Re: [CRYPTO] obfuscating kernel pointers

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> > 
> adding a consistent random value to a your void * pointers sounds like a fine
> solution to the problem, then.  As long as you use the same random value for the
> lifetime of the system, that will give you consistent values.  And you have to
> use the same random input consistently to have consistent output on multiple
> concatinations of the same file anyway.  This also has the advantage of not
> having to do a crypto operation for every print/seq_sprintf/etc that contains a
> %p.
> 

The problem with that is the ease with which one could infer that random
value makes the whole thing pretty pointless.

-Dan

--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Kernel]     [Gnu Classpath]     [Gnu Crypto]     [DM Crypt]     [Netfilter]     [Bugtraq]

  Powered by Linux