Struct ethkey::SECP256K1 [−]
pub struct SECP256K1 { /* fields omitted */ }
Methods from __Deref<Target = Secp256k1>
pub fn sign_schnorr(
&self,
msg: &Message,
sk: &SecretKey
) -> Result<Signature, Error>
[src]
pub fn sign_schnorr(
&self,
msg: &Message,
sk: &SecretKey
) -> Result<Signature, Error>
Create a Schnorr signature
pub fn verify_schnorr(
&self,
msg: &Message,
sig: &Signature,
pk: &PublicKey
) -> Result<(), Error>
[src]
pub fn verify_schnorr(
&self,
msg: &Message,
sig: &Signature,
pk: &PublicKey
) -> Result<(), Error>
Verify a Schnorr signature
pub fn recover_schnorr(
&self,
msg: &Message,
sig: &Signature
) -> Result<PublicKey, Error>
[src]
pub fn recover_schnorr(
&self,
msg: &Message,
sig: &Signature
) -> Result<PublicKey, Error>
Retrieves the public key for which sig
is a valid signature for msg
.
Requires a verify-capable context.
pub fn generate_keypair<R>(
&self,
rng: &mut R
) -> Result<(SecretKey, PublicKey), Error> where
R: Rng,
[src]
pub fn generate_keypair<R>(
&self,
rng: &mut R
) -> Result<(SecretKey, PublicKey), Error> where
R: Rng,
Generates a random keypair. Convenience function for key::SecretKey::new
and key::PublicKey::from_secret_key
; call those functions directly for
batch key generation. Requires a signing-capable context.
pub fn sign(&self, msg: &Message, sk: &SecretKey) -> Result<Signature, Error>
[src]
pub fn sign(&self, msg: &Message, sk: &SecretKey) -> Result<Signature, Error>
Constructs a signature for msg
using the secret key sk
and RFC6979 nonce
Requires a signing-capable context.
pub fn sign_recoverable(
&self,
msg: &Message,
sk: &SecretKey
) -> Result<RecoverableSignature, Error>
[src]
pub fn sign_recoverable(
&self,
msg: &Message,
sk: &SecretKey
) -> Result<RecoverableSignature, Error>
Constructs a signature for msg
using the secret key sk
and RFC6979 nonce
Requires a signing-capable context.
pub fn recover(
&self,
msg: &Message,
sig: &RecoverableSignature
) -> Result<PublicKey, Error>
[src]
pub fn recover(
&self,
msg: &Message,
sig: &RecoverableSignature
) -> Result<PublicKey, Error>
Determines the public key for which sig
is a valid signature for
msg
. Requires a verify-capable context.
pub fn verify(
&self,
msg: &Message,
sig: &Signature,
pk: &PublicKey
) -> Result<(), Error>
[src]
pub fn verify(
&self,
msg: &Message,
sig: &Signature,
pk: &PublicKey
) -> Result<(), Error>
Checks that sig
is a valid ECDSA signature for msg
using the public
key pubkey
. Returns Ok(true)
on success. Note that this function cannot
be used for Bitcoin consensus checking since there may exist signatures
which OpenSSL would verify but not libsecp256k1, or vice-versa. Requires a
verify-capable context.
Trait Implementations
impl __Deref for SECP256K1
impl __Deref for SECP256K1
type Target = Secp256k1
The resulting type after dereferencing.
fn deref(&self) -> &Secp256k1
fn deref(&self) -> &Secp256k1
Dereferences the value.
impl LazyStatic for SECP256K1
impl LazyStatic for SECP256K1
fn initialize(lazy: &Self)
fn initialize(lazy: &Self)