Add an example for ED25519 keys.
This commit is contained in:
@@ -1,3 +1,26 @@
|
|||||||
|
//! The generation and use of ED25519 keys is the most straightforward
|
||||||
|
//! of all the asymmetric crypto schemes, because you basically get no
|
||||||
|
//! choices. There's just one key size, and you're going to use the
|
||||||
|
//! built-in hash (which is a good one, if you were worried). So if
|
||||||
|
//! you're not sure, this is a pretty good choice.
|
||||||
|
//!
|
||||||
|
//! ```rust
|
||||||
|
//! extern crate sha2;
|
||||||
|
//!
|
||||||
|
//! use simple_crypto::ed25519::ED25519KeyPair;
|
||||||
|
//!
|
||||||
|
//! // Generate a new ED25519 key
|
||||||
|
//! let mut rng = rand::rngs::OsRng::new().unwrap();
|
||||||
|
//! let kp = ED25519KeyPair::generate(&mut rng);
|
||||||
|
//!
|
||||||
|
//! // Now that you have this key pair, you can sign and verify messages
|
||||||
|
//! // using it. For example, to sign the vector [0,1,2,3,4] and then
|
||||||
|
//! // verify that signature, we would write:
|
||||||
|
//! let msg = vec![0,1,2,3,4];
|
||||||
|
//! let sig = kp.private.sign(&msg);
|
||||||
|
//! assert!( kp.public.verify(&msg, &sig) );
|
||||||
|
//! ```
|
||||||
|
|
||||||
mod constants;
|
mod constants;
|
||||||
mod fe;
|
mod fe;
|
||||||
mod loads;
|
mod loads;
|
||||||
|
|||||||
Reference in New Issue
Block a user