From: Fabio Scotoni <34964387+fscoto@users.noreply.github.com> Date: Sat, 9 Jul 2022 09:06:35 +0000 (+0200) Subject: doc: crypto_sign: fat -> composite X-Git-Url: https://git.codecow.com/?a=commitdiff_plain;h=913445d85c2eea77f8fb5d986d73e2548d485a93;p=Monocypher.git doc: crypto_sign: fat -> composite It's a matter of taste ("fat pointer" is a term, too), but I feel like that's not a term fitting the rest of the manual style. --- diff --git a/doc/man/man3/crypto_sign.3monocypher b/doc/man/man3/crypto_sign.3monocypher index d677c89..8ca9b38 100644 --- a/doc/man/man3/crypto_sign.3monocypher +++ b/doc/man/man3/crypto_sign.3monocypher @@ -201,7 +201,7 @@ if (crypto_check(signature, pk, message, 10)) { .Pp To avoid recomputing the public key with each signature, store it next to the private key -.Pq Dq fat private key . +.Pq Dq composite private key . Make sure you treat that key pair as a single unit: .Bd -literal -offset indent uint8_t sk[64]; /* Fat secret key */ @@ -213,7 +213,7 @@ memcmp(pk, sk + 32); /* Copy public key */ crypto_wipe(sk, 64); .Ed .Pp -That way signing can use the fat private key alone: +That way signing can use the composite private key alone: .Bd -literal -offset indent uint8_t sk [64]; /* Fat secret key from above */ const uint8_t message [11] = "Lorem ipsu"; /* Message to sign */ @@ -266,11 +266,11 @@ This method is slower, but in practice is often fast enough. .Pp The fastest is to treat the private and public key as a single unit: -once generated, they must be stored together and treated as one fat -private key. +once generated, they must be stored together and treated +as one composite private key. When calling .Fn crypto_sign , -provide the public half of the fat private key. +provide the public half of the composite private key. The public half can be copied and and published separately, but the copy itself must never be used for signatures. .Ss Signature malleability