Struct ethkey::SECP256K1 [−]
pub struct SECP256K1 { /* fields omitted */ }Methods from __Deref<Target = Secp256k1>
pub fn sign_schnorr(
&self,
msg: &Message,
sk: &SecretKey
) -> Result<Signature, Error>[src]
pub fn sign_schnorr(
&self,
msg: &Message,
sk: &SecretKey
) -> Result<Signature, Error>Create a Schnorr signature
pub fn verify_schnorr(
&self,
msg: &Message,
sig: &Signature,
pk: &PublicKey
) -> Result<(), Error>[src]
pub fn verify_schnorr(
&self,
msg: &Message,
sig: &Signature,
pk: &PublicKey
) -> Result<(), Error>Verify a Schnorr signature
pub fn recover_schnorr(
&self,
msg: &Message,
sig: &Signature
) -> Result<PublicKey, Error>[src]
pub fn recover_schnorr(
&self,
msg: &Message,
sig: &Signature
) -> Result<PublicKey, Error>Retrieves the public key for which sig is a valid signature for msg.
Requires a verify-capable context.
pub fn generate_keypair<R>(
&self,
rng: &mut R
) -> Result<(SecretKey, PublicKey), Error> where
R: Rng, [src]
pub fn generate_keypair<R>(
&self,
rng: &mut R
) -> Result<(SecretKey, PublicKey), Error> where
R: Rng, Generates a random keypair. Convenience function for key::SecretKey::new
and key::PublicKey::from_secret_key; call those functions directly for
batch key generation. Requires a signing-capable context.
pub fn sign(&self, msg: &Message, sk: &SecretKey) -> Result<Signature, Error>[src]
pub fn sign(&self, msg: &Message, sk: &SecretKey) -> Result<Signature, Error>Constructs a signature for msg using the secret key sk and RFC6979 nonce
Requires a signing-capable context.
pub fn sign_recoverable(
&self,
msg: &Message,
sk: &SecretKey
) -> Result<RecoverableSignature, Error>[src]
pub fn sign_recoverable(
&self,
msg: &Message,
sk: &SecretKey
) -> Result<RecoverableSignature, Error>Constructs a signature for msg using the secret key sk and RFC6979 nonce
Requires a signing-capable context.
pub fn recover(
&self,
msg: &Message,
sig: &RecoverableSignature
) -> Result<PublicKey, Error>[src]
pub fn recover(
&self,
msg: &Message,
sig: &RecoverableSignature
) -> Result<PublicKey, Error>Determines the public key for which sig is a valid signature for
msg. Requires a verify-capable context.
pub fn verify(
&self,
msg: &Message,
sig: &Signature,
pk: &PublicKey
) -> Result<(), Error>[src]
pub fn verify(
&self,
msg: &Message,
sig: &Signature,
pk: &PublicKey
) -> Result<(), Error>Checks that sig is a valid ECDSA signature for msg using the public
key pubkey. Returns Ok(true) on success. Note that this function cannot
be used for Bitcoin consensus checking since there may exist signatures
which OpenSSL would verify but not libsecp256k1, or vice-versa. Requires a
verify-capable context.
Trait Implementations
impl __Deref for SECP256K1
impl __Deref for SECP256K1type Target = Secp256k1
The resulting type after dereferencing.
fn deref(&self) -> &Secp256k1
fn deref(&self) -> &Secp256k1Dereferences the value.
impl LazyStatic for SECP256K1
impl LazyStatic for SECP256K1fn initialize(lazy: &Self)
fn initialize(lazy: &Self)