Message250478
Yes, those patches work, with a caveat. While testing this, I found out why I had needed EINVAL earlier (and still do, for now): there is a bug in the Solaris implementation of getrandom(2). If flags are 0 and the buffer size > 1024, then it fails with EINVAL. That is only supposed to happen for a buffer that big if GNRD_RANDOM is set in flags but GNRD_NONBLOCK is not set. So until that bug is fixed, I have to patch py_getrandom() to treat EINVAL like ENOSYS and fall back to using /dev/urandom as if getrandom(2) were not supported. |
|
Date |
User |
Action |
Args |
2015-09-11 17:11:41 | jbeck | set | recipients:
+ jbeck, tim.peters, vstinner, dstufft |
2015-09-11 17:11:41 | jbeck | set | messageid: <1441991501.59.0.116250827009.issue25003@psf.upfronthosting.co.za> |
2015-09-11 17:11:41 | jbeck | link | issue25003 messages |
2015-09-11 17:11:41 | jbeck | create | |
|