blob: 645d88234a6b3386e55f57d0f77f8c7bafc1649d (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
|
// Copyright 2020-2021 The Mumble Developers. All rights reserved.
// Use of this source code is governed by a BSD-style license
// that can be found in the LICENSE file at the root of the
// Mumble source tree or at <https://www.mumble.info/LICENSE>.
#include "CryptographicRandom.h"
#include "arc4random_uniform.h"
#include <QtCore/QDebug>
#include <openssl/rand.h>
void CryptographicRandom::fillBuffer(void *buf, int numBytes) {
// We treat negative and zero values of numBytes to be
// fatal errors in the program. Abort the program if such
// a value is passed to fillBuffer().
if (numBytes <= 0) {
qFatal("CryptographicRandom::fillBuffer(): numBytes is <= 0");
}
// RAND_bytes only returns an error if the entropy pool has not yet been sufficiently filled,
// or in the case of a catastrophic, unrecoverable error in the RAND_bytes implementation happens.
// OpenSSL needs at least 32-bytes of high-entropy random data to seed its CSPRNG.
// If OpenSSL cannot acquire enough random data to seed its CSPRNG at the time Mumble and Murmur
// are running, there is not much we can do about it other than aborting the program.
if (RAND_bytes(reinterpret_cast< unsigned char * >(buf), numBytes) != 1) {
qFatal("CryptographicRandom::fillBuffer(): internal error in OpenSSL's RAND_bytes or entropy pool not yet "
"filled.");
}
}
uint32_t CryptographicRandom::uint32() {
uint32_t ret = 0;
unsigned char buf[4];
CryptographicRandom::fillBuffer(buf, sizeof(buf));
ret = (buf[0]) | (buf[1] << 8) | (buf[2] << 16) | (buf[3] << 24);
return ret;
}
uint32_t CryptographicRandom::uniform(uint32_t upperBound) {
// Implemented in 3rdparty/arc4random/arc4random_uniform.c
return mumble_arc4random_uniform(upperBound);
}
|