Files
swift-secure-enclave-tool-rs/examples/generate_keypair.rs
2025-03-23 23:00:39 +08:00

43 lines
1.4 KiB
Rust

use swift_secure_enclave_tool_rs::{
generate_ecdsa_keypair, is_secure_enclave_supported, KeyMaterial, KeyPurpose,
};
fn main() {
println!(
"Secure Enclave supported: {}",
is_secure_enclave_supported().unwrap()
);
let ecdsa_key_material_require_bio = generate_ecdsa_keypair(KeyPurpose::Signing, true).unwrap();
print_key_material("Signing key [require bio]", &ecdsa_key_material_require_bio);
let ecdsa_key_material_no_bio = generate_ecdsa_keypair(KeyPurpose::Signing, true).unwrap();
print_key_material("Signing key [no bio]", &ecdsa_key_material_no_bio);
let ecdsa_key_material_require_bio =
generate_ecdsa_keypair(KeyPurpose::KeyAgreement, true).unwrap();
print_key_material(
"Key agreement key [require bio]",
&ecdsa_key_material_require_bio,
);
let ecdsa_key_material_no_bio = generate_ecdsa_keypair(KeyPurpose::KeyAgreement, true).unwrap();
print_key_material("Key agreement key [no bio]", &ecdsa_key_material_no_bio);
}
fn print_key_material(prefix: &str, key_material: &KeyMaterial) {
println!("\n{}", prefix);
println!(
"Public key point:\n{}",
hex::encode(&key_material.public_key_point)
);
println!(
"\nPublic key:\n{}",
hex::encode(&key_material.public_key_der)
);
println!(
"\nPrivate key representation:\n{}",
hex::encode(&key_material.private_key_representation)
);
}