ring::aead::CHACHA20_POLY1305_OLD
[−]
[src]
pub static CHACHA20_POLY1305_OLD: Algorithm=
aead::Algorithm{key_len: CHACHA20_KEY_LEN, init: init, seal: chacha20_poly1305_old_seal, open: chacha20_poly1305_old_open,}
The old ChaCha20-Poly13065 construction used in OpenSSH's
chacha20-poly1305@openssh.com and the experimental TLS cipher suites with
IDs 0xCC13
(ECDHE-RSA) and 0xCC14
(ECDHE-ECDSA). Use
CHACHA20_POLY1305
instead.
The keys are 256 bits long and the nonces are 96 bits. The first four bytes
of the nonce must be [0, 0, 0, 0]
in order to interoperate with other
implementations, which use 64-bit nonces.