From owner-freebsd-current Sat Jun 10 19:51: 5 2000 Delivered-To: freebsd-current@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 542) id 1EC1837BEAB; Sat, 10 Jun 2000 19:51:03 -0700 (PDT) Date: Sat, 10 Jun 2000 19:51:03 -0700 From: "Andrey A. Chernov" To: Mark Murray Cc: "Jeroen C. van Gelderen" , Kris Kennaway , current@FreeBSD.ORG Subject: Re: mktemp() patch Message-ID: <20000610195102.D99504@freebsd.org> References: <20000609155342.B33329@freebsd.org> <200006100713.JAA04771@grimreaper.grondar.za> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 0.95.4i In-Reply-To: <200006100713.JAA04771@grimreaper.grondar.za>; from mark@grondar.za on Sat, Jun 10, 2000 at 09:13:30AM +0200 Organization: Biomechanoid Sender: owner-freebsd-current@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On Sat, Jun 10, 2000 at 09:13:30AM +0200, Mark Murray wrote: Well, I tend to agree that it is not weakens random, but I not see any improvement too. > That is a pretty fundamental theorem of Cryptography. My suggestion > _strengthens_ the random number. All you lose is one bit if it If it not weakers I can't see why it strenghthens. I.e. you can constantly strenghthens generator with passing it through XOR -1? If not, why any other value is better than -1? -- Andrey A. Chernov http://ache.pp.ru/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message