[email protected] | ead8c1fa | 2012-05-30 14:26:13 | [diff] [blame] | 1 | // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
[email protected] | 05f9b68 | 2008-09-29 22:18:01 | [diff] [blame] | 2 | // Use of this source code is governed by a BSD-style license that can be |
3 | // found in the LICENSE file. | ||||
4 | |||||
5 | #include "base/rand_util.h" | ||||
6 | |||||
[email protected] | 09e5f47a | 2009-06-26 10:00:02 | [diff] [blame] | 7 | #include <errno.h> |
[email protected] | 05f9b68 | 2008-09-29 22:18:01 | [diff] [blame] | 8 | #include <fcntl.h> |
avi | 9b6f4293 | 2015-12-26 22:15:14 | [diff] [blame] | 9 | #include <stddef.h> |
10 | #include <stdint.h> | ||||
[email protected] | 05f9b68 | 2008-09-29 22:18:01 | [diff] [blame] | 11 | #include <unistd.h> |
12 | |||||
[email protected] | e3177dd5 | 2014-08-13 20:22:14 | [diff] [blame] | 13 | #include "base/files/file_util.h" |
[email protected] | 09e5f47a | 2009-06-26 10:00:02 | [diff] [blame] | 14 | #include "base/lazy_instance.h" |
[email protected] | 05f9b68 | 2008-09-29 22:18:01 | [diff] [blame] | 15 | #include "base/logging.h" |
16 | |||||
[email protected] | 09e5f47a | 2009-06-26 10:00:02 | [diff] [blame] | 17 | namespace { |
18 | |||||
19 | // We keep the file descriptor for /dev/urandom around so we don't need to | ||||
20 | // reopen it (which is expensive), and since we may not even be able to reopen | ||||
21 | // it if we are later put in a sandbox. This class wraps the file descriptor so | ||||
22 | // we can use LazyInstance to handle opening it on the first access. | ||||
23 | class URandomFd { | ||||
24 | public: | ||||
[email protected] | c910c5a | 2014-01-23 02:14:28 | [diff] [blame] | 25 | URandomFd() : fd_(open("/dev/urandom", O_RDONLY)) { |
[email protected] | a42d463 | 2011-10-26 21:48:00 | [diff] [blame] | 26 | DCHECK_GE(fd_, 0) << "Cannot open /dev/urandom: " << errno; |
[email protected] | 09e5f47a | 2009-06-26 10:00:02 | [diff] [blame] | 27 | } |
28 | |||||
[email protected] | c910c5a | 2014-01-23 02:14:28 | [diff] [blame] | 29 | ~URandomFd() { close(fd_); } |
[email protected] | 09e5f47a | 2009-06-26 10:00:02 | [diff] [blame] | 30 | |
31 | int fd() const { return fd_; } | ||||
32 | |||||
33 | private: | ||||
[email protected] | c910c5a | 2014-01-23 02:14:28 | [diff] [blame] | 34 | const int fd_; |
[email protected] | 09e5f47a | 2009-06-26 10:00:02 | [diff] [blame] | 35 | }; |
36 | |||||
[email protected] | 6ecc096 | 2012-12-21 02:59:50 | [diff] [blame] | 37 | base::LazyInstance<URandomFd>::Leaky g_urandom_fd = LAZY_INSTANCE_INITIALIZER; |
[email protected] | 09e5f47a | 2009-06-26 10:00:02 | [diff] [blame] | 38 | |
39 | } // namespace | ||||
40 | |||||
[email protected] | 05f9b68 | 2008-09-29 22:18:01 | [diff] [blame] | 41 | namespace base { |
42 | |||||
[email protected] | 9b20578 | 2012-08-02 20:22:25 | [diff] [blame] | 43 | // NOTE: This function must be cryptographically secure. http://crbug.com/140076 |
avi | 9b6f4293 | 2015-12-26 22:15:14 | [diff] [blame] | 44 | uint64_t RandUint64() { |
45 | uint64_t number; | ||||
[email protected] | c910c5a | 2014-01-23 02:14:28 | [diff] [blame] | 46 | RandBytes(&number, sizeof(number)); |
[email protected] | 05f9b68 | 2008-09-29 22:18:01 | [diff] [blame] | 47 | return number; |
48 | } | ||||
49 | |||||
[email protected] | c910c5a | 2014-01-23 02:14:28 | [diff] [blame] | 50 | void RandBytes(void* output, size_t output_length) { |
51 | const int urandom_fd = g_urandom_fd.Pointer()->fd(); | ||||
52 | const bool success = | ||||
53 | ReadFromFD(urandom_fd, static_cast<char*>(output), output_length); | ||||
54 | CHECK(success); | ||||
55 | } | ||||
56 | |||||
[email protected] | 1d87fad | 2010-03-04 20:18:55 | [diff] [blame] | 57 | int GetUrandomFD(void) { |
58 | return g_urandom_fd.Pointer()->fd(); | ||||
59 | } | ||||
[email protected] | ead8c1fa | 2012-05-30 14:26:13 | [diff] [blame] | 60 | |
61 | } // namespace base |