v/vlib/crypto/ecdsa
2025-06-22 12:35:30 +03:00
..
example crypto.ecdsa: add support for OpenSSL on OpenBSD (#24772) 2025-06-22 12:35:30 +03:00
ecdsa.c.v crypto.ecdsa: add support for OpenSSL on OpenBSD (#24772) 2025-06-22 12:35:30 +03:00
ecdsa.v all: fix typos (#24470) 2025-05-13 22:05:22 +03:00
ecdsa_test.v crypto.ecdsa: add support for OpenSSL on OpenBSD (#24772) 2025-06-22 12:35:30 +03:00
README.md crypto.ecdsa: update and cleanup the documentation (#23897) 2025-03-10 10:37:00 +02:00
util.v crypto.ecdsa: update and cleanup the documentation (#23897) 2025-03-10 10:37:00 +02:00
util_test.v crypto.ecdsa: add support for OpenSSL on OpenBSD (#24772) 2025-06-22 12:35:30 +03:00

ecdsa

ecdsa module for V language. Its a wrapper on top of openssl ecdsa functionality. Its currently (expanded) to support the following curves:

  • NIST P-256 curve, commonly referred as prime256v1 or secp256r1
  • NIST P-384 curve, commonly referred as secp384r1
  • NIST P-521 curve, commonly referred as secp521r1
  • A famous Bitcoin curve, commonly referred as secp256k1

Example

import crypto.ecdsa

fn main() {
	// create default NIST P-256 secp256r1 curve key pair. If you wish to generate another curve,
	// use: `pbkey, pvkey := ecdsa.generate_key(nid: .secp521r1)!` instead.
	pbkey, pvkey := ecdsa.generate_key()!

	message_tobe_signed := 'Hello ecdsa'.bytes()
	// create a signature with the recommended hash
	signature := pvkey.sign(message_tobe_signed)!

	// verify the message with the signature
	verified := pbkey.verify(message_tobe_signed, signature)!
	dump(verified) // should be true

	// free allocated keys when you have done with your work.
	pbkey.free()
	pvkey.free()
}