-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathsign_verify_ecdsa.rs
More file actions
48 lines (36 loc) · 1.38 KB
/
sign_verify_ecdsa.rs
File metadata and controls
48 lines (36 loc) · 1.38 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
mod create;
use create::create_key_manager_example;
use bitcoin::{
key::rand::RngCore,
secp256k1::{self, Message},
};
use key_manager::{key_type::BitcoinKeyType, verifier::SignatureVerifier};
fn main() {
// see function code, main is just a wrapper to run the example
sign_verify_ecdsa_example();
}
fn sign_verify_ecdsa_example() {
let key_manager = create_key_manager_example("sign_verify_ecdsa");
// --- Signing and verifying a message using ECDSA
let mut rng = secp256k1::rand::thread_rng();
// Create a random Message.
let mut digest = [0u8; 32];
rng.fill_bytes(&mut digest);
let message = Message::from_digest(digest);
// Create a key pair
let public_key = key_manager
.derive_keypair(BitcoinKeyType::P2wpkh, 0)
.unwrap();
// Create an ECDSA signature of the random Message by selecting the private associated to the public key passed as parameter
let signature = key_manager
.sign_ecdsa_message(&message, &public_key)
.unwrap();
// Verify the signature
let signature_verifier = SignatureVerifier::new();
let sig_ok = signature_verifier.verify_ecdsa_signature(&signature, &message, public_key);
println!("Signature valid: {}", sig_ok);
// Recover signature
let _recoverable_sig = key_manager
.sign_ecdsa_recoverable_message(&message, &public_key)
.unwrap();
}