shithub: riscv

Download patch

ref: 9decd2635486688ea4ea26550e3f2d1b842157a9
parent: d389d63f65f42cfc0b81b8fa573fb4ec7899bb5d
author: stanley lieber <[email protected]>
date: Tue Jun 5 16:05:24 EDT 2012

ec(2): english

--- a/sys/man/2/ec
+++ b/sys/man/2/ec
@@ -8,7 +8,7 @@
 ecverify,
 ecpubverify,
 ecdsasign,
-ecdsaverify \- Elliptic Curve Cryptography
+ecdsaverify \- elliptic curve cryptography
 .SH SYNOPSIS
 .B #include <u.h>
 .br
@@ -46,8 +46,8 @@
 int	ecdsaverify(ECdomain *dom, ECpub *pub, uchar *dig, int dlen, mpint *r, mpint *s);
 .DT
 .SH DESCRIPTION
-These function implement elliptic curve cryptography.
-An elliptic curve together with cryptographic parameters are specified using a 
+These functions implement elliptic curve cryptography.
+An elliptic curve together with cryptographic parameters are specified using an
 .B ECdomain
 struct.
 Points on the curve are represented by 
@@ -55,11 +55,13 @@
 structs.
 .PP
 .BR ecassign ", " ecadd " and " ecmul
-work analogous to their counterparts in
+are analogous to their counterparts in
 .IR mp (2).
 .PP
 .B strtoec
-converts a hex string representing an octet string as specified in SEC 1 to a
+converts a hex string representing an octet string as specified in
+.I Standards for Efficient Cryptography (SEC) 1
+to an
 .B ECpoint
 struct. Both uncompressed and compressed formats are supported.
 If 
@@ -74,7 +76,7 @@
 .B ecverify
 and
 .B ecpubverify
-verify that the given point or public key, resp., is valid.
+verify that the given point or public key, respectively, is valid.
 .PP
 .B ecgen
 generates a keypair and returns a pointer to it.
@@ -85,7 +87,8 @@
 .B ecdsasign
 and
 .B ecdsaverify
-create or verify, resp., a signature using the ECDSA scheme specified in SEC 1.
+create or verify, respectively, a signature using the ECDSA scheme specified in
+.I SEC 1.
 It is absolutely vital that
 .B dig
 is a cryptographic hash to the message.
@@ -100,9 +103,13 @@
 for a positive result.
 Functions returning pointers may return
 .B nil
-in case of error (e.g. failing
+in case of error
+.I (e.g.
+failing
 .IR malloc (2)).
 .SH SOURCE
 .B /sys/src/libsec/ec.c
 .SH SEE ALSO
-Standards for Efficient Cryptography (SEC) 1: Elliptic Curve Cryptography, Certicom Research, 2009
+.I
+Standards for Efficient Cryptography (SEC) 1: Elliptic Curve Cryptography
+- Certicom Research, 2009