blob: dcc271617cbe2fb830d50c28e881d916026348f4 [file] [log] [blame]
/*
* Copyright (c) 2024 Google LLC
*
* SPDX-License-Identifier: Apache-2.0
*/
#include <errno.h>
#include <zephyr/drivers/entropy.h>
#include <zephyr/kernel.h>
#include <zephyr/posix/unistd.h>
#define ENTROPY_NODE DT_CHOSEN(zephyr_entropy)
int getentropy(void *buffer, size_t length)
{
const struct device * const entropy = DEVICE_DT_GET(ENTROPY_NODE);
if (!buffer) {
errno = EFAULT;
return -1;
}
if (length > 256) {
errno = EIO;
return -1;
}
if (!device_is_ready(entropy)) {
errno = EIO;
return -1;
}
/*
* getentropy() uses size_t to represent buffer size, but Zephyr uses
* uint16_t. The length check above allows us to safely cast without
* overflow.
*/
if (entropy_get_entropy(entropy, buffer, (uint16_t)length)) {
errno = EIO;
return -1;
}
return 0;
}