1 /* crypto/rand/rand_win.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
58 /* ====================================================================
59 * Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved.
61 * Redistribution and use in source and binary forms, with or without
62 * modification, are permitted provided that the following conditions
65 * 1. Redistributions of source code must retain the above copyright
66 * notice, this list of conditions and the following disclaimer.
68 * 2. Redistributions in binary form must reproduce the above copyright
69 * notice, this list of conditions and the following disclaimer in
70 * the documentation and/or other materials provided with the
73 * 3. All advertising materials mentioning features or use of this
74 * software must display the following acknowledgment:
75 * "This product includes software developed by the OpenSSL Project
76 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
78 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
79 * endorse or promote products derived from this software without
80 * prior written permission. For written permission, please contact
81 * openssl-core@openssl.org.
83 * 5. Products derived from this software may not be called "OpenSSL"
84 * nor may "OpenSSL" appear in their names without prior written
85 * permission of the OpenSSL Project.
87 * 6. Redistributions of any form whatsoever must retain the following
89 * "This product includes software developed by the OpenSSL Project
90 * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
92 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
93 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
94 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
95 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
96 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
97 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
98 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
99 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
100 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
101 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
102 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
103 * OF THE POSSIBILITY OF SUCH DAMAGE.
104 * ====================================================================
106 * This product includes cryptographic software written by Eric Young
107 * (eay@cryptsoft.com). This product includes software written by Tim
108 * Hudson (tjh@cryptsoft.com).
112 #include "cryptlib.h"
113 #include <openssl/rand.h>
114 #include "rand_lcl.h"
116 #if defined(WINDOWS) || defined(WIN32)
119 # define _WIN32_WINNT 0x0400
121 #include <wincrypt.h>
122 #include <tlhelp32.h>
124 /* Intel hardware RNG CSP -- available from
125 * http://developer.intel.com/design/security/rng/redist_license.htm
127 #define PROV_INTEL_SEC 22
128 #define INTEL_DEF_PROV "Intel Hardware Cryptographic Service Provider"
130 static void readtimer(void);
131 static void readscreen(void);
133 /* It appears like CURSORINFO, PCURSORINFO and LPCURSORINFO are only defined
134 when WINVER is 0x0500 and up, which currently only happens on Win2000.
135 Unfortunately, those are typedefs, so they're a little bit difficult to
136 detect properly. On the other hand, the macro CURSOR_SHOWING is defined
137 within the same conditional, so it can be use to detect the absence of said
140 #ifndef CURSOR_SHOWING
142 * Information about the global cursor.
144 typedef struct tagCURSORINFO
150 } CURSORINFO, *PCURSORINFO, *LPCURSORINFO;
152 #define CURSOR_SHOWING 0x00000001
153 #endif /* CURSOR_SHOWING */
155 typedef BOOL (WINAPI *CRYPTACQUIRECONTEXT)(HCRYPTPROV *, LPCTSTR, LPCTSTR,
157 typedef BOOL (WINAPI *CRYPTGENRANDOM)(HCRYPTPROV, DWORD, BYTE *);
158 typedef BOOL (WINAPI *CRYPTRELEASECONTEXT)(HCRYPTPROV, DWORD);
160 typedef HWND (WINAPI *GETFOREGROUNDWINDOW)(VOID);
161 typedef BOOL (WINAPI *GETCURSORINFO)(PCURSORINFO);
162 typedef DWORD (WINAPI *GETQUEUESTATUS)(UINT);
164 typedef HANDLE (WINAPI *CREATETOOLHELP32SNAPSHOT)(DWORD, DWORD);
165 typedef BOOL (WINAPI *HEAP32FIRST)(LPHEAPENTRY32, DWORD, DWORD);
166 typedef BOOL (WINAPI *HEAP32NEXT)(LPHEAPENTRY32);
167 typedef BOOL (WINAPI *HEAP32LIST)(HANDLE, LPHEAPLIST32);
168 typedef BOOL (WINAPI *PROCESS32)(HANDLE, LPPROCESSENTRY32);
169 typedef BOOL (WINAPI *THREAD32)(HANDLE, LPTHREADENTRY32);
170 typedef BOOL (WINAPI *MODULE32)(HANDLE, LPMODULEENTRY32);
174 #if 1 /* The NET API is Unicode only. It requires the use of the UNICODE
175 * macro. When UNICODE is defined LPTSTR becomes LPWSTR. LMSTR was
176 * was added to the Platform SDK to allow the NET API to be used in
177 * non-Unicode applications provided that Unicode strings were still
178 * used for input. LMSTR is defined as LPWSTR.
180 typedef NET_API_STATUS (NET_API_FUNCTION * NETSTATGET)
181 (LPWSTR, LPWSTR, DWORD, DWORD, LPBYTE*);
182 typedef NET_API_STATUS (NET_API_FUNCTION * NETFREE)(LPBYTE);
188 HCRYPTPROV hProvider = 0;
193 HMODULE advapi, kernel, user, netapi;
194 CRYPTACQUIRECONTEXT acquire = 0;
195 CRYPTGENRANDOM gen = 0;
196 CRYPTRELEASECONTEXT release = 0;
197 #if 1 /* There was previously a problem with NETSTATGET. Currently, this
198 * section is still experimental, but if all goes well, this conditional
201 NETSTATGET netstatget = 0;
205 /* Determine the OS version we are on so we can turn off things
206 * that do not work properly.
208 OSVERSIONINFO osverinfo ;
209 osverinfo.dwOSVersionInfoSize = sizeof(OSVERSIONINFO) ;
210 GetVersionEx( &osverinfo ) ;
212 /* load functions dynamically - not available on all systems */
213 advapi = LoadLibrary("ADVAPI32.DLL");
214 kernel = LoadLibrary("KERNEL32.DLL");
215 user = LoadLibrary("USER32.DLL");
216 netapi = LoadLibrary("NETAPI32.DLL");
218 #if 1 /* There was previously a problem with NETSTATGET. Currently, this
219 * section is still experimental, but if all goes well, this conditional
224 netstatget = (NETSTATGET) GetProcAddress(netapi,"NetStatisticsGet");
225 netfree = (NETFREE) GetProcAddress(netapi,"NetApiBufferFree");
228 if (netstatget && netfree)
231 /* NetStatisticsGet() is a Unicode only function
232 * STAT_WORKSTATION_0 contains 45 fields and STAT_SERVER_0
233 * contains 17 fields. We treat each field as a source of
234 * one byte of entropy.
237 if (netstatget(NULL, L"LanmanWorkstation", 0, 0, &outbuf) == 0)
239 RAND_add(outbuf, sizeof(STAT_WORKSTATION_0), 45);
242 if (netstatget(NULL, L"LanmanServer", 0, 0, &outbuf) == 0)
244 RAND_add(outbuf, sizeof(STAT_SERVER_0), 17);
253 /* It appears like this can cause an exception deep within ADVAPI32.DLL
254 * at random times on Windows 2000. Reported by Jeffrey Altman.
257 if ( osverinfo.dwPlatformId == VER_PLATFORM_WIN32_NT &&
258 osverinfo.dwMajorVersion < 5)
260 /* Read Performance Statistics from NT/2000 registry
261 * The size of the performance data can vary from call
262 * to call so we must guess the size of the buffer to use
263 * and increase its size if we get an ERROR_MORE_DATA
264 * return instead of ERROR_SUCCESS.
266 LONG rc=ERROR_MORE_DATA;
271 while (rc == ERROR_MORE_DATA)
273 buf = realloc(buf,bufsz+8192);
279 rc = RegQueryValueEx(HKEY_PERFORMANCE_DATA, "Global",
280 NULL, NULL, buf, &length);
282 if (rc == ERROR_SUCCESS)
284 /* For entropy count assume only least significant
285 * byte of each DWORD is random.
287 RAND_add(&length, sizeof(length), 0);
288 RAND_add(buf, length, length / 4.0);
296 acquire = (CRYPTACQUIRECONTEXT) GetProcAddress(advapi,
297 "CryptAcquireContextA");
298 gen = (CRYPTGENRANDOM) GetProcAddress(advapi,
300 release = (CRYPTRELEASECONTEXT) GetProcAddress(advapi,
301 "CryptReleaseContext");
304 if (acquire && gen && release)
306 /* poll the CryptoAPI PRNG */
307 /* The CryptoAPI returns sizeof(buf) bytes of randomness */
308 if (acquire(&hProvider, 0, 0, PROV_RSA_FULL,
309 CRYPT_VERIFYCONTEXT))
311 if (gen(hProvider, sizeof(buf), buf) != 0)
313 RAND_add(buf, sizeof(buf), sizeof(buf));
315 printf("randomness from PROV_RSA_FULL\n");
318 release(hProvider, 0);
321 /* poll the Pentium PRG with CryptoAPI */
322 if (acquire(&hProvider, 0, INTEL_DEF_PROV, PROV_INTEL_SEC, 0))
324 if (gen(hProvider, sizeof(buf), buf) != 0)
326 RAND_add(buf, sizeof(buf), sizeof(buf));
328 printf("randomness from PROV_INTEL_SEC\n");
331 release(hProvider, 0);
341 /* memory usage statistics */
342 GlobalMemoryStatus(&m);
343 RAND_add(&m, sizeof(m), 1);
346 w = GetCurrentProcessId();
347 RAND_add(&w, sizeof(w), 1);
351 GETCURSORINFO cursor;
352 GETFOREGROUNDWINDOW win;
353 GETQUEUESTATUS queue;
355 win = (GETFOREGROUNDWINDOW) GetProcAddress(user, "GetForegroundWindow");
356 cursor = (GETCURSORINFO) GetProcAddress(user, "GetCursorInfo");
357 queue = (GETQUEUESTATUS) GetProcAddress(user, "GetQueueStatus");
363 RAND_add(&h, sizeof(h), 0);
367 /* unfortunately, its not safe to call GetCursorInfo()
368 * on NT4 even though it exists in SP3 (or SP6) and
371 if ( osverinfo.dwPlatformId == VER_PLATFORM_WIN32_NT &&
372 osverinfo.dwMajorVersion < 5)
377 /* cursor position */
378 /* assume 2 bytes of entropy */
380 ci.cbSize = sizeof(CURSORINFO);
382 RAND_add(&ci, ci.cbSize, 2);
387 /* message queue status */
388 /* assume 1 byte of entropy */
389 w = queue(QS_ALLEVENTS);
390 RAND_add(&w, sizeof(w), 1);
396 /* Toolhelp32 snapshot: enumerate processes, threads, modules and heap
397 * http://msdn.microsoft.com/library/psdk/winbase/toolhelp_5pfd.htm
398 * (Win 9x and 2000 only, not available on NT)
400 * This seeding method was proposed in Peter Gutmann, Software
401 * Generation of Practically Strong Random Numbers,
402 * http://www.usenix.org/publications/library/proceedings/sec98/gutmann.html
403 * revised version at http://www.cryptoengines.com/~peter/06_random.pdf
404 * (The assignment of entropy estimates below is arbitrary, but based
405 * on Peter's analysis the full poll appears to be safe. Additional
406 * interactive seeding is encouraged.)
411 CREATETOOLHELP32SNAPSHOT snap;
414 HEAP32FIRST heap_first;
415 HEAP32NEXT heap_next;
416 HEAP32LIST heaplist_first, heaplist_next;
417 PROCESS32 process_first, process_next;
418 THREAD32 thread_first, thread_next;
419 MODULE32 module_first, module_next;
427 snap = (CREATETOOLHELP32SNAPSHOT)
428 GetProcAddress(kernel, "CreateToolhelp32Snapshot");
429 heap_first = (HEAP32FIRST) GetProcAddress(kernel, "Heap32First");
430 heap_next = (HEAP32NEXT) GetProcAddress(kernel, "Heap32Next");
431 heaplist_first = (HEAP32LIST) GetProcAddress(kernel, "Heap32ListFirst");
432 heaplist_next = (HEAP32LIST) GetProcAddress(kernel, "Heap32ListNext");
433 process_first = (PROCESS32) GetProcAddress(kernel, "Process32First");
434 process_next = (PROCESS32) GetProcAddress(kernel, "Process32Next");
435 thread_first = (THREAD32) GetProcAddress(kernel, "Thread32First");
436 thread_next = (THREAD32) GetProcAddress(kernel, "Thread32Next");
437 module_first = (MODULE32) GetProcAddress(kernel, "Module32First");
438 module_next = (MODULE32) GetProcAddress(kernel, "Module32Next");
440 if (snap && heap_first && heap_next && heaplist_first &&
441 heaplist_next && process_first && process_next &&
442 thread_first && thread_next && module_first &&
443 module_next && (handle = snap(TH32CS_SNAPALL,0))
446 /* heap list and heap walking */
447 /* HEAPLIST32 contains 3 fields that will change with
448 * each entry. Consider each field a source of 1 byte
450 * HEAPENTRY32 contains 5 fields that will change with
451 * each entry. Consider each field a source of 1 byte
454 hlist.dwSize = sizeof(HEAPLIST32);
455 if (heaplist_first(handle, &hlist))
458 RAND_add(&hlist, hlist.dwSize, 3);
459 hentry.dwSize = sizeof(HEAPENTRY32);
460 if (heap_first(&hentry,
468 while (heap_next(&hentry)
471 } while (heaplist_next(handle,
474 /* process walking */
475 /* PROCESSENTRY32 contains 9 fields that will change
476 * with each entry. Consider each field a source of
479 p.dwSize = sizeof(PROCESSENTRY32);
480 if (process_first(handle, &p))
482 RAND_add(&p, p.dwSize, 9);
483 while (process_next(handle, &p));
486 /* THREADENTRY32 contains 6 fields that will change
487 * with each entry. Consider each field a source of
490 t.dwSize = sizeof(THREADENTRY32);
491 if (thread_first(handle, &t))
493 RAND_add(&t, t.dwSize, 6);
494 while (thread_next(handle, &t));
497 /* MODULEENTRY32 contains 9 fields that will change
498 * with each entry. Consider each field a source of
501 m.dwSize = sizeof(MODULEENTRY32);
502 if (module_first(handle, &m))
504 RAND_add(&m, m.dwSize, 9);
505 while (module_next(handle, &m));
514 printf("Exiting RAND_poll\n");
520 int RAND_event(UINT iMsg, WPARAM wParam, LPARAM lParam)
522 double add_entropy=0;
536 static int lastx,lasty,lastdx,lastdy;
543 if (dx != 0 && dy != 0 && dx-lastdx != 0 && dy-lastdy != 0)
546 lastdx=dx, lastdy=dy;
552 RAND_add(&iMsg, sizeof(iMsg), add_entropy);
553 RAND_add(&wParam, sizeof(wParam), 0);
554 RAND_add(&lParam, sizeof(lParam), 0);
556 return (RAND_status());
560 void RAND_screen(void) /* function available for backward compatibility */
567 /* feed timing information to the PRNG */
568 static void readtimer(void)
572 static int have_perfc = 1;
574 static int have_tsc = 1;
584 RAND_add(&cyclecount, sizeof(cyclecount), 1);
585 } __except(EXCEPTION_EXECUTE_HANDLER) {
594 if (QueryPerformanceCounter(&l) == 0)
597 RAND_add(&l, sizeof(l), 0);
600 if (!have_tsc && !have_perfc) {
602 RAND_add(&w, sizeof(w), 0);
606 /* feed screen contents to PRNG */
607 /*****************************************************************************
609 * Created 960901 by Gertjan van Oosten, gertjan@West.NL, West Consulting B.V.
612 * <URL:http://www.microsoft.com/kb/developr/win_dk/q97193.htm>;
613 * the original copyright message is:
615 * (C) Copyright Microsoft Corp. 1993. All rights reserved.
617 * You have a royalty-free right to use, modify, reproduce and
618 * distribute the Sample Files (and/or any modified version) in
619 * any way you find useful, provided that you agree that
620 * Microsoft has no warranty obligations or liability for any
621 * Sample Application Files which are modified.
624 static void readscreen(void)
626 HDC hScrDC; /* screen DC */
627 HDC hMemDC; /* memory DC */
628 HBITMAP hBitmap; /* handle for our bitmap */
629 HBITMAP hOldBitmap; /* handle for previous bitmap */
630 BITMAP bm; /* bitmap properties */
631 unsigned int size; /* size of bitmap */
632 char *bmbits; /* contents of bitmap */
633 int w; /* screen width */
634 int h; /* screen height */
635 int y; /* y-coordinate of screen lines to grab */
636 int n = 16; /* number of screen lines to grab at a time */
638 /* Create a screen DC and a memory DC compatible to screen DC */
639 hScrDC = CreateDC("DISPLAY", NULL, NULL, NULL);
640 hMemDC = CreateCompatibleDC(hScrDC);
642 /* Get screen resolution */
643 w = GetDeviceCaps(hScrDC, HORZRES);
644 h = GetDeviceCaps(hScrDC, VERTRES);
646 /* Create a bitmap compatible with the screen DC */
647 hBitmap = CreateCompatibleBitmap(hScrDC, w, n);
649 /* Select new bitmap into memory DC */
650 hOldBitmap = SelectObject(hMemDC, hBitmap);
652 /* Get bitmap properties */
653 GetObject(hBitmap, sizeof(BITMAP), (LPSTR)&bm);
654 size = (unsigned int)bm.bmWidthBytes * bm.bmHeight * bm.bmPlanes;
656 bmbits = OPENSSL_malloc(size);
658 /* Now go through the whole screen, repeatedly grabbing n lines */
659 for (y = 0; y < h-n; y += n)
661 unsigned char md[MD_DIGEST_LENGTH];
663 /* Bitblt screen DC to memory DC */
664 BitBlt(hMemDC, 0, 0, w, n, hScrDC, 0, y, SRCCOPY);
666 /* Copy bitmap bits from memory DC to bmbits */
667 GetBitmapBits(hBitmap, size, bmbits);
669 /* Get the hash of the bitmap */
672 /* Seed the random generator with the hash value */
673 RAND_add(md, MD_DIGEST_LENGTH, 0);
676 OPENSSL_free(bmbits);
679 /* Select old bitmap back into memory DC */
680 hBitmap = SelectObject(hMemDC, hOldBitmap);
683 DeleteObject(hBitmap);
688 #else /* Unix version */
695 pid_t curr_pid = getpid();
701 /* Use a random entropy pool device. Linux, FreeBSD and OpenBSD
702 * have this. Use /dev/urandom if you can as /dev/random may block
703 * if it runs out of random entries. */
705 if ((fh = fopen(DEVRANDOM, "r")) != NULL)
707 unsigned char tmpbuf[ENTROPY_NEEDED];
710 setvbuf(fh, NULL, _IONBF, 0);
711 n=fread((unsigned char *)tmpbuf,1,ENTROPY_NEEDED,fh);
713 RAND_add(tmpbuf,sizeof tmpbuf,n);
718 /* put in some default random data, we need more than just this */
720 RAND_add(&l,sizeof(l),0);
722 RAND_add(&l,sizeof(l),0);
725 RAND_add(&l,sizeof(l),0);