diff options
author | Micah Anderson <micah@riseup.net> | 2014-08-11 13:49:21 -0400 |
---|---|---|
committer | Micah Anderson <micah@riseup.net> | 2014-08-11 13:49:21 -0400 |
commit | 2e59f9740a29439df7c7a56cf0ae83dec3081d31 (patch) | |
tree | d5e7c4e74c9a0f1ea999327d2e68b1dd27be00e0 /src/libsodium/crypto_sign/ed25519/ref10/keypair.c |
initial import of debian version from mentors0.6.1
Diffstat (limited to 'src/libsodium/crypto_sign/ed25519/ref10/keypair.c')
-rw-r--r-- | src/libsodium/crypto_sign/ed25519/ref10/keypair.c | 33 |
1 files changed, 33 insertions, 0 deletions
diff --git a/src/libsodium/crypto_sign/ed25519/ref10/keypair.c b/src/libsodium/crypto_sign/ed25519/ref10/keypair.c new file mode 100644 index 0000000..7955647 --- /dev/null +++ b/src/libsodium/crypto_sign/ed25519/ref10/keypair.c @@ -0,0 +1,33 @@ + +#include <string.h> + +#include "api.h" +#include "randombytes.h" +#include "crypto_hash_sha512.h" +#include "ge.h" + +int crypto_sign_seed_keypair(unsigned char *pk, unsigned char *sk, + const unsigned char *seed) +{ + ge_p3 A; + + crypto_hash_sha512(sk,seed,32); + sk[0] &= 248; + sk[31] &= 63; + sk[31] |= 64; + + ge_scalarmult_base(&A,sk); + ge_p3_tobytes(pk,&A); + + memmove(sk, seed, 32); + memmove(sk + 32, pk, 32); + return 0; +} + +int crypto_sign_keypair(unsigned char *pk, unsigned char *sk) +{ + unsigned char seed[32]; + + randombytes(seed,32); + return crypto_sign_seed_keypair(pk,sk,seed); +} |