ring::aead::CHACHA20_POLY1305_OLD [] [src]

pub static CHACHA20_POLY1305_OLD: Algorithm = aead::Algorithm{key_len: CHACHA20_KEY_LEN,
                init: init,
                seal: chacha20_poly1305_old_seal,
                open: chacha20_poly1305_old_open,}

The old ChaCha20-Poly13065 construction used in OpenSSH's chacha20-poly1305@openssh.com and the experimental TLS cipher suites with IDs 0xCC13 (ECDHE-RSA) and 0xCC14 (ECDHE-ECDSA). Use CHACHA20_POLY1305 instead.

The keys are 256 bits long and the nonces are 96 bits. The first four bytes of the nonce must be [0, 0, 0, 0] in order to interoperate with other implementations, which use 64-bit nonces.