returncheck_result(mbedtls_ctr_drbg_random(get_rng(),static_cast<unsignedchar*>(buffer), length)); } If that is what is causing the issue, it should not cause harm (other than log spamming) as it will fall back to tr_rand_buffer_std. ...
= 0) { mbedtls_printf("failed in mbedtls_ctr_drbg_update_seed_file: %d\n", ret); goto cleanup; } #endif for (i = 0, k = 768; i < k; i++) { ret = mbedtls_ctr_drbg_random(&ctr_drbg, buf, sizeof(buf)); if (ret != 0) { mbedtls_printf("failed!\n...