Remove existing bias towards characters earlier in the allowed alphabet. This is done by dynamically determining the maximum integral multiple value in a char, and excluding TRNG data that is outside the range.
Avoids calls to rand() because that is (normally) not cryptographically random.
Fixes #2
Tested and works.
Remove existing bias towards characters earlier in the allowed alphabet. This is done by dynamically determining the maximum integral multiple value in a
char
, and excluding TRNG data that is outside the range.Avoids calls to
rand()
because that is (normally) not cryptographically random.No new memory allocations are used.
Every call to
furi_hal_random_get()
takes a semaphore and re-initializes the TRNG hardware. This is inefficient and slower than usingfuri_hal_random_fill_buf()
.Iteratively call
furi_hal_random_fill_buf()
until the required password length is filled with valid (unbiased) characters.Overwrite password buffer when free'ing state. Again ... just good security hygiene.
CI enabled -- automatic build via official
ufbt
GitHub Action ... FAP is built by GitHub!