Would the attached patch be agreeable to both of you? It contains a fix (okay, it's a hack) to ensure OpenSSL doesn't loop infinitely on crashing Heap32Next, so that should at least cover the (theoretical?) issue of arbitrary/unknown fault origin from within Heap32Next.
Then there's the fun part about the argument of not using it in a multithread app when it's crashing on WinCE: well, this particular bit of code is part of the entropy harvester, which has some different demands, compared to 'regular application code' (compare the Debian screwup from last year), so my position is this: as long as the crash is controlled (and it is, thanks to the code posted by Tanguy) and it's cause is generally known (it's documented in MSDN for one of the Microsoft platforms), it's good enough as a partial source of entropy: after all, we do NOT depend on the data [structures] returned, all we are looking for here, is _entropy_. (And philosophically, is a corrupt data structure bad from an entropy perspective? Nope. Not at all.) Thus, this whole issue reduces to the question: do we can uncontrolled core dumps from using this? Answer: no, we don't. Can we get infinite loops, assuming worst case scenario of total heap API failure? Maybe. So we fix that by limiting the number of crash failures we tolerate here. (And, yes, I know, _theoretically_, a corrupt heap [API] can deliver seemingly 'good' structure indefinitely. Heck, same fix: limit the number of _total_ rounds instead of the number of failures and we're good to go. (move the ex_cnt_limit decrement to the while condition instead, then.) Meanwhile, this is a definite software improvement for CE, so I'd really like to have it in there.) (Attached diff against latest 0.9.9 CVS HEAD) -- Met vriendelijke groeten / Best regards, Ger Hobbelt -------------------------------------------------- web: http://www.hobbelt.com/ http://www.hebbut.net/ mail: g...@hobbelt.com mobile: +31-6-11 120 978 --------------------------------------------------
--- /home/ger/prj/1original/openssl/openssl/./crypto/rand/rand_win.c 2005-10-13 21:06:43.000000000 +0200 +++ ./crypto/rand/rand_win.c 2009-03-11 12:25:50.000000000 +0100 @@ -494,12 +496,28 @@ * each entry. Consider each field a source of 1 byte * of entropy. */ + ZeroMemory(&hlist, sizeof(HEAPLIST32)); hlist.dwSize = sizeof(HEAPLIST32); if (good) stoptime = GetTickCount() + MAXDELAY; if (heaplist_first(handle, &hlist)) + { + /* + following discussion on dev ML, exception on WinCE (or other Win + platform) is theoretically of unknown origin; prevent infinite + loop here when this theoretical case occurs; otherwise cope with + the expected (MSDN documented) exception-throwing behaviour of + Heap32Next() on WinCE. + + based on patch in original message by Tanguy Fautré (2009/03/02) + Subject: RAND_poll() and CreateToolhelp32Snapshot() stability + */ + int ex_cnt_limit = 42; do { RAND_add(&hlist, hlist.dwSize, 3); + __try + { + ZeroMemory(&hentry, sizeof(HEAPENTRY32)); hentry.dwSize = sizeof(HEAPENTRY32); if (heap_first(&hentry, hlist.th32ProcessID, @@ -512,8 +530,16 @@ while (heap_next(&hentry) && --entrycnt > 0); } - } while (heaplist_next(handle, - &hlist) && GetTickCount() < stoptime); + } + __except (EXCEPTION_EXECUTE_HANDLER) + { + /* ignore access violations when walking the heap list */ + ex_cnt_limit--; + } + } while (heaplist_next(handle, &hlist) + && GetTickCount() < stoptime + && ex_cnt_limit > 0); + } /* process walking */ /* PROCESSENTRY32 contains 9 fields that will change