On Fri, Nov 16, 2012 at 12:57 PM, Jeffrey Walton wrote:
> On Fri, Nov 16, 2012 at 9:17 AM, Graham Leggett wrote:
>> On 16 Nov 2012, at 4:36 AM, Jeffrey Walton wrote:
>>
>>> On Thu, Nov 15, 2012 at 10:41 AM, Jeffrey Walton wrote:
On Thu, Nov 15, 2012 at 6:03 AM, Pravesh Rai wrote:
>
>>
On Fri, Nov 16, 2012 at 9:17 AM, Graham Leggett wrote:
> On 16 Nov 2012, at 4:36 AM, Jeffrey Walton wrote:
>
>> On Thu, Nov 15, 2012 at 10:41 AM, Jeffrey Walton wrote:
>>> On Thu, Nov 15, 2012 at 6:03 AM, Pravesh Rai wrote:
CryptGenRandom(hCryptProv, SEED_SIZE, buf); // On Windows
On 16 Nov 2012, at 4:36 AM, Jeffrey Walton wrote:
> On Thu, Nov 15, 2012 at 10:41 AM, Jeffrey Walton wrote:
>> On Thu, Nov 15, 2012 at 6:03 AM, Pravesh Rai wrote:
>>>
>>> CryptGenRandom(hCryptProv, SEED_SIZE, buf); // On Windows OS
>>> apr_generate_random_bytes(buf, SEED_SIZE); // On
On Thu, Nov 15, 2012 at 10:41 AM, Jeffrey Walton wrote:
> On Thu, Nov 15, 2012 at 6:03 AM, Pravesh Rai wrote:
>>
>> CryptGenRandom(hCryptProv, SEED_SIZE, buf); // On Windows OS
>> apr_generate_random_bytes(buf, SEED_SIZE); // On Linux OS
>>
Speaking of poor documentation.
I looked a
> From: Jeffrey Walton [mailto:noloa...@gmail.com]
>
> On Thu, Nov 15, 2012 at 6:03 AM, Pravesh Rai
> wrote:
> >...
> > #define SEED_SIZE 128
> >...
> > //RAND_seed(buf, SEED_SIZE);
> > RAND_add(buf, SEED_SIZE, (20/100) * SEED_SIZE);
> >
> > k = RAND_status();
> >
> > }
> I'm not sure 20% e
On Thu, Nov 15, 2012 at 6:03 AM, Pravesh Rai wrote:
> Hi,
>
> At one place, we are using following logic for generating self-signed
> certificate:
>
> #define SEED_SIZE 128
>
> k = RAND_status();
> while(k == 0)
> {
> // custom logic for getting random numbers from system variables
> ...
>
> Crypt