@@ -139,13 +139,13 @@ void mbedtls_hmac_drbg_init( mbedtls_hmac_drbg_context *ctx );
139
139
* Note that SHA-256 is just as efficient as SHA-224.
140
140
* The security strength can be reduced if a smaller
141
141
* entropy length is set with
142
- * mbedtls_hmac_drbg_set_entropy_len().
142
+ * mbedtls_hmac_drbg_set_entropy_len() afterwards .
143
143
*
144
- * \note The default entropy length is the security strength
145
- * (converted from bits to bytes). You can override
146
- * it mbedtls_hmac_drbg_set_entropy_len().
147
- * \p f_entropy is always called with a length that is
148
- * less than or equal to the entropy length .
144
+ * \note The entropy length for the initial seeding is
145
+ * the security strength (converted from bits to bytes).
146
+ * You can set a different entropy length for subsequent
147
+ * seeding by calling mbedtls_hmac_drbg_set_entropy_len()
148
+ * after this function .
149
149
*
150
150
* \note During the initial seeding, this function calls
151
151
* the entropy source to obtain a nonce
@@ -156,6 +156,8 @@ void mbedtls_hmac_drbg_init( mbedtls_hmac_drbg_context *ctx );
156
156
* \param f_entropy The entropy callback, taking as arguments the
157
157
* \p p_entropy context, the buffer to fill, and the
158
158
* length of the buffer.
159
+ * \p f_entropy is always called with a length that is
160
+ * less than or equal to the entropy length.
159
161
* \param p_entropy The entropy context to pass to \p f_entropy.
160
162
* \param custom The personalization string.
161
163
* This can be \c NULL, in which case the personalization
@@ -222,13 +224,14 @@ void mbedtls_hmac_drbg_set_prediction_resistance( mbedtls_hmac_drbg_context *ctx
222
224
223
225
/**
224
226
* \brief This function sets the amount of entropy grabbed on each
225
- * seed or reseed.
227
+ * reseed.
226
228
*
227
- * During the initial seeding, mbedtls_hmac_drbg_seed() additionally grabs
228
- * half this amount to create the nonce.
229
+ * The default value is set by mbedtls_hmac_drbg_seed().
229
230
*
230
- * The default value is given by the security strength, which depends on the
231
- * hash used. See the documentation of mbedtls_hmac_drbg_seed() for details.
231
+ * \note mbedtls_hmac_drbg_seed() always sets the entropy length
232
+ * to the default value based on the chosen MD algorithm,
233
+ * so this function only has an effect if it is called
234
+ * after mbedtls_hmac_drbg_seed().
232
235
*
233
236
* \param ctx The HMAC_DRBG context.
234
237
* \param len The amount of entropy to grab, in bytes.
0 commit comments