diff options
author | Yawning Angel <yawning@schwanenlied.me> | 2015-07-06 10:11:10 +0000 |
---|---|---|
committer | Yawning Angel <yawning@schwanenlied.me> | 2015-07-06 10:11:10 +0000 |
commit | 840e68d9171d62a1fdaf0395e248daad2cbe014f (patch) | |
tree | 3a8fba7c3e90ddb885ad817e68e8bb0afe003245 /src/common/crypto_ed25519.h | |
parent | f079c27761a676f7c4200f7275112edd0b5e1270 (diff) | |
download | tor-840e68d9171d62a1fdaf0395e248daad2cbe014f.tar.gz tor-840e68d9171d62a1fdaf0395e248daad2cbe014f.zip |
Integrate and enable ed25519-donna.
The runtime sanity checking is slightly different from the optimized
basepoint stuff in that it uses a given implementation's self tests if
available, and checks if signing/verification works with a test vector
from the IETF EdDSA draft.
The unit tests include a new testcase that will fuzz donna against ref0,
including the blinding and curve25519 key conversion routines. If this
is something that should be done at runtime (No?), the code can be
stolen from there.
Note: Integrating batch verification is not done yet.
Diffstat (limited to 'src/common/crypto_ed25519.h')
-rw-r--r-- | src/common/crypto_ed25519.h | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/src/common/crypto_ed25519.h b/src/common/crypto_ed25519.h index 4d20406d06..d942461cfe 100644 --- a/src/common/crypto_ed25519.h +++ b/src/common/crypto_ed25519.h @@ -123,5 +123,8 @@ void ed25519_keypair_free(ed25519_keypair_t *kp); int ed25519_pubkey_eq(const ed25519_public_key_t *key1, const ed25519_public_key_t *key2); +void ed25519_set_impl_params(int use_donna); +void ed25519_init(void); + #endif |