Home
last modified time | relevance | path

Searched refs:ED25519_KEY_SIZE (Results 1 – 25 of 77) sorted by relevance

1234

/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/cargo-crates/nettle-7.0.0/src/
H A Ded25519.rs11 pub const ED25519_KEY_SIZE: usize = ::nettle_sys::ED25519_KEY_SIZE as usize; const
30 if public.len() != ED25519_KEY_SIZE { in public_key()
33 if private.len() != ED25519_KEY_SIZE { in public_key()
53 if public.len() != ED25519_KEY_SIZE { in sign()
56 if private.len() != ED25519_KEY_SIZE { in sign()
80 if public.len() != ED25519_KEY_SIZE { in verify()
131 &[0u8; ED25519_KEY_SIZE][..], in malformed_sign_input()
139 &[0u8; ED25519_KEY_SIZE][..], in malformed_sign_input()
146 &[0u8; ED25519_KEY_SIZE][..], in malformed_sign_input()
147 &[0u8; ED25519_KEY_SIZE][..], in malformed_sign_input()
[all …]
/dports/security/wolfssl/wolfssl-5.1.0/wolfcrypt/src/
H A Ded25519.c220 if (keySz != ED25519_KEY_SIZE) in wc_ed25519_make_key()
238 ForceZero(key->k, ED25519_KEY_SIZE); in wc_ed25519_make_key()
586 byte rcheck[ED25519_KEY_SIZE]; in ed25519_verify_msg_final_with_sha()
977 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_only()
1007 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_key()
1015 pub = priv + ED25519_KEY_SIZE; in wc_ed25519_import_private_key()
1050 if (*outLen < ED25519_KEY_SIZE) { in wc_ed25519_export_private_only()
1051 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only()
1055 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only()
1056 XMEMCPY(out, key->k, ED25519_KEY_SIZE); in wc_ed25519_export_private_only()
[all …]
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/
H A Ded25519.c220 if (keySz != ED25519_KEY_SIZE) in wc_ed25519_make_key()
238 ForceZero(key->k, ED25519_KEY_SIZE); in wc_ed25519_make_key()
586 byte rcheck[ED25519_KEY_SIZE]; in ed25519_verify_msg_final_with_sha()
977 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_only()
1007 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_key()
1015 pub = priv + ED25519_KEY_SIZE; in wc_ed25519_import_private_key()
1050 if (*outLen < ED25519_KEY_SIZE) { in wc_ed25519_export_private_only()
1051 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only()
1055 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only()
1056 XMEMCPY(out, key->k, ED25519_KEY_SIZE); in wc_ed25519_export_private_only()
[all …]
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/
H A Ded25519.c220 if (keySz != ED25519_KEY_SIZE) in wc_ed25519_make_key()
238 ForceZero(key->k, ED25519_KEY_SIZE); in wc_ed25519_make_key()
586 byte rcheck[ED25519_KEY_SIZE]; in ed25519_verify_msg_final_with_sha()
977 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_only()
1007 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_key()
1015 pub = priv + ED25519_KEY_SIZE; in wc_ed25519_import_private_key()
1050 if (*outLen < ED25519_KEY_SIZE) { in wc_ed25519_export_private_only()
1051 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only()
1055 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only()
1056 XMEMCPY(out, key->k, ED25519_KEY_SIZE); in wc_ed25519_export_private_only()
[all …]
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/
H A Ded25519.c220 if (keySz != ED25519_KEY_SIZE) in wc_ed25519_make_key()
238 ForceZero(key->k, ED25519_KEY_SIZE); in wc_ed25519_make_key()
586 byte rcheck[ED25519_KEY_SIZE]; in ed25519_verify_msg_final_with_sha()
977 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_only()
1007 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_key()
1015 pub = priv + ED25519_KEY_SIZE; in wc_ed25519_import_private_key()
1050 if (*outLen < ED25519_KEY_SIZE) { in wc_ed25519_export_private_only()
1051 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only()
1055 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only()
1056 XMEMCPY(out, key->k, ED25519_KEY_SIZE); in wc_ed25519_export_private_only()
[all …]
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/
H A Ded25519.c220 if (keySz != ED25519_KEY_SIZE) in wc_ed25519_make_key()
238 ForceZero(key->k, ED25519_KEY_SIZE); in wc_ed25519_make_key()
586 byte rcheck[ED25519_KEY_SIZE]; in ed25519_verify_msg_final_with_sha()
977 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_only()
1007 if (privSz < ED25519_KEY_SIZE) in wc_ed25519_import_private_key()
1015 pub = priv + ED25519_KEY_SIZE; in wc_ed25519_import_private_key()
1050 if (*outLen < ED25519_KEY_SIZE) { in wc_ed25519_export_private_only()
1051 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only()
1055 *outLen = ED25519_KEY_SIZE; in wc_ed25519_export_private_only()
1056 XMEMCPY(out, key->k, ED25519_KEY_SIZE); in wc_ed25519_export_private_only()
[all …]
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/cargo-crates/nettle-src-3.5.1-2/nettle/testsuite/
H A Ded25519-test.c66 uint8_t sk[ED25519_KEY_SIZE]; in test_one()
67 uint8_t pk[ED25519_KEY_SIZE]; in test_one()
68 uint8_t t[ED25519_KEY_SIZE]; in test_one()
74 decode_hex (ED25519_KEY_SIZE, sk, line); in test_one()
79 decode_hex (ED25519_KEY_SIZE, pk, p); in test_one()
96 ASSERT (MEMEQ(ED25519_KEY_SIZE, t, pk)); in test_one()
/dports/security/nettle/nettle-3.7.3/testsuite/
H A Ded25519-test.c66 uint8_t sk[ED25519_KEY_SIZE]; in test_one()
67 uint8_t pk[ED25519_KEY_SIZE]; in test_one()
68 uint8_t t[ED25519_KEY_SIZE]; in test_one()
74 decode_hex (ED25519_KEY_SIZE, sk, line); in test_one()
79 decode_hex (ED25519_KEY_SIZE, pk, p); in test_one()
96 ASSERT (MEMEQ(ED25519_KEY_SIZE, t, pk)); in test_one()
/dports/security/wolfssl/wolfssl-5.1.0/wolfcrypt/src/port/nxp/
H A Dksdk_port.c1623 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass()
1624 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass()
1625 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass()
1743 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519()
1744 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519()
1745 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519()
1764 Gy, ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, My, &szMy, in LTC_PKHA_WeierstrassToEd25519()
1852 uint8_t U[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress()
1853 uint8_t V[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress()
1864 ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, U, &szU, in LTC_PKHA_Ed25519_PointDecompress()
[all …]
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/port/nxp/
H A Dksdk_port.c1623 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass()
1624 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass()
1625 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass()
1743 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519()
1744 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519()
1745 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519()
1764 Gy, ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, My, &szMy, in LTC_PKHA_WeierstrassToEd25519()
1852 uint8_t U[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress()
1853 uint8_t V[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress()
1864 ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, U, &szU, in LTC_PKHA_Ed25519_PointDecompress()
[all …]
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/port/nxp/
H A Dksdk_port.c1623 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass()
1624 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass()
1625 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass()
1743 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519()
1744 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519()
1745 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519()
1764 Gy, ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, My, &szMy, in LTC_PKHA_WeierstrassToEd25519()
1852 uint8_t U[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress()
1853 uint8_t V[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress()
1864 ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, U, &szU, in LTC_PKHA_Ed25519_PointDecompress()
[all …]
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/port/nxp/
H A Dksdk_port.c1623 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass()
1624 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass()
1625 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass()
1743 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519()
1744 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519()
1745 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519()
1764 Gy, ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, My, &szMy, in LTC_PKHA_WeierstrassToEd25519()
1852 uint8_t U[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress()
1853 uint8_t V[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress()
1864 ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, U, &szU, in LTC_PKHA_Ed25519_PointDecompress()
[all …]
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/port/nxp/
H A Dksdk_port.c1623 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass()
1624 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass()
1625 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519ToWeierstrass()
1743 uint8_t Mx[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519()
1744 uint8_t My[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519()
1745 uint8_t temp[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_WeierstrassToEd25519()
1764 Gy, ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, My, &szMy, in LTC_PKHA_WeierstrassToEd25519()
1852 uint8_t U[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress()
1853 uint8_t V[ED25519_KEY_SIZE] = {0}; in LTC_PKHA_Ed25519_PointDecompress()
1864 ED25519_KEY_SIZE, curve25519_modbin, ED25519_KEY_SIZE, U, &szU, in LTC_PKHA_Ed25519_PointDecompress()
[all …]
/dports/security/wolfssl/wolfssl-5.1.0/wolfssl/wolfcrypt/
H A Ded25519.h61 #define ED25519_KEY_SIZE 32 /* private key only */ macro
66 #define ED25519_PRV_KEY_SIZE (ED25519_PUB_KEY_SIZE+ED25519_KEY_SIZE)
86 byte pointX[ED25519_KEY_SIZE]; /* recovered X coordinate */
87 …byte pointY[ED25519_KEY_SIZE]; /* Y coordinate is the public key with The most significant bit of …
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/
H A Ded25519.h61 #define ED25519_KEY_SIZE 32 /* private key only */ macro
66 #define ED25519_PRV_KEY_SIZE (ED25519_PUB_KEY_SIZE+ED25519_KEY_SIZE)
86 byte pointX[ED25519_KEY_SIZE]; /* recovered X coordinate */
87 …byte pointY[ED25519_KEY_SIZE]; /* Y coordinate is the public key with The most significant bit of …
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/
H A Ded25519.h61 #define ED25519_KEY_SIZE 32 /* private key only */ macro
66 #define ED25519_PRV_KEY_SIZE (ED25519_PUB_KEY_SIZE+ED25519_KEY_SIZE)
86 byte pointX[ED25519_KEY_SIZE]; /* recovered X coordinate */
87 …byte pointY[ED25519_KEY_SIZE]; /* Y coordinate is the public key with The most significant bit of …
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/
H A Ded25519.h61 #define ED25519_KEY_SIZE 32 /* private key only */ macro
66 #define ED25519_PRV_KEY_SIZE (ED25519_PUB_KEY_SIZE+ED25519_KEY_SIZE)
86 byte pointX[ED25519_KEY_SIZE]; /* recovered X coordinate */
87 …byte pointY[ED25519_KEY_SIZE]; /* Y coordinate is the public key with The most significant bit of …
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfssl/wolfcrypt/
H A Ded25519.h61 #define ED25519_KEY_SIZE 32 /* private key only */ macro
66 #define ED25519_PRV_KEY_SIZE (ED25519_PUB_KEY_SIZE+ED25519_KEY_SIZE)
86 byte pointX[ED25519_KEY_SIZE]; /* recovered X coordinate */
87 …byte pointY[ED25519_KEY_SIZE]; /* Y coordinate is the public key with The most significant bit of …
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/cargo-crates/nettle-src-3.5.1-2/nettle/
H A Ded25519-sha512-sign.c55 #define k1 (digest + ED25519_KEY_SIZE) in ed25519_sha512_sign()
59 sha512_update (&ctx, ED25519_KEY_SIZE, k1); in ed25519_sha512_sign()
H A Deddsa.h49 #define ED25519_KEY_SIZE 32 macro
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/crypto/backend/nettle/
H A Dasymmetric.rs88 let missing = ed25519::ED25519_KEY_SIZE in sign()
90 let mut sec = [0u8; ed25519::ED25519_KEY_SIZE]; in sign()
96 ed25519::ED25519_KEY_SIZE); in sign()
407 let mut public_key = [0; ed25519::ED25519_KEY_SIZE]; in import_secret_ed25519()
486 let mut public = [0; ed25519::ED25519_KEY_SIZE]; in generate_ecc()
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/crypto/backend/nettle/
H A Dasymmetric.rs88 let missing = ed25519::ED25519_KEY_SIZE in sign()
90 let mut sec = [0u8; ed25519::ED25519_KEY_SIZE]; in sign()
96 ed25519::ED25519_KEY_SIZE); in sign()
407 let mut public_key = [0; ed25519::ED25519_KEY_SIZE]; in import_secret_ed25519()
486 let mut public = [0; ed25519::ED25519_KEY_SIZE]; in generate_ecc()
/dports/security/nettle/nettle-3.7.3/
H A Ded25519-sha512-sign.c60 pub, digest + ED25519_KEY_SIZE, k2, in ed25519_sha512_sign()
H A Deddsa.h52 #define ED25519_KEY_SIZE 32 macro
/dports/security/gnutls/gnutls-3.6.16/lib/nettle/ecc/
H A Deddsa.h52 #define ED25519_KEY_SIZE 32 macro

1234