1*314a6cc3Sbcook /* $OpenBSD: getentropy_win.c,v 1.6 2020/11/11 10:41:24 bcook Exp $ */
2ca0e1beeSwouter
3ca0e1beeSwouter /*
4ca0e1beeSwouter * Copyright (c) 2014, Theo de Raadt <deraadt@openbsd.org>
5ca0e1beeSwouter * Copyright (c) 2014, Bob Beck <beck@obtuse.com>
6ca0e1beeSwouter *
7ca0e1beeSwouter * Permission to use, copy, modify, and distribute this software for any
8ca0e1beeSwouter * purpose with or without fee is hereby granted, provided that the above
9ca0e1beeSwouter * copyright notice and this permission notice appear in all copies.
10ca0e1beeSwouter *
11ca0e1beeSwouter * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
12ca0e1beeSwouter * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
13ca0e1beeSwouter * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
14ca0e1beeSwouter * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
15ca0e1beeSwouter * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
16ca0e1beeSwouter * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
17ca0e1beeSwouter * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
18b5f12122Sderaadt *
19b5f12122Sderaadt * Emulation of getentropy(2) as documented at:
20b8461433Stb * http://man.openbsd.org/getentropy.2
21ca0e1beeSwouter */
22ca0e1beeSwouter
23ca0e1beeSwouter #include <windows.h>
24*314a6cc3Sbcook #include <bcrypt.h>
25ca0e1beeSwouter #include <errno.h>
26ca0e1beeSwouter #include <stdint.h>
27ca0e1beeSwouter #include <sys/types.h>
28ca0e1beeSwouter
29ca0e1beeSwouter int getentropy(void *buf, size_t len);
30ca0e1beeSwouter
31ca0e1beeSwouter /*
32*314a6cc3Sbcook * On Windows, BCryptGenRandom with BCRYPT_USE_SYSTEM_PREFERRED_RNG is supposed
33*314a6cc3Sbcook * to be a well-seeded, cryptographically strong random number generator.
34*314a6cc3Sbcook * https://docs.microsoft.com/en-us/windows/win32/api/bcrypt/nf-bcrypt-bcryptgenrandom
35ca0e1beeSwouter */
36ca0e1beeSwouter int
getentropy(void * buf,size_t len)37ca0e1beeSwouter getentropy(void *buf, size_t len)
38ca0e1beeSwouter {
39ca0e1beeSwouter if (len > 256) {
40ca0e1beeSwouter errno = EIO;
41044fc755Sderaadt return (-1);
42ca0e1beeSwouter }
43ca0e1beeSwouter
44*314a6cc3Sbcook if (FAILED(BCryptGenRandom(NULL, buf, len, BCRYPT_USE_SYSTEM_PREFERRED_RNG))) {
45ca0e1beeSwouter errno = EIO;
46ca0e1beeSwouter return (-1);
47ca0e1beeSwouter }
48*314a6cc3Sbcook
49*314a6cc3Sbcook return (0);
50*314a6cc3Sbcook }
51