second process is certainly trying to initialize its RNG and that's
why you see this delay.
Do you confirm that you are executing these processes under Windows 7?
--
Mounir IDRASSI
IDRIX
http://www.idrix.fr
On 5/4/2011 7:02 AM, Ashwin Chandra wrote:
I generate an RSA key using RSA_generate_key
/Display.html?id=2100user=guestpass=guest
Your second process is certainly trying to initialize its RNG and that's
why you see this delay.
Do you confirm that you are executing these processes under Windows 7?
--
Mounir IDRASSI
IDRIX
http://www.idrix.fr
On 5/4/2011 7:02 AM, Ashwin Chandra wrote:
I
I generate an RSA key using RSA_generate_key in one process. I then take
the RSA structure that is generated and serialize it and send it to
another process via an RPC mechanism. In the other process I then
de-serialize the RSA data and use that as input to an
RSA_private_decrypt function to
I would like to call this function to generate the same public/private
key everytime.
I thought all I had to do was create the same seed using RAND_seed each
time, however I still keep getting different key pairs.
Is there any way to have RSA_generate_key generate the same
public/private key
RSA_generate_key to return the same public key?
-Original Message-
From: David Schwartz [mailto:dav...@webmaster.com]
Sent: Monday, January 31, 2011 7:37 PM
To: openssl-users@openssl.org
Cc: Ashwin Chandra
Subject: Re: RSA_generate_key function
On 1/31/2011 5:37 PM, Ashwin Chandra wrote:
I would like
On Behalf Of Ashwin
Chandra
Sent: Monday, 08 June, 2009 19:48
I am using the RSA_generate_keys to generate an RSA * structure.
I wish to pack or serialize all the information in this structure
into an array of bytes and then deserialize it back into an RSA *
structure later on. What
I am using the RSA_generate_keys to generate an RSA * structure. I wish
to pack or serialize all the information in this structure into an array
of bytes and then deserialize it back into an RSA * structure later on.
What is the best way to do this?
I have a couple of options I have explored: