Re: why we call it entropy

2008-08-08 Thread Michael Sierchio
Michael Sierchio wrote: A bit stream may have 1 bit of entropy per bit of message (i.e. an entropy of 1), and therefore be incompressible -- perhaps what Schwartz thinks he means when he says "truly random" -- and be entirely predictable. In case this isn't obvious, apply Von Neumann's correct

why we call it entropy

2008-08-08 Thread Michael Sierchio
Von Neumann counseled Shannon to call it entropy because "no one really knows what entropy is". ;-) I wanted to say that it's inherently problematic to use things like the "randomness" in the interarrival time of events like interrupts, etc. to "gather" "entropy" -- Ted has touched on this with

RE: compiling app with separate openssl

2008-08-08 Thread Shaw Graham George
Hi, I'm no Linux guru but this worked for me (or rather it's equivalent). To ensure that you link to your development libraries: g++ -o tls-srv main.o /home/dev/openssl-0.9.8d/lib/libssl.so.0.9.8 /home/dev/openssl-0.9.8d/lib/libcrypto.so.0.9.8 ... and then use LD_LIBRARY_PATH in your run-time t

compiling app with separate openssl

2008-08-08 Thread Lauer, Thomas
hi. i'm using ubuntu with libssl-dev (0.9.8g-4ubuntu3.3). additional i compiled openssl 0.9.8d in a separate folder (/home/dev/openssl-0.9.8d). now i'm trying to compile a tool that will link to my second openssl-lib in /home/dev... this is my g++ call: #> g++ -o tls-srv main.o -L/home/dev/ope

Re: Certificate creation stuck at 256 certificates

2008-08-08 Thread Michael S. Zick
On Fri August 8 2008 05:10, Ger Hobbelt wrote: > It may not be the number itself, but the file indexing; > There may be another option, called CA_dir (or something like that). > It contains every CA certificate in a separate file and optionally > all CRLs to use. > You run c_rehash on this direc

Re: EVP_CipherInit_ex because cipher->do_cipher is NULL

2008-08-08 Thread Ger Hobbelt
On Thu, Aug 7, 2008 at 8:13 AM, Ambarish Mitra <[EMAIL PROTECTED]> wrote: > The EVP_CipherInit_ex function returned 0 - indicating failure. Upon What does OpenSSL report as error code/description? (E.g. when using ERR_print_errors() - see the documentation for how to use) Ger -- Met vrien

Re: Certificate creation stuck at 256 certificates

2008-08-08 Thread Ger Hobbelt
Hm... I don't have the sources for 0.9.7 around, but when I quickly look at the 0.9.9 code, it shouldn't do this (a2i_ASN1_INTEGER() is used to convert the hex text in the file to a BigNum and to address the sign mentioned before: AFAICS that routine requires an ASCII '-' to identify negative value

Re: problems with certificate chain

2008-08-08 Thread Sergio
Kyle Hamilton escribió: A server is not allowed to sign certificates unless its certificate has a CA:TRUE extended attribute, and "key signing" as an extended usage field. If it doesn't have those, it's not going to chain properly, no matter how you've got it set up. Only a CA can sign end-enti

Re: problems with certificate chain

2008-08-08 Thread Kyle Hamilton
A server is not allowed to sign certificates unless its certificate has a CA:TRUE extended attribute, and "key signing" as an extended usage field. If it doesn't have those, it's not going to chain properly, no matter how you've got it set up. Only a CA can sign end-entity certificates. -Kyle H

Re: [openssl-users] RE: Certificate creation stuck at 256 certificates

2008-08-08 Thread Erwann ABALEA
Hodie VII Id. Aug. MMVIII est, David Schwartz scripsit: > > > I have had a look around and it appears that the serial number > > for the > > last certificate created was FF (hex), indicating 256 > > certificates have > > so far been created. The next number

Re: problems with certificate chain

2008-08-08 Thread Sergio
Goetz Babin-Ebell escribió: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Sergio wrote: | I think so and you're right. Signing a client cert with a server cert is | inefficient and all my problems would solve itself if radius has ocsp | support. The missing support for OCSP is not your proble

Re: NIST SP 800-22

2008-08-08 Thread Kyle Hamilton
This is not the place to try to get support with the rand() library of any IAR product. You will need to check with IAR. I'm pretty sure that the answer is "no", though, especially when used like that. -Kyle H On Fri, Aug 8, 2008 at 12:27 AM, abc_123_ok <[EMAIL PROTECTED]> wrote: > Dear All, >

NIST SP 800-22

2008-08-08 Thread abc_123_ok
Dear All, In my program, I use rand() to generate some randsom, I use IAR compiler to compile my program, I want to know the rand() of IAR lib if it is according to NIST SP 800-22. for (count = 0; count < 32; count++) { sslContext[0].clientRandom[count] = rand(); sslContext[0].sessi