Message264270
| Author |
skrah |
| Recipients |
doko, lemburg, matejcik, rhettinger, skrah, socketpair, thomas-petazzoni, vstinner |
| Date |
2016年04月26日.12:35:10 |
| SpamBayes Score |
-1.0 |
| Marked as misclassified |
Yes |
| Message-id |
<1461674111.18.0.325768167093.issue26839@psf.upfronthosting.co.za> |
| In-reply-to |
| Content |
Wow, it's by design:
" os.urandom(n)
Return a string of n random bytes suitable for cryptographic use."
``man urandom'':
"A read from the /dev/urandom device will not block waiting for more entropy. As a result, if there is
not sufficient entropy in the entropy pool, the returned values are theoretically vulnerable to a crypto-
graphic attack on the algorithms used by the driver." |
|