@sphereon/ssi-sdk-ext.did-resolver-key 0.28.1-feature.esm.cjs.8 → 0.28.1-feature.oyd.cmsm.improv.16

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (54) hide show
  1. package/dist/drivers/bls12381g2.d.ts +8 -0
  2. package/dist/drivers/bls12381g2.d.ts.map +1 -0
  3. package/dist/drivers/bls12381g2.js +49 -0
  4. package/dist/drivers/bls12381g2.js.map +1 -0
  5. package/dist/drivers/ed25519.d.ts +8 -0
  6. package/dist/drivers/ed25519.d.ts.map +1 -0
  7. package/dist/drivers/ed25519.js +118 -0
  8. package/dist/drivers/ed25519.js.map +1 -0
  9. package/dist/drivers/jwk.jcs.d.ts +8 -0
  10. package/dist/drivers/jwk.jcs.d.ts.map +1 -0
  11. package/dist/drivers/jwk.jcs.js +23 -0
  12. package/dist/drivers/jwk.jcs.js.map +1 -0
  13. package/dist/drivers/secp256k1.d.ts +8 -0
  14. package/dist/drivers/secp256k1.d.ts.map +1 -0
  15. package/dist/drivers/secp256k1.js +49 -0
  16. package/dist/drivers/secp256k1.js.map +1 -0
  17. package/dist/drivers/secp256r1.d.ts +24 -0
  18. package/dist/drivers/secp256r1.d.ts.map +1 -0
  19. package/dist/drivers/secp256r1.js +99 -0
  20. package/dist/drivers/secp256r1.js.map +1 -0
  21. package/dist/drivers/secp384r1.d.ts +24 -0
  22. package/dist/drivers/secp384r1.d.ts.map +1 -0
  23. package/dist/drivers/secp384r1.js +99 -0
  24. package/dist/drivers/secp384r1.js.map +1 -0
  25. package/dist/drivers/secp521r1.d.ts +23 -0
  26. package/dist/drivers/secp521r1.d.ts.map +1 -0
  27. package/dist/drivers/secp521r1.js +87 -0
  28. package/dist/drivers/secp521r1.js.map +1 -0
  29. package/dist/index.d.ts +5 -18
  30. package/dist/index.d.ts.map +1 -0
  31. package/dist/index.js +87 -484
  32. package/dist/index.js.map +1 -1
  33. package/dist/types.d.ts +14 -0
  34. package/dist/types.d.ts.map +1 -0
  35. package/dist/types.js +6 -0
  36. package/dist/types.js.map +1 -0
  37. package/package.json +10 -22
  38. package/src/__tests__/__snapshots__/secp256r1.test.ts.snap +1 -249
  39. package/src/__tests__/__snapshots__/secp384r1.test.ts.snap +1 -249
  40. package/src/__tests__/__snapshots__/secp521r1.test.ts.snap +1 -280
  41. package/src/__tests__/key_resolver.test.ts +1 -2
  42. package/src/__tests__/secp256r1.test.ts +4 -4
  43. package/src/__tests__/secp384r1.test.ts +3 -3
  44. package/src/__tests__/secp521r1.test.ts +2 -3
  45. package/src/drivers/bls12381g2.ts +2 -3
  46. package/src/drivers/ed25519.ts +5 -7
  47. package/src/drivers/secp256k1.ts +2 -3
  48. package/src/drivers/secp256r1.ts +5 -5
  49. package/src/drivers/secp384r1.ts +2 -3
  50. package/src/drivers/secp521r1.ts +2 -3
  51. package/src/index.ts +0 -1
  52. package/dist/index.cjs +0 -520
  53. package/dist/index.cjs.map +0 -1
  54. package/dist/index.d.cts +0 -21
@@ -1,283 +1,4 @@
1
- // Vitest Snapshot v1, https://vitest.dev/guide/snapshot.html
2
-
3
- exports[`Secp521r1 mapper > successfully resolves the document from did 1`] = `
4
- {
5
- "assertionMethod": [
6
- "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
7
- ],
8
- "authentication": [
9
- "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
10
- ],
11
- "capabilityDelegation": [
12
- "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
13
- ],
14
- "capabilityInvocation": [
15
- "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
16
- ],
17
- "id": "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
18
- "verificationMethod": [
19
- {
20
- "controller": "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
21
- "id": "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
22
- "publicKeyJwk": {
23
- "crv": "P-521",
24
- "kty": "EC",
25
- "x": "AQgyFy6EwH3_u_KXPw8aTXTY7WSVytmbuJeFpq4U6LipxtSmBJe_jjRzms9qubnwm_fGoHMQlvQ1vzS2YLusR2V0",
26
- "y": "Ab06MCcgoG7dM2I-VppdLV1k3lDoeHMvyYqHVfP05Ep2O7Zu0Qwd6IVzfZi9K0KMDud22wdnGUpUtFukZo0EeO15",
27
- },
28
- "type": "JsonWebKey2020",
29
- },
30
- ],
31
- }
32
- `;
33
-
34
- exports[`Secp521r1 mapper > successfully resolves the document from did 2`] = `
35
- {
36
- "assertionMethod": [
37
- "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
38
- ],
39
- "authentication": [
40
- "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
41
- ],
42
- "capabilityDelegation": [
43
- "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
44
- ],
45
- "capabilityInvocation": [
46
- "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
47
- ],
48
- "id": "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
49
- "verificationMethod": [
50
- {
51
- "controller": "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
52
- "id": "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
53
- "publicKeyJwk": {
54
- "crv": "P-521",
55
- "kty": "EC",
56
- "x": "ASUHPMyichQ0QbHZ9ofNx_l4y7luncn5feKLo3OpJ2nSbZoC7mffolj5uy7s6KSKXFmnNWxGJ42IOrjZ47qqwqyS",
57
- "y": "AW9ziIC4ZQQVSNmLlp59yYKrjRY0_VqO-GOIYQ9tYpPraBKUloEId6cI_vynCzlZWZtWpgOM3HPhYEgawQ703RjC",
58
- },
59
- "type": "JsonWebKey2020",
60
- },
61
- ],
62
- }
63
- `;
64
-
65
- exports[`Secp521r1 mapper > successfully resolves the document from did 3`] = `
66
- {
67
- "assertionMethod": [
68
- "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
69
- ],
70
- "authentication": [
71
- "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
72
- ],
73
- "capabilityDelegation": [
74
- "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
75
- ],
76
- "capabilityInvocation": [
77
- "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
78
- ],
79
- "id": "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
80
- "verificationMethod": [
81
- {
82
- "controller": "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
83
- "id": "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
84
- "publicKeyJwk": {
85
- "crv": "P-521",
86
- "kty": "EC",
87
- "x": "J0LoEVR-DONWXQbGIietbBoWZUtxQU3YCeBIJRBtoNQpVWfZ5Xjxpry-x3TF2HGMhPVJdbtU1bOOXajTLQAlLBA",
88
- "y": "AUekQSvoIkQ9utmhBYe-xlJhSDJwH9BXB9befk2SKz2hrMpvz7JdHe98bZjF1dcBtJjesmn8BcbyMSCV3VYCsSXE",
89
- },
90
- "type": "JsonWebKey2020",
91
- },
92
- ],
93
- }
94
- `;
95
-
96
- exports[`Secp521r1 mapper > successfully resolves the document from did 4`] = `
97
- {
98
- "assertionMethod": [
99
- "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
100
- ],
101
- "authentication": [
102
- "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
103
- ],
104
- "capabilityDelegation": [
105
- "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
106
- ],
107
- "capabilityInvocation": [
108
- "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
109
- ],
110
- "id": "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
111
- "verificationMethod": [
112
- {
113
- "controller": "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
114
- "id": "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
115
- "publicKeyJwk": {
116
- "crv": "P-521",
117
- "kty": "EC",
118
- "x": "lAMfJtiinea2OZt3D9asExhRdC2pVvlIOYv8GlgDCXPKTrRa9Af6ln3HsFDRk5hSqQzdKTwQM6tVnMvTL_1R0tQ",
119
- "y": "AXE4bU-iKe8p2hf9wxUVwMV80Mgohap-kw8JdZ1VVL90YgtgKnUCceTAJDMy0KOKOMEssRI-Q_q3A5F4_zkcOtjV",
120
- },
121
- "type": "JsonWebKey2020",
122
- },
123
- ],
124
- }
125
- `;
126
-
127
- exports[`Secp521r1 mapper > successfully resolves the document from did 5`] = `
128
- {
129
- "assertionMethod": [
130
- "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
131
- ],
132
- "authentication": [
133
- "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
134
- ],
135
- "capabilityDelegation": [
136
- "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
137
- ],
138
- "capabilityInvocation": [
139
- "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
140
- ],
141
- "id": "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
142
- "verificationMethod": [
143
- {
144
- "controller": "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
145
- "id": "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
146
- "publicKeyJwk": {
147
- "crv": "P-521",
148
- "kty": "EC",
149
- "x": "Ac3d57-5NBNeQ6ZUkSiTwPsP-h2K5GrPLvCkEQD2kmVgZ6BzaHYyDsVBptzB5yS-lb2DahZmNnTeApVum959s5Eo",
150
- "y": "EgGJ0pcidrh5h-V3bgS1zR6NJ-eaoiKkfPwlJVcMCRI5z5ayOSrueM5oMAisimLAD7r_zzDMbtBp8rNG8yMmd2A",
151
- },
152
- "type": "JsonWebKey2020",
153
- },
154
- ],
155
- }
156
- `;
157
-
158
- exports[`Secp521r1 mapper > successfully resolves the document from did 6`] = `
159
- {
160
- "assertionMethod": [
161
- "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
162
- ],
163
- "authentication": [
164
- "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
165
- ],
166
- "capabilityDelegation": [
167
- "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
168
- ],
169
- "capabilityInvocation": [
170
- "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
171
- ],
172
- "id": "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
173
- "verificationMethod": [
174
- {
175
- "controller": "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
176
- "id": "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
177
- "publicKeyJwk": {
178
- "crv": "P-521",
179
- "kty": "EC",
180
- "x": "RIvbfcfZLNaNNZZj87hk-mEhA6rEwob5Pj363BLlrexzEGmIqQbyFX9svSFF7H40vfAbpNGjLxx2tmeNG6pOBYE",
181
- "y": "711FNq0Y9fk-DvGKy0tYf7Cxd8wF18xKunAK-jmA8REzXkRmFYrMBQu91FkBqAYhH2iPkQjSDllveUnKtMiprWY",
182
- },
183
- "type": "JsonWebKey2020",
184
- },
185
- ],
186
- }
187
- `;
188
-
189
- exports[`Secp521r1 mapper > successfully resolves the document from did 7`] = `
190
- {
191
- "assertionMethod": [
192
- "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
193
- ],
194
- "authentication": [
195
- "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
196
- ],
197
- "capabilityDelegation": [
198
- "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
199
- ],
200
- "capabilityInvocation": [
201
- "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
202
- ],
203
- "id": "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
204
- "verificationMethod": [
205
- {
206
- "controller": "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
207
- "id": "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
208
- "publicKeyJwk": {
209
- "crv": "P-521",
210
- "kty": "EC",
211
- "x": "efE2eR719GHSoSzmtzVlBmaFD6wTYVg4r661VhHrxlqsatRDJr4628mgVowOitFEQMbz_osNgBn9tiIHW1YfYW4",
212
- "y": "AcXkiFup65KvqBXF2r52zMTS-yjyOrQYFIDIPp870eRQEfo7tiID4EbosLY62BKmR74lG5pjnvTbA258IIUA3zO-",
213
- },
214
- "type": "JsonWebKey2020",
215
- },
216
- ],
217
- }
218
- `;
219
-
220
- exports[`Secp521r1 mapper > successfully resolves the document from did 8`] = `
221
- {
222
- "assertionMethod": [
223
- "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
224
- ],
225
- "authentication": [
226
- "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
227
- ],
228
- "capabilityDelegation": [
229
- "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
230
- ],
231
- "capabilityInvocation": [
232
- "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
233
- ],
234
- "id": "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
235
- "verificationMethod": [
236
- {
237
- "controller": "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
238
- "id": "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
239
- "publicKeyJwk": {
240
- "crv": "P-521",
241
- "kty": "EC",
242
- "x": "AQhYV0yHhVL9n7sjCIxMjeQjQiy2F4lv3Qd7diAVP4xJW3kl1Na4aKIeEzYP3Un6ThoCxC-KFhHePvjM5QNk9mp7",
243
- "y": "Aewp6gi7EiTP1tVqLCefC6gQ7BTxsY2t0D_qMXJPUoXqlihkyBMKA9CRFAXq16sfXhWFMckcnk-MLRjNC6XB4Pmj",
244
- },
245
- "type": "JsonWebKey2020",
246
- },
247
- ],
248
- }
249
- `;
250
-
251
- exports[`Secp521r1 mapper > successfully resolves the document from did 9`] = `
252
- {
253
- "assertionMethod": [
254
- "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
255
- ],
256
- "authentication": [
257
- "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
258
- ],
259
- "capabilityDelegation": [
260
- "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
261
- ],
262
- "capabilityInvocation": [
263
- "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
264
- ],
265
- "id": "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
266
- "verificationMethod": [
267
- {
268
- "controller": "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
269
- "id": "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
270
- "publicKeyJwk": {
271
- "crv": "P-521",
272
- "kty": "EC",
273
- "x": "mI3pqrt5mbpgyopw74-q4WX6M2FkUPgroJHo3l9eG6pVXesQm4K51-M2yoxjt_ap6MtsaP78F-gzcn_lh5t_q5I",
274
- "y": "AQpsaMuiW3OjliI8bINPPmtK95KBXr7wOaPsFTh-J7pm-sMV83VrVJWCqGXaMbQNUIv3my2n34gk057_ZwFlkRSD",
275
- },
276
- "type": "JsonWebKey2020",
277
- },
278
- ],
279
- }
280
- `;
1
+ // Jest Snapshot v1, https://goo.gl/fbAQLP
281
2
 
282
3
  exports[`Secp521r1 mapper successfully resolves the document from did 1`] = `
283
4
  {
@@ -1,7 +1,6 @@
1
1
  import { Resolver } from 'did-resolver'
2
- import * as fs from 'fs'
3
- import { describe, expect, it } from 'vitest'
4
2
  import { DID_JSON, DID_LD_JSON, getResolver } from '../index'
3
+ import * as fs from 'fs'
5
4
 
6
5
  const ed25519Fixtures = JSON.parse(fs.readFileSync(`${__dirname}/fixtures/ed25519-x25519.json`, { encoding: 'utf-8' }))
7
6
 
@@ -1,11 +1,11 @@
1
1
  // @ts-nocheck
2
- import { base58btc } from 'multiformats/bases/base58'
3
- import * as u8a from 'uint8arrays'
4
- import * as varint from 'varint'
5
2
  // Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
6
- import { describe, expect, it, test } from 'vitest'
3
+
4
+ import * as varint from 'varint'
7
5
  // import { base58btc } from 'multiformats/bases/base58'
8
6
  import * as mapper from '../drivers/secp256r1'
7
+ import * as u8a from 'uint8arrays'
8
+ import { base58btc } from 'multiformats/bases/base58'
9
9
 
10
10
  describe('Secp256r1 mapper', () => {
11
11
  it('successfully resolves the document from did:key from raw public key', async () => {
@@ -1,11 +1,11 @@
1
1
  // Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
2
2
 
3
- import { base58btc } from 'multiformats/bases/base58'
4
- import * as u8a from 'uint8arrays'
5
3
  import * as varint from 'varint'
6
- import { describe, expect, it, test } from 'vitest'
7
4
  // import { base58btc } from 'multiformats/bases/base58'
8
5
  import * as mapper from '../drivers/secp384r1'
6
+ import * as u8a from 'uint8arrays'
7
+
8
+ import { base58btc } from 'multiformats/bases/base58'
9
9
 
10
10
  describe('Secp384r1 mapper', () => {
11
11
  it('Secp384r1 mapper successfully resolves the document from did:key from raw public key', async () => {
@@ -1,10 +1,9 @@
1
1
  // Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
2
2
 
3
- import { base58btc } from 'multiformats/bases/base58'
4
- import * as u8a from 'uint8arrays'
5
3
  import * as varint from 'varint'
6
- import { describe, expect, it, test } from 'vitest'
7
4
  import * as mapper from '../drivers/secp521r1'
5
+ import * as u8a from 'uint8arrays'
6
+ import { base58btc } from 'multiformats/bases/base58'
8
7
 
9
8
  describe('Secp521r1 mapper', () => {
10
9
  /* const mf = await import('multiformats/bases/base58')
@@ -1,6 +1,5 @@
1
1
  import { DIDDocument } from 'did-resolver'
2
- // @ts-ignore
3
- import { toString } from 'uint8arrays/to-string'
2
+ import * as u8a from 'uint8arrays'
4
3
  import { KeyToDidDocArgs } from '../index'
5
4
 
6
5
  export const keyToDidDoc = ({ pubKeyBytes, fingerprint }: KeyToDidDocArgs): DIDDocument => {
@@ -13,7 +12,7 @@ export const keyToDidDoc = ({ pubKeyBytes, fingerprint }: KeyToDidDocArgs): DIDD
13
12
  id: keyId,
14
13
  type: 'Bls12381G2Key2020',
15
14
  controller: did,
16
- publicKeyBase58: toString(pubKeyBytes, 'base58btc'),
15
+ publicKeyBase58: u8a.toString(pubKeyBytes, 'base58btc'),
17
16
  },
18
17
  ],
19
18
  authentication: [keyId],
@@ -1,6 +1,4 @@
1
-
2
- // @ts-ignore
3
- import { toString } from 'uint8arrays/to-string'
1
+ import * as u8a from 'uint8arrays'
4
2
  import { DIDDocument } from 'did-resolver'
5
3
  // import { edwardsToMontgomery } from '@noble/curves/ed25519'
6
4
  import { convertPublicKeyToX25519 } from '@stablelib/ed25519'
@@ -13,7 +11,7 @@ function encodeKey(key: Uint8Array, encodeKey?: number) {
13
11
  // See js-multicodec for a general implementation
14
12
  bytes[1] = 0x01
15
13
  bytes.set(key, 2)
16
- return `z${toString(bytes, 'base58btc')}`
14
+ return `z${u8a.toString(bytes, 'base58btc')}`
17
15
  }
18
16
 
19
17
  export const keyToDidDoc = (args: KeyToDidDocArgs) => {
@@ -38,7 +36,7 @@ const keyToDidDoc2018_2019 = ({ pubKeyBytes, fingerprint, contentType }: KeyToDi
38
36
  const keyId = `${did}#${fingerprint}`
39
37
 
40
38
  //todo: Move to noble lib. x25519 values differ between below methods. Current implementation is correct according to DID:key spec
41
- // const pubKeyHex = toString(pubKeyBytes, 'base16')
39
+ // const pubKeyHex = u8a.toString(pubKeyBytes, 'base16')
42
40
  // const x25519PubBytes = edwardsToMontgomery(pubKeyHex)
43
41
  const x25519PubBytes = convertPublicKeyToX25519(pubKeyBytes)
44
42
 
@@ -57,13 +55,13 @@ const keyToDidDoc2018_2019 = ({ pubKeyBytes, fingerprint, contentType }: KeyToDi
57
55
  id: keyId,
58
56
  type: 'Ed25519VerificationKey2018',
59
57
  controller: did,
60
- publicKeyBase58: toString(pubKeyBytes, 'base58btc'),
58
+ publicKeyBase58: u8a.toString(pubKeyBytes, 'base58btc'),
61
59
  },
62
60
  {
63
61
  id: x25519KeyId,
64
62
  type: 'X25519KeyAgreementKey2019',
65
63
  controller: did,
66
- publicKeyBase58: toString(x25519PubBytes, 'base58btc'),
64
+ publicKeyBase58: u8a.toString(x25519PubBytes, 'base58btc'),
67
65
  },
68
66
  ],
69
67
  authentication: [keyId],
@@ -1,5 +1,4 @@
1
- // @ts-ignore
2
- import { toString } from 'uint8arrays/to-string'
1
+ import * as u8a from 'uint8arrays'
3
2
  import { DIDDocument } from 'did-resolver'
4
3
  import { KeyToDidDocArgs } from '../types'
5
4
 
@@ -13,7 +12,7 @@ export const keyToDidDoc = ({ pubKeyBytes, fingerprint }: KeyToDidDocArgs): DIDD
13
12
  id: keyId,
14
13
  type: 'Secp256k1VerificationKey2018',
15
14
  controller: did,
16
- publicKeyBase58: toString(pubKeyBytes, 'base58btc'),
15
+ publicKeyBase58: u8a.toString(pubKeyBytes, 'base58btc'),
17
16
  },
18
17
  ],
19
18
  authentication: [keyId],
@@ -1,10 +1,10 @@
1
1
  // Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
2
2
 
3
+ import * as u8a from 'uint8arrays'
4
+
3
5
  import * as nist_weierstrauss from 'nist-weierstrauss'
4
- import {base64urlPoint} from 'nist-weierstrauss'
5
- // @ts-ignore
6
- import {fromString} from 'uint8arrays/from-string'
7
- import {KeyToDidDocArgs} from '../types'
6
+ import { base64urlPoint } from 'nist-weierstrauss'
7
+ import { KeyToDidDocArgs } from '../types'
8
8
 
9
9
  /**
10
10
  * Constructs the document based on the method key
@@ -70,7 +70,7 @@ export function pubKeyBytesToXY(pubKeyBytes: Uint8Array): base64urlPoint {
70
70
  // compressed p-256 key, SEC format
71
71
  if (bytesCount == 33) {
72
72
  if (publicKeyHex.slice(0, 2) == '03' || publicKeyHex.slice(0, 2) == '02') {
73
- const publicKey = fromString(publicKeyHex, 'base16')
73
+ const publicKey = u8a.fromString(publicKeyHex, 'base16')
74
74
  const point = nist_weierstrauss.secp256r1.ECPointDecompress(publicKey)
75
75
  return nist_weierstrauss.nist_weierstrauss_common.publicKeyIntToXY(point)
76
76
  }
@@ -1,7 +1,6 @@
1
1
  // Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
2
2
 
3
- // @ts-ignore
4
- import { fromString } from 'uint8arrays/from-string'
3
+ import * as u8a from 'uint8arrays'
5
4
 
6
5
  import * as nist_weierstrauss from 'nist-weierstrauss'
7
6
  import { base64urlPoint } from 'nist-weierstrauss'
@@ -71,7 +70,7 @@ export function pubKeyBytesToXY(pubKeyBytes: Uint8Array): base64urlPoint {
71
70
  // compressed p-384 key, SEC format
72
71
  if (bytesCount == 49) {
73
72
  if (publicKeyHex.slice(0, 2) == '03' || publicKeyHex.slice(0, 2) == '02') {
74
- const publicKey = fromString(publicKeyHex, 'base16')
73
+ const publicKey = u8a.fromString(publicKeyHex, 'base16')
75
74
  const point = nist_weierstrauss.secp384r1.ECPointDecompress(publicKey)
76
75
  return nist_weierstrauss.nist_weierstrauss_common.publicKeyIntToXY(point)
77
76
  }
@@ -1,7 +1,6 @@
1
1
  // Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
2
2
 
3
- // @ts-ignore
4
- import { fromString } from 'uint8arrays/from-string'
3
+ import * as u8a from 'uint8arrays'
5
4
 
6
5
  import * as nist_weierstrauss from 'nist-weierstrauss'
7
6
  import { base64urlPoint } from 'nist-weierstrauss'
@@ -57,7 +56,7 @@ export function pubKeyBytesToXY(pubKeyBytes: Uint8Array): base64urlPoint {
57
56
  // publicKeyHex.length / 2.0 = 67.0 bytes
58
57
  if (132 <= publicKeyHex.length && publicKeyHex.length <= 134) {
59
58
  if (publicKeyHex.slice(0, 2) == '03' || publicKeyHex.slice(0, 2) == '02') {
60
- const publicKey = fromString(publicKeyHex, 'base16')
59
+ const publicKey = u8a.fromString(publicKeyHex, 'base16')
61
60
  const point = nist_weierstrauss.secp521r1.ECPointDecompress(publicKey)
62
61
  return nist_weierstrauss.nist_weierstrauss_common.publicKeyIntToXY(point)
63
62
  }
package/src/index.ts CHANGED
@@ -1,5 +1,4 @@
1
1
  import { decode } from 'varint'
2
- // @ts-ignore
3
2
  import { base58btc } from 'multiformats/bases/base58'
4
3
  import ed25519 from './drivers/ed25519'
5
4
  import bls12381g2 from './drivers/bls12381g2'