summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBerker Peksag <berker.peksag@gmail.com>2015-04-10 13:19:13 (GMT)
committerBerker Peksag <berker.peksag@gmail.com>2015-04-10 13:19:13 (GMT)
commiteb7a97c48e34dd3b68a8b2db5839699d43642ec4 (patch)
treeed9c8fc3e8e472d55156802517517358d16b4e42
parentecb75e26db7545b05b7eee10c5e0ff0801a52794 (diff)
downloadcpython-eb7a97c48e34dd3b68a8b2db5839699d43642ec4.zip
cpython-eb7a97c48e34dd3b68a8b2db5839699d43642ec4.tar.gz
cpython-eb7a97c48e34dd3b68a8b2db5839699d43642ec4.tar.bz2
Issue #23025: Add a mention of os.urandom to RAND_bytes and RAND_pseudo_bytes docs.
Patch by Alex Gaynor.
-rw-r--r--Doc/library/ssl.rst4
1 files changed, 4 insertions, 0 deletions
diff --git a/Doc/library/ssl.rst b/Doc/library/ssl.rst
index 465bf8f..141dcb2 100644
--- a/Doc/library/ssl.rst
+++ b/Doc/library/ssl.rst
@@ -292,6 +292,8 @@ Random generation
can be used to check the status of the PRNG and :func:`RAND_add` can be used
to seed the PRNG.
+ For almost all applications :func:`os.urandom` is preferable.
+
Read the Wikipedia article, `Cryptographically secure pseudorandom number
generator (CSPRNG)
<http://en.wikipedia.org/wiki/Cryptographically_secure_pseudorandom_number_generator>`_,
@@ -311,6 +313,8 @@ Random generation
for non-cryptographic purposes and for certain purposes in cryptographic
protocols, but usually not for key generation etc.
+ For almost all applications :func:`os.urandom` is preferable.
+
.. versionadded:: 3.3
.. function:: RAND_status()