summaryrefslogtreecommitdiffstats
path: root/security/manager/ssl/nsRandomGenerator.cpp
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 00:47:55 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 00:47:55 +0000
commit26a029d407be480d791972afb5975cf62c9360a6 (patch)
treef435a8308119effd964b339f76abb83a57c29483 /security/manager/ssl/nsRandomGenerator.cpp
parentInitial commit. (diff)
downloadfirefox-26a029d407be480d791972afb5975cf62c9360a6.tar.xz
firefox-26a029d407be480d791972afb5975cf62c9360a6.zip
Adding upstream version 124.0.1.upstream/124.0.1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'security/manager/ssl/nsRandomGenerator.cpp')
-rw-r--r--security/manager/ssl/nsRandomGenerator.cpp41
1 files changed, 41 insertions, 0 deletions
diff --git a/security/manager/ssl/nsRandomGenerator.cpp b/security/manager/ssl/nsRandomGenerator.cpp
new file mode 100644
index 0000000000..0f56b2b4e3
--- /dev/null
+++ b/security/manager/ssl/nsRandomGenerator.cpp
@@ -0,0 +1,41 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#include "nsRandomGenerator.h"
+
+#include "ScopedNSSTypes.h"
+#include "nsNSSComponent.h"
+#include "pk11pub.h"
+#include "prerror.h"
+#include "secerr.h"
+#include "mozilla/UniquePtrExtensions.h"
+
+NS_IMPL_ISUPPORTS(nsRandomGenerator, nsIRandomGenerator)
+
+NS_IMETHODIMP
+nsRandomGenerator::GenerateRandomBytes(uint32_t aLength, uint8_t** aBuffer) {
+ NS_ENSURE_ARG_POINTER(aBuffer);
+ *aBuffer = nullptr;
+
+ mozilla::UniqueFreePtr<uint8_t> buf(
+ static_cast<uint8_t*>(moz_xmalloc(aLength)));
+ nsresult rv = GenerateRandomBytesInto(buf.get(), aLength);
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ *aBuffer = buf.release();
+ return NS_OK;
+}
+
+NS_IMETHODIMP
+nsRandomGenerator::GenerateRandomBytesInto(uint8_t* aBuffer, uint32_t aLength) {
+ NS_ENSURE_ARG_POINTER(aBuffer);
+
+ mozilla::UniquePK11SlotInfo slot(PK11_GetInternalSlot());
+ if (!slot) {
+ return NS_ERROR_FAILURE;
+ }
+
+ SECStatus srv = PK11_GenerateRandomOnSlot(slot.get(), aBuffer, aLength);
+ return srv == SECSuccess ? NS_OK : NS_ERROR_FAILURE;
+}