Expand description
Convenience wrappers around core sub-protocols.
Functions
- Given random bytes and an identity provider, returns the verifying key and a signature of the random bytes.
- Given a “command”, an identity authenticated request payload and a list of verifying keys for the other parties, returns an ok result with a challenge fragment for initiating an identity challenge for a valid request or an appropriate error result for an invalid request.s
- Given random bytes, a verifying key for the sending party, a signature of the random bytes and a list of verifying keys for the other parties, returns an ok result for a valid request or an appropriate error result for an invalid request.