]>
git.ipfire.org Git - thirdparty/systemd.git/blob - src/random-seed/random-seed.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
32 #define POOL_SIZE_MIN 512
34 int main(int argc
, char *argv
[]) {
35 _cleanup_close_
int seed_fd
= -1, random_fd
= -1;
36 _cleanup_free_
void* buf
= NULL
;
41 bool refresh_seed_file
= true;
44 log_error("This program requires one argument.");
48 log_set_target(LOG_TARGET_AUTO
);
49 log_parse_environment();
54 /* Read pool size, if possible */
55 f
= fopen("/proc/sys/kernel/random/poolsize", "re");
57 if (fscanf(f
, "%zu", &buf_size
) > 0)
58 /* poolsize is in bits on 2.6, but we want bytes */
64 if (buf_size
<= POOL_SIZE_MIN
)
65 buf_size
= POOL_SIZE_MIN
;
67 buf
= malloc(buf_size
);
73 r
= mkdir_parents_label(RANDOM_SEED
, 0755);
75 log_error_errno(r
, "Failed to create directory " RANDOM_SEED_DIR
": %m");
79 /* When we load the seed we read it and write it to the device
80 * and then immediately update the saved seed with new data,
81 * to make sure the next boot gets seeded differently. */
83 if (streq(argv
[1], "load")) {
85 seed_fd
= open(RANDOM_SEED
, O_RDWR
|O_CLOEXEC
|O_NOCTTY
|O_CREAT
, 0600);
87 seed_fd
= open(RANDOM_SEED
, O_RDONLY
|O_CLOEXEC
|O_NOCTTY
);
89 r
= log_error_errno(errno
, "Failed to open " RANDOM_SEED
": %m");
93 refresh_seed_file
= false;
96 random_fd
= open("/dev/urandom", O_RDWR
|O_CLOEXEC
|O_NOCTTY
, 0600);
98 random_fd
= open("/dev/urandom", O_WRONLY
|O_CLOEXEC
|O_NOCTTY
, 0600);
100 r
= log_error_errno(errno
, "Failed to open /dev/urandom: %m");
105 k
= loop_read(seed_fd
, buf
, buf_size
, false);
107 r
= log_error_errno(k
, "Failed to read seed from " RANDOM_SEED
": %m");
109 log_debug("Seed file " RANDOM_SEED
" not yet initialized, proceeding.");
111 (void) lseek(seed_fd
, 0, SEEK_SET
);
113 r
= loop_write(random_fd
, buf
, (size_t) k
, false);
115 log_error_errno(r
, "Failed to write seed to /dev/urandom: %m");
118 } else if (streq(argv
[1], "save")) {
120 seed_fd
= open(RANDOM_SEED
, O_WRONLY
|O_CLOEXEC
|O_NOCTTY
|O_CREAT
, 0600);
122 r
= log_error_errno(errno
, "Failed to open " RANDOM_SEED
": %m");
126 random_fd
= open("/dev/urandom", O_RDONLY
|O_CLOEXEC
|O_NOCTTY
);
128 r
= log_error_errno(errno
, "Failed to open /dev/urandom: %m");
133 log_error("Unknown verb '%s'.", argv
[1]);
138 if (refresh_seed_file
) {
140 /* This is just a safety measure. Given that we are root and
141 * most likely created the file ourselves the mode and owner
142 * should be correct anyway. */
143 (void) fchmod(seed_fd
, 0600);
144 (void) fchown(seed_fd
, 0, 0);
146 k
= loop_read(random_fd
, buf
, buf_size
, false);
148 r
= log_error_errno(k
, "Failed to read new seed from /dev/urandom: %m");
152 log_error("Got EOF while reading from /dev/urandom.");
157 r
= loop_write(seed_fd
, buf
, (size_t) k
, false);
159 log_error_errno(r
, "Failed to write new random seed file: %m");
163 return r
< 0 ? EXIT_FAILURE
: EXIT_SUCCESS
;