NIST SP 800-22

2008-08-08 Thread abc_123_ok
Dear All, In my program, I use rand() to generate some randsom, I use IAR compiler to compile my program, I want to know the rand() of IAR lib if it is according to NIST SP 800-22. for (count = 0; count 32; count++) { sslContext[0].clientRandom[count] = rand();

Re: NIST SP 800-22

2008-08-08 Thread Kyle Hamilton
This is not the place to try to get support with the rand() library of any IAR product. You will need to check with IAR. I'm pretty sure that the answer is no, though, especially when used like that. -Kyle H On Fri, Aug 8, 2008 at 12:27 AM, abc_123_ok [EMAIL PROTECTED] wrote: Dear All, In

Re: problems with certificate chain

2008-08-08 Thread Sergio
Goetz Babin-Ebell escribió: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Sergio wrote: | I think so and you're right. Signing a client cert with a server cert is | inefficient and all my problems would solve itself if radius has ocsp | support. The missing support for OCSP is not your

Re: [openssl-users] RE: Certificate creation stuck at 256 certificates

2008-08-08 Thread Erwann ABALEA
Hodie VII Id. Aug. MMVIII est, David Schwartz scripsit: I have had a look around and it appears that the serial number for the last certificate created was FF (hex), indicating 256 certificates have so far been created. The next number in the

Re: problems with certificate chain

2008-08-08 Thread Kyle Hamilton
A server is not allowed to sign certificates unless its certificate has a CA:TRUE extended attribute, and key signing as an extended usage field. If it doesn't have those, it's not going to chain properly, no matter how you've got it set up. Only a CA can sign end-entity certificates. -Kyle H

Re: problems with certificate chain

2008-08-08 Thread Sergio
Kyle Hamilton escribió: A server is not allowed to sign certificates unless its certificate has a CA:TRUE extended attribute, and key signing as an extended usage field. If it doesn't have those, it's not going to chain properly, no matter how you've got it set up. Only a CA can sign

Re: Certificate creation stuck at 256 certificates

2008-08-08 Thread Ger Hobbelt
Hm... I don't have the sources for 0.9.7 around, but when I quickly look at the 0.9.9 code, it shouldn't do this (a2i_ASN1_INTEGER() is used to convert the hex text in the file to a BigNum and to address the sign mentioned before: AFAICS that routine requires an ASCII '-' to identify negative

Re: EVP_CipherInit_ex because cipher-do_cipher is NULL

2008-08-08 Thread Ger Hobbelt
On Thu, Aug 7, 2008 at 8:13 AM, Ambarish Mitra [EMAIL PROTECTED] wrote: The EVP_CipherInit_ex function returned 0 - indicating failure. Upon What does OpenSSL report as error code/description? (E.g. when using ERR_print_errors() - see the documentation for how to use) Ger -- Met

Re: Certificate creation stuck at 256 certificates

2008-08-08 Thread Michael S. Zick
On Fri August 8 2008 05:10, Ger Hobbelt wrote: It may not be the number itself, but the file indexing; quote=Goetz Babin-Ebell There may be another option, called CA_dir (or something like that). It contains every CA certificate in a separate file and optionally all CRLs to use. You run

compiling app with separate openssl

2008-08-08 Thread Lauer, Thomas
hi. i'm using ubuntu with libssl-dev (0.9.8g-4ubuntu3.3). additional i compiled openssl 0.9.8d in a separate folder (/home/dev/openssl-0.9.8d). now i'm trying to compile a tool that will link to my second openssl-lib in /home/dev... this is my g++ call: # g++ -o tls-srv main.o

RE: compiling app with separate openssl

2008-08-08 Thread Shaw Graham George
Hi, I'm no Linux guru but this worked for me (or rather it's equivalent). To ensure that you link to your development libraries: g++ -o tls-srv main.o /home/dev/openssl-0.9.8d/lib/libssl.so.0.9.8 /home/dev/openssl-0.9.8d/lib/libcrypto.so.0.9.8 ... and then use LD_LIBRARY_PATH in your run-time

why we call it entropy

2008-08-08 Thread Michael Sierchio
Von Neumann counseled Shannon to call it entropy because no one really knows what entropy is. ;-) I wanted to say that it's inherently problematic to use things like the randomness in the interarrival time of events like interrupts, etc. to gather entropy -- Ted has touched on this with his

Re: why we call it entropy

2008-08-08 Thread Michael Sierchio
Michael Sierchio wrote: A bit stream may have 1 bit of entropy per bit of message (i.e. an entropy of 1), and therefore be incompressible -- perhaps what Schwartz thinks he means when he says truly random -- and be entirely predictable. In case this isn't obvious, apply Von Neumann's