diff options
author | Atul Shimpi <shimpiatul@hotmail.com> | 2017-11-25 16:13:17 +0530 |
---|---|---|
committer | Matthew Draper <matthew@trebex.net> | 2017-11-25 21:13:17 +1030 |
commit | eb6d7d5aa0522ab8d3d6e32d91d8ac645883ee3c (patch) | |
tree | cf03e73a7a6d98140916d8d63b9f6dac8963e45a /guides | |
parent | 3313912de1814ff4698e050c414940f004af93b0 (diff) | |
download | rails-eb6d7d5aa0522ab8d3d6e32d91d8ac645883ee3c.tar.gz rails-eb6d7d5aa0522ab8d3d6e32d91d8ac645883ee3c.tar.bz2 rails-eb6d7d5aa0522ab8d3d6e32d91d8ac645883ee3c.zip |
[ci skip] SecureRandom should mentioned Win32 CryptoAPI functions ins… (#31225)
* [ci skip] SecureRandom should mentioned Win32 CryptoAPI functions instead of Win32
* Remove functions word
Diffstat (limited to 'guides')
-rw-r--r-- | guides/source/security.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/guides/source/security.md b/guides/source/security.md index fa90cadcd2..eeb005b661 100644 --- a/guides/source/security.md +++ b/guides/source/security.md @@ -52,7 +52,7 @@ User.find(session[:user_id]) NOTE: _The session ID is a 32-character random hex string._ -The session ID is generated using `SecureRandom.hex` which generates a random hex string using platform specific methods (such as OpenSSL, /dev/urandom or Win32) for generating cryptographically secure random numbers. Currently it is not feasible to brute-force Rails' session IDs. +The session ID is generated using `SecureRandom.hex` which generates a random hex string using platform specific methods (such as OpenSSL, /dev/urandom or Win32 CryptoAPI) for generating cryptographically secure random numbers. Currently it is not feasible to brute-force Rails' session IDs. ### Session Hijacking |