These create broken links when generating the manual page and there is
no way to selectively disable link generation in mandoc.
This change should not create much of an impact to readers on console,
who would enter a man command for the respective page regardless.
This also fixes a small usage error of the Xr macro in
crypto_aead_lock.3monocypher.
if the data you are transmitting is worth authenticating, it is probably
worth encrypting as well.
Do so if you can, using
-.Xr crypto_lock 3monocypher and
+.Xr crypto_lock 3monocypher
+and
.Xr crypto_unlock 3monocypher .
.Ef
.Pp
.Fa nb_blocks
blocks and suitably aligned for 64-bit integers.
A block is 1024 bytes in length.
-.Xr malloc 3
+.Fn malloc
should yield a suitable chunk of memory.
.It Fa nb_blocks
the number of blocks for the work area.
.Fn crypto_zerocmp .
If you are in doubt whether you need to use these functions, prefer
these over
-.Xr memcmp 3 .
+.Fn memcmp .
.Sh RETURN VALUES
The
.Fn crypto_memcmp
function returns 0 if all bytes of the memory chunk are zero, -1
otherwise.
.Sh SEE ALSO
-.Xr memcmp 3 ,
.Xr intro 3monocypher
They typically require an external random seed anyway.
.Pp
On Linux, you can use the
-.Xr getrandom 2
+.Fn getrandom
system call from
.In linux/random.h .
Do not set any flag.
.Pp
On BSD, you can use
-.Xr arc4random_buf 3
+.Fn arc4random_buf
from
.In stdlib.h
or
way.
.Pp
To disable swap on specific memory regions, UNIX systems provide the
-.Xr mlock 2
+.Fn mlock
system call.
Windows has
.Fn VirtualLock .
UNIX systems also provide the
-.Xr mlockall 2
+.Fn mlockall
system call, which locks
.Em all
memory used by a single process.