Home
last modified time | relevance | path

Searched refs:sigLen (Results 1 – 25 of 572) sorted by relevance

12345678910>>...23

/dports/www/firefox-esr/firefox-91.8.0/security/nss/gtests/pk11_gtest/
H A Dpk11_signature_test.cc62 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignHashedData() local
63 EXPECT_LT(0, (int)sigLen); in SignHashedData()
64 sig->Allocate(static_cast<size_t>(sigLen)); in SignHashedData()
69 EXPECT_EQ(sigLen, sigItem.len); in SignHashedData()
75 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignData() local
77 EXPECT_LT(0, (int)sigLen); in SignData()
78 sig->Allocate(static_cast<size_t>(sigLen)); in SignData()
97 unsigned int len = sigLen; in SignData()
98 rv = PK11_DigestFinal(context, sig->data(), &len, sigLen); in SignData()
104 if (len != sigLen) { in SignData()
[all …]
/dports/www/firefox/firefox-99.0/security/nss/gtests/pk11_gtest/
H A Dpk11_signature_test.cc62 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignHashedData() local
63 EXPECT_LT(0, (int)sigLen); in SignHashedData()
64 sig->Allocate(static_cast<size_t>(sigLen)); in SignHashedData()
69 EXPECT_EQ(sigLen, sigItem.len); in SignHashedData()
75 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignData() local
77 EXPECT_LT(0, (int)sigLen); in SignData()
78 sig->Allocate(static_cast<size_t>(sigLen)); in SignData()
97 unsigned int len = sigLen; in SignData()
98 rv = PK11_DigestFinal(context, sig->data(), &len, sigLen); in SignData()
104 if (len != sigLen) { in SignData()
[all …]
/dports/security/ca_root_nss/nss-3.71/nss/gtests/pk11_gtest/
H A Dpk11_signature_test.cc62 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignHashedData() local
63 EXPECT_LT(0, (int)sigLen); in SignHashedData()
64 sig->Allocate(static_cast<size_t>(sigLen)); in SignHashedData()
69 EXPECT_EQ(sigLen, sigItem.len); in SignHashedData()
75 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignData() local
77 EXPECT_LT(0, (int)sigLen); in SignData()
78 sig->Allocate(static_cast<size_t>(sigLen)); in SignData()
97 unsigned int len = sigLen; in SignData()
98 rv = PK11_DigestFinal(context, sig->data(), &len, sigLen); in SignData()
104 if (len != sigLen) { in SignData()
[all …]
/dports/security/nss/nss-3.76.1/nss/gtests/pk11_gtest/
H A Dpk11_signature_test.cc62 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignHashedData() local
63 EXPECT_LT(0, (int)sigLen); in SignHashedData()
64 sig->Allocate(static_cast<size_t>(sigLen)); in SignHashedData()
69 EXPECT_EQ(sigLen, sigItem.len); in SignHashedData()
75 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignData() local
77 EXPECT_LT(0, (int)sigLen); in SignData()
78 sig->Allocate(static_cast<size_t>(sigLen)); in SignData()
97 unsigned int len = sigLen; in SignData()
98 rv = PK11_DigestFinal(context, sig->data(), &len, sigLen); in SignData()
104 if (len != sigLen) { in SignData()
[all …]
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/gtests/pk11_gtest/
H A Dpk11_signature_test.cc62 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignHashedData() local
63 EXPECT_LT(0, (int)sigLen); in SignHashedData()
64 sig->Allocate(static_cast<size_t>(sigLen)); in SignHashedData()
69 EXPECT_EQ(sigLen, sigItem.len); in SignHashedData()
75 unsigned int sigLen = PK11_SignatureLen(privKey.get()); in SignData() local
77 EXPECT_LT(0, (int)sigLen); in SignData()
78 sig->Allocate(static_cast<size_t>(sigLen)); in SignData()
97 unsigned int len = sigLen; in SignData()
98 rv = PK11_DigestFinal(context, sig->data(), &len, sigLen); in SignData()
104 if (len != sigLen) { in SignData()
[all …]
/dports/security/softhsm2/softhsm-2.6.1/src/lib/crypto/
H A DOSSLDSA.cpp82 unsigned int sigLen = pk->getOutputLength(); in sign() local
83 signature.resize(sigLen); in sign()
84 memset(&signature[0], 0, sigLen); in sign()
222 unsigned int sigLen = pk->getOutputLength(); in signFinal() local
223 signature.resize(sigLen); in signFinal()
224 memset(&signature[0], 0, sigLen); in signFinal()
258 if (signature.size() != sigLen) in verify()
265 BIGNUM* bn_s = BN_bin2bn(s + sigLen / 2, sigLen / 2, NULL); in verify()
409 unsigned int sigLen = pk->getOutputLength(); in verifyFinal() local
410 if (signature.size() != sigLen) in verifyFinal()
[all …]
/dports/textproc/teckit/teckit-2.5.7/source/Sample-tools/
H A DTxtConv.cpp376 size_t sigLen; in main() local
384 sigLen = fread(sig, 1, 4, inFile); in main()
389 else if (sigLen >= 2 && sig[0] == 0xfe && sig[1] == 0xff) { in main()
397 else if (sigLen >= 2 && sig[0] == 0xff && sig[1] == 0xfe) { in main()
412 sigLen = fread(sig, 1, 3, inFile); in main()
418 sigLen = fread(sig, 1, 2, inFile); in main()
419 if (sigLen >= 2 && !(sig[0] == 0xfe && sig[1] == 0xff)) in main()
424 sigLen = fread(sig, 1, 2, inFile); in main()
425 if (sigLen >= 2 && !(sig[0] == 0xff && sig[1] == 0xfe)) in main()
430 sigLen = fread(sig, 1, 4, inFile); in main()
[all …]
/dports/www/firefox-esr/firefox-91.8.0/security/nss/lib/softoken/
H A Dtlsprf.c71 unsigned int *sigLen, /* how much output. */ in sftk_TLSPRFUpdate() argument
106 if (rv == SECSuccess && sigLen != NULL) in sftk_TLSPRFUpdate()
107 *sigLen = sigItem.len; in sftk_TLSPRFUpdate()
114 unsigned int sigLen, /* length of sig. */ in sftk_TLSPRFVerify() argument
118 unsigned char *tmp = (unsigned char *)PORT_Alloc(sigLen); in sftk_TLSPRFVerify()
119 unsigned int tmpLen = sigLen; in sftk_TLSPRFVerify()
130 rv = sftk_TLSPRFUpdate(cx, tmp, &tmpLen, sigLen, NULL, 0); in sftk_TLSPRFVerify()
132 rv = (SECStatus)(1 - !NSS_SecureMemcmp(tmp, sig, sigLen)); in sftk_TLSPRFVerify()
134 PORT_ZFree(tmp, sigLen); in sftk_TLSPRFVerify()
/dports/www/firefox/firefox-99.0/security/nss/lib/softoken/
H A Dtlsprf.c71 unsigned int *sigLen, /* how much output. */ in sftk_TLSPRFUpdate() argument
106 if (rv == SECSuccess && sigLen != NULL) in sftk_TLSPRFUpdate()
107 *sigLen = sigItem.len; in sftk_TLSPRFUpdate()
114 unsigned int sigLen, /* length of sig. */ in sftk_TLSPRFVerify() argument
118 unsigned char *tmp = (unsigned char *)PORT_Alloc(sigLen); in sftk_TLSPRFVerify()
119 unsigned int tmpLen = sigLen; in sftk_TLSPRFVerify()
130 rv = sftk_TLSPRFUpdate(cx, tmp, &tmpLen, sigLen, NULL, 0); in sftk_TLSPRFVerify()
132 rv = (SECStatus)(1 - !NSS_SecureMemcmp(tmp, sig, sigLen)); in sftk_TLSPRFVerify()
134 PORT_ZFree(tmp, sigLen); in sftk_TLSPRFVerify()
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/lib/softoken/
H A Dtlsprf.c71 unsigned int *sigLen, /* how much output. */ in sftk_TLSPRFUpdate() argument
106 if (rv == SECSuccess && sigLen != NULL) in sftk_TLSPRFUpdate()
107 *sigLen = sigItem.len; in sftk_TLSPRFUpdate()
114 unsigned int sigLen, /* length of sig. */ in sftk_TLSPRFVerify() argument
118 unsigned char *tmp = (unsigned char *)PORT_Alloc(sigLen); in sftk_TLSPRFVerify()
119 unsigned int tmpLen = sigLen; in sftk_TLSPRFVerify()
130 rv = sftk_TLSPRFUpdate(cx, tmp, &tmpLen, sigLen, NULL, 0); in sftk_TLSPRFVerify()
132 rv = (SECStatus)(1 - !PORT_Memcmp(tmp, sig, sigLen)); in sftk_TLSPRFVerify()
134 PORT_ZFree(tmp, sigLen); in sftk_TLSPRFVerify()
/dports/security/ca_root_nss/nss-3.71/nss/lib/softoken/
H A Dtlsprf.c71 unsigned int *sigLen, /* how much output. */ in sftk_TLSPRFUpdate() argument
106 if (rv == SECSuccess && sigLen != NULL) in sftk_TLSPRFUpdate()
107 *sigLen = sigItem.len; in sftk_TLSPRFUpdate()
114 unsigned int sigLen, /* length of sig. */ in sftk_TLSPRFVerify() argument
118 unsigned char *tmp = (unsigned char *)PORT_Alloc(sigLen); in sftk_TLSPRFVerify()
119 unsigned int tmpLen = sigLen; in sftk_TLSPRFVerify()
130 rv = sftk_TLSPRFUpdate(cx, tmp, &tmpLen, sigLen, NULL, 0); in sftk_TLSPRFVerify()
132 rv = (SECStatus)(1 - !NSS_SecureMemcmp(tmp, sig, sigLen)); in sftk_TLSPRFVerify()
134 PORT_ZFree(tmp, sigLen); in sftk_TLSPRFVerify()
/dports/www/firefox-legacy/firefox-52.8.0esr/security/nss/lib/softoken/
H A Dtlsprf.c71 unsigned int *sigLen, /* how much output. */ in sftk_TLSPRFUpdate() argument
106 if (rv == SECSuccess && sigLen != NULL) in sftk_TLSPRFUpdate()
107 *sigLen = sigItem.len; in sftk_TLSPRFUpdate()
114 unsigned int sigLen, /* length of sig. */ in sftk_TLSPRFVerify() argument
118 unsigned char *tmp = (unsigned char *)PORT_Alloc(sigLen); in sftk_TLSPRFVerify()
119 unsigned int tmpLen = sigLen; in sftk_TLSPRFVerify()
130 rv = sftk_TLSPRFUpdate(cx, tmp, &tmpLen, sigLen, NULL, 0); in sftk_TLSPRFVerify()
132 rv = (SECStatus)(1 - !PORT_Memcmp(tmp, sig, sigLen)); in sftk_TLSPRFVerify()
134 PORT_ZFree(tmp, sigLen); in sftk_TLSPRFVerify()
/dports/security/nss/nss-3.76.1/nss/lib/softoken/
H A Dtlsprf.c71 unsigned int *sigLen, /* how much output. */ in sftk_TLSPRFUpdate() argument
106 if (rv == SECSuccess && sigLen != NULL) in sftk_TLSPRFUpdate()
107 *sigLen = sigItem.len; in sftk_TLSPRFUpdate()
114 unsigned int sigLen, /* length of sig. */ in sftk_TLSPRFVerify() argument
118 unsigned char *tmp = (unsigned char *)PORT_Alloc(sigLen); in sftk_TLSPRFVerify()
119 unsigned int tmpLen = sigLen; in sftk_TLSPRFVerify()
130 rv = sftk_TLSPRFUpdate(cx, tmp, &tmpLen, sigLen, NULL, 0); in sftk_TLSPRFVerify()
132 rv = (SECStatus)(1 - !NSS_SecureMemcmp(tmp, sig, sigLen)); in sftk_TLSPRFVerify()
134 PORT_ZFree(tmp, sigLen); in sftk_TLSPRFVerify()
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/lib/softoken/
H A Dtlsprf.c71 unsigned int *sigLen, /* how much output. */ in sftk_TLSPRFUpdate() argument
106 if (rv == SECSuccess && sigLen != NULL) in sftk_TLSPRFUpdate()
107 *sigLen = sigItem.len; in sftk_TLSPRFUpdate()
114 unsigned int sigLen, /* length of sig. */ in sftk_TLSPRFVerify() argument
118 unsigned char *tmp = (unsigned char *)PORT_Alloc(sigLen); in sftk_TLSPRFVerify()
119 unsigned int tmpLen = sigLen; in sftk_TLSPRFVerify()
130 rv = sftk_TLSPRFUpdate(cx, tmp, &tmpLen, sigLen, NULL, 0); in sftk_TLSPRFVerify()
132 rv = (SECStatus)(1 - !NSS_SecureMemcmp(tmp, sig, sigLen)); in sftk_TLSPRFVerify()
134 PORT_ZFree(tmp, sigLen); in sftk_TLSPRFVerify()
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/lib/softoken/
H A Dtlsprf.c71 unsigned int *sigLen, /* how much output. */ in sftk_TLSPRFUpdate() argument
106 if (rv == SECSuccess && sigLen != NULL) in sftk_TLSPRFUpdate()
107 *sigLen = sigItem.len; in sftk_TLSPRFUpdate()
114 unsigned int sigLen, /* length of sig. */ in sftk_TLSPRFVerify() argument
118 unsigned char *tmp = (unsigned char *)PORT_Alloc(sigLen); in sftk_TLSPRFVerify()
119 unsigned int tmpLen = sigLen; in sftk_TLSPRFVerify()
130 rv = sftk_TLSPRFUpdate(cx, tmp, &tmpLen, sigLen, NULL, 0); in sftk_TLSPRFVerify()
132 rv = (SECStatus)(1 - !NSS_SecureMemcmp(tmp, sig, sigLen)); in sftk_TLSPRFVerify()
134 PORT_ZFree(tmp, sigLen); in sftk_TLSPRFVerify()
/dports/audio/audacity/audacity-Audacity-3.1.3/src/import/
H A DSpecPowerMeter.cpp27 SpecPowerCalculation::SpecPowerCalculation(size_t sigLen) in SpecPowerCalculation() argument
28 : mSigLen(sigLen) in SpecPowerCalculation()
29 , mSigI{ sigLen, true } in SpecPowerCalculation()
30 , mSigFR{ sigLen }
31 , mSigFI{ sigLen }
/dports/java/bouncycastle15/crypto-169/core/src/main/java/org/bouncycastle/pqc/crypto/lms/
H A DLMOtsParameters.java32 private final int sigLen; field in LMOtsParameters
35 …protected LMOtsParameters(int type, int n, int w, int p, int ls, int sigLen, ASN1ObjectIdentifier … in LMOtsParameters() argument
42 this.sigLen = sigLen; in LMOtsParameters()
73 return sigLen; in getSigLen()
/dports/security/wolfssl/wolfssl-5.1.0/wolfcrypt/src/port/kcapi/
H A Dkcapi_ecc.c179 word32* sigLen) in KcapiEcc_Sign() argument
214 sig_aligned, *sigLen, in KcapiEcc_Sign()
217 *sigLen = ret; in KcapiEcc_Sign()
254 word32 sigLen) in KcapiEcc_Verify() argument
271 ret = posix_memalign((void*)&sigHash_aligned, pageSz, sigLen + hashLen); in KcapiEcc_Verify()
277 XMEMCPY(sigHash_aligned, sig, sigLen); in KcapiEcc_Verify()
278 XMEMCPY(sigHash_aligned + sigLen, hash, hashLen); in KcapiEcc_Verify()
281 sigLen + hashLen, NULL, hashLen, KCAPI_ACCESS_HEURISTIC); in KcapiEcc_Verify()
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/port/kcapi/
H A Dkcapi_ecc.c179 word32* sigLen) in KcapiEcc_Sign() argument
214 sig_aligned, *sigLen, in KcapiEcc_Sign()
217 *sigLen = ret; in KcapiEcc_Sign()
254 word32 sigLen) in KcapiEcc_Verify() argument
271 ret = posix_memalign((void*)&sigHash_aligned, pageSz, sigLen + hashLen); in KcapiEcc_Verify()
277 XMEMCPY(sigHash_aligned, sig, sigLen); in KcapiEcc_Verify()
278 XMEMCPY(sigHash_aligned + sigLen, hash, hashLen); in KcapiEcc_Verify()
281 sigLen + hashLen, NULL, hashLen, KCAPI_ACCESS_HEURISTIC); in KcapiEcc_Verify()
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/port/kcapi/
H A Dkcapi_ecc.c179 word32* sigLen) in KcapiEcc_Sign() argument
214 sig_aligned, *sigLen, in KcapiEcc_Sign()
217 *sigLen = ret; in KcapiEcc_Sign()
254 word32 sigLen) in KcapiEcc_Verify() argument
271 ret = posix_memalign((void*)&sigHash_aligned, pageSz, sigLen + hashLen); in KcapiEcc_Verify()
277 XMEMCPY(sigHash_aligned, sig, sigLen); in KcapiEcc_Verify()
278 XMEMCPY(sigHash_aligned + sigLen, hash, hashLen); in KcapiEcc_Verify()
281 sigLen + hashLen, NULL, hashLen, KCAPI_ACCESS_HEURISTIC); in KcapiEcc_Verify()
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/port/kcapi/
H A Dkcapi_ecc.c179 word32* sigLen) in KcapiEcc_Sign() argument
214 sig_aligned, *sigLen, in KcapiEcc_Sign()
217 *sigLen = ret; in KcapiEcc_Sign()
254 word32 sigLen) in KcapiEcc_Verify() argument
271 ret = posix_memalign((void*)&sigHash_aligned, pageSz, sigLen + hashLen); in KcapiEcc_Verify()
277 XMEMCPY(sigHash_aligned, sig, sigLen); in KcapiEcc_Verify()
278 XMEMCPY(sigHash_aligned + sigLen, hash, hashLen); in KcapiEcc_Verify()
281 sigLen + hashLen, NULL, hashLen, KCAPI_ACCESS_HEURISTIC); in KcapiEcc_Verify()
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/port/kcapi/
H A Dkcapi_ecc.c179 word32* sigLen) in KcapiEcc_Sign() argument
214 sig_aligned, *sigLen, in KcapiEcc_Sign()
217 *sigLen = ret; in KcapiEcc_Sign()
254 word32 sigLen) in KcapiEcc_Verify() argument
271 ret = posix_memalign((void*)&sigHash_aligned, pageSz, sigLen + hashLen); in KcapiEcc_Verify()
277 XMEMCPY(sigHash_aligned, sig, sigLen); in KcapiEcc_Verify()
278 XMEMCPY(sigHash_aligned + sigLen, hash, hashLen); in KcapiEcc_Verify()
281 sigLen + hashLen, NULL, hashLen, KCAPI_ACCESS_HEURISTIC); in KcapiEcc_Verify()
/dports/security/wolfssl/wolfssl-5.1.0/wolfcrypt/src/
H A Ded25519.c514 static int ed25519_verify_msg_init_with_sha(const byte* sig, word32 sigLen, in ed25519_verify_msg_init_with_sha() argument
528 if (sigLen != ED25519_SIG_SIZE || (sig[ED25519_SIG_SIZE-1] & 224)) in ed25519_verify_msg_init_with_sha()
602 if (sigLen != ED25519_SIG_SIZE || (sig[ED25519_SIG_SIZE-1] & 224)) in ed25519_verify_msg_final_with_sha()
651 return ed25519_verify_msg_init_with_sha(sig, sigLen, key, &key->sha, in wc_ed25519_verify_msg_init()
661 int wc_ed25519_verify_msg_final(const byte* sig, word32 sigLen, int* res, in wc_ed25519_verify_msg_final() argument
663 return ed25519_verify_msg_final_with_sha(sig, sigLen, res, in wc_ed25519_verify_msg_final()
688 ret = se050_ed25519_verify_msg(sig, sigLen, msg, msgLen, key, res); in wc_ed25519_verify_msg_ex()
742 int wc_ed25519_verify_msg(const byte* sig, word32 sigLen, const byte* msg, in wc_ed25519_verify_msg() argument
745 return wc_ed25519_verify_msg_ex(sig, sigLen, msg, msgLen, res, key, in wc_ed25519_verify_msg()
764 return wc_ed25519_verify_msg_ex(sig, sigLen, msg, msgLen, res, key, in wc_ed25519ctx_verify_msg()
[all …]
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/wolfcrypt/src/
H A Ded25519.c514 static int ed25519_verify_msg_init_with_sha(const byte* sig, word32 sigLen, in ed25519_verify_msg_init_with_sha() argument
528 if (sigLen != ED25519_SIG_SIZE || (sig[ED25519_SIG_SIZE-1] & 224)) in ed25519_verify_msg_init_with_sha()
602 if (sigLen != ED25519_SIG_SIZE || (sig[ED25519_SIG_SIZE-1] & 224)) in ed25519_verify_msg_final_with_sha()
651 return ed25519_verify_msg_init_with_sha(sig, sigLen, key, &key->sha, in wc_ed25519_verify_msg_init()
661 int wc_ed25519_verify_msg_final(const byte* sig, word32 sigLen, int* res, in wc_ed25519_verify_msg_final() argument
663 return ed25519_verify_msg_final_with_sha(sig, sigLen, res, in wc_ed25519_verify_msg_final()
688 ret = se050_ed25519_verify_msg(sig, sigLen, msg, msgLen, key, res); in wc_ed25519_verify_msg_ex()
742 int wc_ed25519_verify_msg(const byte* sig, word32 sigLen, const byte* msg, in wc_ed25519_verify_msg() argument
745 return wc_ed25519_verify_msg_ex(sig, sigLen, msg, msgLen, res, key, in wc_ed25519_verify_msg()
764 return wc_ed25519_verify_msg_ex(sig, sigLen, msg, msgLen, res, key, in wc_ed25519ctx_verify_msg()
[all …]
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/wolfcrypt/src/
H A Ded25519.c514 static int ed25519_verify_msg_init_with_sha(const byte* sig, word32 sigLen, in ed25519_verify_msg_init_with_sha() argument
528 if (sigLen != ED25519_SIG_SIZE || (sig[ED25519_SIG_SIZE-1] & 224)) in ed25519_verify_msg_init_with_sha()
602 if (sigLen != ED25519_SIG_SIZE || (sig[ED25519_SIG_SIZE-1] & 224)) in ed25519_verify_msg_final_with_sha()
651 return ed25519_verify_msg_init_with_sha(sig, sigLen, key, &key->sha, in wc_ed25519_verify_msg_init()
661 int wc_ed25519_verify_msg_final(const byte* sig, word32 sigLen, int* res, in wc_ed25519_verify_msg_final() argument
663 return ed25519_verify_msg_final_with_sha(sig, sigLen, res, in wc_ed25519_verify_msg_final()
688 ret = se050_ed25519_verify_msg(sig, sigLen, msg, msgLen, key, res); in wc_ed25519_verify_msg_ex()
742 int wc_ed25519_verify_msg(const byte* sig, word32 sigLen, const byte* msg, in wc_ed25519_verify_msg() argument
745 return wc_ed25519_verify_msg_ex(sig, sigLen, msg, msgLen, res, key, in wc_ed25519_verify_msg()
764 return wc_ed25519_verify_msg_ex(sig, sigLen, msg, msgLen, res, key, in wc_ed25519ctx_verify_msg()
[all …]

12345678910>>...23