X-Git-Url: http://plrg.eecs.uci.edu/git/?p=folly.git;a=blobdiff_plain;f=folly%2FRandom.cpp;h=5f94f00cbd7696db7094978c2e908f1ef6b4d864;hp=f18d6f33a78f26bcc405c28b32c5d24f652e04dc;hb=a91971707da2903e1d28a58ac18ae369df7fbf53;hpb=a4eda9d3a960b35fbf1d5a3d4ac028a604637313 diff --git a/folly/Random.cpp b/folly/Random.cpp index f18d6f33..5f94f00c 100644 --- a/folly/Random.cpp +++ b/folly/Random.cpp @@ -1,5 +1,5 @@ /* - * Copyright 2014 Facebook, Inc. + * Copyright 2017 Facebook, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -16,24 +16,58 @@ #include +#include #include -#include -#include +#include #include -#include -#include #include #include +#include +#include +#include +#include +#include +#include + +#ifdef _MSC_VER +#include // @manual +#endif namespace folly { namespace { void readRandomDevice(void* data, size_t size) { - // Keep it open for the duration of the program - static File randomDevice("/dev/urandom"); - PCHECK(readFull(randomDevice.fd(), data, size) == size); +#ifdef _MSC_VER + static folly::once_flag flag; + static HCRYPTPROV cryptoProv; + folly::call_once(flag, [&] { + if (!CryptAcquireContext( + &cryptoProv, + nullptr, + nullptr, + PROV_RSA_FULL, + CRYPT_VERIFYCONTEXT)) { + if (GetLastError() == NTE_BAD_KEYSET) { + // Mostly likely cause of this is that no key container + // exists yet, so try to create one. + PCHECK(CryptAcquireContext( + &cryptoProv, nullptr, nullptr, PROV_RSA_FULL, CRYPT_NEWKEYSET)); + } else { + LOG(FATAL) << "Failed to acquire the default crypto context."; + } + } + }); + CHECK(size <= std::numeric_limits::max()); + PCHECK(CryptGenRandom(cryptoProv, (DWORD)size, (BYTE*)data)); +#else + // Keep the random device open for the duration of the program. + static int randomFd = ::open("/dev/urandom", O_RDONLY); + PCHECK(randomFd >= 0); + auto bytesRead = readFull(randomFd, data, size); + PCHECK(bytesRead >= 0 && size_t(bytesRead) == size); +#endif } class BufferedRandomDevice { @@ -55,7 +89,7 @@ class BufferedRandomDevice { void getSlow(unsigned char* data, size_t size); inline size_t remaining() const { - return buffer_.get() + bufferSize_ - ptr_; + return size_t(buffer_.get() + bufferSize_ - ptr_); } const size_t bufferSize_; @@ -90,28 +124,30 @@ void BufferedRandomDevice::getSlow(unsigned char* data, size_t size) { ptr_ += size; } +struct RandomTag {}; -} // namespace +} // namespace void Random::secureRandom(void* data, size_t size) { - static ThreadLocal bufferedRandomDevice; - bufferedRandomDevice->get(data, size); -} - -ThreadLocalPRNG::ThreadLocalPRNG() { - static folly::ThreadLocal localInstance; - local_ = localInstance.get(); + static SingletonThreadLocal + bufferedRandomDevice; + bufferedRandomDevice.get().get(data, size); } class ThreadLocalPRNG::LocalInstancePRNG { public: - LocalInstancePRNG() : rng(Random::create()) { } + LocalInstancePRNG() : rng(Random::create()) {} Random::DefaultGenerator rng; }; -uint32_t ThreadLocalPRNG::getImpl(LocalInstancePRNG* local) { - return local->rng(); +ThreadLocalPRNG::ThreadLocalPRNG() { + static SingletonThreadLocal + localInstancePRNG; + local_ = &localInstancePRNG.get(); } +uint32_t ThreadLocalPRNG::getImpl(LocalInstancePRNG* local) { + return local->rng(); } +} // namespace folly