| line | stmt | bran | cond | sub | pod | time | code | 
| 1 |  |  |  |  |  |  | #include "EXTERN.h" | 
| 2 |  |  |  |  |  |  | #include "perl.h" | 
| 3 |  |  |  |  |  |  | #include "XSUB.h" | 
| 4 |  |  |  |  |  |  |  | 
| 5 |  |  |  |  |  |  | #include | 
| 6 |  |  |  |  |  |  |  | 
| 7 |  |  |  |  |  |  | #define PACKAGE_NAME "Crypt::OpenSSL::Random" | 
| 8 |  |  |  |  |  |  |  | 
| 9 |  |  |  |  |  |  | MODULE = Crypt::OpenSSL::Random		PACKAGE = Crypt::OpenSSL::Random | 
| 10 |  |  |  |  |  |  | PROTOTYPES: DISABLE | 
| 11 |  |  |  |  |  |  |  | 
| 12 |  |  |  |  |  |  | void | 
| 13 |  |  |  |  |  |  | random_bytes(num_bytes_SV) | 
| 14 |  |  |  |  |  |  | SV * num_bytes_SV; | 
| 15 |  |  |  |  |  |  | PPCODE: | 
| 16 |  |  |  |  |  |  | { | 
| 17 |  |  |  |  |  |  | unsigned char *rand_bytes; | 
| 18 | 1 | 50 |  |  |  |  | int num_bytes = SvIV(num_bytes_SV); | 
| 19 | 1 | 50 |  |  |  |  | if(New(0,rand_bytes, num_bytes, unsigned char) == NULL) | 
| 20 |  |  |  |  |  |  | { | 
| 21 | 0 |  |  |  |  |  | croak ("unable to allocate buffer for random bytes in package " | 
| 22 |  |  |  |  |  |  | PACKAGE_NAME); | 
| 23 |  |  |  |  |  |  | } | 
| 24 |  |  |  |  |  |  |  | 
| 25 | 1 | 50 |  |  |  |  | if(RAND_bytes(rand_bytes, num_bytes)) | 
| 26 |  |  |  |  |  |  | { | 
| 27 | 1 | 50 |  |  |  |  | XPUSHs(sv_2mortal(newSVpv((const char*)rand_bytes, num_bytes))); | 
| 28 | 1 |  |  |  |  |  | Safefree(rand_bytes); | 
| 29 | 1 |  |  |  |  |  | XSRETURN(1); | 
| 30 |  |  |  |  |  |  | } | 
| 31 |  |  |  |  |  |  | else | 
| 32 |  |  |  |  |  |  | { | 
| 33 | 0 |  |  |  |  |  | XSRETURN_NO; | 
| 34 |  |  |  |  |  |  | } | 
| 35 |  |  |  |  |  |  | } | 
| 36 |  |  |  |  |  |  |  | 
| 37 |  |  |  |  |  |  | void | 
| 38 |  |  |  |  |  |  | random_pseudo_bytes(num_bytes_SV) | 
| 39 |  |  |  |  |  |  | SV * num_bytes_SV; | 
| 40 |  |  |  |  |  |  | PPCODE: | 
| 41 |  |  |  |  |  |  | { | 
| 42 |  |  |  |  |  |  | unsigned char *rand_bytes; | 
| 43 | 1 | 50 |  |  |  |  | int num_bytes = SvIV(num_bytes_SV); | 
| 44 | 1 | 50 |  |  |  |  | if(New(0,rand_bytes, num_bytes, unsigned char) == NULL) | 
| 45 |  |  |  |  |  |  | { | 
| 46 | 0 |  |  |  |  |  | croak ("unable to allocate buffer for random bytes in package " | 
| 47 |  |  |  |  |  |  | PACKAGE_NAME); | 
| 48 |  |  |  |  |  |  | } | 
| 49 |  |  |  |  |  |  |  | 
| 50 | 1 | 50 |  |  |  |  | if(RAND_bytes(rand_bytes, num_bytes)) | 
| 51 |  |  |  |  |  |  | { | 
| 52 | 1 | 50 |  |  |  |  | XPUSHs(sv_2mortal(newSVpv((const char*)rand_bytes, num_bytes))); | 
| 53 | 1 |  |  |  |  |  | Safefree(rand_bytes); | 
| 54 | 1 |  |  |  |  |  | XSRETURN(1); | 
| 55 |  |  |  |  |  |  | } | 
| 56 |  |  |  |  |  |  | else | 
| 57 |  |  |  |  |  |  | { | 
| 58 | 0 |  |  |  |  |  | XSRETURN_NO; | 
| 59 |  |  |  |  |  |  | } | 
| 60 |  |  |  |  |  |  | } | 
| 61 |  |  |  |  |  |  |  | 
| 62 |  |  |  |  |  |  | # Seed the PRNG with user-provided bytes; returns true if the | 
| 63 |  |  |  |  |  |  | # seeding was sufficient. | 
| 64 |  |  |  |  |  |  |  | 
| 65 |  |  |  |  |  |  | void | 
| 66 |  |  |  |  |  |  | random_seed(random_bytes_SV) | 
| 67 |  |  |  |  |  |  | SV * random_bytes_SV; | 
| 68 |  |  |  |  |  |  | PPCODE: | 
| 69 |  |  |  |  |  |  | { | 
| 70 |  |  |  |  |  |  | Size_t random_bytes_length; | 
| 71 |  |  |  |  |  |  | char *random_bytes; | 
| 72 | 1 | 50 |  |  |  |  | random_bytes = SvPV(random_bytes_SV, random_bytes_length); | 
| 73 | 1 |  |  |  |  |  | RAND_seed(random_bytes, random_bytes_length); | 
| 74 | 1 | 50 |  |  |  |  | XPUSHs( sv_2mortal( newSViv( RAND_status() ) ) ); | 
| 75 |  |  |  |  |  |  | } | 
| 76 |  |  |  |  |  |  |  | 
| 77 |  |  |  |  |  |  | # Seed the PRNG with data from the indicated EntropyGatheringDaemon; | 
| 78 |  |  |  |  |  |  | # returns the number of bytes gathered, or -1 if there was a | 
| 79 |  |  |  |  |  |  | # connection failure or if the PRNG is still insufficiently seeded. | 
| 80 |  |  |  |  |  |  |  | 
| 81 |  |  |  |  |  |  | #ifndef OPENSSL_NO_EGD | 
| 82 |  |  |  |  |  |  |  | 
| 83 |  |  |  |  |  |  | void | 
| 84 |  |  |  |  |  |  | random_egd(egd_SV) | 
| 85 |  |  |  |  |  |  | SV * egd_SV; | 
| 86 |  |  |  |  |  |  | PPCODE: | 
| 87 |  |  |  |  |  |  | { | 
| 88 |  |  |  |  |  |  | Size_t egd_length; | 
| 89 |  |  |  |  |  |  | int status; | 
| 90 | 0 | 0 |  |  |  |  | char *egd = SvPV(egd_SV, egd_length); | 
| 91 | 0 |  |  |  |  |  | status = RAND_egd(egd); | 
| 92 | 0 | 0 |  |  |  |  | XPUSHs( sv_2mortal( newSViv( status ) ) ); | 
| 93 |  |  |  |  |  |  | } | 
| 94 |  |  |  |  |  |  |  | 
| 95 |  |  |  |  |  |  | #endif | 
| 96 |  |  |  |  |  |  |  | 
| 97 |  |  |  |  |  |  | # Returns true if the PRNG has enough seed data | 
| 98 |  |  |  |  |  |  |  | 
| 99 |  |  |  |  |  |  | void | 
| 100 |  |  |  |  |  |  | random_status() | 
| 101 |  |  |  |  |  |  | PPCODE: | 
| 102 |  |  |  |  |  |  | { | 
| 103 | 1 | 50 |  |  |  |  | XPUSHs( sv_2mortal( newSViv( RAND_status() ) ) ); | 
| 104 |  |  |  |  |  |  | } |