From 9a5d01558e6518827eb6b8c1d608d5c85dbc7507 Mon Sep 17 00:00:00 2001 From: root Date: Tue, 3 Sep 2024 15:23:17 +0300 Subject: [PATCH] fixing comments --- examples/ecdh.c | 7 +++---- examples/ecdsa.c | 7 +++---- examples/ellswift.c | 6 +++--- examples/schnorr.c | 7 +++---- 4 files changed, 12 insertions(+), 15 deletions(-) diff --git a/examples/ecdh.c b/examples/ecdh.c index ac89be9a93..1cbc17b20b 100644 --- a/examples/ecdh.c +++ b/examples/ecdh.c @@ -42,10 +42,9 @@ int main(void) { assert(return_val); /*** Key Generation ***/ - - /* If the secret key is zero or out of range (bigger than secp256k1's - * order), we return 1. Note that the probability of this - * happening is negligible, though it could indicate a faulty RNG */ + /* If the secret key is zero or out of range (greater than secp256k1's + * order), we return 1. Note that the probability of this occurring + * is negligible with a properly functioning random number generator. */ if (!fill_random(seckey1, sizeof(seckey1)) || !fill_random(seckey2, sizeof(seckey2))) { printf("Failed to generate randomness\n"); return 1; diff --git a/examples/ecdsa.c b/examples/ecdsa.c index e6c25b10a3..433c58ffb8 100644 --- a/examples/ecdsa.c +++ b/examples/ecdsa.c @@ -49,10 +49,9 @@ int main(void) { assert(return_val); /*** Key Generation ***/ - - /* If the secret key is zero or out of range (bigger than secp256k1's - * order), we return 1. Note that the probability of this - * happening is negligible, though it could indicate a faulty RNG */ + /* If the secret key is zero or out of range (greater than secp256k1's + * order), we return 1. Note that the probability of this occurring + * is negligible with a properly functioning random number generator. */ if (!fill_random(seckey, sizeof(seckey))) { printf("Failed to generate randomness\n"); return 1; diff --git a/examples/ellswift.c b/examples/ellswift.c index 0728b9e261..54555e7c53 100644 --- a/examples/ellswift.c +++ b/examples/ellswift.c @@ -48,9 +48,9 @@ int main(void) { /*** Generate secret keys ***/ - /* If the secret key is zero or out of range (bigger than secp256k1's - * order), we return 1. Note that the probability of this - * happening is negligible, though it could indicate a faulty RNG */ +/* If the secret key is zero or out of range (greater than secp256k1's +* order), we return 1. Note that the probability of this occurring +* is negligible with a properly functioning random number generator. */ if (!fill_random(seckey1, sizeof(seckey1)) || !fill_random(seckey2, sizeof(seckey2))) { printf("Failed to generate randomness\n"); return 1; diff --git a/examples/schnorr.c b/examples/schnorr.c index a0438791dc..326e830169 100644 --- a/examples/schnorr.c +++ b/examples/schnorr.c @@ -43,10 +43,9 @@ int main(void) { assert(return_val); /*** Key Generation ***/ - - /* If the secret key is zero or out of range (bigger than secp256k1's - * order), we return 1. Note that the probability of this - * happening is negligible, though it could indicate a faulty RNG */ +/* If the secret key is zero or out of range (greater than secp256k1's + * order), we return 1. Note that the probability of this occurring + * is negligible with a properly functioning random number generator. */ if (!fill_random(seckey, sizeof(seckey))) { printf("Failed to generate randomness\n"); return 1;