diff options
author | Pieter Wuille <pieter@wuille.net> | 2022-09-21 16:58:13 -0400 |
---|---|---|
committer | Pieter Wuille <pieter@wuille.net> | 2023-01-30 18:12:21 -0500 |
commit | 6babf402130a8f3ef3058594750aeaa50b8f5044 (patch) | |
tree | 2f05753f1aba6b98f661c18eb0e2ed632c133cdf /src/crypto | |
parent | e37bcaa0a6dbb334ab6e817efcb609ccee6edc39 (diff) |
Rename ChaCha20::Seek -> Seek64 to clarify multiple of 64
Diffstat (limited to 'src/crypto')
-rw-r--r-- | src/crypto/chacha20.cpp | 2 | ||||
-rw-r--r-- | src/crypto/chacha20.h | 4 | ||||
-rw-r--r-- | src/crypto/chacha_poly_aead.cpp | 8 |
3 files changed, 7 insertions, 7 deletions
diff --git a/src/crypto/chacha20.cpp b/src/crypto/chacha20.cpp index cdeeee192e..c72ccccc65 100644 --- a/src/crypto/chacha20.cpp +++ b/src/crypto/chacha20.cpp @@ -68,7 +68,7 @@ void ChaCha20Aligned::SetIV(uint64_t iv) input[15] = iv >> 32; } -void ChaCha20Aligned::Seek(uint64_t pos) +void ChaCha20Aligned::Seek64(uint64_t pos) { input[12] = pos; input[13] = pos >> 32; diff --git a/src/crypto/chacha20.h b/src/crypto/chacha20.h index 12ddef9256..fdef257ed3 100644 --- a/src/crypto/chacha20.h +++ b/src/crypto/chacha20.h @@ -30,7 +30,7 @@ public: void SetIV(uint64_t iv); /** set the 64bit block counter (pos seeks to byte position 64*pos). */ - void Seek(uint64_t pos); + void Seek64(uint64_t pos); /** outputs the keystream of size <64*blocks> into <c> */ void Keystream64(unsigned char* c, size_t blocks); @@ -60,7 +60,7 @@ public: void SetIV(uint64_t iv) { m_aligned.SetIV(iv); } /** set the 64bit block counter (pos seeks to byte position 64*pos). */ - void Seek(uint64_t pos) { m_aligned.Seek(pos); } + void Seek64(uint64_t pos) { m_aligned.Seek64(pos); } /** outputs the keystream of size <bytes> into <c> */ void Keystream(unsigned char* c, size_t bytes); diff --git a/src/crypto/chacha_poly_aead.cpp b/src/crypto/chacha_poly_aead.cpp index 6511f46adc..5d135f8987 100644 --- a/src/crypto/chacha_poly_aead.cpp +++ b/src/crypto/chacha_poly_aead.cpp @@ -62,7 +62,7 @@ bool ChaCha20Poly1305AEAD::Crypt(uint64_t seqnr_payload, uint64_t seqnr_aad, int // block counter 0 for the poly1305 key // use lower 32bytes for the poly1305 key // (throws away 32 unused bytes (upper 32) from this ChaCha20 round) - m_chacha_main.Seek(0); + m_chacha_main.Seek64(0); m_chacha_main.Crypt(poly_key, poly_key, sizeof(poly_key)); // if decrypting, verify the tag prior to decryption @@ -85,7 +85,7 @@ bool ChaCha20Poly1305AEAD::Crypt(uint64_t seqnr_payload, uint64_t seqnr_aad, int if (m_cached_aad_seqnr != seqnr_aad) { m_cached_aad_seqnr = seqnr_aad; m_chacha_header.SetIV(seqnr_aad); - m_chacha_header.Seek(0); + m_chacha_header.Seek64(0); m_chacha_header.Keystream(m_aad_keystream_buffer, CHACHA20_ROUND_OUTPUT); } // crypt the AAD (3 bytes message length) with given position in AAD cipher instance keystream @@ -94,7 +94,7 @@ bool ChaCha20Poly1305AEAD::Crypt(uint64_t seqnr_payload, uint64_t seqnr_aad, int dest[2] = src[2] ^ m_aad_keystream_buffer[aad_pos + 2]; // Set the playload ChaCha instance block counter to 1 and crypt the payload - m_chacha_main.Seek(1); + m_chacha_main.Seek64(1); m_chacha_main.Crypt(src + CHACHA20_POLY1305_AEAD_AAD_LEN, dest + CHACHA20_POLY1305_AEAD_AAD_LEN, src_len - CHACHA20_POLY1305_AEAD_AAD_LEN); // If encrypting, calculate and append tag @@ -117,7 +117,7 @@ bool ChaCha20Poly1305AEAD::GetLength(uint32_t* len24_out, uint64_t seqnr_aad, in // we need to calculate the 64 keystream bytes since we reached a new aad sequence number m_cached_aad_seqnr = seqnr_aad; m_chacha_header.SetIV(seqnr_aad); // use LE for the nonce - m_chacha_header.Seek(0); // block counter 0 + m_chacha_header.Seek64(0); // block counter 0 m_chacha_header.Keystream(m_aad_keystream_buffer, CHACHA20_ROUND_OUTPUT); // write keystream to the cache } |