mirror of
https://github.com/golang/go.git
synced 2025-05-05 23:53:05 +00:00
A GODEBUG is actually a security risk here: most programs will start to ignore errors from Read because they can't happen (which is the intended behavior), but then if a program is run with GODEBUG=randcrash=0 it will use a partial buffer in case an error occurs, which may be catastrophic. Note that the proposal was accepted without the GODEBUG, which was only added later. This (partially) reverts CL 608435. I kept the tests. Updates #66821 Change-Id: I3fd20f9cae0d34115133fe935f0cfc7a741a2662 Reviewed-on: https://go-review.googlesource.com/c/go/+/622115 LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Reviewed-by: Carlos Amedee <carlos@golang.org> Reviewed-by: Roland Shoemaker <roland@golang.org> Auto-Submit: Filippo Valsorda <filippo@golang.org> Reviewed-by: Daniel McCarney <daniel@binaryparadox.net>
117 lines
3.2 KiB
Go
117 lines
3.2 KiB
Go
// Copyright 2010 The Go Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
// Package rand implements a cryptographically secure
|
|
// random number generator.
|
|
package rand
|
|
|
|
import (
|
|
"crypto/internal/boring"
|
|
"io"
|
|
"os"
|
|
"sync"
|
|
"sync/atomic"
|
|
"time"
|
|
_ "unsafe"
|
|
)
|
|
|
|
// Reader is a global, shared instance of a cryptographically
|
|
// secure random number generator. It is safe for concurrent use.
|
|
//
|
|
// - On Linux, FreeBSD, Dragonfly, and Solaris, Reader uses getrandom(2).
|
|
// - On legacy Linux (< 3.17), Reader opens /dev/urandom on first use.
|
|
// - On macOS, iOS, and OpenBSD Reader, uses arc4random_buf(3).
|
|
// - On NetBSD, Reader uses the kern.arandom sysctl.
|
|
// - On Windows, Reader uses the ProcessPrng API.
|
|
// - On js/wasm, Reader uses the Web Crypto API.
|
|
// - On wasip1/wasm, Reader uses random_get.
|
|
var Reader io.Reader
|
|
|
|
func init() {
|
|
if boring.Enabled {
|
|
Reader = boring.RandReader
|
|
return
|
|
}
|
|
Reader = &reader{}
|
|
}
|
|
|
|
var firstUse atomic.Bool
|
|
|
|
func warnBlocked() {
|
|
println("crypto/rand: blocked for 60 seconds waiting to read random data from the kernel")
|
|
}
|
|
|
|
type reader struct{}
|
|
|
|
// Read always returns len(b) or an error.
|
|
func (r *reader) Read(b []byte) (n int, err error) {
|
|
boring.Unreachable()
|
|
if firstUse.CompareAndSwap(false, true) {
|
|
// First use of randomness. Start timer to warn about
|
|
// being blocked on entropy not being available.
|
|
t := time.AfterFunc(time.Minute, warnBlocked)
|
|
defer t.Stop()
|
|
}
|
|
if err := read(b); err != nil {
|
|
return 0, err
|
|
}
|
|
return len(b), nil
|
|
}
|
|
|
|
// fatal is [runtime.fatal], pushed via linkname.
|
|
//
|
|
//go:linkname fatal
|
|
func fatal(string)
|
|
|
|
// Read fills b with cryptographically secure random bytes. It never returns an
|
|
// error, and always fills b entirely.
|
|
//
|
|
// Read calls [io.ReadFull] on [Reader] and crashes the program irrecoverably if
|
|
// an error is returned. The default Reader uses operating system APIs that are
|
|
// documented to never return an error on all but legacy Linux systems.
|
|
func Read(b []byte) (n int, err error) {
|
|
// We don't want b to escape to the heap, but escape analysis can't see
|
|
// through a potentially overridden Reader, so we special-case the default
|
|
// case which we can keep non-escaping, and in the general case we read into
|
|
// a heap buffer and copy from it.
|
|
if r, ok := Reader.(*reader); ok {
|
|
_, err = r.Read(b)
|
|
} else {
|
|
bb := make([]byte, len(b))
|
|
_, err = io.ReadFull(Reader, bb)
|
|
copy(b, bb)
|
|
}
|
|
if err != nil {
|
|
fatal("crypto/rand: failed to read random data (see https://go.dev/issue/66821): " + err.Error())
|
|
panic("unreachable") // To be sure.
|
|
}
|
|
return len(b), nil
|
|
}
|
|
|
|
// The urandom fallback is only used on Linux kernels before 3.17 and on AIX.
|
|
|
|
var urandomOnce sync.Once
|
|
var urandomFile *os.File
|
|
var urandomErr error
|
|
|
|
func urandomRead(b []byte) error {
|
|
urandomOnce.Do(func() {
|
|
urandomFile, urandomErr = os.Open("/dev/urandom")
|
|
})
|
|
if urandomErr != nil {
|
|
return urandomErr
|
|
}
|
|
for len(b) > 0 {
|
|
n, err := urandomFile.Read(b)
|
|
// Note that we don't ignore EAGAIN because it should not be possible to
|
|
// hit for a blocking read from urandom, although there were
|
|
// unreproducible reports of it at https://go.dev/issue/9205.
|
|
if err != nil {
|
|
return err
|
|
}
|
|
b = b[n:]
|
|
}
|
|
return nil
|
|
}
|