diff options
Diffstat (limited to 'lib/crypto/doc')
-rw-r--r-- | lib/crypto/doc/src/crypto.xml | 40 |
1 files changed, 2 insertions, 38 deletions
diff --git a/lib/crypto/doc/src/crypto.xml b/lib/crypto/doc/src/crypto.xml index 7a5bd62c26..36a1a2c2ee 100644 --- a/lib/crypto/doc/src/crypto.xml +++ b/lib/crypto/doc/src/crypto.xml @@ -660,10 +660,8 @@ <p>Set the seed for PRNG to the given binary. This calls the RAND_seed function from openssl. Only use this if the system you are running on does not have enough "randomness" built in. - Normally this is when either - <seealso marker="#strong_rand_bytes/1">strong_rand_bytes/1</seealso>, - <seealso marker="#strong_rand_range/1">strong_rand_range/1</seealso> or - <seealso marker="#strong_rand_float/0">strong_rand_float/0</seealso> + Normally this is when + <seealso marker="#strong_rand_bytes/1">strong_rand_bytes/1</seealso> throws <c>low_entropy</c></p> </desc> </func> @@ -733,40 +731,6 @@ </func> <func> - <name>strong_rand_range(N) -> binary()</name> - <fsummary>Generate a random non-negative integer between 0 and N</fsummary> - <type> - <v>N = pos_integer() | binary()</v> - </type> - <desc> - <p>Generates a random non-negative integer uniformly distributed - in the value range <c><![CDATA[X, 0 =< X < N.]]></c> - Uses a cryptographically secure prng seeded and periodically mixed with operating system - provided entropy. By default this is the <c>BN_rand_range</c> method from OpenSSL.</p> - <p>Returns binary representation.</p> - <p>May throw exception <c>low_entropy</c> in case the random generator - failed due to lack of secure "randomness".</p> - </desc> - </func> - - <func> - <name>strong_rand_float() -> X</name> - <fsummary>Generate a random floating point number between 0.0 and 1.0</fsummary> - <type> - <v>X = float()</v> - </type> - <desc> - <p>Generates a random floating pointer number uniformly distributed - in the value range <c><![CDATA[X, 0.0 =< X < 1.0.]]></c> - Uses a cryptographically secure prng seeded and periodically mixed with operating system - provided entropy. By default this is the <c>BN_rand_range</c> method from OpenSSL.</p> - <p>May throw exception <c>low_entropy</c> in case the random generator - failed due to lack of secure "randomness".</p> - <note><p>The generated values shall present no more than 51 bits of effective entropy.</p></note> - </desc> - </func> - - <func> <name>rand_seed() -> rand:state()</name> <fsummary>Strong random number generation plugin state</fsummary>> <desc> |