Hello:
I need initialize the PRNG to can generate keys and performing public key
encryption.
I want use one of this functions:
void RAND_seed(const void *buf, int num);
void RAND_add(const void *buf, int num, double entropy);
But I don´t know what parameters I have to use. Somebody can
Angel Martinez Gonzalez wrote:
Hello:
I need initialize the PRNG to can generate keys and performing public key
encryption.
I want use one of this functions:
void RAND_seed(const void *buf, int num);
void RAND_add(const void *buf, int num, double entropy);
But I don´t know what
Hello:
Thanks for your help, but I don´t know what buffer and num I must use.
How I can generate this buffer of random data?. And, num is the entropy,
but, what is it?. How I obtain this entropy?.
I use Windows.
Thanks. Ragards.
- Original Message -
From: Bernhard Froehlich [EMAIL
Just use FreeBSD 5.X as your operating system, the random device
on it has been completely rewritten to be self-seeding with
high quality random numbers. It harvests from a number of interrupts and
if you don't turn those on it uses the Yarrow PRNG code. And it
also uses the hardware random
Angel Martinez Gonzalez wrote:
Hello:
Thanks for your help, but I don´t know what buffer and num I must use.
Buffer is a memory pointer. Usually something you allocated (in C by
calling malloc) and filled with Data. If you don't know how to do that
I'd urgently advise a basic course in C
Hello All.
I've been trying to setup WPA security on my network. As such, I have
been generating my own root and server certificate, and signing my
client certificates with said root certificate. However, for some
reason, whenever I try to use the certificates with wpa_supplicant, I
get
I have to generate quite a few random keys (and iv's) during a days. It
comes out to about 1 million keys (16 bytes each) and 1 million iv's (16
bytes each).
I tried using /dev/random and /dev/urandom but in one case it blocks too
much of the time and in the other seems to run pretty slow. I
Date: Thu, 23 Jun 2005 12:22:30 -0400
From: C Wegrzyn [EMAIL PROTECTED]
I have to generate quite a few random keys (and iv's) during a days. It
comes out to about 1 million keys (16 bytes each) and 1 million iv's (16
bytes each).
I tried using /dev/random and /dev/urandom but in one case
Hello, I tried posting to this list prior to subscribing but haven't had
any responses. Sorry if this is redundant, but I'm stuck trying to build
0.9.7g which is holding up the re-complilation of several dependant
packages.
I'm running into the following internal error when running make on
I have an application using OpenSSL that suffer from data truncation at the
end of session.
This application is a FTPS client. I check it using FileZilla FTPS server.
What happend is that most of the time, the files are transferred truncated
at the end. The received file is truncated at exactly
I can't add anything beyond what is available on a AMD or Intel
motherboard. So is there a built-in HRNG that I can get to (if so, where
is the driver for it)?
Thanks again,
Chuck Wegrzyn
Ken Goldman wrote:
Date: Thu, 23 Jun 2005 12:22:30 -0400
From: C Wegrzyn [EMAIL PROTECTED]
I have to
Hi All
I was trying to reduce the size of the openSsl library due to memory
constraints on our platform.
I tried to remove three patented ciphers idea, rc5 and mdc2. Any ideas what
more can be done to
reduce the final size of the library?.
thanks and regards
-Krish
On Thu, 23 Jun 2005 11:11:18 -0700 (PDT), Krishna M Singh
[EMAIL PROTECTED] said:
Hi All
I was trying to reduce the size of the openSsl library due to memory
constraints on our platform.
I tried to remove three patented ciphers idea, rc5 and mdc2. Any ideas
what more can be done to
reduce
I can't add anything beyond what is available on a AMD or Intel
motherboard. So is there a built-in HRNG that I can get to (if so, where
is the driver for it)?
Use /dev/urandom to seed your own PRNG. Or use it to seed OpenSSL's
PRNG.
Why are you asking on this list anyway?
Generating one or two random numbers over a period of time isn't a big
deal. Generating 100,000+ 128 bit random numbers an hour taxes
/dev/random and /dev/urandom. Even the use of EGAD doesn't help.
If you re-read the thread you will see that I wrote what I thought was a
reasonable approach and
Anyone, bueller?
If I'm lacking a clue here can someone please give me one? If I'm up the
creek without a paddle and need to stick with 0.9.7e then can someone
tell me that? Has anyone encountered this error, and if so is there a
reasonable fix? I can't move to the beta because I have too
Generating one or two random numbers over a period of time isn't a big
deal. Generating 100,000+ 128 bit random numbers an hour taxes
/dev/random and /dev/urandom. Even the use of EGAD doesn't help.
Right.
If you re-read the thread you will see that I wrote what I thought was a
Hi all,
Due to a number of last minute reports, the final release of OpenSSL
0.9.8 is delayed a few days to give the affected people a chance to
test that the corrections done do fix things as expeted.
So please, if you have sent in a report about something failing with
one of the 0.9.8 betas,
I see things for adding entropy, loading files, etc. I don't see
anything about generating random numbers. Am I missing something so
obvious if it was a snake it would have bitten me by now?
Chuck Wegrzyn
David Schwartz wrote:
Generating one or two random numbers over a period of time isn't a
C Wegrzyn wrote:
I have to generate quite a few random keys (and iv's) during a days. It
comes out to about 1 million keys (16 bytes each) and 1 million iv's (16
bytes each).
I tried using /dev/random and /dev/urandom but in one case it blocks too
much of the time and in the other seems to run
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of C Wegrzyn
Sent: Thursday, June 23, 2005 10:14 AM
To: Ken Goldman
Cc: openssl-users@openssl.org
Subject: Re: Generating a lot of randomness...
I can't add anything beyond what is available on a AMD or Intel
Linux (gentoo variant).
C.
Ted Mittelstaedt wrote:
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of C Wegrzyn
Sent: Thursday, June 23, 2005 10:14 AM
To: Ken Goldman
Cc: openssl-users@openssl.org
Subject: Re: Generating a lot of randomness...
I can't
This is a few years old, but may be useful. The code illustrates the
use of the HMAC variant on ANSI X9.17 key generation as described in the
paper, used to generate random byte strings. It uses the hash functions
in the OpenSSL libraries.
Paper:
Hey OpenSSL guru guys!
Just downloaded http://www.openssl.org/source/openssl-0.9.7g.tar.gz
ALL the header files in openssl-0.9.7g\include\openssl are zero bytes in
length!??
Is there something wrong with the distribution or am I doing something
stupid?
Thanks in advance,
Pj.
-Original
# uname -a
SunOS mail2 5.5.1 Generic_103641-42 i86pc i386 i86pc
# gcc -v
Reading specs from
/usr/local/lib/gcc-lib/i586-sun-solaris2.5.1/2.95.3/specs
gcc version 2.95.3 20010315 (release)
#
Hardware is a Pentium 66. (yes, an original Pentium)
# ./Configure solaris-x86-gcc zlib shared
I thought that Linux's random device now supports the HRNG's
for Intel, AMD and Via. Here's the docs on the Intel HRNG:
http://www.linuxhq.com/kernel/v2.4/3/Documentation/i810_rng.txt
What does menuconfig say?
The Linux driver used to be built on the old
Theodore Ts'o code, which is not
26 matches
Mail list logo