blob: 15c86480475e8e011aca66d4975e288507bd4be4 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
|
/*
* Copyright (c) 2017 embedded brains GmbH. All rights reserved.
*
* embedded brains GmbH
* Dornierstr. 4
* 82178 Puchheim
* Germany
* <rtems@embedded-brains.de>
*
* The license and distribution terms for this file may be
* found in the file LICENSE in this distribution or at
* http://www.rtems.org/license/LICENSE.
*/
/*
* ATTENTION: THIS IS A VERY LIMITED ENTROPY SOURCE.
*
* This implementation uses a time-based value for it's entropy. The only thing
* that makes it random are interrupts from external sources. Don't use it if
* you need for example a strong crypto.
*/
#include <unistd.h>
#include <string.h>
#include <rtems/sysinit.h>
#include <rtems/counter.h>
int getentropy(void *ptr, size_t n)
{
uint8_t *dest = ptr;
while (n > 0) {
rtems_counter_ticks ticks;
ticks = rtems_counter_read();
if (n >= sizeof(ticks)) {
memcpy(dest, &ticks, sizeof(ticks));
n -= sizeof(ticks);
dest += sizeof(ticks);
} else {
/*
* Fill the remaining bytes with only the least
* significant byte of the time. That is the byte with
* the most changes.
*/
*dest = ticks & 0xFF;
--n;
++dest;
}
}
return 0;
}
|