using TRNG via /dev/random

2013-09-21 Thread starlight . 2013z3
Hello, I'm interested in having 'openssl' version 1.0.1e make use, by default, of hardware generated true random numbers for creating session keys. So far I've configured a STElectronics ST33 TPM as the majority source of /dev/random entropy by configuring and starting the 'rngd' daemon from 'rng

Re: question

2013-09-21 Thread Roberto Spadim
I don't know the source and this crypto key method, but normally private keys are generated wiht microtimes and random numbers something like a uuid, try search the code (.c, .cc files) to get something about random, unique, uuid or something that generate the private key Em 21/09/2013 13:02, "Dave

About dgst option

2013-09-21 Thread Marco A. Cruz Quevedo
Dear sirs: I use your openssl commandline utility but I need to know, which signing algorithm is used when *openssl dgst -sign* %key_pem% ... is issued. I will appreciate your answer. Regards, Marco A. Cruz Quevedo ---

For some openssl versions DES-EDE cipher has IV_len = 8

2013-09-21 Thread AlexeyGoryunov
Hi All, I'm working on upgrade openssl version from 0.9.8y to 1.0.1e in our product. To import PEM certificates we use use high-level OpenSSL API: OpenSSL_add_all_algorithms(); BIO *key=BIO_new(BIO_s_file()); int res = BIO_read_filename(key,filename); EVP_PKEY* pkey = PEM_read_bio_Pr

question

2013-09-21 Thread Dave Paxton
I have been working on a paper for some time. At the end of this I am looking at the use of secp256k1 in crypto currencies. This has been a problem to figure out how these things get the private key. I picked up the source code and although not a programmer I can sift through the Sanskrit OK. I