Skip to content

Commit 460988a

Browse files
fixup! CTR_DRBG: support set_entropy_len() before seed()
Remove a comment that documented a now-removed restriction.
1 parent 379561f commit 460988a

File tree

1 file changed

+0
-5
lines changed

1 file changed

+0
-5
lines changed

include/mbedtls/ctr_drbg.h

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -301,11 +301,6 @@ void mbedtls_ctr_drbg_set_prediction_resistance( mbedtls_ctr_drbg_context *ctx,
301301
*
302302
* The default value is #MBEDTLS_CTR_DRBG_ENTROPY_LEN.
303303
*
304-
* \note mbedtls_ctr_drbg_seed() always sets the entropy length
305-
* to #MBEDTLS_CTR_DRBG_ENTROPY_LEN, so this function
306-
* only has an effect when it is called after
307-
* mbedtls_ctr_drbg_seed().
308-
*
309304
* \note The security strength of CTR_DRBG is bounded by the
310305
* entropy length. Thus:
311306
* - When using AES-256

0 commit comments

Comments
 (0)