X-Git-Url: http://plrg.eecs.uci.edu/git/?a=blobdiff_plain;f=folly%2FRandom.cpp;h=1f64b1345e6c5e36300160e23a163159ca7783c7;hb=1d11ad7a0af6277ca6ed2ad147ac16a2e7ac3760;hp=a2c04df3cc1a7666c443202267440053dd224e7f;hpb=5992ca78fa8446907add3263fcb40801d46c1e77;p=folly.git diff --git a/folly/Random.cpp b/folly/Random.cpp index a2c04df3..1f64b134 100644 --- a/folly/Random.cpp +++ b/folly/Random.cpp @@ -1,5 +1,5 @@ /* - * Copyright 2014 Facebook, Inc. + * Copyright 2017 Facebook, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -14,71 +14,140 @@ * limitations under the License. */ -#include "folly/Random.h" +#include #include -#include -#include +#include #include #include -#if __GNUC_PREREQ(4, 8) && !defined(ANDROID) -#include -#define USE_SIMD_PRNG +#include +#include +#include +#include +#include +#include +#include +#include + +#ifdef _MSC_VER +# include #endif namespace folly { namespace { -std::atomic seedInput(0); -} -uint32_t randomNumberSeed() { - struct timeval tv; - gettimeofday(&tv, nullptr); - const uint32_t kPrime0 = 51551; - const uint32_t kPrime1 = 61631; - const uint32_t kPrime2 = 64997; - const uint32_t kPrime3 = 111857; - return kPrime0 * (seedInput++) - + kPrime1 * static_cast(getpid()) - + kPrime2 * static_cast(tv.tv_sec) - + kPrime3 * static_cast(tv.tv_usec); +void readRandomDevice(void* data, size_t size) { +#ifdef _MSC_VER + static folly::once_flag flag; + static HCRYPTPROV cryptoProv; + folly::call_once(flag, [&] { + if (!CryptAcquireContext( + &cryptoProv, + nullptr, + nullptr, + PROV_RSA_FULL, + CRYPT_VERIFYCONTEXT)) { + if (GetLastError() == NTE_BAD_KEYSET) { + // Mostly likely cause of this is that no key container + // exists yet, so try to create one. + PCHECK(CryptAcquireContext( + &cryptoProv, nullptr, nullptr, PROV_RSA_FULL, CRYPT_NEWKEYSET)); + } else { + LOG(FATAL) << "Failed to acquire the default crypto context."; + } + } + }); + CHECK(size <= std::numeric_limits::max()); + PCHECK(CryptGenRandom(cryptoProv, (DWORD)size, (BYTE*)data)); +#else + // Keep the random device open for the duration of the program. + static int randomFd = ::open("/dev/urandom", O_RDONLY); + PCHECK(randomFd >= 0); + auto bytesRead = readFull(randomFd, data, size); + PCHECK(bytesRead >= 0 && size_t(bytesRead) == size); +#endif } +class BufferedRandomDevice { + public: + static constexpr size_t kDefaultBufferSize = 128; -folly::ThreadLocalPtr -ThreadLocalPRNG::localInstance; + explicit BufferedRandomDevice(size_t bufferSize = kDefaultBufferSize); -class ThreadLocalPRNG::LocalInstancePRNG { -#ifdef USE_SIMD_PRNG - typedef __gnu_cxx::sfmt19937 RNG; -#else - typedef std::mt19937 RNG; -#endif + void get(void* data, size_t size) { + if (LIKELY(size <= remaining())) { + memcpy(data, ptr_, size); + ptr_ += size; + } else { + getSlow(static_cast(data), size); + } + } + + private: + void getSlow(unsigned char* data, size_t size); + + inline size_t remaining() const { + return size_t(buffer_.get() + bufferSize_ - ptr_); + } + + const size_t bufferSize_; + std::unique_ptr buffer_; + unsigned char* ptr_; +}; + +BufferedRandomDevice::BufferedRandomDevice(size_t bufferSize) + : bufferSize_(bufferSize), + buffer_(new unsigned char[bufferSize]), + ptr_(buffer_.get() + bufferSize) { // refill on first use +} - static RNG makeRng() { - std::array seed_data; - std::random_device r; - std::generate_n(seed_data.data(), seed_data.size(), std::ref(r)); - std::seed_seq seq(std::begin(seed_data), std::end(seed_data)); - return RNG(seq); +void BufferedRandomDevice::getSlow(unsigned char* data, size_t size) { + DCHECK_GT(size, remaining()); + if (size >= bufferSize_) { + // Just read directly. + readRandomDevice(data, size); + return; } + size_t copied = remaining(); + memcpy(data, ptr_, copied); + data += copied; + size -= copied; + + // refill + readRandomDevice(buffer_.get(), bufferSize_); + ptr_ = buffer_.get(); + + memcpy(data, ptr_, size); + ptr_ += size; +} + +struct RandomTag {}; + +} // namespace + +void Random::secureRandom(void* data, size_t size) { + static SingletonThreadLocal + bufferedRandomDevice; + bufferedRandomDevice.get().get(data, size); +} + +class ThreadLocalPRNG::LocalInstancePRNG { public: - LocalInstancePRNG() : rng(std::move(makeRng())) {} + LocalInstancePRNG() : rng(Random::create()) {} - RNG rng; + Random::DefaultGenerator rng; }; -ThreadLocalPRNG::LocalInstancePRNG* ThreadLocalPRNG::initLocal() { - auto ret = new LocalInstancePRNG; - localInstance.reset(ret); - return ret; +ThreadLocalPRNG::ThreadLocalPRNG() { + static SingletonThreadLocal + localInstancePRNG; + local_ = &localInstancePRNG.get(); } uint32_t ThreadLocalPRNG::getImpl(LocalInstancePRNG* local) { return local->rng(); } - }