1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000
1.2 +++ b/os/persistentdata/persistentstorage/sql/SQLite364/random.c Fri Jun 15 03:10:57 2012 +0200
1.3 @@ -0,0 +1,147 @@
1.4 +/*
1.5 +** 2001 September 15
1.6 +**
1.7 +** The author disclaims copyright to this source code. In place of
1.8 +** a legal notice, here is a blessing:
1.9 +**
1.10 +** May you do good and not evil.
1.11 +** May you find forgiveness for yourself and forgive others.
1.12 +** May you share freely, never taking more than you give.
1.13 +**
1.14 +*************************************************************************
1.15 +** This file contains code to implement a pseudo-random number
1.16 +** generator (PRNG) for SQLite.
1.17 +**
1.18 +** Random numbers are used by some of the database backends in order
1.19 +** to generate random integer keys for tables or random filenames.
1.20 +**
1.21 +** $Id: random.c,v 1.27 2008/10/07 15:25:48 drh Exp $
1.22 +*/
1.23 +#include "sqliteInt.h"
1.24 +
1.25 +
1.26 +/* All threads share a single random number generator.
1.27 +** This structure is the current state of the generator.
1.28 +*/
1.29 +static SQLITE_WSD struct sqlite3PrngType {
1.30 + unsigned char isInit; /* True if initialized */
1.31 + unsigned char i, j; /* State variables */
1.32 + unsigned char s[256]; /* State variables */
1.33 +} sqlite3Prng = { 0, };
1.34 +
1.35 +/*
1.36 +** Get a single 8-bit random value from the RC4 PRNG. The Mutex
1.37 +** must be held while executing this routine.
1.38 +**
1.39 +** Why not just use a library random generator like lrand48() for this?
1.40 +** Because the OP_NewRowid opcode in the VDBE depends on having a very
1.41 +** good source of random numbers. The lrand48() library function may
1.42 +** well be good enough. But maybe not. Or maybe lrand48() has some
1.43 +** subtle problems on some systems that could cause problems. It is hard
1.44 +** to know. To minimize the risk of problems due to bad lrand48()
1.45 +** implementations, SQLite uses this random number generator based
1.46 +** on RC4, which we know works very well.
1.47 +**
1.48 +** (Later): Actually, OP_NewRowid does not depend on a good source of
1.49 +** randomness any more. But we will leave this code in all the same.
1.50 +*/
1.51 +static int randomByte(void){
1.52 + unsigned char t;
1.53 +
1.54 +
1.55 + /* The "wsdPrng" macro will resolve to the pseudo-random number generator
1.56 + ** state vector. If writable static data is unsupported on the target,
1.57 + ** we have to locate the state vector at run-time. In the more common
1.58 + ** case where writable static data is supported, wsdPrng can refer directly
1.59 + ** to the "sqlite3Prng" state vector declared above.
1.60 + */
1.61 +#ifdef SQLITE_OMIT_WSD
1.62 + struct sqlite3PrngType *p = &GLOBAL(struct sqlite3PrngType, sqlite3Prng);
1.63 +# define wsdPrng p[0]
1.64 +#else
1.65 +# define wsdPrng sqlite3Prng
1.66 +#endif
1.67 +
1.68 +
1.69 + /* Initialize the state of the random number generator once,
1.70 + ** the first time this routine is called. The seed value does
1.71 + ** not need to contain a lot of randomness since we are not
1.72 + ** trying to do secure encryption or anything like that...
1.73 + **
1.74 + ** Nothing in this file or anywhere else in SQLite does any kind of
1.75 + ** encryption. The RC4 algorithm is being used as a PRNG (pseudo-random
1.76 + ** number generator) not as an encryption device.
1.77 + */
1.78 + if( !wsdPrng.isInit ){
1.79 + int i;
1.80 + char k[256];
1.81 + wsdPrng.j = 0;
1.82 + wsdPrng.i = 0;
1.83 + sqlite3OsRandomness(sqlite3_vfs_find(0), 256, k);
1.84 + for(i=0; i<256; i++){
1.85 + wsdPrng.s[i] = i;
1.86 + }
1.87 + for(i=0; i<256; i++){
1.88 + wsdPrng.j += wsdPrng.s[i] + k[i];
1.89 + t = wsdPrng.s[wsdPrng.j];
1.90 + wsdPrng.s[wsdPrng.j] = wsdPrng.s[i];
1.91 + wsdPrng.s[i] = t;
1.92 + }
1.93 + wsdPrng.isInit = 1;
1.94 + }
1.95 +
1.96 + /* Generate and return single random byte
1.97 + */
1.98 + wsdPrng.i++;
1.99 + t = wsdPrng.s[wsdPrng.i];
1.100 + wsdPrng.j += t;
1.101 + wsdPrng.s[wsdPrng.i] = wsdPrng.s[wsdPrng.j];
1.102 + wsdPrng.s[wsdPrng.j] = t;
1.103 + t += wsdPrng.s[wsdPrng.i];
1.104 + return wsdPrng.s[t];
1.105 +}
1.106 +
1.107 +/*
1.108 +** Return N random bytes.
1.109 +*/
1.110 +void sqlite3_randomness(int N, void *pBuf){
1.111 + unsigned char *zBuf = pBuf;
1.112 +#if SQLITE_THREADSAFE
1.113 + sqlite3_mutex *mutex = sqlite3MutexAlloc(SQLITE_MUTEX_STATIC_PRNG);
1.114 +#endif
1.115 + sqlite3_mutex_enter(mutex);
1.116 + while( N-- ){
1.117 + *(zBuf++) = randomByte();
1.118 + }
1.119 + sqlite3_mutex_leave(mutex);
1.120 +}
1.121 +
1.122 +#ifndef SQLITE_OMIT_BUILTIN_TEST
1.123 +/*
1.124 +** For testing purposes, we sometimes want to preserve the state of
1.125 +** PRNG and restore the PRNG to its saved state at a later time, or
1.126 +** to reset the PRNG to its initial state. These routines accomplish
1.127 +** those tasks.
1.128 +**
1.129 +** The sqlite3_test_control() interface calls these routines to
1.130 +** control the PRNG.
1.131 +*/
1.132 +static SQLITE_WSD struct sqlite3PrngType sqlite3SavedPrng = { 0, };
1.133 +void sqlite3PrngSaveState(void){
1.134 + memcpy(
1.135 + &GLOBAL(struct sqlite3PrngType, sqlite3SavedPrng),
1.136 + &GLOBAL(struct sqlite3PrngType, sqlite3Prng),
1.137 + sizeof(sqlite3Prng)
1.138 + );
1.139 +}
1.140 +void sqlite3PrngRestoreState(void){
1.141 + memcpy(
1.142 + &GLOBAL(struct sqlite3PrngType, sqlite3Prng),
1.143 + &GLOBAL(struct sqlite3PrngType, sqlite3SavedPrng),
1.144 + sizeof(sqlite3Prng)
1.145 + );
1.146 +}
1.147 +void sqlite3PrngResetState(void){
1.148 + GLOBAL(struct sqlite3PrngType, sqlite3Prng).isInit = 0;
1.149 +}
1.150 +#endif /* SQLITE_OMIT_BUILTIN_TEST */