@@ -2470,19 +2470,35 @@ int dev_urandom(void *p, size_t n) {
2470
2470
int r , fd ;
2471
2471
ssize_t k ;
2472
2472
2473
- /* Use the syscall unless we know we don't have it, or when
2474
- * the requested size is too large for it. */
2473
+ /* Gathers some randomness from the kernel. This call will
2474
+ * never block, and will always return some data from the
2475
+ * kernel, regardless if the random pool is fully initialized
2476
+ * or not. It thus makes no guarantee for the quality of the
2477
+ * returned entropy, but is good enough for or usual usecases
2478
+ * of seeding the hash functions for hashtable */
2479
+
2480
+ /* Use the getrandom() syscall unless we know we don't have
2481
+ * it, or when the requested size is too large for it. */
2475
2482
if (have_syscall != 0 || (size_t ) (int ) n != n ) {
2476
- r = getrandom (p , n , 0 );
2483
+ r = getrandom (p , n , GRND_NONBLOCK );
2477
2484
if (r == (int ) n ) {
2478
2485
have_syscall = true;
2479
2486
return 0 ;
2480
2487
}
2481
2488
2482
2489
if (r < 0 ) {
2483
2490
if (errno == ENOSYS )
2484
- /* we lack the syscall, continue with reading from /dev/urandom */
2491
+ /* we lack the syscall, continue with
2492
+ * reading from /dev/urandom */
2485
2493
have_syscall = false;
2494
+ else if (errno == EAGAIN )
2495
+ /* not enough entropy for now. Let's
2496
+ * remember to use the syscall the
2497
+ * next time, again, but also read
2498
+ * from /dev/urandom for now, which
2499
+ * doesn't care about the current
2500
+ * amount of entropy. */
2501
+ have_syscall = true;
2486
2502
else
2487
2503
return - errno ;
2488
2504
} else
0 commit comments