2 * Copyright 2001-2018 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
12 #if defined(OPENSSL_SYS_VMS)
13 # include "internal/cryptlib.h"
14 # include <openssl/rand.h>
15 # include "internal/rand_int.h"
16 # include "rand_lcl.h"
23 # pragma message disable DOLLARID
26 # ifndef OPENSSL_RAND_SEED_OS
27 # error "Unsupported seeding method configured; must be os"
31 * Use 32-bit pointers almost everywhere. Define the type to which to cast a
32 * pointer passed to an external function.
34 # if __INITIAL_POINTER_SIZE == 64
35 # define PTR_T __void_ptr64
36 # pragma pointer_size save
37 # pragma pointer_size 32
42 static struct items_data_st
{
43 short length
, code
; /* length is number of bytes */
49 {8, JPI$_LAST_LOGIN_I
},
60 * We assume there we get about 4 bits of entropy per byte from the items
61 * above, with a bit of scrambling added rand_pool_acquire_entropy()
63 #define ENTROPY_BITS_PER_BYTE 4
65 size_t rand_pool_acquire_entropy(RAND_POOL
*pool
)
67 /* determine the number of items in the JPI array */
68 struct items_data_st item_entry
;
69 size_t item_entry_count
= OSSL_NELEM(items_data
);
70 /* Create the 32-bit JPI itemlist array to hold item_data content */
72 uint16_t length
, code
;
75 } item
[item_entry_count
], *pitem
;
76 struct items_data_st
*pitems_data
;
77 /* 8 bytes (two longs) per entry max */
78 uint32_t data_buffer
[(item_entry_count
* 2) + 4];
83 size_t tmp_length
= 0;
84 size_t total_length
= 0;
85 size_t bytes_needed
= rand_pool_bytes_needed(pool
, ENTROPY_BITS_PER_BYTE
);
86 size_t bytes_remaining
= rand_pool_bytes_remaining(pool
);
88 /* Setup itemlist for GETJPI */
89 pitems_data
= items_data
;
90 for (pitem
= item
; pitems_data
->length
!= 0; pitem
++) {
91 pitem
->length
= pitems_data
->length
;
92 pitem
->code
= pitems_data
->code
;
93 pitem
->buffer
= &data_buffer
[total_length
];
95 /* total_length is in longwords */
96 total_length
+= pitems_data
->length
/ 4;
99 pitem
->length
= pitem
->code
= 0;
101 /* Fill data_buffer with various info bits from this process */
102 if (sys$
getjpiw(EFN$C_ENF
, NULL
, NULL
, item
, &iosb
, 0, 0) != SS$_NORMAL
)
105 /* Now twist that data to seed the SSL random number init */
106 for (i
= 0; i
< total_length
; i
++) {
107 sys$
gettim((struct _generic_64
*)&sys_time
[0]);
108 srand(sys_time
[0] * data_buffer
[0] * data_buffer
[1] + i
);
110 if (i
== (total_length
- 1)) { /* for JPI$_FINALEXC */
111 ptr
= &data_buffer
[i
];
112 for (j
= 0; j
< 4; j
++) {
113 data_buffer
[i
+ j
] = ptr
[j
];
114 /* OK to use rand() just to scramble the seed */
115 data_buffer
[i
+ j
] ^= (sys_time
[0] ^ rand());
119 /* OK to use rand() just to scramble the seed */
120 data_buffer
[i
] ^= (sys_time
[0] ^ rand());
124 total_length
+= (tmp_length
- 1);
126 /* Change the total length to number of bytes */
130 * If we can't feed the requirements from the caller, we're in deep trouble.
132 if (!ossl_assert(total_length
>= bytes_needed
)) {
134 char availablestr
[20];
136 BIO_snprintf(neededstr
, sizeof(neededstr
), "%zu", bytes_needed
);
137 BIO_snprintf(availablestr
, sizeof(availablestr
), "%zu", total_length
);
138 RANDerr(RAND_F_RAND_POOL_ACQUIRE_ENTROPY
,
139 RAND_R_RANDOM_POOL_UNDERFLOW
);
140 ERR_add_error_data(4, "Needed: ", neededstr
, ", Available: ",
146 * Try not to overfeed the pool
148 if (total_length
> bytes_remaining
)
149 total_length
= bytes_remaining
;
151 return rand_pool_add(pool
, (PTR_T
)data_buffer
, total_length
,
152 total_length
* ENTROPY_BITS_PER_BYTE
);