X-Git-Url: http://plrg.eecs.uci.edu/git/?a=blobdiff_plain;ds=sidebyside;f=folly%2FRandom.cpp;h=5f94f00cbd7696db7094978c2e908f1ef6b4d864;hb=ad993b99e320a3e16d1671efe38052f0df203eb4;hp=e69a4452564e0fb32744cbf3e05d28b5dd37b089;hpb=52fceaf485e63d459d2df5858ffdbeaafe851dbf;p=folly.git diff --git a/folly/Random.cpp b/folly/Random.cpp index e69a4452..5f94f00c 100644 --- a/folly/Random.cpp +++ b/folly/Random.cpp @@ -1,5 +1,5 @@ /* - * Copyright 2014 Facebook, Inc. + * Copyright 2017 Facebook, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -14,71 +14,140 @@ * limitations under the License. */ -#include "folly/Random.h" +#include +#include #include -#include -#include +#include #include -#include -#if __GNUC_PREREQ(4, 8) -#include -#define USE_SIMD_PRNG +#include +#include +#include +#include +#include +#include +#include +#include + +#ifdef _MSC_VER +#include // @manual #endif namespace folly { namespace { -std::atomic seedInput(0); -} -uint32_t randomNumberSeed() { - struct timeval tv; - gettimeofday(&tv, nullptr); - const uint32_t kPrime0 = 51551; - const uint32_t kPrime1 = 61631; - const uint32_t kPrime2 = 64997; - const uint32_t kPrime3 = 111857; - return kPrime0 * (seedInput++) - + kPrime1 * static_cast(getpid()) - + kPrime2 * static_cast(tv.tv_sec) - + kPrime3 * static_cast(tv.tv_usec); +void readRandomDevice(void* data, size_t size) { +#ifdef _MSC_VER + static folly::once_flag flag; + static HCRYPTPROV cryptoProv; + folly::call_once(flag, [&] { + if (!CryptAcquireContext( + &cryptoProv, + nullptr, + nullptr, + PROV_RSA_FULL, + CRYPT_VERIFYCONTEXT)) { + if (GetLastError() == NTE_BAD_KEYSET) { + // Mostly likely cause of this is that no key container + // exists yet, so try to create one. + PCHECK(CryptAcquireContext( + &cryptoProv, nullptr, nullptr, PROV_RSA_FULL, CRYPT_NEWKEYSET)); + } else { + LOG(FATAL) << "Failed to acquire the default crypto context."; + } + } + }); + CHECK(size <= std::numeric_limits::max()); + PCHECK(CryptGenRandom(cryptoProv, (DWORD)size, (BYTE*)data)); +#else + // Keep the random device open for the duration of the program. + static int randomFd = ::open("/dev/urandom", O_RDONLY); + PCHECK(randomFd >= 0); + auto bytesRead = readFull(randomFd, data, size); + PCHECK(bytesRead >= 0 && size_t(bytesRead) == size); +#endif } +class BufferedRandomDevice { + public: + static constexpr size_t kDefaultBufferSize = 128; -folly::ThreadLocalPtr -ThreadLocalPRNG::localInstance; + explicit BufferedRandomDevice(size_t bufferSize = kDefaultBufferSize); -class ThreadLocalPRNG::LocalInstancePRNG { -#ifdef USE_SIMD_PRNG - typedef __gnu_cxx::sfmt19937 RNG; -#else - typedef std::mt19937 RNG; -#endif + void get(void* data, size_t size) { + if (LIKELY(size <= remaining())) { + memcpy(data, ptr_, size); + ptr_ += size; + } else { + getSlow(static_cast(data), size); + } + } + + private: + void getSlow(unsigned char* data, size_t size); - static RNG makeRng() { - std::array seed_data; - std::random_device r; - std::generate_n(seed_data.data(), seed_data.size(), std::ref(r)); - std::seed_seq seq(std::begin(seed_data), std::end(seed_data)); - return RNG(seq); + inline size_t remaining() const { + return size_t(buffer_.get() + bufferSize_ - ptr_); } + const size_t bufferSize_; + std::unique_ptr buffer_; + unsigned char* ptr_; +}; + +BufferedRandomDevice::BufferedRandomDevice(size_t bufferSize) + : bufferSize_(bufferSize), + buffer_(new unsigned char[bufferSize]), + ptr_(buffer_.get() + bufferSize) { // refill on first use +} + +void BufferedRandomDevice::getSlow(unsigned char* data, size_t size) { + DCHECK_GT(size, remaining()); + if (size >= bufferSize_) { + // Just read directly. + readRandomDevice(data, size); + return; + } + + size_t copied = remaining(); + memcpy(data, ptr_, copied); + data += copied; + size -= copied; + + // refill + readRandomDevice(buffer_.get(), bufferSize_); + ptr_ = buffer_.get(); + + memcpy(data, ptr_, size); + ptr_ += size; +} + +struct RandomTag {}; + +} // namespace + +void Random::secureRandom(void* data, size_t size) { + static SingletonThreadLocal + bufferedRandomDevice; + bufferedRandomDevice.get().get(data, size); +} + +class ThreadLocalPRNG::LocalInstancePRNG { public: - LocalInstancePRNG() : rng(std::move(makeRng())) {} + LocalInstancePRNG() : rng(Random::create()) {} - RNG rng; + Random::DefaultGenerator rng; }; -ThreadLocalPRNG::LocalInstancePRNG* ThreadLocalPRNG::initLocal() { - auto ret = new LocalInstancePRNG; - localInstance.reset(ret); - return ret; +ThreadLocalPRNG::ThreadLocalPRNG() { + static SingletonThreadLocal + localInstancePRNG; + local_ = &localInstancePRNG.get(); } uint32_t ThreadLocalPRNG::getImpl(LocalInstancePRNG* local) { return local->rng(); } - -} +} // namespace folly