X-Git-Url: http://plrg.eecs.uci.edu/git/?a=blobdiff_plain;f=folly%2FRandom.cpp;h=524b9d06956fd3c14a760cae11a9d35924a3045b;hb=f9d70dcd4d83d3894458ab68a2e6353cb2e7668c;hp=3ba3411e876012943e6802cc5e65dcc7705edeeb;hpb=a9ba07eb94a5b85985859568789559882ad0e33d;p=folly.git diff --git a/folly/Random.cpp b/folly/Random.cpp index 3ba3411e..524b9d06 100644 --- a/folly/Random.cpp +++ b/folly/Random.cpp @@ -1,5 +1,5 @@ /* - * Copyright 2014 Facebook, Inc. + * Copyright 2017 Facebook, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -14,71 +14,140 @@ * limitations under the License. */ -#include "folly/Random.h" +#include +#include #include -#include -#include +#include #include -#include -#if __GNUC_PREREQ(4, 8) -#include -#define USE_SIMD_PRNG +#include +#include +#include +#include +#include +#include +#include +#include + +#ifdef _MSC_VER +#include // @manual #endif namespace folly { namespace { -std::atomic seedInput(0); -} -uint32_t randomNumberSeed() { - struct timeval tv; - gettimeofday(&tv, NULL); - const uint32_t kPrime0 = 51551; - const uint32_t kPrime1 = 61631; - const uint32_t kPrime2 = 64997; - const uint32_t kPrime3 = 111857; - return kPrime0 * (seedInput++) - + kPrime1 * static_cast(getpid()) - + kPrime2 * static_cast(tv.tv_sec) - + kPrime3 * static_cast(tv.tv_usec); +void readRandomDevice(void* data, size_t size) { +#ifdef _MSC_VER + static folly::once_flag flag; + static HCRYPTPROV cryptoProv; + folly::call_once(flag, [&] { + if (!CryptAcquireContext( + &cryptoProv, + nullptr, + nullptr, + PROV_RSA_FULL, + CRYPT_VERIFYCONTEXT)) { + if (GetLastError() == NTE_BAD_KEYSET) { + // Mostly likely cause of this is that no key container + // exists yet, so try to create one. + PCHECK(CryptAcquireContext( + &cryptoProv, nullptr, nullptr, PROV_RSA_FULL, CRYPT_NEWKEYSET)); + } else { + LOG(FATAL) << "Failed to acquire the default crypto context."; + } + } + }); + CHECK(size <= std::numeric_limits::max()); + PCHECK(CryptGenRandom(cryptoProv, (DWORD)size, (BYTE*)data)); +#else + // Keep the random device open for the duration of the program. + static int randomFd = ::open("/dev/urandom", O_RDONLY); + PCHECK(randomFd >= 0); + auto bytesRead = readFull(randomFd, data, size); + PCHECK(bytesRead >= 0 && size_t(bytesRead) == size); +#endif } +class BufferedRandomDevice { + public: + static constexpr size_t kDefaultBufferSize = 128; + + explicit BufferedRandomDevice(size_t bufferSize = kDefaultBufferSize); -folly::ThreadLocalPtr -ThreadLocalPRNG::localInstance; + void get(void* data, size_t size) { + if (LIKELY(size <= remaining())) { + memcpy(data, ptr_, size); + ptr_ += size; + } else { + getSlow(static_cast(data), size); + } + } -class ThreadLocalPRNG::LocalInstancePRNG { -#ifdef USE_SIMD_PRNG - typedef __gnu_cxx::sfmt19937 RNG; -#else - typedef std::mt19937 RNG; -#endif + private: + void getSlow(unsigned char* data, size_t size); + + inline size_t remaining() const { + return size_t(buffer_.get() + bufferSize_ - ptr_); + } - static RNG makeRng() { - std::array seed_data; - std::random_device r; - std::generate_n(seed_data.data(), seed_data.size(), std::ref(r)); - std::seed_seq seq(std::begin(seed_data), std::end(seed_data)); - return RNG(seq); + const size_t bufferSize_; + std::unique_ptr buffer_; + unsigned char* ptr_; +}; + +BufferedRandomDevice::BufferedRandomDevice(size_t bufferSize) + : bufferSize_(bufferSize), + buffer_(new unsigned char[bufferSize]), + ptr_(buffer_.get() + bufferSize) { // refill on first use +} + +void BufferedRandomDevice::getSlow(unsigned char* data, size_t size) { + DCHECK_GT(size, remaining()); + if (size >= bufferSize_) { + // Just read directly. + readRandomDevice(data, size); + return; } + size_t copied = remaining(); + memcpy(data, ptr_, copied); + data += copied; + size -= copied; + + // refill + readRandomDevice(buffer_.get(), bufferSize_); + ptr_ = buffer_.get(); + + memcpy(data, ptr_, size); + ptr_ += size; +} + +struct RandomTag {}; + +} // namespace + +void Random::secureRandom(void* data, size_t size) { + static SingletonThreadLocal + bufferedRandomDevice; + bufferedRandomDevice.get().get(data, size); +} + +class ThreadLocalPRNG::LocalInstancePRNG { public: - LocalInstancePRNG() : rng(std::move(makeRng())) {} + LocalInstancePRNG() : rng(Random::create()) {} - RNG rng; + Random::DefaultGenerator rng; }; -ThreadLocalPRNG::LocalInstancePRNG* ThreadLocalPRNG::initLocal() { - auto ret = new LocalInstancePRNG; - localInstance.reset(ret); - return ret; +ThreadLocalPRNG::ThreadLocalPRNG() { + static SingletonThreadLocal + localInstancePRNG; + local_ = &localInstancePRNG.get(); } uint32_t ThreadLocalPRNG::getImpl(LocalInstancePRNG* local) { return local->rng(); } - }