Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | (Merge 3.4) Issue #22585: os.urandom() now releases the GIL when the | Victor Stinner | 2015-03-30 | 1 | -6/+14 |
|\ | | | | | | | getentropy() is used (OpenBSD 5.6+). | ||||
| * | Issue #22585: os.urandom() now releases the GIL when the getentropy() is used | Victor Stinner | 2015-03-30 | 1 | -6/+14 |
| | | | | | | | | (OpenBSD 5.6+). | ||||
| * | Issue #22585: On OpenBSD 5.6 and newer, os.urandom() now calls getentropy(), | Victor Stinner | 2014-12-21 | 1 | -7/+41 |
| | | | | | | | | instead of reading /dev/urandom, to get pseudo-random bytes. | ||||
* | | Issue #22181: os.urandom() now releases the GIL when the getrandom() | Victor Stinner | 2015-03-30 | 1 | -2/+11 |
| | | | | | | | | implementation is used. | ||||
* | | Issue #23752: _Py_fstat() is now responsible to raise the Python exception | Victor Stinner | 2015-03-30 | 1 | -2/+1 |
| | | | | | | | | Add _Py_fstat_noraise() function when a Python exception is not welcome. | ||||
* | | Issue #23707: On UNIX, os.urandom() now calls the Python signal handler when | Victor Stinner | 2015-03-19 | 1 | -19/+11 |
| | | | | | | | | | | | | | | read() is interrupted by a signal. dev_urandom_python() now calls _Py_read() helper instead of calling directly read(). | ||||
* | | Issue #22181: Fix dev_urandom_noraise(), try calling py_getrandom() before | Victor Stinner | 2015-03-19 | 1 | -4/+4 |
| | | | | | | | | opening /dev/urandom. | ||||
* | | Issue #22181: The availability of the getrandom() is now checked in configure, | Victor Stinner | 2015-03-19 | 1 | -8/+5 |
| | | | | | | | | | | | | and stored in pyconfig.h as the new HAVE_GETRANDOM_SYSCALL define. Fix os.urandom() tests using file descriptors if os.urandom() uses getrandom(). | ||||
* | | Issue #22181: On Linux, os.urandom() now uses the new getrandom() syscall if | Victor Stinner | 2015-03-18 | 1 | -6/+84 |
| | | | | | | | | | | | | available, syscall introduced in the Linux kernel 3.17. It is more reliable and more secure, because it avoids the need of a file descriptor and waits until the kernel has enough entropy. | ||||
* | | Issue #23694: Enhance _Py_open(), it now raises exceptions | Victor Stinner | 2015-03-18 | 1 | -7/+3 |
| | | | | | | | | | | | | | | | | * _Py_open() now raises exceptions on error. If open() fails, it raises an OSError with the filename. * _Py_open() now releases the GIL while calling open() * Add _Py_open_noraise() when _Py_open() cannot be used because the GIL is not held | ||||
* | | Issue #23152: Implement _Py_fstat() to support files larger than 2 GB on ↵ | Steve Dower | 2015-02-21 | 1 | -3/+3 |
| | | | | | | | | | | | | Windows. fstat() may fail with EOVERFLOW on files larger than 2 GB because the file size type is an signed 32-bit integer. | ||||
* | | Issue #22585: On OpenBSD 5.6 and newer, os.urandom() now calls getentropy(), | Victor Stinner | 2014-12-21 | 1 | -4/+35 |
| | | | | | | | | instead of reading /dev/urandom, to get pseudo-random bytes. | ||||
* | | Removed duplicated words in in comments and docs. | Serhiy Storchaka | 2014-12-01 | 1 | -1/+1 |
|\ \ | |/ | |||||
| * | Removed duplicated words in in comments and docs. | Serhiy Storchaka | 2014-12-01 | 1 | -1/+1 |
| | | |||||
* | | Issue21393 Use CryptReleaseContext to release Crypt handle on Windows | Tim Golden | 2014-05-06 | 1 | -1/+1 |
| | | |||||
* | | Issue #21393: random.c: on Windows, close the hCryptProv handle at exit | Victor Stinner | 2014-05-02 | 1 | -3/+6 |
|/ | |||||
* | Issue #21207: Detect when the os.urandom cached fd has been closed or ↵ | Antoine Pitrou | 2014-04-26 | 1 | -10/+39 |
| | | | | replaced, and open it anew. | ||||
* | Issue #16136: Remove VMS support and VMS-related code | Christian Heimes | 2013-12-21 | 1 | -33/+4 |
| | |||||
* | ssue #19183: Implement PEP 456 'secure and interchangeable hash algorithm'. | Christian Heimes | 2013-11-20 | 1 | -6/+7 |
| | | | | Python now uses SipHash24 on all major platforms. | ||||
* | Fix compiler warning in win32_urandom(): explicit cast to DWORD in | Victor Stinner | 2013-11-15 | 1 | -1/+1 |
| | | | | CryptGenRandom() | ||||
* | merge with 3.3 | Georg Brandl | 2013-10-06 | 1 | -2/+3 |
|\ | |||||
| * | Closes #15213: update comment for _PyOS_URandom | Georg Brandl | 2013-10-06 | 1 | -2/+3 |
| | | |||||
* | | Issue #18756: os.urandom() now uses a lazily-opened persistent file ↵ | Antoine Pitrou | 2013-08-31 | 1 | -13/+42 |
| | | | | | | | | descriptor, so as to avoid using many file descriptors when run in parallel from multiple threads. | ||||
* | | Issue #18571: Implementation of the PEP 446: file descriptors and file handles | Victor Stinner | 2013-08-28 | 1 | -2/+2 |
| | | | | | | | | | | are now created non-inheritable; add functions os.get/set_inheritable(), os.get/set_handle_inheritable() and socket.socket.get/set_inheritable(). | ||||
* | | Issue #18756: Improve error reporting in os.urandom() when the failure is ↵ | Antoine Pitrou | 2013-08-16 | 1 | -2/+6 |
|\ \ | |/ | | | | | due to something else than /dev/urandom not existing. | ||||
| * | Issue #18756: Improve error reporting in os.urandom() when the failure is ↵ | Antoine Pitrou | 2013-08-16 | 1 | -2/+6 |
| | | | | | | | | due to something else than /dev/urandom not existing. | ||||
* | | Drop support for Windows 2000; allow any XP API (but not Vista+). | Martin v. Löwis | 2013-01-25 | 1 | -30/+3 |
|/ | | | | | Drop SDK version configuration for Tk compilation, to not bind it to W2k anymore. Binding it to XP would conflict with Tk's own binding of tkMenu to W2k. | ||||
* | Issue #15340: Fix importing the random module when /dev/urandom cannot be ↵ | Antoine Pitrou | 2012-09-07 | 1 | -1/+2 |
| | | | | | | opened. This was a regression caused by the hash randomization patch. | ||||
* | enable hash randomization by default | Benjamin Peterson | 2012-02-21 | 1 | -11/+0 |
| | |||||
* | ensure no one tries to hash things before the random seed is found | Benjamin Peterson | 2012-02-21 | 1 | -4/+8 |
| | |||||
* | Fix typo in conditional. | Georg Brandl | 2012-02-20 | 1 | -1/+1 |
| | |||||
* | Issue #13703: add a way to randomize the hash values of basic types (str, ↵ | Georg Brandl | 2012-02-20 | 1 | -0/+302 |
bytes, datetime) in order to make algorithmic complexity attacks on (e.g.) web apps much more complicated. The environment variable PYTHONHASHSEED and the new command line flag -R control this behavior. |