@originals/sdk 1.4.2 → 1.4.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +4 -1
- package/.eslintrc.json +0 -33
- package/src/adapters/FeeOracleMock.ts +0 -9
- package/src/adapters/index.ts +0 -5
- package/src/adapters/providers/OrdHttpProvider.ts +0 -126
- package/src/adapters/providers/OrdMockProvider.ts +0 -101
- package/src/adapters/types.ts +0 -66
- package/src/bitcoin/BitcoinManager.ts +0 -330
- package/src/bitcoin/BroadcastClient.ts +0 -54
- package/src/bitcoin/OrdinalsClient.ts +0 -119
- package/src/bitcoin/PSBTBuilder.ts +0 -106
- package/src/bitcoin/fee-calculation.ts +0 -38
- package/src/bitcoin/providers/OrdNodeProvider.ts +0 -92
- package/src/bitcoin/providers/OrdinalsProvider.ts +0 -56
- package/src/bitcoin/providers/types.ts +0 -59
- package/src/bitcoin/transactions/commit.ts +0 -465
- package/src/bitcoin/transactions/index.ts +0 -13
- package/src/bitcoin/transfer.ts +0 -43
- package/src/bitcoin/utxo-selection.ts +0 -322
- package/src/bitcoin/utxo.ts +0 -113
- package/src/contexts/credentials-v1.json +0 -237
- package/src/contexts/credentials-v2-examples.json +0 -5
- package/src/contexts/credentials-v2.json +0 -340
- package/src/contexts/credentials.json +0 -237
- package/src/contexts/data-integrity-v2.json +0 -81
- package/src/contexts/dids.json +0 -58
- package/src/contexts/ed255192020.json +0 -93
- package/src/contexts/ordinals-plus.json +0 -23
- package/src/contexts/originals.json +0 -22
- package/src/core/OriginalsSDK.ts +0 -416
- package/src/crypto/Multikey.ts +0 -194
- package/src/crypto/Signer.ts +0 -254
- package/src/crypto/noble-init.ts +0 -121
- package/src/did/BtcoDidResolver.ts +0 -227
- package/src/did/DIDManager.ts +0 -694
- package/src/did/Ed25519Verifier.ts +0 -68
- package/src/did/KeyManager.ts +0 -236
- package/src/did/WebVHManager.ts +0 -498
- package/src/did/createBtcoDidDocument.ts +0 -59
- package/src/did/providers/OrdinalsClientProviderAdapter.ts +0 -68
- package/src/events/EventEmitter.ts +0 -222
- package/src/events/index.ts +0 -19
- package/src/events/types.ts +0 -331
- package/src/examples/basic-usage.ts +0 -78
- package/src/examples/create-module-original.ts +0 -435
- package/src/examples/full-lifecycle-flow.ts +0 -514
- package/src/examples/run.ts +0 -60
- package/src/index.ts +0 -150
- package/src/kinds/KindRegistry.ts +0 -290
- package/src/kinds/index.ts +0 -74
- package/src/kinds/types.ts +0 -470
- package/src/kinds/validators/AgentValidator.ts +0 -257
- package/src/kinds/validators/AppValidator.ts +0 -211
- package/src/kinds/validators/DatasetValidator.ts +0 -242
- package/src/kinds/validators/DocumentValidator.ts +0 -311
- package/src/kinds/validators/MediaValidator.ts +0 -269
- package/src/kinds/validators/ModuleValidator.ts +0 -225
- package/src/kinds/validators/base.ts +0 -276
- package/src/kinds/validators/index.ts +0 -12
- package/src/lifecycle/BatchOperations.ts +0 -373
- package/src/lifecycle/LifecycleManager.ts +0 -2126
- package/src/lifecycle/OriginalsAsset.ts +0 -524
- package/src/lifecycle/ProvenanceQuery.ts +0 -280
- package/src/lifecycle/ResourceVersioning.ts +0 -163
- package/src/migration/MigrationManager.ts +0 -527
- package/src/migration/audit/AuditLogger.ts +0 -176
- package/src/migration/checkpoint/CheckpointManager.ts +0 -112
- package/src/migration/checkpoint/CheckpointStorage.ts +0 -101
- package/src/migration/index.ts +0 -33
- package/src/migration/operations/BaseMigration.ts +0 -126
- package/src/migration/operations/PeerToBtcoMigration.ts +0 -105
- package/src/migration/operations/PeerToWebvhMigration.ts +0 -62
- package/src/migration/operations/WebvhToBtcoMigration.ts +0 -105
- package/src/migration/rollback/RollbackManager.ts +0 -170
- package/src/migration/state/StateMachine.ts +0 -92
- package/src/migration/state/StateTracker.ts +0 -156
- package/src/migration/types.ts +0 -344
- package/src/migration/validation/BitcoinValidator.ts +0 -107
- package/src/migration/validation/CredentialValidator.ts +0 -62
- package/src/migration/validation/DIDCompatibilityValidator.ts +0 -151
- package/src/migration/validation/LifecycleValidator.ts +0 -64
- package/src/migration/validation/StorageValidator.ts +0 -79
- package/src/migration/validation/ValidationPipeline.ts +0 -213
- package/src/resources/ResourceManager.ts +0 -655
- package/src/resources/index.ts +0 -21
- package/src/resources/types.ts +0 -202
- package/src/storage/LocalStorageAdapter.ts +0 -61
- package/src/storage/MemoryStorageAdapter.ts +0 -29
- package/src/storage/StorageAdapter.ts +0 -25
- package/src/storage/index.ts +0 -3
- package/src/types/bitcoin.ts +0 -98
- package/src/types/common.ts +0 -92
- package/src/types/credentials.ts +0 -88
- package/src/types/did.ts +0 -31
- package/src/types/external-shims.d.ts +0 -53
- package/src/types/index.ts +0 -7
- package/src/types/network.ts +0 -175
- package/src/utils/EventLogger.ts +0 -298
- package/src/utils/Logger.ts +0 -322
- package/src/utils/MetricsCollector.ts +0 -358
- package/src/utils/bitcoin-address.ts +0 -130
- package/src/utils/cbor.ts +0 -12
- package/src/utils/encoding.ts +0 -127
- package/src/utils/hash.ts +0 -6
- package/src/utils/retry.ts +0 -46
- package/src/utils/satoshi-validation.ts +0 -196
- package/src/utils/serialization.ts +0 -96
- package/src/utils/telemetry.ts +0 -40
- package/src/utils/validation.ts +0 -119
- package/src/vc/CredentialManager.ts +0 -918
- package/src/vc/Issuer.ts +0 -100
- package/src/vc/Verifier.ts +0 -47
- package/src/vc/cryptosuites/bbs.ts +0 -253
- package/src/vc/cryptosuites/bbsSimple.ts +0 -21
- package/src/vc/cryptosuites/eddsa.ts +0 -99
- package/src/vc/documentLoader.ts +0 -67
- package/src/vc/proofs/data-integrity.ts +0 -33
- package/src/vc/utils/jsonld.ts +0 -18
- package/tests/__mocks__/bbs-signatures.js +0 -17
- package/tests/__mocks__/mf-base58.js +0 -24
- package/tests/fixtures/did-documents.ts +0 -247
- package/tests/index.test.ts +0 -21
- package/tests/integration/BatchOperations.test.ts +0 -531
- package/tests/integration/CompleteLifecycle.e2e.test.ts +0 -735
- package/tests/integration/CredentialManager.test.ts +0 -42
- package/tests/integration/DIDManager.test.ts +0 -41
- package/tests/integration/DidPeerToWebVhFlow.test.ts +0 -351
- package/tests/integration/Events.test.ts +0 -435
- package/tests/integration/Lifecycle.transfer.btco.integration.test.ts +0 -25
- package/tests/integration/LifecycleManager.test.ts +0 -21
- package/tests/integration/MultikeyFlow.test.ts +0 -52
- package/tests/integration/TelemetryIntegration.test.ts +0 -395
- package/tests/integration/WebVhPublish.test.ts +0 -48
- package/tests/integration/createTypedOriginal.test.ts +0 -379
- package/tests/integration/migration/peer-to-webvh.test.ts +0 -172
- package/tests/manual/test-commit-creation.ts +0 -323
- package/tests/mocks/MockKeyStore.ts +0 -38
- package/tests/mocks/adapters/MemoryStorageAdapter.ts +0 -24
- package/tests/mocks/adapters/MockFeeOracle.ts +0 -11
- package/tests/mocks/adapters/MockOrdinalsProvider.ts +0 -76
- package/tests/mocks/adapters/OrdMockProvider.test.ts +0 -176
- package/tests/mocks/adapters/index.ts +0 -6
- package/tests/performance/BatchOperations.perf.test.ts +0 -403
- package/tests/performance/logging.perf.test.ts +0 -336
- package/tests/sdk.test.ts +0 -43
- package/tests/security/bitcoin-penetration-tests.test.ts +0 -622
- package/tests/setup.bun.ts +0 -69
- package/tests/setup.jest.ts +0 -23
- package/tests/stress/batch-operations-stress.test.ts +0 -571
- package/tests/unit/adapters/FeeOracleMock.test.ts +0 -40
- package/tests/unit/bitcoin/BitcoinManager.test.ts +0 -293
- package/tests/unit/bitcoin/BroadcastClient.test.ts +0 -52
- package/tests/unit/bitcoin/OrdNodeProvider.test.ts +0 -53
- package/tests/unit/bitcoin/OrdinalsClient.test.ts +0 -381
- package/tests/unit/bitcoin/OrdinalsClientProvider.test.ts +0 -102
- package/tests/unit/bitcoin/PSBTBuilder.test.ts +0 -84
- package/tests/unit/bitcoin/fee-calculation.test.ts +0 -261
- package/tests/unit/bitcoin/transactions/commit.test.ts +0 -649
- package/tests/unit/bitcoin/transfer.test.ts +0 -31
- package/tests/unit/bitcoin/utxo-selection-new.test.ts +0 -502
- package/tests/unit/bitcoin/utxo.more.test.ts +0 -39
- package/tests/unit/bitcoin/utxo.selection.test.ts +0 -38
- package/tests/unit/core/OriginalsSDK.test.ts +0 -152
- package/tests/unit/crypto/Multikey.test.ts +0 -206
- package/tests/unit/crypto/Signer.test.ts +0 -408
- package/tests/unit/did/BtcoDidResolver.test.ts +0 -611
- package/tests/unit/did/DIDManager.more.test.ts +0 -43
- package/tests/unit/did/DIDManager.test.ts +0 -185
- package/tests/unit/did/Ed25519Verifier.test.ts +0 -160
- package/tests/unit/did/KeyManager.test.ts +0 -452
- package/tests/unit/did/OrdinalsClientProviderAdapter.test.ts +0 -45
- package/tests/unit/did/WebVHManager.test.ts +0 -435
- package/tests/unit/did/createBtcoDidDocument.test.ts +0 -67
- package/tests/unit/did/providers/OrdinalsClientProviderAdapter.test.ts +0 -159
- package/tests/unit/events/EventEmitter.test.ts +0 -407
- package/tests/unit/kinds/KindRegistry.test.ts +0 -329
- package/tests/unit/kinds/types.test.ts +0 -409
- package/tests/unit/kinds/validators.test.ts +0 -651
- package/tests/unit/lifecycle/BatchOperations.test.ts +0 -527
- package/tests/unit/lifecycle/LifecycleManager.cleanapi.test.ts +0 -441
- package/tests/unit/lifecycle/LifecycleManager.keymanagement.test.ts +0 -312
- package/tests/unit/lifecycle/LifecycleManager.prov.test.ts +0 -18
- package/tests/unit/lifecycle/LifecycleManager.test.ts +0 -213
- package/tests/unit/lifecycle/LifecycleManager.transfer.unit.test.ts +0 -30
- package/tests/unit/lifecycle/OriginalsAsset.test.ts +0 -176
- package/tests/unit/lifecycle/ProvenanceQuery.test.ts +0 -577
- package/tests/unit/lifecycle/ResourceVersioning.test.ts +0 -651
- package/tests/unit/resources/ResourceManager.test.ts +0 -740
- package/tests/unit/storage/MemoryStorageAdapter.test.ts +0 -93
- package/tests/unit/types/network.test.ts +0 -255
- package/tests/unit/utils/EventIntegration.test.ts +0 -384
- package/tests/unit/utils/Logger.test.ts +0 -473
- package/tests/unit/utils/MetricsCollector.test.ts +0 -358
- package/tests/unit/utils/bitcoin-address.test.ts +0 -250
- package/tests/unit/utils/cbor.test.ts +0 -35
- package/tests/unit/utils/encoding.test.ts +0 -318
- package/tests/unit/utils/hash.test.ts +0 -12
- package/tests/unit/utils/retry.test.ts +0 -100
- package/tests/unit/utils/satoshi-validation.test.ts +0 -354
- package/tests/unit/utils/serialization.test.ts +0 -124
- package/tests/unit/utils/telemetry.test.ts +0 -52
- package/tests/unit/utils/validation.test.ts +0 -141
- package/tests/unit/vc/CredentialManager.helpers.test.ts +0 -527
- package/tests/unit/vc/CredentialManager.test.ts +0 -487
- package/tests/unit/vc/Issuer.test.ts +0 -107
- package/tests/unit/vc/Verifier.test.ts +0 -525
- package/tests/unit/vc/bbs.test.ts +0 -282
- package/tests/unit/vc/cryptosuites/eddsa.test.ts +0 -398
- package/tests/unit/vc/documentLoader.test.ts +0 -121
- package/tests/unit/vc/proofs/data-integrity.test.ts +0 -24
- package/tsconfig.json +0 -31
- package/tsconfig.test.json +0 -15
|
@@ -1,282 +0,0 @@
|
|
|
1
|
-
/** Canonical test aggregator created by combine-tests script. */
|
|
2
|
-
|
|
3
|
-
/** Inlined from bbs.simple.part.ts */
|
|
4
|
-
import { describe, test, expect } from 'bun:test';
|
|
5
|
-
import { BbsSimple } from '../../../src';
|
|
6
|
-
import { bls12_381 as bls } from '@noble/curves/bls12-381';
|
|
7
|
-
|
|
8
|
-
describe('BbsSimple e2e', () => {
|
|
9
|
-
test('sign/verify not implemented with header', async () => {
|
|
10
|
-
const sk = bls.utils.randomPrivateKey();
|
|
11
|
-
const pk = bls.getPublicKey(sk);
|
|
12
|
-
const keypair = { privateKey: sk, publicKey: pk };
|
|
13
|
-
const header = new Uint8Array([1, 2, 3]);
|
|
14
|
-
const messages = [
|
|
15
|
-
new TextEncoder().encode('msg1'),
|
|
16
|
-
new TextEncoder().encode('msg2'),
|
|
17
|
-
new TextEncoder().encode('msg3')
|
|
18
|
-
];
|
|
19
|
-
|
|
20
|
-
await expect(BbsSimple.sign(messages, keypair, header)).rejects.toThrow(/not implemented/i);
|
|
21
|
-
await expect(BbsSimple.verify(messages, new Uint8Array([0]), pk, header)).rejects.toThrow(/not implemented/i);
|
|
22
|
-
});
|
|
23
|
-
|
|
24
|
-
test('sign/verify not implemented with default header', async () => {
|
|
25
|
-
const sk = bls.utils.randomPrivateKey();
|
|
26
|
-
const pk = bls.getPublicKey(sk);
|
|
27
|
-
const keypair = { privateKey: sk, publicKey: pk };
|
|
28
|
-
const messages = [
|
|
29
|
-
new TextEncoder().encode('a'),
|
|
30
|
-
new TextEncoder().encode('b')
|
|
31
|
-
];
|
|
32
|
-
await expect(BbsSimple.sign(messages, keypair)).rejects.toThrow(/not implemented/i);
|
|
33
|
-
await expect(BbsSimple.verify(messages, new Uint8Array([1, 2]), pk)).rejects.toThrow(/not implemented/i);
|
|
34
|
-
});
|
|
35
|
-
});
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
/** Inlined from bbs.utils.part.ts */
|
|
41
|
-
import { BBSCryptosuiteUtils } from '../../../src';
|
|
42
|
-
import * as cbor from 'cbor-js';
|
|
43
|
-
|
|
44
|
-
function u8(len: number, start: number = 0): Uint8Array {
|
|
45
|
-
const a = new Uint8Array(len);
|
|
46
|
-
for (let i = 0; i < len; i++) a[i] = (start + i) & 0xff;
|
|
47
|
-
return a;
|
|
48
|
-
}
|
|
49
|
-
|
|
50
|
-
describe('BBSCryptosuiteUtils', () => {
|
|
51
|
-
const bbsSignature = u8(96, 1);
|
|
52
|
-
const bbsHeader = u8(64, 2);
|
|
53
|
-
const publicKey = u8(96, 3);
|
|
54
|
-
const hmacKey = u8(32, 4);
|
|
55
|
-
const mandatoryPointers = ['/id', '/credentialSubject/id'];
|
|
56
|
-
|
|
57
|
-
test('rejects non-u prefix for base/derived parsing', () => {
|
|
58
|
-
expect(() => (BBSCryptosuiteUtils as any).parseBaseProofValue('xabc')).toThrow('multibase');
|
|
59
|
-
expect(() => (BBSCryptosuiteUtils as any).parseDerivedProofValue('xabc')).toThrow('multibase');
|
|
60
|
-
});
|
|
61
|
-
|
|
62
|
-
test('serialize/parse base proof (baseline)', () => {
|
|
63
|
-
const s = BBSCryptosuiteUtils.serializeBaseProofValue(
|
|
64
|
-
bbsSignature,
|
|
65
|
-
bbsHeader,
|
|
66
|
-
publicKey,
|
|
67
|
-
hmacKey,
|
|
68
|
-
mandatoryPointers,
|
|
69
|
-
'baseline'
|
|
70
|
-
);
|
|
71
|
-
expect(s.startsWith('u')).toBe(true);
|
|
72
|
-
const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
|
|
73
|
-
expect(Array.from(p.bbsSignature)).toEqual(Array.from(bbsSignature));
|
|
74
|
-
expect(Array.from(p.bbsHeader)).toEqual(Array.from(bbsHeader));
|
|
75
|
-
expect(Array.from(p.publicKey)).toEqual(Array.from(publicKey));
|
|
76
|
-
expect(Array.from(p.hmacKey)).toEqual(Array.from(hmacKey));
|
|
77
|
-
expect(p.mandatoryPointers).toEqual(mandatoryPointers);
|
|
78
|
-
expect(p.featureOption).toBe('baseline');
|
|
79
|
-
});
|
|
80
|
-
|
|
81
|
-
test('serialize/parse base proof (anonymous_holder_binding)', () => {
|
|
82
|
-
const signerBlind = u8(32, 7);
|
|
83
|
-
const s = BBSCryptosuiteUtils.serializeBaseProofValue(
|
|
84
|
-
bbsSignature,
|
|
85
|
-
bbsHeader,
|
|
86
|
-
publicKey,
|
|
87
|
-
hmacKey,
|
|
88
|
-
mandatoryPointers,
|
|
89
|
-
'anonymous_holder_binding',
|
|
90
|
-
undefined,
|
|
91
|
-
signerBlind
|
|
92
|
-
);
|
|
93
|
-
const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
|
|
94
|
-
expect(p.featureOption).toBe('anonymous_holder_binding');
|
|
95
|
-
expect(Array.from(p.signerBlind)).toEqual(Array.from(signerBlind));
|
|
96
|
-
});
|
|
97
|
-
|
|
98
|
-
test('serialize/parse base proof (pseudonym_issuer_pid)', () => {
|
|
99
|
-
const pid = u8(32, 9);
|
|
100
|
-
const s = BBSCryptosuiteUtils.serializeBaseProofValue(
|
|
101
|
-
bbsSignature,
|
|
102
|
-
bbsHeader,
|
|
103
|
-
publicKey,
|
|
104
|
-
hmacKey,
|
|
105
|
-
mandatoryPointers,
|
|
106
|
-
'pseudonym_issuer_pid',
|
|
107
|
-
pid
|
|
108
|
-
);
|
|
109
|
-
const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
|
|
110
|
-
expect(p.featureOption).toBe('pseudonym_issuer_pid');
|
|
111
|
-
expect(Array.from(p.pid)).toEqual(Array.from(pid));
|
|
112
|
-
});
|
|
113
|
-
|
|
114
|
-
test('serialize/parse base proof (pseudonym_hidden_pid)', () => {
|
|
115
|
-
const signerBlind = u8(32, 11);
|
|
116
|
-
const s = BBSCryptosuiteUtils.serializeBaseProofValue(
|
|
117
|
-
bbsSignature,
|
|
118
|
-
bbsHeader,
|
|
119
|
-
publicKey,
|
|
120
|
-
hmacKey,
|
|
121
|
-
mandatoryPointers,
|
|
122
|
-
'pseudonym_hidden_pid',
|
|
123
|
-
undefined,
|
|
124
|
-
signerBlind
|
|
125
|
-
);
|
|
126
|
-
const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
|
|
127
|
-
expect(p.featureOption).toBe('pseudonym_hidden_pid');
|
|
128
|
-
expect(Array.from(p.signerBlind)).toEqual(Array.from(signerBlind));
|
|
129
|
-
});
|
|
130
|
-
|
|
131
|
-
test('serialize/parse derived proof (baseline)', () => {
|
|
132
|
-
const labelMap = { c14n1: 'b3', c14n10: 'b7' };
|
|
133
|
-
const mandatoryIndexes = [0, 2, 5];
|
|
134
|
-
const selectiveIndexes = [1, 4];
|
|
135
|
-
const presentationHeader = u8(16, 33);
|
|
136
|
-
const bbsProof = u8(80, 55);
|
|
137
|
-
const s = BBSCryptosuiteUtils.serializeDerivedProofValue(
|
|
138
|
-
bbsProof,
|
|
139
|
-
labelMap,
|
|
140
|
-
mandatoryIndexes,
|
|
141
|
-
selectiveIndexes,
|
|
142
|
-
presentationHeader,
|
|
143
|
-
'baseline'
|
|
144
|
-
);
|
|
145
|
-
const p = (BBSCryptosuiteUtils as any).parseDerivedProofValue(s);
|
|
146
|
-
expect(Array.from(p.bbsProof)).toEqual(Array.from(bbsProof));
|
|
147
|
-
expect(p.labelMap).toEqual(labelMap);
|
|
148
|
-
expect(p.mandatoryIndexes).toEqual(mandatoryIndexes);
|
|
149
|
-
expect(p.selectiveIndexes).toEqual(selectiveIndexes);
|
|
150
|
-
expect(Array.from(p.presentationHeader)).toEqual(Array.from(presentationHeader));
|
|
151
|
-
expect(p.featureOption).toBe('baseline');
|
|
152
|
-
});
|
|
153
|
-
|
|
154
|
-
test('serialize/parse derived proof (anonymous_holder_binding)', () => {
|
|
155
|
-
const labelMap = { c14n2: 'b5' };
|
|
156
|
-
const presentationHeader = u8(8, 7);
|
|
157
|
-
const bbsProof = u8(64, 8);
|
|
158
|
-
const s = BBSCryptosuiteUtils.serializeDerivedProofValue(
|
|
159
|
-
bbsProof,
|
|
160
|
-
labelMap,
|
|
161
|
-
[0],
|
|
162
|
-
[1],
|
|
163
|
-
presentationHeader,
|
|
164
|
-
'anonymous_holder_binding',
|
|
165
|
-
undefined,
|
|
166
|
-
4
|
|
167
|
-
);
|
|
168
|
-
const p = (BBSCryptosuiteUtils as any).parseDerivedProofValue(s);
|
|
169
|
-
expect(p.featureOption).toBe('anonymous_holder_binding');
|
|
170
|
-
expect(p.lengthBBSMessages).toBe(4);
|
|
171
|
-
});
|
|
172
|
-
|
|
173
|
-
test('serialize/parse derived proof (pseudonym)', () => {
|
|
174
|
-
const labelMap = { c14n3: 'b7' };
|
|
175
|
-
const presentationHeader = u8(4, 90);
|
|
176
|
-
const bbsProof = u8(64, 90);
|
|
177
|
-
const s = BBSCryptosuiteUtils.serializeDerivedProofValue(
|
|
178
|
-
bbsProof,
|
|
179
|
-
labelMap,
|
|
180
|
-
[0, 1],
|
|
181
|
-
[1],
|
|
182
|
-
presentationHeader,
|
|
183
|
-
'pseudonym',
|
|
184
|
-
'alice',
|
|
185
|
-
5
|
|
186
|
-
);
|
|
187
|
-
const p = (BBSCryptosuiteUtils as any).parseDerivedProofValue(s);
|
|
188
|
-
expect(p.featureOption).toBe('pseudonym');
|
|
189
|
-
expect(p.pseudonym).toBe('alice');
|
|
190
|
-
expect(p.lengthBBSMessages).toBe(5);
|
|
191
|
-
});
|
|
192
|
-
|
|
193
|
-
test('parse base proof with base_proof header', () => {
|
|
194
|
-
const components = [bbsSignature, bbsHeader, publicKey, hmacKey, mandatoryPointers];
|
|
195
|
-
const encoded = (cbor as any).encode(components) as Uint8Array | ArrayBuffer;
|
|
196
|
-
const encBytes = encoded instanceof Uint8Array ? encoded : new Uint8Array(encoded as ArrayBuffer);
|
|
197
|
-
const header = new Uint8Array([0xd9, 0x5d, 0x03]);
|
|
198
|
-
const bytes = new Uint8Array(header.length + encBytes.length);
|
|
199
|
-
bytes.set(header, 0);
|
|
200
|
-
bytes.set(encBytes, header.length);
|
|
201
|
-
const s = 'u' + Buffer.from(bytes).toString('base64').replace(/\+/g, '-').replace(/\//g, '_').replace(/=+$/g, '');
|
|
202
|
-
const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
|
|
203
|
-
expect(p.featureOption).toBe('base_proof');
|
|
204
|
-
});
|
|
205
|
-
|
|
206
|
-
test('serializeDerivedProofValue throws on missing length for anonymous_holder_binding', () => {
|
|
207
|
-
expect(() => BBSCryptosuiteUtils.serializeDerivedProofValue(
|
|
208
|
-
u8(8),
|
|
209
|
-
{ c14n1: 'b1' },
|
|
210
|
-
[0],
|
|
211
|
-
[0],
|
|
212
|
-
u8(4),
|
|
213
|
-
'anonymous_holder_binding'
|
|
214
|
-
)).toThrow('lengthBBSMessages is required');
|
|
215
|
-
});
|
|
216
|
-
|
|
217
|
-
test('serializeDerivedProofValue throws on missing pseudonym/length for pseudonym', () => {
|
|
218
|
-
expect(() => BBSCryptosuiteUtils.serializeDerivedProofValue(
|
|
219
|
-
u8(8),
|
|
220
|
-
{ c14n1: 'b1' },
|
|
221
|
-
[0],
|
|
222
|
-
[0],
|
|
223
|
-
u8(4),
|
|
224
|
-
'pseudonym'
|
|
225
|
-
)).toThrow('pseudonym and lengthBBSMessages');
|
|
226
|
-
});
|
|
227
|
-
|
|
228
|
-
test('serializeDerivedProofValue throws on unsupported feature', () => {
|
|
229
|
-
expect(() => (BBSCryptosuiteUtils as any).serializeDerivedProofValue(
|
|
230
|
-
u8(8),
|
|
231
|
-
{ c14n1: 'b1' },
|
|
232
|
-
[0],
|
|
233
|
-
[0],
|
|
234
|
-
u8(4),
|
|
235
|
-
'unsupported'
|
|
236
|
-
)).toThrow('Unsupported feature option');
|
|
237
|
-
});
|
|
238
|
-
|
|
239
|
-
test('serializeBaseProofValue throws for missing signerBlind/pid and unsupported feature', () => {
|
|
240
|
-
expect(() => BBSCryptosuiteUtils.serializeBaseProofValue(
|
|
241
|
-
u8(8), u8(4), u8(8), u8(4), mandatoryPointers, 'anonymous_holder_binding'
|
|
242
|
-
)).toThrow('signerBlind is required');
|
|
243
|
-
expect(() => BBSCryptosuiteUtils.serializeBaseProofValue(
|
|
244
|
-
u8(8), u8(4), u8(8), u8(4), mandatoryPointers, 'pseudonym_issuer_pid'
|
|
245
|
-
)).toThrow('pid is required');
|
|
246
|
-
expect(() => (BBSCryptosuiteUtils as any).serializeBaseProofValue(
|
|
247
|
-
u8(8), u8(4), u8(8), u8(4), mandatoryPointers, 'unsupported'
|
|
248
|
-
)).toThrow('Unsupported feature option');
|
|
249
|
-
});
|
|
250
|
-
|
|
251
|
-
test('serializeBaseProofValue throws when signerBlind missing for pseudonym_hidden_pid', () => {
|
|
252
|
-
expect(() => BBSCryptosuiteUtils.serializeBaseProofValue(
|
|
253
|
-
u8(8), u8(4), u8(8), u8(4), mandatoryPointers, 'pseudonym_hidden_pid'
|
|
254
|
-
)).toThrow('signerBlind is required');
|
|
255
|
-
});
|
|
256
|
-
|
|
257
|
-
test('compareBytes length mismatch branch', () => {
|
|
258
|
-
expect((BBSCryptosuiteUtils as any).compareBytes(new Uint8Array([1, 2]), [1, 2, 3])).toBe(false);
|
|
259
|
-
});
|
|
260
|
-
|
|
261
|
-
test('serializeDerivedProofValue throws on invalid labelMap entries', () => {
|
|
262
|
-
expect(() => BBSCryptosuiteUtils.serializeDerivedProofValue(
|
|
263
|
-
u8(4),
|
|
264
|
-
{ notC14n: 'b1' } as any,
|
|
265
|
-
[0],
|
|
266
|
-
[0],
|
|
267
|
-
u8(2),
|
|
268
|
-
'baseline'
|
|
269
|
-
)).toThrow('Invalid label map entry');
|
|
270
|
-
});
|
|
271
|
-
|
|
272
|
-
test('parse errors on invalid base header', () => {
|
|
273
|
-
// Construct invalid header 'u' + cbor of empty
|
|
274
|
-
const bad = 'u' + 'AAAA';
|
|
275
|
-
expect(() => (BBSCryptosuiteUtils as any).parseBaseProofValue(bad)).toThrow();
|
|
276
|
-
});
|
|
277
|
-
|
|
278
|
-
test('parse errors on invalid derived header', () => {
|
|
279
|
-
const bad = 'u' + 'AAAA';
|
|
280
|
-
expect(() => (BBSCryptosuiteUtils as any).parseDerivedProofValue(bad)).toThrow();
|
|
281
|
-
});
|
|
282
|
-
});
|
|
@@ -1,398 +0,0 @@
|
|
|
1
|
-
/** Canonical test aggregator created by combine-tests script. */
|
|
2
|
-
|
|
3
|
-
/** Inlined from eddsa.branch-more.part.ts */
|
|
4
|
-
import { describe, test, expect } from 'bun:test';
|
|
5
|
-
import { EdDSACryptosuiteManager } from '../../../../src/vc/cryptosuites/eddsa';
|
|
6
|
-
import { multikey } from '../../../../src/crypto/Multikey';
|
|
7
|
-
|
|
8
|
-
describe('EdDSA additional branches', () => {
|
|
9
|
-
test('createProof throws on invalid private key format', async () => {
|
|
10
|
-
await expect(EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
|
|
11
|
-
verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', cryptosuite: 'eddsa-rdfc-2022', privateKey: 123 as any,
|
|
12
|
-
documentLoader: async () => ({ document: { '@context': { '@version': 1.1 } }, documentUrl: '', contextUrl: null })
|
|
13
|
-
} as any)).rejects.toThrow('Invalid private key format');
|
|
14
|
-
});
|
|
15
|
-
|
|
16
|
-
test('verifyProof returns error for non-Ed25519 VM', async () => {
|
|
17
|
-
const pkMb = multikey.encodePublicKey(new Uint8Array(33).fill(1), 'Secp256k1');
|
|
18
|
-
const res = await EdDSACryptosuiteManager.verifyProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
|
|
19
|
-
type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'z1L'
|
|
20
|
-
} as any, { documentLoader: async () => ({ document: { '@context': ['https://www.w3.org/ns/did/v1'], id: 'did:ex#k', publicKeyMultibase: pkMb }, documentUrl: '', contextUrl: null }) });
|
|
21
|
-
expect(res.verified).toBe(false);
|
|
22
|
-
expect(typeof res.errors?.[0]).toBe('string');
|
|
23
|
-
});
|
|
24
|
-
});
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
/** Inlined from eddsa.coverage-extra.part.ts */
|
|
30
|
-
|
|
31
|
-
describe('EdDSA coverage extras', () => {
|
|
32
|
-
const goodContext = ['https://www.w3.org/ns/credentials/v2'];
|
|
33
|
-
|
|
34
|
-
test('createProofConfiguration defaults proofPurpose to assertionMethod', async () => {
|
|
35
|
-
const sk = new Uint8Array(32).fill(1);
|
|
36
|
-
const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(2), 'Ed25519');
|
|
37
|
-
const vm = 'did:ex#vm';
|
|
38
|
-
const loader = async (iri: string) => {
|
|
39
|
-
if (iri.includes('#')) {
|
|
40
|
-
return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
|
|
41
|
-
}
|
|
42
|
-
return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
|
|
43
|
-
};
|
|
44
|
-
const doc: any = { '@context': goodContext, id: 'urn:doc-default-purpose' };
|
|
45
|
-
const proof = await EdDSACryptosuiteManager.createProof(doc, { verificationMethod: vm, privateKey: sk, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader });
|
|
46
|
-
// The method deletes @context before returning, so we assert the purpose value
|
|
47
|
-
expect(proof.proofPurpose).toBe('assertionMethod');
|
|
48
|
-
});
|
|
49
|
-
|
|
50
|
-
test('createProof includes only challenge when provided', async () => {
|
|
51
|
-
const sk = new Uint8Array(32).fill(7);
|
|
52
|
-
const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(6), 'Ed25519');
|
|
53
|
-
const vm = 'did:ex#vm-chal';
|
|
54
|
-
const loader = async (iri: string) => {
|
|
55
|
-
if (iri.includes('#')) {
|
|
56
|
-
return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
|
|
57
|
-
}
|
|
58
|
-
return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
|
|
59
|
-
};
|
|
60
|
-
const proof = await EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:chal' }, { verificationMethod: vm, privateKey: sk, cryptosuite: 'eddsa-rdfc-2022', challenge: '123', documentLoader: loader });
|
|
61
|
-
expect((proof as any).challenge).toBe('123');
|
|
62
|
-
expect((proof as any).domain).toBeUndefined();
|
|
63
|
-
});
|
|
64
|
-
|
|
65
|
-
test('createProof includes only domain when provided', async () => {
|
|
66
|
-
const sk = new Uint8Array(32).fill(9);
|
|
67
|
-
const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(8), 'Ed25519');
|
|
68
|
-
const vm = 'did:ex#vm-domain';
|
|
69
|
-
const loader = async (iri: string) => {
|
|
70
|
-
if (iri.includes('#')) {
|
|
71
|
-
return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
|
|
72
|
-
}
|
|
73
|
-
return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
|
|
74
|
-
};
|
|
75
|
-
const proof = await EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:domain' }, { verificationMethod: vm, privateKey: sk, cryptosuite: 'eddsa-rdfc-2022', domain: 'ex.org', documentLoader: loader });
|
|
76
|
-
expect((proof as any).domain).toBe('ex.org');
|
|
77
|
-
expect((proof as any).challenge).toBeUndefined();
|
|
78
|
-
});
|
|
79
|
-
|
|
80
|
-
test('verifyProof returns error message on thrown exception path', async () => {
|
|
81
|
-
const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(3), 'Ed25519');
|
|
82
|
-
const loader = async (iri: string) => {
|
|
83
|
-
if (iri.includes('#')) {
|
|
84
|
-
return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
|
|
85
|
-
}
|
|
86
|
-
return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
|
|
87
|
-
};
|
|
88
|
-
const doc: any = { '@context': goodContext, id: 'urn:doc' };
|
|
89
|
-
const badProof: any = { type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'not-multibase' };
|
|
90
|
-
const res = await EdDSACryptosuiteManager.verifyProof(doc, badProof, { documentLoader: loader });
|
|
91
|
-
expect(res.verified).toBe(false);
|
|
92
|
-
expect(Array.isArray(res.errors)).toBe(true);
|
|
93
|
-
expect(typeof res.errors![0]).toBe('string');
|
|
94
|
-
});
|
|
95
|
-
|
|
96
|
-
test('verifyProof uses Unknown verification error when thrown value lacks message', async () => {
|
|
97
|
-
const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(4), 'Ed25519');
|
|
98
|
-
const doc: any = { '@context': goodContext, id: 'urn:doc-unknown' };
|
|
99
|
-
const proof: any = { type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#vm-unknown', proofPurpose: 'assertionMethod', proofValue: 'z1L' };
|
|
100
|
-
const loader = async (iri: string) => {
|
|
101
|
-
if (iri.includes('#')) {
|
|
102
|
-
// Throw a primitive string (no message property) only on VM fetch, after transform/hash succeeded
|
|
103
|
-
throw '';
|
|
104
|
-
}
|
|
105
|
-
return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
|
|
106
|
-
};
|
|
107
|
-
const res = await EdDSACryptosuiteManager.verifyProof(doc, proof, { documentLoader: loader });
|
|
108
|
-
expect(res.verified).toBe(false);
|
|
109
|
-
expect(res.errors?.[0]).toBe('Unknown verification error');
|
|
110
|
-
});
|
|
111
|
-
});
|
|
112
|
-
|
|
113
|
-
|
|
114
|
-
|
|
115
|
-
|
|
116
|
-
/** Inlined from eddsa.edgecases.part.ts */
|
|
117
|
-
|
|
118
|
-
describe('EdDSA cryptosuite edge cases', () => {
|
|
119
|
-
const goodContext = ['https://www.w3.org/ns/credentials/v2'];
|
|
120
|
-
|
|
121
|
-
const pk32 = new Uint8Array(32).fill(7);
|
|
122
|
-
const pk32b = new Uint8Array(32).fill(8);
|
|
123
|
-
const pkMb = multikey.encodePublicKey(pk32b, 'Ed25519');
|
|
124
|
-
|
|
125
|
-
const okLoader = async (iri: string) => {
|
|
126
|
-
if (iri.includes('#')) {
|
|
127
|
-
return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
|
|
128
|
-
}
|
|
129
|
-
return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
|
|
130
|
-
};
|
|
131
|
-
|
|
132
|
-
test('createProof signs with raw Uint8Array 32-byte private key', async () => {
|
|
133
|
-
const proof = await EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:raw32' }, {
|
|
134
|
-
verificationMethod: 'did:ex#key-raw', proofPurpose: 'assertionMethod', privateKey: pk32,
|
|
135
|
-
cryptosuite: 'eddsa-rdfc-2022', documentLoader: okLoader
|
|
136
|
-
});
|
|
137
|
-
expect(proof.type).toBe('DataIntegrityProof');
|
|
138
|
-
expect(typeof proof.proofValue).toBe('string');
|
|
139
|
-
});
|
|
140
|
-
|
|
141
|
-
test('createProof includes challenge and domain options', async () => {
|
|
142
|
-
const proof = await EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:opts' }, {
|
|
143
|
-
verificationMethod: 'did:ex#key-opts', proofPurpose: 'assertionMethod', privateKey: pk32,
|
|
144
|
-
cryptosuite: 'eddsa-rdfc-2022', challenge: 'abc', domain: 'example.org', documentLoader: okLoader
|
|
145
|
-
});
|
|
146
|
-
expect((proof as any).challenge).toBe('abc');
|
|
147
|
-
expect((proof as any).domain).toBe('example.org');
|
|
148
|
-
});
|
|
149
|
-
|
|
150
|
-
test('createProof invalid private key length 33 throws', async () => {
|
|
151
|
-
const bad33 = new Uint8Array(33);
|
|
152
|
-
await expect(EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:bad33' }, {
|
|
153
|
-
verificationMethod: 'did:ex#key-bad33', proofPurpose: 'assertionMethod', privateKey: bad33,
|
|
154
|
-
cryptosuite: 'eddsa-rdfc-2022', documentLoader: okLoader
|
|
155
|
-
})).rejects.toThrow('Invalid private key length');
|
|
156
|
-
});
|
|
157
|
-
|
|
158
|
-
test('createProof invalid private key length 63 throws', async () => {
|
|
159
|
-
const bad63 = new Uint8Array(63);
|
|
160
|
-
await expect(EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:bad63' }, {
|
|
161
|
-
verificationMethod: 'did:ex#key-bad63', proofPurpose: 'assertionMethod', privateKey: bad63,
|
|
162
|
-
cryptosuite: 'eddsa-rdfc-2022', documentLoader: okLoader
|
|
163
|
-
})).rejects.toThrow('Invalid private key length');
|
|
164
|
-
});
|
|
165
|
-
|
|
166
|
-
test('createProof with non-Ed25519 multikey string errors', async () => {
|
|
167
|
-
const secpSk = new Uint8Array(32).fill(5);
|
|
168
|
-
const secpSkMb = multikey.encodePrivateKey(secpSk, 'Secp256k1');
|
|
169
|
-
await expect(EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:secpSk' }, {
|
|
170
|
-
verificationMethod: 'did:ex#key-non-ed', proofPurpose: 'assertionMethod', privateKey: secpSkMb,
|
|
171
|
-
cryptosuite: 'eddsa-rdfc-2022', documentLoader: okLoader
|
|
172
|
-
})).rejects.toThrow('Invalid key type for EdDSA');
|
|
173
|
-
});
|
|
174
|
-
|
|
175
|
-
test('verifyProof returns false with wrong public key', async () => {
|
|
176
|
-
// Sign with one keypair
|
|
177
|
-
const signingSk = new Uint8Array(32).fill(9);
|
|
178
|
-
const signingPk = new Uint8Array(32).fill(1);
|
|
179
|
-
const signingPkMb = multikey.encodePublicKey(signingPk, 'Ed25519');
|
|
180
|
-
const vmId = 'did:ex#vm-1';
|
|
181
|
-
const signingLoader = async (iri: string) => {
|
|
182
|
-
if (iri.includes('#')) {
|
|
183
|
-
return { document: { '@context': goodContext, id: iri, publicKeyMultibase: signingPkMb }, documentUrl: iri, contextUrl: null };
|
|
184
|
-
}
|
|
185
|
-
return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
|
|
186
|
-
};
|
|
187
|
-
const doc = { '@context': goodContext, id: 'urn:test:verify-wrong-pk' };
|
|
188
|
-
const proof = await EdDSACryptosuiteManager.createProof(doc, {
|
|
189
|
-
verificationMethod: vmId, proofPurpose: 'assertionMethod', privateKey: signingSk,
|
|
190
|
-
cryptosuite: 'eddsa-rdfc-2022', documentLoader: signingLoader
|
|
191
|
-
});
|
|
192
|
-
|
|
193
|
-
// Verify with different public key
|
|
194
|
-
const wrongPkMb = multikey.encodePublicKey(new Uint8Array(32).fill(2), 'Ed25519');
|
|
195
|
-
const wrongLoader = async (iri: string) => {
|
|
196
|
-
if (iri.includes('#')) {
|
|
197
|
-
return { document: { '@context': goodContext, id: iri, publicKeyMultibase: wrongPkMb }, documentUrl: iri, contextUrl: null };
|
|
198
|
-
}
|
|
199
|
-
return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
|
|
200
|
-
};
|
|
201
|
-
const res = await EdDSACryptosuiteManager.verifyProof(doc, proof as any, { documentLoader: wrongLoader });
|
|
202
|
-
expect(res.verified).toBe(false);
|
|
203
|
-
});
|
|
204
|
-
|
|
205
|
-
test('verifyProof succeeds with matching verificationMethod', async () => {
|
|
206
|
-
const ed = await import('@noble/ed25519');
|
|
207
|
-
const sk = new Uint8Array(32).fill(11);
|
|
208
|
-
const pk = await ed.getPublicKeyAsync(sk);
|
|
209
|
-
const pkMbLocal = multikey.encodePublicKey(new Uint8Array(pk), 'Ed25519');
|
|
210
|
-
const vm = 'did:ex#vm-ok';
|
|
211
|
-
const loader = async (iri: string) => {
|
|
212
|
-
if (iri.includes('#')) {
|
|
213
|
-
return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMbLocal }, documentUrl: iri, contextUrl: null };
|
|
214
|
-
}
|
|
215
|
-
return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
|
|
216
|
-
};
|
|
217
|
-
const doc = { '@context': goodContext, id: 'urn:test:verify-ok' };
|
|
218
|
-
const proof = await EdDSACryptosuiteManager.createProof(doc, {
|
|
219
|
-
verificationMethod: vm, proofPurpose: 'assertionMethod', privateKey: sk, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
|
|
220
|
-
});
|
|
221
|
-
const res = await EdDSACryptosuiteManager.verifyProof(doc, proof as any, { documentLoader: loader });
|
|
222
|
-
expect(res.verified).toBe(true);
|
|
223
|
-
});
|
|
224
|
-
|
|
225
|
-
test('createProof propagates canonizeProof/hash-stage exception via loader', async () => {
|
|
226
|
-
// Fail only during proof canonization stage (hash path), not during transform
|
|
227
|
-
const loader = async (iri: string) => {
|
|
228
|
-
if (iri.includes('w3id.org/security/data-integrity')) {
|
|
229
|
-
throw new Error('hash-stage canonize fail');
|
|
230
|
-
}
|
|
231
|
-
if (iri.includes('#')) {
|
|
232
|
-
return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
|
|
233
|
-
}
|
|
234
|
-
return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
|
|
235
|
-
};
|
|
236
|
-
await expect(EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:hash-fail' }, {
|
|
237
|
-
verificationMethod: 'did:ex#key-hash', proofPurpose: 'assertionMethod', privateKey: pk32,
|
|
238
|
-
cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
|
|
239
|
-
} as any)).rejects.toThrow();
|
|
240
|
-
});
|
|
241
|
-
});
|
|
242
|
-
|
|
243
|
-
|
|
244
|
-
|
|
245
|
-
|
|
246
|
-
/** Inlined from eddsa.errors.part.ts */
|
|
247
|
-
|
|
248
|
-
describe('EdDSA error branches', () => {
|
|
249
|
-
test('createProof throws on non-Ed25519 multikey private key', async () => {
|
|
250
|
-
const sk = new Uint8Array(32).fill(7);
|
|
251
|
-
const skMbSecp = multikey.encodePrivateKey(sk, 'Secp256k1');
|
|
252
|
-
const loader = async (iri: string) => {
|
|
253
|
-
if (iri.includes('#')) return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri }, documentUrl: iri, contextUrl: null } as any;
|
|
254
|
-
return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
|
|
255
|
-
};
|
|
256
|
-
await expect(EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'urn:x' }, {
|
|
257
|
-
verificationMethod: 'did:ex#key-1', proofPurpose: 'assertionMethod', privateKey: skMbSecp, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
|
|
258
|
-
})).rejects.toThrow('Invalid key type for EdDSA');
|
|
259
|
-
});
|
|
260
|
-
|
|
261
|
-
test('verifyProof returns error for non-Ed25519 publicKeyMultibase', async () => {
|
|
262
|
-
const pkSecp = new Uint8Array(33).fill(8);
|
|
263
|
-
const pkMbSecp = multikey.encodePublicKey(pkSecp, 'Secp256k1');
|
|
264
|
-
const loader = async (iri: string) => {
|
|
265
|
-
if (iri.includes('#')) return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pkMbSecp }, documentUrl: iri, contextUrl: null } as any;
|
|
266
|
-
return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
|
|
267
|
-
};
|
|
268
|
-
const proof = {
|
|
269
|
-
type: 'DataIntegrityProof',
|
|
270
|
-
cryptosuite: 'eddsa-rdfc-2022',
|
|
271
|
-
verificationMethod: 'did:ex#key-1',
|
|
272
|
-
proofPurpose: 'assertionMethod',
|
|
273
|
-
proofValue: 'z1L'
|
|
274
|
-
} as any;
|
|
275
|
-
const res = await EdDSACryptosuiteManager.verifyProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'urn:x' }, proof, { documentLoader: loader });
|
|
276
|
-
expect(res.verified).toBe(false);
|
|
277
|
-
expect(res.errors?.[0]).toBe('Invalid key type for EdDSA');
|
|
278
|
-
});
|
|
279
|
-
test('createProof propagates transform error (canonize)', async () => {
|
|
280
|
-
await expect(EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'] }, {
|
|
281
|
-
verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', cryptosuite: 'eddsa-rdfc-2022', privateKey: new Uint8Array(32),
|
|
282
|
-
documentLoader: async () => { throw new Error('canonize fail'); }
|
|
283
|
-
} as any)).rejects.toThrow();
|
|
284
|
-
});
|
|
285
|
-
|
|
286
|
-
test('verifyProof returns error on loader failure', async () => {
|
|
287
|
-
const res = await EdDSACryptosuiteManager.verifyProof({ '@context': ['https://www.w3.org/ns/credentials/v2'] }, {
|
|
288
|
-
type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'z1L'
|
|
289
|
-
} as any, { documentLoader: async () => { throw new Error('load fail'); } });
|
|
290
|
-
expect(res.verified).toBe(false);
|
|
291
|
-
expect(typeof res.errors?.[0]).toBe('string');
|
|
292
|
-
});
|
|
293
|
-
});
|
|
294
|
-
|
|
295
|
-
|
|
296
|
-
|
|
297
|
-
|
|
298
|
-
/** Inlined from eddsa.more.part.ts */
|
|
299
|
-
|
|
300
|
-
describe('EdDSACryptosuiteManager extra branches', () => {
|
|
301
|
-
const pkRaw = new Uint8Array(32).fill(7);
|
|
302
|
-
const skMb = multikey.encodePrivateKey(pkRaw, 'Ed25519');
|
|
303
|
-
const pubMb = multikey.encodePublicKey(new Uint8Array(32).fill(8), 'Ed25519');
|
|
304
|
-
|
|
305
|
-
const loader = async (iri: string) => {
|
|
306
|
-
if (iri.includes('#')) {
|
|
307
|
-
return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pubMb }, documentUrl: iri, contextUrl: null };
|
|
308
|
-
}
|
|
309
|
-
return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
|
|
310
|
-
};
|
|
311
|
-
|
|
312
|
-
test('sign with 64-byte private key slices to 32', async () => {
|
|
313
|
-
const sixtyFour = new Uint8Array(64);
|
|
314
|
-
sixtyFour.set(pkRaw);
|
|
315
|
-
const proof = await EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
|
|
316
|
-
verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', privateKey: sixtyFour, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
|
|
317
|
-
});
|
|
318
|
-
expect(proof.proofValue).toBeTruthy();
|
|
319
|
-
});
|
|
320
|
-
|
|
321
|
-
test('invalid private key length throws', async () => {
|
|
322
|
-
await expect(EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
|
|
323
|
-
verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', privateKey: new Uint8Array(31), cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
|
|
324
|
-
})).rejects.toThrow('Invalid private key length');
|
|
325
|
-
});
|
|
326
|
-
|
|
327
|
-
test('verify returns false on signature mismatch', async () => {
|
|
328
|
-
const res = await EdDSACryptosuiteManager.verifyProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
|
|
329
|
-
type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'z1L' // invalid base58btc
|
|
330
|
-
} as any, { documentLoader: loader });
|
|
331
|
-
expect(res.verified).toBe(false);
|
|
332
|
-
});
|
|
333
|
-
|
|
334
|
-
test('verifyProof returns error on canonizeProof failure path', async () => {
|
|
335
|
-
const badLoader = async (iri: string) => {
|
|
336
|
-
if (iri.includes('#')) {
|
|
337
|
-
return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pubMb }, documentUrl: iri, contextUrl: null };
|
|
338
|
-
}
|
|
339
|
-
return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
|
|
340
|
-
};
|
|
341
|
-
const proof: any = { type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'z1L' };
|
|
342
|
-
const doc: any = { '@context': ['https://www.w3.org/ns/credentials/v2'] };
|
|
343
|
-
doc.self = doc;
|
|
344
|
-
const res = await EdDSACryptosuiteManager.verifyProof(doc, proof, { documentLoader: badLoader });
|
|
345
|
-
expect(res.verified).toBe(false);
|
|
346
|
-
});
|
|
347
|
-
});
|
|
348
|
-
|
|
349
|
-
|
|
350
|
-
|
|
351
|
-
|
|
352
|
-
/** Inlined from eddsa.privatekey-string.part.ts */
|
|
353
|
-
|
|
354
|
-
describe('EdDSA createProof with multikey string', () => {
|
|
355
|
-
test('signs using multibase multicodec private key', async () => {
|
|
356
|
-
const sk = new Uint8Array(32).fill(9);
|
|
357
|
-
const pk = new Uint8Array(32).fill(8);
|
|
358
|
-
const skMb = multikey.encodePrivateKey(sk, 'Ed25519');
|
|
359
|
-
const pkMb = multikey.encodePublicKey(pk, 'Ed25519');
|
|
360
|
-
const loader = async (iri: string) => {
|
|
361
|
-
if (iri.includes('#')) return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
|
|
362
|
-
return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
|
|
363
|
-
};
|
|
364
|
-
const proof = await EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'urn:x' }, {
|
|
365
|
-
verificationMethod: 'did:ex#key-1', proofPurpose: 'assertionMethod', privateKey: skMb, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
|
|
366
|
-
});
|
|
367
|
-
expect(proof.type).toBe('DataIntegrityProof');
|
|
368
|
-
});
|
|
369
|
-
});
|
|
370
|
-
|
|
371
|
-
|
|
372
|
-
|
|
373
|
-
|
|
374
|
-
/** Inlined from eddsa.success.part.ts */
|
|
375
|
-
// Initialize noble crypto libraries (uses shared initialization module)
|
|
376
|
-
import '../../../../src/crypto/noble-init.js';
|
|
377
|
-
|
|
378
|
-
import * as ed25519 from '@noble/ed25519';
|
|
379
|
-
|
|
380
|
-
describe('EdDSA verifyProof success path', () => {
|
|
381
|
-
test('createProof then verifyProof returns verified=true', async () => {
|
|
382
|
-
const sk = ed25519.utils.randomPrivateKey();
|
|
383
|
-
const pk = ed25519.getPublicKey(sk);
|
|
384
|
-
const skMb = multikey.encodePrivateKey(sk, 'Ed25519');
|
|
385
|
-
const pkMb = multikey.encodePublicKey(pk, 'Ed25519');
|
|
386
|
-
const vmId = 'did:ex:succ#k';
|
|
387
|
-
const loader = async (iri: string) => {
|
|
388
|
-
if (iri.includes('#')) {
|
|
389
|
-
return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
|
|
390
|
-
}
|
|
391
|
-
return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
|
|
392
|
-
};
|
|
393
|
-
const doc: any = { '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'urn:doc' };
|
|
394
|
-
const proof = await EdDSACryptosuiteManager.createProof(doc, { verificationMethod: vmId, proofPurpose: 'assertionMethod', privateKey: skMb, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader });
|
|
395
|
-
const res = await EdDSACryptosuiteManager.verifyProof({ ...doc, proof }, proof as any, { documentLoader: loader });
|
|
396
|
-
expect(res.verified).toBe(true);
|
|
397
|
-
});
|
|
398
|
-
});
|