pub trait CryptoApiImpl: ManagedTypeApiImpl {
Show 16 methods // Required methods fn sha256_legacy(&self, data: &[u8]) -> [u8; 32]; fn sha256_managed( &self, dest: Self::ManagedBufferHandle, data_handle: Self::ManagedBufferHandle ); fn keccak256_legacy(&self, data: &[u8]) -> [u8; 32]; fn keccak256_managed( &self, dest: Self::ManagedBufferHandle, data_handle: Self::ManagedBufferHandle ); fn ripemd160_legacy(&self, data: &[u8]) -> [u8; 20]; fn ripemd160_managed( &self, dest: Self::ManagedBufferHandle, data_handle: Self::ManagedBufferHandle ); fn verify_bls_legacy( &self, key: &[u8], message: &[u8], signature: &[u8] ) -> bool; fn verify_bls_managed( &self, key: Self::ManagedBufferHandle, message: Self::ManagedBufferHandle, signature: Self::ManagedBufferHandle ) -> bool; fn verify_ed25519_legacy( &self, key: &[u8], message: &[u8], signature: &[u8] ) -> bool; fn verify_ed25519_managed( &self, key: Self::ManagedBufferHandle, message: Self::ManagedBufferHandle, signature: Self::ManagedBufferHandle ) -> bool; fn verify_secp256k1_legacy( &self, key: &[u8], message: &[u8], signature: &[u8] ) -> bool; fn verify_secp256k1_managed( &self, key: Self::ManagedBufferHandle, message: Self::ManagedBufferHandle, signature: Self::ManagedBufferHandle ) -> bool; fn verify_custom_secp256k1_legacy( &self, key: &[u8], message: &[u8], signature: &[u8], hash_type: MessageHashType ) -> bool; fn verify_custom_secp256k1_managed( &self, key: Self::ManagedBufferHandle, message: Self::ManagedBufferHandle, signature: Self::ManagedBufferHandle, hash_type: MessageHashType ) -> bool; fn encode_secp256k1_der_signature_legacy( &self, r: &[u8], s: &[u8] ) -> BoxedBytes; fn encode_secp256k1_der_signature_managed( &self, r: Self::ManagedBufferHandle, s: Self::ManagedBufferHandle, dest: Self::ManagedBufferHandle );
}

Required Methods§

source

fn sha256_legacy(&self, data: &[u8]) -> [u8; 32]

source

fn sha256_managed( &self, dest: Self::ManagedBufferHandle, data_handle: Self::ManagedBufferHandle )

source

fn keccak256_legacy(&self, data: &[u8]) -> [u8; 32]

source

fn keccak256_managed( &self, dest: Self::ManagedBufferHandle, data_handle: Self::ManagedBufferHandle )

source

fn ripemd160_legacy(&self, data: &[u8]) -> [u8; 20]

source

fn ripemd160_managed( &self, dest: Self::ManagedBufferHandle, data_handle: Self::ManagedBufferHandle )

source

fn verify_bls_legacy( &self, key: &[u8], message: &[u8], signature: &[u8] ) -> bool

source

fn verify_bls_managed( &self, key: Self::ManagedBufferHandle, message: Self::ManagedBufferHandle, signature: Self::ManagedBufferHandle ) -> bool

source

fn verify_ed25519_legacy( &self, key: &[u8], message: &[u8], signature: &[u8] ) -> bool

source

fn verify_ed25519_managed( &self, key: Self::ManagedBufferHandle, message: Self::ManagedBufferHandle, signature: Self::ManagedBufferHandle ) -> bool

source

fn verify_secp256k1_legacy( &self, key: &[u8], message: &[u8], signature: &[u8] ) -> bool

Note: the signature is minimum 2 bytes in length, the second byte encodes the length of the remaining signature bytes.

source

fn verify_secp256k1_managed( &self, key: Self::ManagedBufferHandle, message: Self::ManagedBufferHandle, signature: Self::ManagedBufferHandle ) -> bool

source

fn verify_custom_secp256k1_legacy( &self, key: &[u8], message: &[u8], signature: &[u8], hash_type: MessageHashType ) -> bool

source

fn verify_custom_secp256k1_managed( &self, key: Self::ManagedBufferHandle, message: Self::ManagedBufferHandle, signature: Self::ManagedBufferHandle, hash_type: MessageHashType ) -> bool

source

fn encode_secp256k1_der_signature_legacy( &self, r: &[u8], s: &[u8] ) -> BoxedBytes

source

fn encode_secp256k1_der_signature_managed( &self, r: Self::ManagedBufferHandle, s: Self::ManagedBufferHandle, dest: Self::ManagedBufferHandle )

Implementors§