Michael Sierchio wrote:
A bit stream may have 1 bit of entropy per bit of message (i.e. an
entropy of 1), and therefore be incompressible -- perhaps what Schwartz
thinks he means when he says "truly random" -- and be entirely predictable.
In case this isn't obvious, apply Von Neumann's correct
Von Neumann counseled Shannon to call it entropy because "no one
really knows what entropy is". ;-)
I wanted to say that it's inherently problematic to use things like the
"randomness" in the interarrival time of events like interrupts, etc.
to "gather" "entropy" -- Ted has touched on this with
Hi,
I'm no Linux guru but this worked for me (or rather it's equivalent).
To ensure that you link to your development libraries:
g++ -o tls-srv main.o /home/dev/openssl-0.9.8d/lib/libssl.so.0.9.8
/home/dev/openssl-0.9.8d/lib/libcrypto.so.0.9.8
... and then use LD_LIBRARY_PATH in your run-time t
hi.
i'm using ubuntu with libssl-dev (0.9.8g-4ubuntu3.3).
additional i compiled openssl 0.9.8d in a separate folder
(/home/dev/openssl-0.9.8d).
now i'm trying to compile a tool that will link to my second openssl-lib
in /home/dev...
this is my g++ call:
#> g++ -o tls-srv main.o -L/home/dev/ope
On Fri August 8 2008 05:10, Ger Hobbelt wrote:
>
It may not be the number itself, but the file indexing;
> There may be another option, called CA_dir (or something like that).
> It contains every CA certificate in a separate file and optionally
> all CRLs to use.
> You run c_rehash on this direc
On Thu, Aug 7, 2008 at 8:13 AM, Ambarish Mitra
<[EMAIL PROTECTED]> wrote:
> The EVP_CipherInit_ex function returned 0 - indicating failure. Upon
What does OpenSSL report as error code/description? (E.g. when using
ERR_print_errors() - see the documentation for how to use)
Ger
--
Met vrien
Hm... I don't have the sources for 0.9.7 around, but when I quickly
look at the 0.9.9 code, it shouldn't do this (a2i_ASN1_INTEGER() is
used to convert the hex text in the file to a BigNum and to address
the sign mentioned before: AFAICS that routine requires an ASCII '-'
to identify negative value
Kyle Hamilton escribió:
A server is not allowed to sign certificates unless its certificate
has a CA:TRUE extended attribute, and "key signing" as an extended
usage field.
If it doesn't have those, it's not going to chain properly, no matter
how you've got it set up.
Only a CA can sign end-enti
A server is not allowed to sign certificates unless its certificate
has a CA:TRUE extended attribute, and "key signing" as an extended
usage field.
If it doesn't have those, it's not going to chain properly, no matter
how you've got it set up.
Only a CA can sign end-entity certificates.
-Kyle H
Hodie VII Id. Aug. MMVIII est, David Schwartz scripsit:
>
> > I have had a look around and it appears that the serial number
> > for the
> > last certificate created was FF (hex), indicating 256
> > certificates have
> > so far been created. The next number
Goetz Babin-Ebell escribió:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Sergio wrote:
| I think so and you're right. Signing a client cert with a server
cert is
| inefficient and all my problems would solve itself if radius has ocsp
| support.
The missing support for OCSP is not your proble
This is not the place to try to get support with the rand() library of
any IAR product. You will need to check with IAR. I'm pretty sure
that the answer is "no", though, especially when used like that.
-Kyle H
On Fri, Aug 8, 2008 at 12:27 AM, abc_123_ok <[EMAIL PROTECTED]> wrote:
> Dear All,
>
Dear All,
In my program, I use rand() to generate some randsom, I use IAR compiler to
compile my program, I want to know the rand() of IAR lib if it is according to
NIST SP 800-22.
for (count = 0; count < 32; count++)
{
sslContext[0].clientRandom[count] = rand();
sslContext[0].sessi
13 matches
Mail list logo