@originals/sdk 1.4.2 → 1.4.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (212) hide show
  1. package/package.json +4 -1
  2. package/.eslintrc.json +0 -33
  3. package/src/adapters/FeeOracleMock.ts +0 -9
  4. package/src/adapters/index.ts +0 -5
  5. package/src/adapters/providers/OrdHttpProvider.ts +0 -126
  6. package/src/adapters/providers/OrdMockProvider.ts +0 -101
  7. package/src/adapters/types.ts +0 -66
  8. package/src/bitcoin/BitcoinManager.ts +0 -330
  9. package/src/bitcoin/BroadcastClient.ts +0 -54
  10. package/src/bitcoin/OrdinalsClient.ts +0 -119
  11. package/src/bitcoin/PSBTBuilder.ts +0 -106
  12. package/src/bitcoin/fee-calculation.ts +0 -38
  13. package/src/bitcoin/providers/OrdNodeProvider.ts +0 -92
  14. package/src/bitcoin/providers/OrdinalsProvider.ts +0 -56
  15. package/src/bitcoin/providers/types.ts +0 -59
  16. package/src/bitcoin/transactions/commit.ts +0 -465
  17. package/src/bitcoin/transactions/index.ts +0 -13
  18. package/src/bitcoin/transfer.ts +0 -43
  19. package/src/bitcoin/utxo-selection.ts +0 -322
  20. package/src/bitcoin/utxo.ts +0 -113
  21. package/src/contexts/credentials-v1.json +0 -237
  22. package/src/contexts/credentials-v2-examples.json +0 -5
  23. package/src/contexts/credentials-v2.json +0 -340
  24. package/src/contexts/credentials.json +0 -237
  25. package/src/contexts/data-integrity-v2.json +0 -81
  26. package/src/contexts/dids.json +0 -58
  27. package/src/contexts/ed255192020.json +0 -93
  28. package/src/contexts/ordinals-plus.json +0 -23
  29. package/src/contexts/originals.json +0 -22
  30. package/src/core/OriginalsSDK.ts +0 -416
  31. package/src/crypto/Multikey.ts +0 -194
  32. package/src/crypto/Signer.ts +0 -254
  33. package/src/crypto/noble-init.ts +0 -121
  34. package/src/did/BtcoDidResolver.ts +0 -227
  35. package/src/did/DIDManager.ts +0 -694
  36. package/src/did/Ed25519Verifier.ts +0 -68
  37. package/src/did/KeyManager.ts +0 -236
  38. package/src/did/WebVHManager.ts +0 -498
  39. package/src/did/createBtcoDidDocument.ts +0 -59
  40. package/src/did/providers/OrdinalsClientProviderAdapter.ts +0 -68
  41. package/src/events/EventEmitter.ts +0 -222
  42. package/src/events/index.ts +0 -19
  43. package/src/events/types.ts +0 -331
  44. package/src/examples/basic-usage.ts +0 -78
  45. package/src/examples/create-module-original.ts +0 -435
  46. package/src/examples/full-lifecycle-flow.ts +0 -514
  47. package/src/examples/run.ts +0 -60
  48. package/src/index.ts +0 -150
  49. package/src/kinds/KindRegistry.ts +0 -290
  50. package/src/kinds/index.ts +0 -74
  51. package/src/kinds/types.ts +0 -470
  52. package/src/kinds/validators/AgentValidator.ts +0 -257
  53. package/src/kinds/validators/AppValidator.ts +0 -211
  54. package/src/kinds/validators/DatasetValidator.ts +0 -242
  55. package/src/kinds/validators/DocumentValidator.ts +0 -311
  56. package/src/kinds/validators/MediaValidator.ts +0 -269
  57. package/src/kinds/validators/ModuleValidator.ts +0 -225
  58. package/src/kinds/validators/base.ts +0 -276
  59. package/src/kinds/validators/index.ts +0 -12
  60. package/src/lifecycle/BatchOperations.ts +0 -373
  61. package/src/lifecycle/LifecycleManager.ts +0 -2126
  62. package/src/lifecycle/OriginalsAsset.ts +0 -524
  63. package/src/lifecycle/ProvenanceQuery.ts +0 -280
  64. package/src/lifecycle/ResourceVersioning.ts +0 -163
  65. package/src/migration/MigrationManager.ts +0 -527
  66. package/src/migration/audit/AuditLogger.ts +0 -176
  67. package/src/migration/checkpoint/CheckpointManager.ts +0 -112
  68. package/src/migration/checkpoint/CheckpointStorage.ts +0 -101
  69. package/src/migration/index.ts +0 -33
  70. package/src/migration/operations/BaseMigration.ts +0 -126
  71. package/src/migration/operations/PeerToBtcoMigration.ts +0 -105
  72. package/src/migration/operations/PeerToWebvhMigration.ts +0 -62
  73. package/src/migration/operations/WebvhToBtcoMigration.ts +0 -105
  74. package/src/migration/rollback/RollbackManager.ts +0 -170
  75. package/src/migration/state/StateMachine.ts +0 -92
  76. package/src/migration/state/StateTracker.ts +0 -156
  77. package/src/migration/types.ts +0 -344
  78. package/src/migration/validation/BitcoinValidator.ts +0 -107
  79. package/src/migration/validation/CredentialValidator.ts +0 -62
  80. package/src/migration/validation/DIDCompatibilityValidator.ts +0 -151
  81. package/src/migration/validation/LifecycleValidator.ts +0 -64
  82. package/src/migration/validation/StorageValidator.ts +0 -79
  83. package/src/migration/validation/ValidationPipeline.ts +0 -213
  84. package/src/resources/ResourceManager.ts +0 -655
  85. package/src/resources/index.ts +0 -21
  86. package/src/resources/types.ts +0 -202
  87. package/src/storage/LocalStorageAdapter.ts +0 -61
  88. package/src/storage/MemoryStorageAdapter.ts +0 -29
  89. package/src/storage/StorageAdapter.ts +0 -25
  90. package/src/storage/index.ts +0 -3
  91. package/src/types/bitcoin.ts +0 -98
  92. package/src/types/common.ts +0 -92
  93. package/src/types/credentials.ts +0 -88
  94. package/src/types/did.ts +0 -31
  95. package/src/types/external-shims.d.ts +0 -53
  96. package/src/types/index.ts +0 -7
  97. package/src/types/network.ts +0 -175
  98. package/src/utils/EventLogger.ts +0 -298
  99. package/src/utils/Logger.ts +0 -322
  100. package/src/utils/MetricsCollector.ts +0 -358
  101. package/src/utils/bitcoin-address.ts +0 -130
  102. package/src/utils/cbor.ts +0 -12
  103. package/src/utils/encoding.ts +0 -127
  104. package/src/utils/hash.ts +0 -6
  105. package/src/utils/retry.ts +0 -46
  106. package/src/utils/satoshi-validation.ts +0 -196
  107. package/src/utils/serialization.ts +0 -96
  108. package/src/utils/telemetry.ts +0 -40
  109. package/src/utils/validation.ts +0 -119
  110. package/src/vc/CredentialManager.ts +0 -918
  111. package/src/vc/Issuer.ts +0 -100
  112. package/src/vc/Verifier.ts +0 -47
  113. package/src/vc/cryptosuites/bbs.ts +0 -253
  114. package/src/vc/cryptosuites/bbsSimple.ts +0 -21
  115. package/src/vc/cryptosuites/eddsa.ts +0 -99
  116. package/src/vc/documentLoader.ts +0 -67
  117. package/src/vc/proofs/data-integrity.ts +0 -33
  118. package/src/vc/utils/jsonld.ts +0 -18
  119. package/tests/__mocks__/bbs-signatures.js +0 -17
  120. package/tests/__mocks__/mf-base58.js +0 -24
  121. package/tests/fixtures/did-documents.ts +0 -247
  122. package/tests/index.test.ts +0 -21
  123. package/tests/integration/BatchOperations.test.ts +0 -531
  124. package/tests/integration/CompleteLifecycle.e2e.test.ts +0 -735
  125. package/tests/integration/CredentialManager.test.ts +0 -42
  126. package/tests/integration/DIDManager.test.ts +0 -41
  127. package/tests/integration/DidPeerToWebVhFlow.test.ts +0 -351
  128. package/tests/integration/Events.test.ts +0 -435
  129. package/tests/integration/Lifecycle.transfer.btco.integration.test.ts +0 -25
  130. package/tests/integration/LifecycleManager.test.ts +0 -21
  131. package/tests/integration/MultikeyFlow.test.ts +0 -52
  132. package/tests/integration/TelemetryIntegration.test.ts +0 -395
  133. package/tests/integration/WebVhPublish.test.ts +0 -48
  134. package/tests/integration/createTypedOriginal.test.ts +0 -379
  135. package/tests/integration/migration/peer-to-webvh.test.ts +0 -172
  136. package/tests/manual/test-commit-creation.ts +0 -323
  137. package/tests/mocks/MockKeyStore.ts +0 -38
  138. package/tests/mocks/adapters/MemoryStorageAdapter.ts +0 -24
  139. package/tests/mocks/adapters/MockFeeOracle.ts +0 -11
  140. package/tests/mocks/adapters/MockOrdinalsProvider.ts +0 -76
  141. package/tests/mocks/adapters/OrdMockProvider.test.ts +0 -176
  142. package/tests/mocks/adapters/index.ts +0 -6
  143. package/tests/performance/BatchOperations.perf.test.ts +0 -403
  144. package/tests/performance/logging.perf.test.ts +0 -336
  145. package/tests/sdk.test.ts +0 -43
  146. package/tests/security/bitcoin-penetration-tests.test.ts +0 -622
  147. package/tests/setup.bun.ts +0 -69
  148. package/tests/setup.jest.ts +0 -23
  149. package/tests/stress/batch-operations-stress.test.ts +0 -571
  150. package/tests/unit/adapters/FeeOracleMock.test.ts +0 -40
  151. package/tests/unit/bitcoin/BitcoinManager.test.ts +0 -293
  152. package/tests/unit/bitcoin/BroadcastClient.test.ts +0 -52
  153. package/tests/unit/bitcoin/OrdNodeProvider.test.ts +0 -53
  154. package/tests/unit/bitcoin/OrdinalsClient.test.ts +0 -381
  155. package/tests/unit/bitcoin/OrdinalsClientProvider.test.ts +0 -102
  156. package/tests/unit/bitcoin/PSBTBuilder.test.ts +0 -84
  157. package/tests/unit/bitcoin/fee-calculation.test.ts +0 -261
  158. package/tests/unit/bitcoin/transactions/commit.test.ts +0 -649
  159. package/tests/unit/bitcoin/transfer.test.ts +0 -31
  160. package/tests/unit/bitcoin/utxo-selection-new.test.ts +0 -502
  161. package/tests/unit/bitcoin/utxo.more.test.ts +0 -39
  162. package/tests/unit/bitcoin/utxo.selection.test.ts +0 -38
  163. package/tests/unit/core/OriginalsSDK.test.ts +0 -152
  164. package/tests/unit/crypto/Multikey.test.ts +0 -206
  165. package/tests/unit/crypto/Signer.test.ts +0 -408
  166. package/tests/unit/did/BtcoDidResolver.test.ts +0 -611
  167. package/tests/unit/did/DIDManager.more.test.ts +0 -43
  168. package/tests/unit/did/DIDManager.test.ts +0 -185
  169. package/tests/unit/did/Ed25519Verifier.test.ts +0 -160
  170. package/tests/unit/did/KeyManager.test.ts +0 -452
  171. package/tests/unit/did/OrdinalsClientProviderAdapter.test.ts +0 -45
  172. package/tests/unit/did/WebVHManager.test.ts +0 -435
  173. package/tests/unit/did/createBtcoDidDocument.test.ts +0 -67
  174. package/tests/unit/did/providers/OrdinalsClientProviderAdapter.test.ts +0 -159
  175. package/tests/unit/events/EventEmitter.test.ts +0 -407
  176. package/tests/unit/kinds/KindRegistry.test.ts +0 -329
  177. package/tests/unit/kinds/types.test.ts +0 -409
  178. package/tests/unit/kinds/validators.test.ts +0 -651
  179. package/tests/unit/lifecycle/BatchOperations.test.ts +0 -527
  180. package/tests/unit/lifecycle/LifecycleManager.cleanapi.test.ts +0 -441
  181. package/tests/unit/lifecycle/LifecycleManager.keymanagement.test.ts +0 -312
  182. package/tests/unit/lifecycle/LifecycleManager.prov.test.ts +0 -18
  183. package/tests/unit/lifecycle/LifecycleManager.test.ts +0 -213
  184. package/tests/unit/lifecycle/LifecycleManager.transfer.unit.test.ts +0 -30
  185. package/tests/unit/lifecycle/OriginalsAsset.test.ts +0 -176
  186. package/tests/unit/lifecycle/ProvenanceQuery.test.ts +0 -577
  187. package/tests/unit/lifecycle/ResourceVersioning.test.ts +0 -651
  188. package/tests/unit/resources/ResourceManager.test.ts +0 -740
  189. package/tests/unit/storage/MemoryStorageAdapter.test.ts +0 -93
  190. package/tests/unit/types/network.test.ts +0 -255
  191. package/tests/unit/utils/EventIntegration.test.ts +0 -384
  192. package/tests/unit/utils/Logger.test.ts +0 -473
  193. package/tests/unit/utils/MetricsCollector.test.ts +0 -358
  194. package/tests/unit/utils/bitcoin-address.test.ts +0 -250
  195. package/tests/unit/utils/cbor.test.ts +0 -35
  196. package/tests/unit/utils/encoding.test.ts +0 -318
  197. package/tests/unit/utils/hash.test.ts +0 -12
  198. package/tests/unit/utils/retry.test.ts +0 -100
  199. package/tests/unit/utils/satoshi-validation.test.ts +0 -354
  200. package/tests/unit/utils/serialization.test.ts +0 -124
  201. package/tests/unit/utils/telemetry.test.ts +0 -52
  202. package/tests/unit/utils/validation.test.ts +0 -141
  203. package/tests/unit/vc/CredentialManager.helpers.test.ts +0 -527
  204. package/tests/unit/vc/CredentialManager.test.ts +0 -487
  205. package/tests/unit/vc/Issuer.test.ts +0 -107
  206. package/tests/unit/vc/Verifier.test.ts +0 -525
  207. package/tests/unit/vc/bbs.test.ts +0 -282
  208. package/tests/unit/vc/cryptosuites/eddsa.test.ts +0 -398
  209. package/tests/unit/vc/documentLoader.test.ts +0 -121
  210. package/tests/unit/vc/proofs/data-integrity.test.ts +0 -24
  211. package/tsconfig.json +0 -31
  212. package/tsconfig.test.json +0 -15
@@ -1,282 +0,0 @@
1
- /** Canonical test aggregator created by combine-tests script. */
2
-
3
- /** Inlined from bbs.simple.part.ts */
4
- import { describe, test, expect } from 'bun:test';
5
- import { BbsSimple } from '../../../src';
6
- import { bls12_381 as bls } from '@noble/curves/bls12-381';
7
-
8
- describe('BbsSimple e2e', () => {
9
- test('sign/verify not implemented with header', async () => {
10
- const sk = bls.utils.randomPrivateKey();
11
- const pk = bls.getPublicKey(sk);
12
- const keypair = { privateKey: sk, publicKey: pk };
13
- const header = new Uint8Array([1, 2, 3]);
14
- const messages = [
15
- new TextEncoder().encode('msg1'),
16
- new TextEncoder().encode('msg2'),
17
- new TextEncoder().encode('msg3')
18
- ];
19
-
20
- await expect(BbsSimple.sign(messages, keypair, header)).rejects.toThrow(/not implemented/i);
21
- await expect(BbsSimple.verify(messages, new Uint8Array([0]), pk, header)).rejects.toThrow(/not implemented/i);
22
- });
23
-
24
- test('sign/verify not implemented with default header', async () => {
25
- const sk = bls.utils.randomPrivateKey();
26
- const pk = bls.getPublicKey(sk);
27
- const keypair = { privateKey: sk, publicKey: pk };
28
- const messages = [
29
- new TextEncoder().encode('a'),
30
- new TextEncoder().encode('b')
31
- ];
32
- await expect(BbsSimple.sign(messages, keypair)).rejects.toThrow(/not implemented/i);
33
- await expect(BbsSimple.verify(messages, new Uint8Array([1, 2]), pk)).rejects.toThrow(/not implemented/i);
34
- });
35
- });
36
-
37
-
38
-
39
-
40
- /** Inlined from bbs.utils.part.ts */
41
- import { BBSCryptosuiteUtils } from '../../../src';
42
- import * as cbor from 'cbor-js';
43
-
44
- function u8(len: number, start: number = 0): Uint8Array {
45
- const a = new Uint8Array(len);
46
- for (let i = 0; i < len; i++) a[i] = (start + i) & 0xff;
47
- return a;
48
- }
49
-
50
- describe('BBSCryptosuiteUtils', () => {
51
- const bbsSignature = u8(96, 1);
52
- const bbsHeader = u8(64, 2);
53
- const publicKey = u8(96, 3);
54
- const hmacKey = u8(32, 4);
55
- const mandatoryPointers = ['/id', '/credentialSubject/id'];
56
-
57
- test('rejects non-u prefix for base/derived parsing', () => {
58
- expect(() => (BBSCryptosuiteUtils as any).parseBaseProofValue('xabc')).toThrow('multibase');
59
- expect(() => (BBSCryptosuiteUtils as any).parseDerivedProofValue('xabc')).toThrow('multibase');
60
- });
61
-
62
- test('serialize/parse base proof (baseline)', () => {
63
- const s = BBSCryptosuiteUtils.serializeBaseProofValue(
64
- bbsSignature,
65
- bbsHeader,
66
- publicKey,
67
- hmacKey,
68
- mandatoryPointers,
69
- 'baseline'
70
- );
71
- expect(s.startsWith('u')).toBe(true);
72
- const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
73
- expect(Array.from(p.bbsSignature)).toEqual(Array.from(bbsSignature));
74
- expect(Array.from(p.bbsHeader)).toEqual(Array.from(bbsHeader));
75
- expect(Array.from(p.publicKey)).toEqual(Array.from(publicKey));
76
- expect(Array.from(p.hmacKey)).toEqual(Array.from(hmacKey));
77
- expect(p.mandatoryPointers).toEqual(mandatoryPointers);
78
- expect(p.featureOption).toBe('baseline');
79
- });
80
-
81
- test('serialize/parse base proof (anonymous_holder_binding)', () => {
82
- const signerBlind = u8(32, 7);
83
- const s = BBSCryptosuiteUtils.serializeBaseProofValue(
84
- bbsSignature,
85
- bbsHeader,
86
- publicKey,
87
- hmacKey,
88
- mandatoryPointers,
89
- 'anonymous_holder_binding',
90
- undefined,
91
- signerBlind
92
- );
93
- const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
94
- expect(p.featureOption).toBe('anonymous_holder_binding');
95
- expect(Array.from(p.signerBlind)).toEqual(Array.from(signerBlind));
96
- });
97
-
98
- test('serialize/parse base proof (pseudonym_issuer_pid)', () => {
99
- const pid = u8(32, 9);
100
- const s = BBSCryptosuiteUtils.serializeBaseProofValue(
101
- bbsSignature,
102
- bbsHeader,
103
- publicKey,
104
- hmacKey,
105
- mandatoryPointers,
106
- 'pseudonym_issuer_pid',
107
- pid
108
- );
109
- const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
110
- expect(p.featureOption).toBe('pseudonym_issuer_pid');
111
- expect(Array.from(p.pid)).toEqual(Array.from(pid));
112
- });
113
-
114
- test('serialize/parse base proof (pseudonym_hidden_pid)', () => {
115
- const signerBlind = u8(32, 11);
116
- const s = BBSCryptosuiteUtils.serializeBaseProofValue(
117
- bbsSignature,
118
- bbsHeader,
119
- publicKey,
120
- hmacKey,
121
- mandatoryPointers,
122
- 'pseudonym_hidden_pid',
123
- undefined,
124
- signerBlind
125
- );
126
- const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
127
- expect(p.featureOption).toBe('pseudonym_hidden_pid');
128
- expect(Array.from(p.signerBlind)).toEqual(Array.from(signerBlind));
129
- });
130
-
131
- test('serialize/parse derived proof (baseline)', () => {
132
- const labelMap = { c14n1: 'b3', c14n10: 'b7' };
133
- const mandatoryIndexes = [0, 2, 5];
134
- const selectiveIndexes = [1, 4];
135
- const presentationHeader = u8(16, 33);
136
- const bbsProof = u8(80, 55);
137
- const s = BBSCryptosuiteUtils.serializeDerivedProofValue(
138
- bbsProof,
139
- labelMap,
140
- mandatoryIndexes,
141
- selectiveIndexes,
142
- presentationHeader,
143
- 'baseline'
144
- );
145
- const p = (BBSCryptosuiteUtils as any).parseDerivedProofValue(s);
146
- expect(Array.from(p.bbsProof)).toEqual(Array.from(bbsProof));
147
- expect(p.labelMap).toEqual(labelMap);
148
- expect(p.mandatoryIndexes).toEqual(mandatoryIndexes);
149
- expect(p.selectiveIndexes).toEqual(selectiveIndexes);
150
- expect(Array.from(p.presentationHeader)).toEqual(Array.from(presentationHeader));
151
- expect(p.featureOption).toBe('baseline');
152
- });
153
-
154
- test('serialize/parse derived proof (anonymous_holder_binding)', () => {
155
- const labelMap = { c14n2: 'b5' };
156
- const presentationHeader = u8(8, 7);
157
- const bbsProof = u8(64, 8);
158
- const s = BBSCryptosuiteUtils.serializeDerivedProofValue(
159
- bbsProof,
160
- labelMap,
161
- [0],
162
- [1],
163
- presentationHeader,
164
- 'anonymous_holder_binding',
165
- undefined,
166
- 4
167
- );
168
- const p = (BBSCryptosuiteUtils as any).parseDerivedProofValue(s);
169
- expect(p.featureOption).toBe('anonymous_holder_binding');
170
- expect(p.lengthBBSMessages).toBe(4);
171
- });
172
-
173
- test('serialize/parse derived proof (pseudonym)', () => {
174
- const labelMap = { c14n3: 'b7' };
175
- const presentationHeader = u8(4, 90);
176
- const bbsProof = u8(64, 90);
177
- const s = BBSCryptosuiteUtils.serializeDerivedProofValue(
178
- bbsProof,
179
- labelMap,
180
- [0, 1],
181
- [1],
182
- presentationHeader,
183
- 'pseudonym',
184
- 'alice',
185
- 5
186
- );
187
- const p = (BBSCryptosuiteUtils as any).parseDerivedProofValue(s);
188
- expect(p.featureOption).toBe('pseudonym');
189
- expect(p.pseudonym).toBe('alice');
190
- expect(p.lengthBBSMessages).toBe(5);
191
- });
192
-
193
- test('parse base proof with base_proof header', () => {
194
- const components = [bbsSignature, bbsHeader, publicKey, hmacKey, mandatoryPointers];
195
- const encoded = (cbor as any).encode(components) as Uint8Array | ArrayBuffer;
196
- const encBytes = encoded instanceof Uint8Array ? encoded : new Uint8Array(encoded as ArrayBuffer);
197
- const header = new Uint8Array([0xd9, 0x5d, 0x03]);
198
- const bytes = new Uint8Array(header.length + encBytes.length);
199
- bytes.set(header, 0);
200
- bytes.set(encBytes, header.length);
201
- const s = 'u' + Buffer.from(bytes).toString('base64').replace(/\+/g, '-').replace(/\//g, '_').replace(/=+$/g, '');
202
- const p = (BBSCryptosuiteUtils as any).parseBaseProofValue(s);
203
- expect(p.featureOption).toBe('base_proof');
204
- });
205
-
206
- test('serializeDerivedProofValue throws on missing length for anonymous_holder_binding', () => {
207
- expect(() => BBSCryptosuiteUtils.serializeDerivedProofValue(
208
- u8(8),
209
- { c14n1: 'b1' },
210
- [0],
211
- [0],
212
- u8(4),
213
- 'anonymous_holder_binding'
214
- )).toThrow('lengthBBSMessages is required');
215
- });
216
-
217
- test('serializeDerivedProofValue throws on missing pseudonym/length for pseudonym', () => {
218
- expect(() => BBSCryptosuiteUtils.serializeDerivedProofValue(
219
- u8(8),
220
- { c14n1: 'b1' },
221
- [0],
222
- [0],
223
- u8(4),
224
- 'pseudonym'
225
- )).toThrow('pseudonym and lengthBBSMessages');
226
- });
227
-
228
- test('serializeDerivedProofValue throws on unsupported feature', () => {
229
- expect(() => (BBSCryptosuiteUtils as any).serializeDerivedProofValue(
230
- u8(8),
231
- { c14n1: 'b1' },
232
- [0],
233
- [0],
234
- u8(4),
235
- 'unsupported'
236
- )).toThrow('Unsupported feature option');
237
- });
238
-
239
- test('serializeBaseProofValue throws for missing signerBlind/pid and unsupported feature', () => {
240
- expect(() => BBSCryptosuiteUtils.serializeBaseProofValue(
241
- u8(8), u8(4), u8(8), u8(4), mandatoryPointers, 'anonymous_holder_binding'
242
- )).toThrow('signerBlind is required');
243
- expect(() => BBSCryptosuiteUtils.serializeBaseProofValue(
244
- u8(8), u8(4), u8(8), u8(4), mandatoryPointers, 'pseudonym_issuer_pid'
245
- )).toThrow('pid is required');
246
- expect(() => (BBSCryptosuiteUtils as any).serializeBaseProofValue(
247
- u8(8), u8(4), u8(8), u8(4), mandatoryPointers, 'unsupported'
248
- )).toThrow('Unsupported feature option');
249
- });
250
-
251
- test('serializeBaseProofValue throws when signerBlind missing for pseudonym_hidden_pid', () => {
252
- expect(() => BBSCryptosuiteUtils.serializeBaseProofValue(
253
- u8(8), u8(4), u8(8), u8(4), mandatoryPointers, 'pseudonym_hidden_pid'
254
- )).toThrow('signerBlind is required');
255
- });
256
-
257
- test('compareBytes length mismatch branch', () => {
258
- expect((BBSCryptosuiteUtils as any).compareBytes(new Uint8Array([1, 2]), [1, 2, 3])).toBe(false);
259
- });
260
-
261
- test('serializeDerivedProofValue throws on invalid labelMap entries', () => {
262
- expect(() => BBSCryptosuiteUtils.serializeDerivedProofValue(
263
- u8(4),
264
- { notC14n: 'b1' } as any,
265
- [0],
266
- [0],
267
- u8(2),
268
- 'baseline'
269
- )).toThrow('Invalid label map entry');
270
- });
271
-
272
- test('parse errors on invalid base header', () => {
273
- // Construct invalid header 'u' + cbor of empty
274
- const bad = 'u' + 'AAAA';
275
- expect(() => (BBSCryptosuiteUtils as any).parseBaseProofValue(bad)).toThrow();
276
- });
277
-
278
- test('parse errors on invalid derived header', () => {
279
- const bad = 'u' + 'AAAA';
280
- expect(() => (BBSCryptosuiteUtils as any).parseDerivedProofValue(bad)).toThrow();
281
- });
282
- });
@@ -1,398 +0,0 @@
1
- /** Canonical test aggregator created by combine-tests script. */
2
-
3
- /** Inlined from eddsa.branch-more.part.ts */
4
- import { describe, test, expect } from 'bun:test';
5
- import { EdDSACryptosuiteManager } from '../../../../src/vc/cryptosuites/eddsa';
6
- import { multikey } from '../../../../src/crypto/Multikey';
7
-
8
- describe('EdDSA additional branches', () => {
9
- test('createProof throws on invalid private key format', async () => {
10
- await expect(EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
11
- verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', cryptosuite: 'eddsa-rdfc-2022', privateKey: 123 as any,
12
- documentLoader: async () => ({ document: { '@context': { '@version': 1.1 } }, documentUrl: '', contextUrl: null })
13
- } as any)).rejects.toThrow('Invalid private key format');
14
- });
15
-
16
- test('verifyProof returns error for non-Ed25519 VM', async () => {
17
- const pkMb = multikey.encodePublicKey(new Uint8Array(33).fill(1), 'Secp256k1');
18
- const res = await EdDSACryptosuiteManager.verifyProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
19
- type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'z1L'
20
- } as any, { documentLoader: async () => ({ document: { '@context': ['https://www.w3.org/ns/did/v1'], id: 'did:ex#k', publicKeyMultibase: pkMb }, documentUrl: '', contextUrl: null }) });
21
- expect(res.verified).toBe(false);
22
- expect(typeof res.errors?.[0]).toBe('string');
23
- });
24
- });
25
-
26
-
27
-
28
-
29
- /** Inlined from eddsa.coverage-extra.part.ts */
30
-
31
- describe('EdDSA coverage extras', () => {
32
- const goodContext = ['https://www.w3.org/ns/credentials/v2'];
33
-
34
- test('createProofConfiguration defaults proofPurpose to assertionMethod', async () => {
35
- const sk = new Uint8Array(32).fill(1);
36
- const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(2), 'Ed25519');
37
- const vm = 'did:ex#vm';
38
- const loader = async (iri: string) => {
39
- if (iri.includes('#')) {
40
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
41
- }
42
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
43
- };
44
- const doc: any = { '@context': goodContext, id: 'urn:doc-default-purpose' };
45
- const proof = await EdDSACryptosuiteManager.createProof(doc, { verificationMethod: vm, privateKey: sk, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader });
46
- // The method deletes @context before returning, so we assert the purpose value
47
- expect(proof.proofPurpose).toBe('assertionMethod');
48
- });
49
-
50
- test('createProof includes only challenge when provided', async () => {
51
- const sk = new Uint8Array(32).fill(7);
52
- const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(6), 'Ed25519');
53
- const vm = 'did:ex#vm-chal';
54
- const loader = async (iri: string) => {
55
- if (iri.includes('#')) {
56
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
57
- }
58
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
59
- };
60
- const proof = await EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:chal' }, { verificationMethod: vm, privateKey: sk, cryptosuite: 'eddsa-rdfc-2022', challenge: '123', documentLoader: loader });
61
- expect((proof as any).challenge).toBe('123');
62
- expect((proof as any).domain).toBeUndefined();
63
- });
64
-
65
- test('createProof includes only domain when provided', async () => {
66
- const sk = new Uint8Array(32).fill(9);
67
- const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(8), 'Ed25519');
68
- const vm = 'did:ex#vm-domain';
69
- const loader = async (iri: string) => {
70
- if (iri.includes('#')) {
71
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
72
- }
73
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
74
- };
75
- const proof = await EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:domain' }, { verificationMethod: vm, privateKey: sk, cryptosuite: 'eddsa-rdfc-2022', domain: 'ex.org', documentLoader: loader });
76
- expect((proof as any).domain).toBe('ex.org');
77
- expect((proof as any).challenge).toBeUndefined();
78
- });
79
-
80
- test('verifyProof returns error message on thrown exception path', async () => {
81
- const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(3), 'Ed25519');
82
- const loader = async (iri: string) => {
83
- if (iri.includes('#')) {
84
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
85
- }
86
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
87
- };
88
- const doc: any = { '@context': goodContext, id: 'urn:doc' };
89
- const badProof: any = { type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'not-multibase' };
90
- const res = await EdDSACryptosuiteManager.verifyProof(doc, badProof, { documentLoader: loader });
91
- expect(res.verified).toBe(false);
92
- expect(Array.isArray(res.errors)).toBe(true);
93
- expect(typeof res.errors![0]).toBe('string');
94
- });
95
-
96
- test('verifyProof uses Unknown verification error when thrown value lacks message', async () => {
97
- const pkMb = multikey.encodePublicKey(new Uint8Array(32).fill(4), 'Ed25519');
98
- const doc: any = { '@context': goodContext, id: 'urn:doc-unknown' };
99
- const proof: any = { type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#vm-unknown', proofPurpose: 'assertionMethod', proofValue: 'z1L' };
100
- const loader = async (iri: string) => {
101
- if (iri.includes('#')) {
102
- // Throw a primitive string (no message property) only on VM fetch, after transform/hash succeeded
103
- throw '';
104
- }
105
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
106
- };
107
- const res = await EdDSACryptosuiteManager.verifyProof(doc, proof, { documentLoader: loader });
108
- expect(res.verified).toBe(false);
109
- expect(res.errors?.[0]).toBe('Unknown verification error');
110
- });
111
- });
112
-
113
-
114
-
115
-
116
- /** Inlined from eddsa.edgecases.part.ts */
117
-
118
- describe('EdDSA cryptosuite edge cases', () => {
119
- const goodContext = ['https://www.w3.org/ns/credentials/v2'];
120
-
121
- const pk32 = new Uint8Array(32).fill(7);
122
- const pk32b = new Uint8Array(32).fill(8);
123
- const pkMb = multikey.encodePublicKey(pk32b, 'Ed25519');
124
-
125
- const okLoader = async (iri: string) => {
126
- if (iri.includes('#')) {
127
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
128
- }
129
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
130
- };
131
-
132
- test('createProof signs with raw Uint8Array 32-byte private key', async () => {
133
- const proof = await EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:raw32' }, {
134
- verificationMethod: 'did:ex#key-raw', proofPurpose: 'assertionMethod', privateKey: pk32,
135
- cryptosuite: 'eddsa-rdfc-2022', documentLoader: okLoader
136
- });
137
- expect(proof.type).toBe('DataIntegrityProof');
138
- expect(typeof proof.proofValue).toBe('string');
139
- });
140
-
141
- test('createProof includes challenge and domain options', async () => {
142
- const proof = await EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:opts' }, {
143
- verificationMethod: 'did:ex#key-opts', proofPurpose: 'assertionMethod', privateKey: pk32,
144
- cryptosuite: 'eddsa-rdfc-2022', challenge: 'abc', domain: 'example.org', documentLoader: okLoader
145
- });
146
- expect((proof as any).challenge).toBe('abc');
147
- expect((proof as any).domain).toBe('example.org');
148
- });
149
-
150
- test('createProof invalid private key length 33 throws', async () => {
151
- const bad33 = new Uint8Array(33);
152
- await expect(EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:bad33' }, {
153
- verificationMethod: 'did:ex#key-bad33', proofPurpose: 'assertionMethod', privateKey: bad33,
154
- cryptosuite: 'eddsa-rdfc-2022', documentLoader: okLoader
155
- })).rejects.toThrow('Invalid private key length');
156
- });
157
-
158
- test('createProof invalid private key length 63 throws', async () => {
159
- const bad63 = new Uint8Array(63);
160
- await expect(EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:bad63' }, {
161
- verificationMethod: 'did:ex#key-bad63', proofPurpose: 'assertionMethod', privateKey: bad63,
162
- cryptosuite: 'eddsa-rdfc-2022', documentLoader: okLoader
163
- })).rejects.toThrow('Invalid private key length');
164
- });
165
-
166
- test('createProof with non-Ed25519 multikey string errors', async () => {
167
- const secpSk = new Uint8Array(32).fill(5);
168
- const secpSkMb = multikey.encodePrivateKey(secpSk, 'Secp256k1');
169
- await expect(EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:secpSk' }, {
170
- verificationMethod: 'did:ex#key-non-ed', proofPurpose: 'assertionMethod', privateKey: secpSkMb,
171
- cryptosuite: 'eddsa-rdfc-2022', documentLoader: okLoader
172
- })).rejects.toThrow('Invalid key type for EdDSA');
173
- });
174
-
175
- test('verifyProof returns false with wrong public key', async () => {
176
- // Sign with one keypair
177
- const signingSk = new Uint8Array(32).fill(9);
178
- const signingPk = new Uint8Array(32).fill(1);
179
- const signingPkMb = multikey.encodePublicKey(signingPk, 'Ed25519');
180
- const vmId = 'did:ex#vm-1';
181
- const signingLoader = async (iri: string) => {
182
- if (iri.includes('#')) {
183
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: signingPkMb }, documentUrl: iri, contextUrl: null };
184
- }
185
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
186
- };
187
- const doc = { '@context': goodContext, id: 'urn:test:verify-wrong-pk' };
188
- const proof = await EdDSACryptosuiteManager.createProof(doc, {
189
- verificationMethod: vmId, proofPurpose: 'assertionMethod', privateKey: signingSk,
190
- cryptosuite: 'eddsa-rdfc-2022', documentLoader: signingLoader
191
- });
192
-
193
- // Verify with different public key
194
- const wrongPkMb = multikey.encodePublicKey(new Uint8Array(32).fill(2), 'Ed25519');
195
- const wrongLoader = async (iri: string) => {
196
- if (iri.includes('#')) {
197
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: wrongPkMb }, documentUrl: iri, contextUrl: null };
198
- }
199
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
200
- };
201
- const res = await EdDSACryptosuiteManager.verifyProof(doc, proof as any, { documentLoader: wrongLoader });
202
- expect(res.verified).toBe(false);
203
- });
204
-
205
- test('verifyProof succeeds with matching verificationMethod', async () => {
206
- const ed = await import('@noble/ed25519');
207
- const sk = new Uint8Array(32).fill(11);
208
- const pk = await ed.getPublicKeyAsync(sk);
209
- const pkMbLocal = multikey.encodePublicKey(new Uint8Array(pk), 'Ed25519');
210
- const vm = 'did:ex#vm-ok';
211
- const loader = async (iri: string) => {
212
- if (iri.includes('#')) {
213
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMbLocal }, documentUrl: iri, contextUrl: null };
214
- }
215
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
216
- };
217
- const doc = { '@context': goodContext, id: 'urn:test:verify-ok' };
218
- const proof = await EdDSACryptosuiteManager.createProof(doc, {
219
- verificationMethod: vm, proofPurpose: 'assertionMethod', privateKey: sk, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
220
- });
221
- const res = await EdDSACryptosuiteManager.verifyProof(doc, proof as any, { documentLoader: loader });
222
- expect(res.verified).toBe(true);
223
- });
224
-
225
- test('createProof propagates canonizeProof/hash-stage exception via loader', async () => {
226
- // Fail only during proof canonization stage (hash path), not during transform
227
- const loader = async (iri: string) => {
228
- if (iri.includes('w3id.org/security/data-integrity')) {
229
- throw new Error('hash-stage canonize fail');
230
- }
231
- if (iri.includes('#')) {
232
- return { document: { '@context': goodContext, id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
233
- }
234
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
235
- };
236
- await expect(EdDSACryptosuiteManager.createProof({ '@context': goodContext, id: 'urn:test:hash-fail' }, {
237
- verificationMethod: 'did:ex#key-hash', proofPurpose: 'assertionMethod', privateKey: pk32,
238
- cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
239
- } as any)).rejects.toThrow();
240
- });
241
- });
242
-
243
-
244
-
245
-
246
- /** Inlined from eddsa.errors.part.ts */
247
-
248
- describe('EdDSA error branches', () => {
249
- test('createProof throws on non-Ed25519 multikey private key', async () => {
250
- const sk = new Uint8Array(32).fill(7);
251
- const skMbSecp = multikey.encodePrivateKey(sk, 'Secp256k1');
252
- const loader = async (iri: string) => {
253
- if (iri.includes('#')) return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri }, documentUrl: iri, contextUrl: null } as any;
254
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
255
- };
256
- await expect(EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'urn:x' }, {
257
- verificationMethod: 'did:ex#key-1', proofPurpose: 'assertionMethod', privateKey: skMbSecp, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
258
- })).rejects.toThrow('Invalid key type for EdDSA');
259
- });
260
-
261
- test('verifyProof returns error for non-Ed25519 publicKeyMultibase', async () => {
262
- const pkSecp = new Uint8Array(33).fill(8);
263
- const pkMbSecp = multikey.encodePublicKey(pkSecp, 'Secp256k1');
264
- const loader = async (iri: string) => {
265
- if (iri.includes('#')) return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pkMbSecp }, documentUrl: iri, contextUrl: null } as any;
266
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
267
- };
268
- const proof = {
269
- type: 'DataIntegrityProof',
270
- cryptosuite: 'eddsa-rdfc-2022',
271
- verificationMethod: 'did:ex#key-1',
272
- proofPurpose: 'assertionMethod',
273
- proofValue: 'z1L'
274
- } as any;
275
- const res = await EdDSACryptosuiteManager.verifyProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'urn:x' }, proof, { documentLoader: loader });
276
- expect(res.verified).toBe(false);
277
- expect(res.errors?.[0]).toBe('Invalid key type for EdDSA');
278
- });
279
- test('createProof propagates transform error (canonize)', async () => {
280
- await expect(EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'] }, {
281
- verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', cryptosuite: 'eddsa-rdfc-2022', privateKey: new Uint8Array(32),
282
- documentLoader: async () => { throw new Error('canonize fail'); }
283
- } as any)).rejects.toThrow();
284
- });
285
-
286
- test('verifyProof returns error on loader failure', async () => {
287
- const res = await EdDSACryptosuiteManager.verifyProof({ '@context': ['https://www.w3.org/ns/credentials/v2'] }, {
288
- type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'z1L'
289
- } as any, { documentLoader: async () => { throw new Error('load fail'); } });
290
- expect(res.verified).toBe(false);
291
- expect(typeof res.errors?.[0]).toBe('string');
292
- });
293
- });
294
-
295
-
296
-
297
-
298
- /** Inlined from eddsa.more.part.ts */
299
-
300
- describe('EdDSACryptosuiteManager extra branches', () => {
301
- const pkRaw = new Uint8Array(32).fill(7);
302
- const skMb = multikey.encodePrivateKey(pkRaw, 'Ed25519');
303
- const pubMb = multikey.encodePublicKey(new Uint8Array(32).fill(8), 'Ed25519');
304
-
305
- const loader = async (iri: string) => {
306
- if (iri.includes('#')) {
307
- return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pubMb }, documentUrl: iri, contextUrl: null };
308
- }
309
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
310
- };
311
-
312
- test('sign with 64-byte private key slices to 32', async () => {
313
- const sixtyFour = new Uint8Array(64);
314
- sixtyFour.set(pkRaw);
315
- const proof = await EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
316
- verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', privateKey: sixtyFour, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
317
- });
318
- expect(proof.proofValue).toBeTruthy();
319
- });
320
-
321
- test('invalid private key length throws', async () => {
322
- await expect(EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
323
- verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', privateKey: new Uint8Array(31), cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
324
- })).rejects.toThrow('Invalid private key length');
325
- });
326
-
327
- test('verify returns false on signature mismatch', async () => {
328
- const res = await EdDSACryptosuiteManager.verifyProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'x' }, {
329
- type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'z1L' // invalid base58btc
330
- } as any, { documentLoader: loader });
331
- expect(res.verified).toBe(false);
332
- });
333
-
334
- test('verifyProof returns error on canonizeProof failure path', async () => {
335
- const badLoader = async (iri: string) => {
336
- if (iri.includes('#')) {
337
- return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pubMb }, documentUrl: iri, contextUrl: null };
338
- }
339
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
340
- };
341
- const proof: any = { type: 'DataIntegrityProof', cryptosuite: 'eddsa-rdfc-2022', verificationMethod: 'did:ex#k', proofPurpose: 'assertionMethod', proofValue: 'z1L' };
342
- const doc: any = { '@context': ['https://www.w3.org/ns/credentials/v2'] };
343
- doc.self = doc;
344
- const res = await EdDSACryptosuiteManager.verifyProof(doc, proof, { documentLoader: badLoader });
345
- expect(res.verified).toBe(false);
346
- });
347
- });
348
-
349
-
350
-
351
-
352
- /** Inlined from eddsa.privatekey-string.part.ts */
353
-
354
- describe('EdDSA createProof with multikey string', () => {
355
- test('signs using multibase multicodec private key', async () => {
356
- const sk = new Uint8Array(32).fill(9);
357
- const pk = new Uint8Array(32).fill(8);
358
- const skMb = multikey.encodePrivateKey(sk, 'Ed25519');
359
- const pkMb = multikey.encodePublicKey(pk, 'Ed25519');
360
- const loader = async (iri: string) => {
361
- if (iri.includes('#')) return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
362
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
363
- };
364
- const proof = await EdDSACryptosuiteManager.createProof({ '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'urn:x' }, {
365
- verificationMethod: 'did:ex#key-1', proofPurpose: 'assertionMethod', privateKey: skMb, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader
366
- });
367
- expect(proof.type).toBe('DataIntegrityProof');
368
- });
369
- });
370
-
371
-
372
-
373
-
374
- /** Inlined from eddsa.success.part.ts */
375
- // Initialize noble crypto libraries (uses shared initialization module)
376
- import '../../../../src/crypto/noble-init.js';
377
-
378
- import * as ed25519 from '@noble/ed25519';
379
-
380
- describe('EdDSA verifyProof success path', () => {
381
- test('createProof then verifyProof returns verified=true', async () => {
382
- const sk = ed25519.utils.randomPrivateKey();
383
- const pk = ed25519.getPublicKey(sk);
384
- const skMb = multikey.encodePrivateKey(sk, 'Ed25519');
385
- const pkMb = multikey.encodePublicKey(pk, 'Ed25519');
386
- const vmId = 'did:ex:succ#k';
387
- const loader = async (iri: string) => {
388
- if (iri.includes('#')) {
389
- return { document: { '@context': ['https://www.w3.org/ns/credentials/v2'], id: iri, publicKeyMultibase: pkMb }, documentUrl: iri, contextUrl: null };
390
- }
391
- return { document: { '@context': { '@version': 1.1 } }, documentUrl: iri, contextUrl: null } as any;
392
- };
393
- const doc: any = { '@context': ['https://www.w3.org/ns/credentials/v2'], id: 'urn:doc' };
394
- const proof = await EdDSACryptosuiteManager.createProof(doc, { verificationMethod: vmId, proofPurpose: 'assertionMethod', privateKey: skMb, cryptosuite: 'eddsa-rdfc-2022', documentLoader: loader });
395
- const res = await EdDSACryptosuiteManager.verifyProof({ ...doc, proof }, proof as any, { documentLoader: loader });
396
- expect(res.verified).toBe(true);
397
- });
398
- });