summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/chacha/chacha.h (follow)
Commit message (Collapse)AuthorAgeFilesLines
* add support for xchacha20 and xchacha20-poly1305dlg2019-01-221-1/+5
| | | | | | | xchacha is a chacha stream that allows for an extended nonce, which in turn makes it feasible to use random nonces. ok tb@
* Change the counter argument for CRYPTO_chacha_20 to be 64-bits on all platforms.bcook2015-12-091-2/+3
| | | | | | | | | | | The recently-added EVP_aead_chacha20_poly1305_ietf() function, which implements informational RFC 7539, "ChaCha20 and Poly1305 for IETF Protocols", needs a 64-bit counter to avoid truncation on 32-bit platforms. The existing TLS ChaCha20-Poly1305 ciphersuite is not impacted by this, but making this change requires an ABI bump. ok jsing@, "Looks sane" beck@
* Add missing year to copyright.jsing2014-07-251-2/+2
|
* If a chacha operation does not consume all of the generated key stream,jsing2014-06-241-1/+3
| | | | | | | | | | | | | | | | ensure that we save it and consume it on subsequent writes. Otherwise we end up discarding part of the key stream and instead generate a new block at the start of the next write. This was only an issue for callers that did multiple writes that are not multiples of 64 bytes - in particular, the ChaCha20Poly1305 usage does not hit this problem since it performs encryption in a single-shot. For the same reason, this is also a non-issue when openssl(1) is used to encrypt with ChaCha. Issue identified by insane coder; reported to bugs@ by Joseph M. Schwartz. ok beck@
* tags as requested by miod and teduderaadt2014-06-121-0/+1
|
* KNF.jsing2014-05-151-1/+1
|
* Provide an EVP implementation for ChaCha.jsing2014-05-011-0/+11
| | | | ok miod@
* Add ChaCha to libcrypto, based on djb's public domain implementation.jsing2014-05-011-0/+39
ok deraadt@