RE: openssl-users Digest, Vol 77, Issue 6

2021-04-06 Thread Vishwanath Mahajanshetty
t;; openssl-users@openssl.org<mailto:openssl-users@openssl.org> Subject: RE: openssl-users Digest, Vol 77, Issue 6 > It isn't possible to do what you are wanting. RAND_METHOD replaces the RNG > everywhere. It cannot be done on a per thread process. Well, technically it *is* possible. Howev

RE: openssl-users Digest, Vol 77, Issue 6

2021-04-05 Thread Dr. Matthias St. Pierre
:18 AM To: openssl-users@openssl.org Subject: Re: openssl-users Digest, Vol 77, Issue 6 Vishwanath, It isn't possible to do what you are wanting. RAND_METHOD replaces the RNG everywhere. It cannot be done on a per thread process. Pauli On 4/4/21 9:55 pm, Vishwanath Mahajanshetty wrote: H

Re: openssl-users Digest, Vol 77, Issue 6

2021-04-04 Thread Dr Paul Dale
Vishwanath, It isn't possible to do what you are wanting.  RAND_METHOD replaces the RNG everywhere.  It cannot be done on a per thread process. Pauli On 4/4/21 9:55 pm, Vishwanath Mahajanshetty wrote: Hi Paul, Thanks for your response. I understand the concern for good random numbers;

RE: openssl-users Digest, Vol 77, Issue 6

2021-04-04 Thread Vishwanath Mahajanshetty
Hi Paul, Thanks for your response. I understand the concern for good random numbers; but in this scenario when second thread calls SSL_CTX_new it is waiting forever in RAND_priv_bytes(). Looks like entropy functions defined by first (bind) thread are very specific for its own use case and