Skip to content

Commit

Permalink
Remove outdated comments
Browse files Browse the repository at this point in the history
State must not be cloned yet. The construction may be updated later
to allow for nonce-less MACs
  • Loading branch information
jedisct1 committed Dec 4, 2024
1 parent 73d94db commit 251b8c8
Show file tree
Hide file tree
Showing 4 changed files with 0 additions and 16 deletions.
4 changes: 0 additions & 4 deletions src/include/aegis128x2.h
Original file line number Diff line number Diff line change
Expand Up @@ -263,10 +263,6 @@ void aegis128x2_decrypt_unauthenticated(uint8_t *m, const uint8_t *c, size_t cle
* - However, if the key is known, arbitrary inputs matching a tag can be efficiently computed.
*
* The recommended way to use the MAC mode is to generate a random key and keep it secret.
*
* After initialization, the state can be reused to generate multiple MACs by cloning it
* with `aegis128x2_mac_state_clone()`. It is only safe to copy a state directly without using
* the clone function if the state is guaranteed to be properly aligned.
*/
void aegis128x2_mac_init(aegis128x2_state *st_, const uint8_t *k, const uint8_t *npub);

Expand Down
4 changes: 0 additions & 4 deletions src/include/aegis128x4.h
Original file line number Diff line number Diff line change
Expand Up @@ -263,10 +263,6 @@ void aegis128x4_decrypt_unauthenticated(uint8_t *m, const uint8_t *c, size_t cle
* - However, if the key is known, arbitrary inputs matching a tag can be efficiently computed.
*
* The recommended way to use the MAC mode is to generate a random key and keep it secret.
*
* After initialization, the state can be reused to generate multiple MACs by cloning it
* with `aegis128x4_mac_state_clone()`. It is only safe to copy a state directly without using
* the clone function if the state is guaranteed to be properly aligned.
*/
void aegis128x4_mac_init(aegis128x4_state *st_, const uint8_t *k, const uint8_t *npub);

Expand Down
4 changes: 0 additions & 4 deletions src/include/aegis256x2.h
Original file line number Diff line number Diff line change
Expand Up @@ -263,10 +263,6 @@ void aegis256x2_decrypt_unauthenticated(uint8_t *m, const uint8_t *c, size_t cle
* - However, if the key is known, arbitrary inputs matching a tag can be efficiently computed.
*
* The recommended way to use the MAC mode is to generate a random key and keep it secret.
*
* After initialization, the state can be reused to generate multiple MACs by cloning it
* with `aegis256x2_mac_state_clone()`. It is only safe to copy a state directly without using
* the clone function if the state is guaranteed to be properly aligned.
*/
void aegis256x2_mac_init(aegis256x2_state *st_, const uint8_t *k, const uint8_t *npub);

Expand Down
4 changes: 0 additions & 4 deletions src/include/aegis256x4.h
Original file line number Diff line number Diff line change
Expand Up @@ -263,10 +263,6 @@ void aegis256x4_decrypt_unauthenticated(uint8_t *m, const uint8_t *c, size_t cle
* - However, if the key is known, arbitrary inputs matching a tag can be efficiently computed.
*
* The recommended way to use the MAC mode is to generate a random key and keep it secret.
*
* After initialization, the state can be reused to generate multiple MACs by cloning it
* with `aegis256_mac_state_clone()`. It is only safe to copy a state directly without using
* the clone function if the state is guaranteed to be properly aligned.
*/
void aegis256x4_mac_init(aegis256x4_state *st_, const uint8_t *k, const uint8_t *npub);

Expand Down

0 comments on commit 251b8c8

Please sign in to comment.