In message <[EMAIL PROTECTED]> on Thu, 19 Jun 2003 13:40:19 -0700 (PDT), Michelle Li 
<[EMAIL PROTECTED]> said:

xiaowei> I just wrote a program using OpenSSL crypto library (version
xiaowei> 0.9.7b). Everything works fine. But I have concerns about
xiaowei> whether I should seed the PRNG and exactly how to do that.

If things seemed to work, it seems OpenSSL was able to find a minimum
of random data that was enough to fit the requirements for minimum
entropy coded into OpenSSL.  Therefore, if that minimum is enough
(something you have to judge for yourself), you're fine.

If you want more entropy, you could use some extra randomness server,
for example prngd (look it up in Google).  OpenSSL 0.9.7 and on can
read randomness from a prngd channel automagically as long as said
channel is a named socket on one of the known places.

If you want to add more entropy, you have to do it with RAND_seed().
How you get that entropy is entirely up to you and the possibilities
of your environment.  It could be background noise from your local
input line (a built-in microphone, like you find in most laptops), or
random network data, or...

Unless you're very concerned about entropy, I'd be happy with the
stuff that OpenSSL finds on it's own.

-- 
Richard Levitte   \ Tunnlandsvägen 3  \ [EMAIL PROTECTED]
[EMAIL PROTECTED]  \ S-168 36  BROMMA  \ T: +46-8-26 52 47
                    \      SWEDEN       \ or +46-708-26 53 44
Procurator Odiosus Ex Infernis                -- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/

Unsolicited commercial email is subject to an archival fee of $400.
See <http://www.stacken.kth.se/~levitte/mail/> for more info.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to