Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/trunk]: src add arc4random_{buf,uniform}, from OpenBSD.



details:   https://anonhg.NetBSD.org/src/rev/ba79b8319b25
branches:  trunk
changeset: 761671:ba79b8319b25
user:      christos <christos%NetBSD.org@localhost>
date:      Fri Feb 04 22:07:07 2011 +0000

description:
add arc4random_{buf,uniform}, from OpenBSD.

diffstat:

 include/stdlib.h          |    4 +-
 lib/libc/gen/arc4random.3 |   24 ++++++++-
 lib/libc/gen/arc4random.c |  119 ++++++++++++++++++++++++++++++++++-----------
 3 files changed, 114 insertions(+), 33 deletions(-)

diffs (281 lines):

diff -r e5b8f67407a1 -r ba79b8319b25 include/stdlib.h
--- a/include/stdlib.h  Fri Feb 04 20:06:23 2011 +0000
+++ b/include/stdlib.h  Fri Feb 04 22:07:07 2011 +0000
@@ -1,4 +1,4 @@
-/*     $NetBSD: stdlib.h,v 1.94 2010/12/22 19:47:56 jruoho Exp $       */
+/*     $NetBSD: stdlib.h,v 1.95 2011/02/04 22:07:07 christos Exp $     */
 
 /*-
  * Copyright (c) 1990, 1993
@@ -250,6 +250,8 @@
 
 uint32_t arc4random(void);
 void    arc4random_stir(void);
+void    arc4random_buf(void *, size_t);
+uint32_t arc4random_uniform(uint32_t);
 void    arc4random_addrandom(u_char *, int);
 char   *getbsize(int *, long *);
 char   *cgetcap(char *, const char *, int);
diff -r e5b8f67407a1 -r ba79b8319b25 lib/libc/gen/arc4random.3
--- a/lib/libc/gen/arc4random.3 Fri Feb 04 20:06:23 2011 +0000
+++ b/lib/libc/gen/arc4random.3 Fri Feb 04 22:07:07 2011 +0000
@@ -1,4 +1,4 @@
-.\"    $NetBSD: arc4random.3,v 1.7 2005/12/26 19:40:14 perry Exp $
+.\"    $NetBSD: arc4random.3,v 1.8 2011/02/04 22:07:07 christos Exp $
 .\" $OpenBSD: arc4random.3,v 1.17 2000/12/21 14:07:41 aaron Exp $
 .\"
 .\" Copyright 1997 Niels Provos <provos%physnet.uni-hamburg.de@localhost>
@@ -31,11 +31,13 @@
 .\"
 .\" Manual page, using -mandoc macros
 .\"
-.Dd April 15, 1997
+.Dd February 4, 2011
 .Dt ARC4RANDOM 3
 .Os
 .Sh NAME
 .Nm arc4random ,
+.Nm arc4random_buf ,
+.Nm arc4random_uniform ,
 .Nm arc4random_stir ,
 .Nm arc4random_addrandom
 .Nd arc4 random number generator
@@ -46,6 +48,10 @@
 .Ft uint32_t
 .Fn arc4random "void"
 .Ft void
+.Fn arc4random_buf "void *buffer" "size_t length"
+.Ft uint32_t
+.Fn arc4random_uniform "uint32_t upper_bound"
+.Ft void
 .Fn arc4random_stir "void"
 .Ft void
 .Fn arc4random_addrandom "u_char *dat" "int datlen"
@@ -76,6 +82,20 @@
 and
 .Xr drand48 3 .
 .Pp
+The 
+.Fn arc4random_buf 
+function fills the 
+.Fa buffer
+with 
+.Fa length
+bytes of ARC4-derived random data.
+.Pp
+The
+.Fn arc4random_uniform
+function returns a uniformly distributed random number less than
+.Fa upper_bound
+avoiding modulo bias when the upper bound is not a power of two.
+.Pp
 The
 .Fn arc4random_stir
 function reads data from
diff -r e5b8f67407a1 -r ba79b8319b25 lib/libc/gen/arc4random.c
--- a/lib/libc/gen/arc4random.c Fri Feb 04 20:06:23 2011 +0000
+++ b/lib/libc/gen/arc4random.c Fri Feb 04 22:07:07 2011 +0000
@@ -1,4 +1,4 @@
-/*     $NetBSD: arc4random.c,v 1.9 2005/12/24 21:11:16 perry Exp $     */
+/*     $NetBSD: arc4random.c,v 1.10 2011/02/04 22:07:07 christos Exp $ */
 /*     $OpenBSD: arc4random.c,v 1.6 2001/06/05 05:05:38 pvalchev Exp $ */
 
 /*
@@ -27,7 +27,7 @@
 
 #include <sys/cdefs.h>
 #if defined(LIBC_SCCS) && !defined(lint)
-__RCSID("$NetBSD: arc4random.c,v 1.9 2005/12/24 21:11:16 perry Exp $");
+__RCSID("$NetBSD: arc4random.c,v 1.10 2011/02/04 22:07:07 christos Exp $");
 #endif /* LIBC_SCCS and not lint */
 
 #include "namespace.h"
@@ -44,9 +44,9 @@
 #endif
 
 struct arc4_stream {
-       u_int8_t i;
-       u_int8_t j;
-       u_int8_t s[256];
+       uint8_t i;
+       uint8_t j;
+       uint8_t s[256];
 };
 
 static int rs_initialized;
@@ -55,12 +55,11 @@
 static inline void arc4_init(struct arc4_stream *);
 static inline void arc4_addrandom(struct arc4_stream *, u_char *, int);
 static void arc4_stir(struct arc4_stream *);
-static inline u_int8_t arc4_getbyte(struct arc4_stream *);
-static inline u_int32_t arc4_getword(struct arc4_stream *);
+static inline uint8_t arc4_getbyte(struct arc4_stream *);
+static inline uint32_t arc4_getword(struct arc4_stream *);
 
 static inline void
-arc4_init(as)
-       struct arc4_stream *as;
+arc4_init(struct arc4_stream *as)
 {
        int     n;
 
@@ -71,13 +70,10 @@
 }
 
 static inline void
-arc4_addrandom(as, dat, datlen)
-       struct arc4_stream *as;
-       u_char *dat;
-       int     datlen;
+arc4_addrandom(struct arc4_stream *as, u_char *dat, int datlen)
 {
        int     n;
-       u_int8_t si;
+       uint8_t si;
 
        as->i--;
        for (n = 0; n < 256; n++) {
@@ -91,8 +87,7 @@
 }
 
 static void
-arc4_stir(as)
-       struct arc4_stream *as;
+arc4_stir(struct arc4_stream *as)
 {
        int     fd;
        struct {
@@ -140,11 +135,10 @@
                arc4_getbyte(as);
 }
 
-static inline u_int8_t
-arc4_getbyte(as)
-       struct arc4_stream *as;
+static inline uint8_t
+arc4_getbyte(struct arc4_stream *as)
 {
-       u_int8_t si, sj;
+       uint8_t si, sj;
 
        as->i = (as->i + 1);
        si = as->s[as->i];
@@ -155,11 +149,10 @@
        return (as->s[(si + sj) & 0xff]);
 }
 
-static inline u_int32_t
-arc4_getword(as)
-       struct arc4_stream *as;
+static inline uint32_t
+arc4_getword(struct arc4_stream *as)
 {
-       u_int32_t val;
+       uint32_t val;
        val = arc4_getbyte(as) << 24;
        val |= arc4_getbyte(as) << 16;
        val |= arc4_getbyte(as) << 8;
@@ -168,7 +161,7 @@
 }
 
 void
-arc4random_stir()
+arc4random_stir(void)
 {
        if (!rs_initialized) {
                arc4_init(&rs);
@@ -178,23 +171,89 @@
 }
 
 void
-arc4random_addrandom(dat, datlen)
-       u_char *dat;
-       int     datlen;
+arc4random_addrandom(u_char *dat, int datlen)
 {
        if (!rs_initialized)
                arc4random_stir();
        arc4_addrandom(&rs, dat, datlen);
 }
 
-u_int32_t
-arc4random()
+uint32_t
+arc4random(void)
 {
        if (!rs_initialized)
                arc4random_stir();
        return arc4_getword(&rs);
 }
 
+void
+arc4random_buf(void *buf, size_t len)
+{
+       uint8_t *bp = buf;
+       uint8_t *ep = bp + len;
+
+       bp[0] = arc4_getbyte(&rs) % 3;
+       while (bp[0]--)
+               (void)arc4_getbyte(&rs);
+
+       while (bp < ep)
+               *bp++ = arc4_getbyte(&rs);
+}
+
+/*-
+ * Written by Damien Miller.
+ * With simplifications by Jinmei Tatuya.
+ */
+
+/*
+ * Calculate a uniformly distributed random number less than
+ * upper_bound avoiding "modulo bias".
+ *
+ * Uniformity is achieved by generating new random numbers
+ * until the one returned is outside the range
+ * [0, 2^32 % upper_bound[. This guarantees the selected
+ * random number will be inside the range
+ * [2^32 % upper_bound, 2^32[ which maps back to
+ * [0, upper_bound[ after reduction modulo upper_bound.
+ */
+uint32_t
+arc4random_uniform(uint32_t upper_bound)
+{
+       uint32_t r, min;
+
+       if (upper_bound < 2)
+               return 0;
+
+#if defined(ULONG_MAX) && (ULONG_MAX > 0xFFFFFFFFUL)
+       min = 0x100000000UL % upper_bound;
+#else
+       /* calculate (2^32 % upper_bound) avoiding 64-bit math */
+       if (upper_bound > 0x80000000U)
+               /* 2^32 - upper_bound (only one "value area") */
+               min = 1 + ~upper_bound;
+       else
+               /* ((2^32 - x) % x) == (2^32 % x) when x <= 2^31 */
+               min = (0xFFFFFFFFU - upper_bound + 1) % upper_bound;
+#endif
+
+       /*
+        * This could theoretically loop forever but each retry has
+        * p > 0.5 (worst case, usually far better) of selecting a
+        * number inside the range we need, so it should rarely need
+        * to re-roll (at all).
+        */
+       if (!rs_initialized)
+               arc4random_stir();
+       if (arc4_getbyte(&rs) & 1)
+               (void)arc4_getbyte(&rs);
+       do
+               r = arc4_getword(&rs);
+       while (r < min);
+
+       return r % upper_bound;
+}
+
+
 #if 0
 /*-------- Test code for i386 --------*/
 #include <stdio.h>



Home | Main Index | Thread Index | Old Index