Re: [patch, -rc5-mm1] lock validator: special locking: net/ipv4/igmp.c #2

2006-06-01 Thread Jesse Brandeburg
On 5/31/06, Ingo Molnar <[EMAIL PROTECTED]> wrote: * Jesse Brandeburg <[EMAIL PROTECTED]> wrote: > well, when running e1000 through some code paths on FC4 + > 2.6.17-rc5-mm1 + ingo's latest rollup patch, with this lockdep debug > option enabled I got this: > > e1000: eth1: e1000_watchdog_task:

Re: orinoco encodeext + auth patch on lkml

2006-06-01 Thread Pavel Roskin
Hello, Dan! On Wed, 2006-05-31 at 08:03 -0400, Dan Williams wrote: > Pavel, > > Unsure if you saw this. Slightly annoying he didn't send to netdev, but > would be good to take a look at and possibly integrate. Looks sane to > me from 10,000ft. > > http://lkml.org/lkml/2006/5/30/433 Thanks for

[patch 09/17] secmark: Add secmark support to core networking.

2006-06-01 Thread akpm
From: James Morris <[EMAIL PROTECTED]> Add a secmark field to the skbuff structure, to allow security subsystems to place security markings on network packets. This is similar to the nfmark field, except is intended for implementing security policy, rather than than networking policy. This patc

[patch 17/17] recent match: missing refcnt initialization

2006-06-01 Thread akpm
From: Patrick McHardy <[EMAIL PROTECTED]> Signed-off-by: Patrick McHardy <[EMAIL PROTECTED]> Signed-off-by: Andrew Morton <[EMAIL PROTECTED]> --- net/ipv4/netfilter/ipt_recent.c |1 + 1 file changed, 1 insertion(+) diff -puN net/ipv4/netfilter/ipt_recent.c~recent-match-missing-refcnt-init

[patch 08/17] secmark: Add SELinux exports

2006-06-01 Thread akpm
From: James Morris <[EMAIL PROTECTED]> Add and export new functions to the in-kernel SELinux API in support of the new secmark-based packet controls. Signed-off-by: James Morris <[EMAIL PROTECTED]> Signed-off-by: Andrew Morton <[EMAIL PROTECTED]> --- include/linux/selinux.h| 32 +

[patch 03/17] eliminate unused /proc/sys/net/ethernet

2006-06-01 Thread akpm
From: Jes Sorensen <[EMAIL PROTECTED]> The /proc/sys/net/ethernet directory has been sitting empty for more than 10 years! Time to eliminate it! Signed-off-by: Jes Sorensen <[EMAIL PROTECTED]> Cc: Jeff Garzik <[EMAIL PROTECTED]> Cc: "David S. Miller" <[EMAIL PROTECTED]> Signed-off-by: Andrew Mo

[patch 07/17] secmark: Add new flask definitions to SELinux

2006-06-01 Thread akpm
From: James Morris <[EMAIL PROTECTED]> Secmark implements a new scheme for adding security markings to packets via iptables, as well as changes to SELinux to use these markings for security policy enforcement. The rationale for this scheme is explained and discussed in detail in the original thr

[patch 13/17] secmark: Add new packet controls to SELinux

2006-06-01 Thread akpm
From: James Morris <[EMAIL PROTECTED]> Add new per-packet access controls to SELinux, replacing the old packet controls. Packets are labeled with the iptables SECMARK and CONNSECMARK targets, then security policy for the packets is enforced with these controls. To allow for a smooth transition

[patch 11/17] secmark: Add secmark support to conntrack

2006-06-01 Thread akpm
From: James Morris <[EMAIL PROTECTED]> Add a secmark field to IP and NF conntracks, so that security markings on packets can be copied to their associated connections, and also copied back to packets as required. This is similar to the network mark field currently used with conntrack, although i

[patch 15/17] pppoe: missing result check in __pppoe_xmit()

2006-06-01 Thread akpm
From: Florin Malita <[EMAIL PROTECTED]> skb_clone() may fail, we should check the result. Coverity CID: 1215. Signed-off-by: Florin Malita <[EMAIL PROTECTED]> Cc: "David S. Miller" <[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]> Signed-off-by: Andrew Morton <[EMAIL PROTECTED]> --- drivers/net/ppp

[patch 12/17] secmark: Add CONNSECMARK xtables target

2006-06-01 Thread akpm
From: James Morris <[EMAIL PROTECTED]> Add a new xtables target, CONNSECMARK, which is used to specify rules for copying security marks from packets to connections, and for copyying security marks back from connections to packets. This is similar to the CONNMARK target, but is more limited in sc

[patch 14/17] irda: missing allocation result check in irlap_change_speed()

2006-06-01 Thread akpm
From: Florin Malita <[EMAIL PROTECTED]> The skb allocation may fail, which can result in a NULL pointer dereference in irlap_queue_xmit(). Coverity CID: 434. davem: "If the allocation fails we should probably do something more interesting here, such as schedule a timer to try again later. Othe

[patch 05/17] selinux: add security class for appletalk sockets

2006-06-01 Thread akpm
From: Christopher J. PeBenito <[EMAIL PROTECTED]> Add a security class for appletalk sockets so that they can be distinguished in SELinux policy. Please apply. Signed-off-by: Stephen Smalley <[EMAIL PROTECTED]> Acked-by: James Morris <[EMAIL PROTECTED]> Cc: "David S. Miller" <[EMAIL PROTECTED]>

[patch 16/17] recent match: fix "sleeping function called from invalid context"

2006-06-01 Thread akpm
From: Patrick McHardy <[EMAIL PROTECTED]> create_proc_entry must not be called with locks held. Use a mutex instead to protect data only changed in user context. Signed-off-by: Patrick McHardy <[EMAIL PROTECTED]> Signed-off-by: Andrew Morton <[EMAIL PROTECTED]> --- net/ipv4/netfilter/ipt_rece

Re: [patch 16/17] recent match: fix "sleeping function called from invalid context"

2006-06-01 Thread Andrew Morton
oops, sorry, I didn't mean to send 16 and 17. - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

[patch 04/17] ppp_async hang fix

2006-06-01 Thread akpm
From: <[EMAIL PROTECTED]> Adapted from http://bugzilla.kernel.org/show_bug.cgi?id=6530 Reschedule the async Tx tasklet if the transmit queue was full. Cc: Paul Mackerras <[EMAIL PROTECTED]> Signed-off-by: Andrew Morton <[EMAIL PROTECTED]> --- drivers/net/ppp_async.c |2 ++ 1 file changed

[patch 10/17] secmark: Add xtables SECMARK target

2006-06-01 Thread akpm
From: James Morris <[EMAIL PROTECTED]> Add a SECMARK target to xtables, allowing the admin to apply security marks to packets via both iptables and ip6tables. The target currently handles SELinux security marking, but can be extended for other purposes as needed. Signed-off-by: James Morris <[E

[patch 02/17] remove dead entry in net wan Kconfig

2006-06-01 Thread akpm
From: Paul Fulghum <[EMAIL PROTECTED]> Remove dead entry from net wan Kconfig. This entry is left over from 2.4 where synclink used syncppp driver directly. synclink drivers now use generic HDLC Signed-off-by: Paul Fulghum <[EMAIL PROTECTED]> Signed-off-by: Andrew Morton <[EMAIL PROTECTED]> --

[patch 06/17] neighbour.c, pneigh_get_next() skips published entry

2006-06-01 Thread akpm
From: "Jari Takkala" <[EMAIL PROTECTED]> Fix a problem where output from /proc/net/arp skips a record when the full output does not fit into the users read() buffer. To reproduce: publish a large number of ARP entries (more than 10 required on my system). Run 'dd if=/proc/net/arp of=arp-1024.ou

[patch 01/17] clean up initcall warning for netconsole

2006-06-01 Thread akpm
From: Matt Mackall <[EMAIL PROTECTED]> netconsole is being wrong here. If it wasn't enabled there's no error. Signed-off-by: Andrew Morton <[EMAIL PROTECTED]> --- drivers/net/netconsole.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff -puN drivers/net/netconsole.c~clean-up-in

Re: netif_tx_disable and lockless TX

2006-06-01 Thread Stephen Hemminger
Robert Olsson wrote: jamal writes: > Latency-wise: TX completion interrupt provides the best latency. > Processing in the poll() -aka softirq- was almost close to the hardirq > variant. So if you can make things run in a softirq such as transmit > one, then the numbers will likely stay the s

Re: [PATCH] softmac: Fix handling of authentication failure

2006-06-01 Thread Larry Finger
Daniel Drake wrote: My router blew up earlier, but exhibited some interesting behaviour during its dying moments. It was broadcasting beacons but wouldn't respond to any authentication requests. I noticed that softmac wasn't playing nice with this, as I couldn't make it try to connect to other n

Re: [RFT] Realtek 8168 ethernet support

2006-06-01 Thread Jeff Garzik
On Fri, Jun 02, 2006 at 12:24:37AM +0200, Francois Romieu wrote: > I'd rather use pci_device_id->driver_data but it's an option. I would prefer this, too. Jeff - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordo

e1000 fails to load sometimes: The EEPROM Checksum Is Not Valid

2006-06-01 Thread Jeremy Fitzhardinge
With 2.6.17-rc5-mm2 (and other kernels), the e1000 fails to load sometimes, with the message: Intel(R) PRO/1000 Network Driver - version 7.0.38-k4-NAPI Copyright (c) 1999-2006 Intel Corporation. ACPI: PCI Interrupt :02:00.0[A] -> GSI 16 (level, low) -> IRQ 20 PCI: Setting latency timer of de

Re: DPRINTKs in e1000 code (2.6.x kernels)

2006-06-01 Thread Amit K Arora
Auke Kok wrote: I'm in need of coffee - these changes got queued for 2.6.18. They're in jgarziks netdev-2.6.git, but not anywhere in 2.6.17rcX Auke Thanks for the clarification ! Regards, Amit Arora - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a messa

RE: [openib-general] Re: [PATCH 1/2] iWARP Connection Manager.

2006-06-01 Thread Caitlin Bestler
>> >> There's a difference between trying to handle the user calling >> disconnect/destroy at the same time a call to accept/connect is >> active, versus the user calling disconnect/destroy after >> accept/connect have returned. In the latter case, I think you're >> fine. In the first case, thi

Re: DPRINTKs in e1000 code (2.6.x kernels)

2006-06-01 Thread Auke Kok
Auke Kok wrote: Amit Arora wrote: On Wed, 2006-05-31 at 16:30, Auke Kok wrote: On Wed, 31 May 2006 14:31:05 +0530, Amit K Arora <[EMAIL PROTECTED]> wrote: Should these DPRINTKs be removed from the 2.6.x e1000 code as well ? they already are. the patch was merged in 7.0.38-k2 or so which is ov

Re: [RFT] Realtek 8168 ethernet support

2006-06-01 Thread Francois Romieu
Daniel Drake <[EMAIL PROTECTED]> : [...] > @@ -1442,20 +1444,24 @@ rtl8169_init_board(struct pci_dev *pdev, > } > } > > - /* make sure PCI base addr 1 is MMIO */ > - if (!(pci_resource_flags(pdev, 1) & IORESOURCE_MEM)) { > - if (netif_msg_probe(tp)) { > -

Re: [openib-general] Re: [PATCH 1/2] iWARP Connection Manager.

2006-06-01 Thread Tom Tucker
On Thu, 2006-06-01 at 14:09 -0700, Sean Hefty wrote: > Steve Wise wrote: > >>>+int iw_cm_disconnect(struct iw_cm_id *cm_id, int abrupt) > >>>+{ > >>>+ struct iwcm_id_private *cm_id_priv; > >>>+ unsigned long flags; > >>>+ int ret = 0; > >>>+ > >>>+ cm_id_priv = container_of(cm_id, struct iwcm_i

Re: DPRINTKs in e1000 code (2.6.x kernels)

2006-06-01 Thread Auke Kok
Amit Arora wrote: On Wed, 2006-05-31 at 16:30, Auke Kok wrote: On Wed, 31 May 2006 14:31:05 +0530, Amit K Arora <[EMAIL PROTECTED]> wrote: Should these DPRINTKs be removed from the 2.6.x e1000 code as well ? they already are. the patch was merged in 7.0.38-k2 or so which is over a month ago.

Re: DPRINTKs in e1000 code (2.6.x kernels)

2006-06-01 Thread Amit Arora
On Wed, 2006-05-31 at 16:30, Auke Kok wrote: > On Wed, 31 May 2006 14:31:05 +0530, Amit K Arora <[EMAIL PROTECTED]> wrote: > > > > Should these DPRINTKs be removed from the 2.6.x e1000 code as well ? > > they already are. the patch was merged in 7.0.38-k2 or so which is over a > month ago. I d

[RFC] new qla3xxx NIC Driver v2.02.00k30

2006-06-01 Thread Ron Mercer
All, Forth submission for the upstream inclusion of the qla3xxx Ethernet driver. This is a complementary network driver for our ISP4XXX parts. There is a concurrent effort underway to get the iSCSI driver (qla4xxx) integrated upstream as well. This submission is contained in a patch file that doe

Re: [PATCH 1/2] iWARP Connection Manager.

2006-06-01 Thread Sean Hefty
Steve Wise wrote: +int iw_cm_disconnect(struct iw_cm_id *cm_id, int abrupt) +{ + struct iwcm_id_private *cm_id_priv; + unsigned long flags; + int ret = 0; + + cm_id_priv = container_of(cm_id, struct iwcm_id_private, id); + /* Wait if we're currently in a connect or a

Re: [Bugme-new] [Bug 6613] New: iptables broken on 32-bit PReP (ARCH=ppc)

2006-06-01 Thread Meelis Roos
Then lets try something different. Please enable the DEBUG_IP_FIREWALL_USER define in net/ipv4/netfilter/ip_tables.c and post the results, if any. On bootup I get this in dmesg (one Bad offset has been added): ip_tables: (C) 2000-2006 Netfilter Core Team Netfilter messages via NETLINK v0.30. ip

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread David Miller
From: "Brian F. G. Bidulock" <[EMAIL PROTECTED]> Date: Thu, 1 Jun 2006 12:40:10 -0600 > I think the sun shines more in Moscow than in Edmonton, so it is not > so random. ;) Go Oilers :) - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTE

[RFT] Realtek 8168 ethernet support

2006-06-01 Thread Daniel Drake
I've produced this patch which should allow the r8169 driver to work with the new Realtek 8168 chips. These are found in PCI-Express form and onboard some newer motherboards. Does anyone own this hardware? I'm looking for someone to test it before I send it on. Signed-off-by: Daniel Drake <[EMAIL

RE: pci_enable_msix throws up error

2006-06-01 Thread Ravinandan Arakali
I have submitted a proposed fix for the below issue. Will wait for comments. Ravi -Original Message- From: Andi Kleen [mailto:[EMAIL PROTECTED] Sent: Friday, May 05, 2006 1:44 AM To: Ayaz Abdulla Cc: [EMAIL PROTECTED]; linux-kernel@vger.kernel.org; Ananda. Raju; netdev@vger.kernel.org; Le

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread Brian F. G. Bidulock
Evgeniy, On Thu, 01 Jun 2006, Evgeniy Polyakov wrote: I think the sun shines more in Moscow than in Edmonton, so it is not so random. ;) > > Specially for you :) Thank you for being so gracious and patient with me. > It does not have artifacts, but it's dispersion is wider than XOR one. > _Mu

Re: monitor_during_oper on rt*pci (or any other pcmcia card)?

2006-06-01 Thread Ivo van Doorn
Hi, > Florian approached me with a project where you need a pcmcia card that > can have monitor_during_oper. I'd use bcm43xx but unfortunately the > signal strength calculations are way off right now, and that's another > requirement. > > Can the rt family of cards be made to support this with re

Re: [Bugme-new] [Bug 6613] New: iptables broken on 32-bit PReP (ARCH=ppc)

2006-06-01 Thread Patrick McHardy
Meelis Roos wrote: >> Meelis, it would really help if you could try 2.6.16 and in case >> that doesn't work 2.6.15 to give an idea about whether this is a >> recent regression or an old problem. We had a number of changes >> in this area in the last two kernel versions that could be related. > >

Re: 2.6.17-rc4: netfilter LOG messages truncated via NETCONSOLE

2006-06-01 Thread Patrick McHardy
Frank van Maarseveen wrote: > ok, now "tc -s -d qdisc show" says (after noticing missing netconsole > packets): > > qdisc pfifo_fast 0: dev eth0 bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1 > Sent 155031 bytes 2067 pkt (dropped 0, overlimits 0 requeues 0) > backlog 0b 0p requeues 0 Mhh n

Re: [openib-general] Re: [PATCH 1/2] iWARP Connection Manager.

2006-06-01 Thread Tom Tucker
On Wed, 2006-05-31 at 15:22 -0700, Sean Hefty wrote: > Steve Wise wrote: > > +/* > > + * Release a reference on cm_id. If the last reference is being removed > > + * and iw_destroy_cm_id is waiting, wake up the waiting thread. > > + */ > > +static int iwcm_deref_id(struct iwcm_id_private *cm_id_pr

Re: [PATCH 1/2] iWARP Connection Manager.

2006-06-01 Thread Steve Wise
On Wed, 2006-05-31 at 15:22 -0700, Sean Hefty wrote: > Steve Wise wrote: > > +/* > > + * Release a reference on cm_id. If the last reference is being removed > > + * and iw_destroy_cm_id is waiting, wake up the waiting thread. > > + */ > > +static int iwcm_deref_id(struct iwcm_id_private *cm_id_pr

[PATCH] softmac: unified capabilities computation

2006-06-01 Thread Daniel Drake
From: Joseph Jezak <[EMAIL PROTECTED]> This patch moves the capabilities field computation to a function for clarity and adds some previously unimplemented bits. Signed off by Joseph Jezak <[EMAIL PROTECTED]> Signed-off-by: Daniel Drake <[EMAIL PROTECTED]> Acked-By: Johannes Berg <[EMAIL PROTECTE

[PATCH] softmac: Fix handling of authentication failure

2006-06-01 Thread Daniel Drake
My router blew up earlier, but exhibited some interesting behaviour during its dying moments. It was broadcasting beacons but wouldn't respond to any authentication requests. I noticed that softmac wasn't playing nice with this, as I couldn't make it try to connect to other networks after it had t

[PATCH] softmac: complete shared key authentication

2006-06-01 Thread Daniel Drake
This patch finishes of the partially-complete shared key authentication implementation in softmac. The complication here is that we need to encrypt a management frame during the authentication process. I don't think there are any other scenarios where this would have to happen. To get around thi

Re: Refactor Netlink connector?

2006-06-01 Thread James Morris
On Thu, 1 Jun 2006, Thomas Graf wrote: > It shouldn't be hard to split what is implemented in nlmsg_route_perms[] > for NETLINK_ROUTE into the definitions of the generic netlink > operations, could look like this: > > struct genl_ops some_op = { > [...] > .perm= NETLINK_GENERIC_SO

[PATCH 3/7] AMSO1100 WR / Event Definitions.

2006-06-01 Thread Steve Wise
Sorry for this, but patch 3 is apparently getting eaten by the list servers for linux-kernel and netdev. Here is patch 3 as a tarball to see if it goes through... Steve. [PATCH 3/7] AMSO1100 WR / Event Definitions. amso1100_wr.tgz Description: application/compressed-tar

monitor_during_oper on rt*pci (or any other pcmcia card)?

2006-06-01 Thread Johannes Berg
Hey, Florian approached me with a project where you need a pcmcia card that can have monitor_during_oper. I'd use bcm43xx but unfortunately the signal strength calculations are way off right now, and that's another requirement. Can the rt family of cards be made to support this with reliable sign

[RFT] r8169: MAC address change support

2006-06-01 Thread Francois Romieu
It works fine here (x86 so far) but I would welcome more testers. The patch applies against 2.6.17-rcX. diff --git a/drivers/net/r8169.c b/drivers/net/r8169.c index 0ad3310..4208d9a 100644 --- a/drivers/net/r8169.c +++ b/drivers/net/r8169.c @@ -1381,6 +1381,41 @@ static void rtl8169_netpoll(struc

[NET]: Add netif_tx_lock

2006-06-01 Thread Herbert Xu
On Thu, Jun 01, 2006 at 10:25:25AM +1000, herbert wrote: > > > I think this netpoll wrinkle means we also have to make > > sure to set the xmit_lock_owner across the board. > > You're right. In fact this can deadlock today for those drivers that > already make use of xmit_lock without setting th

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread Evgeniy Polyakov
On Thu, Jun 01, 2006 at 04:24:57AM -0600, Brian F. G. Bidulock ([EMAIL PROTECTED]) wrote: > For purely random numbers you could amplify thermal noise off an > open transitor junction (the audiofile's white noise generator) > and feed it into an analog to digital converter. It is also possible to

Re: Refactor Netlink connector?

2006-06-01 Thread Thomas Graf
* James Morris <[EMAIL PROTECTED]> 2006-05-31 11:42 > On Wed, 31 May 2006, jamal wrote: > > > To also answer your other email: > > Look at security/selinux/nlmsgtab.c for example for NETLINK_ROUTE > > and compare with NETLINK_GENERIC to see the hole. I was suggesting if > > we started by just add

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread Brian F. G. Bidulock
Evgeniy, On Thu, 01 Jun 2006, Evgeniy Polyakov wrote: For purely random numbers you could amplify thermal noise off an open transitor junction (the audiofile's white noise generator) and feed it into an analog to digital converter. > > I've run it with following source ip/port selection algo: >

Re: 2.6.17-rc4: netfilter LOG messages truncated via NETCONSOLE

2006-06-01 Thread Frank van Maarseveen
On Wed, May 31, 2006 at 07:46:20PM +0200, Patrick McHardy wrote: [...] > > ip -s link doesn't show any > > dropped packets so far with any patch and I don't use traffic control > > that I'm aware of. But I'm not sure what to make of "tc" output, maybe > > because CONFIG_SHAPER is not set: > > >

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread Evgeniy Polyakov
On Thu, Jun 01, 2006 at 01:11:25AM -0600, Brian F. G. Bidulock ([EMAIL PROTECTED]) wrote: > Evgeniy, > > On Thu, 01 Jun 2006, Evgeniy Polyakov wrote: > > > On Thu, Jun 01, 2006 at 12:46:08AM -0600, Brian F. G. Bidulock ([EMAIL > > PROTECTED]) wrote: > > > > Since pseudo-randomness affects both

[PATCH netdev-2.6#upstream] net: au1000_eth: PHY framework conversion

2006-06-01 Thread Herbert Valerio Riedel
convert au1000_eth driver to use PHY framework and garbage collected functions and identifiers that became unused/obsolete in the process Signed-off-by: Herbert Valerio Riedel <[EMAIL PROTECTED]> --- this is a resend of http://marc.theaimsgroup.com/?l=linux-netdev&m=114746547301867&w=2 rebased&h

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread Brian F. G. Bidulock
Evgeniy, On Thu, 01 Jun 2006, Evgeniy Polyakov wrote: > On Thu, Jun 01, 2006 at 12:46:08AM -0600, Brian F. G. Bidulock ([EMAIL > PROTECTED]) wrote: > > > Since pseudo-randomness affects both folded and not folded hash > > > distribution, it can not end up in different results. > > > > Yes it wo

Re: [Bugme-new] [Bug 6613] New: iptables broken on 32-bit PReP (ARCH=ppc)

2006-06-01 Thread Meelis Roos
modprobe iptable_filter (errors out with Invalid Argument) iptables -t nat -A POSTROUTING -s 10.0.0.0/8 -j SNAT --to 192.168.1.1 (usually errors out with Invalid Argument, sometimes succeeds, when succeeds then the rule works fine) Meelis, it would really help if you could try 2.6.16 and in case

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread Evgeniy Polyakov
On Thu, Jun 01, 2006 at 12:46:08AM -0600, Brian F. G. Bidulock ([EMAIL PROTECTED]) wrote: > > Since pseudo-randomness affects both folded and not folded hash > > distribution, it can not end up in different results. > > Yes it would, so to rule out pseudo-random effects the pseudo- > random numbe