1/* crypto/rand/rand_win.c */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to.  The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 *    notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 *    notice, this list of conditions and the following disclaimer in the
30 *    documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 *    must display the following acknowledgement:
33 *    "This product includes cryptographic software written by
34 *     Eric Young (eay@cryptsoft.com)"
35 *    The word 'cryptographic' can be left out if the rouines from the library
36 *    being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 *    the apps directory (application code) you must include an acknowledgement:
39 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed.  i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58/* ====================================================================
59 * Copyright (c) 1998-2000 The OpenSSL Project.  All rights reserved.
60 *
61 * Redistribution and use in source and binary forms, with or without
62 * modification, are permitted provided that the following conditions
63 * are met:
64 *
65 * 1. Redistributions of source code must retain the above copyright
66 *    notice, this list of conditions and the following disclaimer.
67 *
68 * 2. Redistributions in binary form must reproduce the above copyright
69 *    notice, this list of conditions and the following disclaimer in
70 *    the documentation and/or other materials provided with the
71 *    distribution.
72 *
73 * 3. All advertising materials mentioning features or use of this
74 *    software must display the following acknowledgment:
75 *    "This product includes software developed by the OpenSSL Project
76 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
77 *
78 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
79 *    endorse or promote products derived from this software without
80 *    prior written permission. For written permission, please contact
81 *    openssl-core@openssl.org.
82 *
83 * 5. Products derived from this software may not be called "OpenSSL"
84 *    nor may "OpenSSL" appear in their names without prior written
85 *    permission of the OpenSSL Project.
86 *
87 * 6. Redistributions of any form whatsoever must retain the following
88 *    acknowledgment:
89 *    "This product includes software developed by the OpenSSL Project
90 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
91 *
92 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
93 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
94 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
95 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
96 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
97 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
98 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
99 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
100 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
101 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
102 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
103 * OF THE POSSIBILITY OF SUCH DAMAGE.
104 * ====================================================================
105 *
106 * This product includes cryptographic software written by Eric Young
107 * (eay@cryptsoft.com).  This product includes software written by Tim
108 * Hudson (tjh@cryptsoft.com).
109 *
110 */
111
112#include "cryptlib.h"
113#include <openssl/rand.h>
114#include "rand_lcl.h"
115
116#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_WIN32)
117#include <windows.h>
118#ifndef _WIN32_WINNT
119# define _WIN32_WINNT 0x0400
120#endif
121#include <wincrypt.h>
122#include <tlhelp32.h>
123
124/* Limit the time spent walking through the heap, processes, threads and modules to
125   a maximum of 1000 miliseconds each, unless CryptoGenRandom failed */
126#define MAXDELAY 1000
127
128/* Intel hardware RNG CSP -- available from
129 * http://developer.intel.com/design/security/rng/redist_license.htm
130 */
131#define PROV_INTEL_SEC 22
132#define INTEL_DEF_PROV L"Intel Hardware Cryptographic Service Provider"
133
134static void readtimer(void);
135static void readscreen(void);
136
137/* It appears like CURSORINFO, PCURSORINFO and LPCURSORINFO are only defined
138   when WINVER is 0x0500 and up, which currently only happens on Win2000.
139   Unfortunately, those are typedefs, so they're a little bit difficult to
140   detect properly.  On the other hand, the macro CURSOR_SHOWING is defined
141   within the same conditional, so it can be use to detect the absence of said
142   typedefs. */
143
144#ifndef CURSOR_SHOWING
145/*
146 * Information about the global cursor.
147 */
148typedef struct tagCURSORINFO
149{
150    DWORD   cbSize;
151    DWORD   flags;
152    HCURSOR hCursor;
153    POINT   ptScreenPos;
154} CURSORINFO, *PCURSORINFO, *LPCURSORINFO;
155
156#define CURSOR_SHOWING     0x00000001
157#endif /* CURSOR_SHOWING */
158
159#if !defined(OPENSSL_SYS_WINCE)
160typedef BOOL (WINAPI *CRYPTACQUIRECONTEXTW)(HCRYPTPROV *, LPCWSTR, LPCWSTR,
161				    DWORD, DWORD);
162typedef BOOL (WINAPI *CRYPTGENRANDOM)(HCRYPTPROV, DWORD, BYTE *);
163typedef BOOL (WINAPI *CRYPTRELEASECONTEXT)(HCRYPTPROV, DWORD);
164
165typedef HWND (WINAPI *GETFOREGROUNDWINDOW)(VOID);
166typedef BOOL (WINAPI *GETCURSORINFO)(PCURSORINFO);
167typedef DWORD (WINAPI *GETQUEUESTATUS)(UINT);
168
169typedef HANDLE (WINAPI *CREATETOOLHELP32SNAPSHOT)(DWORD, DWORD);
170typedef BOOL (WINAPI *CLOSETOOLHELP32SNAPSHOT)(HANDLE);
171typedef BOOL (WINAPI *HEAP32FIRST)(LPHEAPENTRY32, DWORD, size_t);
172typedef BOOL (WINAPI *HEAP32NEXT)(LPHEAPENTRY32);
173typedef BOOL (WINAPI *HEAP32LIST)(HANDLE, LPHEAPLIST32);
174typedef BOOL (WINAPI *PROCESS32)(HANDLE, LPPROCESSENTRY32);
175typedef BOOL (WINAPI *THREAD32)(HANDLE, LPTHREADENTRY32);
176typedef BOOL (WINAPI *MODULE32)(HANDLE, LPMODULEENTRY32);
177
178#include <lmcons.h>
179#include <lmstats.h>
180#if 1 /* The NET API is Unicode only.  It requires the use of the UNICODE
181       * macro.  When UNICODE is defined LPTSTR becomes LPWSTR.  LMSTR was
182       * was added to the Platform SDK to allow the NET API to be used in
183       * non-Unicode applications provided that Unicode strings were still
184       * used for input.  LMSTR is defined as LPWSTR.
185       */
186typedef NET_API_STATUS (NET_API_FUNCTION * NETSTATGET)
187        (LPWSTR, LPWSTR, DWORD, DWORD, LPBYTE*);
188typedef NET_API_STATUS (NET_API_FUNCTION * NETFREE)(LPBYTE);
189#endif /* 1 */
190#endif /* !OPENSSL_SYS_WINCE */
191
192int RAND_poll(void)
193{
194	MEMORYSTATUS m;
195	HCRYPTPROV hProvider = 0;
196	DWORD w;
197	int good = 0;
198
199	/* Determine the OS version we are on so we can turn off things
200	 * that do not work properly.
201	 */
202        OSVERSIONINFO osverinfo ;
203        osverinfo.dwOSVersionInfoSize = sizeof(OSVERSIONINFO) ;
204        GetVersionEx( &osverinfo ) ;
205
206#if defined(OPENSSL_SYS_WINCE)
207# if defined(_WIN32_WCE) && _WIN32_WCE>=300
208/* Even though MSDN says _WIN32_WCE>=210, it doesn't seem to be available
209 * in commonly available implementations prior 300... */
210	{
211	BYTE buf[64];
212	/* poll the CryptoAPI PRNG */
213	/* The CryptoAPI returns sizeof(buf) bytes of randomness */
214	if (CryptAcquireContextW(&hProvider, NULL, NULL, PROV_RSA_FULL,
215				CRYPT_VERIFYCONTEXT))
216		{
217		if (CryptGenRandom(hProvider, sizeof(buf), buf))
218			RAND_add(buf, sizeof(buf), sizeof(buf));
219		CryptReleaseContext(hProvider, 0);
220		}
221	}
222# endif
223#else	/* OPENSSL_SYS_WINCE */
224	/*
225	 * None of below libraries are present on Windows CE, which is
226	 * why we #ifndef the whole section. This also excuses us from
227	 * handling the GetProcAddress issue. The trouble is that in
228	 * real Win32 API GetProcAddress is available in ANSI flavor
229	 * only. In WinCE on the other hand GetProcAddress is a macro
230	 * most commonly defined as GetProcAddressW, which accepts
231	 * Unicode argument. If we were to call GetProcAddress under
232	 * WinCE, I'd recommend to either redefine GetProcAddress as
233	 * GetProcAddressA (there seem to be one in common CE spec) or
234	 * implement own shim routine, which would accept ANSI argument
235	 * and expand it to Unicode.
236	 */
237	{
238	/* load functions dynamically - not available on all systems */
239	HMODULE advapi = LoadLibrary(TEXT("ADVAPI32.DLL"));
240	HMODULE kernel = LoadLibrary(TEXT("KERNEL32.DLL"));
241	HMODULE user = NULL;
242	HMODULE netapi = LoadLibrary(TEXT("NETAPI32.DLL"));
243	CRYPTACQUIRECONTEXTW acquire = NULL;
244	CRYPTGENRANDOM gen = NULL;
245	CRYPTRELEASECONTEXT release = NULL;
246	NETSTATGET netstatget = NULL;
247	NETFREE netfree = NULL;
248	BYTE buf[64];
249
250	if (netapi)
251		{
252		netstatget = (NETSTATGET) GetProcAddress(netapi,"NetStatisticsGet");
253		netfree = (NETFREE) GetProcAddress(netapi,"NetApiBufferFree");
254		}
255
256	if (netstatget && netfree)
257		{
258		LPBYTE outbuf;
259		/* NetStatisticsGet() is a Unicode only function
260 		 * STAT_WORKSTATION_0 contains 45 fields and STAT_SERVER_0
261		 * contains 17 fields.  We treat each field as a source of
262		 * one byte of entropy.
263                 */
264
265		if (netstatget(NULL, L"LanmanWorkstation", 0, 0, &outbuf) == 0)
266			{
267			RAND_add(outbuf, sizeof(STAT_WORKSTATION_0), 45);
268			netfree(outbuf);
269			}
270		if (netstatget(NULL, L"LanmanServer", 0, 0, &outbuf) == 0)
271			{
272			RAND_add(outbuf, sizeof(STAT_SERVER_0), 17);
273			netfree(outbuf);
274			}
275		}
276
277	if (netapi)
278		FreeLibrary(netapi);
279
280        /* It appears like this can cause an exception deep within ADVAPI32.DLL
281         * at random times on Windows 2000.  Reported by Jeffrey Altman.
282         * Only use it on NT.
283	 */
284	/* Wolfgang Marczy <WMarczy@topcall.co.at> reports that
285	 * the RegQueryValueEx call below can hang on NT4.0 (SP6).
286	 * So we don't use this at all for now. */
287#if 0
288        if ( osverinfo.dwPlatformId == VER_PLATFORM_WIN32_NT &&
289		osverinfo.dwMajorVersion < 5)
290		{
291		/* Read Performance Statistics from NT/2000 registry
292		 * The size of the performance data can vary from call
293		 * to call so we must guess the size of the buffer to use
294		 * and increase its size if we get an ERROR_MORE_DATA
295		 * return instead of ERROR_SUCCESS.
296		 */
297		LONG   rc=ERROR_MORE_DATA;
298		char * buf=NULL;
299		DWORD bufsz=0;
300		DWORD length;
301
302		while (rc == ERROR_MORE_DATA)
303			{
304			buf = realloc(buf,bufsz+8192);
305			if (!buf)
306				break;
307			bufsz += 8192;
308
309			length = bufsz;
310			rc = RegQueryValueEx(HKEY_PERFORMANCE_DATA, TEXT("Global"),
311				NULL, NULL, buf, &length);
312			}
313		if (rc == ERROR_SUCCESS)
314			{
315                        /* For entropy count assume only least significant
316			 * byte of each DWORD is random.
317			 */
318			RAND_add(&length, sizeof(length), 0);
319			RAND_add(buf, length, length / 4.0);
320
321			/* Close the Registry Key to allow Windows to cleanup/close
322			 * the open handle
323			 * Note: The 'HKEY_PERFORMANCE_DATA' key is implicitly opened
324			 *       when the RegQueryValueEx above is done.  However, if
325			 *       it is not explicitly closed, it can cause disk
326			 *       partition manipulation problems.
327			 */
328			RegCloseKey(HKEY_PERFORMANCE_DATA);
329			}
330		if (buf)
331			free(buf);
332		}
333#endif
334
335	if (advapi)
336		{
337		/*
338		 * If it's available, then it's available in both ANSI
339		 * and UNICODE flavors even in Win9x, documentation says.
340		 * We favor Unicode...
341		 */
342		acquire = (CRYPTACQUIRECONTEXTW) GetProcAddress(advapi,
343			"CryptAcquireContextW");
344		gen = (CRYPTGENRANDOM) GetProcAddress(advapi,
345			"CryptGenRandom");
346		release = (CRYPTRELEASECONTEXT) GetProcAddress(advapi,
347			"CryptReleaseContext");
348		}
349
350	if (acquire && gen && release)
351		{
352		/* poll the CryptoAPI PRNG */
353                /* The CryptoAPI returns sizeof(buf) bytes of randomness */
354		if (acquire(&hProvider, NULL, NULL, PROV_RSA_FULL,
355			CRYPT_VERIFYCONTEXT))
356			{
357			if (gen(hProvider, sizeof(buf), buf) != 0)
358				{
359				RAND_add(buf, sizeof(buf), 0);
360				good = 1;
361#if 0
362				printf("randomness from PROV_RSA_FULL\n");
363#endif
364				}
365			release(hProvider, 0);
366			}
367
368		/* poll the Pentium PRG with CryptoAPI */
369		if (acquire(&hProvider, 0, INTEL_DEF_PROV, PROV_INTEL_SEC, 0))
370			{
371			if (gen(hProvider, sizeof(buf), buf) != 0)
372				{
373				RAND_add(buf, sizeof(buf), sizeof(buf));
374				good = 1;
375#if 0
376				printf("randomness from PROV_INTEL_SEC\n");
377#endif
378				}
379			release(hProvider, 0);
380			}
381		}
382
383        if (advapi)
384		FreeLibrary(advapi);
385
386	if ((osverinfo.dwPlatformId != VER_PLATFORM_WIN32_NT ||
387	     !OPENSSL_isservice()) &&
388	    (user = LoadLibrary(TEXT("USER32.DLL"))))
389		{
390		GETCURSORINFO cursor;
391		GETFOREGROUNDWINDOW win;
392		GETQUEUESTATUS queue;
393
394		win = (GETFOREGROUNDWINDOW) GetProcAddress(user, "GetForegroundWindow");
395		cursor = (GETCURSORINFO) GetProcAddress(user, "GetCursorInfo");
396		queue = (GETQUEUESTATUS) GetProcAddress(user, "GetQueueStatus");
397
398		if (win)
399			{
400			/* window handle */
401			HWND h = win();
402			RAND_add(&h, sizeof(h), 0);
403			}
404		if (cursor)
405			{
406			/* unfortunately, its not safe to call GetCursorInfo()
407			 * on NT4 even though it exists in SP3 (or SP6) and
408			 * higher.
409			 */
410			if ( osverinfo.dwPlatformId == VER_PLATFORM_WIN32_NT &&
411				osverinfo.dwMajorVersion < 5)
412				cursor = 0;
413			}
414		if (cursor)
415			{
416			/* cursor position */
417                        /* assume 2 bytes of entropy */
418			CURSORINFO ci;
419			ci.cbSize = sizeof(CURSORINFO);
420			if (cursor(&ci))
421				RAND_add(&ci, ci.cbSize, 2);
422			}
423
424		if (queue)
425			{
426			/* message queue status */
427                        /* assume 1 byte of entropy */
428			w = queue(QS_ALLEVENTS);
429			RAND_add(&w, sizeof(w), 1);
430			}
431
432		FreeLibrary(user);
433		}
434
435	/* Toolhelp32 snapshot: enumerate processes, threads, modules and heap
436	 * http://msdn.microsoft.com/library/psdk/winbase/toolhelp_5pfd.htm
437	 * (Win 9x and 2000 only, not available on NT)
438	 *
439	 * This seeding method was proposed in Peter Gutmann, Software
440	 * Generation of Practically Strong Random Numbers,
441	 * http://www.usenix.org/publications/library/proceedings/sec98/gutmann.html
442	 * revised version at http://www.cryptoengines.com/~peter/06_random.pdf
443	 * (The assignment of entropy estimates below is arbitrary, but based
444	 * on Peter's analysis the full poll appears to be safe. Additional
445	 * interactive seeding is encouraged.)
446	 */
447
448	if (kernel)
449		{
450		CREATETOOLHELP32SNAPSHOT snap;
451		CLOSETOOLHELP32SNAPSHOT close_snap;
452		HANDLE handle;
453
454		HEAP32FIRST heap_first;
455		HEAP32NEXT heap_next;
456		HEAP32LIST heaplist_first, heaplist_next;
457		PROCESS32 process_first, process_next;
458		THREAD32 thread_first, thread_next;
459		MODULE32 module_first, module_next;
460
461		HEAPLIST32 hlist;
462		HEAPENTRY32 hentry;
463		PROCESSENTRY32 p;
464		THREADENTRY32 t;
465		MODULEENTRY32 m;
466		DWORD starttime = 0;
467
468		snap = (CREATETOOLHELP32SNAPSHOT)
469			GetProcAddress(kernel, "CreateToolhelp32Snapshot");
470		close_snap = (CLOSETOOLHELP32SNAPSHOT)
471			GetProcAddress(kernel, "CloseToolhelp32Snapshot");
472		heap_first = (HEAP32FIRST) GetProcAddress(kernel, "Heap32First");
473		heap_next = (HEAP32NEXT) GetProcAddress(kernel, "Heap32Next");
474		heaplist_first = (HEAP32LIST) GetProcAddress(kernel, "Heap32ListFirst");
475		heaplist_next = (HEAP32LIST) GetProcAddress(kernel, "Heap32ListNext");
476		process_first = (PROCESS32) GetProcAddress(kernel, "Process32First");
477		process_next = (PROCESS32) GetProcAddress(kernel, "Process32Next");
478		thread_first = (THREAD32) GetProcAddress(kernel, "Thread32First");
479		thread_next = (THREAD32) GetProcAddress(kernel, "Thread32Next");
480		module_first = (MODULE32) GetProcAddress(kernel, "Module32First");
481		module_next = (MODULE32) GetProcAddress(kernel, "Module32Next");
482
483		if (snap && heap_first && heap_next && heaplist_first &&
484			heaplist_next && process_first && process_next &&
485			thread_first && thread_next && module_first &&
486			module_next && (handle = snap(TH32CS_SNAPALL,0))
487			!= INVALID_HANDLE_VALUE)
488			{
489			/* heap list and heap walking */
490                        /* HEAPLIST32 contains 3 fields that will change with
491                         * each entry.  Consider each field a source of 1 byte
492                         * of entropy.
493                         * HEAPENTRY32 contains 5 fields that will change with
494                         * each entry.  Consider each field a source of 1 byte
495                         * of entropy.
496                         */
497			ZeroMemory(&hlist, sizeof(HEAPLIST32));
498			hlist.dwSize = sizeof(HEAPLIST32);
499			if (good) starttime = GetTickCount();
500#ifdef _MSC_VER
501			if (heaplist_first(handle, &hlist))
502				{
503				/*
504				   following discussion on dev ML, exception on WinCE (or other Win
505				   platform) is theoretically of unknown origin; prevent infinite
506				   loop here when this theoretical case occurs; otherwise cope with
507				   the expected (MSDN documented) exception-throwing behaviour of
508				   Heap32Next() on WinCE.
509
510				   based on patch in original message by Tanguy Fautré (2009/03/02)
511			           Subject: RAND_poll() and CreateToolhelp32Snapshot() stability
512			     */
513				int ex_cnt_limit = 42;
514				do
515					{
516					RAND_add(&hlist, hlist.dwSize, 3);
517					__try
518						{
519						ZeroMemory(&hentry, sizeof(HEAPENTRY32));
520					hentry.dwSize = sizeof(HEAPENTRY32);
521					if (heap_first(&hentry,
522						hlist.th32ProcessID,
523						hlist.th32HeapID))
524						{
525						int entrycnt = 80;
526						do
527							RAND_add(&hentry,
528								hentry.dwSize, 5);
529						while (heap_next(&hentry)
530						&& (!good || (GetTickCount()-starttime)<MAXDELAY)
531							&& --entrycnt > 0);
532						}
533						}
534					__except (EXCEPTION_EXECUTE_HANDLER)
535						{
536							/* ignore access violations when walking the heap list */
537							ex_cnt_limit--;
538						}
539					} while (heaplist_next(handle, &hlist)
540						&& (!good || (GetTickCount()-starttime)<MAXDELAY)
541						&& ex_cnt_limit > 0);
542				}
543
544#else
545			if (heaplist_first(handle, &hlist))
546				{
547				do
548					{
549					RAND_add(&hlist, hlist.dwSize, 3);
550					hentry.dwSize = sizeof(HEAPENTRY32);
551					if (heap_first(&hentry,
552						hlist.th32ProcessID,
553						hlist.th32HeapID))
554						{
555						int entrycnt = 80;
556						do
557							RAND_add(&hentry,
558								hentry.dwSize, 5);
559						while (heap_next(&hentry)
560							&& --entrycnt > 0);
561						}
562					} while (heaplist_next(handle, &hlist)
563						&& (!good || (GetTickCount()-starttime)<MAXDELAY));
564				}
565#endif
566
567			/* process walking */
568                        /* PROCESSENTRY32 contains 9 fields that will change
569                         * with each entry.  Consider each field a source of
570                         * 1 byte of entropy.
571                         */
572			p.dwSize = sizeof(PROCESSENTRY32);
573
574			if (good) starttime = GetTickCount();
575			if (process_first(handle, &p))
576				do
577					RAND_add(&p, p.dwSize, 9);
578				while (process_next(handle, &p) && (!good || (GetTickCount()-starttime)<MAXDELAY));
579
580			/* thread walking */
581                        /* THREADENTRY32 contains 6 fields that will change
582                         * with each entry.  Consider each field a source of
583                         * 1 byte of entropy.
584                         */
585			t.dwSize = sizeof(THREADENTRY32);
586			if (good) starttime = GetTickCount();
587			if (thread_first(handle, &t))
588				do
589					RAND_add(&t, t.dwSize, 6);
590				while (thread_next(handle, &t) && (!good || (GetTickCount()-starttime)<MAXDELAY));
591
592			/* module walking */
593                        /* MODULEENTRY32 contains 9 fields that will change
594                         * with each entry.  Consider each field a source of
595                         * 1 byte of entropy.
596                         */
597			m.dwSize = sizeof(MODULEENTRY32);
598			if (good) starttime = GetTickCount();
599			if (module_first(handle, &m))
600				do
601					RAND_add(&m, m.dwSize, 9);
602				while (module_next(handle, &m)
603					       	&& (!good || (GetTickCount()-starttime)<MAXDELAY));
604			if (close_snap)
605				close_snap(handle);
606			else
607				CloseHandle(handle);
608
609			}
610
611		FreeLibrary(kernel);
612		}
613	}
614#endif /* !OPENSSL_SYS_WINCE */
615
616	/* timer data */
617	readtimer();
618
619	/* memory usage statistics */
620	GlobalMemoryStatus(&m);
621	RAND_add(&m, sizeof(m), 1);
622
623	/* process ID */
624	w = GetCurrentProcessId();
625	RAND_add(&w, sizeof(w), 1);
626
627#if 0
628	printf("Exiting RAND_poll\n");
629#endif
630
631	return(1);
632}
633
634int RAND_event(UINT iMsg, WPARAM wParam, LPARAM lParam)
635        {
636        double add_entropy=0;
637
638        switch (iMsg)
639                {
640        case WM_KEYDOWN:
641                        {
642                        static WPARAM key;
643                        if (key != wParam)
644                                add_entropy = 0.05;
645                        key = wParam;
646                        }
647                        break;
648	case WM_MOUSEMOVE:
649                        {
650                        static int lastx,lasty,lastdx,lastdy;
651                        int x,y,dx,dy;
652
653                        x=LOWORD(lParam);
654                        y=HIWORD(lParam);
655                        dx=lastx-x;
656                        dy=lasty-y;
657                        if (dx != 0 && dy != 0 && dx-lastdx != 0 && dy-lastdy != 0)
658                                add_entropy=.2;
659                        lastx=x, lasty=y;
660                        lastdx=dx, lastdy=dy;
661                        }
662		break;
663		}
664
665	readtimer();
666        RAND_add(&iMsg, sizeof(iMsg), add_entropy);
667	RAND_add(&wParam, sizeof(wParam), 0);
668	RAND_add(&lParam, sizeof(lParam), 0);
669
670	return (RAND_status());
671	}
672
673
674void RAND_screen(void) /* function available for backward compatibility */
675{
676	RAND_poll();
677	readscreen();
678}
679
680
681/* feed timing information to the PRNG */
682static void readtimer(void)
683{
684	DWORD w;
685	LARGE_INTEGER l;
686	static int have_perfc = 1;
687#if defined(_MSC_VER) && defined(_M_X86)
688	static int have_tsc = 1;
689	DWORD cyclecount;
690
691	if (have_tsc) {
692	  __try {
693	    __asm {
694	      _emit 0x0f
695	      _emit 0x31
696	      mov cyclecount, eax
697	      }
698	    RAND_add(&cyclecount, sizeof(cyclecount), 1);
699	  } __except(EXCEPTION_EXECUTE_HANDLER) {
700	    have_tsc = 0;
701	  }
702	}
703#else
704# define have_tsc 0
705#endif
706
707	if (have_perfc) {
708	  if (QueryPerformanceCounter(&l) == 0)
709	    have_perfc = 0;
710	  else
711	    RAND_add(&l, sizeof(l), 0);
712	}
713
714	if (!have_tsc && !have_perfc) {
715	  w = GetTickCount();
716	  RAND_add(&w, sizeof(w), 0);
717	}
718}
719
720/* feed screen contents to PRNG */
721/*****************************************************************************
722 *
723 * Created 960901 by Gertjan van Oosten, gertjan@West.NL, West Consulting B.V.
724 *
725 * Code adapted from
726 * <URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];97193>;
727 * the original copyright message is:
728 *
729 *   (C) Copyright Microsoft Corp. 1993.  All rights reserved.
730 *
731 *   You have a royalty-free right to use, modify, reproduce and
732 *   distribute the Sample Files (and/or any modified version) in
733 *   any way you find useful, provided that you agree that
734 *   Microsoft has no warranty obligations or liability for any
735 *   Sample Application Files which are modified.
736 */
737
738static void readscreen(void)
739{
740#if !defined(OPENSSL_SYS_WINCE) && !defined(OPENSSL_SYS_WIN32_CYGWIN)
741  HDC		hScrDC;		/* screen DC */
742  HDC		hMemDC;		/* memory DC */
743  HBITMAP	hBitmap;	/* handle for our bitmap */
744  HBITMAP	hOldBitmap;	/* handle for previous bitmap */
745  BITMAP	bm;		/* bitmap properties */
746  unsigned int	size;		/* size of bitmap */
747  char		*bmbits;	/* contents of bitmap */
748  int		w;		/* screen width */
749  int		h;		/* screen height */
750  int		y;		/* y-coordinate of screen lines to grab */
751  int		n = 16;		/* number of screen lines to grab at a time */
752
753  if (check_winnt() && OPENSSL_isservice()>0)
754    return;
755
756  /* Create a screen DC and a memory DC compatible to screen DC */
757  hScrDC = CreateDC(TEXT("DISPLAY"), NULL, NULL, NULL);
758  hMemDC = CreateCompatibleDC(hScrDC);
759
760  /* Get screen resolution */
761  w = GetDeviceCaps(hScrDC, HORZRES);
762  h = GetDeviceCaps(hScrDC, VERTRES);
763
764  /* Create a bitmap compatible with the screen DC */
765  hBitmap = CreateCompatibleBitmap(hScrDC, w, n);
766
767  /* Select new bitmap into memory DC */
768  hOldBitmap = SelectObject(hMemDC, hBitmap);
769
770  /* Get bitmap properties */
771  GetObject(hBitmap, sizeof(BITMAP), (LPSTR)&bm);
772  size = (unsigned int)bm.bmWidthBytes * bm.bmHeight * bm.bmPlanes;
773
774  bmbits = OPENSSL_malloc(size);
775  if (bmbits) {
776    /* Now go through the whole screen, repeatedly grabbing n lines */
777    for (y = 0; y < h-n; y += n)
778    	{
779	unsigned char md[MD_DIGEST_LENGTH];
780
781	/* Bitblt screen DC to memory DC */
782	BitBlt(hMemDC, 0, 0, w, n, hScrDC, 0, y, SRCCOPY);
783
784	/* Copy bitmap bits from memory DC to bmbits */
785	GetBitmapBits(hBitmap, size, bmbits);
786
787	/* Get the hash of the bitmap */
788	MD(bmbits,size,md);
789
790	/* Seed the random generator with the hash value */
791	RAND_add(md, MD_DIGEST_LENGTH, 0);
792	}
793
794    OPENSSL_free(bmbits);
795  }
796
797  /* Select old bitmap back into memory DC */
798  hBitmap = SelectObject(hMemDC, hOldBitmap);
799
800  /* Clean up */
801  DeleteObject(hBitmap);
802  DeleteDC(hMemDC);
803  DeleteDC(hScrDC);
804#endif /* !OPENSSL_SYS_WINCE */
805}
806
807#endif
808