Message264270
| Author | skrah |
|---|---|
| Recipients | doko, lemburg, matejcik, rhettinger, skrah, socketpair, thomas-petazzoni, vstinner |
| Date | 2016-04-26.12:35:10 |
| SpamBayes Score | -1.0 |
| Marked as misclassified | Yes |
| Message-id | <1461674111.18.0.325768167093.issue26839@psf.upfronthosting.co.za> |
| In-reply-to |
| Content | |
|---|---|
Wow, it's by design:
" os.urandom(n)
Return a string of n random bytes suitable for cryptographic use."
``man urandom'':
"A read from the /dev/urandom device will not block waiting for more entropy. As a result, if there is
not sufficient entropy in the entropy pool, the returned values are theoretically vulnerable to a crypto-
graphic attack on the algorithms used by the driver." |
|
| History | |||
|---|---|---|---|
| Date | User | Action | Args |
| 2016-04-26 12:35:11 | skrah | set | recipients: + skrah, lemburg, rhettinger, doko, vstinner, matejcik, socketpair, thomas-petazzoni |
| 2016-04-26 12:35:11 | skrah | set | messageid: <1461674111.18.0.325768167093.issue26839@psf.upfronthosting.co.za> |
| 2016-04-26 12:35:11 | skrah | link | issue26839 messages |
| 2016-04-26 12:35:10 | skrah | create | |