My company has had great success with PRNGd. It basically takes
log files, and whatever else it can get its hands on to generate
a pool of random characters...
Anyhow, you can get it from here:
http://www.aet.tu-cottbus.de/personen/jaenicke/postfix_tls/prngd.html
It supports about any OS that doesn't have /dev/random or /dev/urandom
You just need to seed OpenSSL using:
RAND_egd()
You just pass one parameter to RAND_egd, and that is the location
of the socket PRNGd mounts ....
Good Luck
-Brad
Chandra Sekhar Suram wrote:
Hi,
I have a doubt regarding the Randomness generated using OpenSSL.
I have an application that uses OpenSSL for cryptographic operations
including generation of keys.
I used DieHard tool for getting a statistical analysis on the
Randomness. Here
many tests are failing.
I am suspecting that Iam not seeding properly.
Can any one help me to properly use the random number module of OpenSSL.
I tried to seed with a big string using Rand_add(buff, sizeof(buff),
25)... and failed with the DieHard.
I do not have any file system support to read random data from files
like /dev/urandom.
Kindly help me to come out of this problem..
Regards
Suram
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]