mirror of
https://github.com/ziglang/zig.git
synced 2025-12-06 06:13:07 +00:00
std: introduce a thread-local CSPRNG for general use
std.crypto.random * cross platform, even freestanding * can't fail. on initialization for some systems requires calling os.getrandom(), in which case there are rare but theoretically possible errors. The code panics in these cases, however the application may choose to override the default seed function and then handle the failure another way. * thread-safe * supports the full Random interface * cryptographically secure * no syscall required to initialize on Linux (AT_RANDOM) * calls arc4random on systems that support it `std.crypto.randomBytes` is removed in favor of `std.crypto.random.bytes`. I moved some of the Random implementations into their own files in the interest of organization. stage2 no longer requires passing a RNG; instead it uses this API. Closes #6704
This commit is contained in:
parent
ce65533985
commit
013efaf139
@ -134,8 +134,10 @@ pub const nacl = struct {
|
||||
|
||||
pub const utils = @import("crypto/utils.zig");
|
||||
|
||||
/// This is a thread-local, cryptographically secure pseudo random number generator.
|
||||
pub const random = &@import("crypto/tlcsprng.zig").interface;
|
||||
|
||||
const std = @import("std.zig");
|
||||
pub const randomBytes = std.os.getrandom;
|
||||
|
||||
test "crypto" {
|
||||
inline for (std.meta.declarations(@This())) |decl| {
|
||||
@ -178,6 +180,13 @@ test "crypto" {
|
||||
_ = @import("crypto/25519/ristretto255.zig");
|
||||
}
|
||||
|
||||
test "CSPRNG" {
|
||||
const a = random.int(u64);
|
||||
const b = random.int(u64);
|
||||
const c = random.int(u64);
|
||||
std.testing.expect(a ^ b ^ c != 0);
|
||||
}
|
||||
|
||||
test "issue #4532: no index out of bounds" {
|
||||
const types = [_]type{
|
||||
hash.Md5,
|
||||
|
||||
@ -43,7 +43,7 @@ pub const Ed25519 = struct {
|
||||
pub fn create(seed: ?[seed_length]u8) !KeyPair {
|
||||
const ss = seed orelse ss: {
|
||||
var random_seed: [seed_length]u8 = undefined;
|
||||
try crypto.randomBytes(&random_seed);
|
||||
crypto.random.bytes(&random_seed);
|
||||
break :ss random_seed;
|
||||
};
|
||||
var az: [Sha512.digest_length]u8 = undefined;
|
||||
@ -179,7 +179,7 @@ pub const Ed25519 = struct {
|
||||
|
||||
var z_batch: [count]Curve.scalar.CompressedScalar = undefined;
|
||||
for (z_batch) |*z| {
|
||||
try std.crypto.randomBytes(z[0..16]);
|
||||
std.crypto.random.bytes(z[0..16]);
|
||||
mem.set(u8, z[16..], 0);
|
||||
}
|
||||
|
||||
@ -232,8 +232,8 @@ test "ed25519 batch verification" {
|
||||
const key_pair = try Ed25519.KeyPair.create(null);
|
||||
var msg1: [32]u8 = undefined;
|
||||
var msg2: [32]u8 = undefined;
|
||||
try std.crypto.randomBytes(&msg1);
|
||||
try std.crypto.randomBytes(&msg2);
|
||||
std.crypto.random.bytes(&msg1);
|
||||
std.crypto.random.bytes(&msg2);
|
||||
const sig1 = try Ed25519.sign(&msg1, key_pair, null);
|
||||
const sig2 = try Ed25519.sign(&msg2, key_pair, null);
|
||||
var signature_batch = [_]Ed25519.BatchElement{
|
||||
|
||||
@ -484,8 +484,8 @@ test "edwards25519 packing/unpacking" {
|
||||
test "edwards25519 point addition/substraction" {
|
||||
var s1: [32]u8 = undefined;
|
||||
var s2: [32]u8 = undefined;
|
||||
try std.crypto.randomBytes(&s1);
|
||||
try std.crypto.randomBytes(&s2);
|
||||
std.crypto.random.bytes(&s1);
|
||||
std.crypto.random.bytes(&s2);
|
||||
const p = try Edwards25519.basePoint.clampedMul(s1);
|
||||
const q = try Edwards25519.basePoint.clampedMul(s2);
|
||||
const r = p.add(q).add(q).sub(q).sub(q);
|
||||
|
||||
@ -34,7 +34,7 @@ pub const X25519 = struct {
|
||||
pub fn create(seed: ?[seed_length]u8) !KeyPair {
|
||||
const sk = seed orelse sk: {
|
||||
var random_seed: [seed_length]u8 = undefined;
|
||||
try crypto.randomBytes(&random_seed);
|
||||
crypto.random.bytes(&random_seed);
|
||||
break :sk random_seed;
|
||||
};
|
||||
var kp: KeyPair = undefined;
|
||||
|
||||
@ -262,7 +262,7 @@ fn strHashInternal(password: []const u8, rounds_log: u6, salt: [salt_length]u8)
|
||||
/// and then use the resulting hash as the password parameter for bcrypt.
|
||||
pub fn strHash(password: []const u8, rounds_log: u6) ![hash_length]u8 {
|
||||
var salt: [salt_length]u8 = undefined;
|
||||
try crypto.randomBytes(&salt);
|
||||
crypto.random.bytes(&salt);
|
||||
return strHashInternal(password, rounds_log, salt);
|
||||
}
|
||||
|
||||
@ -283,7 +283,7 @@ pub fn strVerify(h: [hash_length]u8, password: []const u8) BcryptError!void {
|
||||
|
||||
test "bcrypt codec" {
|
||||
var salt: [salt_length]u8 = undefined;
|
||||
try crypto.randomBytes(&salt);
|
||||
crypto.random.bytes(&salt);
|
||||
var salt_str: [salt_str_length]u8 = undefined;
|
||||
Codec.encode(salt_str[0..], salt[0..]);
|
||||
var salt2: [salt_length]u8 = undefined;
|
||||
|
||||
@ -571,9 +571,9 @@ test "xsalsa20poly1305" {
|
||||
var key: [XSalsa20Poly1305.key_length]u8 = undefined;
|
||||
var nonce: [XSalsa20Poly1305.nonce_length]u8 = undefined;
|
||||
var tag: [XSalsa20Poly1305.tag_length]u8 = undefined;
|
||||
try crypto.randomBytes(&msg);
|
||||
try crypto.randomBytes(&key);
|
||||
try crypto.randomBytes(&nonce);
|
||||
crypto.random.bytes(&msg);
|
||||
crypto.random.bytes(&key);
|
||||
crypto.random.bytes(&nonce);
|
||||
|
||||
XSalsa20Poly1305.encrypt(c[0..], &tag, msg[0..], "ad", nonce, key);
|
||||
try XSalsa20Poly1305.decrypt(msg2[0..], c[0..], tag, "ad", nonce, key);
|
||||
@ -585,9 +585,9 @@ test "xsalsa20poly1305 secretbox" {
|
||||
var key: [XSalsa20Poly1305.key_length]u8 = undefined;
|
||||
var nonce: [Box.nonce_length]u8 = undefined;
|
||||
var boxed: [msg.len + Box.tag_length]u8 = undefined;
|
||||
try crypto.randomBytes(&msg);
|
||||
try crypto.randomBytes(&key);
|
||||
try crypto.randomBytes(&nonce);
|
||||
crypto.random.bytes(&msg);
|
||||
crypto.random.bytes(&key);
|
||||
crypto.random.bytes(&nonce);
|
||||
|
||||
SecretBox.seal(boxed[0..], msg[0..], nonce, key);
|
||||
try SecretBox.open(msg2[0..], boxed[0..], nonce, key);
|
||||
@ -598,8 +598,8 @@ test "xsalsa20poly1305 box" {
|
||||
var msg2: [msg.len]u8 = undefined;
|
||||
var nonce: [Box.nonce_length]u8 = undefined;
|
||||
var boxed: [msg.len + Box.tag_length]u8 = undefined;
|
||||
try crypto.randomBytes(&msg);
|
||||
try crypto.randomBytes(&nonce);
|
||||
crypto.random.bytes(&msg);
|
||||
crypto.random.bytes(&nonce);
|
||||
|
||||
var kp1 = try Box.KeyPair.create(null);
|
||||
var kp2 = try Box.KeyPair.create(null);
|
||||
@ -611,7 +611,7 @@ test "xsalsa20poly1305 sealedbox" {
|
||||
var msg: [100]u8 = undefined;
|
||||
var msg2: [msg.len]u8 = undefined;
|
||||
var boxed: [msg.len + SealedBox.seal_length]u8 = undefined;
|
||||
try crypto.randomBytes(&msg);
|
||||
crypto.random.bytes(&msg);
|
||||
|
||||
var kp = try Box.KeyPair.create(null);
|
||||
try SealedBox.seal(boxed[0..], msg[0..], kp.public_key);
|
||||
|
||||
62
lib/std/crypto/tlcsprng.zig
Normal file
62
lib/std/crypto/tlcsprng.zig
Normal file
@ -0,0 +1,62 @@
|
||||
// SPDX-License-Identifier: MIT
|
||||
// Copyright (c) 2015-2020 Zig Contributors
|
||||
// This file is part of [zig](https://ziglang.org/), which is MIT licensed.
|
||||
// The MIT license requires this copyright notice to be included in all copies
|
||||
// and substantial portions of the software.
|
||||
|
||||
//! Thread-local cryptographically secure pseudo-random number generator.
|
||||
//! This file has public declarations that are intended to be used internally
|
||||
//! by the standard library; this namespace is not intended to be exposed
|
||||
//! directly to standard library users.
|
||||
|
||||
const std = @import("std");
|
||||
const root = @import("root");
|
||||
const mem = std.mem;
|
||||
|
||||
/// We use this as a layer of indirection because global const pointers cannot
|
||||
/// point to thread-local variables.
|
||||
pub var interface = std.rand.Random{ .fillFn = tlsCsprngFill };
|
||||
pub threadlocal var csprng_state: std.crypto.core.Gimli = undefined;
|
||||
pub threadlocal var csprng_state_initialized = false;
|
||||
fn tlsCsprngFill(r: *std.rand.Random, buf: []u8) void {
|
||||
if (std.builtin.link_libc and @hasDecl(std.c, "arc4random_buf")) {
|
||||
// arc4random is already a thread-local CSPRNG.
|
||||
return std.c.arc4random_buf(buf.ptr, buf.len);
|
||||
}
|
||||
if (!csprng_state_initialized) {
|
||||
var seed: [seed_len]u8 = undefined;
|
||||
// Because we panic on getrandom() failing, we provide the opportunity
|
||||
// to override the default seed function. This also makes
|
||||
// `std.crypto.random` available on freestanding targets, provided that
|
||||
// the `cryptoRandomSeed` function is provided.
|
||||
if (@hasDecl(root, "cryptoRandomSeed")) {
|
||||
root.cryptoRandomSeed(&seed);
|
||||
} else {
|
||||
defaultSeed(&seed);
|
||||
}
|
||||
init(seed);
|
||||
}
|
||||
if (buf.len != 0) {
|
||||
csprng_state.squeeze(buf);
|
||||
} else {
|
||||
csprng_state.permute();
|
||||
}
|
||||
mem.set(u8, csprng_state.toSlice()[0..std.crypto.core.Gimli.RATE], 0);
|
||||
}
|
||||
|
||||
fn defaultSeed(buffer: *[seed_len]u8) void {
|
||||
std.os.getrandom(buffer) catch @panic("getrandom() failed to seed thread-local CSPRNG");
|
||||
}
|
||||
|
||||
pub const seed_len = 32;
|
||||
|
||||
pub fn init(seed: [seed_len]u8) void {
|
||||
var initial_state: [std.crypto.core.Gimli.BLOCKBYTES]u8 = undefined;
|
||||
mem.copy(u8, initial_state[0..seed_len], &seed);
|
||||
mem.set(u8, initial_state[seed_len..], 0);
|
||||
csprng_state = std.crypto.core.Gimli.init(initial_state);
|
||||
|
||||
// This is at the end so that accidental recursive dependencies result
|
||||
// in stack overflows instead of invalid random data.
|
||||
csprng_state_initialized = true;
|
||||
}
|
||||
@ -51,8 +51,8 @@ pub fn secureZero(comptime T: type, s: []T) void {
|
||||
test "crypto.utils.timingSafeEql" {
|
||||
var a: [100]u8 = undefined;
|
||||
var b: [100]u8 = undefined;
|
||||
try std.crypto.randomBytes(a[0..]);
|
||||
try std.crypto.randomBytes(b[0..]);
|
||||
std.crypto.random.bytes(a[0..]);
|
||||
std.crypto.random.bytes(b[0..]);
|
||||
testing.expect(!timingSafeEql([100]u8, a, b));
|
||||
mem.copy(u8, a[0..], b[0..]);
|
||||
testing.expect(timingSafeEql([100]u8, a, b));
|
||||
@ -61,8 +61,8 @@ test "crypto.utils.timingSafeEql" {
|
||||
test "crypto.utils.timingSafeEql (vectors)" {
|
||||
var a: [100]u8 = undefined;
|
||||
var b: [100]u8 = undefined;
|
||||
try std.crypto.randomBytes(a[0..]);
|
||||
try std.crypto.randomBytes(b[0..]);
|
||||
std.crypto.random.bytes(a[0..]);
|
||||
std.crypto.random.bytes(b[0..]);
|
||||
const v1: std.meta.Vector(100, u8) = a;
|
||||
const v2: std.meta.Vector(100, u8) = b;
|
||||
testing.expect(!timingSafeEql(std.meta.Vector(100, u8), v1, v2));
|
||||
|
||||
@ -82,7 +82,7 @@ pub fn atomicSymLink(allocator: *Allocator, existing_path: []const u8, new_path:
|
||||
mem.copy(u8, tmp_path[0..], dirname);
|
||||
tmp_path[dirname.len] = path.sep;
|
||||
while (true) {
|
||||
try crypto.randomBytes(rand_buf[0..]);
|
||||
crypto.random.bytes(rand_buf[0..]);
|
||||
base64_encoder.encode(tmp_path[dirname.len + 1 ..], &rand_buf);
|
||||
|
||||
if (cwd().symLink(existing_path, tmp_path, .{})) {
|
||||
@ -157,7 +157,7 @@ pub const AtomicFile = struct {
|
||||
tmp_path_buf[base64.Base64Encoder.calcSize(RANDOM_BYTES)] = 0;
|
||||
|
||||
while (true) {
|
||||
try crypto.randomBytes(rand_buf[0..]);
|
||||
crypto.random.bytes(rand_buf[0..]);
|
||||
base64_encoder.encode(&tmp_path_buf, &rand_buf);
|
||||
|
||||
const file = dir.createFile(
|
||||
|
||||
579
lib/std/rand.zig
579
lib/std/rand.zig
@ -4,19 +4,11 @@
|
||||
// The MIT license requires this copyright notice to be included in all copies
|
||||
// and substantial portions of the software.
|
||||
|
||||
//! The engines provided here should be initialized from an external source. For now, randomBytes
|
||||
//! from the crypto package is the most suitable. Be sure to use a CSPRNG when required, otherwise using
|
||||
//! a normal PRNG will be faster and use substantially less stack space.
|
||||
//!
|
||||
//! ```
|
||||
//! var buf: [8]u8 = undefined;
|
||||
//! try std.crypto.randomBytes(buf[0..]);
|
||||
//! const seed = mem.readIntLittle(u64, buf[0..8]);
|
||||
//!
|
||||
//! var r = DefaultPrng.init(seed);
|
||||
//!
|
||||
//! const s = r.random.int(u64);
|
||||
//! ```
|
||||
//! The engines provided here should be initialized from an external source.
|
||||
//! For a thread-local cryptographically secure pseudo random number generator,
|
||||
//! use `std.crypto.random`.
|
||||
//! Be sure to use a CSPRNG when required, otherwise using a normal PRNG will
|
||||
//! be faster and use substantially less stack space.
|
||||
//!
|
||||
//! TODO(tiehuis): Benchmark these against other reference implementations.
|
||||
|
||||
@ -36,6 +28,12 @@ pub const DefaultPrng = Xoroshiro128;
|
||||
/// Cryptographically secure random numbers.
|
||||
pub const DefaultCsprng = Gimli;
|
||||
|
||||
pub const Isaac64 = @import("rand/Isaac64.zig");
|
||||
pub const Gimli = @import("rand/Gimli.zig");
|
||||
pub const Pcg = @import("rand/Pcg.zig");
|
||||
pub const Xoroshiro128 = @import("rand/Xoroshiro128.zig");
|
||||
pub const Sfc64 = @import("rand/Sfc64.zig");
|
||||
|
||||
pub const Random = struct {
|
||||
fillFn: fn (r: *Random, buf: []u8) void,
|
||||
|
||||
@ -491,7 +489,7 @@ test "Random Biased" {
|
||||
//
|
||||
// The number of cycles is thus limited to 64-bits regardless of the engine, but this
|
||||
// is still plenty for practical purposes.
|
||||
const SplitMix64 = struct {
|
||||
pub const SplitMix64 = struct {
|
||||
s: u64,
|
||||
|
||||
pub fn init(seed: u64) SplitMix64 {
|
||||
@ -525,557 +523,6 @@ test "splitmix64 sequence" {
|
||||
}
|
||||
}
|
||||
|
||||
// PCG32 - http://www.pcg-random.org/
|
||||
//
|
||||
// PRNG
|
||||
pub const Pcg = struct {
|
||||
const default_multiplier = 6364136223846793005;
|
||||
|
||||
random: Random,
|
||||
|
||||
s: u64,
|
||||
i: u64,
|
||||
|
||||
pub fn init(init_s: u64) Pcg {
|
||||
var pcg = Pcg{
|
||||
.random = Random{ .fillFn = fill },
|
||||
.s = undefined,
|
||||
.i = undefined,
|
||||
};
|
||||
|
||||
pcg.seed(init_s);
|
||||
return pcg;
|
||||
}
|
||||
|
||||
fn next(self: *Pcg) u32 {
|
||||
const l = self.s;
|
||||
self.s = l *% default_multiplier +% (self.i | 1);
|
||||
|
||||
const xor_s = @truncate(u32, ((l >> 18) ^ l) >> 27);
|
||||
const rot = @intCast(u32, l >> 59);
|
||||
|
||||
return (xor_s >> @intCast(u5, rot)) | (xor_s << @intCast(u5, (0 -% rot) & 31));
|
||||
}
|
||||
|
||||
fn seed(self: *Pcg, init_s: u64) void {
|
||||
// Pcg requires 128-bits of seed.
|
||||
var gen = SplitMix64.init(init_s);
|
||||
self.seedTwo(gen.next(), gen.next());
|
||||
}
|
||||
|
||||
fn seedTwo(self: *Pcg, init_s: u64, init_i: u64) void {
|
||||
self.s = 0;
|
||||
self.i = (init_s << 1) | 1;
|
||||
self.s = self.s *% default_multiplier +% self.i;
|
||||
self.s +%= init_i;
|
||||
self.s = self.s *% default_multiplier +% self.i;
|
||||
}
|
||||
|
||||
fn fill(r: *Random, buf: []u8) void {
|
||||
const self = @fieldParentPtr(Pcg, "random", r);
|
||||
|
||||
var i: usize = 0;
|
||||
const aligned_len = buf.len - (buf.len & 7);
|
||||
|
||||
// Complete 4 byte segments.
|
||||
while (i < aligned_len) : (i += 4) {
|
||||
var n = self.next();
|
||||
comptime var j: usize = 0;
|
||||
inline while (j < 4) : (j += 1) {
|
||||
buf[i + j] = @truncate(u8, n);
|
||||
n >>= 8;
|
||||
}
|
||||
}
|
||||
|
||||
// Remaining. (cuts the stream)
|
||||
if (i != buf.len) {
|
||||
var n = self.next();
|
||||
while (i < buf.len) : (i += 1) {
|
||||
buf[i] = @truncate(u8, n);
|
||||
n >>= 4;
|
||||
}
|
||||
}
|
||||
}
|
||||
};
|
||||
|
||||
test "pcg sequence" {
|
||||
var r = Pcg.init(0);
|
||||
const s0: u64 = 0x9394bf54ce5d79de;
|
||||
const s1: u64 = 0x84e9c579ef59bbf7;
|
||||
r.seedTwo(s0, s1);
|
||||
|
||||
const seq = [_]u32{
|
||||
2881561918,
|
||||
3063928540,
|
||||
1199791034,
|
||||
2487695858,
|
||||
1479648952,
|
||||
3247963454,
|
||||
};
|
||||
|
||||
for (seq) |s| {
|
||||
expect(s == r.next());
|
||||
}
|
||||
}
|
||||
|
||||
// Xoroshiro128+ - http://xoroshiro.di.unimi.it/
|
||||
//
|
||||
// PRNG
|
||||
pub const Xoroshiro128 = struct {
|
||||
random: Random,
|
||||
|
||||
s: [2]u64,
|
||||
|
||||
pub fn init(init_s: u64) Xoroshiro128 {
|
||||
var x = Xoroshiro128{
|
||||
.random = Random{ .fillFn = fill },
|
||||
.s = undefined,
|
||||
};
|
||||
|
||||
x.seed(init_s);
|
||||
return x;
|
||||
}
|
||||
|
||||
fn next(self: *Xoroshiro128) u64 {
|
||||
const s0 = self.s[0];
|
||||
var s1 = self.s[1];
|
||||
const r = s0 +% s1;
|
||||
|
||||
s1 ^= s0;
|
||||
self.s[0] = math.rotl(u64, s0, @as(u8, 55)) ^ s1 ^ (s1 << 14);
|
||||
self.s[1] = math.rotl(u64, s1, @as(u8, 36));
|
||||
|
||||
return r;
|
||||
}
|
||||
|
||||
// Skip 2^64 places ahead in the sequence
|
||||
fn jump(self: *Xoroshiro128) void {
|
||||
var s0: u64 = 0;
|
||||
var s1: u64 = 0;
|
||||
|
||||
const table = [_]u64{
|
||||
0xbeac0467eba5facb,
|
||||
0xd86b048b86aa9922,
|
||||
};
|
||||
|
||||
inline for (table) |entry| {
|
||||
var b: usize = 0;
|
||||
while (b < 64) : (b += 1) {
|
||||
if ((entry & (@as(u64, 1) << @intCast(u6, b))) != 0) {
|
||||
s0 ^= self.s[0];
|
||||
s1 ^= self.s[1];
|
||||
}
|
||||
_ = self.next();
|
||||
}
|
||||
}
|
||||
|
||||
self.s[0] = s0;
|
||||
self.s[1] = s1;
|
||||
}
|
||||
|
||||
pub fn seed(self: *Xoroshiro128, init_s: u64) void {
|
||||
// Xoroshiro requires 128-bits of seed.
|
||||
var gen = SplitMix64.init(init_s);
|
||||
|
||||
self.s[0] = gen.next();
|
||||
self.s[1] = gen.next();
|
||||
}
|
||||
|
||||
fn fill(r: *Random, buf: []u8) void {
|
||||
const self = @fieldParentPtr(Xoroshiro128, "random", r);
|
||||
|
||||
var i: usize = 0;
|
||||
const aligned_len = buf.len - (buf.len & 7);
|
||||
|
||||
// Complete 8 byte segments.
|
||||
while (i < aligned_len) : (i += 8) {
|
||||
var n = self.next();
|
||||
comptime var j: usize = 0;
|
||||
inline while (j < 8) : (j += 1) {
|
||||
buf[i + j] = @truncate(u8, n);
|
||||
n >>= 8;
|
||||
}
|
||||
}
|
||||
|
||||
// Remaining. (cuts the stream)
|
||||
if (i != buf.len) {
|
||||
var n = self.next();
|
||||
while (i < buf.len) : (i += 1) {
|
||||
buf[i] = @truncate(u8, n);
|
||||
n >>= 8;
|
||||
}
|
||||
}
|
||||
}
|
||||
};
|
||||
|
||||
test "xoroshiro sequence" {
|
||||
var r = Xoroshiro128.init(0);
|
||||
r.s[0] = 0xaeecf86f7878dd75;
|
||||
r.s[1] = 0x01cd153642e72622;
|
||||
|
||||
const seq1 = [_]u64{
|
||||
0xb0ba0da5bb600397,
|
||||
0x18a08afde614dccc,
|
||||
0xa2635b956a31b929,
|
||||
0xabe633c971efa045,
|
||||
0x9ac19f9706ca3cac,
|
||||
0xf62b426578c1e3fb,
|
||||
};
|
||||
|
||||
for (seq1) |s| {
|
||||
expect(s == r.next());
|
||||
}
|
||||
|
||||
r.jump();
|
||||
|
||||
const seq2 = [_]u64{
|
||||
0x95344a13556d3e22,
|
||||
0xb4fb32dafa4d00df,
|
||||
0xb2011d9ccdcfe2dd,
|
||||
0x05679a9b2119b908,
|
||||
0xa860a1da7c9cd8a0,
|
||||
0x658a96efe3f86550,
|
||||
};
|
||||
|
||||
for (seq2) |s| {
|
||||
expect(s == r.next());
|
||||
}
|
||||
}
|
||||
|
||||
// Gimli
|
||||
//
|
||||
// CSPRNG
|
||||
pub const Gimli = struct {
|
||||
random: Random,
|
||||
state: std.crypto.core.Gimli,
|
||||
|
||||
pub const secret_seed_length = 32;
|
||||
|
||||
/// The seed must be uniform, secret and `secret_seed_length` bytes long.
|
||||
/// It can be generated using `std.crypto.randomBytes()`.
|
||||
pub fn init(secret_seed: [secret_seed_length]u8) Gimli {
|
||||
var initial_state: [std.crypto.core.Gimli.BLOCKBYTES]u8 = undefined;
|
||||
mem.copy(u8, initial_state[0..secret_seed_length], &secret_seed);
|
||||
mem.set(u8, initial_state[secret_seed_length..], 0);
|
||||
var self = Gimli{
|
||||
.random = Random{ .fillFn = fill },
|
||||
.state = std.crypto.core.Gimli.init(initial_state),
|
||||
};
|
||||
return self;
|
||||
}
|
||||
|
||||
fn fill(r: *Random, buf: []u8) void {
|
||||
const self = @fieldParentPtr(Gimli, "random", r);
|
||||
|
||||
if (buf.len != 0) {
|
||||
self.state.squeeze(buf);
|
||||
} else {
|
||||
self.state.permute();
|
||||
}
|
||||
mem.set(u8, self.state.toSlice()[0..std.crypto.core.Gimli.RATE], 0);
|
||||
}
|
||||
};
|
||||
|
||||
// ISAAC64 - http://www.burtleburtle.net/bob/rand/isaacafa.html
|
||||
//
|
||||
// Follows the general idea of the implementation from here with a few shortcuts.
|
||||
// https://doc.rust-lang.org/rand/src/rand/prng/isaac64.rs.html
|
||||
pub const Isaac64 = struct {
|
||||
random: Random,
|
||||
|
||||
r: [256]u64,
|
||||
m: [256]u64,
|
||||
a: u64,
|
||||
b: u64,
|
||||
c: u64,
|
||||
i: usize,
|
||||
|
||||
pub fn init(init_s: u64) Isaac64 {
|
||||
var isaac = Isaac64{
|
||||
.random = Random{ .fillFn = fill },
|
||||
.r = undefined,
|
||||
.m = undefined,
|
||||
.a = undefined,
|
||||
.b = undefined,
|
||||
.c = undefined,
|
||||
.i = undefined,
|
||||
};
|
||||
|
||||
// seed == 0 => same result as the unseeded reference implementation
|
||||
isaac.seed(init_s, 1);
|
||||
return isaac;
|
||||
}
|
||||
|
||||
fn step(self: *Isaac64, mix: u64, base: usize, comptime m1: usize, comptime m2: usize) void {
|
||||
const x = self.m[base + m1];
|
||||
self.a = mix +% self.m[base + m2];
|
||||
|
||||
const y = self.a +% self.b +% self.m[@intCast(usize, (x >> 3) % self.m.len)];
|
||||
self.m[base + m1] = y;
|
||||
|
||||
self.b = x +% self.m[@intCast(usize, (y >> 11) % self.m.len)];
|
||||
self.r[self.r.len - 1 - base - m1] = self.b;
|
||||
}
|
||||
|
||||
fn refill(self: *Isaac64) void {
|
||||
const midpoint = self.r.len / 2;
|
||||
|
||||
self.c +%= 1;
|
||||
self.b +%= self.c;
|
||||
|
||||
{
|
||||
var i: usize = 0;
|
||||
while (i < midpoint) : (i += 4) {
|
||||
self.step(~(self.a ^ (self.a << 21)), i + 0, 0, midpoint);
|
||||
self.step(self.a ^ (self.a >> 5), i + 1, 0, midpoint);
|
||||
self.step(self.a ^ (self.a << 12), i + 2, 0, midpoint);
|
||||
self.step(self.a ^ (self.a >> 33), i + 3, 0, midpoint);
|
||||
}
|
||||
}
|
||||
|
||||
{
|
||||
var i: usize = 0;
|
||||
while (i < midpoint) : (i += 4) {
|
||||
self.step(~(self.a ^ (self.a << 21)), i + 0, midpoint, 0);
|
||||
self.step(self.a ^ (self.a >> 5), i + 1, midpoint, 0);
|
||||
self.step(self.a ^ (self.a << 12), i + 2, midpoint, 0);
|
||||
self.step(self.a ^ (self.a >> 33), i + 3, midpoint, 0);
|
||||
}
|
||||
}
|
||||
|
||||
self.i = 0;
|
||||
}
|
||||
|
||||
fn next(self: *Isaac64) u64 {
|
||||
if (self.i >= self.r.len) {
|
||||
self.refill();
|
||||
}
|
||||
|
||||
const value = self.r[self.i];
|
||||
self.i += 1;
|
||||
return value;
|
||||
}
|
||||
|
||||
fn seed(self: *Isaac64, init_s: u64, comptime rounds: usize) void {
|
||||
// We ignore the multi-pass requirement since we don't currently expose full access to
|
||||
// seeding the self.m array completely.
|
||||
mem.set(u64, self.m[0..], 0);
|
||||
self.m[0] = init_s;
|
||||
|
||||
// prescrambled golden ratio constants
|
||||
var a = [_]u64{
|
||||
0x647c4677a2884b7c,
|
||||
0xb9f8b322c73ac862,
|
||||
0x8c0ea5053d4712a0,
|
||||
0xb29b2e824a595524,
|
||||
0x82f053db8355e0ce,
|
||||
0x48fe4a0fa5a09315,
|
||||
0xae985bf2cbfc89ed,
|
||||
0x98f5704f6c44c0ab,
|
||||
};
|
||||
|
||||
comptime var i: usize = 0;
|
||||
inline while (i < rounds) : (i += 1) {
|
||||
var j: usize = 0;
|
||||
while (j < self.m.len) : (j += 8) {
|
||||
comptime var x1: usize = 0;
|
||||
inline while (x1 < 8) : (x1 += 1) {
|
||||
a[x1] +%= self.m[j + x1];
|
||||
}
|
||||
|
||||
a[0] -%= a[4];
|
||||
a[5] ^= a[7] >> 9;
|
||||
a[7] +%= a[0];
|
||||
a[1] -%= a[5];
|
||||
a[6] ^= a[0] << 9;
|
||||
a[0] +%= a[1];
|
||||
a[2] -%= a[6];
|
||||
a[7] ^= a[1] >> 23;
|
||||
a[1] +%= a[2];
|
||||
a[3] -%= a[7];
|
||||
a[0] ^= a[2] << 15;
|
||||
a[2] +%= a[3];
|
||||
a[4] -%= a[0];
|
||||
a[1] ^= a[3] >> 14;
|
||||
a[3] +%= a[4];
|
||||
a[5] -%= a[1];
|
||||
a[2] ^= a[4] << 20;
|
||||
a[4] +%= a[5];
|
||||
a[6] -%= a[2];
|
||||
a[3] ^= a[5] >> 17;
|
||||
a[5] +%= a[6];
|
||||
a[7] -%= a[3];
|
||||
a[4] ^= a[6] << 14;
|
||||
a[6] +%= a[7];
|
||||
|
||||
comptime var x2: usize = 0;
|
||||
inline while (x2 < 8) : (x2 += 1) {
|
||||
self.m[j + x2] = a[x2];
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
mem.set(u64, self.r[0..], 0);
|
||||
self.a = 0;
|
||||
self.b = 0;
|
||||
self.c = 0;
|
||||
self.i = self.r.len; // trigger refill on first value
|
||||
}
|
||||
|
||||
fn fill(r: *Random, buf: []u8) void {
|
||||
const self = @fieldParentPtr(Isaac64, "random", r);
|
||||
|
||||
var i: usize = 0;
|
||||
const aligned_len = buf.len - (buf.len & 7);
|
||||
|
||||
// Fill complete 64-byte segments
|
||||
while (i < aligned_len) : (i += 8) {
|
||||
var n = self.next();
|
||||
comptime var j: usize = 0;
|
||||
inline while (j < 8) : (j += 1) {
|
||||
buf[i + j] = @truncate(u8, n);
|
||||
n >>= 8;
|
||||
}
|
||||
}
|
||||
|
||||
// Fill trailing, ignoring excess (cut the stream).
|
||||
if (i != buf.len) {
|
||||
var n = self.next();
|
||||
while (i < buf.len) : (i += 1) {
|
||||
buf[i] = @truncate(u8, n);
|
||||
n >>= 8;
|
||||
}
|
||||
}
|
||||
}
|
||||
};
|
||||
|
||||
test "isaac64 sequence" {
|
||||
var r = Isaac64.init(0);
|
||||
|
||||
// from reference implementation
|
||||
const seq = [_]u64{
|
||||
0xf67dfba498e4937c,
|
||||
0x84a5066a9204f380,
|
||||
0xfee34bd5f5514dbb,
|
||||
0x4d1664739b8f80d6,
|
||||
0x8607459ab52a14aa,
|
||||
0x0e78bc5a98529e49,
|
||||
0xfe5332822ad13777,
|
||||
0x556c27525e33d01a,
|
||||
0x08643ca615f3149f,
|
||||
0xd0771faf3cb04714,
|
||||
0x30e86f68a37b008d,
|
||||
0x3074ebc0488a3adf,
|
||||
0x270645ea7a2790bc,
|
||||
0x5601a0a8d3763c6a,
|
||||
0x2f83071f53f325dd,
|
||||
0xb9090f3d42d2d2ea,
|
||||
};
|
||||
|
||||
for (seq) |s| {
|
||||
expect(s == r.next());
|
||||
}
|
||||
}
|
||||
|
||||
/// Sfc64 pseudo-random number generator from Practically Random.
|
||||
/// Fastest engine of pracrand and smallest footprint.
|
||||
/// See http://pracrand.sourceforge.net/
|
||||
pub const Sfc64 = struct {
|
||||
random: Random,
|
||||
|
||||
a: u64 = undefined,
|
||||
b: u64 = undefined,
|
||||
c: u64 = undefined,
|
||||
counter: u64 = undefined,
|
||||
|
||||
const Rotation = 24;
|
||||
const RightShift = 11;
|
||||
const LeftShift = 3;
|
||||
|
||||
pub fn init(init_s: u64) Sfc64 {
|
||||
var x = Sfc64{
|
||||
.random = Random{ .fillFn = fill },
|
||||
};
|
||||
|
||||
x.seed(init_s);
|
||||
return x;
|
||||
}
|
||||
|
||||
fn next(self: *Sfc64) u64 {
|
||||
const tmp = self.a +% self.b +% self.counter;
|
||||
self.counter += 1;
|
||||
self.a = self.b ^ (self.b >> RightShift);
|
||||
self.b = self.c +% (self.c << LeftShift);
|
||||
self.c = math.rotl(u64, self.c, Rotation) +% tmp;
|
||||
return tmp;
|
||||
}
|
||||
|
||||
fn seed(self: *Sfc64, init_s: u64) void {
|
||||
self.a = init_s;
|
||||
self.b = init_s;
|
||||
self.c = init_s;
|
||||
self.counter = 1;
|
||||
var i: u32 = 0;
|
||||
while (i < 12) : (i += 1) {
|
||||
_ = self.next();
|
||||
}
|
||||
}
|
||||
|
||||
fn fill(r: *Random, buf: []u8) void {
|
||||
const self = @fieldParentPtr(Sfc64, "random", r);
|
||||
|
||||
var i: usize = 0;
|
||||
const aligned_len = buf.len - (buf.len & 7);
|
||||
|
||||
// Complete 8 byte segments.
|
||||
while (i < aligned_len) : (i += 8) {
|
||||
var n = self.next();
|
||||
comptime var j: usize = 0;
|
||||
inline while (j < 8) : (j += 1) {
|
||||
buf[i + j] = @truncate(u8, n);
|
||||
n >>= 8;
|
||||
}
|
||||
}
|
||||
|
||||
// Remaining. (cuts the stream)
|
||||
if (i != buf.len) {
|
||||
var n = self.next();
|
||||
while (i < buf.len) : (i += 1) {
|
||||
buf[i] = @truncate(u8, n);
|
||||
n >>= 8;
|
||||
}
|
||||
}
|
||||
}
|
||||
};
|
||||
|
||||
test "Sfc64 sequence" {
|
||||
// Unfortunately there does not seem to be an official test sequence.
|
||||
var r = Sfc64.init(0);
|
||||
|
||||
const seq = [_]u64{
|
||||
0x3acfa029e3cc6041,
|
||||
0xf5b6515bf2ee419c,
|
||||
0x1259635894a29b61,
|
||||
0xb6ae75395f8ebd6,
|
||||
0x225622285ce302e2,
|
||||
0x520d28611395cb21,
|
||||
0xdb909c818901599d,
|
||||
0x8ffd195365216f57,
|
||||
0xe8c4ad5e258ac04a,
|
||||
0x8f8ef2c89fdb63ca,
|
||||
0xf9865b01d98d8e2f,
|
||||
0x46555871a65d08ba,
|
||||
0x66868677c6298fcd,
|
||||
0x2ce15a7e6329f57d,
|
||||
0xb2f1833ca91ca79,
|
||||
0x4b0890ac9bf453ca,
|
||||
};
|
||||
|
||||
for (seq) |s| {
|
||||
expectEqual(s, r.next());
|
||||
}
|
||||
}
|
||||
|
||||
// Actual Random helper function tests, pcg engine is assumed correct.
|
||||
test "Random float" {
|
||||
var prng = DefaultPrng.init(0);
|
||||
@ -1147,7 +594,7 @@ fn testRangeBias(r: *Random, start: i8, end: i8, biased: bool) void {
|
||||
|
||||
test "CSPRNG" {
|
||||
var secret_seed: [DefaultCsprng.secret_seed_length]u8 = undefined;
|
||||
try std.crypto.randomBytes(&secret_seed);
|
||||
std.crypto.random.bytes(&secret_seed);
|
||||
var csprng = DefaultCsprng.init(secret_seed);
|
||||
const a = csprng.random.int(u64);
|
||||
const b = csprng.random.int(u64);
|
||||
|
||||
40
lib/std/rand/Gimli.zig
Normal file
40
lib/std/rand/Gimli.zig
Normal file
@ -0,0 +1,40 @@
|
||||
// SPDX-License-Identifier: MIT
|
||||
// Copyright (c) 2015-2020 Zig Contributors
|
||||
// This file is part of [zig](https://ziglang.org/), which is MIT licensed.
|
||||
// The MIT license requires this copyright notice to be included in all copies
|
||||
// and substantial portions of the software.
|
||||
|
||||
//! CSPRNG
|
||||
|
||||
const std = @import("std");
|
||||
const Random = std.rand.Random;
|
||||
const mem = std.mem;
|
||||
const Gimli = @This();
|
||||
|
||||
random: Random,
|
||||
state: std.crypto.core.Gimli,
|
||||
|
||||
pub const secret_seed_length = 32;
|
||||
|
||||
/// The seed must be uniform, secret and `secret_seed_length` bytes long.
|
||||
pub fn init(secret_seed: [secret_seed_length]u8) Gimli {
|
||||
var initial_state: [std.crypto.core.Gimli.BLOCKBYTES]u8 = undefined;
|
||||
mem.copy(u8, initial_state[0..secret_seed_length], &secret_seed);
|
||||
mem.set(u8, initial_state[secret_seed_length..], 0);
|
||||
var self = Gimli{
|
||||
.random = Random{ .fillFn = fill },
|
||||
.state = std.crypto.core.Gimli.init(initial_state),
|
||||
};
|
||||
return self;
|
||||
}
|
||||
|
||||
fn fill(r: *Random, buf: []u8) void {
|
||||
const self = @fieldParentPtr(Gimli, "random", r);
|
||||
|
||||
if (buf.len != 0) {
|
||||
self.state.squeeze(buf);
|
||||
} else {
|
||||
self.state.permute();
|
||||
}
|
||||
mem.set(u8, self.state.toSlice()[0..std.crypto.core.Gimli.RATE], 0);
|
||||
}
|
||||
210
lib/std/rand/Isaac64.zig
Normal file
210
lib/std/rand/Isaac64.zig
Normal file
@ -0,0 +1,210 @@
|
||||
// SPDX-License-Identifier: MIT
|
||||
// Copyright (c) 2015-2020 Zig Contributors
|
||||
// This file is part of [zig](https://ziglang.org/), which is MIT licensed.
|
||||
// The MIT license requires this copyright notice to be included in all copies
|
||||
// and substantial portions of the software.
|
||||
|
||||
//! ISAAC64 - http://www.burtleburtle.net/bob/rand/isaacafa.html
|
||||
//!
|
||||
//! Follows the general idea of the implementation from here with a few shortcuts.
|
||||
//! https://doc.rust-lang.org/rand/src/rand/prng/isaac64.rs.html
|
||||
|
||||
const std = @import("std");
|
||||
const Random = std.rand.Random;
|
||||
const mem = std.mem;
|
||||
const Isaac64 = @This();
|
||||
|
||||
random: Random,
|
||||
|
||||
r: [256]u64,
|
||||
m: [256]u64,
|
||||
a: u64,
|
||||
b: u64,
|
||||
c: u64,
|
||||
i: usize,
|
||||
|
||||
pub fn init(init_s: u64) Isaac64 {
|
||||
var isaac = Isaac64{
|
||||
.random = Random{ .fillFn = fill },
|
||||
.r = undefined,
|
||||
.m = undefined,
|
||||
.a = undefined,
|
||||
.b = undefined,
|
||||
.c = undefined,
|
||||
.i = undefined,
|
||||
};
|
||||
|
||||
// seed == 0 => same result as the unseeded reference implementation
|
||||
isaac.seed(init_s, 1);
|
||||
return isaac;
|
||||
}
|
||||
|
||||
fn step(self: *Isaac64, mix: u64, base: usize, comptime m1: usize, comptime m2: usize) void {
|
||||
const x = self.m[base + m1];
|
||||
self.a = mix +% self.m[base + m2];
|
||||
|
||||
const y = self.a +% self.b +% self.m[@intCast(usize, (x >> 3) % self.m.len)];
|
||||
self.m[base + m1] = y;
|
||||
|
||||
self.b = x +% self.m[@intCast(usize, (y >> 11) % self.m.len)];
|
||||
self.r[self.r.len - 1 - base - m1] = self.b;
|
||||
}
|
||||
|
||||
fn refill(self: *Isaac64) void {
|
||||
const midpoint = self.r.len / 2;
|
||||
|
||||
self.c +%= 1;
|
||||
self.b +%= self.c;
|
||||
|
||||
{
|
||||
var i: usize = 0;
|
||||
while (i < midpoint) : (i += 4) {
|
||||
self.step(~(self.a ^ (self.a << 21)), i + 0, 0, midpoint);
|
||||
self.step(self.a ^ (self.a >> 5), i + 1, 0, midpoint);
|
||||
self.step(self.a ^ (self.a << 12), i + 2, 0, midpoint);
|
||||
self.step(self.a ^ (self.a >> 33), i + 3, 0, midpoint);
|
||||
}
|
||||
}
|
||||
|
||||
{
|
||||
var i: usize = 0;
|
||||
while (i < midpoint) : (i += 4) {
|
||||
self.step(~(self.a ^ (self.a << 21)), i + 0, midpoint, 0);
|
||||
self.step(self.a ^ (self.a >> 5), i + 1, midpoint, 0);
|
||||
self.step(self.a ^ (self.a << 12), i + 2, midpoint, 0);
|
||||
self.step(self.a ^ (self.a >> 33), i + 3, midpoint, 0);
|
||||
}
|
||||
}
|
||||
|
||||
self.i = 0;
|
||||
}
|
||||
|
||||
fn next(self: *Isaac64) u64 {
|
||||
if (self.i >= self.r.len) {
|
||||
self.refill();
|
||||
}
|
||||
|
||||
const value = self.r[self.i];
|
||||
self.i += 1;
|
||||
return value;
|
||||
}
|
||||
|
||||
fn seed(self: *Isaac64, init_s: u64, comptime rounds: usize) void {
|
||||
// We ignore the multi-pass requirement since we don't currently expose full access to
|
||||
// seeding the self.m array completely.
|
||||
mem.set(u64, self.m[0..], 0);
|
||||
self.m[0] = init_s;
|
||||
|
||||
// prescrambled golden ratio constants
|
||||
var a = [_]u64{
|
||||
0x647c4677a2884b7c,
|
||||
0xb9f8b322c73ac862,
|
||||
0x8c0ea5053d4712a0,
|
||||
0xb29b2e824a595524,
|
||||
0x82f053db8355e0ce,
|
||||
0x48fe4a0fa5a09315,
|
||||
0xae985bf2cbfc89ed,
|
||||
0x98f5704f6c44c0ab,
|
||||
};
|
||||
|
||||
comptime var i: usize = 0;
|
||||
inline while (i < rounds) : (i += 1) {
|
||||
var j: usize = 0;
|
||||
while (j < self.m.len) : (j += 8) {
|
||||
comptime var x1: usize = 0;
|
||||
inline while (x1 < 8) : (x1 += 1) {
|
||||
a[x1] +%= self.m[j + x1];
|
||||
}
|
||||
|
||||
a[0] -%= a[4];
|
||||
a[5] ^= a[7] >> 9;
|
||||
a[7] +%= a[0];
|
||||
a[1] -%= a[5];
|
||||
a[6] ^= a[0] << 9;
|
||||
a[0] +%= a[1];
|
||||
a[2] -%= a[6];
|
||||
a[7] ^= a[1] >> 23;
|
||||
a[1] +%= a[2];
|
||||
a[3] -%= a[7];
|
||||
a[0] ^= a[2] << 15;
|
||||
a[2] +%= a[3];
|
||||
a[4] -%= a[0];
|
||||
a[1] ^= a[3] >> 14;
|
||||
a[3] +%= a[4];
|
||||
a[5] -%= a[1];
|
||||
a[2] ^= a[4] << 20;
|
||||
a[4] +%= a[5];
|
||||
a[6] -%= a[2];
|
||||
a[3] ^= a[5] >> 17;
|
||||
a[5] +%= a[6];
|
||||
a[7] -%= a[3];
|
||||
a[4] ^= a[6] << 14;
|
||||
a[6] +%= a[7];
|
||||
|
||||
comptime var x2: usize = 0;
|
||||
inline while (x2 < 8) : (x2 += 1) {
|
||||
self.m[j + x2] = a[x2];
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
mem.set(u64, self.r[0..], 0);
|
||||
self.a = 0;
|
||||
self.b = 0;
|
||||
self.c = 0;
|
||||
self.i = self.r.len; // trigger refill on first value
|
||||
}
|
||||
|
||||
fn fill(r: *Random, buf: []u8) void {
|
||||
const self = @fieldParentPtr(Isaac64, "random", r);
|
||||
|
||||
var i: usize = 0;
|
||||
const aligned_len = buf.len - (buf.len & 7);
|
||||
|
||||
// Fill complete 64-byte segments
|
||||
while (i < aligned_len) : (i += 8) {
|
||||
var n = self.next();
|
||||
comptime var j: usize = 0;
|
||||
inline while (j < 8) : (j += 1) {
|
||||
buf[i + j] = @truncate(u8, n);
|
||||
n >>= 8;
|
||||
}
|
||||
}
|
||||
|
||||
// Fill trailing, ignoring excess (cut the stream).
|
||||
if (i != buf.len) {
|
||||
var n = self.next();
|
||||
while (i < buf.len) : (i += 1) {
|
||||
buf[i] = @truncate(u8, n);
|
||||
n >>= 8;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
test "isaac64 sequence" {
|
||||
var r = Isaac64.init(0);
|
||||
|
||||
// from reference implementation
|
||||
const seq = [_]u64{
|
||||
0xf67dfba498e4937c,
|
||||
0x84a5066a9204f380,
|
||||
0xfee34bd5f5514dbb,
|
||||
0x4d1664739b8f80d6,
|
||||
0x8607459ab52a14aa,
|
||||
0x0e78bc5a98529e49,
|
||||
0xfe5332822ad13777,
|
||||
0x556c27525e33d01a,
|
||||
0x08643ca615f3149f,
|
||||
0xd0771faf3cb04714,
|
||||
0x30e86f68a37b008d,
|
||||
0x3074ebc0488a3adf,
|
||||
0x270645ea7a2790bc,
|
||||
0x5601a0a8d3763c6a,
|
||||
0x2f83071f53f325dd,
|
||||
0xb9090f3d42d2d2ea,
|
||||
};
|
||||
|
||||
for (seq) |s| {
|
||||
std.testing.expect(s == r.next());
|
||||
}
|
||||
}
|
||||
101
lib/std/rand/Pcg.zig
Normal file
101
lib/std/rand/Pcg.zig
Normal file
@ -0,0 +1,101 @@
|
||||
// SPDX-License-Identifier: MIT
|
||||
// Copyright (c) 2015-2020 Zig Contributors
|
||||
// This file is part of [zig](https://ziglang.org/), which is MIT licensed.
|
||||
// The MIT license requires this copyright notice to be included in all copies
|
||||
// and substantial portions of the software.
|
||||
|
||||
//! PCG32 - http://www.pcg-random.org/
|
||||
//!
|
||||
//! PRNG
|
||||
|
||||
const std = @import("std");
|
||||
const Random = std.rand.Random;
|
||||
const Pcg = @This();
|
||||
|
||||
const default_multiplier = 6364136223846793005;
|
||||
|
||||
random: Random,
|
||||
|
||||
s: u64,
|
||||
i: u64,
|
||||
|
||||
pub fn init(init_s: u64) Pcg {
|
||||
var pcg = Pcg{
|
||||
.random = Random{ .fillFn = fill },
|
||||
.s = undefined,
|
||||
.i = undefined,
|
||||
};
|
||||
|
||||
pcg.seed(init_s);
|
||||
return pcg;
|
||||
}
|
||||
|
||||
fn next(self: *Pcg) u32 {
|
||||
const l = self.s;
|
||||
self.s = l *% default_multiplier +% (self.i | 1);
|
||||
|
||||
const xor_s = @truncate(u32, ((l >> 18) ^ l) >> 27);
|
||||
const rot = @intCast(u32, l >> 59);
|
||||
|
||||
return (xor_s >> @intCast(u5, rot)) | (xor_s << @intCast(u5, (0 -% rot) & 31));
|
||||
}
|
||||
|
||||
fn seed(self: *Pcg, init_s: u64) void {
|
||||
// Pcg requires 128-bits of seed.
|
||||
var gen = std.rand.SplitMix64.init(init_s);
|
||||
self.seedTwo(gen.next(), gen.next());
|
||||
}
|
||||
|
||||
fn seedTwo(self: *Pcg, init_s: u64, init_i: u64) void {
|
||||
self.s = 0;
|
||||
self.i = (init_s << 1) | 1;
|
||||
self.s = self.s *% default_multiplier +% self.i;
|
||||
self.s +%= init_i;
|
||||
self.s = self.s *% default_multiplier +% self.i;
|
||||
}
|
||||
|
||||
fn fill(r: *Random, buf: []u8) void {
|
||||
const self = @fieldParentPtr(Pcg, "random", r);
|
||||
|
||||
var i: usize = 0;
|
||||
const aligned_len = buf.len - (buf.len & 7);
|
||||
|
||||
// Complete 4 byte segments.
|
||||
while (i < aligned_len) : (i += 4) {
|
||||
var n = self.next();
|
||||
comptime var j: usize = 0;
|
||||
inline while (j < 4) : (j += 1) {
|
||||
buf[i + j] = @truncate(u8, n);
|
||||
n >>= 8;
|
||||
}
|
||||
}
|
||||
|
||||
// Remaining. (cuts the stream)
|
||||
if (i != buf.len) {
|
||||
var n = self.next();
|
||||
while (i < buf.len) : (i += 1) {
|
||||
buf[i] = @truncate(u8, n);
|
||||
n >>= 4;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
test "pcg sequence" {
|
||||
var r = Pcg.init(0);
|
||||
const s0: u64 = 0x9394bf54ce5d79de;
|
||||
const s1: u64 = 0x84e9c579ef59bbf7;
|
||||
r.seedTwo(s0, s1);
|
||||
|
||||
const seq = [_]u32{
|
||||
2881561918,
|
||||
3063928540,
|
||||
1199791034,
|
||||
2487695858,
|
||||
1479648952,
|
||||
3247963454,
|
||||
};
|
||||
|
||||
for (seq) |s| {
|
||||
std.testing.expect(s == r.next());
|
||||
}
|
||||
}
|
||||
108
lib/std/rand/Sfc64.zig
Normal file
108
lib/std/rand/Sfc64.zig
Normal file
@ -0,0 +1,108 @@
|
||||
// SPDX-License-Identifier: MIT
|
||||
// Copyright (c) 2015-2020 Zig Contributors
|
||||
// This file is part of [zig](https://ziglang.org/), which is MIT licensed.
|
||||
// The MIT license requires this copyright notice to be included in all copies
|
||||
// and substantial portions of the software.
|
||||
|
||||
//! Sfc64 pseudo-random number generator from Practically Random.
|
||||
//! Fastest engine of pracrand and smallest footprint.
|
||||
//! See http://pracrand.sourceforge.net/
|
||||
|
||||
const std = @import("std");
|
||||
const Random = std.rand.Random;
|
||||
const math = std.math;
|
||||
const Sfc64 = @This();
|
||||
|
||||
random: Random,
|
||||
|
||||
a: u64 = undefined,
|
||||
b: u64 = undefined,
|
||||
c: u64 = undefined,
|
||||
counter: u64 = undefined,
|
||||
|
||||
const Rotation = 24;
|
||||
const RightShift = 11;
|
||||
const LeftShift = 3;
|
||||
|
||||
pub fn init(init_s: u64) Sfc64 {
|
||||
var x = Sfc64{
|
||||
.random = Random{ .fillFn = fill },
|
||||
};
|
||||
|
||||
x.seed(init_s);
|
||||
return x;
|
||||
}
|
||||
|
||||
fn next(self: *Sfc64) u64 {
|
||||
const tmp = self.a +% self.b +% self.counter;
|
||||
self.counter += 1;
|
||||
self.a = self.b ^ (self.b >> RightShift);
|
||||
self.b = self.c +% (self.c << LeftShift);
|
||||
self.c = math.rotl(u64, self.c, Rotation) +% tmp;
|
||||
return tmp;
|
||||
}
|
||||
|
||||
fn seed(self: *Sfc64, init_s: u64) void {
|
||||
self.a = init_s;
|
||||
self.b = init_s;
|
||||
self.c = init_s;
|
||||
self.counter = 1;
|
||||
var i: u32 = 0;
|
||||
while (i < 12) : (i += 1) {
|
||||
_ = self.next();
|
||||
}
|
||||
}
|
||||
|
||||
fn fill(r: *Random, buf: []u8) void {
|
||||
const self = @fieldParentPtr(Sfc64, "random", r);
|
||||
|
||||
var i: usize = 0;
|
||||
const aligned_len = buf.len - (buf.len & 7);
|
||||
|
||||
// Complete 8 byte segments.
|
||||
while (i < aligned_len) : (i += 8) {
|
||||
var n = self.next();
|
||||
comptime var j: usize = 0;
|
||||
inline while (j < 8) : (j += 1) {
|
||||
buf[i + j] = @truncate(u8, n);
|
||||
n >>= 8;
|
||||
}
|
||||
}
|
||||
|
||||
// Remaining. (cuts the stream)
|
||||
if (i != buf.len) {
|
||||
var n = self.next();
|
||||
while (i < buf.len) : (i += 1) {
|
||||
buf[i] = @truncate(u8, n);
|
||||
n >>= 8;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
test "Sfc64 sequence" {
|
||||
// Unfortunately there does not seem to be an official test sequence.
|
||||
var r = Sfc64.init(0);
|
||||
|
||||
const seq = [_]u64{
|
||||
0x3acfa029e3cc6041,
|
||||
0xf5b6515bf2ee419c,
|
||||
0x1259635894a29b61,
|
||||
0xb6ae75395f8ebd6,
|
||||
0x225622285ce302e2,
|
||||
0x520d28611395cb21,
|
||||
0xdb909c818901599d,
|
||||
0x8ffd195365216f57,
|
||||
0xe8c4ad5e258ac04a,
|
||||
0x8f8ef2c89fdb63ca,
|
||||
0xf9865b01d98d8e2f,
|
||||
0x46555871a65d08ba,
|
||||
0x66868677c6298fcd,
|
||||
0x2ce15a7e6329f57d,
|
||||
0xb2f1833ca91ca79,
|
||||
0x4b0890ac9bf453ca,
|
||||
};
|
||||
|
||||
for (seq) |s| {
|
||||
std.testing.expectEqual(s, r.next());
|
||||
}
|
||||
}
|
||||
133
lib/std/rand/Xoroshiro128.zig
Normal file
133
lib/std/rand/Xoroshiro128.zig
Normal file
@ -0,0 +1,133 @@
|
||||
// SPDX-License-Identifier: MIT
|
||||
// Copyright (c) 2015-2020 Zig Contributors
|
||||
// This file is part of [zig](https://ziglang.org/), which is MIT licensed.
|
||||
// The MIT license requires this copyright notice to be included in all copies
|
||||
// and substantial portions of the software.
|
||||
|
||||
//! Xoroshiro128+ - http://xoroshiro.di.unimi.it/
|
||||
//!
|
||||
//! PRNG
|
||||
|
||||
const std = @import("std");
|
||||
const Random = std.rand.Random;
|
||||
const math = std.math;
|
||||
const Xoroshiro128 = @This();
|
||||
|
||||
random: Random,
|
||||
|
||||
s: [2]u64,
|
||||
|
||||
pub fn init(init_s: u64) Xoroshiro128 {
|
||||
var x = Xoroshiro128{
|
||||
.random = Random{ .fillFn = fill },
|
||||
.s = undefined,
|
||||
};
|
||||
|
||||
x.seed(init_s);
|
||||
return x;
|
||||
}
|
||||
|
||||
fn next(self: *Xoroshiro128) u64 {
|
||||
const s0 = self.s[0];
|
||||
var s1 = self.s[1];
|
||||
const r = s0 +% s1;
|
||||
|
||||
s1 ^= s0;
|
||||
self.s[0] = math.rotl(u64, s0, @as(u8, 55)) ^ s1 ^ (s1 << 14);
|
||||
self.s[1] = math.rotl(u64, s1, @as(u8, 36));
|
||||
|
||||
return r;
|
||||
}
|
||||
|
||||
// Skip 2^64 places ahead in the sequence
|
||||
fn jump(self: *Xoroshiro128) void {
|
||||
var s0: u64 = 0;
|
||||
var s1: u64 = 0;
|
||||
|
||||
const table = [_]u64{
|
||||
0xbeac0467eba5facb,
|
||||
0xd86b048b86aa9922,
|
||||
};
|
||||
|
||||
inline for (table) |entry| {
|
||||
var b: usize = 0;
|
||||
while (b < 64) : (b += 1) {
|
||||
if ((entry & (@as(u64, 1) << @intCast(u6, b))) != 0) {
|
||||
s0 ^= self.s[0];
|
||||
s1 ^= self.s[1];
|
||||
}
|
||||
_ = self.next();
|
||||
}
|
||||
}
|
||||
|
||||
self.s[0] = s0;
|
||||
self.s[1] = s1;
|
||||
}
|
||||
|
||||
pub fn seed(self: *Xoroshiro128, init_s: u64) void {
|
||||
// Xoroshiro requires 128-bits of seed.
|
||||
var gen = std.rand.SplitMix64.init(init_s);
|
||||
|
||||
self.s[0] = gen.next();
|
||||
self.s[1] = gen.next();
|
||||
}
|
||||
|
||||
fn fill(r: *Random, buf: []u8) void {
|
||||
const self = @fieldParentPtr(Xoroshiro128, "random", r);
|
||||
|
||||
var i: usize = 0;
|
||||
const aligned_len = buf.len - (buf.len & 7);
|
||||
|
||||
// Complete 8 byte segments.
|
||||
while (i < aligned_len) : (i += 8) {
|
||||
var n = self.next();
|
||||
comptime var j: usize = 0;
|
||||
inline while (j < 8) : (j += 1) {
|
||||
buf[i + j] = @truncate(u8, n);
|
||||
n >>= 8;
|
||||
}
|
||||
}
|
||||
|
||||
// Remaining. (cuts the stream)
|
||||
if (i != buf.len) {
|
||||
var n = self.next();
|
||||
while (i < buf.len) : (i += 1) {
|
||||
buf[i] = @truncate(u8, n);
|
||||
n >>= 8;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
test "xoroshiro sequence" {
|
||||
var r = Xoroshiro128.init(0);
|
||||
r.s[0] = 0xaeecf86f7878dd75;
|
||||
r.s[1] = 0x01cd153642e72622;
|
||||
|
||||
const seq1 = [_]u64{
|
||||
0xb0ba0da5bb600397,
|
||||
0x18a08afde614dccc,
|
||||
0xa2635b956a31b929,
|
||||
0xabe633c971efa045,
|
||||
0x9ac19f9706ca3cac,
|
||||
0xf62b426578c1e3fb,
|
||||
};
|
||||
|
||||
for (seq1) |s| {
|
||||
std.testing.expect(s == r.next());
|
||||
}
|
||||
|
||||
r.jump();
|
||||
|
||||
const seq2 = [_]u64{
|
||||
0x95344a13556d3e22,
|
||||
0xb4fb32dafa4d00df,
|
||||
0xb2011d9ccdcfe2dd,
|
||||
0x05679a9b2119b908,
|
||||
0xa860a1da7c9cd8a0,
|
||||
0x658a96efe3f86550,
|
||||
};
|
||||
|
||||
for (seq2) |s| {
|
||||
std.testing.expect(s == r.next());
|
||||
}
|
||||
}
|
||||
@ -10,6 +10,7 @@ const std = @import("std.zig");
|
||||
const builtin = std.builtin;
|
||||
const assert = std.debug.assert;
|
||||
const uefi = std.os.uefi;
|
||||
const tlcsprng = @import("crypto/tlcsprng.zig");
|
||||
|
||||
var argc_argv_ptr: [*]usize = undefined;
|
||||
|
||||
@ -215,6 +216,28 @@ fn posixCallMainAndExit() noreturn {
|
||||
std.os.linux.tls.initStaticTLS();
|
||||
}
|
||||
|
||||
{
|
||||
// Initialize the per-thread CSPRNG since Linux gave us the handy-dandy
|
||||
// AT_RANDOM. This depends on the TLS initialization above.
|
||||
var i: usize = 0;
|
||||
while (auxv[i].a_type != std.elf.AT_NULL) : (i += 1) {
|
||||
switch (auxv[i].a_type) {
|
||||
std.elf.AT_RANDOM => {
|
||||
// "The address of sixteen bytes containing a random value."
|
||||
const addr = auxv[i].a_un.a_val;
|
||||
if (addr == 0) break;
|
||||
const ptr = @intToPtr(*const [16]u8, addr);
|
||||
var seed: [32]u8 = undefined;
|
||||
seed[0..16].* = ptr.*;
|
||||
seed[16..].* = ptr.*;
|
||||
tlcsprng.init(seed);
|
||||
break;
|
||||
},
|
||||
else => continue,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// TODO This is disabled because what should we do when linking libc and this code
|
||||
// does not execute? And also it's causing a test failure in stack traces in release modes.
|
||||
|
||||
@ -250,6 +273,9 @@ fn callMainWithArgs(argc: usize, argv: [*][*:0]u8, envp: [][*:0]u8) u8 {
|
||||
}
|
||||
|
||||
fn main(c_argc: i32, c_argv: [*][*:0]u8, c_envp: [*:null]?[*:0]u8) callconv(.C) i32 {
|
||||
// We do not attempt to initialize tlcsprng from AT_RANDOM here because
|
||||
// libc owns the start code, not us, and therefore libc ows the random bytes
|
||||
// from AT_RANDOM.
|
||||
var env_count: usize = 0;
|
||||
while (c_envp[env_count] != null) : (env_count += 1) {}
|
||||
const envp = @ptrCast([*][*:0]u8, c_envp)[0..env_count];
|
||||
|
||||
@ -303,8 +303,7 @@ fn getCwdOrWasiPreopen() std.fs.Dir {
|
||||
|
||||
pub fn tmpDir(opts: std.fs.Dir.OpenDirOptions) TmpDir {
|
||||
var random_bytes: [TmpDir.random_bytes_count]u8 = undefined;
|
||||
std.crypto.randomBytes(&random_bytes) catch
|
||||
@panic("unable to make tmp dir for testing: unable to get random bytes");
|
||||
std.crypto.random.bytes(&random_bytes);
|
||||
var sub_path: [TmpDir.sub_path_len]u8 = undefined;
|
||||
std.fs.base64_encoder.encode(&sub_path, &random_bytes);
|
||||
|
||||
|
||||
@ -74,7 +74,6 @@ zig_lib_directory: Directory,
|
||||
local_cache_directory: Directory,
|
||||
global_cache_directory: Directory,
|
||||
libc_include_dir_list: []const []const u8,
|
||||
rand: *std.rand.Random,
|
||||
|
||||
/// Populated when we build the libc++ static library. A Job to build this is placed in the queue
|
||||
/// and resolved before calling linker.flush().
|
||||
@ -331,7 +330,6 @@ pub const InitOptions = struct {
|
||||
root_name: []const u8,
|
||||
root_pkg: ?*Package,
|
||||
output_mode: std.builtin.OutputMode,
|
||||
rand: *std.rand.Random,
|
||||
dynamic_linker: ?[]const u8 = null,
|
||||
/// `null` means to not emit a binary file.
|
||||
emit_bin: ?EmitLoc,
|
||||
@ -981,7 +979,6 @@ pub fn create(gpa: *Allocator, options: InitOptions) !*Compilation {
|
||||
.self_exe_path = options.self_exe_path,
|
||||
.libc_include_dir_list = libc_dirs.libc_include_dir_list,
|
||||
.sanitize_c = sanitize_c,
|
||||
.rand = options.rand,
|
||||
.clang_passthrough_mode = options.clang_passthrough_mode,
|
||||
.clang_preprocessor_mode = options.clang_preprocessor_mode,
|
||||
.verbose_cc = options.verbose_cc,
|
||||
@ -1909,7 +1906,7 @@ fn updateCObject(comp: *Compilation, c_object: *CObject, c_comp_progress_node: *
|
||||
|
||||
pub fn tmpFilePath(comp: *Compilation, arena: *Allocator, suffix: []const u8) error{OutOfMemory}![]const u8 {
|
||||
const s = std.fs.path.sep_str;
|
||||
const rand_int = comp.rand.int(u64);
|
||||
const rand_int = std.crypto.random.int(u64);
|
||||
if (comp.local_cache_directory.path) |p| {
|
||||
return std.fmt.allocPrint(arena, "{}" ++ s ++ "tmp" ++ s ++ "{x}-{s}", .{ p, rand_int, suffix });
|
||||
} else {
|
||||
@ -2778,7 +2775,6 @@ fn buildOutputFromZig(
|
||||
.root_name = root_name,
|
||||
.root_pkg = &root_pkg,
|
||||
.output_mode = fixed_output_mode,
|
||||
.rand = comp.rand,
|
||||
.libc_installation = comp.bin_file.options.libc_installation,
|
||||
.emit_bin = emit_bin,
|
||||
.optimize_mode = optimize_mode,
|
||||
@ -3152,7 +3148,6 @@ pub fn build_crt_file(
|
||||
.root_name = root_name,
|
||||
.root_pkg = null,
|
||||
.output_mode = output_mode,
|
||||
.rand = comp.rand,
|
||||
.libc_installation = comp.bin_file.options.libc_installation,
|
||||
.emit_bin = emit_bin,
|
||||
.optimize_mode = comp.bin_file.options.optimize_mode,
|
||||
|
||||
@ -936,7 +936,6 @@ fn buildSharedLib(
|
||||
.root_pkg = null,
|
||||
.output_mode = .Lib,
|
||||
.link_mode = .Dynamic,
|
||||
.rand = comp.rand,
|
||||
.libc_installation = comp.bin_file.options.libc_installation,
|
||||
.emit_bin = emit_bin,
|
||||
.optimize_mode = comp.bin_file.options.optimize_mode,
|
||||
|
||||
@ -162,7 +162,6 @@ pub fn buildLibCXX(comp: *Compilation) !void {
|
||||
.root_name = root_name,
|
||||
.root_pkg = null,
|
||||
.output_mode = output_mode,
|
||||
.rand = comp.rand,
|
||||
.libc_installation = comp.bin_file.options.libc_installation,
|
||||
.emit_bin = emit_bin,
|
||||
.optimize_mode = comp.bin_file.options.optimize_mode,
|
||||
@ -281,7 +280,6 @@ pub fn buildLibCXXABI(comp: *Compilation) !void {
|
||||
.root_name = root_name,
|
||||
.root_pkg = null,
|
||||
.output_mode = output_mode,
|
||||
.rand = comp.rand,
|
||||
.libc_installation = comp.bin_file.options.libc_installation,
|
||||
.emit_bin = emit_bin,
|
||||
.optimize_mode = comp.bin_file.options.optimize_mode,
|
||||
|
||||
@ -95,7 +95,6 @@ pub fn buildStaticLib(comp: *Compilation) !void {
|
||||
.root_name = root_name,
|
||||
.root_pkg = null,
|
||||
.output_mode = output_mode,
|
||||
.rand = comp.rand,
|
||||
.libc_installation = comp.bin_file.options.libc_installation,
|
||||
.emit_bin = emit_bin,
|
||||
.optimize_mode = comp.bin_file.options.optimize_mode,
|
||||
|
||||
15
src/main.zig
15
src/main.zig
@ -1632,13 +1632,6 @@ fn buildOutputType(
|
||||
};
|
||||
defer zig_lib_directory.handle.close();
|
||||
|
||||
const random_seed = blk: {
|
||||
var random_seed: u64 = undefined;
|
||||
try std.crypto.randomBytes(mem.asBytes(&random_seed));
|
||||
break :blk random_seed;
|
||||
};
|
||||
var default_prng = std.rand.DefaultPrng.init(random_seed);
|
||||
|
||||
var libc_installation: ?LibCInstallation = null;
|
||||
defer if (libc_installation) |*l| l.deinit(gpa);
|
||||
|
||||
@ -1754,7 +1747,6 @@ fn buildOutputType(
|
||||
.single_threaded = single_threaded,
|
||||
.function_sections = function_sections,
|
||||
.self_exe_path = self_exe_path,
|
||||
.rand = &default_prng.random,
|
||||
.clang_passthrough_mode = arg_mode != .build,
|
||||
.clang_preprocessor_mode = clang_preprocessor_mode,
|
||||
.version = optional_version,
|
||||
@ -2420,12 +2412,6 @@ pub fn cmdBuild(gpa: *Allocator, arena: *Allocator, args: []const []const u8) !v
|
||||
.directory = null, // Use the local zig-cache.
|
||||
.basename = exe_basename,
|
||||
};
|
||||
const random_seed = blk: {
|
||||
var random_seed: u64 = undefined;
|
||||
try std.crypto.randomBytes(mem.asBytes(&random_seed));
|
||||
break :blk random_seed;
|
||||
};
|
||||
var default_prng = std.rand.DefaultPrng.init(random_seed);
|
||||
const comp = Compilation.create(gpa, .{
|
||||
.zig_lib_directory = zig_lib_directory,
|
||||
.local_cache_directory = local_cache_directory,
|
||||
@ -2441,7 +2427,6 @@ pub fn cmdBuild(gpa: *Allocator, arena: *Allocator, args: []const []const u8) !v
|
||||
.emit_h = null,
|
||||
.optimize_mode = .Debug,
|
||||
.self_exe_path = self_exe_path,
|
||||
.rand = &default_prng.random,
|
||||
}) catch |err| {
|
||||
fatal("unable to create compilation: {}", .{@errorName(err)});
|
||||
};
|
||||
|
||||
@ -200,7 +200,6 @@ pub fn buildCRTFile(comp: *Compilation, crt_file: CRTFile) !void {
|
||||
.root_pkg = null,
|
||||
.output_mode = .Lib,
|
||||
.link_mode = .Dynamic,
|
||||
.rand = comp.rand,
|
||||
.libc_installation = comp.bin_file.options.libc_installation,
|
||||
.emit_bin = Compilation.EmitLoc{ .directory = null, .basename = "libc.so" },
|
||||
.optimize_mode = comp.bin_file.options.optimize_mode,
|
||||
|
||||
11
src/test.zig
11
src/test.zig
@ -467,13 +467,6 @@ pub const TestContext = struct {
|
||||
defer zig_lib_directory.handle.close();
|
||||
defer std.testing.allocator.free(zig_lib_directory.path.?);
|
||||
|
||||
const random_seed = blk: {
|
||||
var random_seed: u64 = undefined;
|
||||
try std.crypto.randomBytes(std.mem.asBytes(&random_seed));
|
||||
break :blk random_seed;
|
||||
};
|
||||
var default_prng = std.rand.DefaultPrng.init(random_seed);
|
||||
|
||||
for (self.cases.items) |case| {
|
||||
if (build_options.skip_non_native and case.target.getCpuArch() != std.Target.current.cpu.arch)
|
||||
continue;
|
||||
@ -487,7 +480,7 @@ pub const TestContext = struct {
|
||||
progress.initial_delay_ns = 0;
|
||||
progress.refresh_rate_ns = 0;
|
||||
|
||||
try self.runOneCase(std.testing.allocator, &prg_node, case, zig_lib_directory, &default_prng.random);
|
||||
try self.runOneCase(std.testing.allocator, &prg_node, case, zig_lib_directory);
|
||||
}
|
||||
}
|
||||
|
||||
@ -497,7 +490,6 @@ pub const TestContext = struct {
|
||||
root_node: *std.Progress.Node,
|
||||
case: Case,
|
||||
zig_lib_directory: Compilation.Directory,
|
||||
rand: *std.rand.Random,
|
||||
) !void {
|
||||
const target_info = try std.zig.system.NativeTargetInfo.detect(allocator, case.target);
|
||||
const target = target_info.target;
|
||||
@ -547,7 +539,6 @@ pub const TestContext = struct {
|
||||
.local_cache_directory = zig_cache_directory,
|
||||
.global_cache_directory = zig_cache_directory,
|
||||
.zig_lib_directory = zig_lib_directory,
|
||||
.rand = rand,
|
||||
.root_name = "test_case",
|
||||
.target = target,
|
||||
// TODO: support tests for object file building, and library builds
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user