570c9025e0
This is an automated DistroBaker update from upstream sources. If you do not know what this is about or would like to opt out, contact the OSCI team. Source: https://src.fedoraproject.org/rpms/libgcrypt.git#e12a03494690ed17d13ee81d78f4e1d8e7b0a083
78 lines
2.6 KiB
Diff
78 lines
2.6 KiB
Diff
diff -up libgcrypt-1.8.4/random/rndlinux.c.use-poll libgcrypt-1.8.4/random/rndlinux.c
|
|
--- libgcrypt-1.8.4/random/rndlinux.c.use-poll 2018-10-26 13:50:20.000000000 +0200
|
|
+++ libgcrypt-1.8.4/random/rndlinux.c 2018-11-20 15:51:56.760669058 +0100
|
|
@@ -32,6 +32,7 @@
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <fcntl.h>
|
|
+#include <poll.h>
|
|
#if defined(__linux__) || !defined(HAVE_GETENTROPY)
|
|
#ifdef HAVE_SYSCALL
|
|
# include <sys/syscall.h>
|
|
@@ -241,9 +242,8 @@ _gcry_rndlinux_gather_random (void (*add
|
|
return with something we will actually use 100ms. */
|
|
while (length)
|
|
{
|
|
- fd_set rfds;
|
|
- struct timeval tv;
|
|
int rc;
|
|
+ struct pollfd pfd;
|
|
|
|
/* If we have a modern operating system, we first try to use the new
|
|
* getentropy function. That call guarantees that the kernel's
|
|
@@ -300,36 +300,25 @@ _gcry_rndlinux_gather_random (void (*add
|
|
any_need_entropy = 1;
|
|
}
|
|
|
|
- /* If the system has no limit on the number of file descriptors
|
|
- and we encounter an fd which is larger than the fd_set size,
|
|
- we don't use the select at all. The select code is only used
|
|
- to emit progress messages. A better solution would be to
|
|
- fall back to poll() if available. */
|
|
-#ifdef FD_SETSIZE
|
|
- if (fd < FD_SETSIZE)
|
|
-#endif
|
|
+ pfd.fd = fd;
|
|
+ pfd.events = POLLIN;
|
|
+
|
|
+ _gcry_pre_syscall ();
|
|
+ rc = poll(&pfd, 1, delay);
|
|
+ _gcry_post_syscall ();
|
|
+ if (!rc)
|
|
{
|
|
- FD_ZERO(&rfds);
|
|
- FD_SET(fd, &rfds);
|
|
- tv.tv_sec = delay;
|
|
- tv.tv_usec = delay? 0 : 100000;
|
|
- _gcry_pre_syscall ();
|
|
- rc = select (fd+1, &rfds, NULL, NULL, &tv);
|
|
- _gcry_post_syscall ();
|
|
- if (!rc)
|
|
- {
|
|
- any_need_entropy = 1;
|
|
- delay = 3; /* Use 3 seconds henceforth. */
|
|
- continue;
|
|
- }
|
|
- else if( rc == -1 )
|
|
- {
|
|
- log_error ("select() error: %s\n", strerror(errno));
|
|
- if (!delay)
|
|
- delay = 1; /* Use 1 second if we encounter an error before
|
|
- we have ever blocked. */
|
|
- continue;
|
|
- }
|
|
+ any_need_entropy = 1;
|
|
+ delay = 3000; /* Use 3 seconds henceforth. */
|
|
+ continue;
|
|
+ }
|
|
+ else if( rc == -1 )
|
|
+ {
|
|
+ log_error ("poll() error: %s\n", strerror(errno));
|
|
+ if (!delay)
|
|
+ delay = 1000; /* Use 1 second if we encounter an error before
|
|
+ we have ever blocked. */
|
|
+ continue;
|
|
}
|
|
|
|
do
|