blob: c25f2ee7ebba298720b77420fb082576ff54170a [file] [log] [blame]
/*
* Copyright (C) 2012 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.conscrypt;
import java.io.Serializable;
import java.security.SecureRandomSpi;
public class OpenSSLRandom extends SecureRandomSpi implements Serializable {
private static final long serialVersionUID = 8506210602917522860L;
private boolean mSeeded;
@Override
protected void engineSetSeed(byte[] seed) {
// NOTE: The contract of the SecureRandomSpi does not appear to prohibit self-seeding here
// (in addition to using the provided seed).
selfSeedIfNotSeeded();
NativeCrypto.RAND_seed(seed);
}
@Override
protected void engineNextBytes(byte[] bytes) {
selfSeedIfNotSeeded();
NativeCrypto.RAND_bytes(bytes);
}
@Override
protected byte[] engineGenerateSeed(int numBytes) {
selfSeedIfNotSeeded();
byte[] output = new byte[numBytes];
NativeCrypto.RAND_bytes(output);
return output;
}
/**
* Self-seeds this instance from the Linux RNG. Does nothing if this instance has already been
* seeded.
*/
private void selfSeedIfNotSeeded() {
// NOTE: No need to worry about concurrent access to this field because the worst case is
// that the code below is executed multiple times (by different threads), which may only
// increase the entropy of the OpenSSL PRNG.
if (mSeeded) {
return;
}
seedOpenSSLPRNGFromLinuxRNG();
mSeeded = true;
}
/**
* Obtains a seed from the Linux RNG and mixes it into the OpenSSL PRNG (default RAND engine).
*
* <p>NOTE: This modifies the OpenSSL PRNG shared by all instances of OpenSSLRandom and other
* crypto primitives offered by or built on top of OpenSSL.
*/
public static void seedOpenSSLPRNGFromLinuxRNG() {
int seedLengthInBytes = NativeCrypto.RAND_SEED_LENGTH_IN_BYTES;
int bytesRead = NativeCrypto.RAND_load_file("/dev/urandom", seedLengthInBytes);
if (bytesRead != seedLengthInBytes) {
throw new SecurityException("Failed to read sufficient bytes from /dev/urandom."
+ " Expected: " + seedLengthInBytes + ", actual: " + bytesRead);
}
}
}