summaryrefslogtreecommitdiffstats
path: root/tests/rng-sigint.c
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--tests/rng-sigint.c109
1 files changed, 109 insertions, 0 deletions
diff --git a/tests/rng-sigint.c b/tests/rng-sigint.c
new file mode 100644
index 0000000..04e818e
--- /dev/null
+++ b/tests/rng-sigint.c
@@ -0,0 +1,109 @@
+/*
+ * Copyright (C) 2016 Red Hat, Inc.
+ *
+ * Author: Nikos Mavrogiannopoulos
+ *
+ * This file is part of GnuTLS.
+ *
+ * GnuTLS is free software: you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * GnuTLS is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with GnuTLS. If not, see <https://www.gnu.org/licenses/>.
+ *
+ */
+
+#ifdef HAVE_CONFIG_H
+#include <config.h>
+#endif
+
+#include <stdlib.h>
+
+/* This program verifies whether the low-level random functions can operate
+ * properly, even if interrupted by signals */
+
+#if defined(HAVE_SETITIMER) && (defined(HAVE_LINUX_GETRANDOM) || defined(__linux__))
+
+#include <stdio.h>
+#include <unistd.h>
+#include <sys/types.h>
+#include <sys/time.h>
+#include <errno.h>
+#include <stdint.h>
+#include "utils.h"
+
+#define _gnutls_debug_log printf
+#define gnutls_assert()
+#define gnutls_assert_val(val) val
+
+int _rnd_system_entropy_init(void);
+void _rnd_system_entropy_deinit(void);
+
+typedef int (*get_entropy_func)(void* rnd, size_t size);
+get_entropy_func _rnd_get_system_entropy;
+
+#define RND_NO_INCLUDES
+#include "../lib/nettle/sysrng-linux.c"
+
+static volatile int stop_loop = 0;
+
+static void sig_handler(int signo)
+{
+ stop_loop++;
+}
+
+void doit(void)
+{
+ char buf[512];
+ char empty[32];
+ int ret;
+ struct itimerval ival;
+ struct sigaction sa;
+
+ memset(&sa, 0, sizeof(sa));
+ sa.sa_handler = sig_handler;
+ sigemptyset (&sa.sa_mask);
+ sigaction(SIGALRM, &sa, NULL);
+
+ memset(&ival, 0, sizeof(ival));
+ ival.it_interval.tv_usec = 5000;
+ ival.it_value.tv_usec = 5000;
+
+ _rnd_system_entropy_init();
+
+ ret = setitimer(ITIMER_REAL, &ival, NULL);
+ if (ret < 0) {
+ fail("error in setitimer: %s\n", strerror(errno));
+ }
+
+ memset(empty, 0, sizeof(empty));
+ for (;stop_loop<1024;) {
+ memset(buf, 0, sizeof(buf));
+ ret = _rnd_get_system_entropy(buf, sizeof(buf));
+ if (ret < 0) {
+ fail("error obtaining entropy: %s\n", gnutls_strerror(ret));
+ }
+
+ if (memcmp(empty, buf+sizeof(buf)-sizeof(empty)-1, sizeof(empty)) == 0) {
+ fail("_rnd_get_system_entropy: did not fill buffer\n");
+ }
+ }
+
+ _rnd_system_entropy_deinit();
+}
+#else
+void doit(void); /* prototype to avoid warning with -Wmissing-prototypes */
+
+void doit(void)
+{
+ exit(77);
+}
+
+#endif