From: Georg Brandl Date: Sun, 6 Oct 2013 16:43:19 +0000 (+0200) Subject: Closes #15213: update comment for _PyOS_URandom X-Git-Tag: v2.7.6rc1~70 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=c0edadee84ea87c1b0f8eb3bfe26a023d303bb4a;p=python Closes #15213: update comment for _PyOS_URandom --- diff --git a/Doc/library/os.rst b/Doc/library/os.rst index 64d7874ef0..3d48722d1c 100644 --- a/Doc/library/os.rst +++ b/Doc/library/os.rst @@ -2501,8 +2501,9 @@ Miscellaneous Functions This function returns random bytes from an OS-specific randomness source. The returned data should be unpredictable enough for cryptographic applications, though its exact quality depends on the OS implementation. On a UNIX-like - system this will query /dev/urandom, and on Windows it will use CryptGenRandom. - If a randomness source is not found, :exc:`NotImplementedError` will be raised. + system this will query ``/dev/urandom``, and on Windows it will use + ``CryptGenRandom()``. If a randomness source is not found, + :exc:`NotImplementedError` will be raised. For an easy-to-use interface to the random number generator provided by your platform, please see :class:`random.SystemRandom`. diff --git a/Python/random.c b/Python/random.c index 73e3cc3551..d615923dd2 100644 --- a/Python/random.c +++ b/Python/random.c @@ -224,8 +224,9 @@ lcg_urandom(unsigned int x0, unsigned char *buffer, size_t size) } } -/* Fill buffer with size pseudo-random bytes, not suitable for cryptographic - use, from the operating random number generator (RNG). +/* Fill buffer with size pseudo-random bytes from the operating system random + number generator (RNG). It is suitable for for most cryptographic purposes + except long living private keys for asymmetric encryption. Return 0 on success, raise an exception and return -1 on error. */ int