Struct schnorrkel::derive::ChainCode
source · [−]Expand description
We cannot assume the original public key is secret and additional
inputs might have low entropy, like i
in BIP32. As in BIP32,
chain codes fill this gap by being a high entropy secret shared
between public and private key holders. These are produced by
key derivations and can be incorporated into subsequence key
derivations.
See https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki#extended-keys
Tuple Fields
0: [u8; 32]
Trait Implementations
impl Copy for ChainCode
impl Eq for ChainCode
impl StructuralEq for ChainCode
impl StructuralPartialEq for ChainCode
Auto Trait Implementations
impl RefUnwindSafe for ChainCode
impl Send for ChainCode
impl Sync for ChainCode
impl Unpin for ChainCode
impl UnwindSafe for ChainCode
Blanket Implementations
sourceimpl<T> BorrowMut<T> for T where
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
const: unstable · sourcepub fn borrow_mut(&mut self) -> &mut T
pub fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more
sourceimpl<T> ToOwned for T where
T: Clone,
impl<T> ToOwned for T where
T: Clone,
type Owned = T
type Owned = T
The resulting type after obtaining ownership.
sourcepub fn to_owned(&self) -> T
pub fn to_owned(&self) -> T
Creates owned data from borrowed data, usually by cloning. Read more
sourcepub fn clone_into(&self, target: &mut T)
pub fn clone_into(&self, target: &mut T)
🔬 This is a nightly-only experimental API. (
toowned_clone_into
)Uses borrowed data to replace owned data, usually by cloning. Read more