01-07-2008
Quote:
Originally Posted by
porter
"OpenSSH" != "OpenSSL".
They both use a random number generator device. So what Neo posted is relevant to both. PRNG Not Seeded errors indicate problems with randomness, a simple Google/Yahoo search will unearth mountains of tales for that error message. (if the FAQ is a little hard to chew, of course)
Take care,
grebbux.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Help! SSH is returning the following error message:
OpenSSL version mismatch. Built against 90581f, you have 90602f
How can I correct this? (21 Replies)
Discussion started by: chenly
21 Replies
2. UNIX for Advanced & Expert Users
I had been searching and i guess ssh is not available for 4.0F, the option is to install OpenSSh, but i don't know hw to do it!! :confused:
Would someone pls send me some instrctions about the insalation and where can i download the OpenSSH???
Tks a lot!!! :) (1 Reply)
Discussion started by: irasela
1 Replies
3. Solaris
I hope someone out there can help. I'm trying to install & configure Openssh to my Solaris, I downloaded & Installed the following pkgs :
openssh-4.4p1-sol8-sparc-local.gz
openssl-0.9.8d-sol8-sparc-local.gz
tcp_wrappers-7.6-sol8-sparc-local.gz
zlib-1.2.1-sol8-sparc-local.gz... (6 Replies)
Discussion started by: Remi
6 Replies
4. AIX
Guys
I need to install openSSH on AIX 5.3?
First problem is : i am unable to find openSSH 3.8.1 freeware on the net ?pls pass on any links if you have.
Second problem is : installation.Although i know how to install rpm packages,installing SSH is bit diffrent.But that second issue.
Can... (16 Replies)
Discussion started by: ak835
16 Replies
5. Linux
If may install can Tells everybody ??? (0 Replies)
Discussion started by: kzBSD
0 Replies
6. UNIX Desktop Questions & Answers
Hello,
I downloaded Cygwin to practice on my coursework from home. I was told to download the OpenSSH from Cygwin website so that I can access my files from home. However, the file saves itself with a cgi extension and I have no idea as to what I am supposed to do next. I found info on some... (1 Reply)
Discussion started by: feliks0
1 Replies
7. Red Hat
Hi genious
i'm New to Linux .. help me
Very Urgent
how to install Openssh in linux machine step by step ....
plz (3 Replies)
Discussion started by: coolboys
3 Replies
8. AIX
*SOLVED. please see edit at bottom*
Hello,
I have a freshly installed AIX 7.1 that I would like to enable SSH on. I believe I need OpenSSH and OpenSSL to do this. OpenSSL was already installed, so I moved onto installing OpenSSH.
I downloaded OpenSSH 6.2 from this site that claims support... (0 Replies)
Discussion started by: bstring
0 Replies
9. Red Hat
Hi
im using redhat enterprise linux 7
im trying to update to the latest openssh version 6.8
i ran the command yum update openssh and this upgraded only to version 6.6
how can i update to the latest version 6.8?
thanks! (5 Replies)
Discussion started by: guy3145
5 Replies
10. AIX
im new to aix... my task is suppose to be simple. install openssh
i followed this article:
Installing OpenSSH and OpenSSL on AIX 6.1 | Keymon's snippets and brushstrokes
when i try to start the sshd service with the command: "startsrc -s sshd"
im getting an error saying:
"the sshd subsystem... (6 Replies)
Discussion started by: guy3145
6 Replies
LEARN ABOUT REDHAT
rand_seed
RAND_add(3) OpenSSL RAND_add(3)
NAME
RAND_add, RAND_seed, RAND_status, RAND_event, RAND_screen - add entropy to the PRNG
SYNOPSIS
#include <openssl/rand.h>
void RAND_seed(const void *buf, int num);
void RAND_add(const void *buf, int num, double entropy);
int RAND_status(void);
int RAND_event(UINT iMsg, WPARAM wParam, LPARAM lParam);
void RAND_screen(void);
DESCRIPTION
RAND_add() mixes the num bytes at buf into the PRNG state. Thus, if the data at buf are unpredictable to an adversary, this increases the
uncertainty about the state and makes the PRNG output less predictable. Suitable input comes from user interaction (random key presses,
mouse movements) and certain hardware events. The entropy argument is (the lower bound of) an estimate of how much randomness is contained
in buf, measured in bytes. Details about sources of randomness and how to estimate their entropy can be found in the literature, e.g. RFC
1750.
RAND_add() may be called with sensitive data such as user entered passwords. The seed values cannot be recovered from the PRNG output.
OpenSSL makes sure that the PRNG state is unique for each thread. On systems that provide "/dev/urandom", the randomness device is used to
seed the PRNG transparently. However, on all other systems, the application is responsible for seeding the PRNG by calling RAND_add(),
RAND_egd(3) or RAND_load_file(3).
RAND_seed() is equivalent to RAND_add() when num == entropy.
RAND_event() collects the entropy from Windows events such as mouse movements and other user interaction. It should be called with the
iMsg, wParam and lParam arguments of all messages sent to the window procedure. It will estimate the entropy contained in the event message
(if any), and add it to the PRNG. The program can then process the messages as usual.
The RAND_screen() function is available for the convenience of Windows programmers. It adds the current contents of the screen to the PRNG.
For applications that can catch Windows events, seeding the PRNG by calling RAND_event() is a significantly better source of randomness. It
should be noted that both methods cannot be used on servers that run without user interaction.
RETURN VALUES
RAND_status() and RAND_event() return 1 if the PRNG has been seeded with enough data, 0 otherwise.
The other functions do not return values.
SEE ALSO
rand(3), RAND_egd(3), RAND_load_file(3), RAND_cleanup(3)
HISTORY
RAND_seed() and RAND_screen() are available in all versions of SSLeay and OpenSSL. RAND_add() and RAND_status() have been added in OpenSSL
0.9.5, RAND_event() in OpenSSL 0.9.5a.
0.9.7a 2000-03-22 RAND_add(3)