/* * Copyright (c) Facebook, Inc. and its affiliates. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include <folly/Random.h> #include <array> #include <atomic> #include <mutex> #include <random> #include <folly/CppAttributes.h> #include <folly/File.h> #include <folly/FileUtil.h> #include <folly/SingletonThreadLocal.h> #include <folly/ThreadLocal.h> #include <folly/detail/FileUtilDetail.h> #include <folly/portability/Config.h> #include <folly/portability/SysTime.h> #include <folly/portability/Unistd.h> #include <glog/logging.h> #ifdef _MSC_VER #include <wincrypt.h> // @manual #endif #if FOLLY_HAVE_GETRANDOM #include <sys/random.h> #endif namespace folly { namespace { void readRandomDevice(void* data, size_t size) { #ifdef _MSC_VER static auto const cryptoProv = [] { HCRYPTPROV prov; if (!CryptAcquireContext( &prov, nullptr, nullptr, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT)) { if (GetLastError() == NTE_BAD_KEYSET) { // Mostly likely cause of this is that no key container // exists yet, so try to create one. PCHECK(CryptAcquireContext( &prov, nullptr, nullptr, PROV_RSA_FULL, CRYPT_NEWKEYSET)); } else { LOG(FATAL) << "Failed to acquire the default crypto context."; } } return prov; }(); CHECK(size <= std::numeric_limits<DWORD>::max()); PCHECK(CryptGenRandom(cryptoProv, (DWORD)size, (BYTE*)data)); #else ssize_t bytesRead = 0; auto gen = [](int, void* buf, size_t buflen) { #if FOLLY_HAVE_GETRANDOM auto flags = 0u; return ::getrandom(buf, buflen, flags); #else [](...) {}(buf, buflen); errno = ENOSYS; return -1; #endif }; bytesRead = fileutil_detail::wrapFull(gen, -1, data, size); if (bytesRead == -1 && errno == ENOSYS) { // Keep the random device open for the duration of the program. static int randomFd = ::open("/dev/urandom", O_RDONLY | O_CLOEXEC); PCHECK(randomFd >= 0); bytesRead = readFull(randomFd, data, size); } PCHECK(bytesRead >= 0); CHECK_EQ(size_t(bytesRead), size); #endif } class BufferedRandomDevice { public: static constexpr size_t kDefaultBufferSize = 128; static void notifyNewGlobalEpoch() { globalEpoch_.fetch_add(1, std::memory_order_relaxed); } explicit BufferedRandomDevice(size_t bufferSize = kDefaultBufferSize); void get(void* data, size_t size) { auto const globalEpoch = globalEpoch_.load(std::memory_order_relaxed); if (LIKELY(globalEpoch == epoch_ && size <= remaining())) { memcpy(data, ptr_, size); ptr_ += size; } else { getSlow(static_cast<unsigned char*>(data), size); } } private: void getSlow(unsigned char* data, size_t size); inline size_t remaining() const { return size_t(buffer_.get() + bufferSize_ - ptr_); } static std::atomic<size_t> globalEpoch_; size_t epoch_{size_t(-1)}; // refill on first use const size_t bufferSize_; std::unique_ptr<unsigned char[]> buffer_; unsigned char* ptr_; }; std::atomic<size_t> BufferedRandomDevice::globalEpoch_{0}; struct RandomTag {}; BufferedRandomDevice::BufferedRandomDevice(size_t bufferSize) : bufferSize_(bufferSize), buffer_(new unsigned char[bufferSize]), ptr_(buffer_.get() + bufferSize) { // refill on first use FOLLY_MAYBE_UNUSED static auto const init = [] { detail::AtFork::registerHandler( nullptr, /*prepare*/ []() { return true; }, /*parent*/ []() {}, /*child*/ []() { // Ensure child and parent do not share same entropy pool. BufferedRandomDevice::notifyNewGlobalEpoch(); }); return 0; }(); } void BufferedRandomDevice::getSlow(unsigned char* data, size_t size) { auto const globalEpoch = globalEpoch_.load(std::memory_order_relaxed); if (globalEpoch != epoch_) { epoch_ = globalEpoch_; ptr_ = buffer_.get() + bufferSize_; } DCHECK_GT(size, remaining()); if (size >= bufferSize_) { // Just read directly. readRandomDevice(data, size); return; } size_t copied = remaining(); memcpy(data, ptr_, copied); data += copied; size -= copied; // refill readRandomDevice(buffer_.get(), bufferSize_); ptr_ = buffer_.get(); memcpy(data, ptr_, size); ptr_ += size; } } // namespace void Random::secureRandom(void* data, size_t size) { using Single = SingletonThreadLocal<BufferedRandomDevice, RandomTag>; Single::get().get(data, size); } ThreadLocalPRNG::result_type ThreadLocalPRNG::operator()() { struct Wrapper { Random::DefaultGenerator object{Random::create()}; }; using Single = SingletonThreadLocal<Wrapper, RandomTag>; return Single::get().object(); } } // namespace folly