mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-07-28 00:21:48 +03:00
Updated doxygen documentation in header files and HTML pages
This commit is contained in:
@ -5,18 +5,19 @@
|
||||
|
||||
/**
|
||||
* @addtogroup rng_module Random number generator (RNG) module
|
||||
*
|
||||
* The Random number generator (RNG) module provides random number
|
||||
* generation, see \c ctr_dbrg_random() or \c havege_random().
|
||||
*
|
||||
* The former uses the block-cipher counter-mode based deterministic random
|
||||
* The Random number generator (RNG) module provides random number
|
||||
* generation, see \c ctr_dbrg_random().
|
||||
*
|
||||
* The block-cipher counter-mode based deterministic random
|
||||
* bit generator (CTR_DBRG) as specified in NIST SP800-90. It needs an external
|
||||
* source of entropy. For these purposes \c entropy_func() can be used. This is
|
||||
* an implementation based on a simple entropy accumulator design.
|
||||
*
|
||||
* The latter random number generator uses the HAVEGE (HArdware Volatile
|
||||
* Entropy Gathering and Expansion) software heuristic which is claimed
|
||||
* to be an unpredictable or empirically strong* random number generation.
|
||||
* The other number generator that is included is less strong and uses the HAVEGE
|
||||
* (HArdware Volatile Entropy Gathering and Expansion) software heuristic
|
||||
* which considered unsafe for primary usage, but provides additional random
|
||||
* to the entropy pool if enables.
|
||||
*
|
||||
* \* Meaning that there seems to be no practical algorithm that can guess
|
||||
* the next bit with a probability larger than 1/2 in an output sequence.
|
||||
|
Reference in New Issue
Block a user