/* * Copyright (c) 2009 Baptiste Coudurier * * This file is part of FFmpeg. * * FFmpeg is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * FFmpeg is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with FFmpeg; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA */ #include "config.h" #if HAVE_UNISTD_H #include #endif #if HAVE_IO_H #include #endif #if HAVE_BCRYPT #include #include #endif #if CONFIG_GCRYPT #include #elif CONFIG_OPENSSL #include #endif #include #include #include #include #include "avassert.h" #include "file_open.h" #include "internal.h" #include "intreadwrite.h" #include "timer.h" #include "random_seed.h" #include "sha.h" #ifndef TEST #define TEST 0 #endif static int read_random(uint8_t *dst, size_t len, const char *file) { #if HAVE_UNISTD_H FILE *fp = avpriv_fopen_utf8(file, "r"); size_t err; if (!fp) return AVERROR_UNKNOWN; setvbuf(fp, NULL, _IONBF, 0); err = fread(dst, 1, len, fp); fclose(fp); if (err != len) return AVERROR_UNKNOWN; return 0; #else return AVERROR(ENOSYS); #endif } static uint32_t get_generic_seed(void) { uint64_t tmp[120/8]; struct AVSHA *sha = (void*)tmp; clock_t last_t = 0; clock_t last_td = 0; clock_t init_t = 0; static uint64_t i = 0; static uint32_t buffer[512] = { 0 }; unsigned char digest[20]; uint64_t last_i = i; int repeats[3] = { 0 }; av_assert0(sizeof(tmp) >= av_sha_size); if(TEST){ memset(buffer, 0, sizeof(buffer)); last_i = i = 0; }else{ #ifdef AV_READ_TIME buffer[13] ^= AV_READ_TIME(); buffer[41] ^= AV_READ_TIME()>>32; #endif } for (;;) { clock_t t = clock(); int incremented_i = 0; int cur_td = t - last_t; if (last_t + 2*last_td + (CLOCKS_PER_SEC > 1000) < t) { // If the timer incremented by more than 2*last_td at once, // we may e.g. have had a context switch. If the timer resolution // is high (CLOCKS_PER_SEC > 1000), require that the timer // incremented by more than 1. If the timer resolution is low, // it is enough that the timer incremented at all. buffer[++i & 511] += cur_td % 3294638521U; incremented_i = 1; } else if (t != last_t && repeats[0] > 0 && repeats[1] > 0 && repeats[2] > 0 && repeats[0] != repeats[1] && repeats[0] != repeats[2]) { // If the timer resolution is high, and we get the same timer // value multiple times, use variances in the number of repeats // of each timer value as entropy. If we get a different number of // repeats than the last two unique cases, count that as entropy // and proceed to the next index. buffer[++i & 511] += (repeats[0] + repeats[1] + repeats[2]) % 3294638521U; incremented_i = 1; } else { buffer[i & 511] = 1664525*buffer[i & 511] + 1013904223 + (cur_td % 3294638521U); } if (incremented_i && (t - init_t) >= CLOCKS_PER_SEC>>5) { if (last_i && i - last_i > 4 || i - last_i > 64 || TEST && i - last_i > 8) break; } if (t == last_t) { repeats[0]++; } else { // If we got a new unique number of repeats, update the history. if (repeats[0] != repeats[1]) { repeats[2] = repeats[1]; repeats[1] = repeats[0]; } repeats[0] = 0; } last_t = t; last_td = cur_td; if (!init_t) init_t = t; } if(TEST) { buffer[0] = buffer[1] = 0; } else { #ifdef AV_READ_TIME buffer[111] += AV_READ_TIME(); #endif } av_sha_init(sha, 160); av_sha_update(sha, (const uint8_t *)buffer, sizeof(buffer)); av_sha_final(sha, digest); return AV_RB32(digest) + AV_RB32(digest + 16); } int av_random_bytes(uint8_t* buf, size_t len) { int err; #if HAVE_BCRYPT BCRYPT_ALG_HANDLE algo_handle; NTSTATUS ret = BCryptOpenAlgorithmProvider(&algo_handle, BCRYPT_RNG_ALGORITHM, MS_PRIMITIVE_PROVIDER, 0); if (BCRYPT_SUCCESS(ret)) { NTSTATUS ret = BCryptGenRandom(algo_handle, (PUCHAR)buf, len, 0); BCryptCloseAlgorithmProvider(algo_handle, 0); if (BCRYPT_SUCCESS(ret)) return 0; } #endif #if HAVE_ARC4RANDOM_BUF arc4random_buf(buf, len); return 0; #endif err = read_random(buf, len, "/dev/urandom"); if (!err) return err; #if CONFIG_GCRYPT gcry_randomize(buf, len, GCRY_VERY_STRONG_RANDOM); return 0; #elif CONFIG_OPENSSL if (RAND_bytes(buf, len) == 1) return 0; return AVERROR_EXTERNAL; #else return err; #endif } uint32_t av_get_random_seed(void) { uint32_t seed; if (av_random_bytes((uint8_t *)&seed, sizeof(seed)) < 0) return get_generic_seed(); return seed; }