]> git.saurik.com Git - apple/javascriptcore.git/blob - wtf/CryptographicallyRandomNumber.cpp
ef097ab09c473a6751046a71869583be9ef5da58
[apple/javascriptcore.git] / wtf / CryptographicallyRandomNumber.cpp
1 /*
2 * Copyright (c) 1996, David Mazieres <dm@uun.org>
3 * Copyright (c) 2008, Damien Miller <djm@openbsd.org>
4 *
5 * Permission to use, copy, modify, and distribute this software for any
6 * purpose with or without fee is hereby granted, provided that the above
7 * copyright notice and this permission notice appear in all copies.
8 *
9 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
10 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
11 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
12 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
13 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
14 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16 */
17
18 /*
19 * Arc4 random number generator for OpenBSD.
20 *
21 * This code is derived from section 17.1 of Applied Cryptography,
22 * second edition, which describes a stream cipher allegedly
23 * compatible with RSA Labs "RC4" cipher (the actual description of
24 * which is a trade secret). The same algorithm is used as a stream
25 * cipher called "arcfour" in Tatu Ylonen's ssh package.
26 *
27 * RC4 is a registered trademark of RSA Laboratories.
28 */
29
30 #include "config.h"
31 #include "CryptographicallyRandomNumber.h"
32
33 #include "MainThread.h"
34 #include "OSRandomSource.h"
35 #include "StdLibExtras.h"
36 #include "ThreadingPrimitives.h"
37
38 namespace WTF {
39
40 #if USE(OS_RANDOMNESS)
41
42 namespace {
43
44 class ARC4Stream {
45 public:
46 ARC4Stream();
47
48 uint8_t i;
49 uint8_t j;
50 uint8_t s[256];
51 };
52
53 class ARC4RandomNumberGenerator {
54 public:
55 ARC4RandomNumberGenerator();
56
57 uint32_t randomNumber();
58 void randomValues(void* buffer, size_t length);
59
60 private:
61 inline void addRandomData(unsigned char *data, int length);
62 void stir();
63 void stirIfNeeded();
64 inline uint8_t getByte();
65 inline uint32_t getWord();
66
67 ARC4Stream m_stream;
68 int m_count;
69 #if ENABLE(WTF_MULTIPLE_THREADS)
70 Mutex m_mutex;
71 #endif
72 };
73
74 ARC4Stream::ARC4Stream()
75 {
76 for (int n = 0; n < 256; n++)
77 s[n] = n;
78 i = 0;
79 j = 0;
80 }
81
82 ARC4RandomNumberGenerator::ARC4RandomNumberGenerator()
83 : m_count(0)
84 {
85 }
86
87 void ARC4RandomNumberGenerator::addRandomData(unsigned char* data, int length)
88 {
89 m_stream.i--;
90 for (int n = 0; n < 256; n++) {
91 m_stream.i++;
92 uint8_t si = m_stream.s[m_stream.i];
93 m_stream.j += si + data[n % length];
94 m_stream.s[m_stream.i] = m_stream.s[m_stream.j];
95 m_stream.s[m_stream.j] = si;
96 }
97 m_stream.j = m_stream.i;
98 }
99
100 void ARC4RandomNumberGenerator::stir()
101 {
102 unsigned char randomness[128];
103 size_t length = sizeof(randomness);
104 cryptographicallyRandomValuesFromOS(randomness, length);
105 addRandomData(randomness, length);
106
107 // Discard early keystream, as per recommendations in:
108 // http://www.wisdom.weizmann.ac.il/~itsik/RC4/Papers/Rc4_ksa.ps
109 for (int i = 0; i < 256; i++)
110 getByte();
111 m_count = 1600000;
112 }
113
114 void ARC4RandomNumberGenerator::stirIfNeeded()
115 {
116 if (m_count <= 0)
117 stir();
118 }
119
120 uint8_t ARC4RandomNumberGenerator::getByte()
121 {
122 m_stream.i++;
123 uint8_t si = m_stream.s[m_stream.i];
124 m_stream.j += si;
125 uint8_t sj = m_stream.s[m_stream.j];
126 m_stream.s[m_stream.i] = sj;
127 m_stream.s[m_stream.j] = si;
128 return (m_stream.s[(si + sj) & 0xff]);
129 }
130
131 uint32_t ARC4RandomNumberGenerator::getWord()
132 {
133 uint32_t val;
134 val = getByte() << 24;
135 val |= getByte() << 16;
136 val |= getByte() << 8;
137 val |= getByte();
138 return val;
139 }
140
141 uint32_t ARC4RandomNumberGenerator::randomNumber()
142 {
143 #if ENABLE(WTF_MULTIPLE_THREADS)
144 MutexLocker locker(m_mutex);
145 #else
146 ASSERT(isMainThread());
147 #endif
148
149 m_count -= 4;
150 stirIfNeeded();
151 return getWord();
152 }
153
154 void ARC4RandomNumberGenerator::randomValues(void* buffer, size_t length)
155 {
156 #if ENABLE(WTF_MULTIPLE_THREADS)
157 MutexLocker locker(m_mutex);
158 #else
159 ASSERT(isMainThread());
160 #endif
161
162 unsigned char* result = reinterpret_cast<unsigned char*>(buffer);
163 stirIfNeeded();
164 while (length--) {
165 m_count--;
166 stirIfNeeded();
167 result[length] = getByte();
168 }
169 }
170
171 ARC4RandomNumberGenerator& sharedRandomNumberGenerator()
172 {
173 DEFINE_STATIC_LOCAL(ARC4RandomNumberGenerator, randomNumberGenerator, ());
174 return randomNumberGenerator;
175 }
176
177 }
178
179 uint32_t cryptographicallyRandomNumber()
180 {
181 return sharedRandomNumberGenerator().randomNumber();
182 }
183
184 void cryptographicallyRandomValues(void* buffer, size_t length)
185 {
186 sharedRandomNumberGenerator().randomValues(buffer, length);
187 }
188
189 #endif
190
191 }