]> git.ipfire.org Git - thirdparty/openssl.git/blame - crypto/rand/rand_win.c
PIC-ify SPARC assembler in alternative manner to eliminate dependency on
[thirdparty/openssl.git] / crypto / rand / rand_win.c
CommitLineData
2ace287d
BM
1/* crypto/rand/rand_win.c */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58/* ====================================================================
59 * Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved.
60 *
61 * Redistribution and use in source and binary forms, with or without
62 * modification, are permitted provided that the following conditions
63 * are met:
64 *
65 * 1. Redistributions of source code must retain the above copyright
66 * notice, this list of conditions and the following disclaimer.
67 *
68 * 2. Redistributions in binary form must reproduce the above copyright
69 * notice, this list of conditions and the following disclaimer in
70 * the documentation and/or other materials provided with the
71 * distribution.
72 *
73 * 3. All advertising materials mentioning features or use of this
74 * software must display the following acknowledgment:
75 * "This product includes software developed by the OpenSSL Project
76 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
77 *
78 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
79 * endorse or promote products derived from this software without
80 * prior written permission. For written permission, please contact
81 * openssl-core@openssl.org.
82 *
83 * 5. Products derived from this software may not be called "OpenSSL"
84 * nor may "OpenSSL" appear in their names without prior written
85 * permission of the OpenSSL Project.
86 *
87 * 6. Redistributions of any form whatsoever must retain the following
88 * acknowledgment:
89 * "This product includes software developed by the OpenSSL Project
90 * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
91 *
92 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
93 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
94 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
95 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
96 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
97 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
98 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
99 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
100 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
101 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
102 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
103 * OF THE POSSIBILITY OF SUCH DAMAGE.
104 * ====================================================================
105 *
106 * This product includes cryptographic software written by Eric Young
107 * (eay@cryptsoft.com). This product includes software written by Tim
108 * Hudson (tjh@cryptsoft.com).
109 *
110 */
111
c0722725
UM
112#include "cryptlib.h"
113#include <openssl/rand.h>
114#include "rand_lcl.h"
2ace287d 115
7a8c7288 116#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_WIN32)
2ace287d 117#include <windows.h>
c0722725
UM
118#ifndef _WIN32_WINNT
119# define _WIN32_WINNT 0x0400
2ace287d 120#endif
c0722725
UM
121#include <wincrypt.h>
122#include <tlhelp32.h>
123
7a8c7288
UM
124/* Limit the time spent walking through the heap, processes, threads and modules to
125 a maximum of 1000 miliseconds each, unless CryptoGenRandom failed */
126#define MAXDELAY 1000
127
c0722725
UM
128/* Intel hardware RNG CSP -- available from
129 * http://developer.intel.com/design/security/rng/redist_license.htm
130 */
131#define PROV_INTEL_SEC 22
89c53672 132#define INTEL_DEF_PROV L"Intel Hardware Cryptographic Service Provider"
c0722725
UM
133
134static void readtimer(void);
135static void readscreen(void);
136
7abee0ce
RL
137/* It appears like CURSORINFO, PCURSORINFO and LPCURSORINFO are only defined
138 when WINVER is 0x0500 and up, which currently only happens on Win2000.
139 Unfortunately, those are typedefs, so they're a little bit difficult to
140 detect properly. On the other hand, the macro CURSOR_SHOWING is defined
141 within the same conditional, so it can be use to detect the absence of said
142 typedefs. */
143
c0366d89 144#ifndef CURSOR_SHOWING
7abee0ce
RL
145/*
146 * Information about the global cursor.
147 */
148typedef struct tagCURSORINFO
149{
150 DWORD cbSize;
151 DWORD flags;
152 HCURSOR hCursor;
153 POINT ptScreenPos;
154} CURSORINFO, *PCURSORINFO, *LPCURSORINFO;
155
156#define CURSOR_SHOWING 0x00000001
157#endif /* CURSOR_SHOWING */
c0366d89 158
89c53672 159typedef BOOL (WINAPI *CRYPTACQUIRECONTEXTW)(HCRYPTPROV *, LPCWSTR, LPCWSTR,
c0722725
UM
160 DWORD, DWORD);
161typedef BOOL (WINAPI *CRYPTGENRANDOM)(HCRYPTPROV, DWORD, BYTE *);
162typedef BOOL (WINAPI *CRYPTRELEASECONTEXT)(HCRYPTPROV, DWORD);
163
164typedef HWND (WINAPI *GETFOREGROUNDWINDOW)(VOID);
165typedef BOOL (WINAPI *GETCURSORINFO)(PCURSORINFO);
166typedef DWORD (WINAPI *GETQUEUESTATUS)(UINT);
167
168typedef HANDLE (WINAPI *CREATETOOLHELP32SNAPSHOT)(DWORD, DWORD);
88401ed4 169typedef BOOL (WINAPI *CLOSETOOLHELP32SNAPSHOT)(HANDLE);
573969cd 170typedef BOOL (WINAPI *HEAP32FIRST)(LPHEAPENTRY32, DWORD, ULONG_PTR);
c0722725
UM
171typedef BOOL (WINAPI *HEAP32NEXT)(LPHEAPENTRY32);
172typedef BOOL (WINAPI *HEAP32LIST)(HANDLE, LPHEAPLIST32);
173typedef BOOL (WINAPI *PROCESS32)(HANDLE, LPPROCESSENTRY32);
174typedef BOOL (WINAPI *THREAD32)(HANDLE, LPTHREADENTRY32);
175typedef BOOL (WINAPI *MODULE32)(HANDLE, LPMODULEENTRY32);
176
1d95fb65 177#include <lmcons.h>
0bf23d9b 178#ifndef OPENSSL_SYS_WINCE
1d95fb65 179#include <lmstats.h>
0bf23d9b 180#endif
10bb0dbf
RL
181#if 1 /* The NET API is Unicode only. It requires the use of the UNICODE
182 * macro. When UNICODE is defined LPTSTR becomes LPWSTR. LMSTR was
183 * was added to the Platform SDK to allow the NET API to be used in
184 * non-Unicode applications provided that Unicode strings were still
185 * used for input. LMSTR is defined as LPWSTR.
676432d4 186 */
1d95fb65 187typedef NET_API_STATUS (NET_API_FUNCTION * NETSTATGET)
10bb0dbf 188 (LPWSTR, LPWSTR, DWORD, DWORD, LPBYTE*);
1d95fb65 189typedef NET_API_STATUS (NET_API_FUNCTION * NETFREE)(LPBYTE);
10bb0dbf 190#endif /* 1 */
1d95fb65 191
c0722725
UM
192int RAND_poll(void)
193{
194 MEMORYSTATUS m;
195 HCRYPTPROV hProvider = 0;
196 BYTE buf[64];
197 DWORD w;
7a8c7288 198 int good = 0;
c0722725 199
10bb0dbf
RL
200 /* Determine the OS version we are on so we can turn off things
201 * that do not work properly.
202 */
203 OSVERSIONINFO osverinfo ;
204 osverinfo.dwOSVersionInfoSize = sizeof(OSVERSIONINFO) ;
205 GetVersionEx( &osverinfo ) ;
c0722725 206
8a35fb3b
AP
207#if defined(OPENSSL_SYS_WINCE)
208# if defined(_WIN32_WCE) && _WIN32_WCE>=210
209# ifndef CryptAcquireContext
210 /* reserve for broken header... */
211# define CryptAcquireContext CryptAcquireContextW
212# endif
0bf23d9b
RL
213 /* poll the CryptoAPI PRNG */
214 /* The CryptoAPI returns sizeof(buf) bytes of randomness */
8a35fb3b 215 if (CryptAcquireContext(&hProvider, NULL, NULL, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT))
0bf23d9b
RL
216 {
217 if (CryptGenRandom(hProvider, sizeof(buf), buf))
218 RAND_add(buf, sizeof(buf), sizeof(buf));
219 CryptReleaseContext(hProvider, 0);
220 }
8a35fb3b
AP
221# endif
222#else /* OPENSSL_SYS_WINCE */
89c53672
AP
223 /*
224 * None of below libraries are present on Windows CE, which is
225 * why we #ifndef the whole section. This also excuses us from
226 * handling the GetProcAddress issue. The trouble is that in
227 * real Win32 API GetProcAddress is available in ANSI flavor
228 * only. In WinCE on the other hand GetProcAddress is a macro
229 * most commonly defined as GetProcAddressW, which accepts
230 * Unicode argument. If we were to call GetProcAddress under
231 * WinCE, I'd recommend to either redefine GetProcAddress as
232 * GetProcAddressA (there seem to be one in common CE spec) or
233 * implement own shim routine, which would accept ANSI argument
234 * and expand it to Unicode.
235 */
573969cd 236 {
c0722725 237 /* load functions dynamically - not available on all systems */
573969cd
AP
238 HMODULE advapi = LoadLibrary(TEXT("ADVAPI32.DLL"));
239 HMODULE kernel = LoadLibrary(TEXT("KERNEL32.DLL"));
240 HMODULE user = NULL;
241 HMODULE netapi = LoadLibrary(TEXT("NETAPI32.DLL"));
242 CRYPTACQUIRECONTEXTW acquire = NULL;
243 CRYPTGENRANDOM gen = NULL;
244 CRYPTRELEASECONTEXT release = NULL;
245 NETSTATGET netstatget = NULL;
246 NETFREE netfree = NULL;
247
1d95fb65
RL
248 if (netapi)
249 {
89c53672
AP
250 netstatget = (NETSTATGET) GetProcAddress(netapi,"NetStatisticsGet");
251 netfree = (NETFREE) GetProcAddress(netapi,"NetApiBufferFree");
1d95fb65
RL
252 }
253
254 if (netstatget && netfree)
255 {
256 LPBYTE outbuf;
10bb0dbf
RL
257 /* NetStatisticsGet() is a Unicode only function
258 * STAT_WORKSTATION_0 contains 45 fields and STAT_SERVER_0
259 * contains 17 fields. We treat each field as a source of
260 * one byte of entropy.
261 */
262
1d95fb65
RL
263 if (netstatget(NULL, L"LanmanWorkstation", 0, 0, &outbuf) == 0)
264 {
10bb0dbf 265 RAND_add(outbuf, sizeof(STAT_WORKSTATION_0), 45);
1d95fb65
RL
266 netfree(outbuf);
267 }
268 if (netstatget(NULL, L"LanmanServer", 0, 0, &outbuf) == 0)
269 {
10bb0dbf 270 RAND_add(outbuf, sizeof(STAT_SERVER_0), 17);
1d95fb65
RL
271 netfree(outbuf);
272 }
273 }
274
362f2b69
RL
275 if (netapi)
276 FreeLibrary(netapi);
89c53672 277
10bb0dbf
RL
278 /* It appears like this can cause an exception deep within ADVAPI32.DLL
279 * at random times on Windows 2000. Reported by Jeffrey Altman.
280 * Only use it on NT.
281 */
cc85ec44
BM
282 /* Wolfgang Marczy <WMarczy@topcall.co.at> reports that
283 * the RegQueryValueEx call below can hang on NT4.0 (SP6).
284 * So we don't use this at all for now. */
285#if 0
10bb0dbf
RL
286 if ( osverinfo.dwPlatformId == VER_PLATFORM_WIN32_NT &&
287 osverinfo.dwMajorVersion < 5)
1d95fb65 288 {
10bb0dbf
RL
289 /* Read Performance Statistics from NT/2000 registry
290 * The size of the performance data can vary from call
291 * to call so we must guess the size of the buffer to use
292 * and increase its size if we get an ERROR_MORE_DATA
293 * return instead of ERROR_SUCCESS.
294 */
295 LONG rc=ERROR_MORE_DATA;
296 char * buf=NULL;
297 DWORD bufsz=0;
298 DWORD length;
299
300 while (rc == ERROR_MORE_DATA)
301 {
302 buf = realloc(buf,bufsz+8192);
303 if (!buf)
304 break;
305 bufsz += 8192;
306
307 length = bufsz;
0bf23d9b 308 rc = RegQueryValueEx(HKEY_PERFORMANCE_DATA, TEXT("Global"),
10bb0dbf
RL
309 NULL, NULL, buf, &length);
310 }
311 if (rc == ERROR_SUCCESS)
312 {
313 /* For entropy count assume only least significant
314 * byte of each DWORD is random.
35a6db86 315 */
10bb0dbf
RL
316 RAND_add(&length, sizeof(length), 0);
317 RAND_add(buf, length, length / 4.0);
35a6db86
RL
318
319 /* Close the Registry Key to allow Windows to cleanup/close
320 * the open handle
321 * Note: The 'HKEY_PERFORMANCE_DATA' key is implicitly opened
322 * when the RegQueryValueEx above is done. However, if
323 * it is not explicitly closed, it can cause disk
324 * partition manipulation problems.
325 */
326 RegCloseKey(HKEY_PERFORMANCE_DATA);
10bb0dbf
RL
327 }
328 if (buf)
329 free(buf);
1d95fb65 330 }
cc85ec44 331#endif
c0722725
UM
332
333 if (advapi)
334 {
89c53672
AP
335 /*
336 * If it's available, then it's available in both ANSI
337 * and UNICODE flavors even in Win9x, documentation says.
338 * We favor Unicode...
339 */
340 acquire = (CRYPTACQUIRECONTEXTW) GetProcAddress(advapi,
341 "CryptAcquireContextW");
c0722725 342 gen = (CRYPTGENRANDOM) GetProcAddress(advapi,
89c53672 343 "CryptGenRandom");
c0722725 344 release = (CRYPTRELEASECONTEXT) GetProcAddress(advapi,
89c53672 345 "CryptReleaseContext");
c0722725
UM
346 }
347
348 if (acquire && gen && release)
349 {
350 /* poll the CryptoAPI PRNG */
10bb0dbf 351 /* The CryptoAPI returns sizeof(buf) bytes of randomness */
8a35fb3b 352 if (acquire(&hProvider, NULL, NULL, PROV_RSA_FULL,
c0722725
UM
353 CRYPT_VERIFYCONTEXT))
354 {
355 if (gen(hProvider, sizeof(buf), buf) != 0)
356 {
361c7f2b 357 RAND_add(buf, sizeof(buf), 0);
7a8c7288 358 good = 1;
3e563bce 359#if 0
c0722725 360 printf("randomness from PROV_RSA_FULL\n");
2ace287d 361#endif
c0722725
UM
362 }
363 release(hProvider, 0);
364 }
365
366 /* poll the Pentium PRG with CryptoAPI */
367 if (acquire(&hProvider, 0, INTEL_DEF_PROV, PROV_INTEL_SEC, 0))
368 {
369 if (gen(hProvider, sizeof(buf), buf) != 0)
370 {
10bb0dbf 371 RAND_add(buf, sizeof(buf), sizeof(buf));
7a8c7288 372 good = 1;
3e563bce 373#if 0
c0722725
UM
374 printf("randomness from PROV_INTEL_SEC\n");
375#endif
376 }
377 release(hProvider, 0);
378 }
379 }
380
362f2b69
RL
381 if (advapi)
382 FreeLibrary(advapi);
383
573969cd
AP
384 if ((osverinfo.dwPlatformId != VER_PLATFORM_WIN32_NT ||
385 !OPENSSL_isservice()) &&
386 (user = LoadLibrary(TEXT("USER32.DLL"))))
c0722725
UM
387 {
388 GETCURSORINFO cursor;
389 GETFOREGROUNDWINDOW win;
848f3d40 390 GETQUEUESTATUS queue;
c0722725 391
89c53672
AP
392 win = (GETFOREGROUNDWINDOW) GetProcAddress(user, "GetForegroundWindow");
393 cursor = (GETCURSORINFO) GetProcAddress(user, "GetCursorInfo");
394 queue = (GETQUEUESTATUS) GetProcAddress(user, "GetQueueStatus");
c0722725
UM
395
396 if (win)
10bb0dbf 397 {
c0722725 398 /* window handle */
573969cd 399 HWND h = win();
c0722725 400 RAND_add(&h, sizeof(h), 0);
10bb0dbf 401 }
1d95fb65
RL
402 if (cursor)
403 {
404 /* unfortunately, its not safe to call GetCursorInfo()
405 * on NT4 even though it exists in SP3 (or SP6) and
406 * higher.
407 */
1d95fb65
RL
408 if ( osverinfo.dwPlatformId == VER_PLATFORM_WIN32_NT &&
409 osverinfo.dwMajorVersion < 5)
410 cursor = 0;
411 }
c0722725
UM
412 if (cursor)
413 {
414 /* cursor position */
10bb0dbf 415 /* assume 2 bytes of entropy */
1d95fb65
RL
416 CURSORINFO ci;
417 ci.cbSize = sizeof(CURSORINFO);
418 if (cursor(&ci))
10bb0dbf 419 RAND_add(&ci, ci.cbSize, 2);
848f3d40 420 }
848f3d40
RL
421
422 if (queue)
423 {
424 /* message queue status */
10bb0dbf 425 /* assume 1 byte of entropy */
848f3d40 426 w = queue(QS_ALLEVENTS);
10bb0dbf 427 RAND_add(&w, sizeof(w), 1);
c0722725 428 }
362f2b69
RL
429
430 FreeLibrary(user);
c0722725
UM
431 }
432
433 /* Toolhelp32 snapshot: enumerate processes, threads, modules and heap
434 * http://msdn.microsoft.com/library/psdk/winbase/toolhelp_5pfd.htm
1d95fb65 435 * (Win 9x and 2000 only, not available on NT)
c0722725
UM
436 *
437 * This seeding method was proposed in Peter Gutmann, Software
438 * Generation of Practically Strong Random Numbers,
c0366d89 439 * http://www.usenix.org/publications/library/proceedings/sec98/gutmann.html
88401ed4 440 * revised version at http://www.cryptoengines.com/~peter/06_random.pdf
c0722725
UM
441 * (The assignment of entropy estimates below is arbitrary, but based
442 * on Peter's analysis the full poll appears to be safe. Additional
443 * interactive seeding is encouraged.)
444 */
445
446 if (kernel)
447 {
448 CREATETOOLHELP32SNAPSHOT snap;
88401ed4 449 CLOSETOOLHELP32SNAPSHOT close_snap;
c0722725
UM
450 HANDLE handle;
451
452 HEAP32FIRST heap_first;
453 HEAP32NEXT heap_next;
454 HEAP32LIST heaplist_first, heaplist_next;
455 PROCESS32 process_first, process_next;
456 THREAD32 thread_first, thread_next;
457 MODULE32 module_first, module_next;
458
459 HEAPLIST32 hlist;
460 HEAPENTRY32 hentry;
461 PROCESSENTRY32 p;
462 THREADENTRY32 t;
463 MODULEENTRY32 m;
7a8c7288 464 DWORD stoptime = 0;
c0722725
UM
465
466 snap = (CREATETOOLHELP32SNAPSHOT)
89c53672 467 GetProcAddress(kernel, "CreateToolhelp32Snapshot");
88401ed4 468 close_snap = (CLOSETOOLHELP32SNAPSHOT)
89c53672
AP
469 GetProcAddress(kernel, "CloseToolhelp32Snapshot");
470 heap_first = (HEAP32FIRST) GetProcAddress(kernel, "Heap32First");
471 heap_next = (HEAP32NEXT) GetProcAddress(kernel, "Heap32Next");
472 heaplist_first = (HEAP32LIST) GetProcAddress(kernel, "Heap32ListFirst");
473 heaplist_next = (HEAP32LIST) GetProcAddress(kernel, "Heap32ListNext");
474 process_first = (PROCESS32) GetProcAddress(kernel, "Process32First");
475 process_next = (PROCESS32) GetProcAddress(kernel, "Process32Next");
476 thread_first = (THREAD32) GetProcAddress(kernel, "Thread32First");
477 thread_next = (THREAD32) GetProcAddress(kernel, "Thread32Next");
478 module_first = (MODULE32) GetProcAddress(kernel, "Module32First");
479 module_next = (MODULE32) GetProcAddress(kernel, "Module32Next");
c0722725
UM
480
481 if (snap && heap_first && heap_next && heaplist_first &&
482 heaplist_next && process_first && process_next &&
483 thread_first && thread_next && module_first &&
484 module_next && (handle = snap(TH32CS_SNAPALL,0))
88401ed4 485 != INVALID_HANDLE_VALUE)
c0722725
UM
486 {
487 /* heap list and heap walking */
10bb0dbf
RL
488 /* HEAPLIST32 contains 3 fields that will change with
489 * each entry. Consider each field a source of 1 byte
490 * of entropy.
491 * HEAPENTRY32 contains 5 fields that will change with
492 * each entry. Consider each field a source of 1 byte
493 * of entropy.
494 */
c0722725 495 hlist.dwSize = sizeof(HEAPLIST32);
7a8c7288 496 if (good) stoptime = GetTickCount() + MAXDELAY;
c0722725
UM
497 if (heaplist_first(handle, &hlist))
498 do
499 {
10bb0dbf 500 RAND_add(&hlist, hlist.dwSize, 3);
c0722725
UM
501 hentry.dwSize = sizeof(HEAPENTRY32);
502 if (heap_first(&hentry,
503 hlist.th32ProcessID,
504 hlist.th32HeapID))
c0366d89 505 {
9f6fe8db 506 int entrycnt = 80;
c0722725
UM
507 do
508 RAND_add(&hentry,
10bb0dbf 509 hentry.dwSize, 5);
c0366d89
RL
510 while (heap_next(&hentry)
511 && --entrycnt > 0);
512 }
c0722725 513 } while (heaplist_next(handle,
7a8c7288
UM
514 &hlist) && GetTickCount() < stoptime);
515
c0722725 516 /* process walking */
10bb0dbf
RL
517 /* PROCESSENTRY32 contains 9 fields that will change
518 * with each entry. Consider each field a source of
519 * 1 byte of entropy.
520 */
c0722725 521 p.dwSize = sizeof(PROCESSENTRY32);
7a8c7288
UM
522
523 if (good) stoptime = GetTickCount() + MAXDELAY;
c0722725
UM
524 if (process_first(handle, &p))
525 do
10bb0dbf 526 RAND_add(&p, p.dwSize, 9);
7a8c7288 527 while (process_next(handle, &p) && GetTickCount() < stoptime);
10bb0dbf 528
c0722725 529 /* thread walking */
10bb0dbf
RL
530 /* THREADENTRY32 contains 6 fields that will change
531 * with each entry. Consider each field a source of
532 * 1 byte of entropy.
533 */
c0722725 534 t.dwSize = sizeof(THREADENTRY32);
7a8c7288 535 if (good) stoptime = GetTickCount() + MAXDELAY;
c0722725
UM
536 if (thread_first(handle, &t))
537 do
10bb0dbf 538 RAND_add(&t, t.dwSize, 6);
7a8c7288 539 while (thread_next(handle, &t) && GetTickCount() < stoptime);
10bb0dbf 540
c0722725 541 /* module walking */
10bb0dbf
RL
542 /* MODULEENTRY32 contains 9 fields that will change
543 * with each entry. Consider each field a source of
544 * 1 byte of entropy.
545 */
c0722725 546 m.dwSize = sizeof(MODULEENTRY32);
7a8c7288 547 if (good) stoptime = GetTickCount() + MAXDELAY;
c0722725
UM
548 if (module_first(handle, &m))
549 do
10bb0dbf 550 RAND_add(&m, m.dwSize, 9);
f68854b4
DSH
551 while (module_next(handle, &m)
552 && (GetTickCount() < stoptime));
88401ed4
RL
553 if (close_snap)
554 close_snap(handle);
555 else
556 CloseHandle(handle);
7a8c7288 557
c0722725 558 }
362f2b69
RL
559
560 FreeLibrary(kernel);
c0722725 561 }
573969cd 562 }
89c53672
AP
563#endif /* !OPENSSL_SYS_WINCE */
564
565 /* timer data */
566 readtimer();
567
568 /* memory usage statistics */
569 GlobalMemoryStatus(&m);
570 RAND_add(&m, sizeof(m), 1);
571
572 /* process ID */
573 w = GetCurrentProcessId();
574 RAND_add(&w, sizeof(w), 1);
c0722725 575
3e563bce 576#if 0
c0722725 577 printf("Exiting RAND_poll\n");
2ace287d
BM
578#endif
579
c0722725
UM
580 return(1);
581}
2ace287d
BM
582
583int RAND_event(UINT iMsg, WPARAM wParam, LPARAM lParam)
584 {
585 double add_entropy=0;
2ace287d
BM
586
587 switch (iMsg)
588 {
589 case WM_KEYDOWN:
590 {
591 static WPARAM key;
592 if (key != wParam)
593 add_entropy = 0.05;
594 key = wParam;
595 }
596 break;
597 case WM_MOUSEMOVE:
598 {
599 static int lastx,lasty,lastdx,lastdy;
600 int x,y,dx,dy;
601
602 x=LOWORD(lParam);
603 y=HIWORD(lParam);
604 dx=lastx-x;
605 dy=lasty-y;
606 if (dx != 0 && dy != 0 && dx-lastdx != 0 && dy-lastdy != 0)
607 add_entropy=.2;
608 lastx=x, lasty=y;
609 lastdx=dx, lastdy=dy;
610 }
611 break;
612 }
613
c0722725 614 readtimer();
2ace287d
BM
615 RAND_add(&iMsg, sizeof(iMsg), add_entropy);
616 RAND_add(&wParam, sizeof(wParam), 0);
617 RAND_add(&lParam, sizeof(lParam), 0);
c0722725 618
2ace287d
BM
619 return (RAND_status());
620 }
621
622
c0722725
UM
623void RAND_screen(void) /* function available for backward compatibility */
624{
625 RAND_poll();
573969cd 626 readscreen();
c0722725
UM
627}
628
629
630/* feed timing information to the PRNG */
631static void readtimer(void)
632{
159cf04e 633 DWORD w;
c0722725
UM
634 LARGE_INTEGER l;
635 static int have_perfc = 1;
89c53672 636#if defined(_MSC_VER) && defined(_M_X86)
c0722725 637 static int have_tsc = 1;
159cf04e 638 DWORD cyclecount;
c0722725
UM
639
640 if (have_tsc) {
641 __try {
642 __asm {
429cf462 643 _emit 0x0f
40e15f9d 644 _emit 0x31
c0722725
UM
645 mov cyclecount, eax
646 }
647 RAND_add(&cyclecount, sizeof(cyclecount), 1);
648 } __except(EXCEPTION_EXECUTE_HANDLER) {
649 have_tsc = 0;
650 }
651 }
652#else
653# define have_tsc 0
654#endif
655
656 if (have_perfc) {
657 if (QueryPerformanceCounter(&l) == 0)
658 have_perfc = 0;
659 else
660 RAND_add(&l, sizeof(l), 0);
661 }
662
663 if (!have_tsc && !have_perfc) {
664 w = GetTickCount();
665 RAND_add(&w, sizeof(w), 0);
666 }
667}
668
669/* feed screen contents to PRNG */
2ace287d 670/*****************************************************************************
2ace287d
BM
671 *
672 * Created 960901 by Gertjan van Oosten, gertjan@West.NL, West Consulting B.V.
673 *
674 * Code adapted from
c0017a5a 675 * <URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];97193>;
2ace287d
BM
676 * the original copyright message is:
677 *
678 * (C) Copyright Microsoft Corp. 1993. All rights reserved.
679 *
680 * You have a royalty-free right to use, modify, reproduce and
681 * distribute the Sample Files (and/or any modified version) in
682 * any way you find useful, provided that you agree that
683 * Microsoft has no warranty obligations or liability for any
684 * Sample Application Files which are modified.
685 */
c0722725
UM
686
687static void readscreen(void)
2ace287d 688{
130db968 689#if !defined(OPENSSL_SYS_WINCE) && !defined(OPENSSL_SYS_WIN32_CYGWIN)
2ace287d
BM
690 HDC hScrDC; /* screen DC */
691 HDC hMemDC; /* memory DC */
692 HBITMAP hBitmap; /* handle for our bitmap */
693 HBITMAP hOldBitmap; /* handle for previous bitmap */
694 BITMAP bm; /* bitmap properties */
695 unsigned int size; /* size of bitmap */
696 char *bmbits; /* contents of bitmap */
697 int w; /* screen width */
698 int h; /* screen height */
699 int y; /* y-coordinate of screen lines to grab */
700 int n = 16; /* number of screen lines to grab at a time */
701
573969cd
AP
702 if (GetVersion() >= 0x80000000 || !OPENSSL_isservice())
703 return;
704
2ace287d 705 /* Create a screen DC and a memory DC compatible to screen DC */
0bf23d9b 706 hScrDC = CreateDC(TEXT("DISPLAY"), NULL, NULL, NULL);
2ace287d
BM
707 hMemDC = CreateCompatibleDC(hScrDC);
708
709 /* Get screen resolution */
710 w = GetDeviceCaps(hScrDC, HORZRES);
711 h = GetDeviceCaps(hScrDC, VERTRES);
712
713 /* Create a bitmap compatible with the screen DC */
714 hBitmap = CreateCompatibleBitmap(hScrDC, w, n);
715
716 /* Select new bitmap into memory DC */
717 hOldBitmap = SelectObject(hMemDC, hBitmap);
718
719 /* Get bitmap properties */
720 GetObject(hBitmap, sizeof(BITMAP), (LPSTR)&bm);
721 size = (unsigned int)bm.bmWidthBytes * bm.bmHeight * bm.bmPlanes;
722
26a3a48d 723 bmbits = OPENSSL_malloc(size);
2ace287d
BM
724 if (bmbits) {
725 /* Now go through the whole screen, repeatedly grabbing n lines */
726 for (y = 0; y < h-n; y += n)
727 {
728 unsigned char md[MD_DIGEST_LENGTH];
729
730 /* Bitblt screen DC to memory DC */
731 BitBlt(hMemDC, 0, 0, w, n, hScrDC, 0, y, SRCCOPY);
732
733 /* Copy bitmap bits from memory DC to bmbits */
734 GetBitmapBits(hBitmap, size, bmbits);
735
c0722725 736 /* Get the hash of the bitmap */
2ace287d
BM
737 MD(bmbits,size,md);
738
c0722725
UM
739 /* Seed the random generator with the hash value */
740 RAND_add(md, MD_DIGEST_LENGTH, 0);
2ace287d
BM
741 }
742
26a3a48d 743 OPENSSL_free(bmbits);
2ace287d
BM
744 }
745
746 /* Select old bitmap back into memory DC */
747 hBitmap = SelectObject(hMemDC, hOldBitmap);
748
749 /* Clean up */
750 DeleteObject(hBitmap);
751 DeleteDC(hMemDC);
752 DeleteDC(hScrDC);
0bf23d9b 753#endif /* !OPENSSL_SYS_WINCE */
2ace287d
BM
754}
755
2ace287d 756#endif