Colm Buckley added the comment:

@larry -

Thank you for joining in. I'm uploading a third version of the patch (against 
clean 3.5.1 source, with correct whitespace and a less confusing comment) which 
implements the following:

* configure.ac / pyconfig.h.in : looks for linux/random.h and sets 
HAVE_LINUX_RANDOM_H if present.

* random.c : calls getrandom() with the GRND_NONBLOCK flag; if that fails, fall 
back to reading /dev/urandom which will have insufficient entropy but will at 
least return some data.

I feel that there is no consistent way to signal to higher-level applications 
that the random data has sub-standard entropy; but that this at least preserves 
the expected semantics, and doesn't block on startup in the event of an 
uninitialized entropy pool.

----------
Added file: http://bugs.python.org/file43265/getrandom-nonblocking-v3.patch

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue26839>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to