Date: Sat, 10 Jun 2000 19:51:03 -0700 From: "Andrey A. Chernov" <ache@freebsd.org> To: Mark Murray <mark@grondar.za> Cc: "Jeroen C. van Gelderen" <jeroen@vangelderen.org>, Kris Kennaway <kris@FreeBSD.ORG>, current@FreeBSD.ORG Subject: Re: mktemp() patch Message-ID: <20000610195102.D99504@freebsd.org> In-Reply-To: <200006100713.JAA04771@grimreaper.grondar.za>; from mark@grondar.za on Sat, Jun 10, 2000 at 09:13:30AM %2B0200 References: <20000609155342.B33329@freebsd.org> <200006100713.JAA04771@grimreaper.grondar.za>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Jun 10, 2000 at 09:13:30AM +0200, Mark Murray wrote: Well, I tend to agree that it is not weakens random, but I not see any improvement too. > That is a pretty fundamental theorem of Cryptography. My suggestion > _strengthens_ the random number. All you lose is one bit if it If it not weakers I can't see why it strenghthens. I.e. you can constantly strenghthens generator with passing it through XOR -1? If not, why any other value is better than -1? -- Andrey A. Chernov <ache@nagual.pp.ru> http://ache.pp.ru/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000610195102.D99504>