From: Loup Vaillant Date: Sun, 24 Dec 2017 09:20:51 +0000 (+0100) Subject: Manual: xx byte => xx-byte X-Git-Url: https://git.codecow.com/?a=commitdiff_plain;h=fdcac16e3cb895d97d1e679a80b515310ec33381;p=Monocypher.git Manual: xx byte => xx-byte --- diff --git a/doc/man/man3/crypto_chacha20_encrypt.3monocypher b/doc/man/man3/crypto_chacha20_encrypt.3monocypher index e7d95f9..d8c2b67 100644 --- a/doc/man/man3/crypto_chacha20_encrypt.3monocypher +++ b/doc/man/man3/crypto_chacha20_encrypt.3monocypher @@ -53,12 +53,12 @@ The arguments are: .It Fa key A 32-byte secret key. .It Fa nonce -An 8 or 24 byte number, used only once with any given key. +An 8-byte or 24-byte number, used only once with any given key. It does not need to be secret or random, but it does have to be unique. Repeating a nonce with the same key reveals the XOR of two different messages, which allows decryption. -24 byte nonces can be selected at random. -8 byte nonces +24-byte nonces can be selected at random. +8-byte nonces .Em cannot . They are too small, and the same number may be selected twice by accident. @@ -104,7 +104,7 @@ disjoint. initialises the .Vt crypto_chacha_ctx context. -It uses an 8 byte nonce, too small to be selected at random. +It uses an 8-byte nonce, too small to be selected at random. Use a counter. .Pp .Fn crypto_chacha20_x_init diff --git a/doc/man/man3/crypto_key_exchange.3monocypher b/doc/man/man3/crypto_key_exchange.3monocypher index 9427fc6..18be412 100644 --- a/doc/man/man3/crypto_key_exchange.3monocypher +++ b/doc/man/man3/crypto_key_exchange.3monocypher @@ -34,7 +34,7 @@ It is cryptographically random, and suitable for use with the .Xr crypto_lock 3monocypher family of functions. .It Fa your_secret_key -A 32 byte random number, known only to you. +A 32-byte random number, known only to you. See .Xr intro 3monocypher for advice about generating random bytes (use the operating system's @@ -50,7 +50,7 @@ The public key, generated from a with .Fn crypto_x25519_public_key . .It Fa secret_key -A 32 byte random number, known only to you. +A 32-byte random number, known only to you. .El .Sh RETURN VALUES Some public keys force the shared key to a known constant. diff --git a/doc/man/man3/crypto_sign.3monocypher b/doc/man/man3/crypto_sign.3monocypher index 705b441..7591a4a 100644 --- a/doc/man/man3/crypto_sign.3monocypher +++ b/doc/man/man3/crypto_sign.3monocypher @@ -37,7 +37,7 @@ provide EdDSA public key signatures and verification. The arguments are: .Bl -tag -width Ds .It Fa secret_key -A 32 byte random number, known only to you. +A 32-byte random number, known only to you. See .Xr intro 3monocypher about random number generation (use your operating system's random diff --git a/doc/man/man3/crypto_x25519.3monocypher b/doc/man/man3/crypto_x25519.3monocypher index 7fb8ab8..0500c15 100644 --- a/doc/man/man3/crypto_x25519.3monocypher +++ b/doc/man/man3/crypto_x25519.3monocypher @@ -36,7 +36,7 @@ or .Xr crypto_blake2b 3monocypher first. .It Fa your_secret_key -A 32 byte secret random number. +A 32-byte secret random number. See .Xr intro 3monocypher for advice about generating random bytes (use the operating system's