From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from ffbox0-bg.mplayerhq.hu (ffbox0-bg.ffmpeg.org [79.124.17.100]) by master.gitmailbox.com (Postfix) with ESMTP id 6347246BEF for ; Wed, 5 Jul 2023 12:13:13 +0000 (UTC) Received: from [127.0.1.1] (localhost [127.0.0.1]) by ffbox0-bg.mplayerhq.hu (Postfix) with ESMTP id 73D4E68C5FD; Wed, 5 Jul 2023 15:13:11 +0300 (EEST) Received: from mail-oa1-f43.google.com (mail-oa1-f43.google.com [209.85.160.43]) by ffbox0-bg.mplayerhq.hu (Postfix) with ESMTPS id 26C7868C329 for ; Wed, 5 Jul 2023 15:13:05 +0300 (EEST) Received: by mail-oa1-f43.google.com with SMTP id 586e51a60fabf-1b06ea7e7beso6155613fac.0 for ; Wed, 05 Jul 2023 05:13:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1688559183; x=1691151183; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=rMFlaWiQUHa7T5asshV+H0fJ62jH51h+ZpOMBoUwimM=; b=eytLrRWW1mxTb8lVLo+yDvH2Lg5gMKCkJcl8z5k4yLo/dK4CdKN5XniWHG2ix9y4Xg yiIRa/0/iB1hIGFU9p6ZffoZO7XWxsMFlGew4FsdqApXdXvYvIvdDrB+a+c8igq2xQK4 jUZzBYYxkke5v69lUmhRbusuXWUp7hisEhUrRT8xLH3CGMBdSbF8cy3UO2GYfOFJ10++ HhXUq2J/KHfC/9JAdlKLAho4N8k2ptSD6SI3GXoa+/JBbm1MeK+ocJDJBvnEVZjtML8E 38CFZQO3RNjAexqbAYC6Mc9EAoHe+Yjf+JDBDwB7LH41KeSyEQDnqNHjF16XahoUB8Km PxdA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1688559183; x=1691151183; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=rMFlaWiQUHa7T5asshV+H0fJ62jH51h+ZpOMBoUwimM=; b=Gk2SLqR5r3pWj3F/6gAgI3KbRgmyZBOMMY0Zpa1FTgeN+s7s64te3M54VAFEZ8H6Ot mTFLG2fgaO3yS3EvQ6b08gbfRMhy+MQhanlmWZyulMxYmjX15Gbt23y1ePcTR0PpQcUF OsJoPdY/Kj/c0/tWUeSNodDUNEAAsEN+rjBNxZog8DcTWG1Q6lDQr3ZHpqcNjWV6JHpo MKr4lRzva5HW8B3KGn4COZICi55dKi7+AWRzg2U4kb3b3MywU6ilncNCf9hEfRWeJuaS svP6swIuvLJN8B+vaI/bFuokm+IaU09T1WvLmIyHMrJy4BSH/3YQBEoZ/GL8F7HacF1G SDVw== X-Gm-Message-State: ABy/qLYWmgN3Xsk9UnDyQGuKVDZN/k4EQywGUms/7TzaTVC+FwNxfl85 VOMEAItQ+J+b7oF6dji85AOPl1X7NtM= X-Google-Smtp-Source: APBJJlEM2DV7+XFFtUawMV+Oq9O7jFflN6N2lRiH4i8V4dNioBiX2yUObIg/SonaVpLkTz0+C3U3ZQ== X-Received: by 2002:a05:6871:8715:b0:1b3:8cfb:78c5 with SMTP id tc21-20020a056871871500b001b38cfb78c5mr9097151oab.34.1688559183093; Wed, 05 Jul 2023 05:13:03 -0700 (PDT) Received: from localhost.localdomain (host197.190-225-105.telecom.net.ar. [190.225.105.197]) by smtp.gmail.com with ESMTPSA id eh18-20020a056870f59200b001a663e49523sm15068349oab.36.2023.07.05.05.13.02 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 05 Jul 2023 05:13:02 -0700 (PDT) From: James Almer To: ffmpeg-devel@ffmpeg.org Date: Wed, 5 Jul 2023 09:12:47 -0300 Message-ID: <20230705121247.1235-1-jamrial@gmail.com> X-Mailer: git-send-email 2.41.0 In-Reply-To: <168855266183.542.7703623237832964766@lain.khirnov.net> References: <168855266183.542.7703623237832964766@lain.khirnov.net> MIME-Version: 1.0 Subject: [FFmpeg-devel] [PATCH v4 2/4] avutil/random_seed: add av_random_bytes() X-BeenThere: ffmpeg-devel@ffmpeg.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: FFmpeg development discussions and patches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: FFmpeg development discussions and patches Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: ffmpeg-devel-bounces@ffmpeg.org Sender: "ffmpeg-devel" Archived-At: List-Archive: List-Post: Uses the existing code for av_get_random_seed() to return a buffer with cryptographically secure random data, or an error if none could be generated. Signed-off-by: James Almer --- libavutil/random_seed.c | 33 ++++++++++++++++++++++----------- libavutil/random_seed.h | 13 +++++++++++++ 2 files changed, 35 insertions(+), 11 deletions(-) diff --git a/libavutil/random_seed.c b/libavutil/random_seed.c index a51149235b..f5c291263e 100644 --- a/libavutil/random_seed.c +++ b/libavutil/random_seed.c @@ -46,7 +46,7 @@ #define TEST 0 #endif -static int read_random(uint32_t *dst, const char *file) +static int read_random(uint8_t *dst, size_t len, const char *file) { #if HAVE_UNISTD_H FILE *fp = avpriv_fopen_utf8(file, "r"); @@ -54,10 +54,10 @@ static int read_random(uint32_t *dst, const char *file) if (!fp) return AVERROR_UNKNOWN; - err = fread(dst, 1, sizeof(*dst), fp); + err = fread(dst, 1, len, fp); fclose(fp); - if (err != sizeof(*dst)) + if (err != len) return AVERROR_UNKNOWN; return 0; @@ -121,27 +121,38 @@ static uint32_t get_generic_seed(void) return AV_RB32(digest) + AV_RB32(digest + 16); } -uint32_t av_get_random_seed(void) +int av_random_bytes(uint8_t* buf, size_t len) { - uint32_t seed; + int err; #if HAVE_BCRYPT BCRYPT_ALG_HANDLE algo_handle; NTSTATUS ret = BCryptOpenAlgorithmProvider(&algo_handle, BCRYPT_RNG_ALGORITHM, MS_PRIMITIVE_PROVIDER, 0); if (BCRYPT_SUCCESS(ret)) { - NTSTATUS ret = BCryptGenRandom(algo_handle, (UCHAR*)&seed, sizeof(seed), 0); + NTSTATUS ret = BCryptGenRandom(algo_handle, (PUCHAR)buf, len, 0); BCryptCloseAlgorithmProvider(algo_handle, 0); if (BCRYPT_SUCCESS(ret)) - return seed; + return 0; } #endif #if HAVE_ARC4RANDOM - return arc4random(); + arc4random_buf(buf, len); + return 0; #endif - if (!read_random(&seed, "/dev/urandom")) - return seed; - return get_generic_seed(); + err = read_random(buf, len, "/dev/urandom"); + + return err; +} + +uint32_t av_get_random_seed(void) +{ + uint32_t seed; + + if (av_random_bytes((uint8_t *)&seed, sizeof(seed)) < 0) + return get_generic_seed(); + + return seed; } diff --git a/libavutil/random_seed.h b/libavutil/random_seed.h index 0462a048e0..e67e6e38c4 100644 --- a/libavutil/random_seed.h +++ b/libavutil/random_seed.h @@ -36,6 +36,19 @@ */ uint32_t av_get_random_seed(void); +/** + * Generate cryptographically secure random data, i.e. suitable for use as + * encryption keys and similar. + * + * @param buf buffer into which the random data will be written + * @param len size of buf in bytes + * + * @retval 0 success, len bytes of random data was written + * into buf + * @retval "a negative AVERROR code" random data could not be generated + */ +int av_random_bytes(uint8_t *buf, size_t len); + /** * @} */ -- 2.41.0 _______________________________________________ ffmpeg-devel mailing list ffmpeg-devel@ffmpeg.org https://ffmpeg.org/mailman/listinfo/ffmpeg-devel To unsubscribe, visit link above, or email ffmpeg-devel-request@ffmpeg.org with subject "unsubscribe".