From owner-freebsd-current Sun Jun 11 0:24:45 2000 Delivered-To: freebsd-current@freebsd.org Received: from grimreaper.grondar.za (grimreaper.grondar.za [196.7.18.138]) by hub.freebsd.org (Postfix) with ESMTP id 1261337B9D2; Sun, 11 Jun 2000 00:24:34 -0700 (PDT) (envelope-from mark@grondar.za) Received: from grimreaper.grondar.za (localhost [127.0.0.1]) by grimreaper.grondar.za (8.9.3/8.9.3) with ESMTP id JAA70920; Sun, 11 Jun 2000 09:24:37 +0200 (SAST) (envelope-from mark@grimreaper.grondar.za) Message-Id: <200006110724.JAA70920@grimreaper.grondar.za> To: "Andrey A. Chernov" Cc: Mark Murray , "Jeroen C. van Gelderen" , Kris Kennaway , current@FreeBSD.ORG Subject: Re: mktemp() patch References: <20000610195102.D99504@freebsd.org> In-Reply-To: <20000610195102.D99504@freebsd.org> ; from "Andrey A. Chernov" "Sat, 10 Jun 2000 19:51:03 MST." Date: Sun, 11 Jun 2000 09:24:37 +0200 From: Mark Murray Sender: owner-freebsd-current@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG > If it not weakers I can't see why it strenghthens. > I.e. you can constantly strenghthens generator with passing it through XOR -1 ? > If not, why any other value is better than -1? Huh? -1 is a constant, not random. Pass your data through _random_ bits, XORing it with them, and you have unbreakable crypto (one-time-pad) if you make a record of the random bits (the key). M -- Mark Murray Join the anti-SPAM movement: http://www.cauce.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message