The compute commands provide powerful cryptographic operations and utility functions for working with EBSI services. These commands handle everything from credential creation and verification to transaction processing and data encoding.
Compute Categories
Credentials
Create, verify, and manage verifiable credentials and presentations using various cryptographic algorithms.
Transaction
Sign transactions, decode transaction data, and compute blockchain-related identifiers.
Encoding
Encode and decode data in various formats including Base64, Base64URL, hex, and JWT.
Hash
Generate random IDs, compute hashes, and create schema identifiers.
Utils
Utility functions for key operations, address computation, time handling, and more.
Conformance
Specialized commands for conformance testing and validation scenarios.
Supported Algorithms
The compute commands support multiple cryptographic algorithms:
- ES256K: Elliptic Curve Digital Signature Algorithm with secp256k1 curve
- ES256: Elliptic Curve Digital Signature Algorithm with P-256 curve
- RS256: RSA Signature with SHA-256
- EdDSA: Edwards Curve Digital Signature Algorithm
Common Use Cases
- Credential Management: Create and verify verifiable credentials
- Transaction Processing: Sign and decode blockchain transactions
- Data Encoding: Convert between different data formats
- Key Operations: Generate and manage cryptographic keys
- Conformance Testing: Validate implementations against EBSI standards
Credentials
Commands for creating, verifying, and managing verifiable credentials and presentations.
Transaction
Commands for signing transactions and decoding transaction data.
Encoding
Commands for encoding and decoding data in various formats.
Hash
Commands for generating random IDs and computing hashes.
Conformance
Commands for conformance testing and validation.
Utils
Utility commands for various computations and operations.