t;;
openssl-users@openssl.org<mailto:openssl-users@openssl.org>
Subject: RE: openssl-users Digest, Vol 77, Issue 6
> It isn't possible to do what you are wanting. RAND_METHOD replaces the RNG
> everywhere. It cannot be done on a per thread process.
Well, technically it *is* possible.
, April 5, 2021 3:18 AM
To: openssl-users@openssl.org
Subject: Re: openssl-users Digest, Vol 77, Issue 6
Vishwanath,
It isn't possible to do what you are wanting. RAND_METHOD replaces the RNG
everywhere. It cannot be done on a per thread process.
Pauli
On 4/4/21 9:55 pm, Vishwana
Vishwanath,
It isn't possible to do what you are wanting. RAND_METHOD replaces the
RNG everywhere. It cannot be done on a per thread process.
Pauli
On 4/4/21 9:55 pm, Vishwanath Mahajanshetty wrote:
Hi Paul,
Thanks for your response. I understand the concern for good random
numbers; bu
Hi Paul,
Thanks for your response. I understand the concern for good random numbers; but
in this scenario when second thread calls SSL_CTX_new it is waiting forever in
RAND_priv_bytes(). Looks like entropy functions defined by first (bind) thread
are very specific for its own use case and can’t