Improve chrooted operation by using getentropy() call to seed OpenSSL
When BIND runs in chroot and calls
RAND_bytes() to get entropy from CSPRNG, it might end up with an error, because
/dev/urandom might not be available in the chroot.
Several platforms now have getentropy call that can be used to seed CSPRNG in OpenSSL in such case.