/* * CDDL HEADER START * * The contents of this file are subject to the terms of the * Common Development and Distribution License, Version 1.0 only * (the "License"). You may not use this file except in compliance * with the License. * * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE * or http://www.opensolaris.org/os/licensing. * See the License for the specific language governing permissions * and limitations under the License. * * When distributing Covered Code, include this CDDL HEADER in each * file and include the License file at usr/src/OPENSOLARIS.LICENSE. * If applicable, add the following below this CDDL HEADER, with the * fields enclosed by brackets "[]" replaced with your own identifying * information: Portions Copyright [yyyy] [name of copyright owner] * * CDDL HEADER END */ /* * Copyright 2005 Sun Microsystems, Inc. All rights reserved. * Use is subject to license terms. */ #pragma ident "%Z%%M% %I% %E% SMI" #include #include #include #include #include #include "softGlobal.h" #include "softRandom.h" #include "softSession.h" CK_RV C_SeedRandom(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pSeed, CK_ULONG ulSeedLen) { CK_RV rv; soft_session_t *session_p; boolean_t lock_held = B_FALSE; int fd; long nwrite; if (!softtoken_initialized) return (CKR_CRYPTOKI_NOT_INITIALIZED); /* Obtain the session pointer just for validity check. */ rv = handle2session(hSession, &session_p); if (rv != CKR_OK) return (rv); SES_REFRELE(session_p, lock_held); if ((pSeed == NULL) || (ulSeedLen == 0)) { return (CKR_ARGUMENTS_BAD); } while ((fd = open(DEV_URANDOM, O_WRONLY)) < 0) { if (errno != EINTR) break; } if (fd == -1) { if (errno == EACCES) return (CKR_RANDOM_SEED_NOT_SUPPORTED); return (CKR_DEVICE_ERROR); } (void) fcntl(fd, F_SETFD, FD_CLOEXEC); nwrite = looping_write(fd, pSeed, ulSeedLen); if (nwrite <= 0) { (void) close(fd); return (CKR_DEVICE_ERROR); } (void) close(fd); return (CKR_OK); } CK_RV C_GenerateRandom(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pRandomData, CK_ULONG ulRandomLen) { CK_RV rv; soft_session_t *session_p; boolean_t lock_held = B_FALSE; if (!softtoken_initialized) return (CKR_CRYPTOKI_NOT_INITIALIZED); /* Obtain the session pointer just for validity check. */ rv = handle2session(hSession, &session_p); if (rv != CKR_OK) return (rv); SES_REFRELE(session_p, lock_held); if ((pRandomData == NULL) || (ulRandomLen == 0)) { return (CKR_ARGUMENTS_BAD); } return (soft_random_generator(pRandomData, ulRandomLen, B_FALSE)); }