diff options
author | Andreas Kling <awesomekling@gmail.com> | 2020-01-03 12:36:30 +0100 |
---|---|---|
committer | Andreas Kling <awesomekling@gmail.com> | 2020-01-03 12:43:07 +0100 |
commit | 9026598999d996d403d0b5951006ef4bb0f1c1c0 (patch) | |
tree | 027cb67bad6291ce48d109673abb60cc909689f5 /Kernel/Random.cpp | |
parent | 24cc67d199256faa88b43cf580e9b76b4b9b327f (diff) | |
download | serenity-9026598999d996d403d0b5951006ef4bb0f1c1c0.zip |
Kernel: Add a more expressive API for getting random bytes
We now have these API's in <Kernel/Random.h>:
- get_fast_random_bytes(u8* buffer, size_t buffer_size)
- get_good_random_bytes(u8* buffer, size_t buffer_size)
- get_fast_random<T>()
- get_good_random<T>()
Internally they both use x86 RDRAND if available, otherwise they fall
back to the same LCG we had in RandomDevice all along.
The main purpose of this patch is to give kernel code a way to better
express its needs for random data.
Randomness is something that will require a lot more work, but this is
hopefully a step in the right direction.
Diffstat (limited to 'Kernel/Random.cpp')
-rw-r--r-- | Kernel/Random.cpp | 41 |
1 files changed, 41 insertions, 0 deletions
diff --git a/Kernel/Random.cpp b/Kernel/Random.cpp new file mode 100644 index 0000000000..d517ae5cef --- /dev/null +++ b/Kernel/Random.cpp @@ -0,0 +1,41 @@ +#include <Kernel/Arch/i386/CPU.h> +#include <Kernel/Random.h> +#include <Kernel/Devices/RandomDevice.h> + +static u32 random32() +{ + if (g_cpu_supports_rdrand) { + u32 value = 0; + asm volatile( + "1%=:\n" + "rdrand %0\n" + "jnc 1%=\n" + : "=r"(value)); + return value; + } + // FIXME: This sucks lol + static u32 next = 1; + next = next * 1103515245 + 12345; + return next; +} + +void get_good_random_bytes(u8* buffer, size_t buffer_size) +{ + union { + u8 bytes[4]; + u32 value; + } u; + size_t offset = 4; + for (size_t i = 0; i < buffer_size; ++i) { + if (offset >= 4) { + u.value = random32(); + offset = 0; + } + buffer[i] = u.bytes[offset++]; + } +} + +void get_fast_random_bytes(u8* buffer, size_t buffer_size) +{ + return get_good_random_bytes(buffer, buffer_size); +} |