summaryrefslogtreecommitdiff
path: root/Userland
diff options
context:
space:
mode:
authorBen Wiederhake <BenWiederhake.GitHub@gmx.de>2021-01-19 19:42:31 +0100
committerAndreas Kling <kling@serenityos.org>2021-01-20 19:19:34 +0100
commitab07a713bf005a04808449bb3629c2f825969472 (patch)
treeaa9f5edb301a9ae088fe3fdd7c2ffd67bddf4bf2 /Userland
parente849c62f553d38010850c39d726e7c400b8c9a64 (diff)
downloadserenity-ab07a713bf005a04808449bb3629c2f825969472.zip
LibC: Implement uniform random sampling without modulo bias
Diffstat (limited to 'Userland')
-rw-r--r--Userland/Libraries/LibC/stdlib.cpp19
1 files changed, 16 insertions, 3 deletions
diff --git a/Userland/Libraries/LibC/stdlib.cpp b/Userland/Libraries/LibC/stdlib.cpp
index cddf548c25..47dd242bb0 100644
--- a/Userland/Libraries/LibC/stdlib.cpp
+++ b/Userland/Libraries/LibC/stdlib.cpp
@@ -1039,9 +1039,22 @@ void arc4random_buf(void* buffer, size_t buffer_size)
uint32_t arc4random_uniform(uint32_t max_bounds)
{
- // XXX: Should actually apply special rules for uniformity; avoid what is
- // called "modulo bias".
- return arc4random() % max_bounds;
+ // If we try to divide all 2**32 numbers into groups of "max_bounds" numbers, we may end up
+ // with a group around 2**32-1 that is a bit too small. For this reason, the implementation
+ // `arc4random() % max_bounds` would be insufficient. Here we compute the last number of the
+ // last "full group". Note that if max_bounds is a divisor of UINT32_MAX,
+ // then we end up with UINT32_MAX:
+ const uint32_t max_usable = UINT32_MAX - (static_cast<uint64_t>(UINT32_MAX) + 1) % max_bounds;
+ uint32_t random_value = arc4random();
+ for (int i = 0; i < 20 && random_value > max_usable; ++i) {
+ // By chance we picked a value from the incomplete group. Note that this group has size at
+ // most 2**31-1, so picking this group has a chance of less than 50%.
+ // In practice, this means that for the worst possible input, there is still only a
+ // once-in-a-million chance to get to iteration 20. In theory we should be able to loop
+ // forever. Here we prefer marginally imperfect random numbers over weird runtime behavior.
+ random_value = arc4random();
+ }
+ return random_value % max_bounds;
}
char* realpath(const char* pathname, char* buffer)