/*
* cryptsetup kernel RNG access functions
*
- * Copyright (C) 2010-2011, Red Hat, Inc. All rights reserved.
+ * Copyright (C) 2010-2021 Red Hat, Inc. All rights reserved.
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
- * version 2 as published by the Free Software Foundation.
+ * as published by the Free Software Foundation; either version 2
+ * of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
+ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
#include <stdlib.h>
#include <string.h>
-#include <fcntl.h>
#include <errno.h>
#include <assert.h>
+#include <sys/select.h>
#include "libcryptsetup.h"
#include "internal.h"
#define RANDOM_DEVICE_TIMEOUT 5
/* URANDOM_DEVICE access */
-static int _get_urandom(struct crypt_device *ctx, char *buf, size_t len)
+static int _get_urandom(struct crypt_device *ctx __attribute__((unused)),
+ char *buf, size_t len)
{
int r;
size_t old_len = len;
/* Used for CRYPT_RND_NORMAL */
if(urandom_fd == -1)
- urandom_fd = open(URANDOM_DEVICE, O_RDONLY);
+ urandom_fd = open(URANDOM_DEVICE, O_RDONLY | O_CLOEXEC);
if(urandom_fd == -1)
goto fail;
/* Used for CRYPT_RND_KEY */
if(random_fd == -1)
- random_fd = open(RANDOM_DEVICE, O_RDONLY | O_NONBLOCK);
+ random_fd = open(RANDOM_DEVICE, O_RDONLY | O_NONBLOCK | O_CLOEXEC);
if(random_fd == -1)
goto fail;
+ if (crypt_fips_mode())
+ log_verbose(ctx, _("Running in FIPS mode."));
+
random_initialised = 1;
return 0;
fail:
crypt_random_exit();
- log_err(ctx, _("Fatal error during RNG initialisation.\n"));
+ log_err(ctx, _("Fatal error during RNG initialisation."));
return -ENOSYS;
}
case CRYPT_RND_NORMAL:
status = _get_urandom(ctx, buf, len);
break;
+ case CRYPT_RND_SALT:
+ if (crypt_fips_mode())
+ status = crypt_backend_rng(buf, len, quality, 1);
+ else
+ status = _get_urandom(ctx, buf, len);
+ break;
case CRYPT_RND_KEY:
+ if (crypt_fips_mode()) {
+ status = crypt_backend_rng(buf, len, quality, 1);
+ break;
+ }
rng_type = ctx ? crypt_get_rng_type(ctx) :
crypt_random_default_key_rng();
switch (rng_type) {
}
break;
default:
- log_err(ctx, _("Unknown RNG quality requested.\n"));
+ log_err(ctx, _("Unknown RNG quality requested."));
return -EINVAL;
}
if (status)
- log_err(ctx, _("Error %d reading from RNG: %s\n"),
- errno, strerror(errno));
+ log_err(ctx, _("Error reading from RNG."));
return status;
}
-void crypt_random_exit()
+void crypt_random_exit(void)
{
random_initialised = 0;
}
}
-int crypt_random_default_key_rng()
+int crypt_random_default_key_rng(void)
{
+ /* coverity[pointless_string_compare] */
if (!strcmp(DEFAULT_RNG, RANDOM_DEVICE))
return CRYPT_RNG_RANDOM;
+ /* coverity[pointless_string_compare] */
if (!strcmp(DEFAULT_RNG, URANDOM_DEVICE))
return CRYPT_RNG_URANDOM;