Zsh Mailing List Archive
Messages sorted by:
Reverse Date,
Date,
Thread,
Author
Re: problems with RANDOM in subshells
- X-seq: zsh-workers 16529
- From: Peter Stephenson <pws@xxxxxxx>
- To: zsh-workers@xxxxxxxxxx (Zsh hackers list)
- Subject: Re: problems with RANDOM in subshells
- Date: Thu, 31 Jan 2002 11:34:09 +0000
- In-reply-to: ""Bart Schaefer""'s message of "Thu, 31 Jan 2002 04:06:28 GMT." <1020131040628.ZM13288@xxxxxxxxxxxxxxxxxxxxxxx>
- Mailing-list: contact zsh-workers-help@xxxxxxxxxx; run by ezmlm
Guess what? Forgot to change the `To:' line again.
"Bart Schaefer" wrote:
> On Jan 31, 4:03am, Bart Schaefer wrote:
> }
> } According to search.cpan.org:
> }
> } Statistics-MaxEntropy-0.9 by Hugo WL ter Doest Released 26th November 1998
>
> Sorry, that turns out not to be what I at first thought.
>
> Crypt::Random looks like a better choice, or Math-TrulyRandom-1.0.
Crypt::Random simply uses /dev/random. However, Math-TrulyRandom is based
on a short C program which has a nice, simple copyright, so we could simply
include it. It may need some work porting to other UNIX variants.
There's no encryption involved, so I don't think the warning about export
controls is applicable. On the other hand, we don't have a built-in MD5 or
DES to run on it. The nearest we have is the hashing function.
--
Peter Stephenson <pws@xxxxxxx> Software Engineer
CSR Ltd., Science Park, Milton Road,
Cambridge, CB4 0WH, UK Tel: +44 (0)1223 392070
**********************************************************************
The information transmitted is intended only for the person or
entity to which it is addressed and may contain confidential
and/or privileged material.
Any review, retransmission, dissemination or other use of, or
taking of any action in reliance upon, this information by
persons or entities other than the intended recipient is
prohibited.
If you received this in error, please contact the sender and
delete the material from any computer.
**********************************************************************
/*
* Physically random numbers (very nearly uniform)
* D. P. Mitchell
* Modified by Matt Blaze 2/95
*/
/*
* The authors of this software are Don Mitchell and Matt Blaze.
* Copyright (c) 1995 by AT&T.
* Permission to use, copy, and modify this software without fee
* is hereby granted, provided that this entire notice is included in
* all copies of any software which is or includes a copy or
* modification of this software and in all copies of the supporting
* documentation for such software.
*
* This software may be subject to United States export controls.
*
* THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED
* WARRANTY. IN PARTICULAR, NEITHER THE AUTHORS NOR AT&T MAKE ANY
* REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY
* OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE.
*/
/*
* WARNING: depending on the particular platform, truerand() output may
* be biased or correlated. In general, you can expect about 16 bits of
* "pseudo-entropy" out of each 32 bit word returned by truerand(),
* but it may not be uniformly diffused. You should therefore run
* the output through some post-whitening function (like MD5 or DES or
* whatever) before using it to generate key material. (RSAREF's
* random package does this for you when you feed truerand() bits to the
* seed input function.)
*
* Test these assumptions on your own platform before fielding a system
* based on this software or these techniques.
*
* This software seems to work well (at 16 bits per truerand() call) on
* a Sun Sparc-20 under SunOS 4.1.3 and on a P100 under BSDI 2.0. You're
* on your own elsewhere.
*/
#include <signal.h>
#include <setjmp.h>
#include <sys/time.h>
#include <math.h>
#include <stdio.h>
#include "truerand.h"
static jmp_buf env;
static unsigned count;
static unsigned ocount;
static unsigned buffer;
static int
tick()
{
struct itimerval it, oit;
timerclear(&it.it_interval);
it.it_value.tv_sec = 0;
it.it_value.tv_usec = 16665;
if (setitimer(ITIMER_REAL, &it, &oit) < 0)
perror("tick");
}
static void
interrupt()
{
if (count)
longjmp(env, 1);
(void) signal(SIGALRM, interrupt);
tick();
}
static unsigned long
roulette()
{
if (setjmp(env)) {
count ^= (count>>3) ^ (count>>6) ^ ocount;
count &= 0x7;
ocount=count;
buffer = (buffer<<3) ^ count;
return buffer;
}
(void) signal(SIGALRM, interrupt);
count = 0;
tick();
for (;;)
count++; /* about 1 MHz on VAX 11/780 */
}
unsigned long
truerand()
{
count=0;
(void) roulette();
(void) roulette();
(void) roulette();
(void) roulette();
(void) roulette();
(void) roulette();
(void) roulette();
(void) roulette();
(void) roulette();
(void) roulette();
return roulette();
}
int
n_truerand(n)
int n;
{
int slop, v;
slop = 0x7FFFFFFF % n;
do {
v = truerand() >> 1;
} while (v <= slop);
return v % n;
}
Messages sorted by:
Reverse Date,
Date,
Thread,
Author