From 831cee8e1b868e0a3fca1bca0eceafb8e6d7c8f6 Mon Sep 17 00:00:00 2001 From: Loup Vaillant Date: Fri, 15 Dec 2017 10:56:05 +0100 Subject: [PATCH] Manual: applying CuleX's corrections --- doc/man/man3/crypto_lock_init.3monocypher | 2 +- doc/man/man3/crypto_x25519.3monocypher | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/doc/man/man3/crypto_lock_init.3monocypher b/doc/man/man3/crypto_lock_init.3monocypher index 8f3eb16..5e74aaf 100644 --- a/doc/man/man3/crypto_lock_init.3monocypher +++ b/doc/man/man3/crypto_lock_init.3monocypher @@ -246,7 +246,7 @@ Messages may be stored before they are verified, but they cannot be Processing untrusted messages increases the attack surface of the system. Doing so securely is hard. -Don't process messages before calling +Do not process messages before calling .Fn crypto_unlock_final . .Sh IMPLEMENTATION DETAILS The incremental interface is roughly three times slower than the direct diff --git a/doc/man/man3/crypto_x25519.3monocypher b/doc/man/man3/crypto_x25519.3monocypher index d05ee8f..ef9f9d6 100644 --- a/doc/man/man3/crypto_x25519.3monocypher +++ b/doc/man/man3/crypto_x25519.3monocypher @@ -56,7 +56,7 @@ uint8_t shared_keys[64]; /* Two shared session keys */ uint8_t *key_1 = shared_keys; /* Shared key 1 */ uint8_t *key_2 = shared_keys + 32; /* Shared key 2 */ crypto_blake2b(shared_keys, shared_secret, 32); -/* Wipe the secret / +/* Wipe the secret */ crypto_wipe(shared_secret, 32); .Ed .Sh SEE ALSO -- 2.47.3