--- a/Random.st Sun Nov 06 11:16:53 2016 +0100
+++ b/Random.st Mon Nov 07 11:49:01 2016 +0100
@@ -1,3 +1,5 @@
+"{ Encoding: utf8 }"
+
"
======================================================================
|
@@ -309,14 +311,13 @@
nextPut:OperatingSystem getProcessId;
nextPut:(ObjectMemory addressOf:Object new);
nextPut:ObjectMemory oldSpaceUsed;
- nextPut:ObjectMemory newSpaceUsed.
- [
- hash nextPut:OperatingSystem getCPUCycleCount.
- ] on:PrimitiveFailure do:[].
+ nextPut:ObjectMemory newSpaceUsed;
+ nextPut:OperatingSystem getCPUCycleCount.
"/ any other cheap sources of entropy?
- "/ I think there is no problem in that MD5 is not a secure hash algo here - the idea is to shuffle the bits around a bit
+ "/ I think there is no problem in that MD5 is not a secure hash algo here
+ "/ - the idea is to shuffle the bits around a bit
"/ (because the numbers above usually have many high bits in common)
"/ and then condense the bits into a smaller number.
"/ Any comment from a crypto guy here - I am willing to change this to some other hash, if that makes a problem