Symbol: CURVE25519_SIZE
sbin/iked/dh.c
269
{ GROUP_CURVE25519, 31, CURVE25519_SIZE * 8 },
sbin/iked/dh.c
275
CURVE25519_SIZE) * 8 }
sbin/iked/dh.c
71
uint8_t secret[CURVE25519_SIZE];
sbin/iked/dh.c
72
uint8_t public[CURVE25519_SIZE];
sbin/iked/dh.c
722
static const uint8_t basepoint[CURVE25519_SIZE] = { 9 };
sbin/iked/dh.c
730
arc4random_buf(curve25519->secret, CURVE25519_SIZE);
sbin/iked/dh.c
74
extern int crypto_scalarmult_curve25519(unsigned char a[CURVE25519_SIZE],
sbin/iked/dh.c
742
return (CURVE25519_SIZE);
sbin/iked/dh.c
75
const unsigned char b[CURVE25519_SIZE],
sbin/iked/dh.c
76
const unsigned char c[CURVE25519_SIZE])
sbin/iked/dh.c
77
__attribute__((__bounded__(__minbytes__, 1, CURVE25519_SIZE)))
sbin/iked/dh.c
78
__attribute__((__bounded__(__minbytes__, 2, CURVE25519_SIZE)))
sbin/iked/dh.c
79
__attribute__((__bounded__(__minbytes__, 3, CURVE25519_SIZE)));
sbin/iked/dh.c
801
CURVE25519_SIZE;
sbin/iked/dh.c
814
CURVE25519_SIZE;
sbin/iked/dh.c
819
CURVE25519_SIZE;
sbin/iked/dh.c
829
memcpy(cp, curve25519->public, CURVE25519_SIZE);
sbin/iked/dh.c
843
uint8_t shared[CURVE25519_SIZE];
sbin/iked/dh.c
858
CURVE25519_SIZE;
sbin/iked/dh.c
866
CURVE25519_SIZE;
usr.bin/ssh/kex.h
179
u_char c25519_client_key[CURVE25519_SIZE]; /* 25519 + KEM */
usr.bin/ssh/kex.h
180
u_char c25519_client_pubkey[CURVE25519_SIZE]; /* 25519 */
usr.bin/ssh/kex.h
266
void kexc25519_keygen(u_char key[CURVE25519_SIZE], u_char pub[CURVE25519_SIZE])
usr.bin/ssh/kex.h
267
__attribute__((__bounded__(__minbytes__, 1, CURVE25519_SIZE)))
usr.bin/ssh/kex.h
268
__attribute__((__bounded__(__minbytes__, 2, CURVE25519_SIZE)));
usr.bin/ssh/kex.h
269
int kexc25519_shared_key(const u_char key[CURVE25519_SIZE],
usr.bin/ssh/kex.h
270
const u_char pub[CURVE25519_SIZE], struct sshbuf *out)
usr.bin/ssh/kex.h
271
__attribute__((__bounded__(__minbytes__, 1, CURVE25519_SIZE)))
usr.bin/ssh/kex.h
272
__attribute__((__bounded__(__minbytes__, 2, CURVE25519_SIZE)));
usr.bin/ssh/kex.h
273
int kexc25519_shared_key_ext(const u_char key[CURVE25519_SIZE],
usr.bin/ssh/kex.h
274
const u_char pub[CURVE25519_SIZE], struct sshbuf *out, int)
usr.bin/ssh/kex.h
275
__attribute__((__bounded__(__minbytes__, 1, CURVE25519_SIZE)))
usr.bin/ssh/kex.h
276
__attribute__((__bounded__(__minbytes__, 2, CURVE25519_SIZE)));
usr.bin/ssh/kexc25519.c
102
dump_digest("client public key c25519:", cp, CURVE25519_SIZE);
usr.bin/ssh/kexc25519.c
119
u_char server_key[CURVE25519_SIZE];
usr.bin/ssh/kexc25519.c
125
if (sshbuf_len(client_blob) != CURVE25519_SIZE) {
usr.bin/ssh/kexc25519.c
131
dump_digest("client public key 25519:", client_pub, CURVE25519_SIZE);
usr.bin/ssh/kexc25519.c
138
if ((r = sshbuf_reserve(server_blob, CURVE25519_SIZE, &server_pub)) != 0)
usr.bin/ssh/kexc25519.c
149
dump_digest("server public key 25519:", server_pub, CURVE25519_SIZE);
usr.bin/ssh/kexc25519.c
173
if (sshbuf_len(server_blob) != CURVE25519_SIZE) {
usr.bin/ssh/kexc25519.c
179
dump_digest("server public key c25519:", server_pub, CURVE25519_SIZE);
usr.bin/ssh/kexc25519.c
41
extern int crypto_scalarmult_curve25519(u_char a[CURVE25519_SIZE],
usr.bin/ssh/kexc25519.c
42
const u_char b[CURVE25519_SIZE], const u_char c[CURVE25519_SIZE])
usr.bin/ssh/kexc25519.c
43
__attribute__((__bounded__(__minbytes__, 1, CURVE25519_SIZE)))
usr.bin/ssh/kexc25519.c
44
__attribute__((__bounded__(__minbytes__, 2, CURVE25519_SIZE)))
usr.bin/ssh/kexc25519.c
45
__attribute__((__bounded__(__minbytes__, 3, CURVE25519_SIZE)));
usr.bin/ssh/kexc25519.c
48
kexc25519_keygen(u_char key[CURVE25519_SIZE], u_char pub[CURVE25519_SIZE])
usr.bin/ssh/kexc25519.c
50
static const u_char basepoint[CURVE25519_SIZE] = {9};
usr.bin/ssh/kexc25519.c
52
arc4random_buf(key, CURVE25519_SIZE);
usr.bin/ssh/kexc25519.c
57
kexc25519_shared_key_ext(const u_char key[CURVE25519_SIZE],
usr.bin/ssh/kexc25519.c
58
const u_char pub[CURVE25519_SIZE], struct sshbuf *out, int raw)
usr.bin/ssh/kexc25519.c
60
u_char shared_key[CURVE25519_SIZE];
usr.bin/ssh/kexc25519.c
61
u_char zero[CURVE25519_SIZE];
usr.bin/ssh/kexc25519.c
67
explicit_bzero(zero, CURVE25519_SIZE);
usr.bin/ssh/kexc25519.c
68
if (timingsafe_bcmp(zero, shared_key, CURVE25519_SIZE) == 0)
usr.bin/ssh/kexc25519.c
72
dump_digest("shared secret 25519", shared_key, CURVE25519_SIZE);
usr.bin/ssh/kexc25519.c
75
r = sshbuf_put(out, shared_key, CURVE25519_SIZE);
usr.bin/ssh/kexc25519.c
77
r = sshbuf_put_bignum2_bytes(out, shared_key, CURVE25519_SIZE);
usr.bin/ssh/kexc25519.c
78
explicit_bzero(shared_key, CURVE25519_SIZE);
usr.bin/ssh/kexc25519.c
83
kexc25519_shared_key(const u_char key[CURVE25519_SIZE],
usr.bin/ssh/kexc25519.c
84
const u_char pub[CURVE25519_SIZE], struct sshbuf *out)
usr.bin/ssh/kexc25519.c
98
if ((r = sshbuf_reserve(buf, CURVE25519_SIZE, &cp)) != 0)
usr.bin/ssh/kexmlkem768x25519.c
104
need = crypto_kem_mlkem768_PUBLICKEYBYTES + CURVE25519_SIZE;
usr.bin/ssh/kexmlkem768x25519.c
115
CURVE25519_SIZE);
usr.bin/ssh/kexmlkem768x25519.c
151
dump_digest("server public key 25519:", server_pub, CURVE25519_SIZE);
usr.bin/ssh/kexmlkem768x25519.c
199
need = crypto_kem_mlkem768_CIPHERTEXTBYTES + CURVE25519_SIZE;
usr.bin/ssh/kexmlkem768x25519.c
218
dump_digest("server public key c25519:", server_pub, CURVE25519_SIZE);
usr.bin/ssh/kexmlkem768x25519.c
55
need = crypto_kem_mlkem768_PUBLICKEYBYTES + CURVE25519_SIZE;
usr.bin/ssh/kexmlkem768x25519.c
70
dump_digest("client public key c25519:", cp, CURVE25519_SIZE);
usr.bin/ssh/kexmlkem768x25519.c
92
u_char server_pub[CURVE25519_SIZE], server_key[CURVE25519_SIZE];
usr.bin/ssh/kexsntrup761x25519.c
101
CURVE25519_SIZE);
usr.bin/ssh/kexsntrup761x25519.c
117
need = crypto_kem_sntrup761_CIPHERTEXTBYTES + CURVE25519_SIZE;
usr.bin/ssh/kexsntrup761x25519.c
132
dump_digest("server public key 25519:", server_pub, CURVE25519_SIZE);
usr.bin/ssh/kexsntrup761x25519.c
172
need = crypto_kem_sntrup761_CIPHERTEXTBYTES + CURVE25519_SIZE;
usr.bin/ssh/kexsntrup761x25519.c
182
dump_digest("server public key c25519:", server_pub, CURVE25519_SIZE);
usr.bin/ssh/kexsntrup761x25519.c
52
need = crypto_kem_sntrup761_PUBLICKEYBYTES + CURVE25519_SIZE;
usr.bin/ssh/kexsntrup761x25519.c
63
dump_digest("client public key c25519:", cp, CURVE25519_SIZE);
usr.bin/ssh/kexsntrup761x25519.c
81
u_char server_key[CURVE25519_SIZE];
usr.bin/ssh/kexsntrup761x25519.c
90
need = crypto_kem_sntrup761_PUBLICKEYBYTES + CURVE25519_SIZE;