Improve chrooted operation by using getentropy() call to seed OpenSSL
When BIND runs in chroot and calls RAND_bytes()
to get entropy from CSPRNG, it might end up with an error, because /dev/urandom
might not be available in the chroot.
Several platforms now have getentropy call that can be used to seed CSPRNG in OpenSSL in such case.