From 6bf0a5cb5034a7e684dcc3500e841785237ce2dd Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sun, 7 Apr 2024 19:32:43 +0200 Subject: Adding upstream version 1:115.7.0. Signed-off-by: Daniel Baumann --- security/manager/ssl/nsRandomGenerator.cpp | 36 ++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 security/manager/ssl/nsRandomGenerator.cpp (limited to 'security/manager/ssl/nsRandomGenerator.cpp') diff --git a/security/manager/ssl/nsRandomGenerator.cpp b/security/manager/ssl/nsRandomGenerator.cpp new file mode 100644 index 0000000000..aee99e2536 --- /dev/null +++ b/security/manager/ssl/nsRandomGenerator.cpp @@ -0,0 +1,36 @@ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#include "nsRandomGenerator.h" + +#include "ScopedNSSTypes.h" +#include "nsNSSComponent.h" +#include "pk11pub.h" +#include "prerror.h" +#include "secerr.h" + +NS_IMPL_ISUPPORTS(nsRandomGenerator, nsIRandomGenerator) + +NS_IMETHODIMP +nsRandomGenerator::GenerateRandomBytes(uint32_t aLength, uint8_t** aBuffer) { + NS_ENSURE_ARG_POINTER(aBuffer); + *aBuffer = nullptr; + + mozilla::UniquePK11SlotInfo slot(PK11_GetInternalSlot()); + if (!slot) { + return NS_ERROR_FAILURE; + } + + auto buf = static_cast(moz_xmalloc(aLength)); + + SECStatus srv = PK11_GenerateRandomOnSlot(slot.get(), buf, aLength); + if (srv != SECSuccess) { + free(buf); + return NS_ERROR_FAILURE; + } + + *aBuffer = buf; + + return NS_OK; +} -- cgit v1.2.3