diff options
| author | Brian Anderson <banderson@mozilla.com> | 2013-05-06 17:07:38 -0700 |
|---|---|---|
| committer | Brian Anderson <banderson@mozilla.com> | 2013-05-07 12:08:03 -0700 |
| commit | 21aaa7fb13793e7a4cf0c62653035f6f09a20d9e (patch) | |
| tree | 861055133ad848641c4027fc0f53d3ee07057845 /src/rt/rust_rng.cpp | |
| parent | 4cd51c416b8cf1a9d89089c99b8a1e2ac2f7255a (diff) | |
| download | rust-21aaa7fb13793e7a4cf0c62653035f6f09a20d9e.tar.gz rust-21aaa7fb13793e7a4cf0c62653035f6f09a20d9e.zip | |
rt: Eliminate the dependency on rust_kernel from rust_rng
Diffstat (limited to 'src/rt/rust_rng.cpp')
| -rw-r--r-- | src/rt/rust_rng.cpp | 50 |
1 files changed, 27 insertions, 23 deletions
diff --git a/src/rt/rust_rng.cpp b/src/rt/rust_rng.cpp index d55f9b5f2bc..27015891fee 100644 --- a/src/rt/rust_rng.cpp +++ b/src/rt/rust_rng.cpp @@ -41,7 +41,7 @@ rng_seed_size() { // Initialization helpers for ISAAC RNG void -rng_gen_seed(rust_kernel* kernel, uint8_t* dest, size_t size) { +rng_gen_seed(uint8_t* dest, size_t size) { #ifdef __WIN32__ HCRYPTPROV hProv; win32_require @@ -54,31 +54,37 @@ rng_gen_seed(rust_kernel* kernel, uint8_t* dest, size_t size) { (_T("CryptReleaseContext"), CryptReleaseContext(hProv, 0)); #else int fd = open("/dev/urandom", O_RDONLY); - if (fd == -1) - kernel->fatal("error opening /dev/urandom: %s", strerror(errno)); + if (fd == -1) { + fprintf(stderr, "error opening /dev/urandom: %s", strerror(errno)); + abort(); + } size_t amount = 0; do { ssize_t ret = read(fd, dest+amount, size-amount); - if (ret < 0) - kernel->fatal("error reading /dev/urandom: %s", strerror(errno)); - else if (ret == 0) - kernel->fatal("somehow hit eof reading from /dev/urandom"); + if (ret < 0) { + fprintf(stderr, "error reading /dev/urandom: %s", strerror(errno)); + abort(); + } + else if (ret == 0) { + fprintf(stderr, "somehow hit eof reading from /dev/urandom"); + abort(); + } amount += (size_t)ret; } while (amount < size); int ret = close(fd); - // FIXME #3697: Why does this fail sometimes? - if (ret != 0) - kernel->log(log_warn, "error closing /dev/urandom: %s", - strerror(errno)); + if (ret != 0) { + fprintf(stderr, "error closing /dev/urandom: %s", strerror(errno)); + // FIXME #3697: Why does this fail sometimes? + // abort(); + } #endif } static void -isaac_init(rust_kernel *kernel, randctx *rctx, +isaac_init(randctx *rctx, char *env_seed, uint8_t* user_seed, size_t seed_len) { memset(rctx, 0, sizeof(randctx)); - char *env_seed = kernel->env->rust_seed; if (user_seed != NULL) { // ignore bytes after the required length if (seed_len > sizeof(rctx->randrsl)) { @@ -92,8 +98,7 @@ isaac_init(rust_kernel *kernel, randctx *rctx, seed = (seed + 0x7ed55d16) + (seed << 12); } } else { - rng_gen_seed(kernel, - (uint8_t*)&rctx->randrsl, + rng_gen_seed((uint8_t*)&rctx->randrsl, sizeof(rctx->randrsl)); } @@ -101,14 +106,14 @@ isaac_init(rust_kernel *kernel, randctx *rctx, } void -rng_init(rust_kernel* kernel, rust_rng* rng, +rng_init(rust_rng* rng, char* env_seed, uint8_t *user_seed, size_t seed_len) { - isaac_init(kernel, &rng->rctx, user_seed, seed_len); - rng->reseedable = !user_seed && !kernel->env->rust_seed; + isaac_init(&rng->rctx, env_seed, user_seed, seed_len); + rng->reseedable = !user_seed && !env_seed; } static void -rng_maybe_reseed(rust_kernel* kernel, rust_rng* rng) { +rng_maybe_reseed(rust_rng* rng) { // If this RNG has generated more than 32KB of random data and was not // seeded by the user or RUST_SEED, then we should reseed now. const size_t RESEED_THRESHOLD = 32 * 1024; @@ -116,16 +121,15 @@ rng_maybe_reseed(rust_kernel* kernel, rust_rng* rng) { if (bytes_generated < RESEED_THRESHOLD || !rng->reseedable) { return; } - rng_gen_seed(kernel, - (uint8_t*)rng->rctx.randrsl, + rng_gen_seed((uint8_t*)rng->rctx.randrsl, sizeof(rng->rctx.randrsl)); randinit(&rng->rctx, 1); } uint32_t -rng_gen_u32(rust_kernel* kernel, rust_rng* rng) { +rng_gen_u32(rust_rng* rng) { uint32_t x = isaac_rand(&rng->rctx); - rng_maybe_reseed(kernel, rng); + rng_maybe_reseed(rng); return x; } |
