From owner-freebsd-current Sun Jun 11 0:27:38 2000 Delivered-To: freebsd-current@freebsd.org Received: from grimreaper.grondar.za (grimreaper.grondar.za [196.7.18.138]) by hub.freebsd.org (Postfix) with ESMTP id 432D937B9D2; Sun, 11 Jun 2000 00:27:30 -0700 (PDT) (envelope-from mark@grondar.za) Received: from grimreaper.grondar.za (localhost [127.0.0.1]) by grimreaper.grondar.za (8.9.3/8.9.3) with ESMTP id JAA70939; Sun, 11 Jun 2000 09:27:33 +0200 (SAST) (envelope-from mark@grimreaper.grondar.za) Message-Id: <200006110727.JAA70939@grimreaper.grondar.za> To: "Andrey A. Chernov" Cc: current@FreeBSD.ORG Subject: Re: mktemp() patch References: <20000610195213.E99504@freebsd.org> In-Reply-To: <20000610195213.E99504@freebsd.org> ; from "Andrey A. Chernov" "Sat, 10 Jun 2000 19:52:14 MST." Date: Sun, 11 Jun 2000 09:27:33 +0200 From: Mark Murray Sender: owner-freebsd-current@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG > > BTW, if they have the same bits number, > > there is no reason to XOR random with predictable, random is not become > > more random. > > But still confirm this. If the random number is truly random, then you are correct. If there are attacks on your random number generator, then XORing other stuff onto it will perturb the result and help defences. M -- Mark Murray Join the anti-SPAM movement: http://www.cauce.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message