Project homepage Mailing List  Warmcat.com  API Docs  Github Mirror 
{"schema":"libjg2-1", "vpath":"/git/", "avatar":"/git/avatar/", "alang":"", "gen_ut":1753078232, "reponame":"openssl", "desc":"OpenSSL", "owner": { "name": "Andy Green", "email": "andy@warmcat.com", "md5": "c50933ca2aa61e0fe2c43d46bb6b59cb" },"url":"https://warmcat.com/repo/openssl", "f":3, "items": [ {"schema":"libjg2-1", "cid":"ee4a3bcd397a6f574aad3d74b592a98f", "commit": {"type":"commit", "time": 1519131570, "time_ofs": 0, "oid_tree": { "oid": "3c9482cf70678b05dfd58e9dfe8bb257e3d2a910", "alias": []}, "oid":{ "oid": "22bcc9cb7fbd1433924bd9738cb34f9dfbb35c91", "alias": []}, "msg": "Fix the ED448 key lengths", "sig_commit": { "git_time": { "time": 1519131570, "offset": 0 }, "name": "Matt Caswell", "email": "matt@openssl.org", "md5": "10f7b441a32d5790efad9fc68cae4af2" }, "sig_author": { "git_time": { "time": 1511893431, "offset": 0 }, "name": "Matt Caswell", "email": "matt@openssl.org", "md5": "10f7b441a32d5790efad9fc68cae4af2" }}, "body": "Fix the ED448 key lengths\n\nUnlike X448 the key lengths for ED448 are 57 bytes (as opposed to 56)\n\nReviewed-by: Bernd Edlinger \u003cbernd.edlinger@hotmail.de\u003e\n(Merged from https://github.com/openssl/openssl/pull/5105)\n" , "diff": "diff --git a/crypto/ec/curve448/curve448_lcl.h b/crypto/ec/curve448/curve448_lcl.h\nindex 2228dc8..e1b0461 100644\n--- a/crypto/ec/curve448/curve448_lcl.h\n+++ b/crypto/ec/curve448/curve448_lcl.h\n@@ -7,20 +7,20 @@ void X448_public_from_private(uint8_t out_public_value[56],\n const uint8_t private_key[56]);\n \n int ED448_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len,\n- const uint8_t public_key[56], const uint8_t private_key[56],\n+ const uint8_t public_key[57], const uint8_t private_key[57],\n const uint8_t *context, size_t context_len);\n \n int ED448_verify(const uint8_t *message, size_t message_len,\n- const uint8_t signature[112], const uint8_t public_key[56],\n+ const uint8_t signature[114], const uint8_t public_key[57],\n const uint8_t *context, size_t context_len);\n \n int ED448ph_sign(uint8_t *out_sig, const uint8_t hash[64],\n- const uint8_t public_key[56], const uint8_t private_key[56],\n+ const uint8_t public_key[57], const uint8_t private_key[57],\n const uint8_t *context, size_t context_len);\n \n-int ED448ph_verify(const uint8_t hash[64], const uint8_t signature[112],\n- const uint8_t public_key[56], const uint8_t *context,\n+int ED448ph_verify(const uint8_t hash[64], const uint8_t signature[114],\n+ const uint8_t public_key[57], const uint8_t *context,\n size_t context_len);\n \n-int ED448_public_from_private(uint8_t out_public_key[56],\n- const uint8_t private_key[56]);\n+int ED448_public_from_private(uint8_t out_public_key[57],\n+ const uint8_t private_key[57]);\ndiff --git a/crypto/ec/curve448/eddsa.c b/crypto/ec/curve448/eddsa.c\nindex 5aeec24..b627d51 100644\n--- a/crypto/ec/curve448/eddsa.c\n+++ b/crypto/ec/curve448/eddsa.c\n@@ -364,7 +364,7 @@ decaf_error_t decaf_ed448_verify_prehash (\n }\n \n int ED448_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len,\n- const uint8_t public_key[56], const uint8_t private_key[56],\n+ const uint8_t public_key[57], const uint8_t private_key[57],\n const uint8_t *context, size_t context_len)\n {\n \n@@ -375,7 +375,7 @@ int ED448_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len,\n \n \n int ED448_verify(const uint8_t *message, size_t message_len,\n- const uint8_t signature[112], const uint8_t public_key[56],\n+ const uint8_t signature[114], const uint8_t public_key[57],\n const uint8_t *context, size_t context_len)\n {\n return decaf_ed448_verify(signature, public_key, message, message_len, 0,\n@@ -383,7 +383,7 @@ int ED448_verify(const uint8_t *message, size_t message_len,\n }\n \n int ED448ph_sign(uint8_t *out_sig, const uint8_t hash[64],\n- const uint8_t public_key[56], const uint8_t private_key[56],\n+ const uint8_t public_key[57], const uint8_t private_key[57],\n const uint8_t *context, size_t context_len)\n {\n return decaf_ed448_sign_prehash(out_sig, private_key, public_key, hash,\n@@ -391,16 +391,16 @@ int ED448ph_sign(uint8_t *out_sig, const uint8_t hash[64],\n \n }\n \n-int ED448ph_verify(const uint8_t hash[64], const uint8_t signature[112],\n- const uint8_t public_key[56], const uint8_t *context,\n+int ED448ph_verify(const uint8_t hash[64], const uint8_t signature[114],\n+ const uint8_t public_key[57], const uint8_t *context,\n size_t context_len)\n {\n return decaf_ed448_verify_prehash(signature, public_key, hash, context,\n context_len) \u003d\u003d DECAF_SUCCESS;\n }\n \n-int ED448_public_from_private(uint8_t out_public_key[56],\n- const uint8_t private_key[56])\n+int ED448_public_from_private(uint8_t out_public_key[57],\n+ const uint8_t private_key[57])\n {\n return decaf_ed448_derive_public_key(out_public_key, private_key)\n \u003d\u003d DECAF_SUCCESS;\n","s":{"c":1753078232,"u": 35714}} ],"g": 37561,"chitpc": 0,"ehitpc": 0,"indexed":0 , "ab": 0, "si": 0, "db":0, "di":0, "sat":0, "lfc": "0000"}