/dports/security/wolfssl/wolfssl-5.1.0/wolfcrypt/src/ |
H A D | curve448.c | 49 unsigned char basepoint[CURVE448_KEY_SIZE] = {5}; in wc_curve448_make_pub() 55 (private_size != CURVE448_KEY_SIZE)) { in wc_curve448_make_pub() 86 if ((ret == 0) && (keysize != CURVE448_KEY_SIZE)) { in wc_curve448_make_key() 99 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_make_key() 427 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex() 431 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex() 435 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_export_private_raw_ex() 440 XMEMCPY(out, key->k, CURVE448_KEY_SIZE); in wc_curve448_export_private_raw_ex() 598 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_import_private_ex() 608 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_import_private_ex() [all …]
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/ |
H A D | curve448.c | 49 unsigned char basepoint[CURVE448_KEY_SIZE] = {5}; in wc_curve448_make_pub() 55 (private_size != CURVE448_KEY_SIZE)) { in wc_curve448_make_pub() 86 if ((ret == 0) && (keysize != CURVE448_KEY_SIZE)) { in wc_curve448_make_key() 99 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_make_key() 427 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex() 431 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex() 435 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_export_private_raw_ex() 440 XMEMCPY(out, key->k, CURVE448_KEY_SIZE); in wc_curve448_export_private_raw_ex() 598 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_import_private_ex() 608 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_import_private_ex() [all …]
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/ |
H A D | curve448.c | 49 unsigned char basepoint[CURVE448_KEY_SIZE] = {5}; in wc_curve448_make_pub() 55 (private_size != CURVE448_KEY_SIZE)) { in wc_curve448_make_pub() 86 if ((ret == 0) && (keysize != CURVE448_KEY_SIZE)) { in wc_curve448_make_key() 99 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_make_key() 427 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex() 431 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex() 435 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_export_private_raw_ex() 440 XMEMCPY(out, key->k, CURVE448_KEY_SIZE); in wc_curve448_export_private_raw_ex() 598 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_import_private_ex() 608 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_import_private_ex() [all …]
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/ |
H A D | curve448.c | 49 unsigned char basepoint[CURVE448_KEY_SIZE] = {5}; in wc_curve448_make_pub() 55 (private_size != CURVE448_KEY_SIZE)) { in wc_curve448_make_pub() 86 if ((ret == 0) && (keysize != CURVE448_KEY_SIZE)) { in wc_curve448_make_key() 99 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_make_key() 427 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex() 431 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex() 435 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_export_private_raw_ex() 440 XMEMCPY(out, key->k, CURVE448_KEY_SIZE); in wc_curve448_export_private_raw_ex() 598 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_import_private_ex() 608 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_import_private_ex() [all …]
|
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/ |
H A D | curve448.c | 49 unsigned char basepoint[CURVE448_KEY_SIZE] = {5}; in wc_curve448_make_pub() 55 (private_size != CURVE448_KEY_SIZE)) { in wc_curve448_make_pub() 86 if ((ret == 0) && (keysize != CURVE448_KEY_SIZE)) { in wc_curve448_make_key() 99 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_make_key() 427 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex() 431 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex() 435 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_export_private_raw_ex() 440 XMEMCPY(out, key->k, CURVE448_KEY_SIZE); in wc_curve448_export_private_raw_ex() 598 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_import_private_ex() 608 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_import_private_ex() [all …]
|
/dports/security/wolfssl/wolfssl-5.1.0/wolfssl/wolfcrypt/ |
H A D | curve448.h | 43 #define CURVE448_KEY_SIZE 56 macro 54 byte k[CURVE448_KEY_SIZE]; /* private key */
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/ |
H A D | curve448.h | 43 #define CURVE448_KEY_SIZE 56 macro 54 byte k[CURVE448_KEY_SIZE]; /* private key */
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/ |
H A D | curve448.h | 43 #define CURVE448_KEY_SIZE 56 macro 54 byte k[CURVE448_KEY_SIZE]; /* private key */
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/ |
H A D | curve448.h | 43 #define CURVE448_KEY_SIZE 56 macro 54 byte k[CURVE448_KEY_SIZE]; /* private key */
|
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/ |
H A D | curve448.h | 43 #define CURVE448_KEY_SIZE 56 macro 54 byte k[CURVE448_KEY_SIZE]; /* private key */
|
/dports/security/wolfssl/wolfssl-5.1.0/wolfcrypt/test/ |
H A D | test.c | 26491 byte fail_le[][CURVE448_KEY_SIZE] = { 26512 byte fail_be[][CURVE448_KEY_SIZE] = { 26533 byte good[CURVE448_KEY_SIZE] = { 26560 for (i = 1; i < CURVE448_KEY_SIZE + 2; i++) { 26561 if (i == CURVE448_KEY_SIZE) 26575 if (wc_curve448_check_public(fail_le[i], CURVE448_KEY_SIZE, 26589 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE, 26593 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE, 26608 byte sharedA[CURVE448_KEY_SIZE]; 26609 byte sharedB[CURVE448_KEY_SIZE]; [all …]
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/test/ |
H A D | test.c | 26491 byte fail_le[][CURVE448_KEY_SIZE] = { 26512 byte fail_be[][CURVE448_KEY_SIZE] = { 26533 byte good[CURVE448_KEY_SIZE] = { 26560 for (i = 1; i < CURVE448_KEY_SIZE + 2; i++) { 26561 if (i == CURVE448_KEY_SIZE) 26575 if (wc_curve448_check_public(fail_le[i], CURVE448_KEY_SIZE, 26589 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE, 26593 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE, 26608 byte sharedA[CURVE448_KEY_SIZE]; 26609 byte sharedB[CURVE448_KEY_SIZE]; [all …]
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/test/ |
H A D | test.c | 26491 byte fail_le[][CURVE448_KEY_SIZE] = { 26512 byte fail_be[][CURVE448_KEY_SIZE] = { 26533 byte good[CURVE448_KEY_SIZE] = { 26560 for (i = 1; i < CURVE448_KEY_SIZE + 2; i++) { 26561 if (i == CURVE448_KEY_SIZE) 26575 if (wc_curve448_check_public(fail_le[i], CURVE448_KEY_SIZE, 26589 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE, 26593 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE, 26608 byte sharedA[CURVE448_KEY_SIZE]; 26609 byte sharedB[CURVE448_KEY_SIZE]; [all …]
|
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/test/ |
H A D | test.c | 26491 byte fail_le[][CURVE448_KEY_SIZE] = { 26512 byte fail_be[][CURVE448_KEY_SIZE] = { 26533 byte good[CURVE448_KEY_SIZE] = { 26560 for (i = 1; i < CURVE448_KEY_SIZE + 2; i++) { 26561 if (i == CURVE448_KEY_SIZE) 26575 if (wc_curve448_check_public(fail_le[i], CURVE448_KEY_SIZE, 26589 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE, 26593 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE, 26608 byte sharedA[CURVE448_KEY_SIZE]; 26609 byte sharedB[CURVE448_KEY_SIZE]; [all …]
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/test/ |
H A D | test.c | 26491 byte fail_le[][CURVE448_KEY_SIZE] = { 26512 byte fail_be[][CURVE448_KEY_SIZE] = { 26533 byte good[CURVE448_KEY_SIZE] = { 26560 for (i = 1; i < CURVE448_KEY_SIZE + 2; i++) { 26561 if (i == CURVE448_KEY_SIZE) 26575 if (wc_curve448_check_public(fail_le[i], CURVE448_KEY_SIZE, 26589 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE, 26593 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE, 26608 byte sharedA[CURVE448_KEY_SIZE]; 26609 byte sharedB[CURVE448_KEY_SIZE]; [all …]
|
/dports/security/wolfssl/wolfssl-5.1.0/src/ |
H A D | tls.c | 6357 ret = wc_curve448_make_key(ssl->rng, CURVE448_KEY_SIZE, key); in TLSX_KeyShare_GenX448Key() 6364 kse->pubKey = (byte*)XMALLOC(CURVE448_KEY_SIZE, ssl->heap, in TLSX_KeyShare_GenX448Key() 6374 kse->pubKeyLen = CURVE448_KEY_SIZE; in TLSX_KeyShare_GenX448Key() 6379 kse->pubKeyLen = CURVE448_KEY_SIZE; /* always CURVE448_KEY_SIZE */ in TLSX_KeyShare_GenX448Key()
|
H A D | sniffer.c | 2748 length = CURVE448_KEY_SIZE; 2768 session->keySz = CURVE448_KEY_SIZE;
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/src/ |
H A D | tls.c | 6357 ret = wc_curve448_make_key(ssl->rng, CURVE448_KEY_SIZE, key); in TLSX_KeyShare_GenX448Key() 6364 kse->pubKey = (byte*)XMALLOC(CURVE448_KEY_SIZE, ssl->heap, in TLSX_KeyShare_GenX448Key() 6374 kse->pubKeyLen = CURVE448_KEY_SIZE; in TLSX_KeyShare_GenX448Key() 6379 kse->pubKeyLen = CURVE448_KEY_SIZE; /* always CURVE448_KEY_SIZE */ in TLSX_KeyShare_GenX448Key()
|
H A D | sniffer.c | 2748 length = CURVE448_KEY_SIZE; 2768 session->keySz = CURVE448_KEY_SIZE;
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/src/ |
H A D | tls.c | 6357 ret = wc_curve448_make_key(ssl->rng, CURVE448_KEY_SIZE, key); 6364 kse->pubKey = (byte*)XMALLOC(CURVE448_KEY_SIZE, ssl->heap, 6374 kse->pubKeyLen = CURVE448_KEY_SIZE; 6379 kse->pubKeyLen = CURVE448_KEY_SIZE; /* always CURVE448_KEY_SIZE */
|
H A D | sniffer.c | 2748 length = CURVE448_KEY_SIZE; 2768 session->keySz = CURVE448_KEY_SIZE;
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/src/ |
H A D | tls.c | 6357 ret = wc_curve448_make_key(ssl->rng, CURVE448_KEY_SIZE, key); in TLSX_KeyShare_GenX448Key() 6364 kse->pubKey = (byte*)XMALLOC(CURVE448_KEY_SIZE, ssl->heap, in TLSX_KeyShare_GenX448Key() 6374 kse->pubKeyLen = CURVE448_KEY_SIZE; in TLSX_KeyShare_GenX448Key() 6379 kse->pubKeyLen = CURVE448_KEY_SIZE; /* always CURVE448_KEY_SIZE */ in TLSX_KeyShare_GenX448Key()
|
H A D | sniffer.c | 2748 length = CURVE448_KEY_SIZE; 2768 session->keySz = CURVE448_KEY_SIZE;
|
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/src/ |
H A D | tls.c | 6357 ret = wc_curve448_make_key(ssl->rng, CURVE448_KEY_SIZE, key); in TLSX_KeyShare_GenX448Key() 6364 kse->pubKey = (byte*)XMALLOC(CURVE448_KEY_SIZE, ssl->heap, in TLSX_KeyShare_GenX448Key() 6374 kse->pubKeyLen = CURVE448_KEY_SIZE; in TLSX_KeyShare_GenX448Key() 6379 kse->pubKeyLen = CURVE448_KEY_SIZE; /* always CURVE448_KEY_SIZE */ in TLSX_KeyShare_GenX448Key()
|
H A D | sniffer.c | 2748 length = CURVE448_KEY_SIZE; 2768 session->keySz = CURVE448_KEY_SIZE;
|