Random.st
changeset 4198 0577571b74da
parent 3781 36ed064deb4e
child 4481 7785f5a3c411
child 4769 89914ccfcf7d
--- a/Random.st	Sun Nov 06 11:16:53 2016 +0100
+++ b/Random.st	Mon Nov 07 11:49:01 2016 +0100
@@ -1,3 +1,5 @@
+"{ Encoding: utf8 }"
+
 "
 ======================================================================
 |
@@ -309,14 +311,13 @@
         nextPut:OperatingSystem getProcessId; 
         nextPut:(ObjectMemory addressOf:Object new); 
         nextPut:ObjectMemory oldSpaceUsed; 
-        nextPut:ObjectMemory newSpaceUsed. 
-    [
-        hash nextPut:OperatingSystem getCPUCycleCount. 
-    ] on:PrimitiveFailure do:[].
+        nextPut:ObjectMemory newSpaceUsed; 
+        nextPut:OperatingSystem getCPUCycleCount. 
 
     "/ any other cheap sources of entropy?
 
-    "/ I think there is no problem in that MD5 is not a secure hash algo here - the idea is to shuffle the bits around a bit
+    "/ I think there is no problem in that MD5 is not a secure hash algo here 
+    "/ - the idea is to shuffle the bits around a bit
     "/ (because the numbers above usually have many high bits in common)
     "/ and then condense the bits into a smaller number.
     "/ Any comment from a crypto guy here - I am willing to change this to some other hash, if that makes a problem