diff options
| author | djm <> | 2008-09-06 12:17:54 +0000 |
|---|---|---|
| committer | djm <> | 2008-09-06 12:17:54 +0000 |
| commit | 38ce604e3cc97706b876b0525ddff0121115456d (patch) | |
| tree | 7ccc28afe1789ea3dbedf72365f955d5b8e105b5 /src/lib/libcrypto/rand | |
| parent | 12867252827c8efaa8ddd1fa3b3d6e321e2bcdef (diff) | |
| download | openbsd-38ce604e3cc97706b876b0525ddff0121115456d.tar.gz openbsd-38ce604e3cc97706b876b0525ddff0121115456d.tar.bz2 openbsd-38ce604e3cc97706b876b0525ddff0121115456d.zip | |
resolve conflicts
Diffstat (limited to 'src/lib/libcrypto/rand')
| -rw-r--r-- | src/lib/libcrypto/rand/md_rand.c | 17 | ||||
| -rw-r--r-- | src/lib/libcrypto/rand/rand.h | 15 | ||||
| -rw-r--r-- | src/lib/libcrypto/rand/rand_egd.c | 2 | ||||
| -rw-r--r-- | src/lib/libcrypto/rand/rand_err.c | 15 | ||||
| -rw-r--r-- | src/lib/libcrypto/rand/rand_lib.c | 18 | ||||
| -rw-r--r-- | src/lib/libcrypto/rand/rand_unix.c | 119 | ||||
| -rw-r--r-- | src/lib/libcrypto/rand/rand_win.c | 99 | ||||
| -rw-r--r-- | src/lib/libcrypto/rand/randfile.c | 12 | ||||
| -rw-r--r-- | src/lib/libcrypto/rand/randtest.c | 5 |
9 files changed, 165 insertions, 137 deletions
diff --git a/src/lib/libcrypto/rand/md_rand.c b/src/lib/libcrypto/rand/md_rand.c index c84968df88..9783d0c23e 100644 --- a/src/lib/libcrypto/rand/md_rand.c +++ b/src/lib/libcrypto/rand/md_rand.c | |||
| @@ -126,7 +126,6 @@ | |||
| 126 | 126 | ||
| 127 | #include <openssl/crypto.h> | 127 | #include <openssl/crypto.h> |
| 128 | #include <openssl/err.h> | 128 | #include <openssl/err.h> |
| 129 | #include <openssl/fips.h> | ||
| 130 | 129 | ||
| 131 | #ifdef BN_DEBUG | 130 | #ifdef BN_DEBUG |
| 132 | # define PREDICT | 131 | # define PREDICT |
| @@ -153,7 +152,7 @@ static unsigned long locking_thread = 0; /* valid iff crypto_lock_rand is set */ | |||
| 153 | int rand_predictable=0; | 152 | int rand_predictable=0; |
| 154 | #endif | 153 | #endif |
| 155 | 154 | ||
| 156 | const char *RAND_version="RAND" OPENSSL_VERSION_PTEXT; | 155 | const char RAND_version[]="RAND" OPENSSL_VERSION_PTEXT; |
| 157 | 156 | ||
| 158 | static void ssleay_rand_cleanup(void); | 157 | static void ssleay_rand_cleanup(void); |
| 159 | static void ssleay_rand_seed(const void *buf, int num); | 158 | static void ssleay_rand_seed(const void *buf, int num); |
| @@ -301,7 +300,7 @@ static void ssleay_rand_add(const void *buf, int num, double add) | |||
| 301 | * other thread's seeding remains without effect (except for | 300 | * other thread's seeding remains without effect (except for |
| 302 | * the incremented counter). By XORing it we keep at least as | 301 | * the incremented counter). By XORing it we keep at least as |
| 303 | * much entropy as fits into md. */ | 302 | * much entropy as fits into md. */ |
| 304 | for (k = 0; k < sizeof md; k++) | 303 | for (k = 0; k < (int)sizeof(md); k++) |
| 305 | { | 304 | { |
| 306 | md[k] ^= local_md[k]; | 305 | md[k] ^= local_md[k]; |
| 307 | } | 306 | } |
| @@ -316,7 +315,7 @@ static void ssleay_rand_add(const void *buf, int num, double add) | |||
| 316 | 315 | ||
| 317 | static void ssleay_rand_seed(const void *buf, int num) | 316 | static void ssleay_rand_seed(const void *buf, int num) |
| 318 | { | 317 | { |
| 319 | ssleay_rand_add(buf, num, num); | 318 | ssleay_rand_add(buf, num, (double)num); |
| 320 | } | 319 | } |
| 321 | 320 | ||
| 322 | static int ssleay_rand_bytes(unsigned char *buf, int num) | 321 | static int ssleay_rand_bytes(unsigned char *buf, int num) |
| @@ -333,14 +332,6 @@ static int ssleay_rand_bytes(unsigned char *buf, int num) | |||
| 333 | #endif | 332 | #endif |
| 334 | int do_stir_pool = 0; | 333 | int do_stir_pool = 0; |
| 335 | 334 | ||
| 336 | #ifdef OPENSSL_FIPS | ||
| 337 | if(FIPS_mode()) | ||
| 338 | { | ||
| 339 | FIPSerr(FIPS_F_SSLEAY_RAND_BYTES,FIPS_R_NON_FIPS_METHOD); | ||
| 340 | return 0; | ||
| 341 | } | ||
| 342 | #endif | ||
| 343 | |||
| 344 | #ifdef PREDICT | 335 | #ifdef PREDICT |
| 345 | if (rand_predictable) | 336 | if (rand_predictable) |
| 346 | { | 337 | { |
| @@ -529,7 +520,7 @@ static int ssleay_rand_pseudo_bytes(unsigned char *buf, int num) | |||
| 529 | err = ERR_peek_error(); | 520 | err = ERR_peek_error(); |
| 530 | if (ERR_GET_LIB(err) == ERR_LIB_RAND && | 521 | if (ERR_GET_LIB(err) == ERR_LIB_RAND && |
| 531 | ERR_GET_REASON(err) == RAND_R_PRNG_NOT_SEEDED) | 522 | ERR_GET_REASON(err) == RAND_R_PRNG_NOT_SEEDED) |
| 532 | (void)ERR_get_error(); | 523 | ERR_clear_error(); |
| 533 | } | 524 | } |
| 534 | return (ret); | 525 | return (ret); |
| 535 | } | 526 | } |
diff --git a/src/lib/libcrypto/rand/rand.h b/src/lib/libcrypto/rand/rand.h index 604df9be6c..ac6c021763 100644 --- a/src/lib/libcrypto/rand/rand.h +++ b/src/lib/libcrypto/rand/rand.h | |||
| @@ -72,10 +72,13 @@ extern "C" { | |||
| 72 | #endif | 72 | #endif |
| 73 | 73 | ||
| 74 | #if defined(OPENSSL_FIPS) | 74 | #if defined(OPENSSL_FIPS) |
| 75 | #define FIPS_RAND_SIZE_T int | 75 | #define FIPS_RAND_SIZE_T size_t |
| 76 | #endif | 76 | #endif |
| 77 | 77 | ||
| 78 | typedef struct rand_meth_st | 78 | /* Already defined in ossl_typ.h */ |
| 79 | /* typedef struct rand_meth_st RAND_METHOD; */ | ||
| 80 | |||
| 81 | struct rand_meth_st | ||
| 79 | { | 82 | { |
| 80 | void (*seed)(const void *buf, int num); | 83 | void (*seed)(const void *buf, int num); |
| 81 | int (*bytes)(unsigned char *buf, int num); | 84 | int (*bytes)(unsigned char *buf, int num); |
| @@ -83,7 +86,7 @@ typedef struct rand_meth_st | |||
| 83 | void (*add)(const void *buf, int num, double entropy); | 86 | void (*add)(const void *buf, int num, double entropy); |
| 84 | int (*pseudorand)(unsigned char *buf, int num); | 87 | int (*pseudorand)(unsigned char *buf, int num); |
| 85 | int (*status)(void); | 88 | int (*status)(void); |
| 86 | } RAND_METHOD; | 89 | }; |
| 87 | 90 | ||
| 88 | #ifdef BN_DEBUG | 91 | #ifdef BN_DEBUG |
| 89 | extern int rand_predictable; | 92 | extern int rand_predictable; |
| @@ -125,17 +128,11 @@ void ERR_load_RAND_strings(void); | |||
| 125 | /* Error codes for the RAND functions. */ | 128 | /* Error codes for the RAND functions. */ |
| 126 | 129 | ||
| 127 | /* Function codes. */ | 130 | /* Function codes. */ |
| 128 | #define RAND_F_FIPS_RAND_BYTES 102 | ||
| 129 | #define RAND_F_RAND_GET_RAND_METHOD 101 | 131 | #define RAND_F_RAND_GET_RAND_METHOD 101 |
| 130 | #define RAND_F_SSLEAY_RAND_BYTES 100 | 132 | #define RAND_F_SSLEAY_RAND_BYTES 100 |
| 131 | 133 | ||
| 132 | /* Reason codes. */ | 134 | /* Reason codes. */ |
| 133 | #define RAND_R_NON_FIPS_METHOD 101 | ||
| 134 | #define RAND_R_PRNG_ASKING_FOR_TOO_MUCH 105 | ||
| 135 | #define RAND_R_PRNG_NOT_REKEYED 103 | ||
| 136 | #define RAND_R_PRNG_NOT_RESEEDED 104 | ||
| 137 | #define RAND_R_PRNG_NOT_SEEDED 100 | 135 | #define RAND_R_PRNG_NOT_SEEDED 100 |
| 138 | #define RAND_R_PRNG_STUCK 102 | ||
| 139 | 136 | ||
| 140 | #ifdef __cplusplus | 137 | #ifdef __cplusplus |
| 141 | } | 138 | } |
diff --git a/src/lib/libcrypto/rand/rand_egd.c b/src/lib/libcrypto/rand/rand_egd.c index cd666abfcb..50bce6caba 100644 --- a/src/lib/libcrypto/rand/rand_egd.c +++ b/src/lib/libcrypto/rand/rand_egd.c | |||
| @@ -95,7 +95,7 @@ | |||
| 95 | * RAND_egd() is a wrapper for RAND_egd_bytes() with numbytes=255. | 95 | * RAND_egd() is a wrapper for RAND_egd_bytes() with numbytes=255. |
| 96 | */ | 96 | */ |
| 97 | 97 | ||
| 98 | #if defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_VMS) || defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_VXWORKS) || defined(OPENSSL_SYS_VOS) | 98 | #if defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_VMS) || defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_VXWORKS) || defined(OPENSSL_SYS_NETWARE) || defined(OPENSSL_SYS_VOS) |
| 99 | int RAND_query_egd_bytes(const char *path, unsigned char *buf, int bytes) | 99 | int RAND_query_egd_bytes(const char *path, unsigned char *buf, int bytes) |
| 100 | { | 100 | { |
| 101 | return(-1); | 101 | return(-1); |
diff --git a/src/lib/libcrypto/rand/rand_err.c b/src/lib/libcrypto/rand/rand_err.c index 97f96e1aee..386934dcd1 100644 --- a/src/lib/libcrypto/rand/rand_err.c +++ b/src/lib/libcrypto/rand/rand_err.c | |||
| @@ -70,7 +70,6 @@ | |||
| 70 | 70 | ||
| 71 | static ERR_STRING_DATA RAND_str_functs[]= | 71 | static ERR_STRING_DATA RAND_str_functs[]= |
| 72 | { | 72 | { |
| 73 | {ERR_FUNC(RAND_F_FIPS_RAND_BYTES), "FIPS_RAND_BYTES"}, | ||
| 74 | {ERR_FUNC(RAND_F_RAND_GET_RAND_METHOD), "RAND_get_rand_method"}, | 73 | {ERR_FUNC(RAND_F_RAND_GET_RAND_METHOD), "RAND_get_rand_method"}, |
| 75 | {ERR_FUNC(RAND_F_SSLEAY_RAND_BYTES), "SSLEAY_RAND_BYTES"}, | 74 | {ERR_FUNC(RAND_F_SSLEAY_RAND_BYTES), "SSLEAY_RAND_BYTES"}, |
| 76 | {0,NULL} | 75 | {0,NULL} |
| @@ -78,12 +77,7 @@ static ERR_STRING_DATA RAND_str_functs[]= | |||
| 78 | 77 | ||
| 79 | static ERR_STRING_DATA RAND_str_reasons[]= | 78 | static ERR_STRING_DATA RAND_str_reasons[]= |
| 80 | { | 79 | { |
| 81 | {ERR_REASON(RAND_R_NON_FIPS_METHOD) ,"non fips method"}, | ||
| 82 | {ERR_REASON(RAND_R_PRNG_ASKING_FOR_TOO_MUCH),"prng asking for too much"}, | ||
| 83 | {ERR_REASON(RAND_R_PRNG_NOT_REKEYED) ,"prng not rekeyed"}, | ||
| 84 | {ERR_REASON(RAND_R_PRNG_NOT_RESEEDED) ,"prng not reseeded"}, | ||
| 85 | {ERR_REASON(RAND_R_PRNG_NOT_SEEDED) ,"PRNG not seeded"}, | 80 | {ERR_REASON(RAND_R_PRNG_NOT_SEEDED) ,"PRNG not seeded"}, |
| 86 | {ERR_REASON(RAND_R_PRNG_STUCK) ,"prng stuck"}, | ||
| 87 | {0,NULL} | 81 | {0,NULL} |
| 88 | }; | 82 | }; |
| 89 | 83 | ||
| @@ -91,15 +85,12 @@ static ERR_STRING_DATA RAND_str_reasons[]= | |||
| 91 | 85 | ||
| 92 | void ERR_load_RAND_strings(void) | 86 | void ERR_load_RAND_strings(void) |
| 93 | { | 87 | { |
| 94 | static int init=1; | 88 | #ifndef OPENSSL_NO_ERR |
| 95 | 89 | ||
| 96 | if (init) | 90 | if (ERR_func_error_string(RAND_str_functs[0].error) == NULL) |
| 97 | { | 91 | { |
| 98 | init=0; | ||
| 99 | #ifndef OPENSSL_NO_ERR | ||
| 100 | ERR_load_strings(0,RAND_str_functs); | 92 | ERR_load_strings(0,RAND_str_functs); |
| 101 | ERR_load_strings(0,RAND_str_reasons); | 93 | ERR_load_strings(0,RAND_str_reasons); |
| 102 | #endif | ||
| 103 | |||
| 104 | } | 94 | } |
| 95 | #endif | ||
| 105 | } | 96 | } |
diff --git a/src/lib/libcrypto/rand/rand_lib.c b/src/lib/libcrypto/rand/rand_lib.c index a21bde79de..513e338985 100644 --- a/src/lib/libcrypto/rand/rand_lib.c +++ b/src/lib/libcrypto/rand/rand_lib.c | |||
| @@ -63,8 +63,6 @@ | |||
| 63 | #ifndef OPENSSL_NO_ENGINE | 63 | #ifndef OPENSSL_NO_ENGINE |
| 64 | #include <openssl/engine.h> | 64 | #include <openssl/engine.h> |
| 65 | #endif | 65 | #endif |
| 66 | #include <openssl/fips.h> | ||
| 67 | #include <openssl/fips_rand.h> | ||
| 68 | 66 | ||
| 69 | #ifndef OPENSSL_NO_ENGINE | 67 | #ifndef OPENSSL_NO_ENGINE |
| 70 | /* non-NULL if default_RAND_meth is ENGINE-provided */ | 68 | /* non-NULL if default_RAND_meth is ENGINE-provided */ |
| @@ -104,22 +102,8 @@ const RAND_METHOD *RAND_get_rand_method(void) | |||
| 104 | funct_ref = e; | 102 | funct_ref = e; |
| 105 | else | 103 | else |
| 106 | #endif | 104 | #endif |
| 107 | #ifdef OPENSSL_FIPS | 105 | default_RAND_meth = RAND_SSLeay(); |
| 108 | if(FIPS_mode()) | ||
| 109 | default_RAND_meth=FIPS_rand_method(); | ||
| 110 | else | ||
| 111 | #endif | ||
| 112 | default_RAND_meth = RAND_SSLeay(); | ||
| 113 | } | 106 | } |
| 114 | |||
| 115 | #ifdef OPENSSL_FIPS | ||
| 116 | if(FIPS_mode() | ||
| 117 | && default_RAND_meth != FIPS_rand_check()) | ||
| 118 | { | ||
| 119 | RANDerr(RAND_F_RAND_GET_RAND_METHOD,RAND_R_NON_FIPS_METHOD); | ||
| 120 | return 0; | ||
| 121 | } | ||
| 122 | #endif | ||
| 123 | return default_RAND_meth; | 107 | return default_RAND_meth; |
| 124 | } | 108 | } |
| 125 | 109 | ||
diff --git a/src/lib/libcrypto/rand/rand_unix.c b/src/lib/libcrypto/rand/rand_unix.c index 9376554fae..6c2be5cb96 100644 --- a/src/lib/libcrypto/rand/rand_unix.c +++ b/src/lib/libcrypto/rand/rand_unix.c | |||
| @@ -56,7 +56,7 @@ | |||
| 56 | * [including the GNU Public Licence.] | 56 | * [including the GNU Public Licence.] |
| 57 | */ | 57 | */ |
| 58 | /* ==================================================================== | 58 | /* ==================================================================== |
| 59 | * Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved. | 59 | * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved. |
| 60 | * | 60 | * |
| 61 | * Redistribution and use in source and binary forms, with or without | 61 | * Redistribution and use in source and binary forms, with or without |
| 62 | * modification, are permitted provided that the following conditions | 62 | * modification, are permitted provided that the following conditions |
| @@ -108,6 +108,7 @@ | |||
| 108 | * Hudson (tjh@cryptsoft.com). | 108 | * Hudson (tjh@cryptsoft.com). |
| 109 | * | 109 | * |
| 110 | */ | 110 | */ |
| 111 | #include <stdio.h> | ||
| 111 | 112 | ||
| 112 | #define USE_SOCKETS | 113 | #define USE_SOCKETS |
| 113 | #include "e_os.h" | 114 | #include "e_os.h" |
| @@ -115,7 +116,7 @@ | |||
| 115 | #include <openssl/rand.h> | 116 | #include <openssl/rand.h> |
| 116 | #include "rand_lcl.h" | 117 | #include "rand_lcl.h" |
| 117 | 118 | ||
| 118 | #if !(defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_VMS) || defined(OPENSSL_SYS_OS2) || defined(OPENSSL_SYS_VXWORKS)) | 119 | #if !(defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_VMS) || defined(OPENSSL_SYS_OS2) || defined(OPENSSL_SYS_VXWORKS) || defined(OPENSSL_SYS_NETWARE)) |
| 119 | 120 | ||
| 120 | #include <sys/types.h> | 121 | #include <sys/types.h> |
| 121 | #include <sys/time.h> | 122 | #include <sys/time.h> |
| @@ -124,6 +125,13 @@ | |||
| 124 | #include <fcntl.h> | 125 | #include <fcntl.h> |
| 125 | #include <unistd.h> | 126 | #include <unistd.h> |
| 126 | #include <time.h> | 127 | #include <time.h> |
| 128 | #if defined(OPENSSL_SYS_LINUX) /* should actually be available virtually everywhere */ | ||
| 129 | # include <poll.h> | ||
| 130 | #endif | ||
| 131 | #include <limits.h> | ||
| 132 | #ifndef FD_SETSIZE | ||
| 133 | # define FD_SETSIZE (8*sizeof(fd_set)) | ||
| 134 | #endif | ||
| 127 | 135 | ||
| 128 | #ifdef __OpenBSD__ | 136 | #ifdef __OpenBSD__ |
| 129 | int RAND_poll(void) | 137 | int RAND_poll(void) |
| @@ -142,7 +150,7 @@ int RAND_poll(void) | |||
| 142 | 150 | ||
| 143 | return 1; | 151 | return 1; |
| 144 | } | 152 | } |
| 145 | #else | 153 | #else /* !defined(__OpenBSD__) */ |
| 146 | int RAND_poll(void) | 154 | int RAND_poll(void) |
| 147 | { | 155 | { |
| 148 | unsigned long l; | 156 | unsigned long l; |
| @@ -154,7 +162,8 @@ int RAND_poll(void) | |||
| 154 | #ifdef DEVRANDOM | 162 | #ifdef DEVRANDOM |
| 155 | static const char *randomfiles[] = { DEVRANDOM }; | 163 | static const char *randomfiles[] = { DEVRANDOM }; |
| 156 | struct stat randomstats[sizeof(randomfiles)/sizeof(randomfiles[0])]; | 164 | struct stat randomstats[sizeof(randomfiles)/sizeof(randomfiles[0])]; |
| 157 | int fd,i; | 165 | int fd; |
| 166 | size_t i; | ||
| 158 | #endif | 167 | #endif |
| 159 | #ifdef DEVRANDOM_EGD | 168 | #ifdef DEVRANDOM_EGD |
| 160 | static const char *egdsockets[] = { DEVRANDOM_EGD, NULL }; | 169 | static const char *egdsockets[] = { DEVRANDOM_EGD, NULL }; |
| @@ -182,10 +191,9 @@ int RAND_poll(void) | |||
| 182 | #endif | 191 | #endif |
| 183 | )) >= 0) | 192 | )) >= 0) |
| 184 | { | 193 | { |
| 185 | struct timeval t = { 0, 10*1000 }; /* Spend 10ms on | 194 | int usec = 10*1000; /* spend 10ms on each file */ |
| 186 | each file. */ | 195 | int r; |
| 187 | int r,j; | 196 | size_t j; |
| 188 | fd_set fset; | ||
| 189 | struct stat *st=&randomstats[i]; | 197 | struct stat *st=&randomstats[i]; |
| 190 | 198 | ||
| 191 | /* Avoid using same input... Used to be O_NOFOLLOW | 199 | /* Avoid using same input... Used to be O_NOFOLLOW |
| @@ -201,35 +209,75 @@ int RAND_poll(void) | |||
| 201 | 209 | ||
| 202 | do | 210 | do |
| 203 | { | 211 | { |
| 204 | FD_ZERO(&fset); | 212 | int try_read = 0; |
| 205 | FD_SET(fd, &fset); | ||
| 206 | r = -1; | ||
| 207 | 213 | ||
| 208 | if (select(fd+1,&fset,NULL,NULL,&t) < 0) | 214 | #if defined(OPENSSL_SYS_LINUX) |
| 209 | t.tv_usec=0; | 215 | /* use poll() */ |
| 210 | else if (FD_ISSET(fd, &fset)) | 216 | struct pollfd pset; |
| 217 | |||
| 218 | pset.fd = fd; | ||
| 219 | pset.events = POLLIN; | ||
| 220 | pset.revents = 0; | ||
| 221 | |||
| 222 | if (poll(&pset, 1, usec / 1000) < 0) | ||
| 223 | usec = 0; | ||
| 224 | else | ||
| 225 | try_read = (pset.revents & POLLIN) != 0; | ||
| 226 | |||
| 227 | #else | ||
| 228 | /* use select() */ | ||
| 229 | fd_set fset; | ||
| 230 | struct timeval t; | ||
| 231 | |||
| 232 | t.tv_sec = 0; | ||
| 233 | t.tv_usec = usec; | ||
| 234 | |||
| 235 | if (FD_SETSIZE > 0 && fd >= FD_SETSIZE) | ||
| 236 | { | ||
| 237 | /* can't use select, so just try to read once anyway */ | ||
| 238 | try_read = 1; | ||
| 239 | } | ||
| 240 | else | ||
| 241 | { | ||
| 242 | FD_ZERO(&fset); | ||
| 243 | FD_SET(fd, &fset); | ||
| 244 | |||
| 245 | if (select(fd+1,&fset,NULL,NULL,&t) >= 0) | ||
| 246 | { | ||
| 247 | usec = t.tv_usec; | ||
| 248 | if (FD_ISSET(fd, &fset)) | ||
| 249 | try_read = 1; | ||
| 250 | } | ||
| 251 | else | ||
| 252 | usec = 0; | ||
| 253 | } | ||
| 254 | #endif | ||
| 255 | |||
| 256 | if (try_read) | ||
| 211 | { | 257 | { |
| 212 | r=read(fd,(unsigned char *)tmpbuf+n, | 258 | r = read(fd,(unsigned char *)tmpbuf+n, ENTROPY_NEEDED-n); |
| 213 | ENTROPY_NEEDED-n); | ||
| 214 | if (r > 0) | 259 | if (r > 0) |
| 215 | n += r; | 260 | n += r; |
| 216 | } | 261 | } |
| 217 | 262 | else | |
| 218 | /* Some Unixen will update t, some | 263 | r = -1; |
| 219 | won't. For those who won't, give | 264 | |
| 220 | up here, otherwise, we will do | 265 | /* Some Unixen will update t in select(), some |
| 266 | won't. For those who won't, or if we | ||
| 267 | didn't use select() in the first place, | ||
| 268 | give up here, otherwise, we will do | ||
| 221 | this once again for the remaining | 269 | this once again for the remaining |
| 222 | time. */ | 270 | time. */ |
| 223 | if (t.tv_usec == 10*1000) | 271 | if (usec == 10*1000) |
| 224 | t.tv_usec=0; | 272 | usec = 0; |
| 225 | } | 273 | } |
| 226 | while ((r > 0 || (errno == EINTR || errno == EAGAIN)) | 274 | while ((r > 0 || |
| 227 | && t.tv_usec != 0 && n < ENTROPY_NEEDED); | 275 | (errno == EINTR || errno == EAGAIN)) && usec != 0 && n < ENTROPY_NEEDED); |
| 228 | 276 | ||
| 229 | close(fd); | 277 | close(fd); |
| 230 | } | 278 | } |
| 231 | } | 279 | } |
| 232 | #endif | 280 | #endif /* defined(DEVRANDOM) */ |
| 233 | 281 | ||
| 234 | #ifdef DEVRANDOM_EGD | 282 | #ifdef DEVRANDOM_EGD |
| 235 | /* Use an EGD socket to read entropy from an EGD or PRNGD entropy | 283 | /* Use an EGD socket to read entropy from an EGD or PRNGD entropy |
| @@ -244,24 +292,24 @@ int RAND_poll(void) | |||
| 244 | if (r > 0) | 292 | if (r > 0) |
| 245 | n += r; | 293 | n += r; |
| 246 | } | 294 | } |
| 247 | #endif | 295 | #endif /* defined(DEVRANDOM_EGD) */ |
| 248 | 296 | ||
| 249 | #if defined(DEVRANDOM) || defined(DEVRANDOM_EGD) | 297 | #if defined(DEVRANDOM) || defined(DEVRANDOM_EGD) |
| 250 | if (n > 0) | 298 | if (n > 0) |
| 251 | { | 299 | { |
| 252 | RAND_add(tmpbuf,sizeof tmpbuf,n); | 300 | RAND_add(tmpbuf,sizeof tmpbuf,(double)n); |
| 253 | OPENSSL_cleanse(tmpbuf,n); | 301 | OPENSSL_cleanse(tmpbuf,n); |
| 254 | } | 302 | } |
| 255 | #endif | 303 | #endif |
| 256 | 304 | ||
| 257 | /* put in some default random data, we need more than just this */ | 305 | /* put in some default random data, we need more than just this */ |
| 258 | l=curr_pid; | 306 | l=curr_pid; |
| 259 | RAND_add(&l,sizeof(l),0); | 307 | RAND_add(&l,sizeof(l),0.0); |
| 260 | l=getuid(); | 308 | l=getuid(); |
| 261 | RAND_add(&l,sizeof(l),0); | 309 | RAND_add(&l,sizeof(l),0.0); |
| 262 | 310 | ||
| 263 | l=time(NULL); | 311 | l=time(NULL); |
| 264 | RAND_add(&l,sizeof(l),0); | 312 | RAND_add(&l,sizeof(l),0.0); |
| 265 | 313 | ||
| 266 | #if defined(DEVRANDOM) || defined(DEVRANDOM_EGD) | 314 | #if defined(DEVRANDOM) || defined(DEVRANDOM_EGD) |
| 267 | return 1; | 315 | return 1; |
| @@ -270,12 +318,13 @@ int RAND_poll(void) | |||
| 270 | #endif | 318 | #endif |
| 271 | } | 319 | } |
| 272 | 320 | ||
| 273 | #endif | 321 | #endif /* defined(__OpenBSD__) */ |
| 274 | #endif | 322 | #endif /* !(defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_VMS) || defined(OPENSSL_SYS_OS2) || defined(OPENSSL_SYS_VXWORKS) || defined(OPENSSL_SYS_NETWARE)) */ |
| 323 | |||
| 275 | 324 | ||
| 276 | #if defined(OPENSSL_SYS_VXWORKS) | 325 | #if defined(OPENSSL_SYS_VXWORKS) |
| 277 | int RAND_poll(void) | 326 | int RAND_poll(void) |
| 278 | { | 327 | { |
| 279 | return 0; | 328 | return 0; |
| 280 | } | 329 | } |
| 281 | #endif | 330 | #endif |
diff --git a/src/lib/libcrypto/rand/rand_win.c b/src/lib/libcrypto/rand/rand_win.c index 30c69161ef..00dbe4232c 100644 --- a/src/lib/libcrypto/rand/rand_win.c +++ b/src/lib/libcrypto/rand/rand_win.c | |||
| @@ -121,6 +121,10 @@ | |||
| 121 | #include <wincrypt.h> | 121 | #include <wincrypt.h> |
| 122 | #include <tlhelp32.h> | 122 | #include <tlhelp32.h> |
| 123 | 123 | ||
| 124 | /* Limit the time spent walking through the heap, processes, threads and modules to | ||
| 125 | a maximum of 1000 miliseconds each, unless CryptoGenRandom failed */ | ||
| 126 | #define MAXDELAY 1000 | ||
| 127 | |||
| 124 | /* Intel hardware RNG CSP -- available from | 128 | /* Intel hardware RNG CSP -- available from |
| 125 | * http://developer.intel.com/design/security/rng/redist_license.htm | 129 | * http://developer.intel.com/design/security/rng/redist_license.htm |
| 126 | */ | 130 | */ |
| @@ -152,6 +156,7 @@ typedef struct tagCURSORINFO | |||
| 152 | #define CURSOR_SHOWING 0x00000001 | 156 | #define CURSOR_SHOWING 0x00000001 |
| 153 | #endif /* CURSOR_SHOWING */ | 157 | #endif /* CURSOR_SHOWING */ |
| 154 | 158 | ||
| 159 | #if !defined(OPENSSL_SYS_WINCE) | ||
| 155 | typedef BOOL (WINAPI *CRYPTACQUIRECONTEXTW)(HCRYPTPROV *, LPCWSTR, LPCWSTR, | 160 | typedef BOOL (WINAPI *CRYPTACQUIRECONTEXTW)(HCRYPTPROV *, LPCWSTR, LPCWSTR, |
| 156 | DWORD, DWORD); | 161 | DWORD, DWORD); |
| 157 | typedef BOOL (WINAPI *CRYPTGENRANDOM)(HCRYPTPROV, DWORD, BYTE *); | 162 | typedef BOOL (WINAPI *CRYPTGENRANDOM)(HCRYPTPROV, DWORD, BYTE *); |
| @@ -163,7 +168,7 @@ typedef DWORD (WINAPI *GETQUEUESTATUS)(UINT); | |||
| 163 | 168 | ||
| 164 | typedef HANDLE (WINAPI *CREATETOOLHELP32SNAPSHOT)(DWORD, DWORD); | 169 | typedef HANDLE (WINAPI *CREATETOOLHELP32SNAPSHOT)(DWORD, DWORD); |
| 165 | typedef BOOL (WINAPI *CLOSETOOLHELP32SNAPSHOT)(HANDLE); | 170 | typedef BOOL (WINAPI *CLOSETOOLHELP32SNAPSHOT)(HANDLE); |
| 166 | typedef BOOL (WINAPI *HEAP32FIRST)(LPHEAPENTRY32, DWORD, DWORD); | 171 | typedef BOOL (WINAPI *HEAP32FIRST)(LPHEAPENTRY32, DWORD, size_t); |
| 167 | typedef BOOL (WINAPI *HEAP32NEXT)(LPHEAPENTRY32); | 172 | typedef BOOL (WINAPI *HEAP32NEXT)(LPHEAPENTRY32); |
| 168 | typedef BOOL (WINAPI *HEAP32LIST)(HANDLE, LPHEAPLIST32); | 173 | typedef BOOL (WINAPI *HEAP32LIST)(HANDLE, LPHEAPLIST32); |
| 169 | typedef BOOL (WINAPI *PROCESS32)(HANDLE, LPPROCESSENTRY32); | 174 | typedef BOOL (WINAPI *PROCESS32)(HANDLE, LPPROCESSENTRY32); |
| @@ -171,9 +176,7 @@ typedef BOOL (WINAPI *THREAD32)(HANDLE, LPTHREADENTRY32); | |||
| 171 | typedef BOOL (WINAPI *MODULE32)(HANDLE, LPMODULEENTRY32); | 176 | typedef BOOL (WINAPI *MODULE32)(HANDLE, LPMODULEENTRY32); |
| 172 | 177 | ||
| 173 | #include <lmcons.h> | 178 | #include <lmcons.h> |
| 174 | #ifndef OPENSSL_SYS_WINCE | ||
| 175 | #include <lmstats.h> | 179 | #include <lmstats.h> |
| 176 | #endif | ||
| 177 | #if 1 /* The NET API is Unicode only. It requires the use of the UNICODE | 180 | #if 1 /* The NET API is Unicode only. It requires the use of the UNICODE |
| 178 | * macro. When UNICODE is defined LPTSTR becomes LPWSTR. LMSTR was | 181 | * macro. When UNICODE is defined LPTSTR becomes LPWSTR. LMSTR was |
| 179 | * was added to the Platform SDK to allow the NET API to be used in | 182 | * was added to the Platform SDK to allow the NET API to be used in |
| @@ -184,26 +187,14 @@ typedef NET_API_STATUS (NET_API_FUNCTION * NETSTATGET) | |||
| 184 | (LPWSTR, LPWSTR, DWORD, DWORD, LPBYTE*); | 187 | (LPWSTR, LPWSTR, DWORD, DWORD, LPBYTE*); |
| 185 | typedef NET_API_STATUS (NET_API_FUNCTION * NETFREE)(LPBYTE); | 188 | typedef NET_API_STATUS (NET_API_FUNCTION * NETFREE)(LPBYTE); |
| 186 | #endif /* 1 */ | 189 | #endif /* 1 */ |
| 190 | #endif /* !OPENSSL_SYS_WINCE */ | ||
| 187 | 191 | ||
| 188 | int RAND_poll(void) | 192 | int RAND_poll(void) |
| 189 | { | 193 | { |
| 190 | MEMORYSTATUS m; | 194 | MEMORYSTATUS m; |
| 191 | HCRYPTPROV hProvider = 0; | 195 | HCRYPTPROV hProvider = 0; |
| 192 | BYTE buf[64]; | ||
| 193 | DWORD w; | 196 | DWORD w; |
| 194 | HWND h; | 197 | int good = 0; |
| 195 | |||
| 196 | HMODULE advapi, kernel, user, netapi; | ||
| 197 | CRYPTACQUIRECONTEXTW acquire = 0; | ||
| 198 | CRYPTGENRANDOM gen = 0; | ||
| 199 | CRYPTRELEASECONTEXT release = 0; | ||
| 200 | #if 1 /* There was previously a problem with NETSTATGET. Currently, this | ||
| 201 | * section is still experimental, but if all goes well, this conditional | ||
| 202 | * will be removed | ||
| 203 | */ | ||
| 204 | NETSTATGET netstatget = 0; | ||
| 205 | NETFREE netfree = 0; | ||
| 206 | #endif /* 1 */ | ||
| 207 | 198 | ||
| 208 | /* Determine the OS version we are on so we can turn off things | 199 | /* Determine the OS version we are on so we can turn off things |
| 209 | * that do not work properly. | 200 | * that do not work properly. |
| @@ -212,21 +203,24 @@ int RAND_poll(void) | |||
| 212 | osverinfo.dwOSVersionInfoSize = sizeof(OSVERSIONINFO) ; | 203 | osverinfo.dwOSVersionInfoSize = sizeof(OSVERSIONINFO) ; |
| 213 | GetVersionEx( &osverinfo ) ; | 204 | GetVersionEx( &osverinfo ) ; |
| 214 | 205 | ||
| 215 | #if defined(OPENSSL_SYS_WINCE) && WCEPLATFORM!=MS_HPC_PRO | 206 | #if defined(OPENSSL_SYS_WINCE) |
| 216 | #ifndef CryptAcquireContext | 207 | # if defined(_WIN32_WCE) && _WIN32_WCE>=300 |
| 217 | #define CryptAcquireContext CryptAcquireContextW | 208 | /* Even though MSDN says _WIN32_WCE>=210, it doesn't seem to be available |
| 218 | #endif | 209 | * in commonly available implementations prior 300... */ |
| 210 | { | ||
| 211 | BYTE buf[64]; | ||
| 219 | /* poll the CryptoAPI PRNG */ | 212 | /* poll the CryptoAPI PRNG */ |
| 220 | /* The CryptoAPI returns sizeof(buf) bytes of randomness */ | 213 | /* The CryptoAPI returns sizeof(buf) bytes of randomness */ |
| 221 | if (CryptAcquireContext(&hProvider, 0, 0, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT)) | 214 | if (CryptAcquireContextW(&hProvider, NULL, NULL, PROV_RSA_FULL, |
| 215 | CRYPT_VERIFYCONTEXT)) | ||
| 222 | { | 216 | { |
| 223 | if (CryptGenRandom(hProvider, sizeof(buf), buf)) | 217 | if (CryptGenRandom(hProvider, sizeof(buf), buf)) |
| 224 | RAND_add(buf, sizeof(buf), sizeof(buf)); | 218 | RAND_add(buf, sizeof(buf), sizeof(buf)); |
| 225 | CryptReleaseContext(hProvider, 0); | 219 | CryptReleaseContext(hProvider, 0); |
| 226 | } | 220 | } |
| 227 | #endif | 221 | } |
| 228 | 222 | # endif | |
| 229 | #ifndef OPENSSL_SYS_WINCE | 223 | #else /* OPENSSL_SYS_WINCE */ |
| 230 | /* | 224 | /* |
| 231 | * None of below libraries are present on Windows CE, which is | 225 | * None of below libraries are present on Windows CE, which is |
| 232 | * why we #ifndef the whole section. This also excuses us from | 226 | * why we #ifndef the whole section. This also excuses us from |
| @@ -240,17 +234,19 @@ int RAND_poll(void) | |||
| 240 | * implement own shim routine, which would accept ANSI argument | 234 | * implement own shim routine, which would accept ANSI argument |
| 241 | * and expand it to Unicode. | 235 | * and expand it to Unicode. |
| 242 | */ | 236 | */ |
| 243 | 237 | { | |
| 244 | /* load functions dynamically - not available on all systems */ | 238 | /* load functions dynamically - not available on all systems */ |
| 245 | advapi = LoadLibrary(TEXT("ADVAPI32.DLL")); | 239 | HMODULE advapi = LoadLibrary(TEXT("ADVAPI32.DLL")); |
| 246 | kernel = LoadLibrary(TEXT("KERNEL32.DLL")); | 240 | HMODULE kernel = LoadLibrary(TEXT("KERNEL32.DLL")); |
| 247 | user = LoadLibrary(TEXT("USER32.DLL")); | 241 | HMODULE user = NULL; |
| 248 | netapi = LoadLibrary(TEXT("NETAPI32.DLL")); | 242 | HMODULE netapi = LoadLibrary(TEXT("NETAPI32.DLL")); |
| 249 | 243 | CRYPTACQUIRECONTEXTW acquire = NULL; | |
| 250 | #if 1 /* There was previously a problem with NETSTATGET. Currently, this | 244 | CRYPTGENRANDOM gen = NULL; |
| 251 | * section is still experimental, but if all goes well, this conditional | 245 | CRYPTRELEASECONTEXT release = NULL; |
| 252 | * will be removed | 246 | NETSTATGET netstatget = NULL; |
| 253 | */ | 247 | NETFREE netfree = NULL; |
| 248 | BYTE buf[64]; | ||
| 249 | |||
| 254 | if (netapi) | 250 | if (netapi) |
| 255 | { | 251 | { |
| 256 | netstatget = (NETSTATGET) GetProcAddress(netapi,"NetStatisticsGet"); | 252 | netstatget = (NETSTATGET) GetProcAddress(netapi,"NetStatisticsGet"); |
| @@ -280,7 +276,6 @@ int RAND_poll(void) | |||
| 280 | 276 | ||
| 281 | if (netapi) | 277 | if (netapi) |
| 282 | FreeLibrary(netapi); | 278 | FreeLibrary(netapi); |
| 283 | #endif /* 1 */ | ||
| 284 | 279 | ||
| 285 | /* It appears like this can cause an exception deep within ADVAPI32.DLL | 280 | /* It appears like this can cause an exception deep within ADVAPI32.DLL |
| 286 | * at random times on Windows 2000. Reported by Jeffrey Altman. | 281 | * at random times on Windows 2000. Reported by Jeffrey Altman. |
| @@ -356,12 +351,13 @@ int RAND_poll(void) | |||
| 356 | { | 351 | { |
| 357 | /* poll the CryptoAPI PRNG */ | 352 | /* poll the CryptoAPI PRNG */ |
| 358 | /* The CryptoAPI returns sizeof(buf) bytes of randomness */ | 353 | /* The CryptoAPI returns sizeof(buf) bytes of randomness */ |
| 359 | if (acquire(&hProvider, 0, 0, PROV_RSA_FULL, | 354 | if (acquire(&hProvider, NULL, NULL, PROV_RSA_FULL, |
| 360 | CRYPT_VERIFYCONTEXT)) | 355 | CRYPT_VERIFYCONTEXT)) |
| 361 | { | 356 | { |
| 362 | if (gen(hProvider, sizeof(buf), buf) != 0) | 357 | if (gen(hProvider, sizeof(buf), buf) != 0) |
| 363 | { | 358 | { |
| 364 | RAND_add(buf, sizeof(buf), 0); | 359 | RAND_add(buf, sizeof(buf), 0); |
| 360 | good = 1; | ||
| 365 | #if 0 | 361 | #if 0 |
| 366 | printf("randomness from PROV_RSA_FULL\n"); | 362 | printf("randomness from PROV_RSA_FULL\n"); |
| 367 | #endif | 363 | #endif |
| @@ -375,6 +371,7 @@ int RAND_poll(void) | |||
| 375 | if (gen(hProvider, sizeof(buf), buf) != 0) | 371 | if (gen(hProvider, sizeof(buf), buf) != 0) |
| 376 | { | 372 | { |
| 377 | RAND_add(buf, sizeof(buf), sizeof(buf)); | 373 | RAND_add(buf, sizeof(buf), sizeof(buf)); |
| 374 | good = 1; | ||
| 378 | #if 0 | 375 | #if 0 |
| 379 | printf("randomness from PROV_INTEL_SEC\n"); | 376 | printf("randomness from PROV_INTEL_SEC\n"); |
| 380 | #endif | 377 | #endif |
| @@ -386,7 +383,9 @@ int RAND_poll(void) | |||
| 386 | if (advapi) | 383 | if (advapi) |
| 387 | FreeLibrary(advapi); | 384 | FreeLibrary(advapi); |
| 388 | 385 | ||
| 389 | if (user) | 386 | if ((osverinfo.dwPlatformId != VER_PLATFORM_WIN32_NT || |
| 387 | !OPENSSL_isservice()) && | ||
| 388 | (user = LoadLibrary(TEXT("USER32.DLL")))) | ||
| 390 | { | 389 | { |
| 391 | GETCURSORINFO cursor; | 390 | GETCURSORINFO cursor; |
| 392 | GETFOREGROUNDWINDOW win; | 391 | GETFOREGROUNDWINDOW win; |
| @@ -399,7 +398,7 @@ int RAND_poll(void) | |||
| 399 | if (win) | 398 | if (win) |
| 400 | { | 399 | { |
| 401 | /* window handle */ | 400 | /* window handle */ |
| 402 | h = win(); | 401 | HWND h = win(); |
| 403 | RAND_add(&h, sizeof(h), 0); | 402 | RAND_add(&h, sizeof(h), 0); |
| 404 | } | 403 | } |
| 405 | if (cursor) | 404 | if (cursor) |
| @@ -464,6 +463,7 @@ int RAND_poll(void) | |||
| 464 | PROCESSENTRY32 p; | 463 | PROCESSENTRY32 p; |
| 465 | THREADENTRY32 t; | 464 | THREADENTRY32 t; |
| 466 | MODULEENTRY32 m; | 465 | MODULEENTRY32 m; |
| 466 | DWORD stoptime = 0; | ||
| 467 | 467 | ||
| 468 | snap = (CREATETOOLHELP32SNAPSHOT) | 468 | snap = (CREATETOOLHELP32SNAPSHOT) |
| 469 | GetProcAddress(kernel, "CreateToolhelp32Snapshot"); | 469 | GetProcAddress(kernel, "CreateToolhelp32Snapshot"); |
| @@ -495,6 +495,7 @@ int RAND_poll(void) | |||
| 495 | * of entropy. | 495 | * of entropy. |
| 496 | */ | 496 | */ |
| 497 | hlist.dwSize = sizeof(HEAPLIST32); | 497 | hlist.dwSize = sizeof(HEAPLIST32); |
| 498 | if (good) stoptime = GetTickCount() + MAXDELAY; | ||
| 498 | if (heaplist_first(handle, &hlist)) | 499 | if (heaplist_first(handle, &hlist)) |
| 499 | do | 500 | do |
| 500 | { | 501 | { |
| @@ -512,18 +513,20 @@ int RAND_poll(void) | |||
| 512 | && --entrycnt > 0); | 513 | && --entrycnt > 0); |
| 513 | } | 514 | } |
| 514 | } while (heaplist_next(handle, | 515 | } while (heaplist_next(handle, |
| 515 | &hlist)); | 516 | &hlist) && GetTickCount() < stoptime); |
| 516 | 517 | ||
| 517 | /* process walking */ | 518 | /* process walking */ |
| 518 | /* PROCESSENTRY32 contains 9 fields that will change | 519 | /* PROCESSENTRY32 contains 9 fields that will change |
| 519 | * with each entry. Consider each field a source of | 520 | * with each entry. Consider each field a source of |
| 520 | * 1 byte of entropy. | 521 | * 1 byte of entropy. |
| 521 | */ | 522 | */ |
| 522 | p.dwSize = sizeof(PROCESSENTRY32); | 523 | p.dwSize = sizeof(PROCESSENTRY32); |
| 524 | |||
| 525 | if (good) stoptime = GetTickCount() + MAXDELAY; | ||
| 523 | if (process_first(handle, &p)) | 526 | if (process_first(handle, &p)) |
| 524 | do | 527 | do |
| 525 | RAND_add(&p, p.dwSize, 9); | 528 | RAND_add(&p, p.dwSize, 9); |
| 526 | while (process_next(handle, &p)); | 529 | while (process_next(handle, &p) && GetTickCount() < stoptime); |
| 527 | 530 | ||
| 528 | /* thread walking */ | 531 | /* thread walking */ |
| 529 | /* THREADENTRY32 contains 6 fields that will change | 532 | /* THREADENTRY32 contains 6 fields that will change |
| @@ -531,10 +534,11 @@ int RAND_poll(void) | |||
| 531 | * 1 byte of entropy. | 534 | * 1 byte of entropy. |
| 532 | */ | 535 | */ |
| 533 | t.dwSize = sizeof(THREADENTRY32); | 536 | t.dwSize = sizeof(THREADENTRY32); |
| 537 | if (good) stoptime = GetTickCount() + MAXDELAY; | ||
| 534 | if (thread_first(handle, &t)) | 538 | if (thread_first(handle, &t)) |
| 535 | do | 539 | do |
| 536 | RAND_add(&t, t.dwSize, 6); | 540 | RAND_add(&t, t.dwSize, 6); |
| 537 | while (thread_next(handle, &t)); | 541 | while (thread_next(handle, &t) && GetTickCount() < stoptime); |
| 538 | 542 | ||
| 539 | /* module walking */ | 543 | /* module walking */ |
| 540 | /* MODULEENTRY32 contains 9 fields that will change | 544 | /* MODULEENTRY32 contains 9 fields that will change |
| @@ -542,18 +546,22 @@ int RAND_poll(void) | |||
| 542 | * 1 byte of entropy. | 546 | * 1 byte of entropy. |
| 543 | */ | 547 | */ |
| 544 | m.dwSize = sizeof(MODULEENTRY32); | 548 | m.dwSize = sizeof(MODULEENTRY32); |
| 549 | if (good) stoptime = GetTickCount() + MAXDELAY; | ||
| 545 | if (module_first(handle, &m)) | 550 | if (module_first(handle, &m)) |
| 546 | do | 551 | do |
| 547 | RAND_add(&m, m.dwSize, 9); | 552 | RAND_add(&m, m.dwSize, 9); |
| 548 | while (module_next(handle, &m)); | 553 | while (module_next(handle, &m) |
| 554 | && (GetTickCount() < stoptime)); | ||
| 549 | if (close_snap) | 555 | if (close_snap) |
| 550 | close_snap(handle); | 556 | close_snap(handle); |
| 551 | else | 557 | else |
| 552 | CloseHandle(handle); | 558 | CloseHandle(handle); |
| 559 | |||
| 553 | } | 560 | } |
| 554 | 561 | ||
| 555 | FreeLibrary(kernel); | 562 | FreeLibrary(kernel); |
| 556 | } | 563 | } |
| 564 | } | ||
| 557 | #endif /* !OPENSSL_SYS_WINCE */ | 565 | #endif /* !OPENSSL_SYS_WINCE */ |
| 558 | 566 | ||
| 559 | /* timer data */ | 567 | /* timer data */ |
| @@ -693,6 +701,9 @@ static void readscreen(void) | |||
| 693 | int y; /* y-coordinate of screen lines to grab */ | 701 | int y; /* y-coordinate of screen lines to grab */ |
| 694 | int n = 16; /* number of screen lines to grab at a time */ | 702 | int n = 16; /* number of screen lines to grab at a time */ |
| 695 | 703 | ||
| 704 | if (GetVersion() >= 0x80000000 || !OPENSSL_isservice()) | ||
| 705 | return; | ||
| 706 | |||
| 696 | /* Create a screen DC and a memory DC compatible to screen DC */ | 707 | /* Create a screen DC and a memory DC compatible to screen DC */ |
| 697 | hScrDC = CreateDC(TEXT("DISPLAY"), NULL, NULL, NULL); | 708 | hScrDC = CreateDC(TEXT("DISPLAY"), NULL, NULL, NULL); |
| 698 | hMemDC = CreateCompatibleDC(hScrDC); | 709 | hMemDC = CreateCompatibleDC(hScrDC); |
diff --git a/src/lib/libcrypto/rand/randfile.c b/src/lib/libcrypto/rand/randfile.c index d847d8ebdf..005cb38cb0 100644 --- a/src/lib/libcrypto/rand/randfile.c +++ b/src/lib/libcrypto/rand/randfile.c | |||
| @@ -102,10 +102,8 @@ int RAND_load_file(const char *file, long bytes) | |||
| 102 | 102 | ||
| 103 | if (file == NULL) return(0); | 103 | if (file == NULL) return(0); |
| 104 | 104 | ||
| 105 | i=stat(file,&sb); | 105 | if (stat(file,&sb) < 0) return(0); |
| 106 | /* If the state fails, put some crap in anyway */ | 106 | RAND_add(&sb,sizeof(sb),0.0); |
| 107 | RAND_add(&sb,sizeof(sb),0); | ||
| 108 | if (i < 0) return(0); | ||
| 109 | if (bytes == 0) return(ret); | 107 | if (bytes == 0) return(ret); |
| 110 | 108 | ||
| 111 | in=fopen(file,"rb"); | 109 | in=fopen(file,"rb"); |
| @@ -128,8 +126,12 @@ int RAND_load_file(const char *file, long bytes) | |||
| 128 | n = BUFSIZE; | 126 | n = BUFSIZE; |
| 129 | i=fread(buf,1,n,in); | 127 | i=fread(buf,1,n,in); |
| 130 | if (i <= 0) break; | 128 | if (i <= 0) break; |
| 129 | #ifdef PURIFY | ||
| 130 | RAND_add(buf,i,(double)i); | ||
| 131 | #else | ||
| 131 | /* even if n != i, use the full array */ | 132 | /* even if n != i, use the full array */ |
| 132 | RAND_add(buf,n,i); | 133 | RAND_add(buf,n,(double)i); |
| 134 | #endif | ||
| 133 | ret+=i; | 135 | ret+=i; |
| 134 | if (bytes > 0) | 136 | if (bytes > 0) |
| 135 | { | 137 | { |
diff --git a/src/lib/libcrypto/rand/randtest.c b/src/lib/libcrypto/rand/randtest.c index 701932e6ee..9e92a70b03 100644 --- a/src/lib/libcrypto/rand/randtest.c +++ b/src/lib/libcrypto/rand/randtest.c | |||
| @@ -65,7 +65,7 @@ | |||
| 65 | /* some FIPS 140-1 random number test */ | 65 | /* some FIPS 140-1 random number test */ |
| 66 | /* some simple tests */ | 66 | /* some simple tests */ |
| 67 | 67 | ||
| 68 | int main() | 68 | int main(int argc,char **argv) |
| 69 | { | 69 | { |
| 70 | unsigned char buf[2500]; | 70 | unsigned char buf[2500]; |
| 71 | int i,j,k,s,sign,nsign,err=0; | 71 | int i,j,k,s,sign,nsign,err=0; |
| @@ -211,6 +211,9 @@ int main() | |||
| 211 | printf("test 4 done\n"); | 211 | printf("test 4 done\n"); |
| 212 | err: | 212 | err: |
| 213 | err=((err)?1:0); | 213 | err=((err)?1:0); |
| 214 | #ifdef OPENSSL_SYS_NETWARE | ||
| 215 | if (err) printf("ERROR: %d\n", err); | ||
| 216 | #endif | ||
| 214 | EXIT(err); | 217 | EXIT(err); |
| 215 | return(err); | 218 | return(err); |
| 216 | } | 219 | } |
