[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CACXcFm=OHeAwbJ6WNv4kxF-FOpvc7eep5n-xTg9bMMjcw41j+A@mail.gmail.com>
Date: Mon, 14 Oct 2013 11:46:18 -0400
From: Sandy Harris <sandyinchina@...il.com>
To: Stephan Mueller <smueller@...onox.de>
Cc: "Theodore Ts'o" <tytso@....edu>,
LKML <linux-kernel@...r.kernel.org>, linux-crypto@...r.kernel.org
Subject: Re: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random
On Mon, Oct 14, 2013 at 11:26 AM, Stephan Mueller <smueller@...onox.de> wrote:
>>Why not declare some 64-bit constant C with a significant
>
> Which constant would you take? The CRC twist values? The SHA-1 initial
> values? Or the first few from SHA-256?
The only essential requirement is that it not be something stupidly
regular like a 64-bit string 0x5555555555555555.
I'd pick an odd number so the low bit always changes, and a
constant with about half the bits set, maybe 24 < n < 40 or
some such. I'm not certain either of those is strictly required
but I'd do them anyway.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists