@@ -216,14 +216,14 @@ If defined, Then `SPRITZ_WIPE_TRACES` and `SPRITZ_TIMING_SAFE_CRUSH`, will be de
216
216
217
217
** SPRITZ_N** = ` 256 ` - Present the value of N in this spritz implementation, * Do NOT change ` SPRITZ_N ` value* .
218
218
219
- ** SPRITZ_LIBRARY_VERSION_STRING** = ` "1.0.4 " ` - Present the version of this
219
+ ** SPRITZ_LIBRARY_VERSION_STRING** = ` "1.0.5 " ` - Present the version of this
220
220
spritz library (MAJOR . MINOR . PATCH) using Semantic Versioning.
221
221
222
222
** SPRITZ_LIBRARY_VERSION_MAJOR** = ` 1 ` - The MAJOR version of the library.
223
223
224
224
** SPRITZ_LIBRARY_VERSION_MINOR** = ` 0 ` - The MINOR version of the library.
225
225
226
- ** SPRITZ_LIBRARY_VERSION_PATCH** = ` 4 ` - The PATCH version of the library.
226
+ ** SPRITZ_LIBRARY_VERSION_PATCH** = ` 5 ` - The PATCH version of the library.
227
227
228
228
229
229
## Examples
@@ -236,6 +236,10 @@ An embedded entropy/seed for the pseudo-random number generator is used.
236
236
Generate a strong Alphanumeric passwords, and then print it.
237
237
An embedded entropy/seed for the pseudo-random number generator is used.
238
238
239
+ * [ SpritzBestPracticePasswordESP8266] ( examples/SpritzBestPracticePassword/SpritzBestPracticePasswordESP8266.ino ) :
240
+ Generate a strong Alphanumeric passwords, and then print it.
241
+ This example is for ESP8266 SoC, it uses a hardware RNG in ESP8266 as an initialization entropy.
242
+
239
243
* [ SpritzCryptTest] ( examples/SpritzCryptTest/SpritzCryptTest.ino ) :
240
244
Test the library encryption/decryption function.
241
245
@@ -264,7 +268,7 @@ Compiling this library using *GCC* or *Clang* will give more security for functi
264
268
265
269
## Copyright and License
266
270
267
- > Copyright (c) 2015-2017 Abderraouf Adjal
271
+ > Copyright (c) 2015-2020 Abderraouf Adjal
268
272
269
273
- The source-code: The MIT License.
270
274
0 commit comments