-/****h* silccrypt/silcrng.h
- *
- * NAME
- *
- * silcSilcRng.h
- *
- * COPYRIGHT
- *
- * Author: Pekka Riikonen <priikone@poseidon.pspt.fi>
- *
- * Copyright (C) 1997 - 2001 Pekka Riikonen
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
+/*
+
+ silcrng.h
+
+ COPYRIGHT
+
+ Author: Pekka Riikonen <priikone@poseidon.pspt.fi>
+
+ Copyright (C) 1997 - 2001 Pekka Riikonen
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 2 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+*/
+
+/****h* silccrypt/SilcRNGAPI
*
* DESCRIPTION
*
* The RNG must also assure that any old or future random numbers are not
* compromised if an adversary would learn the initial input data (or any
* input data for that matter). The SILC's RNG provides good protection for
- * this even if the some of the output bits would be compromised in old or
+ * this even if the some of the input bits would be compromised for old or
* future random numbers. The RNG reinitalizes (reseeds) itself using the
* threshholds after every 64 and 160 bits of output. This is considered to be
* adequate even if some of the bits would get compromised. Also, the
* random data for future initializing. This is important and must be
* implemented in the future.
*
+ * The caller must be cautios when using this RNG with native WIN32 system.
+ * The RNG most likely is impossible to set in unguessable state just by
+ * using the RNG's input data sources. On WIN32 it is stronly suggested
+ * that caller would add more random noise after the initialization of the
+ * RNG using the silc_rng_add_noise function. For example, random mouse
+ * movements may be used.
+ *
***/
#ifndef SILCRNG_H