/dports/www/firefox-esr/firefox-91.8.0/security/nss/gtests/pk11_gtest/ |
H A D | pk11_signature_test.cc | 62 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignHashedData() local 63 EXPECT_LT(0, (int)sigLen); in SignHashedData() 64 sig->Allocate(static_cast<size_t>(sigLen)); in SignHashedData() 69 EXPECT_EQ(sigLen, sigItem.len); in SignHashedData() 75 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignData() local 77 EXPECT_LT(0, (int)sigLen); in SignData() 78 sig->Allocate(static_cast<size_t>(sigLen)); in SignData() 97 unsigned int len = sigLen; in SignData() 98 rv = PK11_DigestFinal(context, sig->data(), &len, sigLen); in SignData() 104 if (len != sigLen) { in SignData() [all …]
|
/dports/www/firefox/firefox-99.0/security/nss/gtests/pk11_gtest/ |
H A D | pk11_signature_test.cc | 62 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignHashedData() local 63 EXPECT_LT(0, (int)sigLen); in SignHashedData() 64 sig->Allocate(static_cast<size_t>(sigLen)); in SignHashedData() 69 EXPECT_EQ(sigLen, sigItem.len); in SignHashedData() 75 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignData() local 77 EXPECT_LT(0, (int)sigLen); in SignData() 78 sig->Allocate(static_cast<size_t>(sigLen)); in SignData() 97 unsigned int len = sigLen; in SignData() 98 rv = PK11_DigestFinal(context, sig->data(), &len, sigLen); in SignData() 104 if (len != sigLen) { in SignData() [all …]
|
/dports/security/ca_root_nss/nss-3.71/nss/gtests/pk11_gtest/ |
H A D | pk11_signature_test.cc | 62 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignHashedData() local 63 EXPECT_LT(0, (int)sigLen); in SignHashedData() 64 sig->Allocate(static_cast<size_t>(sigLen)); in SignHashedData() 69 EXPECT_EQ(sigLen, sigItem.len); in SignHashedData() 75 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignData() local 77 EXPECT_LT(0, (int)sigLen); in SignData() 78 sig->Allocate(static_cast<size_t>(sigLen)); in SignData() 97 unsigned int len = sigLen; in SignData() 98 rv = PK11_DigestFinal(context, sig->data(), &len, sigLen); in SignData() 104 if (len != sigLen) { in SignData() [all …]
|
/dports/security/nss/nss-3.76.1/nss/gtests/pk11_gtest/ |
H A D | pk11_signature_test.cc | 62 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignHashedData() local 63 EXPECT_LT(0, (int)sigLen); in SignHashedData() 64 sig->Allocate(static_cast<size_t>(sigLen)); in SignHashedData() 69 EXPECT_EQ(sigLen, sigItem.len); in SignHashedData() 75 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignData() local 77 EXPECT_LT(0, (int)sigLen); in SignData() 78 sig->Allocate(static_cast<size_t>(sigLen)); in SignData() 97 unsigned int len = sigLen; in SignData() 98 rv = PK11_DigestFinal(context, sig->data(), &len, sigLen); in SignData() 104 if (len != sigLen) { in SignData() [all …]
|
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/gtests/pk11_gtest/ |
H A D | pk11_signature_test.cc | 62 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignHashedData() local 63 EXPECT_LT(0, (int)sigLen); in SignHashedData() 64 sig->Allocate(static_cast<size_t>(sigLen)); in SignHashedData() 69 EXPECT_EQ(sigLen, sigItem.len); in SignHashedData() 75 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignData() local 77 EXPECT_LT(0, (int)sigLen); in SignData() 78 sig->Allocate(static_cast<size_t>(sigLen)); in SignData() 97 unsigned int len = sigLen; in SignData() 98 rv = PK11_DigestFinal(context, sig->data(), &len, sigLen); in SignData() 104 if (len != sigLen) { in SignData() [all …]
|
/dports/security/softhsm2/softhsm-2.6.1/src/lib/crypto/ |
H A D | OSSLDSA.cpp | 82 unsigned int sigLen = pk->getOutputLength(); in sign() local 83 signature.resize(sigLen); in sign() 84 memset(&signature[0], 0, sigLen); in sign() 222 unsigned int sigLen = pk->getOutputLength(); in signFinal() local 223 signature.resize(sigLen); in signFinal() 224 memset(&signature[0], 0, sigLen); in signFinal() 258 if (signature.size() != sigLen) in verify() 265 BIGNUM* bn_s = BN_bin2bn(s + sigLen / 2, sigLen / 2, NULL); in verify() 409 unsigned int sigLen = pk->getOutputLength(); in verifyFinal() local 410 if (signature.size() != sigLen) in verifyFinal() [all …]
|
/dports/textproc/teckit/teckit-2.5.7/source/Sample-tools/ |
H A D | TxtConv.cpp | 376 size_t sigLen; in main() local 384 sigLen = fread(sig, 1, 4, inFile); in main() 389 else if (sigLen >= 2 && sig[0] == 0xfe && sig[1] == 0xff) { in main() 397 else if (sigLen >= 2 && sig[0] == 0xff && sig[1] == 0xfe) { in main() 412 sigLen = fread(sig, 1, 3, inFile); in main() 418 sigLen = fread(sig, 1, 2, inFile); in main() 419 if (sigLen >= 2 && !(sig[0] == 0xfe && sig[1] == 0xff)) in main() 424 sigLen = fread(sig, 1, 2, inFile); in main() 425 if (sigLen >= 2 && !(sig[0] == 0xff && sig[1] == 0xfe)) in main() 430 sigLen = fread(sig, 1, 4, inFile); in main() [all …]
|
/dports/www/firefox-esr/firefox-91.8.0/security/nss/lib/softoken/ |
H A D | tlsprf.c | 71 unsigned int *sigLen, /* how much output. */ in sftk_TLSPRFUpdate() argument 106 if (rv == SECSuccess && sigLen != NULL) in sftk_TLSPRFUpdate() 107 *sigLen = sigItem.len; in sftk_TLSPRFUpdate() 114 unsigned int sigLen, /* length of sig. */ in sftk_TLSPRFVerify() argument 118 unsigned char *tmp = (unsigned char *)PORT_Alloc(sigLen); in sftk_TLSPRFVerify() 119 unsigned int tmpLen = sigLen; in sftk_TLSPRFVerify() 130 rv = sftk_TLSPRFUpdate(cx, tmp, &tmpLen, sigLen, NULL, 0); in sftk_TLSPRFVerify() 132 rv = (SECStatus)(1 - !NSS_SecureMemcmp(tmp, sig, sigLen)); in sftk_TLSPRFVerify() 134 PORT_ZFree(tmp, sigLen); in sftk_TLSPRFVerify()
|
/dports/www/firefox/firefox-99.0/security/nss/lib/softoken/ |
H A D | tlsprf.c | 71 unsigned int *sigLen, /* how much output. */ in sftk_TLSPRFUpdate() argument 106 if (rv == SECSuccess && sigLen != NULL) in sftk_TLSPRFUpdate() 107 *sigLen = sigItem.len; in sftk_TLSPRFUpdate() 114 unsigned int sigLen, /* length of sig. */ in sftk_TLSPRFVerify() argument 118 unsigned char *tmp = (unsigned char *)PORT_Alloc(sigLen); in sftk_TLSPRFVerify() 119 unsigned int tmpLen = sigLen; in sftk_TLSPRFVerify() 130 rv = sftk_TLSPRFUpdate(cx, tmp, &tmpLen, sigLen, NULL, 0); in sftk_TLSPRFVerify() 132 rv = (SECStatus)(1 - !NSS_SecureMemcmp(tmp, sig, sigLen)); in sftk_TLSPRFVerify() 134 PORT_ZFree(tmp, sigLen); in sftk_TLSPRFVerify()
|
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/lib/softoken/ |
H A D | tlsprf.c | 71 unsigned int *sigLen, /* how much output. */ in sftk_TLSPRFUpdate() argument 106 if (rv == SECSuccess && sigLen != NULL) in sftk_TLSPRFUpdate() 107 *sigLen = sigItem.len; in sftk_TLSPRFUpdate() 114 unsigned int sigLen, /* length of sig. */ in sftk_TLSPRFVerify() argument 118 unsigned char *tmp = (unsigned char *)PORT_Alloc(sigLen); in sftk_TLSPRFVerify() 119 unsigned int tmpLen = sigLen; in sftk_TLSPRFVerify() 130 rv = sftk_TLSPRFUpdate(cx, tmp, &tmpLen, sigLen, NULL, 0); in sftk_TLSPRFVerify() 132 rv = (SECStatus)(1 - !PORT_Memcmp(tmp, sig, sigLen)); in sftk_TLSPRFVerify() 134 PORT_ZFree(tmp, sigLen); in sftk_TLSPRFVerify()
|
/dports/security/ca_root_nss/nss-3.71/nss/lib/softoken/ |
H A D | tlsprf.c | 71 unsigned int *sigLen, /* how much output. */ in sftk_TLSPRFUpdate() argument 106 if (rv == SECSuccess && sigLen != NULL) in sftk_TLSPRFUpdate() 107 *sigLen = sigItem.len; in sftk_TLSPRFUpdate() 114 unsigned int sigLen, /* length of sig. */ in sftk_TLSPRFVerify() argument 118 unsigned char *tmp = (unsigned char *)PORT_Alloc(sigLen); in sftk_TLSPRFVerify() 119 unsigned int tmpLen = sigLen; in sftk_TLSPRFVerify() 130 rv = sftk_TLSPRFUpdate(cx, tmp, &tmpLen, sigLen, NULL, 0); in sftk_TLSPRFVerify() 132 rv = (SECStatus)(1 - !NSS_SecureMemcmp(tmp, sig, sigLen)); in sftk_TLSPRFVerify() 134 PORT_ZFree(tmp, sigLen); in sftk_TLSPRFVerify()
|
/dports/www/firefox-legacy/firefox-52.8.0esr/security/nss/lib/softoken/ |
H A D | tlsprf.c | 71 unsigned int *sigLen, /* how much output. */ in sftk_TLSPRFUpdate() argument 106 if (rv == SECSuccess && sigLen != NULL) in sftk_TLSPRFUpdate() 107 *sigLen = sigItem.len; in sftk_TLSPRFUpdate() 114 unsigned int sigLen, /* length of sig. */ in sftk_TLSPRFVerify() argument 118 unsigned char *tmp = (unsigned char *)PORT_Alloc(sigLen); in sftk_TLSPRFVerify() 119 unsigned int tmpLen = sigLen; in sftk_TLSPRFVerify() 130 rv = sftk_TLSPRFUpdate(cx, tmp, &tmpLen, sigLen, NULL, 0); in sftk_TLSPRFVerify() 132 rv = (SECStatus)(1 - !PORT_Memcmp(tmp, sig, sigLen)); in sftk_TLSPRFVerify() 134 PORT_ZFree(tmp, sigLen); in sftk_TLSPRFVerify()
|
/dports/security/nss/nss-3.76.1/nss/lib/softoken/ |
H A D | tlsprf.c | 71 unsigned int *sigLen, /* how much output. */ in sftk_TLSPRFUpdate() argument 106 if (rv == SECSuccess && sigLen != NULL) in sftk_TLSPRFUpdate() 107 *sigLen = sigItem.len; in sftk_TLSPRFUpdate() 114 unsigned int sigLen, /* length of sig. */ in sftk_TLSPRFVerify() argument 118 unsigned char *tmp = (unsigned char *)PORT_Alloc(sigLen); in sftk_TLSPRFVerify() 119 unsigned int tmpLen = sigLen; in sftk_TLSPRFVerify() 130 rv = sftk_TLSPRFUpdate(cx, tmp, &tmpLen, sigLen, NULL, 0); in sftk_TLSPRFVerify() 132 rv = (SECStatus)(1 - !NSS_SecureMemcmp(tmp, sig, sigLen)); in sftk_TLSPRFVerify() 134 PORT_ZFree(tmp, sigLen); in sftk_TLSPRFVerify()
|
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/lib/softoken/ |
H A D | tlsprf.c | 71 unsigned int *sigLen, /* how much output. */ in sftk_TLSPRFUpdate() argument 106 if (rv == SECSuccess && sigLen != NULL) in sftk_TLSPRFUpdate() 107 *sigLen = sigItem.len; in sftk_TLSPRFUpdate() 114 unsigned int sigLen, /* length of sig. */ in sftk_TLSPRFVerify() argument 118 unsigned char *tmp = (unsigned char *)PORT_Alloc(sigLen); in sftk_TLSPRFVerify() 119 unsigned int tmpLen = sigLen; in sftk_TLSPRFVerify() 130 rv = sftk_TLSPRFUpdate(cx, tmp, &tmpLen, sigLen, NULL, 0); in sftk_TLSPRFVerify() 132 rv = (SECStatus)(1 - !NSS_SecureMemcmp(tmp, sig, sigLen)); in sftk_TLSPRFVerify() 134 PORT_ZFree(tmp, sigLen); in sftk_TLSPRFVerify()
|
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/lib/softoken/ |
H A D | tlsprf.c | 71 unsigned int *sigLen, /* how much output. */ in sftk_TLSPRFUpdate() argument 106 if (rv == SECSuccess && sigLen != NULL) in sftk_TLSPRFUpdate() 107 *sigLen = sigItem.len; in sftk_TLSPRFUpdate() 114 unsigned int sigLen, /* length of sig. */ in sftk_TLSPRFVerify() argument 118 unsigned char *tmp = (unsigned char *)PORT_Alloc(sigLen); in sftk_TLSPRFVerify() 119 unsigned int tmpLen = sigLen; in sftk_TLSPRFVerify() 130 rv = sftk_TLSPRFUpdate(cx, tmp, &tmpLen, sigLen, NULL, 0); in sftk_TLSPRFVerify() 132 rv = (SECStatus)(1 - !NSS_SecureMemcmp(tmp, sig, sigLen)); in sftk_TLSPRFVerify() 134 PORT_ZFree(tmp, sigLen); in sftk_TLSPRFVerify()
|
/dports/audio/audacity/audacity-Audacity-3.1.3/src/import/ |
H A D | SpecPowerMeter.cpp | 27 SpecPowerCalculation::SpecPowerCalculation(size_t sigLen) in SpecPowerCalculation() argument 28 : mSigLen(sigLen) in SpecPowerCalculation() 29 , mSigI{ sigLen, true } in SpecPowerCalculation() 30 , mSigFR{ sigLen } 31 , mSigFI{ sigLen }
|
/dports/java/bouncycastle15/crypto-169/core/src/main/java/org/bouncycastle/pqc/crypto/lms/ |
H A D | LMOtsParameters.java | 32 private final int sigLen; field in LMOtsParameters 35 …protected LMOtsParameters(int type, int n, int w, int p, int ls, int sigLen, ASN1ObjectIdentifier … in LMOtsParameters() argument 42 this.sigLen = sigLen; in LMOtsParameters() 73 return sigLen; in getSigLen()
|
/dports/security/wolfssl/wolfssl-5.1.0/wolfcrypt/src/port/kcapi/ |
H A D | kcapi_ecc.c | 179 word32* sigLen) in KcapiEcc_Sign() argument 214 sig_aligned, *sigLen, in KcapiEcc_Sign() 217 *sigLen = ret; in KcapiEcc_Sign() 254 word32 sigLen) in KcapiEcc_Verify() argument 271 ret = posix_memalign((void*)&sigHash_aligned, pageSz, sigLen + hashLen); in KcapiEcc_Verify() 277 XMEMCPY(sigHash_aligned, sig, sigLen); in KcapiEcc_Verify() 278 XMEMCPY(sigHash_aligned + sigLen, hash, hashLen); in KcapiEcc_Verify() 281 sigLen + hashLen, NULL, hashLen, KCAPI_ACCESS_HEURISTIC); in KcapiEcc_Verify()
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/port/kcapi/ |
H A D | kcapi_ecc.c | 179 word32* sigLen) in KcapiEcc_Sign() argument 214 sig_aligned, *sigLen, in KcapiEcc_Sign() 217 *sigLen = ret; in KcapiEcc_Sign() 254 word32 sigLen) in KcapiEcc_Verify() argument 271 ret = posix_memalign((void*)&sigHash_aligned, pageSz, sigLen + hashLen); in KcapiEcc_Verify() 277 XMEMCPY(sigHash_aligned, sig, sigLen); in KcapiEcc_Verify() 278 XMEMCPY(sigHash_aligned + sigLen, hash, hashLen); in KcapiEcc_Verify() 281 sigLen + hashLen, NULL, hashLen, KCAPI_ACCESS_HEURISTIC); in KcapiEcc_Verify()
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/port/kcapi/ |
H A D | kcapi_ecc.c | 179 word32* sigLen) in KcapiEcc_Sign() argument 214 sig_aligned, *sigLen, in KcapiEcc_Sign() 217 *sigLen = ret; in KcapiEcc_Sign() 254 word32 sigLen) in KcapiEcc_Verify() argument 271 ret = posix_memalign((void*)&sigHash_aligned, pageSz, sigLen + hashLen); in KcapiEcc_Verify() 277 XMEMCPY(sigHash_aligned, sig, sigLen); in KcapiEcc_Verify() 278 XMEMCPY(sigHash_aligned + sigLen, hash, hashLen); in KcapiEcc_Verify() 281 sigLen + hashLen, NULL, hashLen, KCAPI_ACCESS_HEURISTIC); in KcapiEcc_Verify()
|
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/port/kcapi/ |
H A D | kcapi_ecc.c | 179 word32* sigLen) in KcapiEcc_Sign() argument 214 sig_aligned, *sigLen, in KcapiEcc_Sign() 217 *sigLen = ret; in KcapiEcc_Sign() 254 word32 sigLen) in KcapiEcc_Verify() argument 271 ret = posix_memalign((void*)&sigHash_aligned, pageSz, sigLen + hashLen); in KcapiEcc_Verify() 277 XMEMCPY(sigHash_aligned, sig, sigLen); in KcapiEcc_Verify() 278 XMEMCPY(sigHash_aligned + sigLen, hash, hashLen); in KcapiEcc_Verify() 281 sigLen + hashLen, NULL, hashLen, KCAPI_ACCESS_HEURISTIC); in KcapiEcc_Verify()
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/port/kcapi/ |
H A D | kcapi_ecc.c | 179 word32* sigLen) in KcapiEcc_Sign() argument 214 sig_aligned, *sigLen, in KcapiEcc_Sign() 217 *sigLen = ret; in KcapiEcc_Sign() 254 word32 sigLen) in KcapiEcc_Verify() argument 271 ret = posix_memalign((void*)&sigHash_aligned, pageSz, sigLen + hashLen); in KcapiEcc_Verify() 277 XMEMCPY(sigHash_aligned, sig, sigLen); in KcapiEcc_Verify() 278 XMEMCPY(sigHash_aligned + sigLen, hash, hashLen); in KcapiEcc_Verify() 281 sigLen + hashLen, NULL, hashLen, KCAPI_ACCESS_HEURISTIC); in KcapiEcc_Verify()
|
/dports/security/wolfssl/wolfssl-5.1.0/wolfcrypt/src/ |
H A D | ed25519.c | 514 static int ed25519_verify_msg_init_with_sha(const byte* sig, word32 sigLen, in ed25519_verify_msg_init_with_sha() argument 528 if (sigLen != ED25519_SIG_SIZE || (sig[ED25519_SIG_SIZE-1] & 224)) in ed25519_verify_msg_init_with_sha() 602 if (sigLen != ED25519_SIG_SIZE || (sig[ED25519_SIG_SIZE-1] & 224)) in ed25519_verify_msg_final_with_sha() 651 return ed25519_verify_msg_init_with_sha(sig, sigLen, key, &key->sha, in wc_ed25519_verify_msg_init() 661 int wc_ed25519_verify_msg_final(const byte* sig, word32 sigLen, int* res, in wc_ed25519_verify_msg_final() argument 663 return ed25519_verify_msg_final_with_sha(sig, sigLen, res, in wc_ed25519_verify_msg_final() 688 ret = se050_ed25519_verify_msg(sig, sigLen, msg, msgLen, key, res); in wc_ed25519_verify_msg_ex() 742 int wc_ed25519_verify_msg(const byte* sig, word32 sigLen, const byte* msg, in wc_ed25519_verify_msg() argument 745 return wc_ed25519_verify_msg_ex(sig, sigLen, msg, msgLen, res, key, in wc_ed25519_verify_msg() 764 return wc_ed25519_verify_msg_ex(sig, sigLen, msg, msgLen, res, key, in wc_ed25519ctx_verify_msg() [all …]
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/ |
H A D | ed25519.c | 514 static int ed25519_verify_msg_init_with_sha(const byte* sig, word32 sigLen, in ed25519_verify_msg_init_with_sha() argument 528 if (sigLen != ED25519_SIG_SIZE || (sig[ED25519_SIG_SIZE-1] & 224)) in ed25519_verify_msg_init_with_sha() 602 if (sigLen != ED25519_SIG_SIZE || (sig[ED25519_SIG_SIZE-1] & 224)) in ed25519_verify_msg_final_with_sha() 651 return ed25519_verify_msg_init_with_sha(sig, sigLen, key, &key->sha, in wc_ed25519_verify_msg_init() 661 int wc_ed25519_verify_msg_final(const byte* sig, word32 sigLen, int* res, in wc_ed25519_verify_msg_final() argument 663 return ed25519_verify_msg_final_with_sha(sig, sigLen, res, in wc_ed25519_verify_msg_final() 688 ret = se050_ed25519_verify_msg(sig, sigLen, msg, msgLen, key, res); in wc_ed25519_verify_msg_ex() 742 int wc_ed25519_verify_msg(const byte* sig, word32 sigLen, const byte* msg, in wc_ed25519_verify_msg() argument 745 return wc_ed25519_verify_msg_ex(sig, sigLen, msg, msgLen, res, key, in wc_ed25519_verify_msg() 764 return wc_ed25519_verify_msg_ex(sig, sigLen, msg, msgLen, res, key, in wc_ed25519ctx_verify_msg() [all …]
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/ |
H A D | ed25519.c | 514 static int ed25519_verify_msg_init_with_sha(const byte* sig, word32 sigLen, in ed25519_verify_msg_init_with_sha() argument 528 if (sigLen != ED25519_SIG_SIZE || (sig[ED25519_SIG_SIZE-1] & 224)) in ed25519_verify_msg_init_with_sha() 602 if (sigLen != ED25519_SIG_SIZE || (sig[ED25519_SIG_SIZE-1] & 224)) in ed25519_verify_msg_final_with_sha() 651 return ed25519_verify_msg_init_with_sha(sig, sigLen, key, &key->sha, in wc_ed25519_verify_msg_init() 661 int wc_ed25519_verify_msg_final(const byte* sig, word32 sigLen, int* res, in wc_ed25519_verify_msg_final() argument 663 return ed25519_verify_msg_final_with_sha(sig, sigLen, res, in wc_ed25519_verify_msg_final() 688 ret = se050_ed25519_verify_msg(sig, sigLen, msg, msgLen, key, res); in wc_ed25519_verify_msg_ex() 742 int wc_ed25519_verify_msg(const byte* sig, word32 sigLen, const byte* msg, in wc_ed25519_verify_msg() argument 745 return wc_ed25519_verify_msg_ex(sig, sigLen, msg, msgLen, res, key, in wc_ed25519_verify_msg() 764 return wc_ed25519_verify_msg_ex(sig, sigLen, msg, msgLen, res, key, in wc_ed25519ctx_verify_msg() [all …]
|