mirror of
https://github.com/uqbar-dao/nectar.git
synced 2024-12-20 15:11:45 +03:00
27 lines
1.2 KiB
Plaintext
27 lines
1.2 KiB
Plaintext
// https://github.com/bytecodealliance/wasmtime/blob/432b5471ec4bf6d51173def284cd418be6849a49/crates/wasi/wit/deps/random/insecure-seed.wit
|
|
|
|
/// The insecure-seed interface for seeding hash-map DoS resistance.
|
|
///
|
|
/// It is intended to be portable at least between Unix-family platforms and
|
|
/// Windows.
|
|
interface insecure-seed {
|
|
/// Return a 128-bit value that may contain a pseudo-random value.
|
|
///
|
|
/// The returned value is not required to be computed from a CSPRNG, and may
|
|
/// even be entirely deterministic. Host implementations are encouraged to
|
|
/// provide pseudo-random values to any program exposed to
|
|
/// attacker-controlled content, to enable DoS protection built into many
|
|
/// languages' hash-map implementations.
|
|
///
|
|
/// This function is intended to only be called once, by a source language
|
|
/// to initialize Denial Of Service (DoS) protection in its hash-map
|
|
/// implementation.
|
|
///
|
|
/// # Expected future evolution
|
|
///
|
|
/// This will likely be changed to a value import, to prevent it from being
|
|
/// called multiple times and potentially used for purposes other than DoS
|
|
/// protection.
|
|
insecure-seed: func() -> tuple<u64, u64>
|
|
}
|