pub struct Secp256k1<C: Context> { /* private fields */ }
Expand description
The secp256k1 engine, used to execute all signature operations.
Implementations§
source§impl<C: Context> Secp256k1<C>
impl<C: Context> Secp256k1<C>
sourcepub fn gen_new() -> Secp256k1<C>
Available on crate feature alloc
only.
pub fn gen_new() -> Secp256k1<C>
alloc
only.Lets you create a context in a generic manner (sign/verify/all).
If rand-std
feature is enabled, context will have been randomized using thread_rng
.
If rand-std
feature is not enabled please consider randomizing the context as follows:
let mut ctx = Secp256k1::new();
// let seed = <32 bytes of random data>
ctx.seeded_randomize(&seed);
source§impl Secp256k1<All>
impl Secp256k1<All>
sourcepub fn new() -> Secp256k1<All>
Available on crate feature alloc
only.
pub fn new() -> Secp256k1<All>
alloc
only.Creates a new Secp256k1 context with all capabilities.
If rand-std
feature is enabled, context will have been randomized using thread_rng
.
If rand-std
feature is not enabled please consider randomizing the context (see docs
for Secp256k1::gen_new()
).
source§impl Secp256k1<SignOnly>
impl Secp256k1<SignOnly>
sourcepub fn signing_only() -> Secp256k1<SignOnly>
Available on crate feature alloc
only.
pub fn signing_only() -> Secp256k1<SignOnly>
alloc
only.Creates a new Secp256k1 context that can only be used for signing.
If rand-std
feature is enabled, context will have been randomized using thread_rng
.
If rand-std
feature is not enabled please consider randomizing the context (see docs
for Secp256k1::gen_new()
).
source§impl Secp256k1<VerifyOnly>
impl Secp256k1<VerifyOnly>
sourcepub fn verification_only() -> Secp256k1<VerifyOnly>
Available on crate feature alloc
only.
pub fn verification_only() -> Secp256k1<VerifyOnly>
alloc
only.Creates a new Secp256k1 context that can only be used for verification.
- If
rand-std
feature is enabled, context will have been randomized usingthread_rng
. - If
rand-std
feature is not enabled please consider randomizing the context (see docs forSecp256k1::gen_new()
).
source§impl<'buf, C: Context + PreallocatedContext<'buf>> Secp256k1<C>
impl<'buf, C: Context + PreallocatedContext<'buf>> Secp256k1<C>
sourcepub fn preallocated_gen_new(
buf: &'buf mut [AlignedType]
) -> Result<Secp256k1<C>, Error>
pub fn preallocated_gen_new(
buf: &'buf mut [AlignedType]
) -> Result<Secp256k1<C>, Error>
Lets you create a context with a preallocated buffer in a generic manner (sign/verify/all).
source§impl<'buf> Secp256k1<AllPreallocated<'buf>>
impl<'buf> Secp256k1<AllPreallocated<'buf>>
sourcepub fn preallocated_new(
buf: &'buf mut [AlignedType]
) -> Result<Secp256k1<AllPreallocated<'buf>>, Error>
pub fn preallocated_new(
buf: &'buf mut [AlignedType]
) -> Result<Secp256k1<AllPreallocated<'buf>>, Error>
Creates a new Secp256k1 context with all capabilities.
sourcepub fn preallocate_size() -> usize
pub fn preallocate_size() -> usize
Uses the ffi secp256k1_context_preallocated_size
to check the memory size needed for a context.
sourcepub unsafe fn from_raw_all(
raw_ctx: NonNull<Context>
) -> ManuallyDrop<Secp256k1<AllPreallocated<'buf>>>
pub unsafe fn from_raw_all(
raw_ctx: NonNull<Context>
) -> ManuallyDrop<Secp256k1<AllPreallocated<'buf>>>
Creates a context from a raw context.
Safety
This is highly unsafe, due to the number of conditions that aren’t checked.
raw_ctx
needs to be a valid Secp256k1 context pointer. that was generated by exactly the same code/version of the libsecp256k1 used here.- The capabilities (All/SignOnly/VerifyOnly) of the context must match the flags passed to libsecp256k1 when generating the context.
- The user must handle the freeing of the context(using the correct functions) by himself.
- Violating these may lead to Undefined Behavior.
source§impl<'buf> Secp256k1<SignOnlyPreallocated<'buf>>
impl<'buf> Secp256k1<SignOnlyPreallocated<'buf>>
sourcepub fn preallocated_signing_only(
buf: &'buf mut [AlignedType]
) -> Result<Secp256k1<SignOnlyPreallocated<'buf>>, Error>
pub fn preallocated_signing_only(
buf: &'buf mut [AlignedType]
) -> Result<Secp256k1<SignOnlyPreallocated<'buf>>, Error>
Creates a new Secp256k1 context that can only be used for signing.
sourcepub fn preallocate_signing_size() -> usize
pub fn preallocate_signing_size() -> usize
Uses the ffi secp256k1_context_preallocated_size
to check the memory size needed for the context.
sourcepub unsafe fn from_raw_signing_only(
raw_ctx: NonNull<Context>
) -> ManuallyDrop<Secp256k1<SignOnlyPreallocated<'buf>>>
pub unsafe fn from_raw_signing_only(
raw_ctx: NonNull<Context>
) -> ManuallyDrop<Secp256k1<SignOnlyPreallocated<'buf>>>
Creates a context from a raw context.
Safety
This is highly unsafe, due to the number of conditions that aren’t checked.
raw_ctx
needs to be a valid Secp256k1 context pointer. that was generated by exactly the same code/version of the libsecp256k1 used here.- The capabilities (All/SignOnly/VerifyOnly) of the context must match the flags passed to libsecp256k1 when generating the context.
- The user must handle the freeing of the context(using the correct functions) by himself.
- This list is not exhaustive, and any violation may lead to Undefined Behavior.
source§impl<'buf> Secp256k1<VerifyOnlyPreallocated<'buf>>
impl<'buf> Secp256k1<VerifyOnlyPreallocated<'buf>>
sourcepub fn preallocated_verification_only(
buf: &'buf mut [AlignedType]
) -> Result<Secp256k1<VerifyOnlyPreallocated<'buf>>, Error>
pub fn preallocated_verification_only(
buf: &'buf mut [AlignedType]
) -> Result<Secp256k1<VerifyOnlyPreallocated<'buf>>, Error>
Creates a new Secp256k1 context that can only be used for verification
sourcepub fn preallocate_verification_size() -> usize
pub fn preallocate_verification_size() -> usize
Uses the ffi secp256k1_context_preallocated_size
to check the memory size needed for the context.
sourcepub unsafe fn from_raw_verification_only(
raw_ctx: NonNull<Context>
) -> ManuallyDrop<Secp256k1<VerifyOnlyPreallocated<'buf>>>
pub unsafe fn from_raw_verification_only(
raw_ctx: NonNull<Context>
) -> ManuallyDrop<Secp256k1<VerifyOnlyPreallocated<'buf>>>
Creates a context from a raw context.
Safety
This is highly unsafe, due to the number of conditions that aren’t checked.
raw_ctx
needs to be a valid Secp256k1 context pointer. that was generated by exactly the same code/version of the libsecp256k1 used here.- The capabilities (All/SignOnly/VerifyOnly) of the context must match the flags passed to libsecp256k1 when generating the context.
- The user must handle the freeing of the context(using the correct functions) by himself.
- This list is not exhaustive, and any violation may lead to Undefined Behavior.
source§impl<C: Signing> Secp256k1<C>
impl<C: Signing> Secp256k1<C>
sourcepub fn sign_ecdsa_recoverable(
&self,
msg: &Message,
sk: &SecretKey
) -> RecoverableSignature
pub fn sign_ecdsa_recoverable(
&self,
msg: &Message,
sk: &SecretKey
) -> RecoverableSignature
Constructs a signature for msg
using the secret key sk
and RFC6979 nonce
Requires a signing-capable context.
sourcepub fn sign_ecdsa_recoverable_with_noncedata(
&self,
msg: &Message,
sk: &SecretKey,
noncedata: &[u8; 32]
) -> RecoverableSignature
pub fn sign_ecdsa_recoverable_with_noncedata(
&self,
msg: &Message,
sk: &SecretKey,
noncedata: &[u8; 32]
) -> RecoverableSignature
Constructs a signature for msg
using the secret key sk
and RFC6979 nonce
and includes 32 bytes of noncedata in the nonce generation via inclusion in
one of the hash operations during nonce generation. This is useful when multiple
signatures are needed for the same Message and SecretKey while still using RFC6979.
Requires a signing-capable context.
source§impl<C: Verification> Secp256k1<C>
impl<C: Verification> Secp256k1<C>
sourcepub fn recover_ecdsa(
&self,
msg: &Message,
sig: &RecoverableSignature
) -> Result<PublicKey, Error>
pub fn recover_ecdsa(
&self,
msg: &Message,
sig: &RecoverableSignature
) -> Result<PublicKey, Error>
Determines the public key for which sig
is a valid signature for
msg
. Requires a verify-capable context.
source§impl<C: Signing> Secp256k1<C>
impl<C: Signing> Secp256k1<C>
sourcepub fn sign_ecdsa(&self, msg: &Message, sk: &SecretKey) -> Signature
pub fn sign_ecdsa(&self, msg: &Message, sk: &SecretKey) -> Signature
Constructs a signature for msg
using the secret key sk
and RFC6979 nonce
Requires a signing-capable context.
sourcepub fn sign_ecdsa_with_noncedata(
&self,
msg: &Message,
sk: &SecretKey,
noncedata: &[u8; 32]
) -> Signature
pub fn sign_ecdsa_with_noncedata(
&self,
msg: &Message,
sk: &SecretKey,
noncedata: &[u8; 32]
) -> Signature
Constructs a signature for msg
using the secret key sk
and RFC6979 nonce
and includes 32 bytes of noncedata in the nonce generation via inclusion in
one of the hash operations during nonce generation. This is useful when multiple
signatures are needed for the same Message and SecretKey while still using RFC6979.
Requires a signing-capable context.
sourcepub fn sign_ecdsa_grind_r(
&self,
msg: &Message,
sk: &SecretKey,
bytes_to_grind: usize
) -> Signature
pub fn sign_ecdsa_grind_r(
&self,
msg: &Message,
sk: &SecretKey,
bytes_to_grind: usize
) -> Signature
Constructs a signature for msg
using the secret key sk
, RFC6979 nonce
and “grinds” the nonce by passing extra entropy if necessary to produce
a signature that is less than 71 - bytes_to_grind
bytes. The number
of signing operation performed by this function is exponential in the
number of bytes grinded.
Requires a signing capable context.
sourcepub fn sign_ecdsa_low_r(&self, msg: &Message, sk: &SecretKey) -> Signature
pub fn sign_ecdsa_low_r(&self, msg: &Message, sk: &SecretKey) -> Signature
Constructs a signature for msg
using the secret key sk
, RFC6979 nonce
and “grinds” the nonce by passing extra entropy if necessary to produce
a signature that is less than 71 bytes and compatible with the low r
signature implementation of bitcoin core. In average, this function
will perform two signing operations.
Requires a signing capable context.
source§impl<C: Verification> Secp256k1<C>
impl<C: Verification> Secp256k1<C>
sourcepub fn verify_ecdsa(
&self,
msg: &Message,
sig: &Signature,
pk: &PublicKey
) -> Result<(), Error>
pub fn verify_ecdsa(
&self,
msg: &Message,
sig: &Signature,
pk: &PublicKey
) -> Result<(), Error>
Checks that sig
is a valid ECDSA signature for msg
using the public
key pubkey
. Returns Ok(())
on success. Note that this function cannot
be used for Bitcoin consensus checking since there may exist signatures
which OpenSSL would verify but not libsecp256k1, or vice-versa. Requires a
verify-capable context.
let message = Message::from_slice(&[0xab; 32]).expect("32 bytes");
let sig = secp.sign_ecdsa(&message, &secret_key);
assert_eq!(secp.verify_ecdsa(&message, &sig, &public_key), Ok(()));
let message = Message::from_slice(&[0xcd; 32]).expect("32 bytes");
assert_eq!(secp.verify_ecdsa(&message, &sig, &public_key), Err(Error::IncorrectSignature));
source§impl<C: Signing> Secp256k1<C>
impl<C: Signing> Secp256k1<C>
sourcepub fn sign_schnorr(&self, msg: &Message, keypair: &KeyPair) -> Signature
Available on crate feature rand-std
only.
pub fn sign_schnorr(&self, msg: &Message, keypair: &KeyPair) -> Signature
rand-std
only.Creates a schnorr signature internally using the rand::rngs::ThreadRng
random number
generator to generate the auxiliary random data.
sourcepub fn sign_schnorr_no_aux_rand(
&self,
msg: &Message,
keypair: &KeyPair
) -> Signature
pub fn sign_schnorr_no_aux_rand(
&self,
msg: &Message,
keypair: &KeyPair
) -> Signature
Creates a schnorr signature without using any auxiliary random data.
source§impl<C: Verification> Secp256k1<C>
impl<C: Verification> Secp256k1<C>
sourcepub fn verify_schnorr(
&self,
sig: &Signature,
msg: &Message,
pubkey: &XOnlyPublicKey
) -> Result<(), Error>
pub fn verify_schnorr(
&self,
sig: &Signature,
msg: &Message,
pubkey: &XOnlyPublicKey
) -> Result<(), Error>
Verifies a schnorr signature.
source§impl<C: Context> Secp256k1<C>
impl<C: Context> Secp256k1<C>
sourcepub fn ctx(&self) -> NonNull<Context>
pub fn ctx(&self) -> NonNull<Context>
Getter for the raw pointer to the underlying secp256k1 context. This shouldn’t be needed with normal usage of the library. It enables extending the Secp256k1 with more cryptographic algorithms outside of this crate.
sourcepub fn preallocate_size_gen() -> usize
pub fn preallocate_size_gen() -> usize
Returns the required memory for a preallocated context buffer in a generic manner(sign/verify/all).
sourcepub fn randomize<R: Rng + ?Sized>(&mut self, rng: &mut R)
Available on crate feature rand
only.
pub fn randomize<R: Rng + ?Sized>(&mut self, rng: &mut R)
rand
only.(Re)randomizes the Secp256k1 context for extra sidechannel resistance.
Requires compilation with “rand” feature. See comment by Gregory Maxwell in libsecp256k1.
sourcepub fn seeded_randomize(&mut self, seed: &[u8; 32])
pub fn seeded_randomize(&mut self, seed: &[u8; 32])
(Re)randomizes the Secp256k1 context for extra sidechannel resistance given 32 bytes of cryptographically-secure random data; see comment in libsecp256k1 commit d2275795f by Gregory Maxwell.
source§impl<C: Signing> Secp256k1<C>
impl<C: Signing> Secp256k1<C>
sourcepub fn generate_keypair<R: Rng + ?Sized>(
&self,
rng: &mut R
) -> (SecretKey, PublicKey)
Available on crate feature rand
only.
pub fn generate_keypair<R: Rng + ?Sized>(
&self,
rng: &mut R
) -> (SecretKey, PublicKey)
rand
only.Generates a random keypair. Convenience function for SecretKey::new
and
PublicKey::from_secret_key
.