hare

[hare] The Hare programming language
git clone https://git.torresjrjr.com/hare.git
Log | Files | Refs | README | LICENSE

commit 565f588552002b4c121c3921b557b9cb17e48ada
parent 7f432b06a0a1b2f92baf50b689533209251e1c58
Author: Sebastian <sebastian@sebsite.pw>
Date:   Sun, 27 Aug 2023 03:07:56 -0400

crypto: s/SIZE/SZ/g in READMEs

Signed-off-by: Sebastian <sebastian@sebsite.pw>

Diffstat:
Mcrypto/aes/README | 4++--
Mcrypto/blowfish/README | 2+-
Mcrypto/chacha/README | 13++++++-------
Mcrypto/rsa/README | 4++--
Mcrypto/salsa/README | 6+++---
5 files changed, 14 insertions(+), 15 deletions(-)

diff --git a/crypto/aes/README b/crypto/aes/README @@ -4,8 +4,8 @@ AES are provided which are optimized for different scenarios. To choose the most appropriate one for your system, use [[aes]]. When combined with a block cipher mode from [[crypto::cipher]], suitable buffer -lengths for static allocation are provided as constants such as [[BLOCKSIZE]], -[[CTR_BUFSIZE]], and [[CBC_BUFSIZE]]. +lengths for static allocation are provided as constants such as [[BLOOCKSZ]], +[[CTR_BUFSZ]], and [[CBC_BUFSZ]]. This is a low-level module which implements cryptographic primitives. Direct use of cryptographic primitives is not recommended for non-experts, as incorrect use diff --git a/crypto/blowfish/README b/crypto/blowfish/README @@ -4,7 +4,7 @@ use of this algorithm is not recommended except for legacy use-cases; prefer [[crypto::aes]] when possible. When combined with a block cipher mode from [[crypto::cipher]], suitable buffer -lengths for static allocation are provided as constants such as [[BLOCKSIZE]]. +lengths for static allocation are provided as constants such as [[BLOCKSZ]]. This is a low-level module which implements cryptographic primitives. Direct use of cryptographic primitives is not recommended for non-experts, as incorrect use diff --git a/crypto/chacha/README b/crypto/chacha/README @@ -3,14 +3,13 @@ ciphers. Use [[chacha20]] to create a [[crypto::cipher::xorstream]] and either [[chacha20_init]] or [[xchacha20_init]] to set the handle, key and nonce of the -appropriate size, [[NONCESIZE]] for chacha20 or [[XNONCESIZE]] for XChacha20. -After calling the appropriate init function, [[io::write]] may be used to -encrypt blocks to the handle or [[io::read]] to decrypt blocks from the handle. -The stream must be closed with [[io::close]] to wipe sensitive data from -memory. +appropriate size, [[NONCESZ]] for chacha20 or [[XNONCESZ]] for XChacha20. After +calling the appropriate init function, [[io::write]] may be used to encrypt +blocks to the handle or [[io::read]] to decrypt blocks from the handle. The +stream must be closed with [[io::close]] to wipe sensitive data from memory. -Writing blocks of length [[BLOCKSIZE]] is not required. However, seeking the -key stream with [[setctr]] only operates in units of [[BLOCKSIZE]]. +Writing blocks of length [[BLOCKSZ]] is not required. However, seeking the key +stream with [[setctr]] only operates in units of [[BLOCKSZ]]. This is a low-level module which implements cryptographic primitives. Direct use of cryptographic primitives is not recommended for non-experts, as diff --git a/crypto/rsa/README b/crypto/rsa/README @@ -1,8 +1,8 @@ This module provides RSA signature and encryption schemes defined in PKCS #1. The implementation only supports RSA keys with two prime factors. Most of the RSA operations in this module require buffers to perform. Buffer sizes are -provided for keys of a default maximum size of 4096-bits. [[BITSIZE]] -may be changed with compiler flags to support bigger keys. [[MINBITSIZE]] +provided for keys of a default maximum size of 4096-bits. [[BITSZ]] +may be changed with compiler flags to support bigger keys. [[MINBITSZ]] defines the minimum size accordingly. Public and private keys are stored in byte slices. [[pubkey_init]] is used diff --git a/crypto/salsa/README b/crypto/salsa/README @@ -3,13 +3,13 @@ ciphers, per "Salsa20 specification" by Daniel J. Bernstein. Use [[salsa20]] to create a stream and either [[xsalsa20_init]] or [[salsa20_init]] to set handle, key and nonce of the appropriate size, -[[NONCESIZE]] for salsa20 or [[XNONCESIZE]] for XSalsa20. After calling the +[[NONCESZ]] for salsa20 or [[XNONCESZ]] for XSalsa20. After calling the appropriate init function, [[io::write]] may be used to encrypt blocks to the handle or [[io::read]] to decrypt blocks from the handle. The stream must be closed with [[io::close]] to wipe sensitive data from memory. -Writing blocks of length [[BLOCKSIZE]] is not required. However, seeking the key -stream with [[setctr]] only operates in units of [[BLOCKSIZE]]. +Writing blocks of length [[BLOCKSZ]] is not required. However, seeking the key +stream with [[setctr]] only operates in units of [[BLOCKSZ]]. This is a low-level module which implements cryptographic primitives. Direct use of cryptographic primitives is not recommended for non-experts, as incorrect use