Yay,
there are some controversial discussions taking place on
https://github.com/openssl/openssl/issues/9078
It would be great if you could join us and provide more details about the
circumstances of your issue. In particular, information like kernel/os version
and whether the significant startu
Hi,
I opened an issue on GitHub to discuss this problem in more detail.
https://github.com/openssl/openssl/issues/9078
It would be nice if you could join the discussion there.
Matthias
@Jay: in particular I'm interested to learn, which linux version and
distribution
you were using. On new
Correction, Tomáš was correct: there is an ` # ifndef DEVRANDOM` surrounding
the problematic code:
https://github.com/openssl/openssl/blob/OpenSSL_1_1_1c/e_os.h#L25-L34
Neverthelesss, I still think this code needs to be changed, because the seeding
should just work correctly out-of-the-box withou
> To workaround the /dev/random blocking issue, you can just add:
>
> -DDEVRANDOM="\"/dev/urandom\""
>
> as a parameter to ./Configure
>
> This will remove the special handling of /dev/urandom and /dev/random
> in 1.1.1c.
Tomáš, Jay,
I'm afraid this suggestion won't help, because `DEVRANDOM_
> I think I have tracked down the change in 1.1.1c that is causing this.
> It is the addition of the DEVRANDOM_WAIT functionality for linux in
> e_os.h and crypto/rand/rand_unix.c. lighttpd (libcrypto) is waiting in
> a select() call on /dev/random. After this eventually wakes up, it then
> reads