Dear All,
In my program, I use rand() to generate some randsom, I use IAR compiler to
compile my program, I want to know the rand() of IAR lib if it is according to
NIST SP 800-22.
for (count = 0; count 32; count++)
{
sslContext[0].clientRandom[count] = rand();
This is not the place to try to get support with the rand() library of
any IAR product. You will need to check with IAR. I'm pretty sure
that the answer is no, though, especially when used like that.
-Kyle H
On Fri, Aug 8, 2008 at 12:27 AM, abc_123_ok [EMAIL PROTECTED] wrote:
Dear All,
In
Goetz Babin-Ebell escribió:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Sergio wrote:
| I think so and you're right. Signing a client cert with a server
cert is
| inefficient and all my problems would solve itself if radius has ocsp
| support.
The missing support for OCSP is not your
Hodie VII Id. Aug. MMVIII est, David Schwartz scripsit:
I have had a look around and it appears that the serial number
for the
last certificate created was FF (hex), indicating 256
certificates have
so far been created. The next number in the
A server is not allowed to sign certificates unless its certificate
has a CA:TRUE extended attribute, and key signing as an extended
usage field.
If it doesn't have those, it's not going to chain properly, no matter
how you've got it set up.
Only a CA can sign end-entity certificates.
-Kyle H
Kyle Hamilton escribió:
A server is not allowed to sign certificates unless its certificate
has a CA:TRUE extended attribute, and key signing as an extended
usage field.
If it doesn't have those, it's not going to chain properly, no matter
how you've got it set up.
Only a CA can sign
Hm... I don't have the sources for 0.9.7 around, but when I quickly
look at the 0.9.9 code, it shouldn't do this (a2i_ASN1_INTEGER() is
used to convert the hex text in the file to a BigNum and to address
the sign mentioned before: AFAICS that routine requires an ASCII '-'
to identify negative
On Thu, Aug 7, 2008 at 8:13 AM, Ambarish Mitra
[EMAIL PROTECTED] wrote:
The EVP_CipherInit_ex function returned 0 - indicating failure. Upon
What does OpenSSL report as error code/description? (E.g. when using
ERR_print_errors() - see the documentation for how to use)
Ger
--
Met
On Fri August 8 2008 05:10, Ger Hobbelt wrote:
It may not be the number itself, but the file indexing;
quote=Goetz Babin-Ebell
There may be another option, called CA_dir (or something like that).
It contains every CA certificate in a separate file and optionally
all CRLs to use.
You run
hi.
i'm using ubuntu with libssl-dev (0.9.8g-4ubuntu3.3).
additional i compiled openssl 0.9.8d in a separate folder
(/home/dev/openssl-0.9.8d).
now i'm trying to compile a tool that will link to my second openssl-lib
in /home/dev...
this is my g++ call:
# g++ -o tls-srv main.o
Hi,
I'm no Linux guru but this worked for me (or rather it's equivalent).
To ensure that you link to your development libraries:
g++ -o tls-srv main.o /home/dev/openssl-0.9.8d/lib/libssl.so.0.9.8
/home/dev/openssl-0.9.8d/lib/libcrypto.so.0.9.8
... and then use LD_LIBRARY_PATH in your run-time
Von Neumann counseled Shannon to call it entropy because no one
really knows what entropy is. ;-)
I wanted to say that it's inherently problematic to use things like the
randomness in the interarrival time of events like interrupts, etc.
to gather entropy -- Ted has touched on this with his
Michael Sierchio wrote:
A bit stream may have 1 bit of entropy per bit of message (i.e. an
entropy of 1), and therefore be incompressible -- perhaps what Schwartz
thinks he means when he says truly random -- and be entirely predictable.
In case this isn't obvious, apply Von Neumann's
13 matches
Mail list logo