diff options
author | = <ruhiasap@gmail.com> | 2021-10-13 21:33:07 +0530 |
---|---|---|
committer | = <ruhiasap@gmail.com> | 2021-10-20 11:54:03 +0530 |
commit | be7f4130f996b2564041719177f0a907e5c2011b (patch) | |
tree | fbb769c89cf72959f54ffbace69e45a901f331f8 /src/crypto/chacha_poly_aead.h | |
parent | 0ccf9b2e5594581deef2f60174c3651a57f93b64 (diff) |
Fix K1/K2 use in the comments in ChaCha20-Poly1305 AEAD
This is done for the ChaCha20-Poly1305 AEAD test vector
and for the K1/K2 ChaCha20 cipher instances in chacha_poly_aead.h
Diffstat (limited to 'src/crypto/chacha_poly_aead.h')
-rw-r--r-- | src/crypto/chacha_poly_aead.h | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/crypto/chacha_poly_aead.h b/src/crypto/chacha_poly_aead.h index 0afe8fcc14..6a7998335d 100644 --- a/src/crypto/chacha_poly_aead.h +++ b/src/crypto/chacha_poly_aead.h @@ -117,8 +117,8 @@ static constexpr int AAD_PACKAGES_PER_ROUND = 21; /* 64 / 3 round down*/ class ChaCha20Poly1305AEAD { private: - ChaCha20 m_chacha_main; // payload and poly1305 key-derivation cipher instance - ChaCha20 m_chacha_header; // AAD cipher instance (encrypted length) + ChaCha20 m_chacha_header; // AAD cipher instance (encrypted length) and poly1305 key-derivation cipher instance + ChaCha20 m_chacha_main; // payload unsigned char m_aad_keystream_buffer[CHACHA20_ROUND_OUTPUT]; // aad keystream cache uint64_t m_cached_aad_seqnr; // aad keystream cache hint |