This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author Mark.Shannon
Recipients Arfrever, Huzaifa.Sidhpurwala, Mark.Shannon, PaulMcMillan, Zhiping.Deng, alex, barry, benjamin.peterson, christian.heimes, dmalcolm, eric.araujo, georg.brandl, gvanrossum, jcea, lemburg, pitrou, terry.reedy, vstinner
Date 2012-01-05.09:43:32
SpamBayes Score 0.003239198
Marked as misclassified No
Message-id <4F0570BF.2050701@hotpy.org>
In-reply-to <1325724837.8.0.410157062214.issue13703@psf.upfronthosting.co.za>
Content
What is the mechanism by which the attacker can determine the seeds?
The actual hash value is not directly observable externally.
The attacker can only determine the timing effects of multiple 
insertions into a dict, or have I missed something?

> - hash("") should always return 0

Why should hash("") always return 0?
I can't find it in the docs anywhere.
History
Date User Action Args
2012-01-05 09:43:33Mark.Shannonsetrecipients: + Mark.Shannon, lemburg, gvanrossum, barry, georg.brandl, terry.reedy, jcea, pitrou, vstinner, christian.heimes, benjamin.peterson, eric.araujo, Arfrever, alex, dmalcolm, Zhiping.Deng, Huzaifa.Sidhpurwala, PaulMcMillan
2012-01-05 09:43:32Mark.Shannonlinkissue13703 messages
2012-01-05 09:43:32Mark.Shannoncreate