no_std
-friendlygetrandom
) if notcargo.toml
:
toml
[dependencies]
ed25519-compact = "0.1"
Example code:
```rust // A message to sign and verify. let message = b"test";
// Generates a new key pair using a random seed. // A given seed will always produce the same key pair. let keypair = KeyPair::fromseed(Seed::default());
// Computes a signature for this message using the secret part of the key pair. let signature = key_pair.sk.sign(message, Some(Noise::default()));
// Verifies the signature using the public part of the key pair. key_pair .pk .verify(message, &signature) .expect("Signature didn't verify");
// Verification of a different message using the same signature and public key fails. keypair .pk .verify(b"A different message", &signature) .expecterr("Signature shouldn't verify");
// All these structures can be viewed as raw bytes simply by dereferencing them: let signatureasbytes: &[u8] = signature.asref(); println!("Signature as bytes: {:?}", signatureas_bytes); ```
self-verify
: after having computed a new signature, verify that is it valid. This is slower, but improves resilience against fault attacks. It is enabled by default on WebAssembly targets.std
: disables no_std
compatibility in order to make errors implement the standard Error
trait.random
(enabled by default): adds Default
implementations to the Seed
and Noise
objects, in order to securely create random keys and noise.traits
: add support for the traits from the ed25519
and signature
crates.pem
: add support for importing/exporting keys as OpenSSL-compatible PEM files.blind-keys
: add support for key blinding.opt_size
: Enable size optimizations (based on benchmarks, 8-15% size reduction at the cost of 6.5-7% performance).x25519
: Enable support for the X25519 key exchange system.signatures
: Enable support for signatures. Always required unless only X25519 is used.