ECDSA-based signer for Swarmauri
Project description
Swarmauri Signing ECDSA
An asynchronous ECDSA-based signer that implements the ISigning interface for
detached signatures over raw bytes and canonicalized envelopes.
Features
- JSON canonicalization built in, with optional CBOR canonicalization via
cbor2 - Supports the
ECDSA-P256-SHA256,ECDSA-P384-SHA384, andECDSA-P521-SHA512curves provided bycryptography - Multi-signature aware verification with opt-in algorithm restrictions through
the
requiremapping - Detached signature generation for both raw byte payloads and Swarmauri envelopes
Installation
pip
pip install swarmauri_signing_ecdsa
# Optional CBOR support
pip install "swarmauri_signing_ecdsa[cbor]"
Poetry
poetry add swarmauri_signing_ecdsa
# Optional CBOR support
poetry add "swarmauri_signing_ecdsa[cbor]"
uv
# Install uv if it is not already available on your system
curl -LsSf https://astral.sh/uv/install.sh | sh
# Install the signer package
uv pip install swarmauri_signing_ecdsa
# Optional CBOR support
uv pip install "swarmauri_signing_ecdsa[cbor]"
Usage
The signer operates asynchronously and expects private keys to be supplied via
the KeyRef mappings defined in swarmauri_core. When verifying, provide the
corresponding public keys through the opts={"pubkeys": [...]} option.
import asyncio
from cryptography.hazmat.primitives.asymmetric import ec
from swarmauri_signing_ecdsa import EcdsaEnvelopeSigner
async def main() -> None:
signer = EcdsaEnvelopeSigner()
# Provide the private key as a KeyRef understood by swarmauri_core
private_key = ec.generate_private_key(ec.SECP256R1())
key_ref = {"kind": "cryptography_obj", "obj": private_key}
envelope = {
"headers": {"kid": "example"},
"payload": {"message": "signed hello"},
}
signatures = await signer.sign_envelope(
key_ref,
envelope,
canon="json",
)
is_valid = await signer.verify_envelope(
envelope,
signatures,
canon="json",
opts={"pubkeys": [private_key.public_key()]},
)
print(f"Signature valid? {is_valid}")
if __name__ == "__main__":
asyncio.run(main())
Entry Point
The signer registers under the swarmauri.signings entry point as
EcdsaEnvelopeSigner.
Want to help?
If you want to contribute to swarmauri-sdk, read up on our guidelines for contributing that will help you get started.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file swarmauri_signing_ecdsa-0.3.0.dev31.tar.gz.
File metadata
- Download URL: swarmauri_signing_ecdsa-0.3.0.dev31.tar.gz
- Upload date:
- Size: 9.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.10.3 {"installer":{"name":"uv","version":"0.10.3","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
2ad85759f39cf6891831730c09d8765c615a18cf75fd8ec05dc0b3b687e7d496
|
|
| MD5 |
5d37f2a6bb83d9add35d450b603d807a
|
|
| BLAKE2b-256 |
3844fa6baf581fa44fac3dde6ebc4fb53276772f5d40bea942999b8cd30f1664
|
File details
Details for the file swarmauri_signing_ecdsa-0.3.0.dev31-py3-none-any.whl.
File metadata
- Download URL: swarmauri_signing_ecdsa-0.3.0.dev31-py3-none-any.whl
- Upload date:
- Size: 10.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.10.3 {"installer":{"name":"uv","version":"0.10.3","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
a6eb3ed5052704a9467570d22253d5ced01d62185bd6d4137a43265fedcef23c
|
|
| MD5 |
75cfbc426fcf18f8f06570b41fadaa76
|
|
| BLAKE2b-256 |
3754bf94ca0e36cd5a7b1a6f7a0df9b4c7b90074ae97ac9cc3d060b40ef2a4bb
|