Hello,
I'm interested in having 'openssl' version 1.0.1e
make use, by default, of hardware generated
true random numbers for creating session keys.
So far I've configured a STElectronics ST33
TPM as the majority source of /dev/random
entropy by configuring and starting the
'rngd' daemon from 'rng
I don't know the source and this crypto key method, but normally private
keys are generated wiht microtimes and random numbers something like a
uuid, try search the code (.c, .cc files) to get something about random,
unique, uuid or something that generate the private key
Em 21/09/2013 13:02, "Dave
Dear sirs:
I use your openssl commandline utility but I need to know, which signing
algorithm is used when
*openssl dgst -sign* %key_pem% ...
is issued.
I will appreciate your answer.
Regards,
Marco A. Cruz Quevedo
---
Hi All,
I'm working on upgrade openssl version from 0.9.8y to 1.0.1e in our product.
To import PEM certificates we use use high-level OpenSSL API:
OpenSSL_add_all_algorithms();
BIO *key=BIO_new(BIO_s_file());
int res = BIO_read_filename(key,filename);
EVP_PKEY* pkey = PEM_read_bio_Pr
I have been working on a paper for some time. At the end of this I am
looking at the use of secp256k1 in crypto currencies. This has been a
problem to figure out how these things get the private key. I picked up the
source code and although not a programmer I can sift through the Sanskrit
OK. I