From: asterix Date: Fri, 15 Oct 2010 13:30:38 +0000 (+0000) Subject: Reformat. X-Git-Tag: 2.6.0~5^2~91 X-Git-Url: https://codewiz.org/gitweb?a=commitdiff_plain;h=456922ffd80d6dc65b7810f9fca98e56bc8f7d05;p=bertos.git Reformat. git-svn-id: https://src.develer.com/svnoss/bertos/trunk@4429 38d2e660-2303-0410-9eaa-f027e97ec537 --- diff --git a/bertos/sec/random.h b/bertos/sec/random.h index 6822b950..04f570bb 100644 --- a/bertos/sec/random.h +++ b/bertos/sec/random.h @@ -60,7 +60,7 @@ * with enough entropy to generate safe random numbers even * immediately after hw reset. * The overall structure is the same as used by modern - * desktop PCs for generating secure random numbers. + * desktop PCs for generating secure random numbers. * * * \a RANDOM_SECURITY_MEDIUM: This intermediate settings will * avoid usage of an entropy pool, to reduce memory and code diff --git a/bertos/sec/random_lm3s.c b/bertos/sec/random_lm3s.c index b5945f46..71ce64d5 100644 --- a/bertos/sec/random_lm3s.c +++ b/bertos/sec/random_lm3s.c @@ -32,13 +32,15 @@ * * \brief LM3 backend implementation entropy pulling. * \author Giovanni Bajo - * */ #include "random_p.h" + #include + #include -#include + +#include /* * Return the cpu core temperature in raw format @@ -78,14 +80,14 @@ void random_pull_entropy(uint8_t *entropy, size_t len) // to consider it "entropic". It does not really matter because it will // go through a randomness extractor anyway. hw_initIntTemp(); - + for (size_t j=0; j