X-Git-Url: https://codewiz.org/gitweb?a=blobdiff_plain;f=bertos%2Fsec%2Frandom.h;h=3ccc17b722a89605cf2f9d5f59ee985a50148766;hb=refs%2Fheads%2Fmaster;hp=d0dc31462c4846487ad5d4d27dba185202d65378;hpb=955a6b6d683b2958afaab6f3b2afacc188656681;p=bertos.git diff --git a/bertos/sec/random.h b/bertos/sec/random.h index d0dc3146..3ccc17b7 100644 --- a/bertos/sec/random.h +++ b/bertos/sec/random.h @@ -33,18 +33,22 @@ * \brief High-level random number generation functions. * \author Giovanni Bajo * + * $WIZ$ module_name = "random" + * $WIZ$ module_configuration = "bertos/cfg/cfg_random.h" + * $WIZ$ module_depends = "isaac", "cipher", "sha1", "yarrow", "yarrow_pool", "x917", "aes" + * $WIZ$ module_supports = "stm32 or lm3s" */ #ifndef SEC_RANDOM_H #define SEC_RANDOM_H +#include "cfg/cfg_random.h" #include -#define RANDOM_SECURITY_MINIMUM 0 -#define RANDOM_SECURITY_MEDIUM 1 -#define RANDOM_SECURITY_STRONG 2 - /** + * \name Security level definition + * + * * Configure the security level required by the application. * * Application developers are suggested to keep the strongest @@ -60,7 +64,7 @@ * with enough entropy to generate safe random numbers even * immediately after hw reset. * The overall structure is the same as used by modern - * desktop PCs for generating secure random numbers. + * desktop PCs for generating secure random numbers. * * * \a RANDOM_SECURITY_MEDIUM: This intermediate settings will * avoid usage of an entropy pool, to reduce memory and code @@ -74,9 +78,14 @@ * random numbers. Even if the generator is still secure on * paper, its seeding will not be safe (though still entropic * to allow different sequences to be generated after each reset). + * + * $WIZ$ random_level = "RANDOM_SECURITY_MINIMUM", "RANDOM_SECURITY_MEDIUM", "RANDOM_SECURITY_STRONG" + * \{ */ -#define RANDOM_SECURITY_LEVEL RANDOM_SECURITY_MEDIUM // FIXME: RANDOM_SECURITY_STRONG - +#define RANDOM_SECURITY_MINIMUM 0 +#define RANDOM_SECURITY_MEDIUM 1 +#define RANDOM_SECURITY_STRONG 2 +/** \} */ void random_init(void);