From: Loup Vaillant Date: Sat, 8 Feb 2020 16:04:15 +0000 (+0100) Subject: Minor man page nitipick X-Git-Url: https://git.codecow.com/?a=commitdiff_plain;h=581bb6282bf552a211a330dc72dd734e614dfefd;p=Monocypher.git Minor man page nitipick --- diff --git a/doc/man/man3/crypto_blake2b.3monocypher b/doc/man/man3/crypto_blake2b.3monocypher index c816b25..d6c9da7 100644 --- a/doc/man/man3/crypto_blake2b.3monocypher +++ b/doc/man/man3/crypto_blake2b.3monocypher @@ -104,8 +104,9 @@ BLAKE2b is a fast cryptographically secure hash, based on the ideas of Chacha20. It is faster than MD5, yet just as secure as SHA-3. -However, BLAKE2b itself -.Sy is not suitable for hashing passwords and deriving keys from them ; +.Pp +Note that BLAKE2b itself is not suitable for hashing passwords and +deriving keys from them; use the .Xr crypto_argon2i 3monocypher family of functions for that purpose instead. diff --git a/doc/man/man3/optional/crypto_sha512.3monocypher b/doc/man/man3/optional/crypto_sha512.3monocypher index 83bcea9..7684f59 100644 --- a/doc/man/man3/optional/crypto_sha512.3monocypher +++ b/doc/man/man3/optional/crypto_sha512.3monocypher @@ -88,8 +88,9 @@ It is generally recommended to use instead, as it both performs faster on x86_64 CPUs and lacks many of the pitfalls of SHA-512. -However, SHA-512 itself -.Sy is not suitable for hashing passwords and deriving keys from them ; +.Pp +Note that SHA-512 itself is not suitable for hashing passwords and +deriving keys from them; use the .Xr crypto_argon2i 3monocypher family of functions for that purpose instead.