Trait multiversx_sc::api::CryptoApiImpl
source · pub trait CryptoApiImpl: ManagedTypeApiImpl {
Show 16 methods
// Required methods
fn sha256_legacy(&self, data: &[u8]) -> [u8; 32];
fn sha256_managed(
&self,
dest: Self::ManagedBufferHandle,
data_handle: Self::ManagedBufferHandle
);
fn keccak256_legacy(&self, data: &[u8]) -> [u8; 32];
fn keccak256_managed(
&self,
dest: Self::ManagedBufferHandle,
data_handle: Self::ManagedBufferHandle
);
fn ripemd160_legacy(&self, data: &[u8]) -> [u8; 20];
fn ripemd160_managed(
&self,
dest: Self::ManagedBufferHandle,
data_handle: Self::ManagedBufferHandle
);
fn verify_bls_legacy(
&self,
key: &[u8],
message: &[u8],
signature: &[u8]
) -> bool;
fn verify_bls_managed(
&self,
key: Self::ManagedBufferHandle,
message: Self::ManagedBufferHandle,
signature: Self::ManagedBufferHandle
) -> bool;
fn verify_ed25519_legacy(
&self,
key: &[u8],
message: &[u8],
signature: &[u8]
) -> bool;
fn verify_ed25519_managed(
&self,
key: Self::ManagedBufferHandle,
message: Self::ManagedBufferHandle,
signature: Self::ManagedBufferHandle
) -> bool;
fn verify_secp256k1_legacy(
&self,
key: &[u8],
message: &[u8],
signature: &[u8]
) -> bool;
fn verify_secp256k1_managed(
&self,
key: Self::ManagedBufferHandle,
message: Self::ManagedBufferHandle,
signature: Self::ManagedBufferHandle
) -> bool;
fn verify_custom_secp256k1_legacy(
&self,
key: &[u8],
message: &[u8],
signature: &[u8],
hash_type: MessageHashType
) -> bool;
fn verify_custom_secp256k1_managed(
&self,
key: Self::ManagedBufferHandle,
message: Self::ManagedBufferHandle,
signature: Self::ManagedBufferHandle,
hash_type: MessageHashType
) -> bool;
fn encode_secp256k1_der_signature_legacy(
&self,
r: &[u8],
s: &[u8]
) -> BoxedBytes;
fn encode_secp256k1_der_signature_managed(
&self,
r: Self::ManagedBufferHandle,
s: Self::ManagedBufferHandle,
dest: Self::ManagedBufferHandle
);
}
Required Methods§
fn sha256_legacy(&self, data: &[u8]) -> [u8; 32]
fn sha256_managed( &self, dest: Self::ManagedBufferHandle, data_handle: Self::ManagedBufferHandle )
fn keccak256_legacy(&self, data: &[u8]) -> [u8; 32]
fn keccak256_managed( &self, dest: Self::ManagedBufferHandle, data_handle: Self::ManagedBufferHandle )
fn ripemd160_legacy(&self, data: &[u8]) -> [u8; 20]
fn ripemd160_managed( &self, dest: Self::ManagedBufferHandle, data_handle: Self::ManagedBufferHandle )
fn verify_bls_legacy( &self, key: &[u8], message: &[u8], signature: &[u8] ) -> bool
fn verify_bls_managed( &self, key: Self::ManagedBufferHandle, message: Self::ManagedBufferHandle, signature: Self::ManagedBufferHandle ) -> bool
fn verify_ed25519_legacy( &self, key: &[u8], message: &[u8], signature: &[u8] ) -> bool
fn verify_ed25519_managed( &self, key: Self::ManagedBufferHandle, message: Self::ManagedBufferHandle, signature: Self::ManagedBufferHandle ) -> bool
sourcefn verify_secp256k1_legacy(
&self,
key: &[u8],
message: &[u8],
signature: &[u8]
) -> bool
fn verify_secp256k1_legacy( &self, key: &[u8], message: &[u8], signature: &[u8] ) -> bool
Note: the signature is minimum 2 bytes in length, the second byte encodes the length of the remaining signature bytes.