+/*----- X25519 and related algorithms -------------------------------------*/
+
+#define XDHS(_) \
+ _(X25519, x25519) \
+ _(X448, x448)
+
+#define DEFXDH(X, x) \
+ static PyObject *meth_##x(PyObject *me, PyObject *arg) \
+ { \
+ const char *k, *p; \
+ Py_ssize_t ksz, psz; \
+ PyObject *rc = 0; \
+ if (!PyArg_ParseTuple(arg, "s#s#:" #x, &k, &ksz, &p, &psz)) \
+ goto end; \
+ if (ksz != X##_KEYSZ) VALERR("bad key length"); \
+ if (psz != X##_PUBSZ) VALERR("bad public length"); \
+ rc = bytestring_pywrap(0, X##_OUTSZ); \
+ x((octet *)PyString_AS_STRING(rc), \
+ (const octet *)k, (const octet *)p); \
+ return (rc); \
+ end: \
+ return (0); \
+ }
+XDHS(DEFXDH)
+#undef DEFXDH
+
+/*----- Ed25519 -----------------------------------------------------------*/
+
+static PyObject *meth_ed25519_pubkey(PyObject *me, PyObject *arg)
+{
+ const char *k;
+ Py_ssize_t ksz;
+ PyObject *rc = 0;
+ if (!PyArg_ParseTuple(arg, "s#:ed25519_pubkey", &k, &ksz)) goto end;
+ rc = bytestring_pywrap(0, ED25519_PUBSZ);
+ ed25519_pubkey((octet *)PyString_AS_STRING(rc), k, ksz);
+ return (rc);
+end:
+ return (0);
+}
+
+static PyObject *meth_ed25519_sign(PyObject *me, PyObject *arg, PyObject *kw)
+{
+ const char *k, *p = 0, *m;
+ Py_ssize_t ksz, psz, msz;
+ PyObject *rc = 0;
+ octet pp[ED25519_PUBSZ];
+ char *kwlist[] = { "key", "msg", "pub", 0 };
+ if (!PyArg_ParseTupleAndKeywords(arg, kw, "s#s#|s#:ed25519_sign", kwlist,
+ &k, &ksz, &m, &msz, &p, &psz))
+ goto end;
+ if (p && psz != ED25519_PUBSZ) VALERR("bad public length");
+ if (!p) { p = (const char *)pp; ed25519_pubkey(pp, k, ksz); }
+ rc = bytestring_pywrap(0, ED25519_SIGSZ);
+ ed25519_sign((octet *)PyString_AS_STRING(rc), k, ksz,
+ (const octet *)p, m, msz);
+ return (rc);
+end:
+ return (0);
+}
+
+static PyObject *meth_ed25519_verify(PyObject *me, PyObject *arg)
+{
+ const char *p, *m, *s;
+ Py_ssize_t psz, msz, ssz;
+ PyObject *rc = 0;
+ if (!PyArg_ParseTuple(arg, "s#s#s#:ed25519_verify",
+ &p, &psz, &m, &msz, &s, &ssz))
+ goto end;
+ if (psz != ED25519_PUBSZ) VALERR("bad public length");
+ if (ssz != ED25519_SIGSZ) VALERR("bad signature length");
+ rc = getbool(!ed25519_verify((const octet *)p, m, msz, (const octet *)s));
+ return (rc);
+end:
+ return (0);
+}
+