From 6f84b116979ccbc2d6787e5523e9cff1832eb679 Mon Sep 17 00:00:00 2001 From: Fabio Scotoni <34964387+fscoto@users.noreply.github.com> Date: Mon, 21 Oct 2019 19:49:38 +0200 Subject: [PATCH] Remove remaining pieces of kex documentation Related to git commits 6163d8195a3acf2e143d20843a602fd5fb7671d5 and 56b81ae4ec987ba39a2f0ec8b434a4f8efddfef9. --- AUTHORS.md | 3 +-- doc/man/man3/intro.3monocypher | 8 -------- 2 files changed, 1 insertion(+), 10 deletions(-) diff --git a/AUTHORS.md b/AUTHORS.md index e186776f..96b4dea2 100644 --- a/AUTHORS.md +++ b/AUTHORS.md @@ -35,8 +35,7 @@ Loup Vaillant, Fabio Scotoni, and Michael Savage. - Loup Vaillant did a first draft. - Fabio Scotoni rewrote the manual into proper man pages (and - substantially changed it in the process), and wrote the - `crypto_kex*()` pages from scratch. + substantially changed it in the process). - Michael Savage did extensive editing and proofreading. Thanks diff --git a/doc/man/man3/intro.3monocypher b/doc/man/man3/intro.3monocypher index 6237a314..24aef40a 100644 --- a/doc/man/man3/intro.3monocypher +++ b/doc/man/man3/intro.3monocypher @@ -78,8 +78,6 @@ the chances of leaks. .Xr crypto_check_final 3monocypher , .Xr crypto_check_init 3monocypher , .Xr crypto_check_update 3monocypher , -.Xr crypto_kex_xk1_init_client 3monocypher , -.Xr crypto_kex_x_init_client 3monocypher , .Xr crypto_key_exchange 3monocypher , .Xr crypto_lock 3monocypher , .Xr crypto_lock_aead 3monocypher , @@ -200,12 +198,6 @@ To mitigate this problem, some protocols guarantee that past messages are not compromised even if the long term keys are. This is done by generating temporary keys, then encrypting messages using them. -Monocypher provides the -.Xr crypto_kex_xk1_init_client 3monocypher -and -.Xr crypto_kex_x_init_client 3monocypher -families of functions, -which provide forward secrecy. .Pp In general, secrets that went through a computer should not be compromised when this computer is stolen or infected at a later point.