From: Fabio Scotoni <34964387+fscoto@users.noreply.github.com> Date: Thu, 6 Feb 2020 13:08:29 +0000 (+0100) Subject: pw hashing: clarify that hash functions can hash X-Git-Url: https://git.codecow.com/?a=commitdiff_plain;h=4dc28766e52dbc6a18b4b5422cc4d2dc438a7a6b;p=Monocypher.git pw hashing: clarify that hash functions can hash Misleading wording spotted by @aggsol as part of review of #155. --- diff --git a/doc/man/man3/crypto_blake2b.3monocypher b/doc/man/man3/crypto_blake2b.3monocypher index 957692f..c816b25 100644 --- a/doc/man/man3/crypto_blake2b.3monocypher +++ b/doc/man/man3/crypto_blake2b.3monocypher @@ -105,7 +105,7 @@ BLAKE2b is a fast cryptographically secure hash, based on the ideas of Chacha20. It is faster than MD5, yet just as secure as SHA-3. However, BLAKE2b itself -.Sy is not suitable for hashing and deriving keys from passwords ; +.Sy is not suitable for hashing passwords and deriving keys from them ; use the .Xr crypto_argon2i 3monocypher family of functions for that purpose instead. diff --git a/doc/man/man3/optional/crypto_sha512.3monocypher b/doc/man/man3/optional/crypto_sha512.3monocypher index 0235774..83bcea9 100644 --- a/doc/man/man3/optional/crypto_sha512.3monocypher +++ b/doc/man/man3/optional/crypto_sha512.3monocypher @@ -89,7 +89,7 @@ instead, as it both performs faster on x86_64 CPUs and lacks many of the pitfalls of SHA-512. However, SHA-512 itself -.Sy is not suitable for hashing and deriving keys from passwords ; +.Sy is not suitable for hashing passwords and deriving keys from them ; use the .Xr crypto_argon2i 3monocypher family of functions for that purpose instead.