2016-04-15 01:51:31 +10:00
|
|
|
"""Generate cryptographically strong pseudo-random numbers suitable for
|
|
|
|
managing secrets such as account authentication, tokens, and similar.
|
|
|
|
See PEP 506 for more information.
|
|
|
|
|
|
|
|
https://www.python.org/dev/peps/pep-0506/
|
|
|
|
|
|
|
|
|
|
|
|
Random numbers
|
|
|
|
==============
|
|
|
|
|
|
|
|
The ``secrets`` module provides the following pseudo-random functions, based
|
|
|
|
on SystemRandom, which in turn uses the most secure source of randomness your
|
|
|
|
operating system provides.
|
|
|
|
|
|
|
|
|
|
|
|
choice(sequence)
|
|
|
|
Choose a random element from a non-empty sequence.
|
|
|
|
|
|
|
|
randbelow(n)
|
|
|
|
Return a random int in the range [0, n).
|
|
|
|
|
|
|
|
randbits(k)
|
|
|
|
Generates an int with k random bits.
|
|
|
|
|
|
|
|
SystemRandom
|
|
|
|
Class for generating random numbers using sources provided by
|
|
|
|
the operating system. See the ``random`` module for documentation.
|
|
|
|
|
|
|
|
|
|
|
|
Token functions
|
|
|
|
===============
|
|
|
|
|
|
|
|
The ``secrets`` module provides a number of functions for generating secure
|
|
|
|
tokens, suitable for applications such as password resets, hard-to-guess
|
|
|
|
URLs, and similar. All the ``token_*`` functions take an optional single
|
|
|
|
argument specifying the number of bytes of randomness to use. If that is
|
|
|
|
not given, or is ``None``, a reasonable default is used. That default is
|
|
|
|
subject to change at any time, including during maintenance releases.
|
|
|
|
|
|
|
|
|
|
|
|
token_bytes(nbytes=None)
|
|
|
|
Return a random byte-string containing ``nbytes`` number of bytes.
|
|
|
|
|
|
|
|
>>> secrets.token_bytes(16) #doctest:+SKIP
|
|
|
|
b'\\xebr\\x17D*t\\xae\\xd4\\xe3S\\xb6\\xe2\\xebP1\\x8b'
|
|
|
|
|
|
|
|
|
|
|
|
token_hex(nbytes=None)
|
|
|
|
Return a random text-string, in hexadecimal. The string has ``nbytes``
|
|
|
|
random bytes, each byte converted to two hex digits.
|
|
|
|
|
|
|
|
>>> secrets.token_hex(16) #doctest:+SKIP
|
|
|
|
'f9bf78b9a18ce6d46a0cd2b0b86df9da'
|
|
|
|
|
|
|
|
token_urlsafe(nbytes=None)
|
|
|
|
Return a random URL-safe text-string, containing ``nbytes`` random
|
|
|
|
bytes. On average, each byte results in approximately 1.3 characters
|
|
|
|
in the final result.
|
|
|
|
|
|
|
|
>>> secrets.token_urlsafe(16) #doctest:+SKIP
|
|
|
|
'Drmhze6EPcv0fN_81Bj-nA'
|
|
|
|
|
|
|
|
|
|
|
|
(The examples above assume Python 3. In Python 2, byte-strings will display
|
|
|
|
using regular quotes ``''`` with no prefix, and text-strings will have a
|
|
|
|
``u`` prefix.)
|
|
|
|
|
|
|
|
|
|
|
|
Other functions
|
|
|
|
===============
|
|
|
|
|
|
|
|
compare_digest(a, b)
|
|
|
|
Return True if strings a and b are equal, otherwise False.
|
|
|
|
Performs the equality comparison in such a way as to reduce the
|
|
|
|
risk of timing attacks.
|
|
|
|
|
|
|
|
See http://codahale.com/a-lesson-in-timing-attacks/ for a
|
|
|
|
discussion on how timing attacks against ``==`` can reveal
|
|
|
|
secrets from your application.
|
|
|
|
|
|
|
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
__all__ = ['choice', 'randbelow', 'randbits', 'SystemRandom',
|
|
|
|
'token_bytes', 'token_hex', 'token_urlsafe',
|
|
|
|
'compare_digest',
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
|
|
import base64
|
|
|
|
import binascii
|
|
|
|
import os
|
|
|
|
|
2016-04-16 04:33:55 +10:00
|
|
|
from hmac import compare_digest
|
2016-04-15 01:51:31 +10:00
|
|
|
from random import SystemRandom
|
|
|
|
|
|
|
|
_sysrand = SystemRandom()
|
|
|
|
|
|
|
|
randbits = _sysrand.getrandbits
|
|
|
|
choice = _sysrand.choice
|
|
|
|
|
|
|
|
def randbelow(exclusive_upper_bound):
|
|
|
|
return _sysrand._randbelow(exclusive_upper_bound)
|
|
|
|
|
|
|
|
DEFAULT_ENTROPY = 32 # number of bytes to return by default
|
|
|
|
|
|
|
|
def token_bytes(nbytes=None):
|
|
|
|
if nbytes is None:
|
|
|
|
nbytes = DEFAULT_ENTROPY
|
|
|
|
return os.urandom(nbytes)
|
|
|
|
|
|
|
|
def token_hex(nbytes=None):
|
|
|
|
return binascii.hexlify(token_bytes(nbytes)).decode('ascii')
|
|
|
|
|
|
|
|
def token_urlsafe(nbytes=None):
|
|
|
|
tok = token_bytes(nbytes)
|
|
|
|
return base64.urlsafe_b64encode(tok).rstrip(b'=').decode('ascii')
|