On Fri, Oct 5, 2012 at 6:42 AM, Jakob Bohm wrote:
> On 10/5/2012 9:54 AM, int0...@safe-mail.net wrote:
>>
>> > On computers that don't have a good /dev/*random, the randomness used
>> > by OpenSSL comes only from things happening on the computer during the
>> > few moments when the openssl tool is
On 10/5/2012 9:54 AM, int0...@safe-mail.net wrote:
> On computers that don't have a good /dev/*random, the randomness used
> by OpenSSL comes only from things happening on the computer during the
> few moments when the openssl tool is running. To gather up more
> randomness, the openssl tool tri
> On computers that don't have a good /dev/*random, the randomness used
> by OpenSSL comes only from things happening on the computer during the
> few moments when the openssl tool is running. To gather up more
> randomness, the openssl tool tries to accumulate randomness over
> multiple runs as f
On 10/2/2012 3:12 PM, int0...@safe-mail.net wrote:
Hi,
If I try to create Diffie-Hellman key parameter (OpenSSL 1.0.0) via
openssl dhparam -out $KEY_DIR/dh1024.pem 1024
I get the following output:
"Generating DH parameters, 1024 bit long safe prime, generator 2
This is going to take a long tim
Hi,
If I try to create Diffie-Hellman key parameter (OpenSSL 1.0.0) via
openssl dhparam -out $KEY_DIR/dh1024.pem 1024
I get the following output:
"Generating DH parameters, 1024 bit long safe prime, generator 2
This is going to take a long time
.+. [...]
unable to write 'rando