Original Solution Link
将
$JAVA _path/jre/lib/security/java.security
In the
securerandom.source=file:/dev/urandom
Replaced by
securerandom.source=file:/dev/./urandom
Root cause
In this implementation, the generator keeps a estimate of the number of bits of noise in the entropy pool. From this entropy pool random numbers is created. When read, the/dev/random device would only return random bytes within the estimated number of bits of noise in the Entrop Y pool. /dev/random should be suitable for uses, need very high quality randomness such as one-time pad or K EY generation.
When the entropy pool is empty, reads From/dev/random would block until additional environmental noise is GAT Hered. The intent is to serve as a cryptographically secure pseudorandom number generator, delivering output with entropy as Larg e as possible. This was suggested for use with generating cryptographic keys for high-value or long-term protection. Http://en.wikipedia.org/wiki//dev/random#Linux
Tomcat starts a solution that takes a long time