mirror of
https://github.com/FFmpeg/FFmpeg.git
synced 2024-11-26 19:01:44 +02:00
0056d9f176
libavutil/random_seed.c calls arc4random_buf which is not available on OSX 10.4 Tiger, but the configuration script tests for arc4random which is available. Fix the configuration test to match the actual API used. Co-authored-by: James Almer <jamrial@gmail.com> Signed-off-by: James Almer <jamrial@gmail.com>
175 lines
4.1 KiB
C
175 lines
4.1 KiB
C
/*
|
|
* Copyright (c) 2009 Baptiste Coudurier <baptiste.coudurier@gmail.com>
|
|
*
|
|
* This file is part of FFmpeg.
|
|
*
|
|
* FFmpeg is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* FFmpeg is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with FFmpeg; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
*/
|
|
|
|
#include "config.h"
|
|
|
|
#if HAVE_UNISTD_H
|
|
#include <unistd.h>
|
|
#endif
|
|
#if HAVE_IO_H
|
|
#include <io.h>
|
|
#endif
|
|
#if HAVE_BCRYPT
|
|
#include <windows.h>
|
|
#include <bcrypt.h>
|
|
#endif
|
|
#if CONFIG_GCRYPT
|
|
#include <gcrypt.h>
|
|
#elif CONFIG_OPENSSL
|
|
#include <openssl/rand.h>
|
|
#endif
|
|
#include <fcntl.h>
|
|
#include <math.h>
|
|
#include <time.h>
|
|
#include <string.h>
|
|
#include "avassert.h"
|
|
#include "file_open.h"
|
|
#include "internal.h"
|
|
#include "intreadwrite.h"
|
|
#include "timer.h"
|
|
#include "random_seed.h"
|
|
#include "sha.h"
|
|
|
|
#ifndef TEST
|
|
#define TEST 0
|
|
#endif
|
|
|
|
static int read_random(uint8_t *dst, size_t len, const char *file)
|
|
{
|
|
#if HAVE_UNISTD_H
|
|
FILE *fp = avpriv_fopen_utf8(file, "r");
|
|
size_t err;
|
|
|
|
if (!fp)
|
|
return AVERROR_UNKNOWN;
|
|
err = fread(dst, 1, len, fp);
|
|
fclose(fp);
|
|
|
|
if (err != len)
|
|
return AVERROR_UNKNOWN;
|
|
|
|
return 0;
|
|
#else
|
|
return AVERROR(ENOSYS);
|
|
#endif
|
|
}
|
|
|
|
static uint32_t get_generic_seed(void)
|
|
{
|
|
uint64_t tmp[120/8];
|
|
struct AVSHA *sha = (void*)tmp;
|
|
clock_t last_t = 0;
|
|
clock_t last_td = 0;
|
|
clock_t init_t = 0;
|
|
static uint64_t i = 0;
|
|
static uint32_t buffer[512] = { 0 };
|
|
unsigned char digest[20];
|
|
uint64_t last_i = i;
|
|
|
|
av_assert0(sizeof(tmp) >= av_sha_size);
|
|
|
|
if(TEST){
|
|
memset(buffer, 0, sizeof(buffer));
|
|
last_i = i = 0;
|
|
}else{
|
|
#ifdef AV_READ_TIME
|
|
buffer[13] ^= AV_READ_TIME();
|
|
buffer[41] ^= AV_READ_TIME()>>32;
|
|
#endif
|
|
}
|
|
|
|
for (;;) {
|
|
clock_t t = clock();
|
|
if (last_t + 2*last_td + (CLOCKS_PER_SEC > 1000) >= t) {
|
|
last_td = t - last_t;
|
|
buffer[i & 511] = 1664525*buffer[i & 511] + 1013904223 + (last_td % 3294638521U);
|
|
} else {
|
|
last_td = t - last_t;
|
|
buffer[++i & 511] += last_td % 3294638521U;
|
|
if ((t - init_t) >= CLOCKS_PER_SEC>>5)
|
|
if (last_i && i - last_i > 4 || i - last_i > 64 || TEST && i - last_i > 8)
|
|
break;
|
|
}
|
|
last_t = t;
|
|
if (!init_t)
|
|
init_t = t;
|
|
}
|
|
|
|
if(TEST) {
|
|
buffer[0] = buffer[1] = 0;
|
|
} else {
|
|
#ifdef AV_READ_TIME
|
|
buffer[111] += AV_READ_TIME();
|
|
#endif
|
|
}
|
|
|
|
av_sha_init(sha, 160);
|
|
av_sha_update(sha, (const uint8_t *)buffer, sizeof(buffer));
|
|
av_sha_final(sha, digest);
|
|
return AV_RB32(digest) + AV_RB32(digest + 16);
|
|
}
|
|
|
|
int av_random_bytes(uint8_t* buf, size_t len)
|
|
{
|
|
int err;
|
|
|
|
#if HAVE_BCRYPT
|
|
BCRYPT_ALG_HANDLE algo_handle;
|
|
NTSTATUS ret = BCryptOpenAlgorithmProvider(&algo_handle, BCRYPT_RNG_ALGORITHM,
|
|
MS_PRIMITIVE_PROVIDER, 0);
|
|
if (BCRYPT_SUCCESS(ret)) {
|
|
NTSTATUS ret = BCryptGenRandom(algo_handle, (PUCHAR)buf, len, 0);
|
|
BCryptCloseAlgorithmProvider(algo_handle, 0);
|
|
if (BCRYPT_SUCCESS(ret))
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
#if HAVE_ARC4RANDOM_BUF
|
|
arc4random_buf(buf, len);
|
|
return 0;
|
|
#endif
|
|
|
|
err = read_random(buf, len, "/dev/urandom");
|
|
if (!err)
|
|
return err;
|
|
|
|
#if CONFIG_GCRYPT
|
|
gcry_randomize(buf, len, GCRY_VERY_STRONG_RANDOM);
|
|
return 0;
|
|
#elif CONFIG_OPENSSL
|
|
if (RAND_bytes(buf, len) == 1)
|
|
return 0;
|
|
err = AVERROR_EXTERNAL;
|
|
#endif
|
|
|
|
return err;
|
|
}
|
|
|
|
uint32_t av_get_random_seed(void)
|
|
{
|
|
uint32_t seed;
|
|
|
|
if (av_random_bytes((uint8_t *)&seed, sizeof(seed)) < 0)
|
|
return get_generic_seed();
|
|
|
|
return seed;
|
|
}
|