2021-01-18 15:20:06 +03:00
|
|
|
// Copyright (c) 2019-2021 Alexander Medvednikov. All rights reserved.
|
2019-07-31 04:24:12 +03:00
|
|
|
// Use of this source code is governed by an MIT license
|
|
|
|
// that can be found in the LICENSE file.
|
|
|
|
module rand
|
|
|
|
|
|
|
|
#include <sys/syscall.h>
|
|
|
|
const (
|
2019-10-24 14:48:20 +03:00
|
|
|
read_batch_size = 256
|
2019-07-31 04:24:12 +03:00
|
|
|
)
|
|
|
|
|
2021-01-23 15:33:49 +03:00
|
|
|
// read returns an array of `bytes_needed` random bytes read from the OS.
|
2020-07-05 01:33:36 +03:00
|
|
|
pub fn read(bytes_needed int) ?[]byte {
|
|
|
|
mut buffer := &byte(0)
|
|
|
|
unsafe {
|
|
|
|
buffer = malloc(bytes_needed)
|
|
|
|
}
|
|
|
|
mut bstart := buffer
|
2019-07-31 04:24:12 +03:00
|
|
|
mut bytes_read := 0
|
2020-07-05 01:33:36 +03:00
|
|
|
mut remaining_bytes := bytes_needed
|
2019-07-31 04:24:12 +03:00
|
|
|
// getrandom syscall wont block if requesting <= 256 bytes
|
2020-07-05 01:33:36 +03:00
|
|
|
for bytes_read < bytes_needed {
|
|
|
|
batch_size := if remaining_bytes > read_batch_size { read_batch_size } else { remaining_bytes }
|
|
|
|
unsafe {
|
|
|
|
bstart = buffer + bytes_read
|
2019-07-31 04:24:12 +03:00
|
|
|
}
|
2020-07-05 01:33:36 +03:00
|
|
|
rbytes := getrandom(batch_size, bstart)
|
|
|
|
if rbytes == -1 {
|
2021-02-14 21:31:42 +03:00
|
|
|
unsafe { free(buffer) }
|
2020-07-05 01:33:36 +03:00
|
|
|
return read_error
|
|
|
|
}
|
|
|
|
bytes_read += rbytes
|
2019-07-31 04:24:12 +03:00
|
|
|
}
|
|
|
|
return c_array_to_bytes_tmp(bytes_needed, buffer)
|
|
|
|
}
|
|
|
|
|
2019-10-10 20:04:11 +03:00
|
|
|
fn getrandom(bytes_needed int, buffer voidptr) int {
|
2019-10-24 14:48:20 +03:00
|
|
|
if bytes_needed > read_batch_size {
|
2020-02-02 04:50:46 +03:00
|
|
|
panic('getrandom() dont request more than $read_batch_size bytes at once.')
|
2019-07-31 04:24:12 +03:00
|
|
|
}
|
2020-07-22 21:42:51 +03:00
|
|
|
return unsafe { C.syscall(C.SYS_getrandom, buffer, bytes_needed, 0) }
|
2019-07-31 04:24:12 +03:00
|
|
|
}
|