[Python-checkins] cpython (2.7): Closes #15213: update comment for _PyOS_URandom
georg.brandl
python-checkins at python.org
Sun Oct 6 18:47:52 CEST 2013
http://hg.python.org/cpython/rev/3e5078c3784e
changeset: 86106:3e5078c3784e
branch: 2.7
user: Georg Brandl <georg at python.org>
date: Sun Oct 06 18:43:19 2013 +0200
summary:
Closes #15213: update comment for _PyOS_URandom
files:
Doc/library/os.rst | 5 +++--
Python/random.c | 5 +++--
2 files changed, 6 insertions(+), 4 deletions(-)
diff --git a/Doc/library/os.rst b/Doc/library/os.rst
--- a/Doc/library/os.rst
+++ b/Doc/library/os.rst
@@ -2501,8 +2501,9 @@
This function returns random bytes from an OS-specific randomness source. The
returned data should be unpredictable enough for cryptographic applications,
though its exact quality depends on the OS implementation. On a UNIX-like
- system this will query /dev/urandom, and on Windows it will use CryptGenRandom.
- If a randomness source is not found, :exc:`NotImplementedError` will be raised.
+ system this will query ``/dev/urandom``, and on Windows it will use
+ ``CryptGenRandom()``. If a randomness source is not found,
+ :exc:`NotImplementedError` will be raised.
For an easy-to-use interface to the random number generator
provided by your platform, please see :class:`random.SystemRandom`.
diff --git a/Python/random.c b/Python/random.c
--- a/Python/random.c
+++ b/Python/random.c
@@ -224,8 +224,9 @@
}
}
-/* Fill buffer with size pseudo-random bytes, not suitable for cryptographic
- use, from the operating random number generator (RNG).
+/* Fill buffer with size pseudo-random bytes from the operating system random
+ number generator (RNG). It is suitable for for most cryptographic purposes
+ except long living private keys for asymmetric encryption.
Return 0 on success, raise an exception and return -1 on error. */
int
--
Repository URL: http://hg.python.org/cpython
More information about the Python-checkins
mailing list