From aa16e0545149c3dd79ba01d59cb63c65727db60d Mon Sep 17 00:00:00 2001 From: Loup Vaillant Date: Tue, 31 Mar 2020 10:33:23 +0200 Subject: [PATCH] Manual: nits & typos --- doc/man/man3/crypto_curve_to_hidden.3monocypher | 8 ++++---- doc/man/man3/crypto_x25519_dirty_fast.3monocypher | 4 ++-- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/doc/man/man3/crypto_curve_to_hidden.3monocypher b/doc/man/man3/crypto_curve_to_hidden.3monocypher index 9870cc8..b9810f7 100644 --- a/doc/man/man3/crypto_curve_to_hidden.3monocypher +++ b/doc/man/man3/crypto_curve_to_hidden.3monocypher @@ -150,7 +150,7 @@ It decodes a hidden point to a curve point on Curve25519. .Fn crypto_hidden_key_pair is a convenience function that generates a secret key and its corresponding public key, which is effectively indistinguishable from -random noise from a random seed. +random noise, from a random seed. .Em The execution time of this function is unpredictable because it may take many failures until a key pair could be generated successfully. @@ -273,10 +273,10 @@ rather than deterministically. Otherwise, the timing information given by the required number of retries also leaks information on the secret keys. .Pp -This function -.Em helps +These functions +.Em help build highly difficult-to-analyze protocols, -but it is insufficient by itself: +but are insufficient by themselves: Other metadata, such as the amount of bytes sent in a packet or the size of the 32-byte random-looking string that represents the curve point itself, can be very strong indicators of the use of cryptography. diff --git a/doc/man/man3/crypto_x25519_dirty_fast.3monocypher b/doc/man/man3/crypto_x25519_dirty_fast.3monocypher index 678d9ea..80fd8e0 100644 --- a/doc/man/man3/crypto_x25519_dirty_fast.3monocypher +++ b/doc/man/man3/crypto_x25519_dirty_fast.3monocypher @@ -88,7 +88,7 @@ from the given secret key the public keys are on the .Em whole curve, rather than just the main prime-order subgroup. -but do the same with different code size and memory characteristics: +Both do the same with different code size and memory characteristics: .Fn crypto_x25519_dirty_fast uses multiple large temporary variables and uses functions that are normally used internally for @@ -103,7 +103,7 @@ large performance penalty compared to .Pp The resulting public keys are to be used with .Xr crypto_x25519 3monocypher -and +or .Xr crypto_key_exchange 3monocypher , which clear the cofactor. .Sh RETURN VALUES -- 2.47.3