18 int severity,
bool *created_out);
20#define INIT_ED_KEY_CREATE (1u<<0)
21#define INIT_ED_KEY_REPLACE (1u<<1)
22#define INIT_ED_KEY_SPLIT (1u<<2)
23#define INIT_ED_KEY_MISSING_SECRET_OK (1u<<3)
24#define INIT_ED_KEY_NEEDCERT (1u<<4)
25#define INIT_ED_KEY_EXTRA_STRONG (1u<<5)
26#define INIT_ED_KEY_INCLUDE_SIGNING_KEY_IN_CERT (1u<<6)
27#define INIT_ED_KEY_OMIT_SECRET (1u<<7)
28#define INIT_ED_KEY_TRY_ENCRYPTED (1u<<8)
29#define INIT_ED_KEY_NO_REPAIR (1u<<9)
30#define INIT_ED_KEY_SUGGEST_KEYGEN (1u<<10)
31#define INIT_ED_KEY_OFFLINE_SECRET (1u<<11)
32#define INIT_ED_KEY_EXPLICIT_FNAME (1u<<12)
41 struct tor_cert_st **cert_out,
48 struct tor_cert_st **cert_out);
Header for crypto_ed25519.c.
crypto_pk_t * init_key_from_file(const char *fname, int generate, int severity, bool *created_out)
ed25519_keypair_t * ed_key_new(const ed25519_keypair_t *signing_key, uint32_t flags, time_t now, time_t lifetime, uint8_t cert_type, struct tor_cert_st **cert_out)
ed25519_keypair_t * ed_key_init_from_file(const char *fname, uint32_t flags, int severity, const ed25519_keypair_t *signing_key, time_t now, time_t lifetime, uint8_t cert_type, struct tor_cert_st **cert_out, const or_options_t *options)