{"schema":"libjg2-1",
"vpath":"/git/",
"avatar":"/git/avatar/",
"alang":"",
"gen_ut":1753078232,
"reponame":"openssl",
"desc":"OpenSSL",
"owner": { "name": "Andy Green", "email": "andy@warmcat.com", "md5": "c50933ca2aa61e0fe2c43d46bb6b59cb" },"url":"https://warmcat.com/repo/openssl",
"f":3,
"items": [
{"schema":"libjg2-1",
"cid":"ee4a3bcd397a6f574aad3d74b592a98f",
"commit": {"type":"commit",
"time": 1519131570,
"time_ofs": 0,
"oid_tree": { "oid": "3c9482cf70678b05dfd58e9dfe8bb257e3d2a910", "alias": []},
"oid":{ "oid": "22bcc9cb7fbd1433924bd9738cb34f9dfbb35c91", "alias": []},
"msg": "Fix the ED448 key lengths",
"sig_commit": { "git_time": { "time": 1519131570, "offset": 0 }, "name": "Matt Caswell", "email": "matt@openssl.org", "md5": "10f7b441a32d5790efad9fc68cae4af2" },
"sig_author": { "git_time": { "time": 1511893431, "offset": 0 }, "name": "Matt Caswell", "email": "matt@openssl.org", "md5": "10f7b441a32d5790efad9fc68cae4af2" }},
"body": "Fix the ED448 key lengths\n\nUnlike X448 the key lengths for ED448 are 57 bytes (as opposed to 56)\n\nReviewed-by: Bernd Edlinger \u003cbernd.edlinger@hotmail.de\u003e\n(Merged from https://github.com/openssl/openssl/pull/5105)\n"
,
"diff": "diff --git a/crypto/ec/curve448/curve448_lcl.h b/crypto/ec/curve448/curve448_lcl.h\nindex 2228dc8..e1b0461 100644\n--- a/crypto/ec/curve448/curve448_lcl.h\n+++ b/crypto/ec/curve448/curve448_lcl.h\n@@ -7,20 +7,20 @@ void X448_public_from_private(uint8_t out_public_value[56],\n const uint8_t private_key[56]);\n \n int ED448_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len,\n- const uint8_t public_key[56], const uint8_t private_key[56],\n+ const uint8_t public_key[57], const uint8_t private_key[57],\n const uint8_t *context, size_t context_len);\n \n int ED448_verify(const uint8_t *message, size_t message_len,\n- const uint8_t signature[112], const uint8_t public_key[56],\n+ const uint8_t signature[114], const uint8_t public_key[57],\n const uint8_t *context, size_t context_len);\n \n int ED448ph_sign(uint8_t *out_sig, const uint8_t hash[64],\n- const uint8_t public_key[56], const uint8_t private_key[56],\n+ const uint8_t public_key[57], const uint8_t private_key[57],\n const uint8_t *context, size_t context_len);\n \n-int ED448ph_verify(const uint8_t hash[64], const uint8_t signature[112],\n- const uint8_t public_key[56], const uint8_t *context,\n+int ED448ph_verify(const uint8_t hash[64], const uint8_t signature[114],\n+ const uint8_t public_key[57], const uint8_t *context,\n size_t context_len);\n \n-int ED448_public_from_private(uint8_t out_public_key[56],\n- const uint8_t private_key[56]);\n+int ED448_public_from_private(uint8_t out_public_key[57],\n+ const uint8_t private_key[57]);\ndiff --git a/crypto/ec/curve448/eddsa.c b/crypto/ec/curve448/eddsa.c\nindex 5aeec24..b627d51 100644\n--- a/crypto/ec/curve448/eddsa.c\n+++ b/crypto/ec/curve448/eddsa.c\n@@ -364,7 +364,7 @@ decaf_error_t decaf_ed448_verify_prehash (\n }\n \n int ED448_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len,\n- const uint8_t public_key[56], const uint8_t private_key[56],\n+ const uint8_t public_key[57], const uint8_t private_key[57],\n const uint8_t *context, size_t context_len)\n {\n \n@@ -375,7 +375,7 @@ int ED448_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len,\n \n \n int ED448_verify(const uint8_t *message, size_t message_len,\n- const uint8_t signature[112], const uint8_t public_key[56],\n+ const uint8_t signature[114], const uint8_t public_key[57],\n const uint8_t *context, size_t context_len)\n {\n return decaf_ed448_verify(signature, public_key, message, message_len, 0,\n@@ -383,7 +383,7 @@ int ED448_verify(const uint8_t *message, size_t message_len,\n }\n \n int ED448ph_sign(uint8_t *out_sig, const uint8_t hash[64],\n- const uint8_t public_key[56], const uint8_t private_key[56],\n+ const uint8_t public_key[57], const uint8_t private_key[57],\n const uint8_t *context, size_t context_len)\n {\n return decaf_ed448_sign_prehash(out_sig, private_key, public_key, hash,\n@@ -391,16 +391,16 @@ int ED448ph_sign(uint8_t *out_sig, const uint8_t hash[64],\n \n }\n \n-int ED448ph_verify(const uint8_t hash[64], const uint8_t signature[112],\n- const uint8_t public_key[56], const uint8_t *context,\n+int ED448ph_verify(const uint8_t hash[64], const uint8_t signature[114],\n+ const uint8_t public_key[57], const uint8_t *context,\n size_t context_len)\n {\n return decaf_ed448_verify_prehash(signature, public_key, hash, context,\n context_len) \u003d\u003d DECAF_SUCCESS;\n }\n \n-int ED448_public_from_private(uint8_t out_public_key[56],\n- const uint8_t private_key[56])\n+int ED448_public_from_private(uint8_t out_public_key[57],\n+ const uint8_t private_key[57])\n {\n return decaf_ed448_derive_public_key(out_public_key, private_key)\n \u003d\u003d DECAF_SUCCESS;\n","s":{"c":1753078232,"u": 35714}}
],"g": 37561,"chitpc": 0,"ehitpc": 0,"indexed":0
,
"ab": 0, "si": 0, "db":0, "di":0, "sat":0, "lfc": "0000"}