>I know this is caused by a lack of available entropy in the system; but what 
>can I do to address this?  Is it just a matter of waiting until enough entropy 
>has been collected?  Is there any kind of workaround?

Assuming you don’t have another source of randomness that you can add in, then 
you should wait.  IF you don’t, you run the risk that your random numbers 
(session keys, RSA or other long-term keys, etc) could be guessed by an 
attacker.

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to