blob: bd99a1a3630e269b3328ace85be22ebbe6a19c78 [file] [log] [blame]
Paul Bakker37ca75d2011-01-06 12:28:03 +00001/**
2 * @file
3 * Random number generator (RNG) module documentation file.
Manuel Pégourié-Gonnard8119dad2015-08-06 10:59:26 +02004 *
5 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02006 * SPDX-License-Identifier: Apache-2.0
7 *
8 * Licensed under the Apache License, Version 2.0 (the "License"); you may
9 * not use this file except in compliance with the License.
10 * You may obtain a copy of the License at
11 *
12 * http://www.apache.org/licenses/LICENSE-2.0
13 *
14 * Unless required by applicable law or agreed to in writing, software
15 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 * See the License for the specific language governing permissions and
18 * limitations under the License.
Manuel Pégourié-Gonnard8119dad2015-08-06 10:59:26 +020019 *
20 * This file is part of mbed TLS (https://tls.mbed.org)
Paul Bakker37ca75d2011-01-06 12:28:03 +000021 */
22
23/**
24 * @addtogroup rng_module Random number generator (RNG) module
Paul Bakker6083fd22011-12-03 21:45:14 +000025 *
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020026 * The Random number generator (RNG) module provides random number
27 * generation, see \c ctr_dbrg_random().
28 *
29 * The block-cipher counter-mode based deterministic random
Paul Bakker6083fd22011-12-03 21:45:14 +000030 * bit generator (CTR_DBRG) as specified in NIST SP800-90. It needs an external
Manuel Pégourié-Gonnard151dc772015-05-14 13:55:51 +020031 * source of entropy. For these purposes \c mbedtls_entropy_func() can be used. This is
Paul Bakker6083fd22011-12-03 21:45:14 +000032 * an implementation based on a simple entropy accumulator design.
33 *
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020034 * The other number generator that is included is less strong and uses the HAVEGE
35 * (HArdware Volatile Entropy Gathering and Expansion) software heuristic
36 * which considered unsafe for primary usage, but provides additional random
37 * to the entropy pool if enables.
Paul Bakker37ca75d2011-01-06 12:28:03 +000038 *
39 * \* Meaning that there seems to be no practical algorithm that can guess
40 * the next bit with a probability larger than 1/2 in an output sequence.
41 *
42 * This module can be used to generate random numbers.
43 */