Home | Trees | Indices | Help |
|
---|
|
object --+ | rng_base.BaseRNG --+ | WindowsRNG
Instance Methods | |||
|
|||
|
|||
Inherited from |
|||
Inherited from rng_base.BaseRNG | |||
---|---|---|---|
|
|||
|
|||
|
|||
|
|||
|
Class Variables | |
name = "<CryptGenRandom>"
|
Properties | |
Inherited from |
Method Details |
|
Work around weakness in Windows RNG. The CryptGenRandom mechanism in some versions of Windows allows an attacker to learn 128 KiB of past and future output. As a workaround, this function reads 128 KiB of 'random' data from Windows and discards it. For more information about the weaknesses in CryptGenRandom, see _Cryptanalysis of the Random Number Generator of the Windows Operating System_, by Leo Dorrendorf and Zvi Gutterman and Benny Pinkas http://eprint.iacr.org/2007/419
|
Home | Trees | Indices | Help |
|
---|
Generated by Epydoc 3.0.1 on Thu May 24 09:02:37 2012 | http://epydoc.sourceforge.net |