@@ -45,33 +45,33 @@
#if defined(OPENSSL_LINUX)
#if defined(OPENSSL_X86_64)
#define EXPECTED_SYS _getrandom 318
#define EXPECTED_NR _getrandom 318
#elif defined(OPENSSL_X86)
#define EXPECTED_SYS _getrandom 355
#define EXPECTED_NR _getrandom 355
#elif defined(OPENSSL_AARCH64)
#define EXPECTED_SYS _getrandom 278
#define EXPECTED_NR _getrandom 278
#elif defined(OPENSSL_ARM)
#define EXPECTED_SYS _getrandom 384
#define EXPECTED_NR _getrandom 384
#elif defined(OPENSSL_PPC64LE)
#define EXPECTED_SYS _getrandom 359
#define EXPECTED_NR _getrandom 359
#endif
#if defined(EXPECTED_SYS _getrandom)
#define USE_SYS _getrandom
#if defined(EXPECTED_NR _getrandom)
#define USE_NR _getrandom
#if defined(SYS _getrandom)
#if defined(__NR _getrandom)
#if SYS_getrandom != EXPECTED_SYS _getrandom
#if __NR_getrandom != EXPECTED_NR _getrandom
#error "system call number for getrandom is not the expected value"
#endif
#else /* SYS _getrandom */
#else /* __NR _getrandom */
#define SYS_getrandom EXPECTED_SYS _getrandom
#define __NR_getrandom EXPECTED_NR _getrandom
#endif /* SYS _getrandom */
#endif /* __NR _getrandom */
#endif /* EXPECTED_SYS _getrandom */
#endif /* EXPECTED_NR _getrandom */
#if !defined(GRND_NONBLOCK)
#define GRND_NONBLOCK 1
@@ -95,7 +95,7 @@ DEFINE_BSS_GET(int, urandom_fd);
DEFINE_STATIC_ONCE(rand_once);
#if defined(USE_SYS _getrandom) || defined(BORINGSSL_FIPS)
#if defined(USE_NR _getrandom) || defined(BORINGSSL_FIPS)
/* message writes |msg| to stderr. We use this because referencing |stderr|
* with |fprintf| generates relocations, which is a problem inside the FIPS
* module. */
@@ -116,10 +116,10 @@ static void init_once(void) {
int fd = *urandom_fd_requested_bss_get();
CRYPTO_STATIC_MUTEX_unlock_read(rand_lock_bss_get());
#if defined(USE_SYS _getrandom)
#if defined(USE_NR _getrandom)
uint8_t dummy;
long getrandom_ret =
syscall(SYS _getrandom, &dummy, sizeof(dummy), GRND_NONBLOCK);
syscall(__NR _getrandom, &dummy, sizeof(dummy), GRND_NONBLOCK);
if (getrandom_ret == 1) {
*urandom_fd_bss_get() = kHaveGetrandom;
@@ -132,7 +132,7 @@ static void init_once(void) {
do {
getrandom_ret =
syscall(SYS _getrandom, &dummy, sizeof(dummy), 0 /* no flags */);
syscall(__NR _getrandom, &dummy, sizeof(dummy), 0 /* no flags */);
} while (getrandom_ret == -1 && errno == EINTR);
if (getrandom_ret == 1) {
@@ -140,7 +140,7 @@ static void init_once(void) {
return;
}
}
#endif /* USE_SYS _getrandom */
#endif /* USE_NR _getrandom */
if (fd == kUnset) {
do {
@@ -234,7 +234,7 @@ void RAND_set_urandom_fd(int fd) {
}
}
#if defined(USE_SYS _getrandom) && defined(OPENSSL_MSAN)
#if defined(USE_NR _getrandom) && defined(OPENSSL_MSAN)
void __msan_unpoison(void *, size_t);
#endif
@@ -245,9 +245,9 @@ static char fill_with_entropy(uint8_t *out, size_t len) {
ssize_t r;
if (*urandom_fd_bss_get() == kHaveGetrandom) {
#if defined(USE_SYS _getrandom)
#if defined(USE_NR _getrandom)
do {
r = syscall(SYS _getrandom, out, len, 0 /* no flags */);
r = syscall(__NR _getrandom, out, len, 0 /* no flags */);
} while (r == -1 && errno == EINTR);
#if defined(OPENSSL_MSAN)
@@ -258,7 +258,7 @@ static char fill_with_entropy(uint8_t *out, size_t len) {
}
#endif /* OPENSSL_MSAN */
#else /* USE_SYS _getrandom */
#else /* USE_NR _getrandom */
abort();
#endif
} else {