//! Implementation for iOS, tvOS, and watchOS where `getentropy` is unavailable. use crate::Error; use core::{ffi::c_void, mem::MaybeUninit}; // libsystem contains the libc of Darwin, and every binary ends up linked against it either way. This // makes it a more lightweight choice compared to `Security.framework`. extern "C" { // This RNG uses a thread-local CSPRNG to provide data, which is seeded by the operating system's root CSPRNG. // Its the best option after `getentropy` on modern Darwin-based platforms that also avoids the // high startup costs and linking of Security.framework. // // While its just an implementation detail, `Security.framework` just calls into this anyway. fn CCRandomGenerateBytes(bytes: *mut c_void, size: usize) -> i32; } pub fn getrandom_inner(dest: &mut [MaybeUninit]) -> Result<(), Error> { let ret = unsafe { CCRandomGenerateBytes(dest.as_mut_ptr() as *mut c_void, dest.len()) }; // kCCSuccess (from CommonCryptoError.h) is always zero. if ret != 0 { Err(Error::IOS_SEC_RANDOM) } else { Ok(()) } }