| /freebsd/crypto/openssh/ |
| H A D | ssh-ed25519.c | 152 unsigned long long smlen; in ssh_ed25519_sign() local 165 smlen = slen = datalen + crypto_sign_ed25519_BYTES; in ssh_ed25519_sign() 169 if ((ret = crypto_sign_ed25519(sig, &smlen, data, datalen, in ssh_ed25519_sign() 170 key->ed25519_sk)) != 0 || smlen <= datalen) { in ssh_ed25519_sign() 174 if ((r = ssh_ed25519_encode_store_sig(sig, smlen - datalen, in ssh_ed25519_sign() 237 unsigned long long smlen = 0, mlen = 0; in ssh_ed25519_verify() local 268 smlen = len + dlen; in ssh_ed25519_verify() 269 mlen = smlen; in ssh_ed25519_verify() 270 if ((sm = malloc(smlen)) == NULL || (m = malloc(mlen)) == NULL) { in ssh_ed25519_verify() 276 if ((ret = crypto_sign_ed25519_open(m, &mlen, sm, smlen, in ssh_ed25519_verify() [all …]
|
| H A D | ed25519-openssl.c | 99 crypto_sign_ed25519(unsigned char *sm, unsigned long long *smlen, in crypto_sign_ed25519() argument 141 *smlen = siglen + mlen; in crypto_sign_ed25519() 152 const unsigned char *sm, unsigned long long smlen, in crypto_sign_ed25519_open() argument 161 if (smlen < crypto_sign_ed25519_BYTES) { in crypto_sign_ed25519_open() 162 debug3_f("signed message bad length: %llu", smlen); in crypto_sign_ed25519_open() 167 msglen = smlen - crypto_sign_ed25519_BYTES; in crypto_sign_ed25519_open()
|
| H A D | ssh-ed25519-sk.c | 139 unsigned long long smlen = 0, mlen = 0; in ssh_ed25519_sk_verify() local 218 smlen = sshbuf_len(encoded); in ssh_ed25519_sk_verify() 219 mlen = smlen; in ssh_ed25519_sk_verify() 220 if ((m = malloc(smlen)) == NULL) { in ssh_ed25519_sk_verify() 224 if ((ret = crypto_sign_ed25519_open(m, &mlen, sm, smlen, in ssh_ed25519_sk_verify() 228 if (ret != 0 || mlen != smlen - len) { in ssh_ed25519_sk_verify() 241 freezero(m, smlen); /* NB mlen may be invalid if r != 0 */ in ssh_ed25519_sk_verify()
|
| H A D | ed25519.c | 1937 unsigned char *sm,unsigned long long *smlen, in crypto_sign_ed25519() argument 1958 *smlen = mlen + 64; in crypto_sign_ed25519() 1992 const unsigned char *sm,unsigned long long smlen, in crypto_sign_ed25519_open() argument 2003 if (smlen < 64) goto badsig; in crypto_sign_ed25519_open() 2012 memmove(m,sm,smlen); in crypto_sign_ed25519_open() 2014 crypto_hash_sha512(hram,m,smlen); in crypto_sign_ed25519_open() 2022 memmove(m,m + 64,smlen - 64); in crypto_sign_ed25519_open() 2023 memset(m + smlen - 64,0,64); in crypto_sign_ed25519_open() 2024 *mlen = smlen - 64; in crypto_sign_ed25519_open() 2030 memset(m,0,smlen); in crypto_sign_ed25519_open()
|
| /freebsd/sys/contrib/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ |
| H A D | obsolete.c | 72 unsigned long long smlen, in crypto_sign_edwards25519sha512batch_open() argument 86 if (smlen < 64 || smlen - 64 > crypto_sign_edwards25519sha512batch_MESSAGEBYTES_MAX) { in crypto_sign_edwards25519sha512batch_open() 89 mlen = smlen - 64; in crypto_sign_edwards25519sha512batch_open() 90 if (sm[smlen - 1] & 224) { in crypto_sign_edwards25519sha512batch_open()
|
| H A D | open.c | 68 const unsigned char *sm, unsigned long long smlen, in crypto_sign_ed25519_open() argument 73 if (smlen < 64 || smlen - 64 > crypto_sign_ed25519_MESSAGEBYTES_MAX) { in crypto_sign_ed25519_open() 76 mlen = smlen - 64; in crypto_sign_ed25519_open()
|
| /freebsd/sys/contrib/libsodium/test/default/ |
| H A D | sign.c | 1082 unsigned long long smlen; in main() local 1097 if (crypto_sign(sm, &smlen, (const unsigned char *)test_data[i].m, i, in main() 1106 if (crypto_sign_open(m, NULL, sm, smlen, test_data[i].pk) != 0) { in main() 1112 if (crypto_sign_open(m, &mlen, sm, smlen, test_data[i].pk) != -1) { in main() 1117 if (crypto_sign_open(m, &mlen, sm, smlen, test_data[i].pk) != 0) { in main() 1127 if (crypto_sign_open(m, &mlen, sm, smlen, test_data[i].pk) == 0) { in main() 1163 if (crypto_sign(sm, &smlen, sm, i, skpk) != 0) { in main() 1166 if (crypto_sign_open(sm, &mlen, sm, smlen, test_data[i].pk) != 0) { in main()
|
| /freebsd/sys/contrib/libsodium/src/libsodium/crypto_sign/ |
| H A D | crypto_sign.c | 69 const unsigned char *sm, unsigned long long smlen, in crypto_sign_open() argument 72 return crypto_sign_ed25519_open(m, mlen_p, sm, smlen, pk); in crypto_sign_open()
|
| /freebsd/crypto/openssh/regress/misc/sk-dummy/ |
| H A D | sk-dummy.c | 415 unsigned long long smlen; in sig_ed25519() local 449 smlen = sizeof(signbuf); in sig_ed25519() 450 if (crypto_sign_ed25519(sig, &smlen, signbuf, sizeof(signbuf), in sig_ed25519() 455 if (smlen <= sizeof(signbuf)) { in sig_ed25519() 457 smlen, sizeof(signbuf) + 1); in sig_ed25519() 460 response->sig_r_len = (size_t)(smlen - sizeof(signbuf)); in sig_ed25519()
|
| /freebsd/sys/contrib/libsodium/src/libsodium/include/sodium/ |
| H A D | crypto_sign_edwards25519sha512batch.h | 42 unsigned long long smlen,
|
| H A D | crypto_sign.h | 66 const unsigned char *sm, unsigned long long smlen,
|
| H A D | crypto_sign_ed25519.h | 49 const unsigned char *sm, unsigned long long smlen,
|