summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorRichard Levitte <levitte@openssl.org>2018-04-30 18:04:10 +0200
committerRichard Levitte <levitte@openssl.org>2018-05-03 15:13:15 +0200
commitce147f7333fa56ab87a0878b34649991a5dae8f5 (patch)
tree9537ae26a79863c011d432aa2f8f6e640313d8eb
parentb1860d6c71733314417d053a72af66ae72e8268e (diff)
VMS: modernise rand_pool_acquire_entropy, step 1
Stop redefining structures that are already defined in system headers. This also means we can stop setting the pointer size globally, because the system structures will have the correct pointer sizes either way. The only exception is passing the right pointer size to a function. Stop trying to twist things around with rand(), that's the job of the DRBG that we feed. Stop assuming the location of the JPI$_FINALEXC item, look it up instead. Signal an exception if the sys$getjpiw call fails (it means the item list isn't set up right, so works as an assertion, but using VMS methodology). Reviewed-by: Andy Polyakov <appro@openssl.org> (Merged from https://github.com/openssl/openssl/pull/6151)
-rw-r--r--crypto/rand/rand_vms.c196
1 files changed, 120 insertions, 76 deletions
diff --git a/crypto/rand/rand_vms.c b/crypto/rand/rand_vms.c
index 5561abcf73..daae926ef5 100644
--- a/crypto/rand/rand_vms.c
+++ b/crypto/rand/rand_vms.c
@@ -10,16 +10,24 @@
#include "e_os.h"
#if defined(OPENSSL_SYS_VMS)
+# define __NEW_STARLET 1 /* New starlet definitions since VMS 7.0 */
# include <unistd.h>
# include "internal/cryptlib.h"
# include <openssl/rand.h>
# include "internal/rand_int.h"
# include "rand_lcl.h"
# include <descrip.h>
+# include <dvidef.h>
# include <jpidef.h>
+# include <rmidef.h>
+# include <syidef.h>
# include <ssdef.h>
# include <starlet.h>
-# include <efndef>
+# include <efndef.h>
+# include <gen64def.h>
+# include <iosbdef.h>
+# include <iledef.h>
+# include <lib$routines.h>
# ifdef __DECC
# pragma message disable DOLLARID
# endif
@@ -28,36 +36,108 @@
# error "Unsupported seeding method configured; must be os"
# endif
-/*
- * Use 32-bit pointers almost everywhere. Define the type to which to cast a
- * pointer passed to an external function.
- */
+/* We need to make sure we have the right size pointer in some cases */
# if __INITIAL_POINTER_SIZE == 64
-# define PTR_T __void_ptr64
# pragma pointer_size save
# pragma pointer_size 32
-# else
-# define PTR_T void *
+# endif
+typedef uint32_t *uint32_t__ptr32;
+# if __INITIAL_POINTER_SIZE == 64
+# pragma pointer_size restore
# endif
-static struct items_data_st {
+static const struct item_st {
short length, code; /* length is number of bytes */
-} items_data[] = {
- {4, JPI$_BUFIO},
- {4, JPI$_CPUTIM},
- {4, JPI$_DIRIO},
- {4, JPI$_IMAGECOUNT},
- {8, JPI$_LAST_LOGIN_I},
- {8, JPI$_LOGINTIM},
- {4, JPI$_PAGEFLTS},
- {4, JPI$_PID},
- {4, JPI$_PPGCNT},
- {4, JPI$_WSPEAK},
- {4, JPI$_FINALEXC},
- {0, 0}
+} item_data[] = {
+ {4, JPI$_BUFIO},
+ {4, JPI$_CPUTIM},
+ {4, JPI$_DIRIO},
+ {4, JPI$_IMAGECOUNT},
+ {8, JPI$_LAST_LOGIN_I},
+ {8, JPI$_LOGINTIM},
+ {4, JPI$_PAGEFLTS},
+ {4, JPI$_PID},
+ {4, JPI$_PPGCNT},
+ {4, JPI$_WSPEAK},
+ /*
+ * Note: the direct result is just a 32-bit address. However, it points
+ * to a list of 4 32-bit words, so we make extra space for them so we can
+ * do in-place replacement of values
+ */
+ {16, JPI$_FINALEXC},
};
/*
+ * Input:
+ * items_data - an array of lengths and codes
+ * items_data_num - number of elements in that array, minus one
+ * (caller MUST have space for one extra NULL element)
+ *
+ * Output:
+ * items - pre-allocated ILE3 array to be filled.
+ * It's assume to have items_data_num elements.
+ * databuffer - pre-allocated 32-bit word array.
+ *
+ * Returns the number of bytes used in databuffer
+ */
+static size_t prepare_item_list(const struct item_st *items_input,
+ size_t items_input_num,
+ ILE3 *items,
+ uint32_t__ptr32 databuffer)
+{
+ const struct item_st *pitems_input;
+ ILE3 *pitems;
+ size_t data_sz = 0;
+
+ for (pitems_input = items_input, pitems = items;
+ items_input_num-- > 0;
+ pitems_input++, pitems++) {
+
+ /* Special treatment of JPI$_FINALEXC */
+ if (pitems->ile3$w_code == JPI$_FINALEXC)
+ pitems->ile3$w_length = 4;
+ else
+ pitems->ile3$w_length = pitems_input->length;
+
+ pitems->ile3$w_code = pitems_input->code;
+ pitems->ile3$ps_bufaddr = databuffer;
+ pitems->ile3$ps_retlen_addr = 0;
+
+ databuffer += pitems_input->length / sizeof(*databuffer);
+ data_sz += pitems_input->length;
+ }
+ /* Terminating NULL entry */
+ pitems->ile3$w_length = pitems->ile3$w_code = 0;
+
+ return data_sz;
+}
+
+static void massage_JPI(ILE3 *items)
+{
+ /*
+ * Special treatment of JPI$_FINALEXC
+ * The result of that item's data buffer is a 32-bit address to a list of
+ * 4 32-bit words.
+ */
+ for (; items->ile3$w_length != 0; items++) {
+ if (items->ile3$w_code == JPI$_FINALEXC) {
+ uint32_t *data = items->ile3$ps_bufaddr;
+ uint32_t *ptr = (uint32_t *)*data;
+ size_t j;
+
+ /*
+ * We know we made space for 4 32-bit words, so we can do in-place
+ * replacement.
+ */
+ for (j = 0; j < 4; j++)
+ data[j] = ptr[j];
+
+ break;
+ }
+ }
+}
+
+/*
* This number expresses how many bits of data contain 1 bit of entropy.
*
* For the moment, we assume about 0.5 entropy bits per data bit, or 1
@@ -67,67 +147,31 @@ static struct items_data_st {
size_t rand_pool_acquire_entropy(RAND_POOL *pool)
{
- /* determine the number of items in the JPI array */
- struct items_data_st item_entry;
- size_t item_entry_count = OSSL_NELEM(items_data);
- /* Create the 32-bit JPI itemlist array to hold item_data content */
- struct {
- uint16_t length, code;
- uint32_t *buffer;
- uint32_t *retlen;
- } item[item_entry_count], *pitem;
- struct items_data_st *pitems_data;
- /* 8 bytes (two longs) per entry max */
- uint32_t data_buffer[(item_entry_count * 2) + 4];
- uint32_t iosb[2];
- uint32_t sys_time[2];
- uint32_t *ptr;
- size_t i, j ;
- size_t tmp_length = 0;
+ ILE3 items[OSSL_NELEM(item_data) + 1];
+ /*
+ * All items get 1 or 2 32-bit words of data, except JPI$_FINALEXC
+ * We make sure that we have ample space
+ */
+ uint32_t data_buffer[(OSSL_NELEM(item_data)) * 2 + 4];
size_t total_length = 0;
size_t bytes_needed = rand_pool_bytes_needed(pool, ENTROPY_FACTOR);
size_t bytes_remaining = rand_pool_bytes_remaining(pool);
- /* Setup itemlist for GETJPI */
- pitems_data = items_data;
- for (pitem = item; pitems_data->length != 0; pitem++) {
- pitem->length = pitems_data->length;
- pitem->code = pitems_data->code;
- pitem->buffer = &data_buffer[total_length];
- pitem->retlen = 0;
- /* total_length is in longwords */
- total_length += pitems_data->length / 4;
- pitems_data++;
- }
- pitem->length = pitem->code = 0;
+ total_length += prepare_item_list(item_data, OSSL_NELEM(item_data),
+ items, &data_buffer[total_length]);
/* Fill data_buffer with various info bits from this process */
- if (sys$getjpiw(EFN$C_ENF, NULL, NULL, item, &iosb, 0, 0) != SS$_NORMAL)
- return 0;
+ {
+ uint32_t status;
- /* Now twist that data to seed the SSL random number init */
- for (i = 0; i < total_length; i++) {
- sys$gettim((struct _generic_64 *)&sys_time[0]);
- srand(sys_time[0] * data_buffer[0] * data_buffer[1] + i);
-
- if (i == (total_length - 1)) { /* for JPI$_FINALEXC */
- ptr = &data_buffer[i];
- for (j = 0; j < 4; j++) {
- data_buffer[i + j] = ptr[j];
- /* OK to use rand() just to scramble the seed */
- data_buffer[i + j] ^= (sys_time[0] ^ rand());
- tmp_length++;
- }
- } else {
- /* OK to use rand() just to scramble the seed */
- data_buffer[i] ^= (sys_time[0] ^ rand());
+ if ((status = sys$getjpiw(EFN$C_ENF, 0, 0, items, 0, 0, 0))
+ != SS$_NORMAL) {
+ lib$signal(status);
+ return 0;
}
}
- total_length += (tmp_length - 1);
-
- /* Change the total length to number of bytes */
- total_length *= 4;
+ massage_JPI(items);
/*
* If we can't feed the requirements from the caller, we're in deep trouble.
@@ -152,7 +196,7 @@ size_t rand_pool_acquire_entropy(RAND_POOL *pool)
total_length = bytes_remaining;
/* We give the pessimistic value for the amount of entropy */
- rand_pool_add(pool, (PTR_T)data_buffer, total_length,
+ rand_pool_add(pool, (unsigned char *)data_buffer, total_length,
total_length / ENTROPY_FACTOR);
return rand_pool_entropy_available(pool);
}
@@ -172,7 +216,7 @@ int rand_pool_add_nonce_data(RAND_POOL *pool)
*/
data.pid = getpid();
data.tid = CRYPTO_THREAD_get_current_id();
- sys$gettim_prec((struct _generic_64 *)&data.time);
+ sys$gettim_prec(&data.time);
return rand_pool_add(pool, (unsigned char *)&data, sizeof(data), 0);
}
@@ -190,7 +234,7 @@ int rand_pool_add_additional_data(RAND_POOL *pool)
* concurrently (which is the case for the <master> drbg).
*/
data.tid = CRYPTO_THREAD_get_current_id();
- sys$gettim_prec((struct _generic_64 *)&data.time);
+ sys$gettim_prec(&data.time);
return rand_pool_add(pool, (unsigned char *)&data, sizeof(data), 0);
}