RAND_seed(rnd_seed, sizeof rnd_seed);
On Tue, Aug 13, 2013 at 6:16 PM, baban devkate wrote:
>
> FYI -
>
> RAND_bytes(buf, bytes) receives correct parameters as bytes=256 for
> SHA256.
>
>
> int RAND_bytes(unsigned char *buf, int num)
> {
> const RAND_METHOD *me
turn meth->bytes(buf,num);
}
Print(L" RAND_bytes fails\n");
return(-1);
}
On Tue, Aug 13, 2013 at 3:35 PM, baban devkate wrote:
> Hello,
>
> RAND_bytes() will use the proper OS-provided RNG e.g. /dev/urandom or
> /dev/randomon Linux and CryptGenRandom() on Win
Hello,
RAND_bytes() will use the proper OS-provided RNG e.g. /dev/urandom or
/dev/randomon Linux and CryptGenRandom() on Windows.
I want to know how it works in Pre-boot environement?
In pre-boot environment, if RAND_bytes() returns zero then what does it
mean?
Is it because PRNG is not properl
My application failing in RSA_setup_blinding().
-After debug I found BN_BLINDING_create_param() returns NULL.
-RAND_status() returns zero, so PRNG is not properly seeded.
FYI- I am using Ubuntu 12.04, which provides /dev/urandom and /dev/random.
Don't know how to proceed:(
I am stuck now, a
Thanks for confirmation Dave.
On Thu, Aug 8, 2013 at 12:35 PM, Dave Thompson wrote:
> >From: owner-openssl-us...@openssl.org On Behalf Of baban devkate
> >Sent: Thursday, 08 August, 2013 00:54
>
> >Have query about certificates on-disk size on encoded szie of
> &g
Hello,
Have query about certificates on-disk size on encoded szie of x509
certificate mismatch.
code snippet:-
Status = ReadCertKeyFile ( ); //populates X509Data & X509DataSize by
reading ca-int.crt of 0x3C9 bytes on-disk size
FYI-ca-int.crt is chained from ca.crt
BIOX509 = BIO_new_me