|  | // Copyright 2017 The BoringSSL Authors | 
|  | // | 
|  | // Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | // you may not use this file except in compliance with the License. | 
|  | // You may obtain a copy of the License at | 
|  | // | 
|  | //     https://www.apache.org/licenses/LICENSE-2.0 | 
|  | // | 
|  | // Unless required by applicable law or agreed to in writing, software | 
|  | // distributed under the License is distributed on an "AS IS" BASIS, | 
|  | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | // See the License for the specific language governing permissions and | 
|  | // limitations under the License. | 
|  |  | 
|  | #include <limits.h> | 
|  |  | 
|  | #include <openssl/rand.h> | 
|  |  | 
|  | #include "../bcm_support.h" | 
|  | #include "../fipsmodule/bcm_interface.h" | 
|  |  | 
|  |  | 
|  | int RAND_bytes(uint8_t *buf, size_t len) { | 
|  | BCM_rand_bytes(buf, len); | 
|  | return 1; | 
|  | } | 
|  |  | 
|  | int RAND_pseudo_bytes(uint8_t *buf, size_t len) { return RAND_bytes(buf, len); } | 
|  |  | 
|  | void RAND_seed(const void *buf, int num) { | 
|  | // OpenSSH calls |RAND_seed| before jailing on the assumption that any needed | 
|  | // file descriptors etc will be opened. | 
|  | uint8_t unused; | 
|  | RAND_bytes(&unused, sizeof(unused)); | 
|  | } | 
|  |  | 
|  | int RAND_load_file(const char *path, long num) { | 
|  | if (num < 0) {  // read the "whole file" | 
|  | return 1; | 
|  | } else if (num <= INT_MAX) { | 
|  | return (int)num; | 
|  | } else { | 
|  | return INT_MAX; | 
|  | } | 
|  | } | 
|  |  | 
|  | const char *RAND_file_name(char *buf, size_t num) { return NULL; } | 
|  |  | 
|  | void RAND_add(const void *buf, int num, double entropy) {} | 
|  |  | 
|  | int RAND_egd(const char *path) { return 255; } | 
|  |  | 
|  | int RAND_poll(void) { return 1; } | 
|  |  | 
|  | int RAND_status(void) { return 1; } | 
|  |  | 
|  | static const struct rand_meth_st kSSLeayMethod = { | 
|  | RAND_seed, RAND_bytes,        RAND_cleanup, | 
|  | RAND_add,  RAND_pseudo_bytes, RAND_status, | 
|  | }; | 
|  |  | 
|  | RAND_METHOD *RAND_SSLeay(void) { return (RAND_METHOD *)&kSSLeayMethod; } | 
|  |  | 
|  | RAND_METHOD *RAND_OpenSSL(void) { return RAND_SSLeay(); } | 
|  |  | 
|  | const RAND_METHOD *RAND_get_rand_method(void) { return RAND_SSLeay(); } | 
|  |  | 
|  | int RAND_set_rand_method(const RAND_METHOD *method) { return 1; } | 
|  |  | 
|  | void RAND_cleanup(void) {} | 
|  |  | 
|  | void RAND_get_system_entropy_for_custom_prng(uint8_t *buf, size_t len) { | 
|  | if (len > 256) { | 
|  | abort(); | 
|  | } | 
|  | CRYPTO_sysrand_for_seed(buf, len); | 
|  | } |