X-Git-Url: https://git.saurik.com/apple/security.git/blobdiff_plain/ed6778a32ecff23bc2dfb6ca452badd0c68774a0..563f4f96f568bcdc0a04a82f89cafe3bebbe43f1:/cdsa/cdsa_utilities/devrandom.cpp diff --git a/cdsa/cdsa_utilities/devrandom.cpp b/cdsa/cdsa_utilities/devrandom.cpp deleted file mode 100644 index 05b180a0..00000000 --- a/cdsa/cdsa_utilities/devrandom.cpp +++ /dev/null @@ -1,76 +0,0 @@ -/* - * Copyright (c) 2000-2001 Apple Computer, Inc. All Rights Reserved. - * - * The contents of this file constitute Original Code as defined in and are - * subject to the Apple Public Source License Version 1.2 (the 'License'). - * You may not use this file except in compliance with the License. Please obtain - * a copy of the License at http://www.apple.com/publicsource and read it before - * using this file. - * - * This Original Code and all software distributed under the License are - * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS - * OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, INCLUDING WITHOUT - * LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR - * PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. Please see the License for the - * specific language governing rights and limitations under the License. - */ - - -// -// devrandom - RNG operations based on /dev/random -// -#include -#include - -using namespace UnixPlusPlus; - - -namespace Security { - - -// -// The common (shared) open file descriptor to /dev/random -// -ModuleNexus DevRandomGenerator::mReader; -ModuleNexus DevRandomGenerator::mWriter; - - -// -// In the current implementation, opening the file descriptor is deferred. -// -DevRandomGenerator::DevRandomGenerator(bool writable) -{ -} - - -// -// Standard generate (directly from /dev/random) -// -void DevRandomGenerator::random(void *data, size_t length) -{ - try { - size_t bytesRead = mReader().read(data, length); - if (bytesRead != length) { // short read (shouldn't happen) - Syslog::error("DevRandomGenerator: wanted %ld got %ld bytes", - length, bytesRead); - UnixError::throwMe(EIO); - } - } catch(const UnixError &uerr) { - Syslog::error("DevRandomGenerator: error %d reading /dev/random", - uerr.error); - throw; - } -} - - -// -// If you opened for writing, you add entropy to the global pool here -// -void DevRandomGenerator::addEntropy(const void *data, size_t length) -{ - if (mWriter().write(data, length) != length) - UnixError::throwMe(EIO); // short write (shouldn't happen) -} - - -} // end namespace Security