@sphereon/ssi-sdk-ext.did-resolver-key 0.28.1-feature.esm.cjs.8 → 0.28.1-feature.oyd.cmsm.improv.16
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/drivers/bls12381g2.d.ts +8 -0
- package/dist/drivers/bls12381g2.d.ts.map +1 -0
- package/dist/drivers/bls12381g2.js +49 -0
- package/dist/drivers/bls12381g2.js.map +1 -0
- package/dist/drivers/ed25519.d.ts +8 -0
- package/dist/drivers/ed25519.d.ts.map +1 -0
- package/dist/drivers/ed25519.js +118 -0
- package/dist/drivers/ed25519.js.map +1 -0
- package/dist/drivers/jwk.jcs.d.ts +8 -0
- package/dist/drivers/jwk.jcs.d.ts.map +1 -0
- package/dist/drivers/jwk.jcs.js +23 -0
- package/dist/drivers/jwk.jcs.js.map +1 -0
- package/dist/drivers/secp256k1.d.ts +8 -0
- package/dist/drivers/secp256k1.d.ts.map +1 -0
- package/dist/drivers/secp256k1.js +49 -0
- package/dist/drivers/secp256k1.js.map +1 -0
- package/dist/drivers/secp256r1.d.ts +24 -0
- package/dist/drivers/secp256r1.d.ts.map +1 -0
- package/dist/drivers/secp256r1.js +99 -0
- package/dist/drivers/secp256r1.js.map +1 -0
- package/dist/drivers/secp384r1.d.ts +24 -0
- package/dist/drivers/secp384r1.d.ts.map +1 -0
- package/dist/drivers/secp384r1.js +99 -0
- package/dist/drivers/secp384r1.js.map +1 -0
- package/dist/drivers/secp521r1.d.ts +23 -0
- package/dist/drivers/secp521r1.d.ts.map +1 -0
- package/dist/drivers/secp521r1.js +87 -0
- package/dist/drivers/secp521r1.js.map +1 -0
- package/dist/index.d.ts +5 -18
- package/dist/index.d.ts.map +1 -0
- package/dist/index.js +87 -484
- package/dist/index.js.map +1 -1
- package/dist/types.d.ts +14 -0
- package/dist/types.d.ts.map +1 -0
- package/dist/types.js +6 -0
- package/dist/types.js.map +1 -0
- package/package.json +10 -22
- package/src/__tests__/__snapshots__/secp256r1.test.ts.snap +1 -249
- package/src/__tests__/__snapshots__/secp384r1.test.ts.snap +1 -249
- package/src/__tests__/__snapshots__/secp521r1.test.ts.snap +1 -280
- package/src/__tests__/key_resolver.test.ts +1 -2
- package/src/__tests__/secp256r1.test.ts +4 -4
- package/src/__tests__/secp384r1.test.ts +3 -3
- package/src/__tests__/secp521r1.test.ts +2 -3
- package/src/drivers/bls12381g2.ts +2 -3
- package/src/drivers/ed25519.ts +5 -7
- package/src/drivers/secp256k1.ts +2 -3
- package/src/drivers/secp256r1.ts +5 -5
- package/src/drivers/secp384r1.ts +2 -3
- package/src/drivers/secp521r1.ts +2 -3
- package/src/index.ts +0 -1
- package/dist/index.cjs +0 -520
- package/dist/index.cjs.map +0 -1
- package/dist/index.d.cts +0 -21
|
@@ -1,283 +1,4 @@
|
|
|
1
|
-
//
|
|
2
|
-
|
|
3
|
-
exports[`Secp521r1 mapper > successfully resolves the document from did 1`] = `
|
|
4
|
-
{
|
|
5
|
-
"assertionMethod": [
|
|
6
|
-
"did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
|
|
7
|
-
],
|
|
8
|
-
"authentication": [
|
|
9
|
-
"did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
|
|
10
|
-
],
|
|
11
|
-
"capabilityDelegation": [
|
|
12
|
-
"did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
|
|
13
|
-
],
|
|
14
|
-
"capabilityInvocation": [
|
|
15
|
-
"did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
|
|
16
|
-
],
|
|
17
|
-
"id": "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
|
|
18
|
-
"verificationMethod": [
|
|
19
|
-
{
|
|
20
|
-
"controller": "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
|
|
21
|
-
"id": "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
|
|
22
|
-
"publicKeyJwk": {
|
|
23
|
-
"crv": "P-521",
|
|
24
|
-
"kty": "EC",
|
|
25
|
-
"x": "AQgyFy6EwH3_u_KXPw8aTXTY7WSVytmbuJeFpq4U6LipxtSmBJe_jjRzms9qubnwm_fGoHMQlvQ1vzS2YLusR2V0",
|
|
26
|
-
"y": "Ab06MCcgoG7dM2I-VppdLV1k3lDoeHMvyYqHVfP05Ep2O7Zu0Qwd6IVzfZi9K0KMDud22wdnGUpUtFukZo0EeO15",
|
|
27
|
-
},
|
|
28
|
-
"type": "JsonWebKey2020",
|
|
29
|
-
},
|
|
30
|
-
],
|
|
31
|
-
}
|
|
32
|
-
`;
|
|
33
|
-
|
|
34
|
-
exports[`Secp521r1 mapper > successfully resolves the document from did 2`] = `
|
|
35
|
-
{
|
|
36
|
-
"assertionMethod": [
|
|
37
|
-
"did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
|
|
38
|
-
],
|
|
39
|
-
"authentication": [
|
|
40
|
-
"did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
|
|
41
|
-
],
|
|
42
|
-
"capabilityDelegation": [
|
|
43
|
-
"did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
|
|
44
|
-
],
|
|
45
|
-
"capabilityInvocation": [
|
|
46
|
-
"did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
|
|
47
|
-
],
|
|
48
|
-
"id": "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
|
|
49
|
-
"verificationMethod": [
|
|
50
|
-
{
|
|
51
|
-
"controller": "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
|
|
52
|
-
"id": "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
|
|
53
|
-
"publicKeyJwk": {
|
|
54
|
-
"crv": "P-521",
|
|
55
|
-
"kty": "EC",
|
|
56
|
-
"x": "ASUHPMyichQ0QbHZ9ofNx_l4y7luncn5feKLo3OpJ2nSbZoC7mffolj5uy7s6KSKXFmnNWxGJ42IOrjZ47qqwqyS",
|
|
57
|
-
"y": "AW9ziIC4ZQQVSNmLlp59yYKrjRY0_VqO-GOIYQ9tYpPraBKUloEId6cI_vynCzlZWZtWpgOM3HPhYEgawQ703RjC",
|
|
58
|
-
},
|
|
59
|
-
"type": "JsonWebKey2020",
|
|
60
|
-
},
|
|
61
|
-
],
|
|
62
|
-
}
|
|
63
|
-
`;
|
|
64
|
-
|
|
65
|
-
exports[`Secp521r1 mapper > successfully resolves the document from did 3`] = `
|
|
66
|
-
{
|
|
67
|
-
"assertionMethod": [
|
|
68
|
-
"did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
|
|
69
|
-
],
|
|
70
|
-
"authentication": [
|
|
71
|
-
"did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
|
|
72
|
-
],
|
|
73
|
-
"capabilityDelegation": [
|
|
74
|
-
"did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
|
|
75
|
-
],
|
|
76
|
-
"capabilityInvocation": [
|
|
77
|
-
"did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
|
|
78
|
-
],
|
|
79
|
-
"id": "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
|
|
80
|
-
"verificationMethod": [
|
|
81
|
-
{
|
|
82
|
-
"controller": "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
|
|
83
|
-
"id": "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
|
|
84
|
-
"publicKeyJwk": {
|
|
85
|
-
"crv": "P-521",
|
|
86
|
-
"kty": "EC",
|
|
87
|
-
"x": "J0LoEVR-DONWXQbGIietbBoWZUtxQU3YCeBIJRBtoNQpVWfZ5Xjxpry-x3TF2HGMhPVJdbtU1bOOXajTLQAlLBA",
|
|
88
|
-
"y": "AUekQSvoIkQ9utmhBYe-xlJhSDJwH9BXB9befk2SKz2hrMpvz7JdHe98bZjF1dcBtJjesmn8BcbyMSCV3VYCsSXE",
|
|
89
|
-
},
|
|
90
|
-
"type": "JsonWebKey2020",
|
|
91
|
-
},
|
|
92
|
-
],
|
|
93
|
-
}
|
|
94
|
-
`;
|
|
95
|
-
|
|
96
|
-
exports[`Secp521r1 mapper > successfully resolves the document from did 4`] = `
|
|
97
|
-
{
|
|
98
|
-
"assertionMethod": [
|
|
99
|
-
"did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
|
|
100
|
-
],
|
|
101
|
-
"authentication": [
|
|
102
|
-
"did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
|
|
103
|
-
],
|
|
104
|
-
"capabilityDelegation": [
|
|
105
|
-
"did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
|
|
106
|
-
],
|
|
107
|
-
"capabilityInvocation": [
|
|
108
|
-
"did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
|
|
109
|
-
],
|
|
110
|
-
"id": "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
|
|
111
|
-
"verificationMethod": [
|
|
112
|
-
{
|
|
113
|
-
"controller": "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
|
|
114
|
-
"id": "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
|
|
115
|
-
"publicKeyJwk": {
|
|
116
|
-
"crv": "P-521",
|
|
117
|
-
"kty": "EC",
|
|
118
|
-
"x": "lAMfJtiinea2OZt3D9asExhRdC2pVvlIOYv8GlgDCXPKTrRa9Af6ln3HsFDRk5hSqQzdKTwQM6tVnMvTL_1R0tQ",
|
|
119
|
-
"y": "AXE4bU-iKe8p2hf9wxUVwMV80Mgohap-kw8JdZ1VVL90YgtgKnUCceTAJDMy0KOKOMEssRI-Q_q3A5F4_zkcOtjV",
|
|
120
|
-
},
|
|
121
|
-
"type": "JsonWebKey2020",
|
|
122
|
-
},
|
|
123
|
-
],
|
|
124
|
-
}
|
|
125
|
-
`;
|
|
126
|
-
|
|
127
|
-
exports[`Secp521r1 mapper > successfully resolves the document from did 5`] = `
|
|
128
|
-
{
|
|
129
|
-
"assertionMethod": [
|
|
130
|
-
"did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
|
|
131
|
-
],
|
|
132
|
-
"authentication": [
|
|
133
|
-
"did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
|
|
134
|
-
],
|
|
135
|
-
"capabilityDelegation": [
|
|
136
|
-
"did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
|
|
137
|
-
],
|
|
138
|
-
"capabilityInvocation": [
|
|
139
|
-
"did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
|
|
140
|
-
],
|
|
141
|
-
"id": "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
|
|
142
|
-
"verificationMethod": [
|
|
143
|
-
{
|
|
144
|
-
"controller": "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
|
|
145
|
-
"id": "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
|
|
146
|
-
"publicKeyJwk": {
|
|
147
|
-
"crv": "P-521",
|
|
148
|
-
"kty": "EC",
|
|
149
|
-
"x": "Ac3d57-5NBNeQ6ZUkSiTwPsP-h2K5GrPLvCkEQD2kmVgZ6BzaHYyDsVBptzB5yS-lb2DahZmNnTeApVum959s5Eo",
|
|
150
|
-
"y": "EgGJ0pcidrh5h-V3bgS1zR6NJ-eaoiKkfPwlJVcMCRI5z5ayOSrueM5oMAisimLAD7r_zzDMbtBp8rNG8yMmd2A",
|
|
151
|
-
},
|
|
152
|
-
"type": "JsonWebKey2020",
|
|
153
|
-
},
|
|
154
|
-
],
|
|
155
|
-
}
|
|
156
|
-
`;
|
|
157
|
-
|
|
158
|
-
exports[`Secp521r1 mapper > successfully resolves the document from did 6`] = `
|
|
159
|
-
{
|
|
160
|
-
"assertionMethod": [
|
|
161
|
-
"did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
|
|
162
|
-
],
|
|
163
|
-
"authentication": [
|
|
164
|
-
"did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
|
|
165
|
-
],
|
|
166
|
-
"capabilityDelegation": [
|
|
167
|
-
"did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
|
|
168
|
-
],
|
|
169
|
-
"capabilityInvocation": [
|
|
170
|
-
"did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
|
|
171
|
-
],
|
|
172
|
-
"id": "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
|
|
173
|
-
"verificationMethod": [
|
|
174
|
-
{
|
|
175
|
-
"controller": "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
|
|
176
|
-
"id": "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
|
|
177
|
-
"publicKeyJwk": {
|
|
178
|
-
"crv": "P-521",
|
|
179
|
-
"kty": "EC",
|
|
180
|
-
"x": "RIvbfcfZLNaNNZZj87hk-mEhA6rEwob5Pj363BLlrexzEGmIqQbyFX9svSFF7H40vfAbpNGjLxx2tmeNG6pOBYE",
|
|
181
|
-
"y": "711FNq0Y9fk-DvGKy0tYf7Cxd8wF18xKunAK-jmA8REzXkRmFYrMBQu91FkBqAYhH2iPkQjSDllveUnKtMiprWY",
|
|
182
|
-
},
|
|
183
|
-
"type": "JsonWebKey2020",
|
|
184
|
-
},
|
|
185
|
-
],
|
|
186
|
-
}
|
|
187
|
-
`;
|
|
188
|
-
|
|
189
|
-
exports[`Secp521r1 mapper > successfully resolves the document from did 7`] = `
|
|
190
|
-
{
|
|
191
|
-
"assertionMethod": [
|
|
192
|
-
"did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
|
|
193
|
-
],
|
|
194
|
-
"authentication": [
|
|
195
|
-
"did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
|
|
196
|
-
],
|
|
197
|
-
"capabilityDelegation": [
|
|
198
|
-
"did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
|
|
199
|
-
],
|
|
200
|
-
"capabilityInvocation": [
|
|
201
|
-
"did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
|
|
202
|
-
],
|
|
203
|
-
"id": "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
|
|
204
|
-
"verificationMethod": [
|
|
205
|
-
{
|
|
206
|
-
"controller": "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
|
|
207
|
-
"id": "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
|
|
208
|
-
"publicKeyJwk": {
|
|
209
|
-
"crv": "P-521",
|
|
210
|
-
"kty": "EC",
|
|
211
|
-
"x": "efE2eR719GHSoSzmtzVlBmaFD6wTYVg4r661VhHrxlqsatRDJr4628mgVowOitFEQMbz_osNgBn9tiIHW1YfYW4",
|
|
212
|
-
"y": "AcXkiFup65KvqBXF2r52zMTS-yjyOrQYFIDIPp870eRQEfo7tiID4EbosLY62BKmR74lG5pjnvTbA258IIUA3zO-",
|
|
213
|
-
},
|
|
214
|
-
"type": "JsonWebKey2020",
|
|
215
|
-
},
|
|
216
|
-
],
|
|
217
|
-
}
|
|
218
|
-
`;
|
|
219
|
-
|
|
220
|
-
exports[`Secp521r1 mapper > successfully resolves the document from did 8`] = `
|
|
221
|
-
{
|
|
222
|
-
"assertionMethod": [
|
|
223
|
-
"did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
|
|
224
|
-
],
|
|
225
|
-
"authentication": [
|
|
226
|
-
"did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
|
|
227
|
-
],
|
|
228
|
-
"capabilityDelegation": [
|
|
229
|
-
"did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
|
|
230
|
-
],
|
|
231
|
-
"capabilityInvocation": [
|
|
232
|
-
"did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
|
|
233
|
-
],
|
|
234
|
-
"id": "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
|
|
235
|
-
"verificationMethod": [
|
|
236
|
-
{
|
|
237
|
-
"controller": "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
|
|
238
|
-
"id": "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
|
|
239
|
-
"publicKeyJwk": {
|
|
240
|
-
"crv": "P-521",
|
|
241
|
-
"kty": "EC",
|
|
242
|
-
"x": "AQhYV0yHhVL9n7sjCIxMjeQjQiy2F4lv3Qd7diAVP4xJW3kl1Na4aKIeEzYP3Un6ThoCxC-KFhHePvjM5QNk9mp7",
|
|
243
|
-
"y": "Aewp6gi7EiTP1tVqLCefC6gQ7BTxsY2t0D_qMXJPUoXqlihkyBMKA9CRFAXq16sfXhWFMckcnk-MLRjNC6XB4Pmj",
|
|
244
|
-
},
|
|
245
|
-
"type": "JsonWebKey2020",
|
|
246
|
-
},
|
|
247
|
-
],
|
|
248
|
-
}
|
|
249
|
-
`;
|
|
250
|
-
|
|
251
|
-
exports[`Secp521r1 mapper > successfully resolves the document from did 9`] = `
|
|
252
|
-
{
|
|
253
|
-
"assertionMethod": [
|
|
254
|
-
"did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
|
|
255
|
-
],
|
|
256
|
-
"authentication": [
|
|
257
|
-
"did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
|
|
258
|
-
],
|
|
259
|
-
"capabilityDelegation": [
|
|
260
|
-
"did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
|
|
261
|
-
],
|
|
262
|
-
"capabilityInvocation": [
|
|
263
|
-
"did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
|
|
264
|
-
],
|
|
265
|
-
"id": "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
|
|
266
|
-
"verificationMethod": [
|
|
267
|
-
{
|
|
268
|
-
"controller": "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
|
|
269
|
-
"id": "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
|
|
270
|
-
"publicKeyJwk": {
|
|
271
|
-
"crv": "P-521",
|
|
272
|
-
"kty": "EC",
|
|
273
|
-
"x": "mI3pqrt5mbpgyopw74-q4WX6M2FkUPgroJHo3l9eG6pVXesQm4K51-M2yoxjt_ap6MtsaP78F-gzcn_lh5t_q5I",
|
|
274
|
-
"y": "AQpsaMuiW3OjliI8bINPPmtK95KBXr7wOaPsFTh-J7pm-sMV83VrVJWCqGXaMbQNUIv3my2n34gk057_ZwFlkRSD",
|
|
275
|
-
},
|
|
276
|
-
"type": "JsonWebKey2020",
|
|
277
|
-
},
|
|
278
|
-
],
|
|
279
|
-
}
|
|
280
|
-
`;
|
|
1
|
+
// Jest Snapshot v1, https://goo.gl/fbAQLP
|
|
281
2
|
|
|
282
3
|
exports[`Secp521r1 mapper successfully resolves the document from did 1`] = `
|
|
283
4
|
{
|
|
@@ -1,7 +1,6 @@
|
|
|
1
1
|
import { Resolver } from 'did-resolver'
|
|
2
|
-
import * as fs from 'fs'
|
|
3
|
-
import { describe, expect, it } from 'vitest'
|
|
4
2
|
import { DID_JSON, DID_LD_JSON, getResolver } from '../index'
|
|
3
|
+
import * as fs from 'fs'
|
|
5
4
|
|
|
6
5
|
const ed25519Fixtures = JSON.parse(fs.readFileSync(`${__dirname}/fixtures/ed25519-x25519.json`, { encoding: 'utf-8' }))
|
|
7
6
|
|
|
@@ -1,11 +1,11 @@
|
|
|
1
1
|
// @ts-nocheck
|
|
2
|
-
import { base58btc } from 'multiformats/bases/base58'
|
|
3
|
-
import * as u8a from 'uint8arrays'
|
|
4
|
-
import * as varint from 'varint'
|
|
5
2
|
// Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
|
|
6
|
-
|
|
3
|
+
|
|
4
|
+
import * as varint from 'varint'
|
|
7
5
|
// import { base58btc } from 'multiformats/bases/base58'
|
|
8
6
|
import * as mapper from '../drivers/secp256r1'
|
|
7
|
+
import * as u8a from 'uint8arrays'
|
|
8
|
+
import { base58btc } from 'multiformats/bases/base58'
|
|
9
9
|
|
|
10
10
|
describe('Secp256r1 mapper', () => {
|
|
11
11
|
it('successfully resolves the document from did:key from raw public key', async () => {
|
|
@@ -1,11 +1,11 @@
|
|
|
1
1
|
// Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
|
|
2
2
|
|
|
3
|
-
import { base58btc } from 'multiformats/bases/base58'
|
|
4
|
-
import * as u8a from 'uint8arrays'
|
|
5
3
|
import * as varint from 'varint'
|
|
6
|
-
import { describe, expect, it, test } from 'vitest'
|
|
7
4
|
// import { base58btc } from 'multiformats/bases/base58'
|
|
8
5
|
import * as mapper from '../drivers/secp384r1'
|
|
6
|
+
import * as u8a from 'uint8arrays'
|
|
7
|
+
|
|
8
|
+
import { base58btc } from 'multiformats/bases/base58'
|
|
9
9
|
|
|
10
10
|
describe('Secp384r1 mapper', () => {
|
|
11
11
|
it('Secp384r1 mapper successfully resolves the document from did:key from raw public key', async () => {
|
|
@@ -1,10 +1,9 @@
|
|
|
1
1
|
// Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
|
|
2
2
|
|
|
3
|
-
import { base58btc } from 'multiformats/bases/base58'
|
|
4
|
-
import * as u8a from 'uint8arrays'
|
|
5
3
|
import * as varint from 'varint'
|
|
6
|
-
import { describe, expect, it, test } from 'vitest'
|
|
7
4
|
import * as mapper from '../drivers/secp521r1'
|
|
5
|
+
import * as u8a from 'uint8arrays'
|
|
6
|
+
import { base58btc } from 'multiformats/bases/base58'
|
|
8
7
|
|
|
9
8
|
describe('Secp521r1 mapper', () => {
|
|
10
9
|
/* const mf = await import('multiformats/bases/base58')
|
|
@@ -1,6 +1,5 @@
|
|
|
1
1
|
import { DIDDocument } from 'did-resolver'
|
|
2
|
-
|
|
3
|
-
import { toString } from 'uint8arrays/to-string'
|
|
2
|
+
import * as u8a from 'uint8arrays'
|
|
4
3
|
import { KeyToDidDocArgs } from '../index'
|
|
5
4
|
|
|
6
5
|
export const keyToDidDoc = ({ pubKeyBytes, fingerprint }: KeyToDidDocArgs): DIDDocument => {
|
|
@@ -13,7 +12,7 @@ export const keyToDidDoc = ({ pubKeyBytes, fingerprint }: KeyToDidDocArgs): DIDD
|
|
|
13
12
|
id: keyId,
|
|
14
13
|
type: 'Bls12381G2Key2020',
|
|
15
14
|
controller: did,
|
|
16
|
-
publicKeyBase58: toString(pubKeyBytes, 'base58btc'),
|
|
15
|
+
publicKeyBase58: u8a.toString(pubKeyBytes, 'base58btc'),
|
|
17
16
|
},
|
|
18
17
|
],
|
|
19
18
|
authentication: [keyId],
|
package/src/drivers/ed25519.ts
CHANGED
|
@@ -1,6 +1,4 @@
|
|
|
1
|
-
|
|
2
|
-
// @ts-ignore
|
|
3
|
-
import { toString } from 'uint8arrays/to-string'
|
|
1
|
+
import * as u8a from 'uint8arrays'
|
|
4
2
|
import { DIDDocument } from 'did-resolver'
|
|
5
3
|
// import { edwardsToMontgomery } from '@noble/curves/ed25519'
|
|
6
4
|
import { convertPublicKeyToX25519 } from '@stablelib/ed25519'
|
|
@@ -13,7 +11,7 @@ function encodeKey(key: Uint8Array, encodeKey?: number) {
|
|
|
13
11
|
// See js-multicodec for a general implementation
|
|
14
12
|
bytes[1] = 0x01
|
|
15
13
|
bytes.set(key, 2)
|
|
16
|
-
return `z${toString(bytes, 'base58btc')}`
|
|
14
|
+
return `z${u8a.toString(bytes, 'base58btc')}`
|
|
17
15
|
}
|
|
18
16
|
|
|
19
17
|
export const keyToDidDoc = (args: KeyToDidDocArgs) => {
|
|
@@ -38,7 +36,7 @@ const keyToDidDoc2018_2019 = ({ pubKeyBytes, fingerprint, contentType }: KeyToDi
|
|
|
38
36
|
const keyId = `${did}#${fingerprint}`
|
|
39
37
|
|
|
40
38
|
//todo: Move to noble lib. x25519 values differ between below methods. Current implementation is correct according to DID:key spec
|
|
41
|
-
// const pubKeyHex = toString(pubKeyBytes, 'base16')
|
|
39
|
+
// const pubKeyHex = u8a.toString(pubKeyBytes, 'base16')
|
|
42
40
|
// const x25519PubBytes = edwardsToMontgomery(pubKeyHex)
|
|
43
41
|
const x25519PubBytes = convertPublicKeyToX25519(pubKeyBytes)
|
|
44
42
|
|
|
@@ -57,13 +55,13 @@ const keyToDidDoc2018_2019 = ({ pubKeyBytes, fingerprint, contentType }: KeyToDi
|
|
|
57
55
|
id: keyId,
|
|
58
56
|
type: 'Ed25519VerificationKey2018',
|
|
59
57
|
controller: did,
|
|
60
|
-
publicKeyBase58: toString(pubKeyBytes, 'base58btc'),
|
|
58
|
+
publicKeyBase58: u8a.toString(pubKeyBytes, 'base58btc'),
|
|
61
59
|
},
|
|
62
60
|
{
|
|
63
61
|
id: x25519KeyId,
|
|
64
62
|
type: 'X25519KeyAgreementKey2019',
|
|
65
63
|
controller: did,
|
|
66
|
-
publicKeyBase58: toString(x25519PubBytes, 'base58btc'),
|
|
64
|
+
publicKeyBase58: u8a.toString(x25519PubBytes, 'base58btc'),
|
|
67
65
|
},
|
|
68
66
|
],
|
|
69
67
|
authentication: [keyId],
|
package/src/drivers/secp256k1.ts
CHANGED
|
@@ -1,5 +1,4 @@
|
|
|
1
|
-
|
|
2
|
-
import { toString } from 'uint8arrays/to-string'
|
|
1
|
+
import * as u8a from 'uint8arrays'
|
|
3
2
|
import { DIDDocument } from 'did-resolver'
|
|
4
3
|
import { KeyToDidDocArgs } from '../types'
|
|
5
4
|
|
|
@@ -13,7 +12,7 @@ export const keyToDidDoc = ({ pubKeyBytes, fingerprint }: KeyToDidDocArgs): DIDD
|
|
|
13
12
|
id: keyId,
|
|
14
13
|
type: 'Secp256k1VerificationKey2018',
|
|
15
14
|
controller: did,
|
|
16
|
-
publicKeyBase58: toString(pubKeyBytes, 'base58btc'),
|
|
15
|
+
publicKeyBase58: u8a.toString(pubKeyBytes, 'base58btc'),
|
|
17
16
|
},
|
|
18
17
|
],
|
|
19
18
|
authentication: [keyId],
|
package/src/drivers/secp256r1.ts
CHANGED
|
@@ -1,10 +1,10 @@
|
|
|
1
1
|
// Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
|
|
2
2
|
|
|
3
|
+
import * as u8a from 'uint8arrays'
|
|
4
|
+
|
|
3
5
|
import * as nist_weierstrauss from 'nist-weierstrauss'
|
|
4
|
-
import {base64urlPoint} from 'nist-weierstrauss'
|
|
5
|
-
|
|
6
|
-
import {fromString} from 'uint8arrays/from-string'
|
|
7
|
-
import {KeyToDidDocArgs} from '../types'
|
|
6
|
+
import { base64urlPoint } from 'nist-weierstrauss'
|
|
7
|
+
import { KeyToDidDocArgs } from '../types'
|
|
8
8
|
|
|
9
9
|
/**
|
|
10
10
|
* Constructs the document based on the method key
|
|
@@ -70,7 +70,7 @@ export function pubKeyBytesToXY(pubKeyBytes: Uint8Array): base64urlPoint {
|
|
|
70
70
|
// compressed p-256 key, SEC format
|
|
71
71
|
if (bytesCount == 33) {
|
|
72
72
|
if (publicKeyHex.slice(0, 2) == '03' || publicKeyHex.slice(0, 2) == '02') {
|
|
73
|
-
const publicKey = fromString(publicKeyHex, 'base16')
|
|
73
|
+
const publicKey = u8a.fromString(publicKeyHex, 'base16')
|
|
74
74
|
const point = nist_weierstrauss.secp256r1.ECPointDecompress(publicKey)
|
|
75
75
|
return nist_weierstrauss.nist_weierstrauss_common.publicKeyIntToXY(point)
|
|
76
76
|
}
|
package/src/drivers/secp384r1.ts
CHANGED
|
@@ -1,7 +1,6 @@
|
|
|
1
1
|
// Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
|
|
2
2
|
|
|
3
|
-
|
|
4
|
-
import { fromString } from 'uint8arrays/from-string'
|
|
3
|
+
import * as u8a from 'uint8arrays'
|
|
5
4
|
|
|
6
5
|
import * as nist_weierstrauss from 'nist-weierstrauss'
|
|
7
6
|
import { base64urlPoint } from 'nist-weierstrauss'
|
|
@@ -71,7 +70,7 @@ export function pubKeyBytesToXY(pubKeyBytes: Uint8Array): base64urlPoint {
|
|
|
71
70
|
// compressed p-384 key, SEC format
|
|
72
71
|
if (bytesCount == 49) {
|
|
73
72
|
if (publicKeyHex.slice(0, 2) == '03' || publicKeyHex.slice(0, 2) == '02') {
|
|
74
|
-
const publicKey = fromString(publicKeyHex, 'base16')
|
|
73
|
+
const publicKey = u8a.fromString(publicKeyHex, 'base16')
|
|
75
74
|
const point = nist_weierstrauss.secp384r1.ECPointDecompress(publicKey)
|
|
76
75
|
return nist_weierstrauss.nist_weierstrauss_common.publicKeyIntToXY(point)
|
|
77
76
|
}
|
package/src/drivers/secp521r1.ts
CHANGED
|
@@ -1,7 +1,6 @@
|
|
|
1
1
|
// Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
|
|
2
2
|
|
|
3
|
-
|
|
4
|
-
import { fromString } from 'uint8arrays/from-string'
|
|
3
|
+
import * as u8a from 'uint8arrays'
|
|
5
4
|
|
|
6
5
|
import * as nist_weierstrauss from 'nist-weierstrauss'
|
|
7
6
|
import { base64urlPoint } from 'nist-weierstrauss'
|
|
@@ -57,7 +56,7 @@ export function pubKeyBytesToXY(pubKeyBytes: Uint8Array): base64urlPoint {
|
|
|
57
56
|
// publicKeyHex.length / 2.0 = 67.0 bytes
|
|
58
57
|
if (132 <= publicKeyHex.length && publicKeyHex.length <= 134) {
|
|
59
58
|
if (publicKeyHex.slice(0, 2) == '03' || publicKeyHex.slice(0, 2) == '02') {
|
|
60
|
-
const publicKey = fromString(publicKeyHex, 'base16')
|
|
59
|
+
const publicKey = u8a.fromString(publicKeyHex, 'base16')
|
|
61
60
|
const point = nist_weierstrauss.secp521r1.ECPointDecompress(publicKey)
|
|
62
61
|
return nist_weierstrauss.nist_weierstrauss_common.publicKeyIntToXY(point)
|
|
63
62
|
}
|