Skip to content

Commit

Permalink
Merge pull request #131 from fscoto/master+remove-kex-doc
Browse files Browse the repository at this point in the history
Remove remaining pieces of kex documentation
  • Loading branch information
LoupVaillant authored Oct 21, 2019
2 parents 87c3dd9 + 6f84b11 commit 76a9194
Show file tree
Hide file tree
Showing 2 changed files with 1 addition and 10 deletions.
3 changes: 1 addition & 2 deletions AUTHORS.md
Original file line number Diff line number Diff line change
Expand Up @@ -35,8 +35,7 @@ Loup Vaillant, Fabio Scotoni, and Michael Savage.

- Loup Vaillant did a first draft.
- Fabio Scotoni rewrote the manual into proper man pages (and
substantially changed it in the process), and wrote the
`crypto_kex*()` pages from scratch.
substantially changed it in the process).
- Michael Savage did extensive editing and proofreading.

Thanks
Expand Down
8 changes: 0 additions & 8 deletions doc/man/man3/intro.3monocypher
Original file line number Diff line number Diff line change
Expand Up @@ -78,8 +78,6 @@ the chances of leaks.
.Xr crypto_check_final 3monocypher ,
.Xr crypto_check_init 3monocypher ,
.Xr crypto_check_update 3monocypher ,
.Xr crypto_kex_xk1_init_client 3monocypher ,
.Xr crypto_kex_x_init_client 3monocypher ,
.Xr crypto_key_exchange 3monocypher ,
.Xr crypto_lock 3monocypher ,
.Xr crypto_lock_aead 3monocypher ,
Expand Down Expand Up @@ -200,12 +198,6 @@ To mitigate this problem, some protocols guarantee that past messages
are not compromised even if the long term keys are.
This is done by generating temporary keys, then encrypting messages
using them.
Monocypher provides the
.Xr crypto_kex_xk1_init_client 3monocypher
and
.Xr crypto_kex_x_init_client 3monocypher
families of functions,
which provide forward secrecy.
.Pp
In general, secrets that went through a computer should not be
compromised when this computer is stolen or infected at a later point.
Expand Down

0 comments on commit 76a9194

Please sign in to comment.