fixup! CTR_DRBG: support set_entropy_len() before seed()

Remove a comment that documented a now-removed restriction.
This commit is contained in:
Gilles Peskine 2019-10-22 17:05:10 +02:00
parent 379561feff
commit 460988a472

View File

@ -301,11 +301,6 @@ void mbedtls_ctr_drbg_set_prediction_resistance( mbedtls_ctr_drbg_context *ctx,
* *
* The default value is #MBEDTLS_CTR_DRBG_ENTROPY_LEN. * The default value is #MBEDTLS_CTR_DRBG_ENTROPY_LEN.
* *
* \note mbedtls_ctr_drbg_seed() always sets the entropy length
* to #MBEDTLS_CTR_DRBG_ENTROPY_LEN, so this function
* only has an effect when it is called after
* mbedtls_ctr_drbg_seed().
*
* \note The security strength of CTR_DRBG is bounded by the * \note The security strength of CTR_DRBG is bounded by the
* entropy length. Thus: * entropy length. Thus:
* - When using AES-256 * - When using AES-256