9#ifndef TOR_CRYPTO_ED25519_H
10#define TOR_CRYPTO_ED25519_H
53 const uint8_t *msg,
size_t len,
56 const uint8_t *msg,
size_t len,
61 const uint8_t *msg,
size_t len,
62 const char *prefix_str,
67 const uint8_t *msg,
size_t len,
68 const char *prefix_str,
101 const uint8_t *param);
104 const uint8_t *param);
109 const char *filename,
113 const char *filename);
115 const char *filename,
119 const char *filename);
122#define ed25519_keypair_free(kp) \
123 FREE_AND_NULL(ed25519_keypair_t, ed25519_keypair_free_, (kp))
131void ed25519_init(
void);
136void crypto_ed25519_testing_force_impl(
const char *
name);
137void crypto_ed25519_testing_restore_impl(
void);
140#ifdef CRYPTO_ED25519_PRIVATE
Header for crypto_curve25519.c.
STATIC int ed25519_impl_spot_check(void)
void ed25519_pubkey_copy(ed25519_public_key_t *dest, const ed25519_public_key_t *src)
int ed25519_public_key_is_zero(const ed25519_public_key_t *pubkey)
int ed25519_sign_prefixed(ed25519_signature_t *signature_out, const uint8_t *msg, size_t len, const char *prefix_str, const ed25519_keypair_t *keypair)
int ed25519_sign(ed25519_signature_t *signature_out, const uint8_t *msg, size_t len, const ed25519_keypair_t *key)
int ed25519_checksig_prefixed(const ed25519_signature_t *signature, const uint8_t *msg, size_t len, const char *prefix_str, const ed25519_public_key_t *pubkey)
int ed25519_public_key_generate(ed25519_public_key_t *pubkey_out, const ed25519_secret_key_t *seckey)
int ed25519_validate_pubkey(const ed25519_public_key_t *pubkey)
void ed25519_keypair_free_(ed25519_keypair_t *kp)
int ed25519_checksig_batch(int *okay_out, const ed25519_checkable_t *checkable, int n_checkable)
int ed25519_seckey_read_from_file(ed25519_secret_key_t *seckey_out, char **tag_out, const char *filename)
int ed25519_secret_key_generate(ed25519_secret_key_t *seckey_out, int extra_strong)
int ed25519_keypair_generate(ed25519_keypair_t *keypair_out, int extra_strong)
int ed25519_keypair_blind(ed25519_keypair_t *out, const ed25519_keypair_t *inp, const uint8_t *param)
int ed25519_checksig(const ed25519_signature_t *signature, const uint8_t *msg, size_t len, const ed25519_public_key_t *pubkey)
int ed25519_pubkey_write_to_file(const ed25519_public_key_t *pubkey, const char *filename, const char *tag)
int ed25519_public_key_from_curve25519_public_key(ed25519_public_key_t *pubkey, const curve25519_public_key_t *pubkey_in, int signbit)
int ed25519_seckey_write_to_file(const ed25519_secret_key_t *seckey, const char *filename, const char *tag)
int ed25519_public_blind(ed25519_public_key_t *out, const ed25519_public_key_t *inp, const uint8_t *param)
int ed25519_pubkey_read_from_file(ed25519_public_key_t *pubkey_out, char **tag_out, const char *filename)
int ed25519_keypair_from_curve25519_keypair(ed25519_keypair_t *out, int *signbit_out, const curve25519_keypair_t *inp)
void ed25519_set_impl_params(int use_donna)
int ed25519_secret_key_from_seed(ed25519_secret_key_t *seckey_out, const uint8_t *seed)
int ed25519_pubkey_eq(const ed25519_public_key_t *key1, const ed25519_public_key_t *key2)
const ed25519_public_key_t * pubkey
ed25519_signature_t signature
uint8_t seckey[ED25519_SECKEY_LEN]
Macros to implement mocking and selective exposure for the test code.
#define MOCK_DECL(rv, funcname, arglist)
Integer definitions used throughout Tor.
Definitions for sizes of x25519 keys and elements.
#define ED25519_SECKEY_LEN
#define ED25519_PUBKEY_LEN