提交 22bcc9cb 编写于 作者: M Matt Caswell

Fix the ED448 key lengths

Unlike X448 the key lengths for ED448 are 57 bytes (as opposed to 56)
Reviewed-by: NBernd Edlinger <bernd.edlinger@hotmail.de>
(Merged from https://github.com/openssl/openssl/pull/5105)
上级 ff489fb4
...@@ -7,20 +7,20 @@ void X448_public_from_private(uint8_t out_public_value[56], ...@@ -7,20 +7,20 @@ void X448_public_from_private(uint8_t out_public_value[56],
const uint8_t private_key[56]); const uint8_t private_key[56]);
int ED448_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, int ED448_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len,
const uint8_t public_key[56], const uint8_t private_key[56], const uint8_t public_key[57], const uint8_t private_key[57],
const uint8_t *context, size_t context_len); const uint8_t *context, size_t context_len);
int ED448_verify(const uint8_t *message, size_t message_len, int ED448_verify(const uint8_t *message, size_t message_len,
const uint8_t signature[112], const uint8_t public_key[56], const uint8_t signature[114], const uint8_t public_key[57],
const uint8_t *context, size_t context_len); const uint8_t *context, size_t context_len);
int ED448ph_sign(uint8_t *out_sig, const uint8_t hash[64], int ED448ph_sign(uint8_t *out_sig, const uint8_t hash[64],
const uint8_t public_key[56], const uint8_t private_key[56], const uint8_t public_key[57], const uint8_t private_key[57],
const uint8_t *context, size_t context_len); const uint8_t *context, size_t context_len);
int ED448ph_verify(const uint8_t hash[64], const uint8_t signature[112], int ED448ph_verify(const uint8_t hash[64], const uint8_t signature[114],
const uint8_t public_key[56], const uint8_t *context, const uint8_t public_key[57], const uint8_t *context,
size_t context_len); size_t context_len);
int ED448_public_from_private(uint8_t out_public_key[56], int ED448_public_from_private(uint8_t out_public_key[57],
const uint8_t private_key[56]); const uint8_t private_key[57]);
...@@ -364,7 +364,7 @@ decaf_error_t decaf_ed448_verify_prehash ( ...@@ -364,7 +364,7 @@ decaf_error_t decaf_ed448_verify_prehash (
} }
int ED448_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, int ED448_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len,
const uint8_t public_key[56], const uint8_t private_key[56], const uint8_t public_key[57], const uint8_t private_key[57],
const uint8_t *context, size_t context_len) const uint8_t *context, size_t context_len)
{ {
...@@ -375,7 +375,7 @@ int ED448_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, ...@@ -375,7 +375,7 @@ int ED448_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len,
int ED448_verify(const uint8_t *message, size_t message_len, int ED448_verify(const uint8_t *message, size_t message_len,
const uint8_t signature[112], const uint8_t public_key[56], const uint8_t signature[114], const uint8_t public_key[57],
const uint8_t *context, size_t context_len) const uint8_t *context, size_t context_len)
{ {
return decaf_ed448_verify(signature, public_key, message, message_len, 0, return decaf_ed448_verify(signature, public_key, message, message_len, 0,
...@@ -383,7 +383,7 @@ int ED448_verify(const uint8_t *message, size_t message_len, ...@@ -383,7 +383,7 @@ int ED448_verify(const uint8_t *message, size_t message_len,
} }
int ED448ph_sign(uint8_t *out_sig, const uint8_t hash[64], int ED448ph_sign(uint8_t *out_sig, const uint8_t hash[64],
const uint8_t public_key[56], const uint8_t private_key[56], const uint8_t public_key[57], const uint8_t private_key[57],
const uint8_t *context, size_t context_len) const uint8_t *context, size_t context_len)
{ {
return decaf_ed448_sign_prehash(out_sig, private_key, public_key, hash, return decaf_ed448_sign_prehash(out_sig, private_key, public_key, hash,
...@@ -391,16 +391,16 @@ int ED448ph_sign(uint8_t *out_sig, const uint8_t hash[64], ...@@ -391,16 +391,16 @@ int ED448ph_sign(uint8_t *out_sig, const uint8_t hash[64],
} }
int ED448ph_verify(const uint8_t hash[64], const uint8_t signature[112], int ED448ph_verify(const uint8_t hash[64], const uint8_t signature[114],
const uint8_t public_key[56], const uint8_t *context, const uint8_t public_key[57], const uint8_t *context,
size_t context_len) size_t context_len)
{ {
return decaf_ed448_verify_prehash(signature, public_key, hash, context, return decaf_ed448_verify_prehash(signature, public_key, hash, context,
context_len) == DECAF_SUCCESS; context_len) == DECAF_SUCCESS;
} }
int ED448_public_from_private(uint8_t out_public_key[56], int ED448_public_from_private(uint8_t out_public_key[57],
const uint8_t private_key[56]) const uint8_t private_key[57])
{ {
return decaf_ed448_derive_public_key(out_public_key, private_key) return decaf_ed448_derive_public_key(out_public_key, private_key)
== DECAF_SUCCESS; == DECAF_SUCCESS;
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册