|  | /* Copyright (c) 2017, Google Inc. | 
|  | * | 
|  | * Permission to use, copy, modify, and/or distribute this software for any | 
|  | * purpose with or without fee is hereby granted, provided that the above | 
|  | * copyright notice and this permission notice appear in all copies. | 
|  | * | 
|  | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | 
|  | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | 
|  | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY | 
|  | * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | 
|  | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION | 
|  | * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN | 
|  | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ | 
|  |  | 
|  | #include <limits.h> | 
|  |  | 
|  | #include <openssl/rand.h> | 
|  |  | 
|  | #include "../bcm_support.h" | 
|  | #include "../fipsmodule/bcm_interface.h" | 
|  |  | 
|  |  | 
|  | int RAND_bytes(uint8_t *buf, size_t len) { | 
|  | BCM_rand_bytes(buf, len); | 
|  | return 1; | 
|  | } | 
|  |  | 
|  | int RAND_pseudo_bytes(uint8_t *buf, size_t len) { return RAND_bytes(buf, len); } | 
|  |  | 
|  | void RAND_seed(const void *buf, int num) { | 
|  | // OpenSSH calls |RAND_seed| before jailing on the assumption that any needed | 
|  | // file descriptors etc will be opened. | 
|  | uint8_t unused; | 
|  | RAND_bytes(&unused, sizeof(unused)); | 
|  | } | 
|  |  | 
|  | int RAND_load_file(const char *path, long num) { | 
|  | if (num < 0) {  // read the "whole file" | 
|  | return 1; | 
|  | } else if (num <= INT_MAX) { | 
|  | return (int)num; | 
|  | } else { | 
|  | return INT_MAX; | 
|  | } | 
|  | } | 
|  |  | 
|  | const char *RAND_file_name(char *buf, size_t num) { return NULL; } | 
|  |  | 
|  | void RAND_add(const void *buf, int num, double entropy) {} | 
|  |  | 
|  | int RAND_egd(const char *path) { return 255; } | 
|  |  | 
|  | int RAND_poll(void) { return 1; } | 
|  |  | 
|  | int RAND_status(void) { return 1; } | 
|  |  | 
|  | static const struct rand_meth_st kSSLeayMethod = { | 
|  | RAND_seed, RAND_bytes,        RAND_cleanup, | 
|  | RAND_add,  RAND_pseudo_bytes, RAND_status, | 
|  | }; | 
|  |  | 
|  | RAND_METHOD *RAND_SSLeay(void) { return (RAND_METHOD *)&kSSLeayMethod; } | 
|  |  | 
|  | RAND_METHOD *RAND_OpenSSL(void) { return RAND_SSLeay(); } | 
|  |  | 
|  | const RAND_METHOD *RAND_get_rand_method(void) { return RAND_SSLeay(); } | 
|  |  | 
|  | int RAND_set_rand_method(const RAND_METHOD *method) { return 1; } | 
|  |  | 
|  | void RAND_cleanup(void) {} | 
|  |  | 
|  | void RAND_get_system_entropy_for_custom_prng(uint8_t *buf, size_t len) { | 
|  | if (len > 256) { | 
|  | abort(); | 
|  | } | 
|  | CRYPTO_sysrand_for_seed(buf, len); | 
|  | } |