]> git.ipfire.org Git - thirdparty/openssl.git/blame - crypto/rand/rand_win.c
indent has problems with comments that are on the right hand side of a line.
[thirdparty/openssl.git] / crypto / rand / rand_win.c
CommitLineData
2ace287d
BM
1/* crypto/rand/rand_win.c */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58/* ====================================================================
59 * Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved.
60 *
61 * Redistribution and use in source and binary forms, with or without
62 * modification, are permitted provided that the following conditions
63 * are met:
64 *
65 * 1. Redistributions of source code must retain the above copyright
66 * notice, this list of conditions and the following disclaimer.
67 *
68 * 2. Redistributions in binary form must reproduce the above copyright
69 * notice, this list of conditions and the following disclaimer in
70 * the documentation and/or other materials provided with the
71 * distribution.
72 *
73 * 3. All advertising materials mentioning features or use of this
74 * software must display the following acknowledgment:
75 * "This product includes software developed by the OpenSSL Project
76 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
77 *
78 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
79 * endorse or promote products derived from this software without
80 * prior written permission. For written permission, please contact
81 * openssl-core@openssl.org.
82 *
83 * 5. Products derived from this software may not be called "OpenSSL"
84 * nor may "OpenSSL" appear in their names without prior written
85 * permission of the OpenSSL Project.
86 *
87 * 6. Redistributions of any form whatsoever must retain the following
88 * acknowledgment:
89 * "This product includes software developed by the OpenSSL Project
90 * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
91 *
92 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
93 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
94 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
95 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
96 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
97 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
98 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
99 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
100 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
101 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
102 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
103 * OF THE POSSIBILITY OF SUCH DAMAGE.
104 * ====================================================================
105 *
106 * This product includes cryptographic software written by Eric Young
107 * (eay@cryptsoft.com). This product includes software written by Tim
108 * Hudson (tjh@cryptsoft.com).
109 *
110 */
111
73e45b2d 112
06b433ac 113
c0722725
UM
114#include "cryptlib.h"
115#include <openssl/rand.h>
116#include "rand_lcl.h"
2ace287d 117
7a8c7288 118#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_WIN32)
2ace287d 119#include <windows.h>
c0722725
UM
120#ifndef _WIN32_WINNT
121# define _WIN32_WINNT 0x0400
2ace287d 122#endif
c0722725
UM
123#include <wincrypt.h>
124#include <tlhelp32.h>
125
7a8c7288
UM
126/* Limit the time spent walking through the heap, processes, threads and modules to
127 a maximum of 1000 miliseconds each, unless CryptoGenRandom failed */
128#define MAXDELAY 1000
129
c0722725
UM
130/* Intel hardware RNG CSP -- available from
131 * http://developer.intel.com/design/security/rng/redist_license.htm
132 */
133#define PROV_INTEL_SEC 22
89c53672 134#define INTEL_DEF_PROV L"Intel Hardware Cryptographic Service Provider"
c0722725
UM
135
136static void readtimer(void);
137static void readscreen(void);
138
7abee0ce
RL
139/* It appears like CURSORINFO, PCURSORINFO and LPCURSORINFO are only defined
140 when WINVER is 0x0500 and up, which currently only happens on Win2000.
141 Unfortunately, those are typedefs, so they're a little bit difficult to
142 detect properly. On the other hand, the macro CURSOR_SHOWING is defined
143 within the same conditional, so it can be use to detect the absence of said
144 typedefs. */
145
c0366d89 146#ifndef CURSOR_SHOWING
7abee0ce
RL
147/*
148 * Information about the global cursor.
149 */
150typedef struct tagCURSORINFO
151{
152 DWORD cbSize;
153 DWORD flags;
154 HCURSOR hCursor;
155 POINT ptScreenPos;
156} CURSORINFO, *PCURSORINFO, *LPCURSORINFO;
157
158#define CURSOR_SHOWING 0x00000001
159#endif /* CURSOR_SHOWING */
c0366d89 160
0491e058 161#if !defined(OPENSSL_SYS_WINCE)
89c53672 162typedef BOOL (WINAPI *CRYPTACQUIRECONTEXTW)(HCRYPTPROV *, LPCWSTR, LPCWSTR,
c0722725
UM
163 DWORD, DWORD);
164typedef BOOL (WINAPI *CRYPTGENRANDOM)(HCRYPTPROV, DWORD, BYTE *);
165typedef BOOL (WINAPI *CRYPTRELEASECONTEXT)(HCRYPTPROV, DWORD);
166
167typedef HWND (WINAPI *GETFOREGROUNDWINDOW)(VOID);
168typedef BOOL (WINAPI *GETCURSORINFO)(PCURSORINFO);
169typedef DWORD (WINAPI *GETQUEUESTATUS)(UINT);
170
171typedef HANDLE (WINAPI *CREATETOOLHELP32SNAPSHOT)(DWORD, DWORD);
88401ed4 172typedef BOOL (WINAPI *CLOSETOOLHELP32SNAPSHOT)(HANDLE);
b92c0df8 173typedef BOOL (WINAPI *HEAP32FIRST)(LPHEAPENTRY32, DWORD, size_t);
c0722725
UM
174typedef BOOL (WINAPI *HEAP32NEXT)(LPHEAPENTRY32);
175typedef BOOL (WINAPI *HEAP32LIST)(HANDLE, LPHEAPLIST32);
176typedef BOOL (WINAPI *PROCESS32)(HANDLE, LPPROCESSENTRY32);
177typedef BOOL (WINAPI *THREAD32)(HANDLE, LPTHREADENTRY32);
178typedef BOOL (WINAPI *MODULE32)(HANDLE, LPMODULEENTRY32);
179
1d95fb65
RL
180#include <lmcons.h>
181#include <lmstats.h>
dbd87ffc
MC
182#if 1
183/* The NET API is Unicode only. It requires the use of the UNICODE
184 * macro. When UNICODE is defined LPTSTR becomes LPWSTR. LMSTR was
185 * was added to the Platform SDK to allow the NET API to be used in
186 * non-Unicode applications provided that Unicode strings were still
187 * used for input. LMSTR is defined as LPWSTR.
188 */
1d95fb65 189typedef NET_API_STATUS (NET_API_FUNCTION * NETSTATGET)
10bb0dbf 190 (LPWSTR, LPWSTR, DWORD, DWORD, LPBYTE*);
1d95fb65 191typedef NET_API_STATUS (NET_API_FUNCTION * NETFREE)(LPBYTE);
10bb0dbf 192#endif /* 1 */
0491e058 193#endif /* !OPENSSL_SYS_WINCE */
1d95fb65 194
c0722725
UM
195int RAND_poll(void)
196{
197 MEMORYSTATUS m;
198 HCRYPTPROV hProvider = 0;
c0722725 199 DWORD w;
7a8c7288 200 int good = 0;
c0722725 201
c0722725 202
8a35fb3b 203#if defined(OPENSSL_SYS_WINCE)
19bd66fe
AP
204# if defined(_WIN32_WCE) && _WIN32_WCE>=300
205/* Even though MSDN says _WIN32_WCE>=210, it doesn't seem to be available
206 * in commonly available implementations prior 300... */
0491e058
AP
207 {
208 BYTE buf[64];
0bf23d9b
RL
209 /* poll the CryptoAPI PRNG */
210 /* The CryptoAPI returns sizeof(buf) bytes of randomness */
0491e058
AP
211 if (CryptAcquireContextW(&hProvider, NULL, NULL, PROV_RSA_FULL,
212 CRYPT_VERIFYCONTEXT))
0bf23d9b
RL
213 {
214 if (CryptGenRandom(hProvider, sizeof(buf), buf))
215 RAND_add(buf, sizeof(buf), sizeof(buf));
216 CryptReleaseContext(hProvider, 0);
217 }
0491e058 218 }
8a35fb3b
AP
219# endif
220#else /* OPENSSL_SYS_WINCE */
89c53672
AP
221 /*
222 * None of below libraries are present on Windows CE, which is
223 * why we #ifndef the whole section. This also excuses us from
224 * handling the GetProcAddress issue. The trouble is that in
225 * real Win32 API GetProcAddress is available in ANSI flavor
226 * only. In WinCE on the other hand GetProcAddress is a macro
227 * most commonly defined as GetProcAddressW, which accepts
228 * Unicode argument. If we were to call GetProcAddress under
229 * WinCE, I'd recommend to either redefine GetProcAddress as
230 * GetProcAddressA (there seem to be one in common CE spec) or
231 * implement own shim routine, which would accept ANSI argument
232 * and expand it to Unicode.
233 */
573969cd 234 {
c0722725 235 /* load functions dynamically - not available on all systems */
573969cd
AP
236 HMODULE advapi = LoadLibrary(TEXT("ADVAPI32.DLL"));
237 HMODULE kernel = LoadLibrary(TEXT("KERNEL32.DLL"));
238 HMODULE user = NULL;
239 HMODULE netapi = LoadLibrary(TEXT("NETAPI32.DLL"));
240 CRYPTACQUIRECONTEXTW acquire = NULL;
241 CRYPTGENRANDOM gen = NULL;
242 CRYPTRELEASECONTEXT release = NULL;
243 NETSTATGET netstatget = NULL;
244 NETFREE netfree = NULL;
0491e058 245 BYTE buf[64];
573969cd 246
1d95fb65
RL
247 if (netapi)
248 {
89c53672
AP
249 netstatget = (NETSTATGET) GetProcAddress(netapi,"NetStatisticsGet");
250 netfree = (NETFREE) GetProcAddress(netapi,"NetApiBufferFree");
1d95fb65
RL
251 }
252
253 if (netstatget && netfree)
254 {
255 LPBYTE outbuf;
10bb0dbf
RL
256 /* NetStatisticsGet() is a Unicode only function
257 * STAT_WORKSTATION_0 contains 45 fields and STAT_SERVER_0
258 * contains 17 fields. We treat each field as a source of
259 * one byte of entropy.
260 */
261
1d95fb65
RL
262 if (netstatget(NULL, L"LanmanWorkstation", 0, 0, &outbuf) == 0)
263 {
10bb0dbf 264 RAND_add(outbuf, sizeof(STAT_WORKSTATION_0), 45);
1d95fb65
RL
265 netfree(outbuf);
266 }
267 if (netstatget(NULL, L"LanmanServer", 0, 0, &outbuf) == 0)
268 {
10bb0dbf 269 RAND_add(outbuf, sizeof(STAT_SERVER_0), 17);
1d95fb65
RL
270 netfree(outbuf);
271 }
272 }
273
362f2b69
RL
274 if (netapi)
275 FreeLibrary(netapi);
89c53672 276
10bb0dbf
RL
277 /* It appears like this can cause an exception deep within ADVAPI32.DLL
278 * at random times on Windows 2000. Reported by Jeffrey Altman.
279 * Only use it on NT.
280 */
c0722725
UM
281
282 if (advapi)
283 {
89c53672
AP
284 /*
285 * If it's available, then it's available in both ANSI
286 * and UNICODE flavors even in Win9x, documentation says.
287 * We favor Unicode...
288 */
289 acquire = (CRYPTACQUIRECONTEXTW) GetProcAddress(advapi,
290 "CryptAcquireContextW");
c0722725 291 gen = (CRYPTGENRANDOM) GetProcAddress(advapi,
89c53672 292 "CryptGenRandom");
c0722725 293 release = (CRYPTRELEASECONTEXT) GetProcAddress(advapi,
89c53672 294 "CryptReleaseContext");
c0722725
UM
295 }
296
297 if (acquire && gen && release)
298 {
299 /* poll the CryptoAPI PRNG */
10bb0dbf 300 /* The CryptoAPI returns sizeof(buf) bytes of randomness */
8a35fb3b 301 if (acquire(&hProvider, NULL, NULL, PROV_RSA_FULL,
c0722725
UM
302 CRYPT_VERIFYCONTEXT))
303 {
304 if (gen(hProvider, sizeof(buf), buf) != 0)
305 {
361c7f2b 306 RAND_add(buf, sizeof(buf), 0);
7a8c7288 307 good = 1;
3e563bce 308#if 0
c0722725 309 printf("randomness from PROV_RSA_FULL\n");
2ace287d 310#endif
c0722725
UM
311 }
312 release(hProvider, 0);
313 }
314
315 /* poll the Pentium PRG with CryptoAPI */
316 if (acquire(&hProvider, 0, INTEL_DEF_PROV, PROV_INTEL_SEC, 0))
317 {
318 if (gen(hProvider, sizeof(buf), buf) != 0)
319 {
10bb0dbf 320 RAND_add(buf, sizeof(buf), sizeof(buf));
7a8c7288 321 good = 1;
3e563bce 322#if 0
c0722725
UM
323 printf("randomness from PROV_INTEL_SEC\n");
324#endif
325 }
326 release(hProvider, 0);
327 }
328 }
329
362f2b69
RL
330 if (advapi)
331 FreeLibrary(advapi);
332
86d21d0b 333 if ((!check_winnt() ||
573969cd
AP
334 !OPENSSL_isservice()) &&
335 (user = LoadLibrary(TEXT("USER32.DLL"))))
c0722725
UM
336 {
337 GETCURSORINFO cursor;
338 GETFOREGROUNDWINDOW win;
848f3d40 339 GETQUEUESTATUS queue;
c0722725 340
89c53672
AP
341 win = (GETFOREGROUNDWINDOW) GetProcAddress(user, "GetForegroundWindow");
342 cursor = (GETCURSORINFO) GetProcAddress(user, "GetCursorInfo");
343 queue = (GETQUEUESTATUS) GetProcAddress(user, "GetQueueStatus");
c0722725
UM
344
345 if (win)
10bb0dbf 346 {
c0722725 347 /* window handle */
573969cd 348 HWND h = win();
c0722725 349 RAND_add(&h, sizeof(h), 0);
10bb0dbf 350 }
1d95fb65
RL
351 if (cursor)
352 {
353 /* unfortunately, its not safe to call GetCursorInfo()
354 * on NT4 even though it exists in SP3 (or SP6) and
355 * higher.
356 */
86d21d0b 357 if (check_winnt() && !check_win_minplat(5))
1d95fb65
RL
358 cursor = 0;
359 }
c0722725
UM
360 if (cursor)
361 {
362 /* cursor position */
10bb0dbf 363 /* assume 2 bytes of entropy */
1d95fb65
RL
364 CURSORINFO ci;
365 ci.cbSize = sizeof(CURSORINFO);
366 if (cursor(&ci))
10bb0dbf 367 RAND_add(&ci, ci.cbSize, 2);
848f3d40 368 }
848f3d40
RL
369
370 if (queue)
371 {
372 /* message queue status */
10bb0dbf 373 /* assume 1 byte of entropy */
848f3d40 374 w = queue(QS_ALLEVENTS);
10bb0dbf 375 RAND_add(&w, sizeof(w), 1);
c0722725 376 }
362f2b69
RL
377
378 FreeLibrary(user);
c0722725
UM
379 }
380
3a83462d
MC
381 /*-
382 * Toolhelp32 snapshot: enumerate processes, threads, modules and heap
c0722725 383 * http://msdn.microsoft.com/library/psdk/winbase/toolhelp_5pfd.htm
1d95fb65 384 * (Win 9x and 2000 only, not available on NT)
c0722725
UM
385 *
386 * This seeding method was proposed in Peter Gutmann, Software
387 * Generation of Practically Strong Random Numbers,
c0366d89 388 * http://www.usenix.org/publications/library/proceedings/sec98/gutmann.html
88401ed4 389 * revised version at http://www.cryptoengines.com/~peter/06_random.pdf
c0722725
UM
390 * (The assignment of entropy estimates below is arbitrary, but based
391 * on Peter's analysis the full poll appears to be safe. Additional
392 * interactive seeding is encouraged.)
393 */
394
395 if (kernel)
396 {
397 CREATETOOLHELP32SNAPSHOT snap;
88401ed4 398 CLOSETOOLHELP32SNAPSHOT close_snap;
c0722725
UM
399 HANDLE handle;
400
401 HEAP32FIRST heap_first;
402 HEAP32NEXT heap_next;
403 HEAP32LIST heaplist_first, heaplist_next;
404 PROCESS32 process_first, process_next;
405 THREAD32 thread_first, thread_next;
406 MODULE32 module_first, module_next;
407
408 HEAPLIST32 hlist;
409 HEAPENTRY32 hentry;
410 PROCESSENTRY32 p;
411 THREADENTRY32 t;
412 MODULEENTRY32 m;
7a6e0901 413 DWORD starttime = 0;
c0722725
UM
414
415 snap = (CREATETOOLHELP32SNAPSHOT)
89c53672 416 GetProcAddress(kernel, "CreateToolhelp32Snapshot");
88401ed4 417 close_snap = (CLOSETOOLHELP32SNAPSHOT)
89c53672
AP
418 GetProcAddress(kernel, "CloseToolhelp32Snapshot");
419 heap_first = (HEAP32FIRST) GetProcAddress(kernel, "Heap32First");
420 heap_next = (HEAP32NEXT) GetProcAddress(kernel, "Heap32Next");
421 heaplist_first = (HEAP32LIST) GetProcAddress(kernel, "Heap32ListFirst");
422 heaplist_next = (HEAP32LIST) GetProcAddress(kernel, "Heap32ListNext");
423 process_first = (PROCESS32) GetProcAddress(kernel, "Process32First");
424 process_next = (PROCESS32) GetProcAddress(kernel, "Process32Next");
425 thread_first = (THREAD32) GetProcAddress(kernel, "Thread32First");
426 thread_next = (THREAD32) GetProcAddress(kernel, "Thread32Next");
427 module_first = (MODULE32) GetProcAddress(kernel, "Module32First");
428 module_next = (MODULE32) GetProcAddress(kernel, "Module32Next");
c0722725
UM
429
430 if (snap && heap_first && heap_next && heaplist_first &&
431 heaplist_next && process_first && process_next &&
432 thread_first && thread_next && module_first &&
433 module_next && (handle = snap(TH32CS_SNAPALL,0))
88401ed4 434 != INVALID_HANDLE_VALUE)
c0722725
UM
435 {
436 /* heap list and heap walking */
10bb0dbf
RL
437 /* HEAPLIST32 contains 3 fields that will change with
438 * each entry. Consider each field a source of 1 byte
439 * of entropy.
440 * HEAPENTRY32 contains 5 fields that will change with
441 * each entry. Consider each field a source of 1 byte
442 * of entropy.
443 */
75a86fa0 444 ZeroMemory(&hlist, sizeof(HEAPLIST32));
c0722725 445 hlist.dwSize = sizeof(HEAPLIST32);
7a6e0901 446 if (good) starttime = GetTickCount();
44c8b81e 447#ifdef _MSC_VER
c0722725 448 if (heaplist_first(handle, &hlist))
75a86fa0
DSH
449 {
450 /*
451 following discussion on dev ML, exception on WinCE (or other Win
452 platform) is theoretically of unknown origin; prevent infinite
453 loop here when this theoretical case occurs; otherwise cope with
454 the expected (MSDN documented) exception-throwing behaviour of
455 Heap32Next() on WinCE.
456
457 based on patch in original message by Tanguy Fautré (2009/03/02)
458 Subject: RAND_poll() and CreateToolhelp32Snapshot() stability
459 */
460 int ex_cnt_limit = 42;
c0722725
UM
461 do
462 {
10bb0dbf 463 RAND_add(&hlist, hlist.dwSize, 3);
75a86fa0
DSH
464 __try
465 {
466 ZeroMemory(&hentry, sizeof(HEAPENTRY32));
c0722725
UM
467 hentry.dwSize = sizeof(HEAPENTRY32);
468 if (heap_first(&hentry,
469 hlist.th32ProcessID,
470 hlist.th32HeapID))
c0366d89 471 {
9f6fe8db 472 int entrycnt = 80;
c0722725
UM
473 do
474 RAND_add(&hentry,
10bb0dbf 475 hentry.dwSize, 5);
c0366d89 476 while (heap_next(&hentry)
47e0a1c3 477 && (!good || (GetTickCount()-starttime)<MAXDELAY)
c0366d89
RL
478 && --entrycnt > 0);
479 }
75a86fa0
DSH
480 }
481 __except (EXCEPTION_EXECUTE_HANDLER)
482 {
483 /* ignore access violations when walking the heap list */
484 ex_cnt_limit--;
485 }
486 } while (heaplist_next(handle, &hlist)
b3020393 487 && (!good || (GetTickCount()-starttime)<MAXDELAY)
75a86fa0
DSH
488 && ex_cnt_limit > 0);
489 }
7a8c7288 490
44c8b81e
DSH
491#else
492 if (heaplist_first(handle, &hlist))
493 {
494 do
495 {
496 RAND_add(&hlist, hlist.dwSize, 3);
497 hentry.dwSize = sizeof(HEAPENTRY32);
498 if (heap_first(&hentry,
499 hlist.th32ProcessID,
500 hlist.th32HeapID))
501 {
502 int entrycnt = 80;
503 do
504 RAND_add(&hentry,
505 hentry.dwSize, 5);
506 while (heap_next(&hentry)
507 && --entrycnt > 0);
508 }
509 } while (heaplist_next(handle, &hlist)
b3020393 510 && (!good || (GetTickCount()-starttime)<MAXDELAY));
44c8b81e
DSH
511 }
512#endif
513
c0722725 514 /* process walking */
10bb0dbf
RL
515 /* PROCESSENTRY32 contains 9 fields that will change
516 * with each entry. Consider each field a source of
517 * 1 byte of entropy.
518 */
c0722725 519 p.dwSize = sizeof(PROCESSENTRY32);
7a8c7288 520
7a6e0901 521 if (good) starttime = GetTickCount();
c0722725
UM
522 if (process_first(handle, &p))
523 do
10bb0dbf 524 RAND_add(&p, p.dwSize, 9);
b3020393 525 while (process_next(handle, &p) && (!good || (GetTickCount()-starttime)<MAXDELAY));
10bb0dbf 526
c0722725 527 /* thread walking */
10bb0dbf
RL
528 /* THREADENTRY32 contains 6 fields that will change
529 * with each entry. Consider each field a source of
530 * 1 byte of entropy.
531 */
c0722725 532 t.dwSize = sizeof(THREADENTRY32);
7a6e0901 533 if (good) starttime = GetTickCount();
c0722725
UM
534 if (thread_first(handle, &t))
535 do
10bb0dbf 536 RAND_add(&t, t.dwSize, 6);
b3020393 537 while (thread_next(handle, &t) && (!good || (GetTickCount()-starttime)<MAXDELAY));
10bb0dbf 538
c0722725 539 /* module walking */
10bb0dbf
RL
540 /* MODULEENTRY32 contains 9 fields that will change
541 * with each entry. Consider each field a source of
542 * 1 byte of entropy.
543 */
c0722725 544 m.dwSize = sizeof(MODULEENTRY32);
7a6e0901 545 if (good) starttime = GetTickCount();
c0722725
UM
546 if (module_first(handle, &m))
547 do
10bb0dbf 548 RAND_add(&m, m.dwSize, 9);
f68854b4 549 while (module_next(handle, &m)
b3020393 550 && (!good || (GetTickCount()-starttime)<MAXDELAY));
88401ed4
RL
551 if (close_snap)
552 close_snap(handle);
553 else
554 CloseHandle(handle);
7a8c7288 555
c0722725 556 }
362f2b69
RL
557
558 FreeLibrary(kernel);
c0722725 559 }
573969cd 560 }
89c53672
AP
561#endif /* !OPENSSL_SYS_WINCE */
562
563 /* timer data */
564 readtimer();
565
566 /* memory usage statistics */
567 GlobalMemoryStatus(&m);
568 RAND_add(&m, sizeof(m), 1);
569
570 /* process ID */
571 w = GetCurrentProcessId();
572 RAND_add(&w, sizeof(w), 1);
c0722725 573
3e563bce 574#if 0
c0722725 575 printf("Exiting RAND_poll\n");
2ace287d
BM
576#endif
577
c0722725
UM
578 return(1);
579}
2ace287d
BM
580
581int RAND_event(UINT iMsg, WPARAM wParam, LPARAM lParam)
582 {
583 double add_entropy=0;
2ace287d
BM
584
585 switch (iMsg)
586 {
587 case WM_KEYDOWN:
588 {
589 static WPARAM key;
590 if (key != wParam)
591 add_entropy = 0.05;
592 key = wParam;
593 }
594 break;
595 case WM_MOUSEMOVE:
596 {
597 static int lastx,lasty,lastdx,lastdy;
598 int x,y,dx,dy;
599
600 x=LOWORD(lParam);
601 y=HIWORD(lParam);
602 dx=lastx-x;
603 dy=lasty-y;
604 if (dx != 0 && dy != 0 && dx-lastdx != 0 && dy-lastdy != 0)
605 add_entropy=.2;
606 lastx=x, lasty=y;
607 lastdx=dx, lastdy=dy;
608 }
609 break;
610 }
611
c0722725 612 readtimer();
2ace287d
BM
613 RAND_add(&iMsg, sizeof(iMsg), add_entropy);
614 RAND_add(&wParam, sizeof(wParam), 0);
615 RAND_add(&lParam, sizeof(lParam), 0);
c0722725 616
2ace287d
BM
617 return (RAND_status());
618 }
619
620
c0722725
UM
621void RAND_screen(void) /* function available for backward compatibility */
622{
623 RAND_poll();
573969cd 624 readscreen();
c0722725
UM
625}
626
627
628/* feed timing information to the PRNG */
629static void readtimer(void)
630{
159cf04e 631 DWORD w;
c0722725
UM
632 LARGE_INTEGER l;
633 static int have_perfc = 1;
89c53672 634#if defined(_MSC_VER) && defined(_M_X86)
c0722725 635 static int have_tsc = 1;
159cf04e 636 DWORD cyclecount;
c0722725
UM
637
638 if (have_tsc) {
639 __try {
640 __asm {
429cf462 641 _emit 0x0f
40e15f9d 642 _emit 0x31
c0722725
UM
643 mov cyclecount, eax
644 }
645 RAND_add(&cyclecount, sizeof(cyclecount), 1);
646 } __except(EXCEPTION_EXECUTE_HANDLER) {
647 have_tsc = 0;
648 }
649 }
650#else
651# define have_tsc 0
652#endif
653
654 if (have_perfc) {
655 if (QueryPerformanceCounter(&l) == 0)
656 have_perfc = 0;
657 else
658 RAND_add(&l, sizeof(l), 0);
659 }
660
661 if (!have_tsc && !have_perfc) {
662 w = GetTickCount();
663 RAND_add(&w, sizeof(w), 0);
664 }
665}
666
667/* feed screen contents to PRNG */
2ace287d 668/*****************************************************************************
2ace287d
BM
669 *
670 * Created 960901 by Gertjan van Oosten, gertjan@West.NL, West Consulting B.V.
671 *
672 * Code adapted from
c0017a5a 673 * <URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];97193>;
2ace287d
BM
674 * the original copyright message is:
675 *
676 * (C) Copyright Microsoft Corp. 1993. All rights reserved.
677 *
678 * You have a royalty-free right to use, modify, reproduce and
679 * distribute the Sample Files (and/or any modified version) in
680 * any way you find useful, provided that you agree that
681 * Microsoft has no warranty obligations or liability for any
682 * Sample Application Files which are modified.
683 */
c0722725
UM
684
685static void readscreen(void)
2ace287d 686{
130db968 687#if !defined(OPENSSL_SYS_WINCE) && !defined(OPENSSL_SYS_WIN32_CYGWIN)
2ace287d 688 HDC hScrDC; /* screen DC */
2ace287d 689 HBITMAP hBitmap; /* handle for our bitmap */
2ace287d
BM
690 BITMAP bm; /* bitmap properties */
691 unsigned int size; /* size of bitmap */
692 char *bmbits; /* contents of bitmap */
693 int w; /* screen width */
694 int h; /* screen height */
695 int y; /* y-coordinate of screen lines to grab */
696 int n = 16; /* number of screen lines to grab at a time */
99b00fd9 697 BITMAPINFOHEADER bi; /* info about the bitmap */
2ace287d 698
a4cc3c80 699 if (check_winnt() && OPENSSL_isservice()>0)
573969cd
AP
700 return;
701
99b00fd9
JG
702 /* Get a reference to the screen DC */
703 hScrDC = GetDC(NULL);
2ace287d
BM
704
705 /* Get screen resolution */
706 w = GetDeviceCaps(hScrDC, HORZRES);
707 h = GetDeviceCaps(hScrDC, VERTRES);
708
709 /* Create a bitmap compatible with the screen DC */
710 hBitmap = CreateCompatibleBitmap(hScrDC, w, n);
711
2ace287d
BM
712 /* Get bitmap properties */
713 GetObject(hBitmap, sizeof(BITMAP), (LPSTR)&bm);
714 size = (unsigned int)bm.bmWidthBytes * bm.bmHeight * bm.bmPlanes;
715
99b00fd9
JG
716 bi.biSize = sizeof(BITMAPINFOHEADER);
717 bi.biWidth = bm.bmWidth;
718 bi.biHeight = bm.bmHeight;
719 bi.biPlanes = bm.bmPlanes;
720 bi.biBitCount = bm.bmBitsPixel;
721 bi.biCompression = BI_RGB;
722 bi.biSizeImage = 0;
723 bi.biXPelsPerMeter = 0;
724 bi.biYPelsPerMeter = 0;
725 bi.biClrUsed = 0;
726 bi.biClrImportant = 0;
727
26a3a48d 728 bmbits = OPENSSL_malloc(size);
2ace287d
BM
729 if (bmbits) {
730 /* Now go through the whole screen, repeatedly grabbing n lines */
731 for (y = 0; y < h-n; y += n)
732 {
733 unsigned char md[MD_DIGEST_LENGTH];
734
99b00fd9
JG
735 /* Copy the bits of the current line range into the buffer */
736 GetDIBits(hScrDC, hBitmap, y, n,
737 bmbits, (BITMAPINFO *)&bi, DIB_RGB_COLORS);
2ace287d 738
c0722725 739 /* Get the hash of the bitmap */
2ace287d
BM
740 MD(bmbits,size,md);
741
c0722725
UM
742 /* Seed the random generator with the hash value */
743 RAND_add(md, MD_DIGEST_LENGTH, 0);
2ace287d
BM
744 }
745
26a3a48d 746 OPENSSL_free(bmbits);
2ace287d
BM
747 }
748
2ace287d
BM
749 /* Clean up */
750 DeleteObject(hBitmap);
99b00fd9 751 ReleaseDC(NULL, hScrDC);
0bf23d9b 752#endif /* !OPENSSL_SYS_WINCE */
2ace287d
BM
753}
754
2ace287d 755#endif