Home
last modified time | relevance | path

Searched refs:CURVE448_KEY_SIZE (Results 1 – 25 of 50) sorted by relevance

12

/dports/security/wolfssl/wolfssl-5.1.0/wolfcrypt/src/
H A Dcurve448.c49 unsigned char basepoint[CURVE448_KEY_SIZE] = {5}; in wc_curve448_make_pub()
55 (private_size != CURVE448_KEY_SIZE)) { in wc_curve448_make_pub()
86 if ((ret == 0) && (keysize != CURVE448_KEY_SIZE)) { in wc_curve448_make_key()
99 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_make_key()
427 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex()
431 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex()
435 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_export_private_raw_ex()
440 XMEMCPY(out, key->k, CURVE448_KEY_SIZE); in wc_curve448_export_private_raw_ex()
598 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_import_private_ex()
608 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_import_private_ex()
[all …]
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/
H A Dcurve448.c49 unsigned char basepoint[CURVE448_KEY_SIZE] = {5}; in wc_curve448_make_pub()
55 (private_size != CURVE448_KEY_SIZE)) { in wc_curve448_make_pub()
86 if ((ret == 0) && (keysize != CURVE448_KEY_SIZE)) { in wc_curve448_make_key()
99 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_make_key()
427 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex()
431 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex()
435 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_export_private_raw_ex()
440 XMEMCPY(out, key->k, CURVE448_KEY_SIZE); in wc_curve448_export_private_raw_ex()
598 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_import_private_ex()
608 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_import_private_ex()
[all …]
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/
H A Dcurve448.c49 unsigned char basepoint[CURVE448_KEY_SIZE] = {5}; in wc_curve448_make_pub()
55 (private_size != CURVE448_KEY_SIZE)) { in wc_curve448_make_pub()
86 if ((ret == 0) && (keysize != CURVE448_KEY_SIZE)) { in wc_curve448_make_key()
99 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_make_key()
427 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex()
431 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex()
435 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_export_private_raw_ex()
440 XMEMCPY(out, key->k, CURVE448_KEY_SIZE); in wc_curve448_export_private_raw_ex()
598 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_import_private_ex()
608 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_import_private_ex()
[all …]
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/
H A Dcurve448.c49 unsigned char basepoint[CURVE448_KEY_SIZE] = {5}; in wc_curve448_make_pub()
55 (private_size != CURVE448_KEY_SIZE)) { in wc_curve448_make_pub()
86 if ((ret == 0) && (keysize != CURVE448_KEY_SIZE)) { in wc_curve448_make_key()
99 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_make_key()
427 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex()
431 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex()
435 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_export_private_raw_ex()
440 XMEMCPY(out, key->k, CURVE448_KEY_SIZE); in wc_curve448_export_private_raw_ex()
598 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_import_private_ex()
608 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_import_private_ex()
[all …]
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/
H A Dcurve448.c49 unsigned char basepoint[CURVE448_KEY_SIZE] = {5}; in wc_curve448_make_pub()
55 (private_size != CURVE448_KEY_SIZE)) { in wc_curve448_make_pub()
86 if ((ret == 0) && (keysize != CURVE448_KEY_SIZE)) { in wc_curve448_make_key()
99 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_make_key()
427 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex()
431 *outLen = CURVE448_KEY_SIZE; in wc_curve448_export_private_raw_ex()
435 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_export_private_raw_ex()
440 XMEMCPY(out, key->k, CURVE448_KEY_SIZE); in wc_curve448_export_private_raw_ex()
598 for (i = 0; i < CURVE448_KEY_SIZE; i++) { in wc_curve448_import_private_ex()
608 key->k[CURVE448_KEY_SIZE-1] |= 0x80; in wc_curve448_import_private_ex()
[all …]
/dports/security/wolfssl/wolfssl-5.1.0/wolfssl/wolfcrypt/
H A Dcurve448.h43 #define CURVE448_KEY_SIZE 56 macro
54 byte k[CURVE448_KEY_SIZE]; /* private key */
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/
H A Dcurve448.h43 #define CURVE448_KEY_SIZE 56 macro
54 byte k[CURVE448_KEY_SIZE]; /* private key */
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/
H A Dcurve448.h43 #define CURVE448_KEY_SIZE 56 macro
54 byte k[CURVE448_KEY_SIZE]; /* private key */
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/
H A Dcurve448.h43 #define CURVE448_KEY_SIZE 56 macro
54 byte k[CURVE448_KEY_SIZE]; /* private key */
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/
H A Dcurve448.h43 #define CURVE448_KEY_SIZE 56 macro
54 byte k[CURVE448_KEY_SIZE]; /* private key */
/dports/security/wolfssl/wolfssl-5.1.0/wolfcrypt/test/
H A Dtest.c26491 byte fail_le[][CURVE448_KEY_SIZE] = {
26512 byte fail_be[][CURVE448_KEY_SIZE] = {
26533 byte good[CURVE448_KEY_SIZE] = {
26560 for (i = 1; i < CURVE448_KEY_SIZE + 2; i++) {
26561 if (i == CURVE448_KEY_SIZE)
26575 if (wc_curve448_check_public(fail_le[i], CURVE448_KEY_SIZE,
26589 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE,
26593 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE,
26608 byte sharedA[CURVE448_KEY_SIZE];
26609 byte sharedB[CURVE448_KEY_SIZE];
[all …]
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/test/
H A Dtest.c26491 byte fail_le[][CURVE448_KEY_SIZE] = {
26512 byte fail_be[][CURVE448_KEY_SIZE] = {
26533 byte good[CURVE448_KEY_SIZE] = {
26560 for (i = 1; i < CURVE448_KEY_SIZE + 2; i++) {
26561 if (i == CURVE448_KEY_SIZE)
26575 if (wc_curve448_check_public(fail_le[i], CURVE448_KEY_SIZE,
26589 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE,
26593 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE,
26608 byte sharedA[CURVE448_KEY_SIZE];
26609 byte sharedB[CURVE448_KEY_SIZE];
[all …]
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/test/
H A Dtest.c26491 byte fail_le[][CURVE448_KEY_SIZE] = {
26512 byte fail_be[][CURVE448_KEY_SIZE] = {
26533 byte good[CURVE448_KEY_SIZE] = {
26560 for (i = 1; i < CURVE448_KEY_SIZE + 2; i++) {
26561 if (i == CURVE448_KEY_SIZE)
26575 if (wc_curve448_check_public(fail_le[i], CURVE448_KEY_SIZE,
26589 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE,
26593 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE,
26608 byte sharedA[CURVE448_KEY_SIZE];
26609 byte sharedB[CURVE448_KEY_SIZE];
[all …]
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/test/
H A Dtest.c26491 byte fail_le[][CURVE448_KEY_SIZE] = {
26512 byte fail_be[][CURVE448_KEY_SIZE] = {
26533 byte good[CURVE448_KEY_SIZE] = {
26560 for (i = 1; i < CURVE448_KEY_SIZE + 2; i++) {
26561 if (i == CURVE448_KEY_SIZE)
26575 if (wc_curve448_check_public(fail_le[i], CURVE448_KEY_SIZE,
26589 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE,
26593 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE,
26608 byte sharedA[CURVE448_KEY_SIZE];
26609 byte sharedB[CURVE448_KEY_SIZE];
[all …]
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/test/
H A Dtest.c26491 byte fail_le[][CURVE448_KEY_SIZE] = {
26512 byte fail_be[][CURVE448_KEY_SIZE] = {
26533 byte good[CURVE448_KEY_SIZE] = {
26560 for (i = 1; i < CURVE448_KEY_SIZE + 2; i++) {
26561 if (i == CURVE448_KEY_SIZE)
26575 if (wc_curve448_check_public(fail_le[i], CURVE448_KEY_SIZE,
26589 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE,
26593 if (wc_curve448_check_public(good, CURVE448_KEY_SIZE,
26608 byte sharedA[CURVE448_KEY_SIZE];
26609 byte sharedB[CURVE448_KEY_SIZE];
[all …]
/dports/security/wolfssl/wolfssl-5.1.0/src/
H A Dtls.c6357 ret = wc_curve448_make_key(ssl->rng, CURVE448_KEY_SIZE, key); in TLSX_KeyShare_GenX448Key()
6364 kse->pubKey = (byte*)XMALLOC(CURVE448_KEY_SIZE, ssl->heap, in TLSX_KeyShare_GenX448Key()
6374 kse->pubKeyLen = CURVE448_KEY_SIZE; in TLSX_KeyShare_GenX448Key()
6379 kse->pubKeyLen = CURVE448_KEY_SIZE; /* always CURVE448_KEY_SIZE */ in TLSX_KeyShare_GenX448Key()
H A Dsniffer.c2748 length = CURVE448_KEY_SIZE;
2768 session->keySz = CURVE448_KEY_SIZE;
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/src/
H A Dtls.c6357 ret = wc_curve448_make_key(ssl->rng, CURVE448_KEY_SIZE, key); in TLSX_KeyShare_GenX448Key()
6364 kse->pubKey = (byte*)XMALLOC(CURVE448_KEY_SIZE, ssl->heap, in TLSX_KeyShare_GenX448Key()
6374 kse->pubKeyLen = CURVE448_KEY_SIZE; in TLSX_KeyShare_GenX448Key()
6379 kse->pubKeyLen = CURVE448_KEY_SIZE; /* always CURVE448_KEY_SIZE */ in TLSX_KeyShare_GenX448Key()
H A Dsniffer.c2748 length = CURVE448_KEY_SIZE;
2768 session->keySz = CURVE448_KEY_SIZE;
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/src/
H A Dtls.c6357 ret = wc_curve448_make_key(ssl->rng, CURVE448_KEY_SIZE, key);
6364 kse->pubKey = (byte*)XMALLOC(CURVE448_KEY_SIZE, ssl->heap,
6374 kse->pubKeyLen = CURVE448_KEY_SIZE;
6379 kse->pubKeyLen = CURVE448_KEY_SIZE; /* always CURVE448_KEY_SIZE */
H A Dsniffer.c2748 length = CURVE448_KEY_SIZE;
2768 session->keySz = CURVE448_KEY_SIZE;
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/src/
H A Dtls.c6357 ret = wc_curve448_make_key(ssl->rng, CURVE448_KEY_SIZE, key); in TLSX_KeyShare_GenX448Key()
6364 kse->pubKey = (byte*)XMALLOC(CURVE448_KEY_SIZE, ssl->heap, in TLSX_KeyShare_GenX448Key()
6374 kse->pubKeyLen = CURVE448_KEY_SIZE; in TLSX_KeyShare_GenX448Key()
6379 kse->pubKeyLen = CURVE448_KEY_SIZE; /* always CURVE448_KEY_SIZE */ in TLSX_KeyShare_GenX448Key()
H A Dsniffer.c2748 length = CURVE448_KEY_SIZE;
2768 session->keySz = CURVE448_KEY_SIZE;
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/src/
H A Dtls.c6357 ret = wc_curve448_make_key(ssl->rng, CURVE448_KEY_SIZE, key); in TLSX_KeyShare_GenX448Key()
6364 kse->pubKey = (byte*)XMALLOC(CURVE448_KEY_SIZE, ssl->heap, in TLSX_KeyShare_GenX448Key()
6374 kse->pubKeyLen = CURVE448_KEY_SIZE; in TLSX_KeyShare_GenX448Key()
6379 kse->pubKeyLen = CURVE448_KEY_SIZE; /* always CURVE448_KEY_SIZE */ in TLSX_KeyShare_GenX448Key()
H A Dsniffer.c2748 length = CURVE448_KEY_SIZE;
2768 session->keySz = CURVE448_KEY_SIZE;

12