| Home | Trees | Indices | Help |
|
|---|
|
|
object --+
|
rng_base.BaseRNG --+
|
WindowsRNG
|
|||
|
|||
|
|||
|
|||
|
|||
|
Inherited from Inherited from Inherited from |
|||
|
|||
name = "<CryptGenRandom>"
|
|||
|
|||
|
Inherited from |
|||
|
|||
|
Work around weakness in Windows RNG. The CryptGenRandom mechanism in some versions of Windows allows an attacker to learn 128 KiB of past and future output. As a workaround, this function reads 128 KiB of 'random' data from Windows and discards it. For more information about the weaknesses in CryptGenRandom, see _Cryptanalysis of the Random Number Generator of the Windows Operating System_, by Leo Dorrendorf and Zvi Gutterman and Benny Pinkas http://eprint.iacr.org/2007/419
|
|
|
| Home | Trees | Indices | Help |
|
|---|
| Generated by Epydoc 3.0.1 on Fri Jan 13 12:36:11 2012 | http://epydoc.sourceforge.net |