On Wed, Sep 27, 2006, Erik Leunissen wrote:

> This makes me think that:
> - either there has been some other call into the OpenSSL library that
> implicitly seeded the PRNG without my noticing it (perhaps
> DSA_generate_parameters() or DSA_new() ), or
> - the warning mechanism doesn't work properly
> Can anybody shed some light on what's happening here?
> In case it's relevant: the DSA_* functions that I mentioned above, are
> used in a program that has been running on Linux and on Windows 2000.

OpenSSL makes use of some standard sources of entropy on various platforms to
seed the PRNG automatically. On linux this includes the /dev/urandom device
and on Windows various things including the CryptoAPI PRNG.

Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
__________________________________________________ ____________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users@openssl.org
Automated List Manager majordomo@openssl.org