summaryrefslogtreecommitdiffhomepage
path: root/src/os.c
blob: 96e3c48654baf064e57aa1059a334504fc2b6f72 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
/*
 * Copyright © 2021 Michael Smith <mikesmiffy128@gmail.com>
 *
 * Permission to use, copy, modify, and/or distribute this software for any
 * purpose with or without fee is hereby granted, provided that the above
 * copyright notice and this permission notice appear in all copies.
 *
 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
 * AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR
 * OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
 * PERFORMANCE OF THIS SOFTWARE.
 */

#include <stdbool.h>

#include "intdefs.h"
#include "os.h"

#ifdef _WIN32
// SystemFunction036 is the *real* name of "RtlGenRandom," and is also
// incorrectly defined in system headers. Yay, Windows.
int __stdcall SystemFunction036(void *buf, ulong sz);
#endif

bool os_mprot(void *addr, int len, int fl) {
#ifdef _WIN32
	ulong old;
	return !!VirtualProtect(addr, len, fl, &old);
#else
	// round down address and round up size
	addr = (void *)((ulong)addr & ~(4095));
	len = len + 4095 & ~(4095);
	return mprotect(addr, len, fl) != -1;
#endif
}

#ifdef _WIN32
void *os_dlsym(void *m, const char *s) {
	return (void *)GetProcAddress(m, s);
}
#endif

void os_randombytes(void *buf, int sz) {
	// if these calls ever fail, the system is fundamentally broken with no
	// recourse, so just loop until success. hopefully nothing will go wrong.
#ifdef _WIN32
	while (!SystemFunction036(buf, sz));
#else
	while (getentropy(buf, sz) == -1);
#endif
}

// vi: sw=4 ts=4 noet tw=80 cc=80