1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
#![deny(broken_intra_doc_links)]
use std::sync::Once;
use tink_core::registry::register_key_manager;
mod ecdsa_signer_key_manager;
pub use ecdsa_signer_key_manager::*;
mod ecdsa_verifier_key_manager;
pub use ecdsa_verifier_key_manager::*;
mod ed25519_signer_key_manager;
pub use ed25519_signer_key_manager::*;
mod ed25519_verifier_key_manager;
pub use ed25519_verifier_key_manager::*;
mod proto;
pub(crate) use proto::*;
mod signature_key_templates;
pub use signature_key_templates::*;
mod signer_factory;
pub use signer_factory::*;
mod verifier_factory;
pub use verifier_factory::*;
pub mod subtle;
pub const UPSTREAM_VERSION: &str = "1.5.0";
static INIT: Once = Once::new();
pub fn init() {
INIT.call_once(|| {
register_key_manager(std::sync::Arc::new(EcdsaSignerKeyManager::default()))
.expect("tink_signature::init() failed");
register_key_manager(std::sync::Arc::new(EcdsaVerifierKeyManager::default()))
.expect("tink_signature::init() failed");
register_key_manager(std::sync::Arc::new(Ed25519SignerKeyManager::default()))
.expect("tink_signature::init() failed");
register_key_manager(std::sync::Arc::new(Ed25519VerifierKeyManager::default()))
.expect("tink_signature::init() failed");
tink_core::registry::register_template_generator("ECDSA_P256", ecdsa_p256_key_template);
tink_core::registry::register_template_generator(
"ECDSA_P256_IEEE_P1363",
ecdsa_p256_key_p1363_template,
);
tink_core::registry::register_template_generator("ED25519", ed25519_key_template);
tink_core::registry::register_template_generator(
"ED25519WithRawOutput",
ed25519_key_without_prefix_template,
);
});
}