seedrng: prepare read_new_seed() to not need a "success" retval
We do not expect /dev/[u]random to be not openable/readable.
If they are, just bail out (something is obviously very wrong).
function old new delta
seedrng_main 1077 1076 -1
.rodata 104939 104929 -10
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
diff --git a/util-linux/seedrng.c b/util-linux/seedrng.c
index 82c69b7..3f4c5c0 100644
--- a/util-linux/seedrng.c
+++ b/util-linux/seedrng.c
@@ -79,25 +79,27 @@
{
ssize_t ret;
- *is_creditable = false;
ret = getrandom(seed, len, GRND_NONBLOCK);
if (ret == (ssize_t)len) {
*is_creditable = true;
return 0;
- } else if (ret < 0 && errno == ENOSYS) {
+ }
+ if (ret < 0 && errno == ENOSYS) {
struct pollfd random_fd = {
- .fd = open("/dev/random", O_RDONLY),
+ .fd = xopen("/dev/random", O_RDONLY),
.events = POLLIN
};
- if (random_fd.fd < 0)
- return -1;
*is_creditable = poll(&random_fd, 1, 0) == 1;
close(random_fd.fd);
- } else if (getrandom(seed, len, GRND_INSECURE) == (ssize_t)len)
- return 0;
- if (open_read_close("/dev/urandom", seed, len) == (ssize_t)len)
- return 0;
- return -1;
+ } else {
+ *is_creditable = false;
+ if (getrandom(seed, len, GRND_INSECURE) == (ssize_t)len)
+ return 0;
+ }
+ errno = 0;
+ if (open_read_close("/dev/urandom", seed, len) != (ssize_t)len)
+ bb_perror_msg_and_die("can't read '%s'", "/dev/urandom");
+ return 0;
}
static void seed_rng(uint8_t *seed, size_t len, bool credit)