From: Fabio Scotoni <34964387+fscoto@users.noreply.github.com> Date: Tue, 24 Mar 2020 19:41:45 +0000 (+0100) Subject: doc: s/dangerous/fast/g X-Git-Url: https://git.codecow.com/?a=commitdiff_plain;h=1fc3c8ca8d4fa986be245b1d98f6e4774aae4e62;p=Monocypher.git doc: s/dangerous/fast/g Matching 491a026. --- diff --git a/doc/man/man3/crypto_x25519_dangerous_fast.3monocypher b/doc/man/man3/crypto_x25519_dirty_fast.3monocypher similarity index 94% rename from doc/man/man3/crypto_x25519_dangerous_fast.3monocypher rename to doc/man/man3/crypto_x25519_dirty_fast.3monocypher index 14409d8..63df34f 100644 --- a/doc/man/man3/crypto_x25519_dangerous_fast.3monocypher +++ b/doc/man/man3/crypto_x25519_dirty_fast.3monocypher @@ -49,11 +49,11 @@ .\" .\" .Dd March 24, 2020 -.Dt CRYPTO_X25519_DANGEROUS_FAST 3monocypher +.Dt CRYPTO_X25519_DIRTY_FAST 3monocypher .Os .Sh NAME -.Nm crypto_x25519_dangerous_fast , -.Nm crypto_x25519_dangerous_small +.Nm crypto_x25519_dirty_fast , +.Nm crypto_x25519_dirty_small .Nd generation of Curve25519 points with a low-order component .Sh SYNOPSIS .In monocypher.h @@ -89,17 +89,17 @@ the public keys are on the .Em whole curve, rather than just the main prime-order subgroup. but do the same with different code size and memory characteristics: -.Fn crypto_x25519_dangerous_fast +.Fn crypto_x25519_dirty_fast uses multiple large temporary variables and uses functions that are normally used internally for .Xr crypto_sign 3monocypher ; accordingly, it uses both more memory (for the temporary variables) and more code size (unless the signing code is already compiled in elsewhere). -.Fn crypto_x25519_dangerous_small +.Fn crypto_x25519_dirty_small yields the same result, but does so using less code and memory at a large performance penalty compared to -.Fn crypto_x25519_dangerous_fast . +.Fn crypto_x25519_dirty_fast . .Pp The resulting public keys are to be used with .Xr crypto_x25519 3monocypher @@ -116,9 +116,9 @@ They cannot fail. .Xr intro 3monocypher .Sh HISTORY The -.Fn crypto_x25519_dangerous_fast +.Fn crypto_x25519_dirty_fast and -.Fn crypto_x25519_dangerous_small +.Fn crypto_x25519_dirty_small functions first appeared in Monocypher 3.1.0. .Sh IMPLEMENTATION DETAILS The slow variant is approximately an entire two times slower than the diff --git a/doc/man/man3/crypto_x25519_dangerous_small.3monocypher b/doc/man/man3/crypto_x25519_dirty_small.3monocypher similarity index 100% rename from doc/man/man3/crypto_x25519_dangerous_small.3monocypher rename to doc/man/man3/crypto_x25519_dirty_small.3monocypher