Coverage Report

Created: 2025-06-11 06:40

/src/boringssl/crypto/rand/deterministic.cc
Line
Count
Source (jump to first uncovered line)
1
// Copyright 2016 The BoringSSL Authors
2
//
3
// Licensed under the Apache License, Version 2.0 (the "License");
4
// you may not use this file except in compliance with the License.
5
// You may obtain a copy of the License at
6
//
7
//     https://www.apache.org/licenses/LICENSE-2.0
8
//
9
// Unless required by applicable law or agreed to in writing, software
10
// distributed under the License is distributed on an "AS IS" BASIS,
11
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
// See the License for the specific language governing permissions and
13
// limitations under the License.
14
15
#include <openssl/rand.h>
16
17
#include "../bcm_support.h"
18
#include "internal.h"
19
20
#if defined(OPENSSL_RAND_DETERMINISTIC)
21
22
#include <string.h>
23
24
#include <openssl/chacha.h>
25
26
#include "../internal.h"
27
28
29
// g_num_calls is the number of calls to |CRYPTO_sysrand| that have occurred.
30
//
31
// This is intentionally not thread-safe. If the fuzzer mode is ever used in a
32
// multi-threaded program, replace this with a thread-local. (A mutex would not
33
// be deterministic.)
34
static uint64_t g_num_calls = 0;
35
static CRYPTO_MUTEX g_num_calls_lock = CRYPTO_MUTEX_INIT;
36
37
0
void RAND_reset_for_fuzzing(void) { g_num_calls = 0; }
38
39
0
void CRYPTO_init_sysrand(void) {}
40
41
0
void CRYPTO_sysrand(uint8_t *out, size_t requested) {
42
0
  static const uint8_t kZeroKey[32] = {0};
43
44
0
  CRYPTO_MUTEX_lock_write(&g_num_calls_lock);
45
0
  uint64_t num_calls = g_num_calls++;
46
0
  CRYPTO_MUTEX_unlock_write(&g_num_calls_lock);
47
48
0
  uint8_t nonce[12];
49
0
  OPENSSL_memset(nonce, 0, sizeof(nonce));
50
0
  OPENSSL_memcpy(nonce, &num_calls, sizeof(num_calls));
51
52
0
  OPENSSL_memset(out, 0, requested);
53
0
  CRYPTO_chacha_20(out, out, requested, kZeroKey, nonce, 0);
54
0
}
55
56
0
int CRYPTO_sysrand_if_available(uint8_t *buf, size_t len) {
57
0
  CRYPTO_sysrand(buf, len);
58
0
  return 1;
59
0
}
60
61
0
void CRYPTO_sysrand_for_seed(uint8_t *out, size_t requested) {
62
0
  CRYPTO_sysrand(out, requested);
63
0
}
64
65
#endif  // OPENSSL_RAND_DETERMINISTIC