From 675b172188cf718cea8f642c0fb9b5f53dda0e72 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Niels=20M=C3=B6ller?= <nisse@lysator.liu.se> Date: Mon, 5 May 2014 21:44:05 +0200 Subject: [PATCH] In the manual, change some subsections to subsubsections. --- ChangeLog | 5 +++-- nettle.texinfo | 8 ++++---- 2 files changed, 7 insertions(+), 6 deletions(-) diff --git a/ChangeLog b/ChangeLog index b84464b3..8a9c9058 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,8 +1,9 @@ 2014-05-05 Niels Möller <nisse@lysator.liu.se> * nettle.texinfo (POLY1305): Document poly1305-aes. - (Authenticated encryption): Make Authenticated encryption a - separate section. + (Authenticated encryption): Move AEAD algorithms to their own + section. + (RSA, DSA, ECDSA): Change some subsections to subsubsections. 2014-05-04 Niels Möller <nisse@lysator.liu.se> diff --git a/nettle.texinfo b/nettle.texinfo index 79bd98fd..2c361964 100644 --- a/nettle.texinfo +++ b/nettle.texinfo @@ -3453,7 +3453,7 @@ from the message in the same way as above. Then @code{s^e mod n} is computed, the operation returns true if and only if the result equals @code{x}. -@subsection Nettle's @acronym{RSA} support +@subsubsection Nettle's @acronym{RSA} support Nettle represents @acronym{RSA} keys using two structures that contain large numbers (of type @code{mpz_t}). @@ -3721,7 +3721,7 @@ randomness source is a serious disadvantage. If you ever use the same @code{k} (and @code{r}) for two different message, you leak your private key. -@subsection Nettle's @acronym{DSA} support +@subsubsection Nettle's @acronym{DSA} support Like for @acronym{RSA}, Nettle represents @acronym{DSA} keys using two structures, containing values of type @code{mpz_t}. For information on @@ -3821,7 +3821,7 @@ random octets and store them at @code{dst}. For advice, see @xref{Randomness}. @end deftypefun -@subsection Old, deprecated, @acronym{DSA} interface +@subsubsection Old, deprecated, @acronym{DSA} interface Versions before nettle-3.0 used a different interface for @acronym{DSA} signatures, where the group parameters and the public key was packed @@ -3966,7 +3966,7 @@ accesses depend only on the size of the input data and its location in memory, not on the actual data bits. This implies a performance penalty in several of the building blocks. -@subsection ECDSA +@subsubsection ECDSA ECDSA is a variant of the DSA digital signature scheme (@pxref{DSA}), which works over an elliptic curve group rather than over a (subgroup -- GitLab