1 |
1325 |
phoenix |
/*
|
2 |
|
|
* Copyright (c) 1983 Regents of the University of California.
|
3 |
|
|
* All rights reserved.
|
4 |
|
|
*
|
5 |
|
|
* Redistribution and use in source and binary forms are permitted
|
6 |
|
|
* provided that the above copyright notice and this paragraph are
|
7 |
|
|
* duplicated in all such forms and that any documentation,
|
8 |
|
|
* advertising materials, and other materials related to such
|
9 |
|
|
* distribution and use acknowledge that the software was developed
|
10 |
|
|
* by the University of California, Berkeley. The name of the
|
11 |
|
|
* University may not be used to endorse or promote products derived
|
12 |
|
|
* from this software without specific prior written permission.
|
13 |
|
|
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
|
14 |
|
|
* IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
|
15 |
|
|
* WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
|
16 |
|
|
*/
|
17 |
|
|
|
18 |
|
|
/*
|
19 |
|
|
* This is derived from the Berkeley source:
|
20 |
|
|
* @(#)random.c 5.5 (Berkeley) 7/6/88
|
21 |
|
|
* It was reworked for the GNU C Library by Roland McGrath.
|
22 |
|
|
* Rewritten to use reentrant functions by Ulrich Drepper, 1995.
|
23 |
|
|
*/
|
24 |
|
|
|
25 |
|
|
#define _GNU_SOURCE
|
26 |
|
|
#include <features.h>
|
27 |
|
|
#include <limits.h>
|
28 |
|
|
#include <stddef.h>
|
29 |
|
|
#include <stdlib.h>
|
30 |
|
|
#ifdef __UCLIBC_HAS_THREADS__
|
31 |
|
|
#include <pthread.h>
|
32 |
|
|
/* POSIX.1c requires that there is mutual exclusion for the `rand' and
|
33 |
|
|
`srand' functions to prevent concurrent calls from modifying common
|
34 |
|
|
data. */
|
35 |
|
|
static pthread_mutex_t lock = PTHREAD_RECURSIVE_MUTEX_INITIALIZER_NP;
|
36 |
|
|
#else
|
37 |
|
|
#define __pthread_mutex_lock(x)
|
38 |
|
|
#define __pthread_mutex_unlock(x)
|
39 |
|
|
#endif
|
40 |
|
|
|
41 |
|
|
/* An improved random number generation package. In addition to the standard
|
42 |
|
|
rand()/srand() like interface, this package also has a special state info
|
43 |
|
|
interface. The initstate() routine is called with a seed, an array of
|
44 |
|
|
bytes, and a count of how many bytes are being passed in; this array is
|
45 |
|
|
then initialized to contain information for random number generation with
|
46 |
|
|
that much state information. Good sizes for the amount of state
|
47 |
|
|
information are 32, 64, 128, and 256 bytes. The state can be switched by
|
48 |
|
|
calling the setstate() function with the same array as was initialized
|
49 |
|
|
with initstate(). By default, the package runs with 128 bytes of state
|
50 |
|
|
information and generates far better random numbers than a linear
|
51 |
|
|
congruential generator. If the amount of state information is less than
|
52 |
|
|
32 bytes, a simple linear congruential R.N.G. is used. Internally, the
|
53 |
|
|
state information is treated as an array of longs; the zeroth element of
|
54 |
|
|
the array is the type of R.N.G. being used (small integer); the remainder
|
55 |
|
|
of the array is the state information for the R.N.G. Thus, 32 bytes of
|
56 |
|
|
state information will give 7 longs worth of state information, which will
|
57 |
|
|
allow a degree seven polynomial. (Note: The zeroth word of state
|
58 |
|
|
information also has some other information stored in it; see setstate
|
59 |
|
|
for details). The random number generation technique is a linear feedback
|
60 |
|
|
shift register approach, employing trinomials (since there are fewer terms
|
61 |
|
|
to sum up that way). In this approach, the least significant bit of all
|
62 |
|
|
the numbers in the state table will act as a linear feedback shift register,
|
63 |
|
|
and will have period 2^deg - 1 (where deg is the degree of the polynomial
|
64 |
|
|
being used, assuming that the polynomial is irreducible and primitive).
|
65 |
|
|
The higher order bits will have longer periods, since their values are
|
66 |
|
|
also influenced by pseudo-random carries out of the lower bits. The
|
67 |
|
|
total period of the generator is approximately deg*(2**deg - 1); thus
|
68 |
|
|
doubling the amount of state information has a vast influence on the
|
69 |
|
|
period of the generator. Note: The deg*(2**deg - 1) is an approximation
|
70 |
|
|
only good for large deg, when the period of the shift register is the
|
71 |
|
|
dominant factor. With deg equal to seven, the period is actually much
|
72 |
|
|
longer than the 7*(2**7 - 1) predicted by this formula. */
|
73 |
|
|
|
74 |
|
|
|
75 |
|
|
|
76 |
|
|
/* For each of the currently supported random number generators, we have a
|
77 |
|
|
break value on the amount of state information (you need at least this many
|
78 |
|
|
bytes of state info to support this random number generator), a degree for
|
79 |
|
|
the polynomial (actually a trinomial) that the R.N.G. is based on, and
|
80 |
|
|
separation between the two lower order coefficients of the trinomial. */
|
81 |
|
|
|
82 |
|
|
/* Linear congruential. */
|
83 |
|
|
#define TYPE_0 0
|
84 |
|
|
#define BREAK_0 8
|
85 |
|
|
#define DEG_0 0
|
86 |
|
|
#define SEP_0 0
|
87 |
|
|
|
88 |
|
|
/* x**7 + x**3 + 1. */
|
89 |
|
|
#define TYPE_1 1
|
90 |
|
|
#define BREAK_1 32
|
91 |
|
|
#define DEG_1 7
|
92 |
|
|
#define SEP_1 3
|
93 |
|
|
|
94 |
|
|
/* x**15 + x + 1. */
|
95 |
|
|
#define TYPE_2 2
|
96 |
|
|
#define BREAK_2 64
|
97 |
|
|
#define DEG_2 15
|
98 |
|
|
#define SEP_2 1
|
99 |
|
|
|
100 |
|
|
/* x**31 + x**3 + 1. */
|
101 |
|
|
#define TYPE_3 3
|
102 |
|
|
#define BREAK_3 128
|
103 |
|
|
#define DEG_3 31
|
104 |
|
|
#define SEP_3 3
|
105 |
|
|
|
106 |
|
|
/* x**63 + x + 1. */
|
107 |
|
|
#define TYPE_4 4
|
108 |
|
|
#define BREAK_4 256
|
109 |
|
|
#define DEG_4 63
|
110 |
|
|
#define SEP_4 1
|
111 |
|
|
|
112 |
|
|
|
113 |
|
|
/* Array versions of the above information to make code run faster.
|
114 |
|
|
Relies on fact that TYPE_i == i. */
|
115 |
|
|
|
116 |
|
|
#define MAX_TYPES 5 /* Max number of types above. */
|
117 |
|
|
|
118 |
|
|
|
119 |
|
|
/* Initially, everything is set up as if from:
|
120 |
|
|
initstate(1, randtbl, 128);
|
121 |
|
|
Note that this initialization takes advantage of the fact that srandom
|
122 |
|
|
advances the front and rear pointers 10*rand_deg times, and hence the
|
123 |
|
|
rear pointer which starts at 0 will also end up at zero; thus the zeroth
|
124 |
|
|
element of the state information, which contains info about the current
|
125 |
|
|
position of the rear pointer is just
|
126 |
|
|
(MAX_TYPES * (rptr - state)) + TYPE_3 == TYPE_3. */
|
127 |
|
|
|
128 |
|
|
static int32_t randtbl[DEG_3 + 1] =
|
129 |
|
|
{
|
130 |
|
|
TYPE_3,
|
131 |
|
|
|
132 |
|
|
-1726662223, 379960547, 1735697613, 1040273694, 1313901226,
|
133 |
|
|
1627687941, -179304937, -2073333483, 1780058412, -1989503057,
|
134 |
|
|
-615974602, 344556628, 939512070, -1249116260, 1507946756,
|
135 |
|
|
-812545463, 154635395, 1388815473, -1926676823, 525320961,
|
136 |
|
|
-1009028674, 968117788, -123449607, 1284210865, 435012392,
|
137 |
|
|
-2017506339, -911064859, -370259173, 1132637927, 1398500161,
|
138 |
|
|
-205601318,
|
139 |
|
|
};
|
140 |
|
|
|
141 |
|
|
|
142 |
|
|
static struct random_data unsafe_state =
|
143 |
|
|
{
|
144 |
|
|
/* FPTR and RPTR are two pointers into the state info, a front and a rear
|
145 |
|
|
pointer. These two pointers are always rand_sep places aparts, as they
|
146 |
|
|
cycle through the state information. (Yes, this does mean we could get
|
147 |
|
|
away with just one pointer, but the code for random is more efficient
|
148 |
|
|
this way). The pointers are left positioned as they would be from the call:
|
149 |
|
|
initstate(1, randtbl, 128);
|
150 |
|
|
(The position of the rear pointer, rptr, is really 0 (as explained above
|
151 |
|
|
in the initialization of randtbl) because the state table pointer is set
|
152 |
|
|
to point to randtbl[1] (as explained below).) */
|
153 |
|
|
|
154 |
|
|
fptr : &randtbl[SEP_3 + 1],
|
155 |
|
|
rptr : &randtbl[1],
|
156 |
|
|
|
157 |
|
|
/* The following things are the pointer to the state information table,
|
158 |
|
|
the type of the current generator, the degree of the current polynomial
|
159 |
|
|
being used, and the separation between the two pointers.
|
160 |
|
|
Note that for efficiency of random, we remember the first location of
|
161 |
|
|
the state information, not the zeroth. Hence it is valid to access
|
162 |
|
|
state[-1], which is used to store the type of the R.N.G.
|
163 |
|
|
Also, we remember the last location, since this is more efficient than
|
164 |
|
|
indexing every time to find the address of the last element to see if
|
165 |
|
|
the front and rear pointers have wrapped. */
|
166 |
|
|
|
167 |
|
|
state : &randtbl[1],
|
168 |
|
|
|
169 |
|
|
rand_type : TYPE_3,
|
170 |
|
|
rand_deg : DEG_3,
|
171 |
|
|
rand_sep : SEP_3,
|
172 |
|
|
|
173 |
|
|
end_ptr : &randtbl[sizeof (randtbl) / sizeof (randtbl[0])]
|
174 |
|
|
};
|
175 |
|
|
|
176 |
|
|
|
177 |
|
|
/* Initialize the random number generator based on the given seed. If the
|
178 |
|
|
type is the trivial no-state-information type, just remember the seed.
|
179 |
|
|
Otherwise, initializes state[] based on the given "seed" via a linear
|
180 |
|
|
congruential generator. Then, the pointers are set to known locations
|
181 |
|
|
that are exactly rand_sep places apart. Lastly, it cycles the state
|
182 |
|
|
information a given number of times to get rid of any initial dependencies
|
183 |
|
|
introduced by the L.C.R.N.G. Note that the initialization of randtbl[]
|
184 |
|
|
for default usage relies on values produced by this routine. */
|
185 |
|
|
void srandom (unsigned int x)
|
186 |
|
|
{
|
187 |
|
|
__pthread_mutex_lock(&lock);
|
188 |
|
|
srandom_r (x, &unsafe_state);
|
189 |
|
|
__pthread_mutex_unlock(&lock);
|
190 |
|
|
}
|
191 |
|
|
weak_alias (srandom, srand)
|
192 |
|
|
|
193 |
|
|
/* Initialize the state information in the given array of N bytes for
|
194 |
|
|
future random number generation. Based on the number of bytes we
|
195 |
|
|
are given, and the break values for the different R.N.G.'s, we choose
|
196 |
|
|
the best (largest) one we can and set things up for it. srandom is
|
197 |
|
|
then called to initialize the state information. Note that on return
|
198 |
|
|
from srandom, we set state[-1] to be the type multiplexed with the current
|
199 |
|
|
value of the rear pointer; this is so successive calls to initstate won't
|
200 |
|
|
lose this information and will be able to restart with setstate.
|
201 |
|
|
Note: The first thing we do is save the current state, if any, just like
|
202 |
|
|
setstate so that it doesn't matter when initstate is called.
|
203 |
|
|
Returns a pointer to the old state. */
|
204 |
|
|
char * initstate (unsigned int seed, char *arg_state, size_t n)
|
205 |
|
|
{
|
206 |
|
|
int32_t *ostate;
|
207 |
|
|
|
208 |
|
|
__pthread_mutex_lock(&lock);
|
209 |
|
|
ostate = &unsafe_state.state[-1];
|
210 |
|
|
initstate_r (seed, arg_state, n, &unsafe_state);
|
211 |
|
|
__pthread_mutex_unlock(&lock);
|
212 |
|
|
return (char *) ostate;
|
213 |
|
|
}
|
214 |
|
|
|
215 |
|
|
/* Restore the state from the given state array.
|
216 |
|
|
Note: It is important that we also remember the locations of the pointers
|
217 |
|
|
in the current state information, and restore the locations of the pointers
|
218 |
|
|
from the old state information. This is done by multiplexing the pointer
|
219 |
|
|
location into the zeroth word of the state information. Note that due
|
220 |
|
|
to the order in which things are done, it is OK to call setstate with the
|
221 |
|
|
same state as the current state
|
222 |
|
|
Returns a pointer to the old state information. */
|
223 |
|
|
char * setstate (char *arg_state)
|
224 |
|
|
{
|
225 |
|
|
int32_t *ostate;
|
226 |
|
|
|
227 |
|
|
__pthread_mutex_lock(&lock);
|
228 |
|
|
ostate = &unsafe_state.state[-1];
|
229 |
|
|
if (setstate_r (arg_state, &unsafe_state) < 0)
|
230 |
|
|
ostate = NULL;
|
231 |
|
|
__pthread_mutex_unlock(&lock);
|
232 |
|
|
return (char *) ostate;
|
233 |
|
|
}
|
234 |
|
|
|
235 |
|
|
/* If we are using the trivial TYPE_0 R.N.G., just do the old linear
|
236 |
|
|
congruential bit. Otherwise, we do our fancy trinomial stuff, which is the
|
237 |
|
|
same in all the other cases due to all the global variables that have been
|
238 |
|
|
set up. The basic operation is to add the number at the rear pointer into
|
239 |
|
|
the one at the front pointer. Then both pointers are advanced to the next
|
240 |
|
|
location cyclically in the table. The value returned is the sum generated,
|
241 |
|
|
reduced to 31 bits by throwing away the "least random" low bit.
|
242 |
|
|
Note: The code takes advantage of the fact that both the front and
|
243 |
|
|
rear pointers can't wrap on the same call by not testing the rear
|
244 |
|
|
pointer if the front one has wrapped. Returns a 31-bit random number. */
|
245 |
|
|
|
246 |
|
|
long int random ()
|
247 |
|
|
{
|
248 |
|
|
int32_t retval;
|
249 |
|
|
|
250 |
|
|
__pthread_mutex_lock(&lock);
|
251 |
|
|
random_r (&unsafe_state, &retval);
|
252 |
|
|
__pthread_mutex_unlock(&lock);
|
253 |
|
|
return retval;
|
254 |
|
|
}
|
255 |
|
|
|