My guess would be /dev/random is waiting to be seeded. 3.0 waits for
the operating system to have decent entropy. 1.1.1 will run without
(which is rather bad).
You might be able to run one of the entropy gathering daemons. CPU
Jitter is my usual recommendation but there are others.
Paul Dale
On 18/4/23 05:11, Manish Patel via openssl-users wrote:
Hi,
I am trying to upgrade openssl-1.1.1c with openssl-3.0.8.
We have an existing code that calls RAND_Bytes() which
now fails with above error code: [error:1200006C:lib(36)::reason(108)]
Tracing
RAND_bytes_ex()
seed_src_generate()
ossl_pool_acquire_entropy() <- this returns no entropy.
The pool->len is always zero.
I do not see ossl_rand_pool_add() or ossl_rand_pool_add_begin()
ever called.
What am I missing? Looks like the random code in openssl has changed
significantly but can not figure out what do I need to do for the
entropy pool
to kick start.
Any help is appreciated.
Thank you
Manish.