| Home | Trees | Indices | Help |
|
|---|
|
|
object --+
|
rng_base.BaseRNG --+
|
WindowsRNG
| Instance Methods | |||
|
|||
|
|||
|
Inherited from |
|||
| Inherited from rng_base.BaseRNG | |||
|---|---|---|---|
|
|||
|
|||
|
|||
|
|||
|
|||
| Class Variables | |
name = "<CryptGenRandom>"
|
|
| Properties | |
|
Inherited from |
| Method Details |
|
Work around weakness in Windows RNG. The CryptGenRandom mechanism in some versions of Windows allows an attacker to learn 128 KiB of past and future output. As a workaround, this function reads 128 KiB of 'random' data from Windows and discards it. For more information about the weaknesses in CryptGenRandom, see _Cryptanalysis of the Random Number Generator of the Windows Operating System_, by Leo Dorrendorf and Zvi Gutterman and Benny Pinkas http://eprint.iacr.org/2007/419
|
| Home | Trees | Indices | Help |
|
|---|
| Generated by Epydoc 3.0.1 on Thu May 24 09:02:37 2012 | http://epydoc.sourceforge.net |