mirror of
https://github.com/odin-lang/Odin.git
synced 2025-12-30 01:44:36 +00:00
Having the OS/runtime provide a cryptographic entropy source is the right thing to do, and we need it to initialize the default random number generator.
90 lines
2.6 KiB
Odin
90 lines
2.6 KiB
Odin
#+build windows
|
|
#+private
|
|
package runtime
|
|
|
|
foreign import bcrypt "system:Bcrypt.lib"
|
|
foreign import kernel32 "system:Kernel32.lib"
|
|
|
|
_HAS_RAND_BYTES :: true
|
|
|
|
@(private="file")
|
|
@(default_calling_convention="system")
|
|
foreign kernel32 {
|
|
// NOTE(bill): The types are not using the standard names (e.g. DWORD and LPVOID) to just minimizing the dependency
|
|
|
|
// stderr_write
|
|
GetStdHandle :: proc(which: u32) -> rawptr ---
|
|
SetHandleInformation :: proc(hObject: rawptr, dwMask: u32, dwFlags: u32) -> b32 ---
|
|
WriteFile :: proc(hFile: rawptr, lpBuffer: rawptr, nNumberOfBytesToWrite: u32, lpNumberOfBytesWritten: ^u32, lpOverlapped: rawptr) -> b32 ---
|
|
GetLastError :: proc() -> u32 ---
|
|
|
|
ExitProcess :: proc(code: u32) -> ! ---
|
|
}
|
|
|
|
@(private="file")
|
|
@(default_calling_convention="system")
|
|
foreign bcrypt {
|
|
BCryptGenRandom :: proc(hAlgorithm: rawptr, pBuffer: [^]u8, cbBuffer: u32, dwFlags: u32) -> i32 ---
|
|
}
|
|
|
|
_stderr_write :: proc "contextless" (data: []byte) -> (n: int, err: _OS_Errno) #no_bounds_check {
|
|
if len(data) == 0 {
|
|
return 0, 0
|
|
}
|
|
|
|
STD_ERROR_HANDLE :: ~u32(0) -12 + 1
|
|
HANDLE_FLAG_INHERIT :: 0x00000001
|
|
MAX_RW :: 1<<30
|
|
|
|
h := GetStdHandle(STD_ERROR_HANDLE)
|
|
when size_of(uintptr) == 8 {
|
|
SetHandleInformation(h, HANDLE_FLAG_INHERIT, 0)
|
|
}
|
|
|
|
single_write_length: u32
|
|
total_write: i64
|
|
length := i64(len(data))
|
|
|
|
for total_write < length {
|
|
remaining := length - total_write
|
|
to_write := u32(min(i32(remaining), MAX_RW))
|
|
|
|
e := WriteFile(h, &data[total_write], to_write, &single_write_length, nil)
|
|
if single_write_length <= 0 || !e {
|
|
err = _OS_Errno(GetLastError())
|
|
n = int(total_write)
|
|
return
|
|
}
|
|
total_write += i64(single_write_length)
|
|
}
|
|
n = int(total_write)
|
|
return
|
|
}
|
|
|
|
_rand_bytes :: proc "contextless" (dst: []byte) {
|
|
ensure_contextless(u64(len(dst)) <= u64(max(u32)), "base/runtime: oversized rand_bytes request")
|
|
|
|
BCRYPT_USE_SYSTEM_PREFERRED_RNG :: 0x00000002
|
|
|
|
ERROR_INVALID_HANDLE :: 6
|
|
ERROR_INVALID_PARAMETER :: 87
|
|
|
|
ret := BCryptGenRandom(nil, raw_data(dst), u32(len(dst)), BCRYPT_USE_SYSTEM_PREFERRED_RNG)
|
|
switch ret {
|
|
case 0:
|
|
case ERROR_INVALID_HANDLE:
|
|
// The handle to the first parameter is invalid.
|
|
// This should not happen here, since we explicitly pass nil to it
|
|
panic_contextless("base/runtime: BCryptGenRandom Invalid handle for hAlgorithm")
|
|
case ERROR_INVALID_PARAMETER:
|
|
// One of the parameters was invalid
|
|
panic_contextless("base/runtime: BCryptGenRandom Invalid parameter")
|
|
case:
|
|
// Unknown error
|
|
panic_contextless("base/runtime: BCryptGenRandom failed")
|
|
}
|
|
}
|
|
|
|
_exit :: proc "contextless" (code: int) -> ! {
|
|
ExitProcess(u32(code))
|
|
} |