Hello.
I'll collect entropy(random bytes) myself on Windows. How many random
bytes I must give for function RAND_seed to seed PRNG properly in two cases:
1) Generating RSA keys.
2) Programming SSL-TLS. And where I must call RAND_seed during SSL-TLS
programming?
I think internal functions of OpenSSL call RAND_bytes when they need random
data. So, it is very important for me to understand how RAND_seed and
RAND_bytes work together. I don't understand how it works.
For example, if I have seeded PRNG with 256 bytes, how many random bytes I
can get with RAND_bytes after that and be sure that they are unpredictable
enough(good for cryptographical operations)?
I would be grateful for help and advices.
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users@openssl.org
Automated List Manager majord...@openssl.org