On Fri, Apr 15, 2005 at 12:22:25PM -0400, Jean-Luc Cooke wrote: > And the argument that "random.c doesn't rely on the strength of crypto > primitives" is kinda lame, though I see where you're coming from. random.c's > entropy mixing and output depends on the (endian incorrect) SHA-1 > implementation hard coded in that file to be pre-image resistant. If that > fails (and a few other things) then it's broken.
You really ought to look at the _current_ implementation. There is no SHA1 code in random.c. -- Mathematics is the supreme nostalgia of our time. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/