sl@0
|
1 |
/*
|
sl@0
|
2 |
** 2001 September 15
|
sl@0
|
3 |
**
|
sl@0
|
4 |
** The author disclaims copyright to this source code. In place of
|
sl@0
|
5 |
** a legal notice, here is a blessing:
|
sl@0
|
6 |
**
|
sl@0
|
7 |
** May you do good and not evil.
|
sl@0
|
8 |
** May you find forgiveness for yourself and forgive others.
|
sl@0
|
9 |
** May you share freely, never taking more than you give.
|
sl@0
|
10 |
**
|
sl@0
|
11 |
*************************************************************************
|
sl@0
|
12 |
** This file contains code to implement a pseudo-random number
|
sl@0
|
13 |
** generator (PRNG) for SQLite.
|
sl@0
|
14 |
**
|
sl@0
|
15 |
** Random numbers are used by some of the database backends in order
|
sl@0
|
16 |
** to generate random integer keys for tables or random filenames.
|
sl@0
|
17 |
**
|
sl@0
|
18 |
** $Id: random.c,v 1.25 2008/06/19 01:03:18 drh Exp $
|
sl@0
|
19 |
*/
|
sl@0
|
20 |
#include "sqliteInt.h"
|
sl@0
|
21 |
|
sl@0
|
22 |
|
sl@0
|
23 |
/* All threads share a single random number generator.
|
sl@0
|
24 |
** This structure is the current state of the generator.
|
sl@0
|
25 |
*/
|
sl@0
|
26 |
static struct sqlite3PrngType {
|
sl@0
|
27 |
unsigned char isInit; /* True if initialized */
|
sl@0
|
28 |
unsigned char i, j; /* State variables */
|
sl@0
|
29 |
unsigned char s[256]; /* State variables */
|
sl@0
|
30 |
} sqlite3Prng;
|
sl@0
|
31 |
|
sl@0
|
32 |
/*
|
sl@0
|
33 |
** Get a single 8-bit random value from the RC4 PRNG. The Mutex
|
sl@0
|
34 |
** must be held while executing this routine.
|
sl@0
|
35 |
**
|
sl@0
|
36 |
** Why not just use a library random generator like lrand48() for this?
|
sl@0
|
37 |
** Because the OP_NewRowid opcode in the VDBE depends on having a very
|
sl@0
|
38 |
** good source of random numbers. The lrand48() library function may
|
sl@0
|
39 |
** well be good enough. But maybe not. Or maybe lrand48() has some
|
sl@0
|
40 |
** subtle problems on some systems that could cause problems. It is hard
|
sl@0
|
41 |
** to know. To minimize the risk of problems due to bad lrand48()
|
sl@0
|
42 |
** implementations, SQLite uses this random number generator based
|
sl@0
|
43 |
** on RC4, which we know works very well.
|
sl@0
|
44 |
**
|
sl@0
|
45 |
** (Later): Actually, OP_NewRowid does not depend on a good source of
|
sl@0
|
46 |
** randomness any more. But we will leave this code in all the same.
|
sl@0
|
47 |
*/
|
sl@0
|
48 |
static int randomByte(void){
|
sl@0
|
49 |
unsigned char t;
|
sl@0
|
50 |
|
sl@0
|
51 |
|
sl@0
|
52 |
/* Initialize the state of the random number generator once,
|
sl@0
|
53 |
** the first time this routine is called. The seed value does
|
sl@0
|
54 |
** not need to contain a lot of randomness since we are not
|
sl@0
|
55 |
** trying to do secure encryption or anything like that...
|
sl@0
|
56 |
**
|
sl@0
|
57 |
** Nothing in this file or anywhere else in SQLite does any kind of
|
sl@0
|
58 |
** encryption. The RC4 algorithm is being used as a PRNG (pseudo-random
|
sl@0
|
59 |
** number generator) not as an encryption device.
|
sl@0
|
60 |
*/
|
sl@0
|
61 |
if( !sqlite3Prng.isInit ){
|
sl@0
|
62 |
int i;
|
sl@0
|
63 |
char k[256];
|
sl@0
|
64 |
sqlite3Prng.j = 0;
|
sl@0
|
65 |
sqlite3Prng.i = 0;
|
sl@0
|
66 |
sqlite3OsRandomness(sqlite3_vfs_find(0), 256, k);
|
sl@0
|
67 |
for(i=0; i<256; i++){
|
sl@0
|
68 |
sqlite3Prng.s[i] = i;
|
sl@0
|
69 |
}
|
sl@0
|
70 |
for(i=0; i<256; i++){
|
sl@0
|
71 |
sqlite3Prng.j += sqlite3Prng.s[i] + k[i];
|
sl@0
|
72 |
t = sqlite3Prng.s[sqlite3Prng.j];
|
sl@0
|
73 |
sqlite3Prng.s[sqlite3Prng.j] = sqlite3Prng.s[i];
|
sl@0
|
74 |
sqlite3Prng.s[i] = t;
|
sl@0
|
75 |
}
|
sl@0
|
76 |
sqlite3Prng.isInit = 1;
|
sl@0
|
77 |
}
|
sl@0
|
78 |
|
sl@0
|
79 |
/* Generate and return single random byte
|
sl@0
|
80 |
*/
|
sl@0
|
81 |
sqlite3Prng.i++;
|
sl@0
|
82 |
t = sqlite3Prng.s[sqlite3Prng.i];
|
sl@0
|
83 |
sqlite3Prng.j += t;
|
sl@0
|
84 |
sqlite3Prng.s[sqlite3Prng.i] = sqlite3Prng.s[sqlite3Prng.j];
|
sl@0
|
85 |
sqlite3Prng.s[sqlite3Prng.j] = t;
|
sl@0
|
86 |
t += sqlite3Prng.s[sqlite3Prng.i];
|
sl@0
|
87 |
return sqlite3Prng.s[t];
|
sl@0
|
88 |
}
|
sl@0
|
89 |
|
sl@0
|
90 |
/*
|
sl@0
|
91 |
** Return N random bytes.
|
sl@0
|
92 |
*/
|
sl@0
|
93 |
void sqlite3_randomness(int N, void *pBuf){
|
sl@0
|
94 |
unsigned char *zBuf = pBuf;
|
sl@0
|
95 |
#ifndef SQLITE_MUTEX_NOOP
|
sl@0
|
96 |
sqlite3_mutex *mutex = sqlite3MutexAlloc(SQLITE_MUTEX_STATIC_PRNG);
|
sl@0
|
97 |
#endif
|
sl@0
|
98 |
sqlite3_mutex_enter(mutex);
|
sl@0
|
99 |
while( N-- ){
|
sl@0
|
100 |
*(zBuf++) = randomByte();
|
sl@0
|
101 |
}
|
sl@0
|
102 |
sqlite3_mutex_leave(mutex);
|
sl@0
|
103 |
}
|
sl@0
|
104 |
|
sl@0
|
105 |
#ifndef SQLITE_OMIT_BUILTIN_TEST
|
sl@0
|
106 |
/*
|
sl@0
|
107 |
** For testing purposes, we sometimes want to preserve the state of
|
sl@0
|
108 |
** PRNG and restore the PRNG to its saved state at a later time.
|
sl@0
|
109 |
** The sqlite3_test_control() interface calls these routines to
|
sl@0
|
110 |
** control the PRNG.
|
sl@0
|
111 |
*/
|
sl@0
|
112 |
static struct sqlite3PrngType sqlite3SavedPrng;
|
sl@0
|
113 |
void sqlite3PrngSaveState(void){
|
sl@0
|
114 |
memcpy(&sqlite3SavedPrng, &sqlite3Prng, sizeof(sqlite3Prng));
|
sl@0
|
115 |
}
|
sl@0
|
116 |
void sqlite3PrngRestoreState(void){
|
sl@0
|
117 |
memcpy(&sqlite3Prng, &sqlite3SavedPrng, sizeof(sqlite3Prng));
|
sl@0
|
118 |
}
|
sl@0
|
119 |
void sqlite3PrngResetState(void){
|
sl@0
|
120 |
sqlite3Prng.isInit = 0;
|
sl@0
|
121 |
}
|
sl@0
|
122 |
#endif /* SQLITE_OMIT_BUILTIN_TEST */
|