
1629a36ee6Sbcook  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1729a36ee6Sbcook  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
1829a36ee6Sbcook  *
1929a36ee6Sbcook  * Emulation of getentropy(2) as documented at:
20b8461433Stb  * http://man.openbsd.org/getentropy.2
2129a36ee6Sbcook  */
2229a36ee6Sbcook 
2329a36ee6Sbcook #include <sys/types.h>
2429a36ee6Sbcook #include <sys/sysctl.h>
2529a36ee6Sbcook 
2629a36ee6Sbcook #include <errno.h>
2729a36ee6Sbcook #include <stddef.h>
2829a36ee6Sbcook 
2929a36ee6Sbcook /*
3029a36ee6Sbcook  * Derived from lib/libc/gen/arc4random.c from FreeBSD.
3129a36ee6Sbcook  */
3229a36ee6Sbcook static size_t
getentropy_sysctl(u_char * buf,size_t size)3329a36ee6Sbcook getentropy_sysctl(u_char *buf, size_t size)
3429a36ee6Sbcook {
35*87afc19eSderaadt 	const int mib[2] = { CTL_KERN, KERN_ARND };
3629a36ee6Sbcook 	size_t len, done;
3729a36ee6Sbcook 
3829a36ee6Sbcook 	done = 0;
3929a36ee6Sbcook 
4029a36ee6Sbcook 	do {
4129a36ee6Sbcook 		len = size;
4229a36ee6Sbcook 		if (sysctl(mib, 2, buf, &len, NULL, 0) == -1)
4329a36ee6Sbcook 			return (done);
4429a36ee6Sbcook 		done += len;
4529a36ee6Sbcook 		buf += len;
4629a36ee6Sbcook 		size -= len;
4729a36ee6Sbcook 	} while (size > 0);
4829a36ee6Sbcook 
4929a36ee6Sbcook 	return (done);
5029a36ee6Sbcook }
5129a36ee6Sbcook 
5229a36ee6Sbcook int
getentropy(void * buf,size_t len)5329a36ee6Sbcook getentropy(void *buf, size_t len)
5429a36ee6Sbcook {
5529a36ee6Sbcook 	if (len <= 256 &&
5629a36ee6Sbcook 	    getentropy_sysctl(buf, len) == len) {
57044fc755Sderaadt 		return (0);
5829a36ee6Sbcook 	}
5929a36ee6Sbcook 
6029a36ee6Sbcook 	errno = EIO;
61044fc755Sderaadt 	return (-1);
6229a36ee6Sbcook }
63