From owner-freebsd-current Sun Jun 11 0:22:40 2000 Delivered-To: freebsd-current@freebsd.org Received: from grimreaper.grondar.za (grimreaper.grondar.za [196.7.18.138]) by hub.freebsd.org (Postfix) with ESMTP id 3BEA137B9D2; Sun, 11 Jun 2000 00:22:33 -0700 (PDT) (envelope-from mark@grondar.za) Received: from grimreaper.grondar.za (localhost [127.0.0.1]) by grimreaper.grondar.za (8.9.3/8.9.3) with ESMTP id JAA70906; Sun, 11 Jun 2000 09:22:36 +0200 (SAST) (envelope-from mark@grimreaper.grondar.za) Message-Id: <200006110722.JAA70906@grimreaper.grondar.za> To: "Andrey A. Chernov" Cc: current@FreeBSD.ORG Subject: Re: mktemp() patch References: <20000610194306.C99504@freebsd.org> In-Reply-To: <20000610194306.C99504@freebsd.org> ; from "Andrey A. Chernov" "Sat, 10 Jun 2000 19:43:06 MST." Date: Sun, 11 Jun 2000 09:22:36 +0200 From: Mark Murray Sender: owner-freebsd-current@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG > Only if predictable have the same bits number as random. If not all bits of > random XOR-ed (i.e. half of random), it becomes weaker. Sigh. Exactly. The other half is _not_random_; I am not talking about it. > BTW, if they have the same bits number, > there is no reason to XOR random with predictable, random is not become > more random. If you doubt your randomness, XORing two quantities can improve it, if there is coincidence of random/non-random bits. M -- Mark Murray Join the anti-SPAM movement: http://www.cauce.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message