diff options
author | madmaxoft <github@xoft.cz> | 2013-08-15 09:03:58 +0200 |
---|---|---|
committer | madmaxoft <github@xoft.cz> | 2013-08-15 09:03:58 +0200 |
commit | 0297cf548558a20e36acac3057728ad9a9aac234 (patch) | |
tree | 626d2e3af538ec6c5dd940a948535b9b4e867c46 /CryptoPP/osrng.cpp | |
parent | Merge pull request #91 from tigerw/master (diff) | |
download | cuberite-0297cf548558a20e36acac3057728ad9a9aac234.tar cuberite-0297cf548558a20e36acac3057728ad9a9aac234.tar.gz cuberite-0297cf548558a20e36acac3057728ad9a9aac234.tar.bz2 cuberite-0297cf548558a20e36acac3057728ad9a9aac234.tar.lz cuberite-0297cf548558a20e36acac3057728ad9a9aac234.tar.xz cuberite-0297cf548558a20e36acac3057728ad9a9aac234.tar.zst cuberite-0297cf548558a20e36acac3057728ad9a9aac234.zip |
Diffstat (limited to '')
-rw-r--r-- | CryptoPP/osrng.cpp | 29 |
1 files changed, 25 insertions, 4 deletions
diff --git a/CryptoPP/osrng.cpp b/CryptoPP/osrng.cpp index fa6dd36dd..76e486b4e 100644 --- a/CryptoPP/osrng.cpp +++ b/CryptoPP/osrng.cpp @@ -83,8 +83,22 @@ void NonblockingRng::GenerateBlock(byte *output, size_t size) if (!CryptGenRandom(m_Provider.GetProviderHandle(), (DWORD)size, output)) throw OS_RNG_Err("CryptGenRandom"); #else - if (read(m_fd, output, size) != size) - throw OS_RNG_Err("read /dev/urandom"); + while (size) + { + ssize_t len = read(m_fd, output, size); + + if (len < 0) + { + // /dev/urandom reads CAN give EAGAIN errors! (maybe EINTR as well) + if (errno != EINTR && errno != EAGAIN) + throw OS_RNG_Err("read /dev/urandom"); + + continue; + } + + output += len; + size -= len; + } #endif } @@ -119,10 +133,17 @@ void BlockingRng::GenerateBlock(byte *output, size_t size) while (size) { // on some systems /dev/random will block until all bytes - // are available, on others it will returns immediately + // are available, on others it returns immediately ssize_t len = read(m_fd, output, size); if (len < 0) - throw OS_RNG_Err("read " CRYPTOPP_BLOCKING_RNG_FILENAME); + { + // /dev/random reads CAN give EAGAIN errors! (maybe EINTR as well) + if (errno != EINTR && errno != EAGAIN) + throw OS_RNG_Err("read " CRYPTOPP_BLOCKING_RNG_FILENAME); + + continue; + } + size -= len; output += len; if (size) |