summaryrefslogtreecommitdiffstats
path: root/Python/random.c
Commit message (Collapse)AuthorAgeFilesLines
* Don't use getentropy() on LinuxVictor Stinner2017-01-091-2/+9
| | | | | | | Issue #29188: Support glibc 2.24 on Linux: don't use getentropy() function but read from /dev/urandom to get random bytes, for example in os.urandom(). On Linux, getentropy() is implemented which getrandom() is blocking mode, whereas os.urandom() should not block.
* only include sys/random.h if it seems like it might have something useful ↵Benjamin Peterson2017-01-021-1/+1
| | | | (#29057)
* add a specific configure check for sys/random.h (closes #28932)Benjamin Peterson2016-12-201-1/+1
|
* Issue #28676: Prevent missing 'getentropy' declaration warning on macOS.Ned Deily2016-11-121-0/+3
| | | | Initial patch by Gareth Rees.
* Fix typo in commentMartin Panter2016-06-101-1/+1
|
* Issue #25003: os.urandom() doesn't use getentropy() on Solaris becauseVictor Stinner2015-10-011-4/+8
| | | | | getentropy() is blocking, whereas os.urandom() should not block. getentropy() is supported since Solaris 11.3.
* Issue #23115: os.urandom() now releases the GIL when the getentropy() is usedVictor Stinner2015-03-301-6/+14
| | | | (OpenBSD 5.6+).
* Issue #23458: On POSIX, the file descriptor kept open by os.urandom() is nowVictor Stinner2015-02-241-0/+9
| | | | set to non inheritable
* Issue #23115: Fixed compilation on OpenBSD (Py_MIN is not defined in 2.7).Serhiy Storchaka2015-02-161-1/+1
|
* use getentropy when available (backport of 75ede5bec8db) (closes #23115)Benjamin Peterson2014-12-261-6/+35
|
* Removed duplicated words in in comments and docs.Serhiy Storchaka2014-12-011-1/+1
|
* PEP 466: backport persistent urandom fd (closes #21305)Benjamin Peterson2014-08-281-16/+78
| | | | Patch from Alex Gaynor.
* Closes #15213: update comment for _PyOS_URandomGeorg Brandl2013-10-061-2/+3
|
* Issue #18756: Improve error reporting in os.urandom() when the failure is ↵Antoine Pitrou2013-08-161-2/+6
| | | | due to something else than /dev/urandom not existing.
* Issue #15340: Fix importing the random module when /dev/urandom cannot be ↵Antoine Pitrou2012-09-071-1/+2
| | | | | | opened. This was a regression caused by the hash randomization patch.
* ensure no one tries to hash things before the random seed is foundBenjamin Peterson2012-02-211-4/+8
|
* - Issue #13703: oCERT-2011-003: add -R command-line option and PYTHONHASHSEEDBarry Warsaw2012-02-211-0/+302
environment variable, to provide an opt-in way to protect against denial of service attacks due to hash collisions within the dict and set types. Patch by David Malcolm, based on work by Victor Stinner.