diff options
author | Sebastian Hahn <sebastian@torproject.org> | 2014-10-27 14:37:50 +0100 |
---|---|---|
committer | Sebastian Hahn <sebastian@torproject.org> | 2014-10-27 14:41:19 +0100 |
commit | 909aa51b3f4411b30bccbbf1dd9f876d150167fd (patch) | |
tree | e8fe448757c2aaaa0de5687ba9b7db9accdc7a2a /src/common/crypto_ed25519.h | |
parent | ac4dd248e187b0327617c84ee2820a03b0a87a16 (diff) | |
download | tor-909aa51b3f4411b30bccbbf1dd9f876d150167fd.tar.gz tor-909aa51b3f4411b30bccbbf1dd9f876d150167fd.zip |
Remove configure option to disable curve25519
By now, support in the network is widespread and it's time to require
more modern crypto on all Tor instances, whether they're clients or
servers. By doing this early in 0.2.6, we can be sure that at some point
all clients will have reasonable support.
Diffstat (limited to 'src/common/crypto_ed25519.h')
-rw-r--r-- | src/common/crypto_ed25519.h | 3 |
1 files changed, 0 insertions, 3 deletions
diff --git a/src/common/crypto_ed25519.h b/src/common/crypto_ed25519.h index 13b05c7c1e..1a481b4dfd 100644 --- a/src/common/crypto_ed25519.h +++ b/src/common/crypto_ed25519.h @@ -39,7 +39,6 @@ typedef struct { ed25519_secret_key_t seckey; } ed25519_keypair_t; -#ifdef CURVE25519_ENABLED int ed25519_secret_key_generate(ed25519_secret_key_t *seckey_out, int extra_strong); int ed25519_secret_key_from_seed(ed25519_secret_key_t *seckey_out, @@ -88,8 +87,6 @@ int ed25519_public_blind(ed25519_public_key_t *out, const ed25519_public_key_t *inp, const uint8_t *param); -#endif - #define ED25519_BASE64_LEN 43 int ed25519_public_from_base64(ed25519_public_key_t *pkey, |