From: | Brett McCormick <brett(at)work(dot)chicken(dot)org> |
---|---|
To: | ocie(at)paracel(dot)com |
Cc: | tgl(at)sss(dot)pgh(dot)pa(dot)us (Tom Lane), maillist(at)candle(dot)pha(dot)pa(dot)us, byronn(at)insightdist(dot)com, hackers(at)postgreSQL(dot)org |
Subject: | Re: [HACKERS] Query cancel and OOB data |
Date: | 1998-05-26 21:11:18 |
Message-ID: | 13675.12278.67171.468558@web0.speakeasy.org |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
/dev/urandom performs a similar function without the wait. of course
not all of the data is new, but it should still be pretty secure.
On Tue, 26 May 1998, at 14:00:57, ocie(at)paracel(dot)com wrote:
> A neat feature of linux is that it has a kernel random number
> generator which is fed random data from interrupt times. The only
> drawback is that this is sort of a "pool", so whn the pool is full,
> drawing 8 bytes from it is not a problem, but when the pool is
> drained, it can take some time to generate more data. At any rate, it
> might be a good starting point for a postgres random number generator
> -- sample usage of shared memory and perform a hash on this. From
> "applied cryptography":
From | Date | Subject | |
---|---|---|---|
Next Message | ocie | 1998-05-26 21:17:16 | Re: [HACKERS] Query cancel and OOB data |
Previous Message | ocie | 1998-05-26 21:00:57 | Re: [HACKERS] Query cancel and OOB data |