diff options
author | schwarze <> | 2022-11-22 18:55:04 +0000 |
---|---|---|
committer | schwarze <> | 2022-11-22 18:55:04 +0000 |
commit | 5a9e2017d44311cc61942a4b59d39f5d6eb1f00c (patch) | |
tree | a521d678044c52b1efcfd92c026b33f03cc58a84 /src/lib/libcrypto/man/CRYPTO_get_mem_functions.3 | |
parent | 0284f8e696514160e33e4f03f00254ae815b0014 (diff) | |
download | openbsd-5a9e2017d44311cc61942a4b59d39f5d6eb1f00c.tar.gz openbsd-5a9e2017d44311cc61942a4b59d39f5d6eb1f00c.tar.bz2 openbsd-5a9e2017d44311cc61942a4b59d39f5d6eb1f00c.zip |
Better document BN_ULONG (in the DESCRIPTION near BN_num_bits_word(3))
and BN_BITS2 (below RETURN VALUES).
While here, perform major reordering and rewriting
for precision and readability, in particular:
- Avoid misleading wordings like "size of a BIGNUM".
- Drop the trivial example.
- Move the pointers to RSA_size(3) and friends to CAVEATS.
- Stop recommending 8*BN_num_bytes() in this context because it is wrong, too.
Diffstat (limited to 'src/lib/libcrypto/man/CRYPTO_get_mem_functions.3')
0 files changed, 0 insertions, 0 deletions