pub struct SecretKey(/* private fields */);Expand description
Secret key - a 256-bit key used to create ECDSA and Taproot signatures.
This value should be generated using a cryptographically secure pseudorandom number generator.
§Side channel attacks
We have attempted to reduce the side channel attack surface by implementing a constant time eq
method. For similar reasons we explicitly do not implement PartialOrd, Ord, or Hash on
SecretKey. If you really want to order secret keys then you can use AsRef to get at the
underlying bytes and compare them - however this is almost certainly a bad idea.
§Serde support
Implements de/serialization with the serde feature enabled. We treat the byte value as a tuple
of 32 u8s for non-human-readable formats. This representation is optimal for some formats
(e.g. bincode) however other formats may be less optimal (e.g. cbor).
§Examples
Basic usage:
use secp256k1::{rand, SecretKey};
let secret_key = SecretKey::new(&mut rand::rng());Implementations§
Source§impl SecretKey
impl SecretKey
Sourcepub fn display_secret(&self) -> DisplaySecret
pub fn display_secret(&self) -> DisplaySecret
Formats the explicit byte value of the secret key kept inside the type as a little-endian hexadecimal string using the provided formatter.
This is the only method that outputs the actual secret key value, and, thus, should be used with extreme caution.
§Examples
use secp256k1::SecretKey;
let key = SecretKey::from_str("0000000000000000000000000000000000000000000000000000000000000001").unwrap();
// Normal debug hides value (`Display` is not implemented for `SecretKey`).
// E.g., `format!("{:?}", key)` prints "SecretKey(#2518682f7819fb2d)".
// Here we explicitly display the secret value:
assert_eq!(
"0000000000000000000000000000000000000000000000000000000000000001",
format!("{}", key.display_secret())
);
// Also, we can explicitly display with `Debug`:
assert_eq!(
format!("{:?}", key.display_secret()),
format!("DisplaySecret(\"{}\")", key.display_secret())
);Source§impl SecretKey
impl SecretKey
Sourcepub fn non_secure_erase(&mut self)
pub fn non_secure_erase(&mut self)
Attempts to erase the contents of the underlying array.
Note, however, that the compiler is allowed to freely copy or move the
contents of this array to other places in memory. Preventing this behavior
is very subtle. For more discussion on this, please see the documentation
of the zeroize crate.
Source§impl SecretKey
impl SecretKey
Sourcepub fn to_secret_bytes(&self) -> [u8; 32]
pub fn to_secret_bytes(&self) -> [u8; 32]
Returns the secret key as a byte value.
§Side channel attacks
Using ordering functions (PartialOrd/Ord) on a reference to secret keys leaks data
because the implementations are not constant time. Doing so will make your code vulnerable
to side channel attacks. SecretKey::eq is implemented using a constant time algorithm,
please consider using it to do comparisons of secret keys.
Sourcepub fn as_secret_bytes(&self) -> &[u8; 32]
pub fn as_secret_bytes(&self) -> &[u8; 32]
Returns a reference to the secret key as a byte array.
See note on Self::to_secret_bytes.
Sourcepub fn from_secret_bytes(data: [u8; 32]) -> Result<SecretKey, Error>
pub fn from_secret_bytes(data: [u8; 32]) -> Result<SecretKey, Error>
Converts a 32-byte array to a secret key.
See note on Self::to_secret_bytes.
§Errors
Returns an error when the secret key is invalid: when it is all-zeros or would exceed the curve order when interpreted as a big-endian unsigned integer.
§Examples
use secp256k1::SecretKey;
let sk = SecretKey::from_byte_array([0xcd; 32]).expect("32 bytes, within curve order");Source§impl SecretKey
impl SecretKey
Sourcepub fn from_byte_array(data: [u8; 32]) -> Result<SecretKey, Error>
👎Deprecated since 0.32.0: use from_secret_bytes instead
pub fn from_byte_array(data: [u8; 32]) -> Result<SecretKey, Error>
Converts a 32-byte array to a secret key.
Sourcepub fn from_keypair(keypair: &Keypair) -> Self
pub fn from_keypair(keypair: &Keypair) -> Self
Sourcepub fn secret_bytes(&self) -> [u8; 32]
👎Deprecated since 0.32.0: use to_secret_bytes instead
pub fn secret_bytes(&self) -> [u8; 32]
Returns the secret key as a byte value.
Sourcepub fn sign_ecdsa(&self, msg: impl Into<Message>) -> Signature
pub fn sign_ecdsa(&self, msg: impl Into<Message>) -> Signature
Constructs an ECDSA signature for msg.
Sourcepub fn keypair(&self) -> Keypair
pub fn keypair(&self) -> Keypair
Returns the Keypair for this SecretKey.
This is equivalent to using Keypair::from_secret_key.
Sourcepub fn public_key(&self) -> PublicKey
pub fn public_key(&self) -> PublicKey
Returns the PublicKey for this SecretKey.
This is equivalent to using PublicKey::from_secret_key.
Sourcepub fn x_only_public_key(&self) -> (XOnlyPublicKey, Parity)
pub fn x_only_public_key(&self) -> (XOnlyPublicKey, Parity)
Returns the XOnlyPublicKey (and its Parity) for this SecretKey.
This is equivalent to XOnlyPublicKey::from_keypair(self.keypair(secp)).