/freebsd/crypto/openssh/ |
H A D | ssh-ed25519.c | 153 unsigned long long smlen; in ssh_ed25519_sign() local 167 smlen = slen = datalen + crypto_sign_ed25519_BYTES; in ssh_ed25519_sign() 171 if ((ret = crypto_sign_ed25519(sig, &smlen, data, datalen, in ssh_ed25519_sign() 172 key->ed25519_sk)) != 0 || smlen <= datalen) { in ssh_ed25519_sign() 182 (r = sshbuf_put_string(b, sig, smlen - datalen)) != 0) in ssh_ed25519_sign() 215 unsigned long long smlen = 0, mlen = 0; in ssh_ed25519_verify() local 246 smlen = len + dlen; in ssh_ed25519_verify() 247 mlen = smlen; in ssh_ed25519_verify() 248 if ((sm = malloc(smlen)) == NULL || (m = malloc(mlen)) == NULL) { in ssh_ed25519_verify() 254 if ((ret = crypto_sign_ed25519_open(m, &mlen, sm, smlen, in ssh_ed25519_verify() [all …]
|
H A D | ssh-xmss.c | 208 unsigned long long smlen; in ssh_xmss_sign() local 226 smlen = slen = datalen + required_siglen; in ssh_xmss_sign() 231 if ((ret = xmss_sign(key->xmss_sk, sshkey_xmss_bds_state(key), sig, &smlen, in ssh_xmss_sign() 232 data, datalen, sshkey_xmss_params(key))) != 0 || smlen <= datalen) { in ssh_xmss_sign() 242 (r = sshbuf_put_string(b, sig, smlen - datalen)) != 0) in ssh_xmss_sign() 287 unsigned long long smlen = 0, mlen = 0; in ssh_xmss_verify() local 322 smlen = len + dlen; in ssh_xmss_verify() 323 mlen = smlen; in ssh_xmss_verify() 324 if ((sm = malloc(smlen)) == NULL || (m = malloc(mlen)) == NULL) { in ssh_xmss_verify() 330 if ((ret = xmss_sign_open(m, &mlen, sm, smlen, in ssh_xmss_verify() [all …]
|
H A D | ssh-ed25519-sk.c | 141 unsigned long long smlen = 0, mlen = 0; in ssh_ed25519_sk_verify() local 220 smlen = sshbuf_len(encoded); in ssh_ed25519_sk_verify() 221 mlen = smlen; in ssh_ed25519_sk_verify() 222 if ((m = malloc(smlen)) == NULL) { in ssh_ed25519_sk_verify() 226 if ((ret = crypto_sign_ed25519_open(m, &mlen, sm, smlen, in ssh_ed25519_sk_verify() 230 if (ret != 0 || mlen != smlen - len) { in ssh_ed25519_sk_verify() 243 freezero(m, smlen); /* NB mlen may be invalid if r != 0 */ in ssh_ed25519_sk_verify()
|
H A D | ed25519.c | 1935 unsigned char *sm,unsigned long long *smlen, in crypto_sign_ed25519() argument 1956 *smlen = mlen + 64; in crypto_sign_ed25519() 1990 const unsigned char *sm,unsigned long long smlen, in crypto_sign_ed25519_open() argument 2001 if (smlen < 64) goto badsig; in crypto_sign_ed25519_open() 2010 memmove(m,sm,smlen); in crypto_sign_ed25519_open() 2012 crypto_hash_sha512(hram,m,smlen); in crypto_sign_ed25519_open() 2020 memmove(m,m + 64,smlen - 64); in crypto_sign_ed25519_open() 2021 memset(m + smlen - 64,0,64); in crypto_sign_ed25519_open() 2022 *mlen = smlen - 64; in crypto_sign_ed25519_open() 2028 memset(m,0,smlen); in crypto_sign_ed25519_open()
|
H A D | sshkey-xmss.c | 540 unsigned long long smlen; in sshkey_xmss_forward_state() local 556 smlen = required_siglen; in sshkey_xmss_forward_state() 558 sig, &smlen, &data, 0, sshkey_xmss_params(k))) != 0) { in sshkey_xmss_forward_state()
|
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ |
H A D | obsolete.c | 72 unsigned long long smlen, in crypto_sign_edwards25519sha512batch_open() argument 86 if (smlen < 64 || smlen - 64 > crypto_sign_edwards25519sha512batch_MESSAGEBYTES_MAX) { in crypto_sign_edwards25519sha512batch_open() 89 mlen = smlen - 64; in crypto_sign_edwards25519sha512batch_open() 90 if (sm[smlen - 1] & 224) { in crypto_sign_edwards25519sha512batch_open()
|
H A D | open.c | 68 const unsigned char *sm, unsigned long long smlen, in crypto_sign_ed25519_open() argument 73 if (smlen < 64 || smlen - 64 > crypto_sign_ed25519_MESSAGEBYTES_MAX) { in crypto_sign_ed25519_open() 76 mlen = smlen - 64; in crypto_sign_ed25519_open()
|
/freebsd/sys/contrib/libsodium/test/default/ |
H A D | sign.c | 1082 unsigned long long smlen; in main() local 1097 if (crypto_sign(sm, &smlen, (const unsigned char *)test_data[i].m, i, in main() 1106 if (crypto_sign_open(m, NULL, sm, smlen, test_data[i].pk) != 0) { in main() 1112 if (crypto_sign_open(m, &mlen, sm, smlen, test_data[i].pk) != -1) { in main() 1117 if (crypto_sign_open(m, &mlen, sm, smlen, test_data[i].pk) != 0) { in main() 1127 if (crypto_sign_open(m, &mlen, sm, smlen, test_data[i].pk) == 0) { in main() 1163 if (crypto_sign(sm, &smlen, sm, i, skpk) != 0) { in main() 1166 if (crypto_sign_open(sm, &mlen, sm, smlen, test_data[i].pk) != 0) { in main()
|
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_sign/ |
H A D | crypto_sign.c | 69 const unsigned char *sm, unsigned long long smlen, in crypto_sign_open() argument 72 return crypto_sign_ed25519_open(m, mlen_p, sm, smlen, pk); in crypto_sign_open()
|
/freebsd/crypto/openssh/regress/misc/sk-dummy/ |
H A D | sk-dummy.c | 416 unsigned long long smlen; in sig_ed25519() local 450 smlen = sizeof(signbuf); in sig_ed25519() 451 if (crypto_sign_ed25519(sig, &smlen, signbuf, sizeof(signbuf), in sig_ed25519() 456 if (smlen <= sizeof(signbuf)) { in sig_ed25519() 458 smlen, sizeof(signbuf) + 1); in sig_ed25519() 461 response->sig_r_len = (size_t)(smlen - sizeof(signbuf)); in sig_ed25519()
|
/freebsd/sys/contrib/libsodium/src/libsodium/include/sodium/ |
H A D | crypto_sign_edwards25519sha512batch.h | 42 unsigned long long smlen,
|
H A D | crypto_sign.h | 66 const unsigned char *sm, unsigned long long smlen,
|
H A D | crypto_sign_ed25519.h | 49 const unsigned char *sm, unsigned long long smlen,
|