die ("Invalid eddsa public key.\n");
memcpy (csignature, signature, 2*nbytes);
- if (!_eddsa_verify (ecc, H, pub, ctx, A,
+ if (!_eddsa_verify (ecc, H, pub, A, ctx,
msg->length, msg->data, csignature, scratch))
{
fprintf (stderr, "eddsa_verify failed with valid signature.\n");
memcpy (csignature, signature, 2*nbytes);
csignature[nbytes/3] ^= 0x40;
- if (_eddsa_verify (ecc, H, pub, ctx, A,
+ if (_eddsa_verify (ecc, H, pub, A, ctx,
msg->length, msg->data, csignature, scratch))
{
fprintf (stderr,
memcpy (csignature, signature, 2*nbytes);
csignature[5*nbytes/3] ^= 0x8;
- if (_eddsa_verify (ecc, H, pub, ctx, A,
+ if (_eddsa_verify (ecc, H, pub, A, ctx,
msg->length, msg->data, csignature, scratch))
{
fprintf (stderr,
memcpy (csignature, signature, 2*nbytes);
if (msg->length == 0)
{
- if (_eddsa_verify (ecc, H, pub, ctx, A,
+ if (_eddsa_verify (ecc, H, pub, A, ctx,
3, "foo", csignature, scratch))
{
fprintf (stderr,
}
else
{
- if (_eddsa_verify (ecc, H, pub, ctx, A,
+ if (_eddsa_verify (ecc, H, pub, A, ctx,
msg->length - 1, msg->data,
csignature, scratch))
{
}
memcpy (csignature, signature, 2*nbytes);
cmsg[2*msg->length / 3] ^= 0x20;
- if (_eddsa_verify (ecc, H, pub, ctx, A,
+ if (_eddsa_verify (ecc, H, pub, A, ctx,
msg->length, cmsg, csignature, scratch))
{
fprintf (stderr,