xref: /aosp_15_r20/system/keymint/boringssl/src/rng.rs (revision 9860b7637a5f185913c70aa0caabe3ecb78441e4)
1*9860b763SAndroid Build Coastguard Worker // Copyright 2022, The Android Open Source Project
2*9860b763SAndroid Build Coastguard Worker //
3*9860b763SAndroid Build Coastguard Worker // Licensed under the Apache License, Version 2.0 (the "License");
4*9860b763SAndroid Build Coastguard Worker // you may not use this file except in compliance with the License.
5*9860b763SAndroid Build Coastguard Worker // You may obtain a copy of the License at
6*9860b763SAndroid Build Coastguard Worker //
7*9860b763SAndroid Build Coastguard Worker //     http://www.apache.org/licenses/LICENSE-2.0
8*9860b763SAndroid Build Coastguard Worker //
9*9860b763SAndroid Build Coastguard Worker // Unless required by applicable law or agreed to in writing, software
10*9860b763SAndroid Build Coastguard Worker // distributed under the License is distributed on an "AS IS" BASIS,
11*9860b763SAndroid Build Coastguard Worker // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*9860b763SAndroid Build Coastguard Worker // See the License for the specific language governing permissions and
13*9860b763SAndroid Build Coastguard Worker // limitations under the License.
14*9860b763SAndroid Build Coastguard Worker 
15*9860b763SAndroid Build Coastguard Worker //! BoringSSL-based implementation of random number generation.
16*9860b763SAndroid Build Coastguard Worker #[cfg(soong)]
17*9860b763SAndroid Build Coastguard Worker use bssl_sys as ffi;
18*9860b763SAndroid Build Coastguard Worker use kmr_common::crypto;
19*9860b763SAndroid Build Coastguard Worker 
20*9860b763SAndroid Build Coastguard Worker /// [`crypto::Rng`] implementation based on BoringSSL.
21*9860b763SAndroid Build Coastguard Worker #[derive(Default)]
22*9860b763SAndroid Build Coastguard Worker pub struct BoringRng;
23*9860b763SAndroid Build Coastguard Worker 
24*9860b763SAndroid Build Coastguard Worker impl crypto::Rng for BoringRng {
add_entropy(&mut self, data: &[u8])25*9860b763SAndroid Build Coastguard Worker     fn add_entropy(&mut self, data: &[u8]) {
26*9860b763SAndroid Build Coastguard Worker         #[cfg(soong)]
27*9860b763SAndroid Build Coastguard Worker         // Safety: `data` is a valid slice.
28*9860b763SAndroid Build Coastguard Worker         unsafe {
29*9860b763SAndroid Build Coastguard Worker             ffi::RAND_seed(data.as_ptr() as *const libc::c_void, data.len() as libc::c_int);
30*9860b763SAndroid Build Coastguard Worker         }
31*9860b763SAndroid Build Coastguard Worker         #[cfg(not(soong))]
32*9860b763SAndroid Build Coastguard Worker         // Safety: `data` is a valid slice.
33*9860b763SAndroid Build Coastguard Worker         unsafe {
34*9860b763SAndroid Build Coastguard Worker             ffi::RAND_add(
35*9860b763SAndroid Build Coastguard Worker                 data.as_ptr() as *const libc::c_void,
36*9860b763SAndroid Build Coastguard Worker                 data.len() as libc::c_int,
37*9860b763SAndroid Build Coastguard Worker                 data.len() as f64,
38*9860b763SAndroid Build Coastguard Worker             );
39*9860b763SAndroid Build Coastguard Worker         }
40*9860b763SAndroid Build Coastguard Worker     }
fill_bytes(&mut self, dest: &mut [u8])41*9860b763SAndroid Build Coastguard Worker     fn fill_bytes(&mut self, dest: &mut [u8]) {
42*9860b763SAndroid Build Coastguard Worker         openssl::rand::rand_bytes(dest).unwrap(); // safe: BoringSSL's RAND_bytes() never fails
43*9860b763SAndroid Build Coastguard Worker     }
44*9860b763SAndroid Build Coastguard Worker }
45