2015-01-22 03:40:55 +00:00
|
|
|
/*
|
2017-07-18 13:39:21 +00:00
|
|
|
* Copyright 2001-2017 The OpenSSL Project Authors. All Rights Reserved.
|
2001-01-08 10:59:26 +00:00
|
|
|
*
|
2016-05-17 18:52:22 +00:00
|
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
2001-01-08 10:59:26 +00:00
|
|
|
*/
|
|
|
|
|
2017-06-22 13:21:43 +00:00
|
|
|
#include "e_os.h"
|
2001-01-08 10:59:26 +00:00
|
|
|
|
2001-02-20 08:13:47 +00:00
|
|
|
#if defined(OPENSSL_SYS_VMS)
|
2017-06-22 13:21:43 +00:00
|
|
|
# include <openssl/rand.h>
|
|
|
|
# include "rand_lcl.h"
|
2015-01-22 03:40:55 +00:00
|
|
|
# include <descrip.h>
|
|
|
|
# include <jpidef.h>
|
|
|
|
# include <ssdef.h>
|
|
|
|
# include <starlet.h>
|
2016-08-03 19:45:06 +00:00
|
|
|
# include <efndef>
|
2015-01-22 03:40:55 +00:00
|
|
|
# ifdef __DECC
|
|
|
|
# pragma message disable DOLLARID
|
|
|
|
# endif
|
2001-01-08 10:59:26 +00:00
|
|
|
|
2017-07-18 13:39:21 +00:00
|
|
|
# ifndef OPENSSL_RAND_SEED_OS
|
|
|
|
# error "Unsupported seeding method configured; must be os"
|
|
|
|
# endif
|
|
|
|
|
2015-01-22 03:40:55 +00:00
|
|
|
/*
|
|
|
|
* Use 32-bit pointers almost everywhere. Define the type to which to cast a
|
|
|
|
* pointer passed to an external function.
|
2011-03-19 10:58:14 +00:00
|
|
|
*/
|
2015-01-22 03:40:55 +00:00
|
|
|
# if __INITIAL_POINTER_SIZE == 64
|
|
|
|
# define PTR_T __void_ptr64
|
|
|
|
# pragma pointer_size save
|
|
|
|
# pragma pointer_size 32
|
2017-06-22 13:21:43 +00:00
|
|
|
# else
|
2015-01-22 03:40:55 +00:00
|
|
|
# define PTR_T void *
|
2017-06-22 13:21:43 +00:00
|
|
|
# endif
|
2015-01-22 03:40:55 +00:00
|
|
|
|
|
|
|
static struct items_data_st {
|
2016-08-03 19:45:06 +00:00
|
|
|
short length, code; /* length is number of bytes */
|
2015-01-22 03:40:55 +00:00
|
|
|
} items_data[] = {
|
2016-08-03 19:45:06 +00:00
|
|
|
{4, JPI$_BUFIO},
|
|
|
|
{4, JPI$_CPUTIM},
|
|
|
|
{4, JPI$_DIRIO},
|
|
|
|
{4, JPI$_IMAGECOUNT},
|
|
|
|
{8, JPI$_LAST_LOGIN_I},
|
|
|
|
{8, JPI$_LOGINTIM},
|
|
|
|
{4, JPI$_PAGEFLTS},
|
|
|
|
{4, JPI$_PID},
|
|
|
|
{4, JPI$_PPGCNT},
|
|
|
|
{4, JPI$_WSPEAK},
|
|
|
|
{4, JPI$_FINALEXC},
|
2017-06-22 13:21:43 +00:00
|
|
|
{0, 0}
|
2015-01-22 03:40:55 +00:00
|
|
|
};
|
2011-03-19 10:58:14 +00:00
|
|
|
|
2017-08-31 21:16:22 +00:00
|
|
|
size_t RAND_POOL_acquire_entropy(RAND_POOL *pool)
|
2015-01-22 03:40:55 +00:00
|
|
|
{
|
2016-08-03 19:45:06 +00:00
|
|
|
/* determine the number of items in the JPI array */
|
|
|
|
struct items_data_st item_entry;
|
2017-06-22 13:21:43 +00:00
|
|
|
int item_entry_count = OSSL_NELEM(items_data);
|
2016-08-03 19:45:06 +00:00
|
|
|
/* Create the JPI itemlist array to hold item_data content */
|
2015-01-22 03:40:55 +00:00
|
|
|
struct {
|
|
|
|
short length, code;
|
2016-08-03 19:45:06 +00:00
|
|
|
int *buffer;
|
2015-01-22 03:40:55 +00:00
|
|
|
int *retlen;
|
2017-06-22 13:21:43 +00:00
|
|
|
} item[item_entry_count], *pitem;
|
2015-01-22 03:40:55 +00:00
|
|
|
struct items_data_st *pitems_data;
|
2017-06-22 13:21:43 +00:00
|
|
|
int data_buffer[(item_entry_count * 2) + 4]; /* 8 bytes per entry max */
|
2016-08-03 19:45:06 +00:00
|
|
|
int iosb[2];
|
|
|
|
int sys_time[2];
|
|
|
|
int *ptr;
|
|
|
|
int i, j ;
|
|
|
|
int tmp_length = 0;
|
|
|
|
int total_length = 0;
|
2001-05-13 10:34:18 +00:00
|
|
|
|
2016-08-03 19:45:06 +00:00
|
|
|
/* Setup itemlist for GETJPI */
|
2017-06-22 13:21:43 +00:00
|
|
|
pitems_data = items_data;
|
|
|
|
for (pitem = item; pitems_data->length != 0; pitem++) {
|
2015-01-22 03:40:55 +00:00
|
|
|
pitem->length = pitems_data->length;
|
2016-08-03 19:45:06 +00:00
|
|
|
pitem->code = pitems_data->code;
|
|
|
|
pitem->buffer = &data_buffer[total_length];
|
2015-01-22 03:40:55 +00:00
|
|
|
pitem->retlen = 0;
|
2016-08-03 19:45:06 +00:00
|
|
|
/* total_length is in longwords */
|
2017-06-22 13:21:43 +00:00
|
|
|
total_length += pitems_data->length / 4;
|
2015-01-22 03:40:55 +00:00
|
|
|
pitems_data++;
|
|
|
|
}
|
|
|
|
pitem->length = pitem->code = 0;
|
2001-05-13 10:34:18 +00:00
|
|
|
|
2016-08-03 19:45:06 +00:00
|
|
|
/* Fill data_buffer with various info bits from this process */
|
2017-06-22 13:21:43 +00:00
|
|
|
if (sys$getjpiw(EFN$C_ENF, NULL, NULL, item, &iosb, 0, 0) != SS$_NORMAL)
|
|
|
|
return 0;
|
2016-08-03 19:45:06 +00:00
|
|
|
|
2017-06-22 13:21:43 +00:00
|
|
|
/* Now twist that data to seed the SSL random number init */
|
|
|
|
for (i = 0; i < total_length; i++) {
|
|
|
|
sys$gettim((struct _generic_64 *)&sys_time[0]);
|
|
|
|
srand(sys_time[0] * data_buffer[0] * data_buffer[1] + i);
|
2016-08-03 19:45:06 +00:00
|
|
|
|
2017-06-22 13:21:43 +00:00
|
|
|
if (i == (total_length - 1)) { /* for JPI$_FINALEXC */
|
|
|
|
ptr = &data_buffer[i];
|
|
|
|
for (j = 0; j < 4; j++) {
|
|
|
|
data_buffer[i + j] = ptr[j];
|
2016-08-03 19:45:06 +00:00
|
|
|
/* OK to use rand() just to scramble the seed */
|
2017-06-22 13:21:43 +00:00
|
|
|
data_buffer[i + j] ^= (sys_time[0] ^ rand());
|
|
|
|
tmp_length++;
|
2016-08-03 19:45:06 +00:00
|
|
|
}
|
2017-06-22 13:21:43 +00:00
|
|
|
} else {
|
|
|
|
/* OK to use rand() just to scramble the seed */
|
|
|
|
data_buffer[i] ^= (sys_time[0] ^ rand());
|
2015-01-22 03:40:55 +00:00
|
|
|
}
|
|
|
|
}
|
2016-08-03 19:45:06 +00:00
|
|
|
|
2017-06-22 13:21:43 +00:00
|
|
|
total_length += (tmp_length - 1);
|
|
|
|
|
2017-08-31 21:16:22 +00:00
|
|
|
/*
|
|
|
|
* Size of seed is total_length*4 bytes (64bytes). The original assumption
|
|
|
|
* was that it contains 4 bits of entropy per byte. This makes a total
|
|
|
|
* amount of total_length*16 bits (256bits).
|
|
|
|
*/
|
|
|
|
return RAND_POOL_add(pool,
|
|
|
|
(PTR_T)data_buffer, total_length * 4,
|
|
|
|
total_length * 16);
|
2001-01-08 10:59:26 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|