From: Loup Vaillant Date: Tue, 31 Mar 2020 08:33:23 +0000 (+0200) Subject: Manual: nits & typos X-Git-Url: https://git.codecow.com/?a=commitdiff_plain;h=aa16e0545149c3dd79ba01d59cb63c65727db60d;p=Monocypher.git Manual: nits & typos --- diff --git a/doc/man/man3/crypto_curve_to_hidden.3monocypher b/doc/man/man3/crypto_curve_to_hidden.3monocypher index 9870cc8..b9810f7 100644 --- a/doc/man/man3/crypto_curve_to_hidden.3monocypher +++ b/doc/man/man3/crypto_curve_to_hidden.3monocypher @@ -150,7 +150,7 @@ It decodes a hidden point to a curve point on Curve25519. .Fn crypto_hidden_key_pair is a convenience function that generates a secret key and its corresponding public key, which is effectively indistinguishable from -random noise from a random seed. +random noise, from a random seed. .Em The execution time of this function is unpredictable because it may take many failures until a key pair could be generated successfully. @@ -273,10 +273,10 @@ rather than deterministically. Otherwise, the timing information given by the required number of retries also leaks information on the secret keys. .Pp -This function -.Em helps +These functions +.Em help build highly difficult-to-analyze protocols, -but it is insufficient by itself: +but are insufficient by themselves: Other metadata, such as the amount of bytes sent in a packet or the size of the 32-byte random-looking string that represents the curve point itself, can be very strong indicators of the use of cryptography. diff --git a/doc/man/man3/crypto_x25519_dirty_fast.3monocypher b/doc/man/man3/crypto_x25519_dirty_fast.3monocypher index 678d9ea..80fd8e0 100644 --- a/doc/man/man3/crypto_x25519_dirty_fast.3monocypher +++ b/doc/man/man3/crypto_x25519_dirty_fast.3monocypher @@ -88,7 +88,7 @@ from the given secret key the public keys are on the .Em whole curve, rather than just the main prime-order subgroup. -but do the same with different code size and memory characteristics: +Both do the same with different code size and memory characteristics: .Fn crypto_x25519_dirty_fast uses multiple large temporary variables and uses functions that are normally used internally for @@ -103,7 +103,7 @@ large performance penalty compared to .Pp The resulting public keys are to be used with .Xr crypto_x25519 3monocypher -and +or .Xr crypto_key_exchange 3monocypher , which clear the cofactor. .Sh RETURN VALUES