A randomizer for OpenVMS, using the statistics that are easily
authorRichard Levitte <levitte@openssl.org>
Sun, 13 May 2001 10:34:18 +0000 (10:34 +0000)
committerRichard Levitte <levitte@openssl.org>
Sun, 13 May 2001 10:34:18 +0000 (10:34 +0000)
reachable.

It's completely untested for now.  To be done in the next few days.

crypto/rand/rand_vms.c

index 5e2e2b157bda7f4ae0642633375f3b49c1c37143..924ef1ba8937026cdb4b38165f95b5eab1b94390 100644 (file)
@@ -1,4 +1,4 @@
-/* crypto/rand/rand_vms.c */
+/* crypto/rand/rand_vms.c -*- mode:C; c-file-style: "eay" -*- */
 /* Written by Richard Levitte <richard@levitte.org> for the OpenSSL
  * project 2000.
  */
 /* Written by Richard Levitte <richard@levitte.org> for the OpenSSL
  * project 2000.
  */
 
 #if defined(OPENSSL_SYS_VMS)
 
 
 #if defined(OPENSSL_SYS_VMS)
 
-/* For now, this does nothing.  I'm searching for a good random device,
-   then we'll see. */
+#include <descrip.h>
+#include <jpidef.h>
+#include <ssdef.h>
+#include <starlet.h>
 
 
+static struct items_data_st
+       {
+       short length, code;     /* length is amount of bytes */
+       } items_data[] =
+               { { 4, JPI$_BUFIO },
+                 { 4, JPI$_CPUTIM },
+                 { 4, JPI$_DIRIO },
+                 { 8, JPI$_LOGINTIM },
+                 { 4, JPI$_PAGEFLTS },
+                 { 4, JPI$_PID },
+                 { 4, JPI$_WSSIZE },
+                 { 0, 0 }
+               };
+                 
 int RAND_poll(void)
 int RAND_poll(void)
-{
-       return 0;
+       {
+       long pid, iosb[2];
+       int status = 0;
+       struct
+               {
+               short length, code;
+               long *buffer;
+               int *retlen;
+               } item[32], *pitem;
+       unsigned char data_buffer[256];
+       short total_length = 0;
+       struct items_data_st *pitems_data;
+
+       pitems_data = items_data;
+       pitem = item;
+
+       /* Setup */
+       while (pitems_data->length)
+               {
+               pitem->length = pitems_data->length;
+               pitem->code = pitems_data->code;
+               pitem->buffer = (long *)data_buffer[total_length];
+               pitem->retlen = 0;
+               total_length += pitems_data->length;
+               }
+       pitem->length = pitem->code = 0;
+
+       /*
+        * Scan through all the processes in the system and add entropy with
+        * results from the processes that were possible to look at.
+        * However, view the information as only half trustable.
+        */
+       pid = -1;                       /* search context */
+       while ((status = SYS$GETJPIW(8, &pid,  0, item, iosb, 0, 0))
+               != SS$_NOMOREPROC)
+               {
+               if (status == SS$_NORMAL)
+                       {
+                       RAND_add(data_buffer, total_length, total_length/2);
+                       }
+               }
+       SYS$GETTIM(iosb);
+       RAND_add((unsigned char *)iosb, sizeof(iosb), sizeof(iosb)/2);
+       return 1;
 }
 
 #endif
 }
 
 #endif