@@ -62,7 +62,7 @@ HD Wallet Seed: ac27495480225222079d7be181583751e86f571027b0497b5b5d11218e0a8a1
62
62
- DashHd derivations & encodings
63
63
- HD Key Types
64
64
- [ Tutorial Walkthrough] ( #walkthrough )
65
- - Passphrase , Secret, Seed
65
+ - Recovery Phrase , Secret, Seed
66
66
- Wallet Derivation
67
67
- HD Path Derivation
68
68
- _ Wallet_ , _ Account_ , and _ X Key_ Derivation
@@ -162,7 +162,7 @@ let DashPhrase = window.DashPhrase;
162
162
163
163
However, production code will look more like this:
164
164
165
- 1. Get a _Seed_ from the user' s _Passphrase Mnemonic_ and _Secret Salt_
165
+ 1. Get a _Seed_ from the user' s _Recovery Phrase_ and _Secret Salt_
166
166
167
167
```js
168
168
let wordList = "zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo wrong";
@@ -173,7 +173,7 @@ However, production code will look more like this:
173
173
```
174
174
175
175
2. Derive a _Wallet_, _Account_, and _X Key_, if possible. \
176
- (reject the _Passphrase_ or _Seed_ if _Account_ index 0 is not valid)
176
+ (reject the _Recovery Phrase_ or _Seed_ if _Account_ index 0 is not valid)
177
177
178
178
```js
179
179
let accountIndex = 0;
@@ -187,7 +187,7 @@ However, production code will look more like this:
187
187
void (await accountKey.deriveXKey(DashHd.CHANGE));
188
188
xprvKey = await accountKey.deriveXKey(DashHd.RECEIVE);
189
189
} catch (e) {
190
- window.alert("Error: The passphrase can' t generate a valid 1st account! " );
190
+ window.alert("Error: The recovery phrase can' t generate a valid 1st account! " );
191
191
}
192
192
```
193
193
@@ -862,16 +862,16 @@ than the root).
862
862
This will focus on the **most typical** use case, where you intend to generate
863
863
**multiple addresses** as part of your application's lifecycle.
864
864
865
- ## Part 1: Passphrase , Secret, Seed
865
+ ## Part 1: Recovery Phrase , Secret, Seed
866
866
867
- The Passphrase (or Seed), **is** the Wallet.
867
+ The Recovery Phrase (or Seed), **is** the Wallet.
868
868
869
869
- A _Wallet_ is derived from a _Seed_.
870
- - A _Seed_ is typically derived from a _Passphrase Mnemonic_ and _Secret Salt_.
870
+ - A _Seed_ is typically derived from a _Recovery Phrase_ and _Secret Salt_.
871
871
872
872
From a code perspective:
873
873
874
- 1. If your user doesn't supply a _Passphrase Mnemonic_ , you can generate one:
874
+ 1. If your user doesn't supply a _Recovery Phrase_ , you can generate one:
875
875
```js
876
876
let targetBitEntropy = 128;
877
877
let wordList = await DashPhrase.generate(targetBitEntropy);
@@ -887,18 +887,18 @@ From a code perspective:
887
887
let wordList = " zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo wrong" ;
888
888
let secretSalt = " TREZOR " ;
889
889
```
890
- 4. _Key Expansion_ derives the _Seed_ from the _Passphrase_ + _Secret_ \
890
+ 4. _Key Expansion_ derives the _Seed_ from the _Recovery Phrase_ + _Secret_ \
891
891
(FYI: it's a specific configuration of PBKDF2 under the hood)
892
892
```js
893
893
let seedBytes = await DashPhrase.toSeed(wordList, secretSalt);
894
894
```
895
895
896
- Prompt the user **to make a backup** of their _Passphrase_ . \
897
- (or their _Seed_, if you're not implementing *Passphrase *s)
896
+ Prompt the user **to make a backup** of their _Recovery Phrase_ . \
897
+ (or their _Seed_, if you're not implementing *Recovery Phrase *s)
898
898
899
899
It's common to print this out and put it in a safe.
900
900
901
- If the **_Passphrase_ is lost**, the Wallet (and all money) is
901
+ If the **_Recovery Phrase_ is lost**, the Wallet (and all money) is
902
902
**unrecoverable**.
903
903
904
904
## Part 2: The Wallet Derivation
@@ -916,10 +916,10 @@ nonetheless.
916
916
try {
917
917
walletKey = await DashHd.fromSeed(seedBytes);
918
918
} catch (e) {
919
- window.alert(" the passphrass (or seed) could not be used to derive keys" );
919
+ window.alert(" the recovery phrase (or seed) could not be used to derive keys" );
920
920
}
921
921
```
922
- 2. Notify the user and retry a different Passphrase on failure.
922
+ 2. Notify the user and retry a different Recovery Phrase on failure.
923
923
924
924
### Part 2a: HD Path Derivation
925
925
@@ -1044,7 +1044,7 @@ See also [Dash Tools Glossary](https://github.com/dashhive/dash-tools#glossary).
1044
1044
- [HD Account](#hd-account)
1045
1045
- [HD Address Key](#hd-address-key)
1046
1046
- [HD Keys](#hd-keys)
1047
- - [HD Passphrase Mnemonic ](#hd-passphrase-mnemonic )
1047
+ - [HD Recovery Phrase ](#hd-recovery-phrase )
1048
1048
- [HD Path](#hd-path)
1049
1049
- [HD Wallet](#hd-wallet)
1050
1050
- [HD X Key](#hd-x-key)
@@ -1068,7 +1068,7 @@ If you use 2048 words, each word represents 11 _bits_. \
1068
1068
12 words represent 131 _bits_ of information. \
1069
1069
Any extra bits are used for checksumming the data. \
1070
1070
1071
- See [_HD Passphrase Mnemonic_ ](#hd-passphrase-mnemonic ).
1071
+ See [_HD Recovery Phrase_ ](#hd-recovery-phrase ).
1072
1072
1073
1073
## Base58Check
1074
1074
@@ -1098,7 +1098,7 @@ See [_HD Keys_](#hd-keys).
1098
1098
1099
1099
Also: Base2048, _BIP39_, _BIP-0039_
1100
1100
1101
- BIP for [_HD Passphrase Mnemonic_ ](#hd-passphrase-mnemonic ).
1101
+ BIP for [_HD Recovery Phrase_ ](#hd-recovery-phrase ).
1102
1102
1103
1103
## BIP-43
1104
1104
@@ -1150,7 +1150,7 @@ Usually intentionally slow. \
1150
1150
May run a high number of " Rounds" in succession. \
1151
1151
(typically hundreds or thousands).
1152
1152
1153
- _Passhrase Mnemonics_ to _Seed_ (BIP-39) uses _PBKDF2_. \
1153
+ _Recovery Phrase_ to _Seed_ (BIP-39) uses _PBKDF2_. \
1154
1154
_HD Keys_ (BIP-44) use HMAC and *Secp256k1 Tweak*ing for each index.
1155
1155
1156
1156
See also:
@@ -1182,7 +1182,7 @@ Any of generic or purpose-specific keys derived deterministically form a seed.
1182
1182
1183
1183
See more at [API: Key Types](#key-types) (code above) and [HD Path](#hd-path).
1184
1184
1185
- ## HD Passphrase Mnemonic
1185
+ ## HD Recovery Phrase
1186
1186
1187
1187
Also: _Recovery Phrase_, _Mnemonic for Generating Hierarchical Deterministic
1188
1188
Keys_, _HD Wallet_, _BIP-39_
@@ -1250,7 +1250,7 @@ Also: Master Seed, Seed, HD Seed
1250
1250
Either:
1251
1251
1252
1252
- 64 random bytes
1253
- - a 64-byte hash derived from a _Passphrase Mnemonic_
1253
+ - a 64-byte hash derived from a _Recovery Phrase_
1254
1254
1255
1255
**Cannot be reversed**.
1256
1256
@@ -1335,9 +1335,9 @@ ac27495480225222079d7be181583751e86f571027b0497b5b5d11218e0a8a13332572917f0f8e5a
1335
1335
## Zoomonic
1336
1336
1337
1337
```txt
1338
- Passphrase (Mnemonic) : zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo wrong
1339
- Secret (Salt Password) : TREZOR
1340
- Seed : ac27495480225222079d7be181583751e86f571027b0497b5b5d11218e0a8a13332572917f0f8e5a589620c6f15b11c61dee327651a14c34e18231052e48c069
1338
+ Recovery Phrase (Mnemonic) : zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo zoo wrong
1339
+ Secret (Salt Password) : TREZOR
1340
+ Seed : ac27495480225222079d7be181583751e86f571027b0497b5b5d11218e0a8a13332572917f0f8e5a589620c6f15b11c61dee327651a14c34e18231052e48c069
1341
1341
```
1342
1342
1343
1343
# References
0 commit comments