Message267550
@larry -
Thank you for joining in. I'm uploading a third version of the patch (against clean 3.5.1 source, with correct whitespace and a less confusing comment) which implements the following:
* configure.ac / pyconfig.h.in : looks for linux/random.h and sets HAVE_LINUX_RANDOM_H if present.
* random.c : calls getrandom() with the GRND_NONBLOCK flag; if that fails, fall back to reading /dev/urandom which will have insufficient entropy but will at least return some data.
I feel that there is no consistent way to signal to higher-level applications that the random data has sub-standard entropy; but that this at least preserves the expected semantics, and doesn't block on startup in the event of an uninitialized entropy pool. |
|
Date |
User |
Action |
Args |
2016-06-06 20:45:55 | Colm Buckley | set | recipients:
+ Colm Buckley, lemburg, rhettinger, doko, vstinner, larry, matejcik, ned.deily, skrah, martin.panter, ztane, thomas-petazzoni |
2016-06-06 20:45:55 | Colm Buckley | set | messageid: <1465245955.27.0.565265253778.issue26839@psf.upfronthosting.co.za> |
2016-06-06 20:45:55 | Colm Buckley | link | issue26839 messages |
2016-06-06 20:45:55 | Colm Buckley | create | |
|