From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=unavailable autolearn_force=no version=3.4.4 Path: border2.nntp.dca1.giganews.com!nntp.giganews.com!newspeer1.nac.net!feeder.erje.net!eu.feeder.erje.net!ecngs!feeder2.ecngs.de!217.188.199.168.MISMATCH!takemy.news.telefonica.de!telefonica.de!feed.news.schlund.de!schlund.de!news.online.de!not-for-mail From: Dirk Heinrichs Newsgroups: comp.lang.ada Subject: Re: Should Ada runtime provide special primitives for cryptography? Date: Wed, 01 Oct 2014 11:16:52 +0200 Organization: Privat Message-ID: References: NNTP-Posting-Host: p57a3d419.dip0.t-ipconnect.de Mime-Version: 1.0 Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: 7Bit X-Trace: online.de 1412155010 22029 87.163.212.25 (1 Oct 2014 09:16:50 GMT) X-Complaints-To: abuse@einsundeins.com NNTP-Posting-Date: Wed, 1 Oct 2014 09:16:50 +0000 (UTC) User-Agent: KNode/4.14.1 Xref: number.nntp.giganews.com comp.lang.ada:189268 Date: 2014-10-01T11:16:52+02:00 List-Id: Natasha Kerensikova wrote: > However, when actually implementing cryptographic stuff, cleverness from > compiler and optimizer are often enemies. For example, overwriting a > buffer with zeroes might be optimized out when the buffer is not > accessed again. I know this is OT, but shouldn't the buffer be filled with random data instead of zeros if it's used for storing encrypted data (to make it harder to determine the real length of the encrypted data in case it doesn't fill the buffer completely)? Bye... Dirk -- Dirk Heinrichs Tel: +49 (0)2471 209385 | Mobil: +49 (0)176 34473913 GPG Public Key CB614542 | Jabber: dirk.heinrichs@altum.de Tox: heini@toxme.se Sichere Internetkommunikation: http://www.retroshare.org Privacy Handbuch: https://www.privacy-handbuch.de