aboutsummaryrefslogtreecommitdiffstats
path: root/src/lib/rng
diff options
context:
space:
mode:
authorJack Lloyd <[email protected]>2019-01-13 13:11:11 -0500
committerJack Lloyd <[email protected]>2019-01-13 13:11:11 -0500
commit9e4ee7dbeb6e83c470bfa99196e1492fdeaa4d83 (patch)
treec1dd9e7167ea59aff1e5bea6d0c4c303b6b9c820 /src/lib/rng
parentf4246cd7cc1a9f4c4f5ff0cd891c85f5a0784603 (diff)
Remove trailing whitespace
Diffstat (limited to 'src/lib/rng')
-rw-r--r--src/lib/rng/hmac_drbg/hmac_drbg.h42
1 files changed, 21 insertions, 21 deletions
diff --git a/src/lib/rng/hmac_drbg/hmac_drbg.h b/src/lib/rng/hmac_drbg/hmac_drbg.h
index edf38b684..6ead498fc 100644
--- a/src/lib/rng/hmac_drbg/hmac_drbg.h
+++ b/src/lib/rng/hmac_drbg/hmac_drbg.h
@@ -44,16 +44,16 @@ class BOTAN_PUBLIC_API(2,0) HMAC_DRBG final : public Stateful_RNG
* to perform the periodic reseeding
* @param reseed_interval specifies a limit of how many times
* the RNG will be called before automatic reseeding is performed
- * @param max_number_of_bytes_per_request requests that are in size higher
- * than max_number_of_bytes_per_request are treated as if multiple single
+ * @param max_number_of_bytes_per_request requests that are in size higher
+ * than max_number_of_bytes_per_request are treated as if multiple single
* requests of max_number_of_bytes_per_request size had been made.
* In theory SP 800-90A requires that we reject any request for a DRBG
* output longer than max_number_of_bytes_per_request. To avoid inconveniencing
- * the caller who wants an output larger than max_number_of_bytes_per_request,
- * instead treat these requests as if multiple requests of
- * max_number_of_bytes_per_request size had been made. NIST requires for
- * HMAC_DRBG that every implementation set a value no more than 2**19 bits
- * (or 64 KiB). Together with @p reseed_interval = 1 you can enforce that for
+ * the caller who wants an output larger than max_number_of_bytes_per_request,
+ * instead treat these requests as if multiple requests of
+ * max_number_of_bytes_per_request size had been made. NIST requires for
+ * HMAC_DRBG that every implementation set a value no more than 2**19 bits
+ * (or 64 KiB). Together with @p reseed_interval = 1 you can enforce that for
* example every 512 bit automatic reseeding occurs.
*/
HMAC_DRBG(std::unique_ptr<MessageAuthenticationCode> prf,
@@ -71,16 +71,16 @@ class BOTAN_PUBLIC_API(2,0) HMAC_DRBG final : public Stateful_RNG
* @param entropy_sources will be polled to perform reseeding periodically
* @param reseed_interval specifies a limit of how many times
* the RNG will be called before automatic reseeding is performed.
- * @param max_number_of_bytes_per_request requests that are in size higher
- * than max_number_of_bytes_per_request are treated as if multiple single
+ * @param max_number_of_bytes_per_request requests that are in size higher
+ * than max_number_of_bytes_per_request are treated as if multiple single
* requests of max_number_of_bytes_per_request size had been made.
* In theory SP 800-90A requires that we reject any request for a DRBG
* output longer than max_number_of_bytes_per_request. To avoid inconveniencing
- * the caller who wants an output larger than max_number_of_bytes_per_request,
- * instead treat these requests as if multiple requests of
- * max_number_of_bytes_per_request size had been made. NIST requires for
- * HMAC_DRBG that every implementation set a value no more than 2**19 bits
- * (or 64 KiB). Together with @p reseed_interval = 1 you can enforce that for
+ * the caller who wants an output larger than max_number_of_bytes_per_request,
+ * instead treat these requests as if multiple requests of
+ * max_number_of_bytes_per_request size had been made. NIST requires for
+ * HMAC_DRBG that every implementation set a value no more than 2**19 bits
+ * (or 64 KiB). Together with @p reseed_interval = 1 you can enforce that for
* example every 512 bit automatic reseeding occurs.
*/
HMAC_DRBG(std::unique_ptr<MessageAuthenticationCode> prf,
@@ -101,16 +101,16 @@ class BOTAN_PUBLIC_API(2,0) HMAC_DRBG final : public Stateful_RNG
* @param entropy_sources will be polled to perform reseeding periodically
* @param reseed_interval specifies a limit of how many times
* the RNG will be called before automatic reseeding is performed.
- * @param max_number_of_bytes_per_request requests that are in size higher
- * than max_number_of_bytes_per_request are treated as if multiple single
+ * @param max_number_of_bytes_per_request requests that are in size higher
+ * than max_number_of_bytes_per_request are treated as if multiple single
* requests of max_number_of_bytes_per_request size had been made.
* In theory SP 800-90A requires that we reject any request for a DRBG
* output longer than max_number_of_bytes_per_request. To avoid inconveniencing
- * the caller who wants an output larger than max_number_of_bytes_per_request,
- * instead treat these requests as if multiple requests of
- * max_number_of_bytes_per_request size had been made. NIST requires for
- * HMAC_DRBG that every implementation set a value no more than 2**19 bits
- * (or 64 KiB). Together with @p reseed_interval = 1 you can enforce that for
+ * the caller who wants an output larger than max_number_of_bytes_per_request,
+ * instead treat these requests as if multiple requests of
+ * max_number_of_bytes_per_request size had been made. NIST requires for
+ * HMAC_DRBG that every implementation set a value no more than 2**19 bits
+ * (or 64 KiB). Together with @p reseed_interval = 1 you can enforce that for
* example every 512 bit automatic reseeding occurs.
*/
HMAC_DRBG(std::unique_ptr<MessageAuthenticationCode> prf,