-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Expose Both /dev/random
& /dev/urandom
#33
Comments
Just found |
Maybe the best way to read this is within the context of |
I’ll be honest, the discussion on https://www.python.org/dev/peps/pep-0524/ didn’t seem very safisfying. |
Common sense doesn't get you very far in cryptography (without a lot of questioning). Certainly
That said, |
Fair enough. Though a question still remains if it makes sense to support both a synchronous and async interface. Right? |
There was some discussion of this in error kinds: hence |
Without any listed rationale / use-case, and since the current design partly covers the requirements here, I'm going to close this. If you still want extra functionality you're going to have to be more specific, and provide good motivation (because the API is already much more complex than I'd like). |
I think it would be ideal to support a blocking and non-blocking interface, and allow users to make use of
/dev/random
as well. I’m not by any means an expert, but common sense tells me that/dev/random
should be strictly better than/dev/urandom
in the general case.The text was updated successfully, but these errors were encountered: