initial addition of essential crypto, encoders, workflows and LLM instructions
This commit is contained in:
79
pkg/crypto/ec/ecdsa/example_test.go
Normal file
79
pkg/crypto/ec/ecdsa/example_test.go
Normal file
@@ -0,0 +1,79 @@
|
||||
// Copyright (c) 2014 The btcsuite developers
|
||||
// Copyright (c) 2015-2021 The Decred developers
|
||||
// Use of this source code is governed by an ISC
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
// TODO: change this to work with sha256
|
||||
|
||||
package ecdsa_test
|
||||
|
||||
// // This example demonstrates signing a message with a secp256k1 secret key that
|
||||
// // is first parsed from raw bytes and serializing the generated signature.
|
||||
// func ExampleSign() {
|
||||
// // Decode a hex-encoded secret key.
|
||||
// pkBytes, err := hex.Dec("22a47fa09a223f2aa079edf85a7c2d4f87" +
|
||||
// "20ee63e502ee2869afab7de234b80c")
|
||||
// if err != nil {
|
||||
// fmt.Println(err)
|
||||
// return
|
||||
// }
|
||||
// secKey := secp256k1.SecKeyFromBytes(pkBytes)
|
||||
//
|
||||
// // Sign a message using the secret key.
|
||||
// message := "test message"
|
||||
// messageHash := blake256.Sum256(by(message))
|
||||
// signature := ecdsa.Sign(secKey, messageHash[:])
|
||||
//
|
||||
// // Serialize and display the signature.
|
||||
// fmt.Printf("Serialized Signature: %x\n", signature.Serialize())
|
||||
//
|
||||
// // Verify the signature for the message using the public key.
|
||||
// pubKey := secKey.Pubkey()
|
||||
// verified := signature.Verify(messageHash[:], pubKey)
|
||||
// fmt.Printf("Signature Verified? %v\n", verified)
|
||||
//
|
||||
// // Output:
|
||||
// // Serialized Signature: 3045022100fcc0a8768cfbcefcf2cadd7cfb0fb18ed08dd2e2ae84bef1a474a3d351b26f0302200fc1a350b45f46fa00101391302818d748c2b22615511a3ffd5bb638bd777207
|
||||
// // Signature Verified? true
|
||||
// }
|
||||
|
||||
// // This example demonstrates verifying a secp256k1 signature against a public
|
||||
// // key that is first parsed from raw bytes. The signature is also parsed from
|
||||
// // raw bytes.
|
||||
// func ExampleSignature_Verify() {
|
||||
// // Decode hex-encoded serialized public key.
|
||||
// pubKeyBytes, err := hex.Dec("02a673638cb9587cb68ea08dbef685c" +
|
||||
// "6f2d2a751a8b3c6f2a7e9a4999e6e4bfaf5")
|
||||
// if err != nil {
|
||||
// fmt.Println(err)
|
||||
// return
|
||||
// }
|
||||
// pubKey, err := secp256k1.ParsePubKey(pubKeyBytes)
|
||||
// if err != nil {
|
||||
// fmt.Println(err)
|
||||
// return
|
||||
// }
|
||||
//
|
||||
// // Decode hex-encoded serialized signature.
|
||||
// sigBytes, err := hex.Dec("3045022100fcc0a8768cfbcefcf2cadd7cfb0" +
|
||||
// "fb18ed08dd2e2ae84bef1a474a3d351b26f0302200fc1a350b45f46fa0010139130" +
|
||||
// "2818d748c2b22615511a3ffd5bb638bd777207")
|
||||
// if err != nil {
|
||||
// fmt.Println(err)
|
||||
// return
|
||||
// }
|
||||
// signature, err := ecdsa.ParseDERSignature(sigBytes)
|
||||
// if err != nil {
|
||||
// fmt.Println(err)
|
||||
// return
|
||||
// }
|
||||
//
|
||||
// // Verify the signature for the message using the public key.
|
||||
// message := "test message"
|
||||
// messageHash := blake256.Sum256(by(message))
|
||||
// verified := signature.Verify(messageHash[:], pubKey)
|
||||
// fmt.Println("Signature Verified?", verified)
|
||||
//
|
||||
// // Output:
|
||||
// // Signature Verified? true
|
||||
// }
|
||||
Reference in New Issue
Block a user