summaryrefslogtreecommitdiff
path: root/src/common/crypto_ed25519.h
diff options
context:
space:
mode:
authorYawning Angel <yawning@schwanenlied.me>2015-07-06 10:11:10 +0000
committerYawning Angel <yawning@schwanenlied.me>2015-07-06 10:11:10 +0000
commit840e68d9171d62a1fdaf0395e248daad2cbe014f (patch)
tree3a8fba7c3e90ddb885ad817e68e8bb0afe003245 /src/common/crypto_ed25519.h
parentf079c27761a676f7c4200f7275112edd0b5e1270 (diff)
downloadtor-840e68d9171d62a1fdaf0395e248daad2cbe014f.tar.gz
tor-840e68d9171d62a1fdaf0395e248daad2cbe014f.zip
Integrate and enable ed25519-donna.
The runtime sanity checking is slightly different from the optimized basepoint stuff in that it uses a given implementation's self tests if available, and checks if signing/verification works with a test vector from the IETF EdDSA draft. The unit tests include a new testcase that will fuzz donna against ref0, including the blinding and curve25519 key conversion routines. If this is something that should be done at runtime (No?), the code can be stolen from there. Note: Integrating batch verification is not done yet.
Diffstat (limited to 'src/common/crypto_ed25519.h')
-rw-r--r--src/common/crypto_ed25519.h3
1 files changed, 3 insertions, 0 deletions
diff --git a/src/common/crypto_ed25519.h b/src/common/crypto_ed25519.h
index 4d20406d06..d942461cfe 100644
--- a/src/common/crypto_ed25519.h
+++ b/src/common/crypto_ed25519.h
@@ -123,5 +123,8 @@ void ed25519_keypair_free(ed25519_keypair_t *kp);
int ed25519_pubkey_eq(const ed25519_public_key_t *key1,
const ed25519_public_key_t *key2);
+void ed25519_set_impl_params(int use_donna);
+void ed25519_init(void);
+
#endif