On Wed, Oct 02, 2013 at 01:23:16PM +0200, Peter Zijlstra wrote: > So the only thing I can come up with is something like the below; > supposedly the sha hash mixing a boot time random seed and the mm > pointer is enough to avoid it being a data leak.
That is, right until it becomes feasible to run 2^64 SHA1 computations. I've actually no idea how hard that is given todays GPU assisted efforts. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/