mirror of
https://github.com/mjl-/mox.git
synced 2024-12-27 08:53:48 +03:00
2535f351ed
firstly by using crypto/rand in those cases. and secondly by putting a lock around the Read (though it isn't used at the moment). found while working while implementing sending tls reports.
36 lines
745 B
Go
36 lines
745 B
Go
package mox
|
|
|
|
import (
|
|
cryptorand "crypto/rand"
|
|
"encoding/binary"
|
|
"fmt"
|
|
mathrand "math/rand"
|
|
"sync"
|
|
)
|
|
|
|
type rand struct {
|
|
*mathrand.Rand
|
|
sync.Mutex
|
|
}
|
|
|
|
// NewPseudoRand returns a new PRNG seeded with random bytes from crypto/rand.
|
|
func NewPseudoRand() *rand {
|
|
return &rand{Rand: mathrand.New(mathrand.NewSource(CryptoRandInt()))}
|
|
}
|
|
|
|
// Read can be called concurrently.
|
|
func (r *rand) Read(buf []byte) (int, error) {
|
|
r.Lock()
|
|
defer r.Unlock()
|
|
return r.Rand.Read(buf)
|
|
}
|
|
|
|
// CryptoRandInt returns a cryptographically random number.
|
|
func CryptoRandInt() int64 {
|
|
buf := make([]byte, 8)
|
|
_, err := cryptorand.Read(buf)
|
|
if err != nil {
|
|
panic(fmt.Errorf("reading random bytes: %v", err))
|
|
}
|
|
return int64(binary.LittleEndian.Uint64(buf))
|
|
}
|