On Fri, Oct 5, 2012 at 6:42 AM, Jakob Bohm wrote:
> On 10/5/2012 9:54 AM, int0...@safe-mail.net wrote:
>>
>> > On computers that don't have a good /dev/*random, the randomness used
>> > by OpenSSL comes only from things happening on the computer during the
>> > few moments when the openssl tool is
On 10/5/2012 9:54 AM, int0...@safe-mail.net wrote:
> On computers that don't have a good /dev/*random, the randomness used
> by OpenSSL comes only from things happening on the computer during the
> few moments when the openssl tool is running. To gather up more
> randomness, the openssl tool tri
> On computers that don't have a good /dev/*random, the randomness used
> by OpenSSL comes only from things happening on the computer during the
> few moments when the openssl tool is running. To gather up more
> randomness, the openssl tool tries to accumulate randomness over
> multiple runs as f
On 10/2/2012 3:12 PM, int0...@safe-mail.net wrote:
Hi,
If I try to create Diffie-Hellman key parameter (OpenSSL 1.0.0) via
openssl dhparam -out $KEY_DIR/dh1024.pem 1024
I get the following output:
"Generating DH parameters, 1024 bit long safe prime, generator 2
This is going to take a long tim
Great. Thanks for the info.
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> Bernhard Froehlich
> Sent: Monday, January 31, 2005 11:39 PM
> To: openssl-users@openssl.org
> Subject: Re: Seed PRNG on Windows
>
> Edwa
Edward Chan wrote:
Thanks. I guess I should have did that first. My apologies. But I
couldn't find the answer to my next question. If the PRNG is already seeded
using the Crypto API, how many bits of entropy are used to seed it?
The following code is in crypto/rand/rand_win.c:
>>
dev/random/", iEntropy); // iEntroy = # bytes of entropy to
use
Is this correct for linux?
Thanks,
Ed
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> Bernhard Froehlich
> Sent: Sunday, January 30, 2005 2:46 AM
> To: openssl-user
Edward Chan wrote:
Hi there,
Just wondering what people typically use to seed the PRNG on Windows.
On linux, there is /dev/random. But there is no such device for
Windows. I've heard of EGADS, but when I installed the EGADS service,
I found it to be a huge memory hog. Are there any other opt
> < if (!RAND_file_name(randfname, 4096)) {
"sizeof randfname" is better.
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
Sorry, but I haven't understood this code, where I have to use, in the
server? and is it only to detect the problem or to solve it?
"Wade L. Scholine" wrote:
$ diff cli.c cli.c~
28d27
<
38c37
< char buf [4096], randfname[4096];
---
> char buf [4096];
63,71c62
<
< if (!RAND_file_name(randfname,
10 matches
Mail list logo