From e306892994a0f189089916d2ea66b3bdc0b2d777 Mon Sep 17 00:00:00 2001 From: Bodo Möller Date: Sat, 10 Feb 2001 00:34:02 +0000 Subject: Simplify BN_rand_range --- doc/crypto/BN_rand.pod | 5 ++--- doc/crypto/bn.pod | 2 +- 2 files changed, 3 insertions(+), 4 deletions(-) (limited to 'doc/crypto') diff --git a/doc/crypto/BN_rand.pod b/doc/crypto/BN_rand.pod index e4c94e3d12..2a8bed5fed 100644 --- a/doc/crypto/BN_rand.pod +++ b/doc/crypto/BN_rand.pod @@ -12,7 +12,7 @@ BN_rand, BN_pseudo_rand - generate pseudo-random number int BN_pseudo_rand(BIGNUM *rnd, int bits, int top, int bottom); - int BN_rand_range(BIGNUM *rnd, BIGNUM *min, BIGNUM *range); + int BN_rand_range(BIGNUM *rnd, BIGNUM *range); =head1 DESCRIPTION @@ -28,8 +28,7 @@ non-cryptographic purposes and for certain purposes in cryptographic protocols, but usually not for key generation etc. BN_rand_range() generates a cryptographically strong pseudo-random -number B in the range B E= B E B + B. -B may be NULL, in that case 0 E= B E B. +number B in the range 0 = B E B. The PRNG must be seeded prior to calling BN_rand() or BN_rand_range(). diff --git a/doc/crypto/bn.pod b/doc/crypto/bn.pod index 8558ccfcd5..f7ce9dfd43 100644 --- a/doc/crypto/bn.pod +++ b/doc/crypto/bn.pod @@ -68,7 +68,7 @@ bn - multiprecision integer arithmetics int BN_rand(BIGNUM *rnd, int bits, int top, int bottom); int BN_pseudo_rand(BIGNUM *rnd, int bits, int top, int bottom); - int BN_rand_range(BIGNUM *rnd, BIGNUM *min, BIGNUM *max); + int BN_rand_range(BIGNUM *rnd, BIGNUM *range); BIGNUM *BN_generate_prime(BIGNUM *ret, int bits,int safe, BIGNUM *add, BIGNUM *rem, void (*callback)(int, int, void *), void *cb_arg); -- cgit v1.2.3