Re: seed/$RANDFILE confusion

2012-10-05 Thread Jeffrey Walton
On Fri, Oct 5, 2012 at 6:42 AM, Jakob Bohm wrote: > On 10/5/2012 9:54 AM, int0...@safe-mail.net wrote: >> >> > On computers that don't have a good /dev/*random, the randomness used >> > by OpenSSL comes only from things happening on the computer during the >> > few moments when the openssl tool is

Re: seed/$RANDFILE confusion

2012-10-05 Thread Jakob Bohm
On 10/5/2012 9:54 AM, int0...@safe-mail.net wrote: > On computers that don't have a good /dev/*random, the randomness used > by OpenSSL comes only from things happening on the computer during the > few moments when the openssl tool is running. To gather up more > randomness, the openssl tool tri

Re: seed/$RANDFILE confusion

2012-10-05 Thread int0x80
> On computers that don't have a good /dev/*random, the randomness used > by OpenSSL comes only from things happening on the computer during the > few moments when the openssl tool is running. To gather up more > randomness, the openssl tool tries to accumulate randomness over > multiple runs as f

Re: seed/$RANDFILE confusion

2012-10-02 Thread Jakob Bohm
On 10/2/2012 3:12 PM, int0...@safe-mail.net wrote: Hi, If I try to create Diffie-Hellman key parameter (OpenSSL 1.0.0) via openssl dhparam -out $KEY_DIR/dh1024.pem 1024 I get the following output: "Generating DH parameters, 1024 bit long safe prime, generator 2 This is going to take a long tim

RE: Seed PRNG on Windows

2005-01-31 Thread Edward Chan
Great. Thanks for the info. > -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of > Bernhard Froehlich > Sent: Monday, January 31, 2005 11:39 PM > To: openssl-users@openssl.org > Subject: Re: Seed PRNG on Windows > > Edwa

Re: Seed PRNG on Windows

2005-01-31 Thread Bernhard Froehlich
Edward Chan wrote: Thanks. I guess I should have did that first. My apologies. But I couldn't find the answer to my next question. If the PRNG is already seeded using the Crypto API, how many bits of entropy are used to seed it? The following code is in crypto/rand/rand_win.c: >>

RE: Seed PRNG on Windows

2005-01-31 Thread Edward Chan
dev/random/", iEntropy); // iEntroy = # bytes of entropy to use Is this correct for linux? Thanks, Ed > -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of > Bernhard Froehlich > Sent: Sunday, January 30, 2005 2:46 AM > To: openssl-user

Re: Seed PRNG on Windows

2005-01-30 Thread Bernhard Froehlich
Edward Chan wrote: Hi there, Just wondering what people typically use to seed the PRNG on Windows. On linux, there is /dev/random. But there is no such device for Windows. I've heard of EGADS, but when I installed the EGADS service, I found it to be a huge memory hog. Are there any other opt

Re: seed

2000-06-23 Thread Rich Salz
> < if (!RAND_file_name(randfname, 4096)) { "sizeof randfname" is better. __ OpenSSL Project http://www.openssl.org User Support Mailing List

Re: seed

2000-06-23 Thread Albert Serra
Sorry, but I haven't understood this code, where I have to use, in the server? and is it only to detect the problem or to solve it?   "Wade L. Scholine" wrote: $ diff cli.c cli.c~ 28d27 < 38c37 < char buf [4096], randfname[4096]; --- > char buf [4096]; 63,71c62 < < if (!RAND_file_name(randfname,