Hello.
I'll collect entropy(random bytes) myself on Windows. How many random bytes I must give for function RAND_seed to seed PRNG properly in two cases:

1) Generating RSA keys.

2) Programming SSL-TLS. And where I must call RAND_seed during SSL-TLS programming?

I think internal functions of OpenSSL call RAND_bytes when they need random data. So, it is very important for me to understand how RAND_seed and RAND_bytes work together. I don't understand how it works.

For example, if I have seeded PRNG with 256 bytes, how many random bytes I can get with RAND_bytes after that and be sure that they are unpredictable enough(good for cryptographical operations)?

I would be grateful for help and advices.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to