/*
 * Copyright (C) 2012 The Android Open Source Project
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package org.conscrypt;

import java.io.Serializable;
import java.security.SecureRandomSpi;

public class OpenSSLRandom extends SecureRandomSpi implements Serializable {
    private static final long serialVersionUID = 8506210602917522860L;

    private boolean mSeeded;

    @Override
    protected void engineSetSeed(byte[] seed) {
        // NOTE: The contract of the SecureRandomSpi does not appear to prohibit self-seeding here
        // (in addition to using the provided seed).
        selfSeedIfNotSeeded();
        NativeCrypto.RAND_seed(seed);
    }

    @Override
    protected void engineNextBytes(byte[] bytes) {
        selfSeedIfNotSeeded();
        NativeCrypto.RAND_bytes(bytes);
    }

    @Override
    protected byte[] engineGenerateSeed(int numBytes) {
        selfSeedIfNotSeeded();
        byte[] output = new byte[numBytes];
        NativeCrypto.RAND_bytes(output);
        return output;
    }

    /**
     * Self-seeds this instance from the Linux RNG. Does nothing if this instance has already been
     * seeded.
     */
    private void selfSeedIfNotSeeded() {
        // NOTE: No need to worry about concurrent access to this field because the worst case is
        // that the code below is executed multiple times (by different threads), which may only
        // increase the entropy of the OpenSSL PRNG.
        if (mSeeded) {
            return;
        }

        seedOpenSSLPRNGFromLinuxRNG();
        mSeeded = true;
    }

    /**
     * Obtains a seed from the Linux RNG and mixes it into the OpenSSL PRNG (default RAND engine).
     *
     * <p>NOTE: This modifies the OpenSSL PRNG shared by all instances of OpenSSLRandom and other
     * crypto primitives offered by or built on top of OpenSSL.
     */
    public static void seedOpenSSLPRNGFromLinuxRNG() {
        int seedLengthInBytes = NativeCrypto.RAND_SEED_LENGTH_IN_BYTES;
        int bytesRead = NativeCrypto.RAND_load_file("/dev/urandom", seedLengthInBytes);
        if (bytesRead != seedLengthInBytes) {
            throw new SecurityException("Failed to read sufficient bytes from /dev/urandom."
                    + " Expected: " + seedLengthInBytes + ", actual: " + bytesRead);
        }
    }
}
