>I know this is caused by a lack of available entropy in the system; but what can I do to address this? Is it just a matter of waiting until enough entropy has been collected? Is there any
kind of workaround? Assuming you don’t have another source of randomness that you can add in, then you should wait. IF you don’t, you run the risk that your random numbers (session keys, RSA or other long-term keys, etc) could be guessed by an attacker. |
-- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users