/************************************************* * Win32 CryptoAPI EntropySource Source File * * (C) 1999-2007 Jack Lloyd * *************************************************/ #include #include #include #include namespace Botan { /** * Gather Entropy from Win32 CAPI */ u32bit Win32_CAPI_EntropySource::slow_poll(byte output[], u32bit length) { return fast_poll(output, length); } /** * Gather Entropy from Win32 CAPI */ u32bit Win32_CAPI_EntropySource::fast_poll(byte output[], u32bit length) { class CSP_Handle { public: CSP_Handle(u64bit capi_provider) { valid = false; DWORD prov_type = (DWORD)capi_provider; if(CryptAcquireContext(&handle, 0, 0, prov_type, CRYPT_VERIFYCONTEXT)) valid = true; } ~CSP_Handle() { if(is_valid()) CryptReleaseContext(handle, 0); } void gen_random(byte out[], u32bit n) const { if(is_valid()) CryptGenRandom(handle, n, out); } bool is_valid() const { return valid; } HCRYPTPROV get_handle() const { return handle; } private: HCRYPTPROV handle; bool valid; }; if(length > 64) length = 64; for(u32bit j = 0; j != prov_types.size(); ++j) { CSP_Handle csp(prov_types[j]); if(!csp.is_valid()) continue; csp.gen_random(output, length); break; } return length; } /************************************************* * Gather Entropy from Win32 CAPI * *************************************************/ Win32_CAPI_EntropySource::Win32_CAPI_EntropySource(const std::string& provs) { std::vector capi_provs = split_on(provs, ':'); for(u32bit j = 0; j != capi_provs.size(); ++j) { if(capi_provs[j] == "RSA_FULL") prov_types.push_back(PROV_RSA_FULL); if(capi_provs[j] == "INTEL_SEC") prov_types.push_back(PROV_INTEL_SEC); if(capi_provs[j] == "FORTEZZA") prov_types.push_back(PROV_FORTEZZA); if(capi_provs[j] == "RNG") prov_types.push_back(PROV_RNG); } if(prov_types.size() == 0) prov_types.push_back(PROV_RSA_FULL); } }