| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132 | /* * Copyright 2020-2023 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License").  You may not use * this file except in compliance with the License.  You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */#include "rand_local.h"#include "crypto/evp.h"#include "crypto/rand.h"#include "crypto/rand_pool.h"#include "internal/core.h"#include <openssl/core_dispatch.h>#include <openssl/err.h>size_t ossl_rand_get_entropy(ossl_unused OSSL_LIB_CTX *ctx,                             unsigned char **pout, int entropy,                             size_t min_len, size_t max_len){    size_t ret = 0;    size_t entropy_available;    RAND_POOL *pool;    pool = ossl_rand_pool_new(entropy, 1, min_len, max_len);    if (pool == NULL) {        ERR_raise(ERR_LIB_RAND, ERR_R_RAND_LIB);        return 0;    }    /* Get entropy by polling system entropy sources. */    entropy_available = ossl_pool_acquire_entropy(pool);    if (entropy_available > 0) {        ret   = ossl_rand_pool_length(pool);        *pout = ossl_rand_pool_detach(pool);    }    ossl_rand_pool_free(pool);    return ret;}size_t ossl_rand_get_user_entropy(OSSL_LIB_CTX *ctx,                                  unsigned char **pout, int entropy,                                  size_t min_len, size_t max_len){    EVP_RAND_CTX *rng = ossl_rand_get0_seed_noncreating(ctx);    if (rng != NULL && evp_rand_can_seed(rng))        return evp_rand_get_seed(rng, pout, entropy, min_len, max_len,                                 0, NULL, 0);    else        return ossl_rand_get_entropy(ctx, pout, entropy, min_len, max_len);}void ossl_rand_cleanup_entropy(ossl_unused OSSL_LIB_CTX *ctx,                               unsigned char *buf, size_t len){    OPENSSL_secure_clear_free(buf, len);}void ossl_rand_cleanup_user_entropy(OSSL_LIB_CTX *ctx,                                    unsigned char *buf, size_t len){    EVP_RAND_CTX *rng = ossl_rand_get0_seed_noncreating(ctx);    if (rng != NULL && evp_rand_can_seed(rng))        evp_rand_clear_seed(rng, buf, len);    else        OPENSSL_secure_clear_free(buf, len);}size_t ossl_rand_get_nonce(ossl_unused OSSL_LIB_CTX *ctx,                           unsigned char **pout,                           size_t min_len, ossl_unused size_t max_len,                           const void *salt, size_t salt_len){    size_t ret = 0;    RAND_POOL *pool;    pool = ossl_rand_pool_new(0, 0, min_len, max_len);    if (pool == NULL) {        ERR_raise(ERR_LIB_RAND, ERR_R_RAND_LIB);        return 0;    }    if (!ossl_pool_add_nonce_data(pool))        goto err;    if (salt != NULL && !ossl_rand_pool_add(pool, salt, salt_len, 0))        goto err;    ret   = ossl_rand_pool_length(pool);    *pout = ossl_rand_pool_detach(pool); err:    ossl_rand_pool_free(pool);    return ret;}size_t ossl_rand_get_user_nonce(OSSL_LIB_CTX *ctx,                                unsigned char **pout,                                size_t min_len, size_t max_len,                                const void *salt, size_t salt_len){    unsigned char *buf;    EVP_RAND_CTX *rng = ossl_rand_get0_seed_noncreating(ctx);    if (rng == NULL)        return ossl_rand_get_nonce(ctx, pout, min_len, max_len, salt, salt_len);    if ((buf = OPENSSL_malloc(min_len)) == NULL)        return 0;    if (!EVP_RAND_generate(rng, buf, min_len, 0, 0, salt, salt_len)) {        OPENSSL_free(buf);        return 0;    }    *pout = buf;    return min_len;}void ossl_rand_cleanup_nonce(ossl_unused OSSL_LIB_CTX *ctx,                             unsigned char *buf, size_t len){    OPENSSL_clear_free(buf, len);}void ossl_rand_cleanup_user_nonce(ossl_unused OSSL_LIB_CTX *ctx,                                  unsigned char *buf, size_t len){    OPENSSL_clear_free(buf, len);}
 |