libc++: add NaCl and PNaCl support for std::random_device

Summary:
The NaCl sandbox doesn't allow opening files under /dev, but it offers an API which provides the same capabilities. This is the same random device emulation that nacl_io performs for POSIX support, but nacl_io is an optional library so libc++ can't assume that device emulation will be performed. Note that NaCl only supports /dev/urandom, not /dev/random.

This patch also cleans up some of the preprocessor #endif, and fixes the test for Win32 (it accepts any token, and would therefore never throw regardless of the token provided).

Test Plan: ninja check-libcxx

Reviewers: dschuff, mclow.lists, danalbert

Subscribers: jfb, cfe-commits

Differential Revision: http://reviews.llvm.org/D6442

git-svn-id: https://llvm.org/svn/llvm-project/libcxx/trunk@223068 91177308-0d34-0410-b5e6-96231b3b80d8
This commit is contained in:
JF Bastien 2014-12-01 19:19:55 +00:00
parent 6317e9b85a
commit 2bd5ffd330
4 changed files with 118 additions and 38 deletions

View File

@ -111,6 +111,13 @@
# endif # endif
#endif // __sun__ #endif // __sun__
#if defined(__native_client__)
// NaCl's sandbox (which PNaCl also runs in) doesn't allow filesystem access,
// including accesses to the special files under /dev. C++11's
// std::random_device is instead exposed through a NaCl syscall.
# define _LIBCPP_USING_NACL_RANDOM
#endif // defined(__native_client__)
#if !defined(_LIBCPP_LITTLE_ENDIAN) || !defined(_LIBCPP_BIG_ENDIAN) #if !defined(_LIBCPP_LITTLE_ENDIAN) || !defined(_LIBCPP_BIG_ENDIAN)
# include <endian.h> # include <endian.h>
# if __BYTE_ORDER == __LITTLE_ENDIAN # if __BYTE_ORDER == __LITTLE_ENDIAN

View File

@ -3475,9 +3475,9 @@ typedef shuffle_order_engine<minstd_rand0, 256> knuth_b;
class _LIBCPP_TYPE_VIS random_device class _LIBCPP_TYPE_VIS random_device
{ {
#if !defined(_WIN32) #if !(defined(_WIN32) || defined(_LIBCPP_USING_NACL_RANDOM))
int __f_; int __f_;
#endif // defined(_WIN32) #endif // !(defined(_WIN32) || defined(_LIBCPP_USING_NACL_RANDOM))
public: public:
// types // types
typedef unsigned result_type; typedef unsigned result_type;

View File

@ -11,23 +11,27 @@
// Must be defined before including stdlib.h to enable rand_s(). // Must be defined before including stdlib.h to enable rand_s().
#define _CRT_RAND_S #define _CRT_RAND_S
#include <stdio.h> #include <stdio.h>
#endif #endif // defined(_WIN32)
#include "random" #include "random"
#include "system_error" #include "system_error"
#ifdef __sun__ #if defined(__sun__)
#define rename solaris_headers_are_broken #define rename solaris_headers_are_broken
#endif #endif // defined(__sun__)
#if !defined(_WIN32) #if !defined(_WIN32)
#include <fcntl.h> #include <fcntl.h>
#include <unistd.h> #include <unistd.h>
#endif // defined(_WIN32) #endif // !defined(_WIN32)
#include <errno.h> #include <errno.h>
#if defined(_LIBCPP_USING_NACL_RANDOM)
#include <nacl/nacl_random.h>
#endif // defined(_LIBCPP_USING_NACL_RANDOM)
_LIBCPP_BEGIN_NAMESPACE_STD _LIBCPP_BEGIN_NAMESPACE_STD
#if defined(_WIN32) #if defined(_WIN32)
random_device::random_device(const string&) random_device::random_device(const string&)
{ {
} }
@ -45,7 +49,39 @@ random_device::operator()()
__throw_system_error(err, "random_device rand_s failed."); __throw_system_error(err, "random_device rand_s failed.");
return r; return r;
} }
#else
#elif defined(_LIBCPP_USING_NACL_RANDOM)
random_device::random_device(const string& __token)
{
if (__token != "/dev/urandom")
__throw_system_error(ENOENT, ("random device not supported " + __token).c_str());
int error = nacl_secure_random_init();
if (error)
__throw_system_error(error, ("random device failed to open " + __token).c_str());
}
random_device::~random_device()
{
}
unsigned
random_device::operator()()
{
unsigned r;
size_t n = sizeof(r);
char* p = reinterpret_cast<char*>(&r);
size_t bytes_written;
int error = nacl_secure_random(&r, n, &bytes_written);
if (error != 0)
__throw_system_error(error, "random_device failed getting bytes");
else if (bytes_written != n)
__throw_runtime_error("random_device failed to obtain enough bytes");
return r;
}
#else // !defined(_WIN32) && !defined(_LIBCPP_USING_NACL_RANDOM)
random_device::random_device(const string& __token) random_device::random_device(const string& __token)
: __f_(open(__token.c_str(), O_RDONLY)) : __f_(open(__token.c_str(), O_RDONLY))
{ {
@ -80,7 +116,8 @@ random_device::operator()()
} }
return r; return r;
} }
#endif // defined(_WIN32)
#endif // defined(_WIN32) || defined(_LIBCPP_USING_NACL_RANDOM)
double double
random_device::entropy() const _NOEXCEPT random_device::entropy() const _NOEXCEPT

View File

@ -11,39 +11,75 @@
// class random_device; // class random_device;
// explicit random_device(const string& token = "/dev/urandom"); // explicit random_device(const string& token = implementation-defined);
// For the following ctors, the standard states: "The semantics and default
// value of the token parameter are implementation-defined". Implementations
// therefore aren't required to accept any string, but the default shouldn't
// throw.
#include <random> #include <random>
#include <cassert> #include <cassert>
#include <unistd.h> #include <unistd.h>
int main() bool is_valid_random_device(const std::string &token) {
{ #if defined(_WIN32)
try return true;
{ #elif defined(_LIBCPP_USING_NACL_RANDOM)
std::random_device r("wrong file"); return token == "/dev/urandom";
assert(false); #else // !defined(_WIN32) && !defined(_LIBCPP_USING_NACL_RANDOM)
} // Not an exhaustive list: they're the only tokens that are tested below.
catch (const std::system_error& e) return token == "/dev/urandom" || token == "/dev/random";
{ #endif // defined(_WIN32) || defined(_LIBCPP_USING_NACL_RANDOM)
} }
{
std::random_device r; void check_random_device_valid(const std::string &token) {
} std::random_device r(token);
{ }
int ec;
ec = close(STDIN_FILENO); void check_random_device_invalid(const std::string &token) {
assert(!ec); try {
ec = close(STDOUT_FILENO); std::random_device r(token);
assert(!ec); assert(false);
ec = close(STDERR_FILENO); } catch (const std::system_error &e) {
assert(!ec); }
std::random_device r; }
}
{ int main() {
std::random_device r("/dev/urandom");; { std::random_device r; }
}
{ {
std::random_device r("/dev/random");; int ec;
} ec = close(STDIN_FILENO);
assert(!ec);
ec = close(STDOUT_FILENO);
assert(!ec);
ec = close(STDERR_FILENO);
assert(!ec);
std::random_device r;
}
{
std::string token = "wrong file";
if (is_valid_random_device(token))
check_random_device_valid(token);
else
check_random_device_invalid(token);
}
{
std::string token = "/dev/urandom";
if (is_valid_random_device(token))
check_random_device_valid(token);
else
check_random_device_invalid(token);
}
{
std::string token = "/dev/random";
if (is_valid_random_device(token))
check_random_device_valid(token);
else
check_random_device_invalid(token);
}
} }