/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/cargo-crates/nettle-7.0.0/src/ |
H A D | ed25519.rs | 11 pub const ED25519_KEY_SIZE: usize = ::nettle_sys::ED25519_KEY_SIZE as usize; const 30 if public.len() != ED25519_KEY_SIZE { in public_key() 33 if private.len() != ED25519_KEY_SIZE { in public_key() 53 if public.len() != ED25519_KEY_SIZE { in sign() 56 if private.len() != ED25519_KEY_SIZE { in sign() 80 if public.len() != ED25519_KEY_SIZE { in verify() 131 &[0u8; ED25519_KEY_SIZE][..], in malformed_sign_input() 139 &[0u8; ED25519_KEY_SIZE][..], in malformed_sign_input() 146 &[0u8; ED25519_KEY_SIZE][..], in malformed_sign_input() 147 &[0u8; ED25519_KEY_SIZE][..], in malformed_sign_input() [all …]
|
/dports/security/wolfssl/wolfssl-5.1.0/wolfcrypt/src/ |
H A D | ed25519.c | 220 if (keySz != ED25519_KEY_SIZE) in wc_ed25519_make_key() 238 ForceZero(key->k, ED25519_KEY_SIZE); in wc_ed25519_make_key() 586 byte rcheck[ED25519_KEY_SIZE]; in ed25519_verify_msg_final_with_sha() 977 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_only() 1007 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_key() 1015 pub = priv + ED25519_KEY_SIZE; in wc_ed25519_import_private_key() 1050 if (*outLen < ED25519_KEY_SIZE) { in wc_ed25519_export_private_only() 1051 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only() 1055 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only() 1056 XMEMCPY(out, key->k, ED25519_KEY_SIZE); in wc_ed25519_export_private_only() [all …]
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/ |
H A D | ed25519.c | 220 if (keySz != ED25519_KEY_SIZE) in wc_ed25519_make_key() 238 ForceZero(key->k, ED25519_KEY_SIZE); in wc_ed25519_make_key() 586 byte rcheck[ED25519_KEY_SIZE]; in ed25519_verify_msg_final_with_sha() 977 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_only() 1007 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_key() 1015 pub = priv + ED25519_KEY_SIZE; in wc_ed25519_import_private_key() 1050 if (*outLen < ED25519_KEY_SIZE) { in wc_ed25519_export_private_only() 1051 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only() 1055 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only() 1056 XMEMCPY(out, key->k, ED25519_KEY_SIZE); in wc_ed25519_export_private_only() [all …]
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/ |
H A D | ed25519.c | 220 if (keySz != ED25519_KEY_SIZE) in wc_ed25519_make_key() 238 ForceZero(key->k, ED25519_KEY_SIZE); in wc_ed25519_make_key() 586 byte rcheck[ED25519_KEY_SIZE]; in ed25519_verify_msg_final_with_sha() 977 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_only() 1007 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_key() 1015 pub = priv + ED25519_KEY_SIZE; in wc_ed25519_import_private_key() 1050 if (*outLen < ED25519_KEY_SIZE) { in wc_ed25519_export_private_only() 1051 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only() 1055 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only() 1056 XMEMCPY(out, key->k, ED25519_KEY_SIZE); in wc_ed25519_export_private_only() [all …]
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/ |
H A D | ed25519.c | 220 if (keySz != ED25519_KEY_SIZE) in wc_ed25519_make_key() 238 ForceZero(key->k, ED25519_KEY_SIZE); in wc_ed25519_make_key() 586 byte rcheck[ED25519_KEY_SIZE]; in ed25519_verify_msg_final_with_sha() 977 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_only() 1007 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_key() 1015 pub = priv + ED25519_KEY_SIZE; in wc_ed25519_import_private_key() 1050 if (*outLen < ED25519_KEY_SIZE) { in wc_ed25519_export_private_only() 1051 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only() 1055 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only() 1056 XMEMCPY(out, key->k, ED25519_KEY_SIZE); in wc_ed25519_export_private_only() [all …]
|
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/ |
H A D | ed25519.c | 220 if (keySz != ED25519_KEY_SIZE) in wc_ed25519_make_key() 238 ForceZero(key->k, ED25519_KEY_SIZE); in wc_ed25519_make_key() 586 byte rcheck[ED25519_KEY_SIZE]; in ed25519_verify_msg_final_with_sha() 977 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_only() 1007 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_key() 1015 pub = priv + ED25519_KEY_SIZE; in wc_ed25519_import_private_key() 1050 if (*outLen < ED25519_KEY_SIZE) { in wc_ed25519_export_private_only() 1051 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only() 1055 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only() 1056 XMEMCPY(out, key->k, ED25519_KEY_SIZE); in wc_ed25519_export_private_only() [all …]
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/cargo-crates/nettle-src-3.5.1-2/nettle/testsuite/ |
H A D | ed25519-test.c | 66 uint8_t sk[ED25519_KEY_SIZE]; in test_one() 67 uint8_t pk[ED25519_KEY_SIZE]; in test_one() 68 uint8_t t[ED25519_KEY_SIZE]; in test_one() 74 decode_hex (ED25519_KEY_SIZE, sk, line); in test_one() 79 decode_hex (ED25519_KEY_SIZE, pk, p); in test_one() 96 ASSERT (MEMEQ(ED25519_KEY_SIZE, t, pk)); in test_one()
|
/dports/security/nettle/nettle-3.7.3/testsuite/ |
H A D | ed25519-test.c | 66 uint8_t sk[ED25519_KEY_SIZE]; in test_one() 67 uint8_t pk[ED25519_KEY_SIZE]; in test_one() 68 uint8_t t[ED25519_KEY_SIZE]; in test_one() 74 decode_hex (ED25519_KEY_SIZE, sk, line); in test_one() 79 decode_hex (ED25519_KEY_SIZE, pk, p); in test_one() 96 ASSERT (MEMEQ(ED25519_KEY_SIZE, t, pk)); in test_one()
|
/dports/security/wolfssl/wolfssl-5.1.0/wolfcrypt/src/port/nxp/ |
H A D | ksdk_port.c | 1623 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass() 1624 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass() 1625 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass() 1743 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519() 1744 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519() 1745 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519() 1764 Gy, ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, My, &szMy, in LTC_PKHA_WeierstrassToEd25519() 1852 uint8_t U[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress() 1853 uint8_t V[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress() 1864 ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, U, &szU, in LTC_PKHA_Ed25519_PointDecompress() [all …]
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/port/nxp/ |
H A D | ksdk_port.c | 1623 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass() 1624 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass() 1625 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass() 1743 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519() 1744 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519() 1745 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519() 1764 Gy, ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, My, &szMy, in LTC_PKHA_WeierstrassToEd25519() 1852 uint8_t U[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress() 1853 uint8_t V[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress() 1864 ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, U, &szU, in LTC_PKHA_Ed25519_PointDecompress() [all …]
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/port/nxp/ |
H A D | ksdk_port.c | 1623 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass() 1624 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass() 1625 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass() 1743 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519() 1744 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519() 1745 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519() 1764 Gy, ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, My, &szMy, in LTC_PKHA_WeierstrassToEd25519() 1852 uint8_t U[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress() 1853 uint8_t V[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress() 1864 ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, U, &szU, in LTC_PKHA_Ed25519_PointDecompress() [all …]
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/port/nxp/ |
H A D | ksdk_port.c | 1623 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass() 1624 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass() 1625 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass() 1743 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519() 1744 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519() 1745 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519() 1764 Gy, ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, My, &szMy, in LTC_PKHA_WeierstrassToEd25519() 1852 uint8_t U[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress() 1853 uint8_t V[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress() 1864 ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, U, &szU, in LTC_PKHA_Ed25519_PointDecompress() [all …]
|
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/port/nxp/ |
H A D | ksdk_port.c | 1623 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass() 1624 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass() 1625 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass() 1743 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519() 1744 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519() 1745 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519() 1764 Gy, ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, My, &szMy, in LTC_PKHA_WeierstrassToEd25519() 1852 uint8_t U[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress() 1853 uint8_t V[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress() 1864 ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, U, &szU, in LTC_PKHA_Ed25519_PointDecompress() [all …]
|
/dports/security/wolfssl/wolfssl-5.1.0/wolfssl/wolfcrypt/ |
H A D | ed25519.h | 61 #define ED25519_KEY_SIZE 32 /* private key only */ macro 66 #define ED25519_PRV_KEY_SIZE (ED25519_PUB_KEY_SIZE+ED25519_KEY_SIZE) 86 byte pointX[ED25519_KEY_SIZE]; /* recovered X coordinate */ 87 …byte pointY[ED25519_KEY_SIZE]; /* Y coordinate is the public key with The most significant bit of …
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/ |
H A D | ed25519.h | 61 #define ED25519_KEY_SIZE 32 /* private key only */ macro 66 #define ED25519_PRV_KEY_SIZE (ED25519_PUB_KEY_SIZE+ED25519_KEY_SIZE) 86 byte pointX[ED25519_KEY_SIZE]; /* recovered X coordinate */ 87 …byte pointY[ED25519_KEY_SIZE]; /* Y coordinate is the public key with The most significant bit of …
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/ |
H A D | ed25519.h | 61 #define ED25519_KEY_SIZE 32 /* private key only */ macro 66 #define ED25519_PRV_KEY_SIZE (ED25519_PUB_KEY_SIZE+ED25519_KEY_SIZE) 86 byte pointX[ED25519_KEY_SIZE]; /* recovered X coordinate */ 87 …byte pointY[ED25519_KEY_SIZE]; /* Y coordinate is the public key with The most significant bit of …
|
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/ |
H A D | ed25519.h | 61 #define ED25519_KEY_SIZE 32 /* private key only */ macro 66 #define ED25519_PRV_KEY_SIZE (ED25519_PUB_KEY_SIZE+ED25519_KEY_SIZE) 86 byte pointX[ED25519_KEY_SIZE]; /* recovered X coordinate */ 87 …byte pointY[ED25519_KEY_SIZE]; /* Y coordinate is the public key with The most significant bit of …
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/ |
H A D | ed25519.h | 61 #define ED25519_KEY_SIZE 32 /* private key only */ macro 66 #define ED25519_PRV_KEY_SIZE (ED25519_PUB_KEY_SIZE+ED25519_KEY_SIZE) 86 byte pointX[ED25519_KEY_SIZE]; /* recovered X coordinate */ 87 …byte pointY[ED25519_KEY_SIZE]; /* Y coordinate is the public key with The most significant bit of …
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/cargo-crates/nettle-src-3.5.1-2/nettle/ |
H A D | ed25519-sha512-sign.c | 55 #define k1 (digest + ED25519_KEY_SIZE) in ed25519_sha512_sign() 59 sha512_update (&ctx, ED25519_KEY_SIZE, k1); in ed25519_sha512_sign()
|
H A D | eddsa.h | 49 #define ED25519_KEY_SIZE 32 macro
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/crypto/backend/nettle/ |
H A D | asymmetric.rs | 88 let missing = ed25519::ED25519_KEY_SIZE in sign() 90 let mut sec = [0u8; ed25519::ED25519_KEY_SIZE]; in sign() 96 ed25519::ED25519_KEY_SIZE); in sign() 407 let mut public_key = [0; ed25519::ED25519_KEY_SIZE]; in import_secret_ed25519() 486 let mut public = [0; ed25519::ED25519_KEY_SIZE]; in generate_ecc()
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/crypto/backend/nettle/ |
H A D | asymmetric.rs | 88 let missing = ed25519::ED25519_KEY_SIZE in sign() 90 let mut sec = [0u8; ed25519::ED25519_KEY_SIZE]; in sign() 96 ed25519::ED25519_KEY_SIZE); in sign() 407 let mut public_key = [0; ed25519::ED25519_KEY_SIZE]; in import_secret_ed25519() 486 let mut public = [0; ed25519::ED25519_KEY_SIZE]; in generate_ecc()
|
/dports/security/nettle/nettle-3.7.3/ |
H A D | ed25519-sha512-sign.c | 60 pub, digest + ED25519_KEY_SIZE, k2, in ed25519_sha512_sign()
|
H A D | eddsa.h | 52 #define ED25519_KEY_SIZE 32 macro
|
/dports/security/gnutls/gnutls-3.6.16/lib/nettle/ecc/ |
H A D | eddsa.h | 52 #define ED25519_KEY_SIZE 32 macro
|