From: Michael Savage Date: Tue, 21 Nov 2017 20:57:30 +0000 (+0200) Subject: tw=72 X-Git-Url: https://git.codecow.com/?a=commitdiff_plain;h=a212c05a07d383437bbb97e20f4af33e9acbfc06;p=Monocypher.git tw=72 --- diff --git a/doc/man/man3/crypto_lock.3monocypher b/doc/man/man3/crypto_lock.3monocypher index 452143a..db63368 100644 --- a/doc/man/man3/crypto_lock.3monocypher +++ b/doc/man/man3/crypto_lock.3monocypher @@ -149,13 +149,14 @@ and .It Fa ad_size length of the additional data. .Sy That length is not authenticated. -If the additional data is of variable length, the length should be appended to +If the additional data is of variable length, the length should be +appended to .Fa ad so it gets authenticated, and should be extracted from the end of the message when decrypting. Otherwise an attacker could provide a false length, effectively moving -the boundary between the additional data and the ciphertext. -This may cause buffer overflows in some programs. +the boundary between the additional data and the ciphertext. This may +cause buffer overflows in some programs. .El .Pp An incremental interface is available; see