1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
|
/*
* (C) 2016 Jack Lloyd
*
* Botan is released under the Simplified BSD License (see license.txt)
*/
#include <botan/auto_rng.h>
#include <botan/entropy_src.h>
#include <botan/hmac_drbg.h>
#if defined(BOTAN_HAS_SYSTEM_RNG)
#include <botan/system_rng.h>
#endif
#if !defined(BOTAN_AUTO_RNG_HMAC)
#error "No hash function defined for AutoSeeded_RNG in build.h (try enabling sha2_32)"
#endif
namespace Botan {
AutoSeeded_RNG::~AutoSeeded_RNG()
{
// for unique_ptr
}
AutoSeeded_RNG::AutoSeeded_RNG(RandomNumberGenerator& underlying_rng,
size_t reseed_interval)
{
m_rng.reset(new HMAC_DRBG(MessageAuthenticationCode::create_or_throw(BOTAN_AUTO_RNG_HMAC),
underlying_rng,
reseed_interval));
force_reseed();
}
AutoSeeded_RNG::AutoSeeded_RNG(Entropy_Sources& entropy_sources,
size_t reseed_interval)
{
m_rng.reset(new HMAC_DRBG(MessageAuthenticationCode::create_or_throw(BOTAN_AUTO_RNG_HMAC),
entropy_sources,
reseed_interval));
force_reseed();
}
AutoSeeded_RNG::AutoSeeded_RNG(RandomNumberGenerator& underlying_rng,
Entropy_Sources& entropy_sources,
size_t reseed_interval)
{
m_rng.reset(new HMAC_DRBG(
MessageAuthenticationCode::create_or_throw(BOTAN_AUTO_RNG_HMAC),
underlying_rng, entropy_sources, reseed_interval));
force_reseed();
}
AutoSeeded_RNG::AutoSeeded_RNG(size_t reseed_interval) :
#if defined(BOTAN_HAS_SYSTEM_RNG)
AutoSeeded_RNG(system_rng(), reseed_interval)
#else
AutoSeeded_RNG(Entropy_Sources::global_sources(), reseed_interval)
#endif
{
}
void AutoSeeded_RNG::force_reseed()
{
m_rng->force_reseed();
m_rng->next_byte();
if(!m_rng->is_seeded())
{
throw Exception("AutoSeeded_RNG reseeding failed");
}
}
bool AutoSeeded_RNG::is_seeded() const
{
return m_rng->is_seeded();
}
void AutoSeeded_RNG::clear()
{
m_rng->clear();
}
std::string AutoSeeded_RNG::name() const
{
return m_rng->name();
}
void AutoSeeded_RNG::add_entropy(const byte in[], size_t len)
{
m_rng->add_entropy(in, len);
}
size_t AutoSeeded_RNG::reseed(Entropy_Sources& srcs,
size_t poll_bits,
std::chrono::milliseconds poll_timeout)
{
return m_rng->reseed(srcs, poll_bits, poll_timeout);
}
void AutoSeeded_RNG::randomize(byte output[], size_t output_len)
{
randomize_with_ts_input(output, output_len);
}
void AutoSeeded_RNG::randomize_with_input(byte output[], size_t output_len,
const byte ad[], size_t ad_len)
{
m_rng->randomize_with_input(output, output_len, ad, ad_len);
}
}
|