diff options
author | Alex Gaynor <alex.gaynor@gmail.com> | 2014-02-06 10:27:48 -0800 |
---|---|---|
committer | Alex Gaynor <alex.gaynor@gmail.com> | 2014-02-06 10:27:48 -0800 |
commit | cb157160f046e4e3051128c321f2f607c6f9995e (patch) | |
tree | 45fd6948647430bd837736ca5028f6df2422f86d /docs | |
parent | 2a70f916309fb4c2dd93b7a71a8e7670cf526ee8 (diff) | |
download | cryptography-cb157160f046e4e3051128c321f2f607c6f9995e.tar.gz cryptography-cb157160f046e4e3051128c321f2f607c6f9995e.tar.bz2 cryptography-cb157160f046e4e3051128c321f2f607c6f9995e.zip |
Be more alarmist
Diffstat (limited to 'docs')
-rw-r--r-- | docs/random-numbers.rst | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/docs/random-numbers.rst b/docs/random-numbers.rst index aa89c8e4..c8f95fd8 100644 --- a/docs/random-numbers.rst +++ b/docs/random-numbers.rst @@ -5,8 +5,8 @@ When generating random data for use in cryptographic operations, such as an initialization vector for encryption in :class:`~cryptography.hazmat.primitives.ciphers.modes.CBC` mode, you do not want to use the standard :mod:`random` module APIs. This is because they do not -provide a cryptographically secure random number generator, resulting in -various security issues in different algorithms. +provide a cryptographically secure random number generator, which can result in +major security issues depending on the algorithms in use. Therefore, it is our recommendation to always use your operating system's provided random number generator, which is available as ``os.urandom()``. For |