summaryrefslogtreecommitdiff
path: root/util/libreboot-utils/lib/rand.c
diff options
context:
space:
mode:
authorLeah Rowe <leah@libreboot.org>2026-03-25 19:58:23 +0000
committerLeah Rowe <leah@libreboot.org>2026-03-26 06:59:42 +0000
commit7b3c8cf7eceb8e261a7f9189d0efa306ddd57d0c (patch)
treec21ac2f41001970c4640a11b33257adb33506b10 /util/libreboot-utils/lib/rand.c
parent34f26319d7a356a171c3e41f23db92b3558908c6 (diff)
lbutils: clarify design regarding urandom/getrandom
Signed-off-by: Leah Rowe <leah@libreboot.org>
Diffstat (limited to 'util/libreboot-utils/lib/rand.c')
-rw-r--r--util/libreboot-utils/lib/rand.c28
1 files changed, 24 insertions, 4 deletions
diff --git a/util/libreboot-utils/lib/rand.c b/util/libreboot-utils/lib/rand.c
index 5bf03239..dccf3646 100644
--- a/util/libreboot-utils/lib/rand.c
+++ b/util/libreboot-utils/lib/rand.c
@@ -32,6 +32,30 @@
#include "../include/common.h"
+/* Regarding Linux getrandom/urandom:
+ *
+ * For maximum security guarantee, we *only*
+ * use getrandom via syscall, or /dev/urandom;
+ * use of urandom is ill advised. This is why
+ * we use the syscall, in case the libc version
+ * of getrandom() might defer to /dev/urandom
+ *
+ * We *abort* on error, for both /dev/urandom
+ * and getrandom(), because the BSD arc4random
+ * never returns with error; therefore, for the
+ * most parity in terms of behaviour, we abort,
+ * because otherwise the function would have two
+ * return modes: always successful (BSD), or only
+ * sometimes (Linux). The BSD arc4random could
+ * theoretically abort; it is extremely unlikely
+ * there, and just so on Linux, hence this design.
+ *
+ * This is important, because cryptographic code
+ * for example must not rely on weak randomness.
+ * We must therefore treat broken randomness as
+ * though the world is broken, and burn accordingly.
+ */
+
void
rset(void *buf, size_t n)
{
@@ -83,10 +107,6 @@ retry_rand:
goto out;
err:
- /* since arc4random always returns
- * successful, we treat urandom/getrandom
- * failures as fatal and abort accordingly
- */
err_no_cleanup(1, ECANCELED,
"Randomisation failure, possibly unsupported in your kernel.");
exit(EXIT_FAILURE);