Entry point to generate extended private keys in a hierarchical deterministic wallet starting from a seed based
on the BIP-0032 standard
(and the SLIP-0010 for crypto suites other than Secp256k1).
Entry point to generate a hierarchical deterministic wallet using the BIP-0044
standard. It is a more structured way to use the same seed for
multiple coins, each with multiple accounts, each accounts with a new key for each transaction request. The standard is built on
BIP-0043 using the purpose code 44. And BIP-0043 itself uses
BIP-0032 to derive all nodes from a single master extended private key.
In BIP-0032 each extended private key has the same operations, independently from the actual path. This struct represents such
an extended private key in a given subtree.
In BIP-0032 a neutered extended private key is an extended public key. This object represents
such an extended public key in a given subtree. It is able to do normal (public) derivation,
signature verification, creating and validating key identifiers
Public API for a sub-account of a given account on a given coin that is either used for external keys (receiving addresses) or
internal keys (change addresses). Some implementations do not distinguish these and just always use receiving
addresses.
Private API for a sub-account of a given account on a given coin that is either used for external keys (receiving addresses) or
internal keys (change addresses). Some implementations do not distinguish these and just always use receiving
addresses.
An object representing a valid DID. This identifier can be used to look up a DID document
on multiple blockchains. Without any on-chain SSI transactions, there will be a single
key that can update and impersonate the DID, which has the default key identifier.
Starting point for deriving all Morpheus related keys in a BIP32 hierarchy. Morpheus uses Ed25519 cipher and currently there are no
WASM wrappers for Bip32 nodes with that cipher. Still, Bip32 paths are returned by each object so compatible wallets can derive the
same extended private keys.
The seed used for BIP32 derivations. A seed cannot be turned back into a
phrase, because there is salted hashing involed in creating it from the
BIP39 mnemonic phrase.
JSON signed by a multicipher key. Since the signature is done on a digest created by {@link digestJson}, the same signature can be
validated against different selectively revealed JSON documents.
Most WASM types are wrapping a Rust type one-on-one. This trait helps to enforce a convention
so that WASM types can easily peek under the hood of other such wrapped WASM types.
Most WASM types are wrapping a Rust type one-on-one. This trait helps to enforce a convention
so that WASM types can easily peek under the hood of other such wrapped WASM types.
Decrypts the ciphertext with a password. The format of the ciphertext is
defined by the {@link encrypt} function. Only the matching password will decrypt
the ciphertext.
Calculates the digest of a JSON document. Since this digest is calculated by recursively replacing sub-objects with their digest,
it is possible to selectively reveal parts of the document using {@link selectiveDigestJson}
Encrypts the plaintext with a password. Make sure the password is not weak.
A random nonce is generated for each call so each time the same plaintext is
encrypted with the same password, the result is a different ciphertext. The
ciphertext returned will be 40 bytes longer than the plaintext.
Returns a canonical string representation of a JSON document, in which any sub-objects not explicitly listed in the
second argument are collapsed to their digest. The format of the second argument is inspired by
JQ basic filters and these are some examples:
This function provides a canonical string for any JSON document. Order of the keys in objects, whitespace
and unicode normalization are all taken care of, so document that belongs to a single digest is not malleable.
You should protect scalar values and easy-to-guess lists by replacing them with an object that has an extra “nonce” property, which
has enough entropy. List of all countries, cities in a country, streets in a city are all easy to enumerate for a brute-fore
attack.