mirror of https://github.com/FFmpeg/FFmpeg.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
175 lines
4.2 KiB
175 lines
4.2 KiB
/* |
|
* Copyright (c) 2009 Baptiste Coudurier <baptiste.coudurier@gmail.com> |
|
* |
|
* This file is part of FFmpeg. |
|
* |
|
* FFmpeg is free software; you can redistribute it and/or |
|
* modify it under the terms of the GNU Lesser General Public |
|
* License as published by the Free Software Foundation; either |
|
* version 2.1 of the License, or (at your option) any later version. |
|
* |
|
* FFmpeg is distributed in the hope that it will be useful, |
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
|
* Lesser General Public License for more details. |
|
* |
|
* You should have received a copy of the GNU Lesser General Public |
|
* License along with FFmpeg; if not, write to the Free Software |
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA |
|
*/ |
|
|
|
#include "config.h" |
|
|
|
#if HAVE_UNISTD_H |
|
#include <unistd.h> |
|
#endif |
|
#if HAVE_IO_H |
|
#include <io.h> |
|
#endif |
|
#if HAVE_BCRYPT |
|
#include <windows.h> |
|
#include <bcrypt.h> |
|
#endif |
|
#if CONFIG_GCRYPT |
|
#include <gcrypt.h> |
|
#elif CONFIG_OPENSSL |
|
#include <openssl/rand.h> |
|
#endif |
|
#include <fcntl.h> |
|
#include <math.h> |
|
#include <time.h> |
|
#include <string.h> |
|
#include "avassert.h" |
|
#include "file_open.h" |
|
#include "internal.h" |
|
#include "intreadwrite.h" |
|
#include "timer.h" |
|
#include "random_seed.h" |
|
#include "sha.h" |
|
|
|
#ifndef TEST |
|
#define TEST 0 |
|
#endif |
|
|
|
static int read_random(uint8_t *dst, size_t len, const char *file) |
|
{ |
|
#if HAVE_UNISTD_H |
|
FILE *fp = avpriv_fopen_utf8(file, "r"); |
|
size_t err; |
|
|
|
if (!fp) |
|
return AVERROR_UNKNOWN; |
|
setvbuf(fp, NULL, _IONBF, 0); |
|
err = fread(dst, 1, len, fp); |
|
fclose(fp); |
|
|
|
if (err != len) |
|
return AVERROR_UNKNOWN; |
|
|
|
return 0; |
|
#else |
|
return AVERROR(ENOSYS); |
|
#endif |
|
} |
|
|
|
static uint32_t get_generic_seed(void) |
|
{ |
|
uint64_t tmp[120/8]; |
|
struct AVSHA *sha = (void*)tmp; |
|
clock_t last_t = 0; |
|
clock_t last_td = 0; |
|
clock_t init_t = 0; |
|
static uint64_t i = 0; |
|
static uint32_t buffer[512] = { 0 }; |
|
unsigned char digest[20]; |
|
uint64_t last_i = i; |
|
|
|
av_assert0(sizeof(tmp) >= av_sha_size); |
|
|
|
if(TEST){ |
|
memset(buffer, 0, sizeof(buffer)); |
|
last_i = i = 0; |
|
}else{ |
|
#ifdef AV_READ_TIME |
|
buffer[13] ^= AV_READ_TIME(); |
|
buffer[41] ^= AV_READ_TIME()>>32; |
|
#endif |
|
} |
|
|
|
for (;;) { |
|
clock_t t = clock(); |
|
if (last_t + 2*last_td + (CLOCKS_PER_SEC > 1000) >= t) { |
|
last_td = t - last_t; |
|
buffer[i & 511] = 1664525*buffer[i & 511] + 1013904223 + (last_td % 3294638521U); |
|
} else { |
|
last_td = t - last_t; |
|
buffer[++i & 511] += last_td % 3294638521U; |
|
if ((t - init_t) >= CLOCKS_PER_SEC>>5) |
|
if (last_i && i - last_i > 4 || i - last_i > 64 || TEST && i - last_i > 8) |
|
break; |
|
} |
|
last_t = t; |
|
if (!init_t) |
|
init_t = t; |
|
} |
|
|
|
if(TEST) { |
|
buffer[0] = buffer[1] = 0; |
|
} else { |
|
#ifdef AV_READ_TIME |
|
buffer[111] += AV_READ_TIME(); |
|
#endif |
|
} |
|
|
|
av_sha_init(sha, 160); |
|
av_sha_update(sha, (const uint8_t *)buffer, sizeof(buffer)); |
|
av_sha_final(sha, digest); |
|
return AV_RB32(digest) + AV_RB32(digest + 16); |
|
} |
|
|
|
int av_random_bytes(uint8_t* buf, size_t len) |
|
{ |
|
int err; |
|
|
|
#if HAVE_BCRYPT |
|
BCRYPT_ALG_HANDLE algo_handle; |
|
NTSTATUS ret = BCryptOpenAlgorithmProvider(&algo_handle, BCRYPT_RNG_ALGORITHM, |
|
MS_PRIMITIVE_PROVIDER, 0); |
|
if (BCRYPT_SUCCESS(ret)) { |
|
NTSTATUS ret = BCryptGenRandom(algo_handle, (PUCHAR)buf, len, 0); |
|
BCryptCloseAlgorithmProvider(algo_handle, 0); |
|
if (BCRYPT_SUCCESS(ret)) |
|
return 0; |
|
} |
|
#endif |
|
|
|
#if HAVE_ARC4RANDOM_BUF |
|
arc4random_buf(buf, len); |
|
return 0; |
|
#endif |
|
|
|
err = read_random(buf, len, "/dev/urandom"); |
|
if (!err) |
|
return err; |
|
|
|
#if CONFIG_GCRYPT |
|
gcry_randomize(buf, len, GCRY_VERY_STRONG_RANDOM); |
|
return 0; |
|
#elif CONFIG_OPENSSL |
|
if (RAND_bytes(buf, len) == 1) |
|
return 0; |
|
return AVERROR_EXTERNAL; |
|
#else |
|
return err; |
|
#endif |
|
} |
|
|
|
uint32_t av_get_random_seed(void) |
|
{ |
|
uint32_t seed; |
|
|
|
if (av_random_bytes((uint8_t *)&seed, sizeof(seed)) < 0) |
|
return get_generic_seed(); |
|
|
|
return seed; |
|
}
|
|
|