On Mon, 3 Jul 2023, James Almer wrote:

On 7/2/2023 4:30 PM, Marton Balint wrote:
 It should be OK to use av_get_random_seed() to generate the key instead of
 using openSSL/Gcrypt functions. This removes the hard dependancy of those
 libs
 for key generation functionality.

 Fixes ticket #10441.

 Signed-off-by: Marton Balint <c...@passwd.hu>
 ---
   libavformat/hlsenc.c | 18 ++++++++----------
   1 file changed, 8 insertions(+), 10 deletions(-)

 diff --git a/libavformat/hlsenc.c b/libavformat/hlsenc.c
 index 1e0848ce3d..0b22c71186 100644
 --- a/libavformat/hlsenc.c
 +++ b/libavformat/hlsenc.c
 @@ -40,6 +40,7 @@
   #include "libavutil/intreadwrite.h"
   #include "libavutil/opt.h"
   #include "libavutil/log.h"
 +#include "libavutil/random_seed.h"
   #include "libavutil/time.h"
   #include "libavutil/time_internal.h"

 @@ -710,18 +711,18 @@ fail:
       return ret;
   }

 -static int randomize(uint8_t *buf, int len)
 +static void randomize(uint8_t *buf, int len)
   {
   #if CONFIG_GCRYPT
       gcry_randomize(buf, len, GCRY_VERY_STRONG_RANDOM);
 -    return 0;
 +    return;
   #elif CONFIG_OPENSSL
       if (RAND_bytes(buf, len))
 -        return 0;
 -#else
 -    return AVERROR(ENOSYS);
 +        return;
   #endif
 -    return AVERROR(EINVAL);
 +    av_assert0(len % 4 == 0);
 +    for (int i = 0; i < len; i += 4)
 +        AV_WB32(buf + i, av_get_random_seed());

Maybe instead use a PRNG, like the following:

AVLFG c;
av_lfg_init(&c, av_get_random_seed());
for (int i = 0; i < len; i += 4)
   AV_WB32(buf + i, av_lfg_get(&c));

If randomize() were to be used for arbitrary lengths, I'd agree, but here it is only used for key generation (only 128-bit keys in the current code), so I think av_get_random_seed() for the whole keysize is fine, and more secure.

Regards,
Marton
_______________________________________________
ffmpeg-devel mailing list
ffmpeg-devel@ffmpeg.org
https://ffmpeg.org/mailman/listinfo/ffmpeg-devel

To unsubscribe, visit link above, or email
ffmpeg-devel-requ...@ffmpeg.org with subject "unsubscribe".

Reply via email to