From 1e8f555d9329a9025a4451d215c910162769f26b Mon Sep 17 00:00:00 2001 From: Pauli Date: Thu, 1 Jun 2023 09:51:46 +1000 Subject: [PATCH] doc: note that out ChaCha20 isn't standard compliant. Fixes #21095 Reviewed-by: Tomas Mraz Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/21098) (cherry picked from commit c69756e7a0133b67df50525e89206c9cc4a7d2b8) --- doc/man3/EVP_chacha20.pod | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/doc/man3/EVP_chacha20.pod b/doc/man3/EVP_chacha20.pod index 28ab25bf71889..683faa326e145 100644 --- a/doc/man3/EVP_chacha20.pod +++ b/doc/man3/EVP_chacha20.pod @@ -22,10 +22,10 @@ The ChaCha20 stream cipher for EVP. =item EVP_chacha20() The ChaCha20 stream cipher. The key length is 256 bits, the IV is 128 bits long. -The first 32 bits consists of a counter in little-endian order followed by a 96 +The first 64 bits consists of a counter in little-endian order followed by a 64 bit nonce. For example a nonce of: -000000000000000000000002 +0000000000000002 With an initial counter of 42 (2a in hex) would be expressed as: @@ -47,6 +47,9 @@ calling these functions multiple times and should consider using L instead. See L for further information. +L +uses a 32 bit counter and a 96 bit nonce for the IV. + =head1 RETURN VALUES These functions return an B structure that contains the