pub fn derive_key_pair_from_path(
seed: &[u8],
derivation_path: Option<DerivationPath>,
key_scheme: &SignatureScheme,
) -> Result<(SuiAddress, SuiKeyPair), SuiError>
Expand description
Ed25519 follows SLIP-0010 using hardened path: m/44’/784’/0’/0’/{index}’ Secp256k1 follows BIP-32/44 using path where the first 3 levels are hardened: m/54’/784’/0’/0/{index} Secp256r1 follows BIP-32/44 using path where the first 3 levels are hardened: m/74’/784’/0’/0/{index} Note that the purpose node is used to distinguish signature schemes.