in which case it will be interpreted as an all zero input.
The cipher_text will then contain the raw Chacha20 stream.
.It Fa cipher_text
-The encrypted message, to be transmitted over the network.
+The encrypted message.
.It Fa text_size
The size of both
.Fa plain_text and
.Fc
.Sh DESCRIPTION
.Fn crypto_key_exchange
-computes a shared key with your secret key and their public key,
+computes a shared key with your secret key and their public key.
.Pp
.Fn crypto_x25519_public_key
deterministically computes the public key from a random secret key.
Do not use the same private key for both key exchanges and signatures.
The public keys are different, and revealing both may leak information.
.It Fa their_public_key
-The public key of the other party, generated from their secret key with
-.Fn crypto_x25519_public_key .
+The public key of the other party.
.It Fa public_key
-The public key, generated from a
+The public key, generated from the
.Fa secret_key
with
.Fn crypto_x25519_public_key .
Do not use the same private key for both signatures and key exchanges.
The public keys are different, and revealing both may leak information.
.It Fa public_key
-The public key, generated from a
+The public key, generated from the
.Fa secret_key
with
.Fn crypto_sign_public_key .
for advice about generating random bytes (use the operating system's
random number generator).
.It Fa their_public_key
-The public key of the other party, generated from their secret key with
-.Xr crypto_x25519_public_key 3monocypher .
+The public key of the other party.
.El
.Sh RETURN VALUES
Some public keys force the shared key to a known constant.