@sphereon/ssi-sdk-ext.did-resolver-key 0.28.1-feature.oyd.cmsm.improv.20 → 0.28.1-next.53

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (54) hide show
  1. package/dist/index.cjs +527 -0
  2. package/dist/index.cjs.map +1 -0
  3. package/dist/index.d.cts +21 -0
  4. package/dist/index.d.ts +18 -5
  5. package/dist/index.js +491 -87
  6. package/dist/index.js.map +1 -1
  7. package/package.json +23 -10
  8. package/src/__tests__/__snapshots__/secp256r1.test.ts.snap +249 -1
  9. package/src/__tests__/__snapshots__/secp384r1.test.ts.snap +249 -1
  10. package/src/__tests__/__snapshots__/secp521r1.test.ts.snap +280 -1
  11. package/src/__tests__/key_resolver.test.ts +2 -1
  12. package/src/__tests__/secp256r1.test.ts +4 -4
  13. package/src/__tests__/secp384r1.test.ts +3 -3
  14. package/src/__tests__/secp521r1.test.ts +3 -2
  15. package/src/drivers/bls12381g2.ts +3 -1
  16. package/src/drivers/ed25519.ts +6 -4
  17. package/src/drivers/secp256k1.ts +3 -1
  18. package/src/drivers/secp256r1.ts +4 -3
  19. package/src/drivers/secp384r1.ts +3 -1
  20. package/src/drivers/secp521r1.ts +3 -1
  21. package/src/index.ts +3 -1
  22. package/dist/drivers/bls12381g2.d.ts +0 -8
  23. package/dist/drivers/bls12381g2.d.ts.map +0 -1
  24. package/dist/drivers/bls12381g2.js +0 -49
  25. package/dist/drivers/bls12381g2.js.map +0 -1
  26. package/dist/drivers/ed25519.d.ts +0 -8
  27. package/dist/drivers/ed25519.d.ts.map +0 -1
  28. package/dist/drivers/ed25519.js +0 -118
  29. package/dist/drivers/ed25519.js.map +0 -1
  30. package/dist/drivers/jwk.jcs.d.ts +0 -8
  31. package/dist/drivers/jwk.jcs.d.ts.map +0 -1
  32. package/dist/drivers/jwk.jcs.js +0 -23
  33. package/dist/drivers/jwk.jcs.js.map +0 -1
  34. package/dist/drivers/secp256k1.d.ts +0 -8
  35. package/dist/drivers/secp256k1.d.ts.map +0 -1
  36. package/dist/drivers/secp256k1.js +0 -49
  37. package/dist/drivers/secp256k1.js.map +0 -1
  38. package/dist/drivers/secp256r1.d.ts +0 -24
  39. package/dist/drivers/secp256r1.d.ts.map +0 -1
  40. package/dist/drivers/secp256r1.js +0 -99
  41. package/dist/drivers/secp256r1.js.map +0 -1
  42. package/dist/drivers/secp384r1.d.ts +0 -24
  43. package/dist/drivers/secp384r1.d.ts.map +0 -1
  44. package/dist/drivers/secp384r1.js +0 -99
  45. package/dist/drivers/secp384r1.js.map +0 -1
  46. package/dist/drivers/secp521r1.d.ts +0 -23
  47. package/dist/drivers/secp521r1.d.ts.map +0 -1
  48. package/dist/drivers/secp521r1.js +0 -87
  49. package/dist/drivers/secp521r1.js.map +0 -1
  50. package/dist/index.d.ts.map +0 -1
  51. package/dist/types.d.ts +0 -14
  52. package/dist/types.d.ts.map +0 -1
  53. package/dist/types.js +0 -6
  54. package/dist/types.js.map +0 -1
@@ -1,4 +1,283 @@
1
- // Jest Snapshot v1, https://goo.gl/fbAQLP
1
+ // Vitest Snapshot v1, https://vitest.dev/guide/snapshot.html
2
+
3
+ exports[`Secp521r1 mapper > successfully resolves the document from did 1`] = `
4
+ {
5
+ "assertionMethod": [
6
+ "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
7
+ ],
8
+ "authentication": [
9
+ "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
10
+ ],
11
+ "capabilityDelegation": [
12
+ "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
13
+ ],
14
+ "capabilityInvocation": [
15
+ "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
16
+ ],
17
+ "id": "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
18
+ "verificationMethod": [
19
+ {
20
+ "controller": "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
21
+ "id": "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
22
+ "publicKeyJwk": {
23
+ "crv": "P-521",
24
+ "kty": "EC",
25
+ "x": "AQgyFy6EwH3_u_KXPw8aTXTY7WSVytmbuJeFpq4U6LipxtSmBJe_jjRzms9qubnwm_fGoHMQlvQ1vzS2YLusR2V0",
26
+ "y": "Ab06MCcgoG7dM2I-VppdLV1k3lDoeHMvyYqHVfP05Ep2O7Zu0Qwd6IVzfZi9K0KMDud22wdnGUpUtFukZo0EeO15",
27
+ },
28
+ "type": "JsonWebKey2020",
29
+ },
30
+ ],
31
+ }
32
+ `;
33
+
34
+ exports[`Secp521r1 mapper > successfully resolves the document from did 2`] = `
35
+ {
36
+ "assertionMethod": [
37
+ "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
38
+ ],
39
+ "authentication": [
40
+ "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
41
+ ],
42
+ "capabilityDelegation": [
43
+ "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
44
+ ],
45
+ "capabilityInvocation": [
46
+ "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
47
+ ],
48
+ "id": "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
49
+ "verificationMethod": [
50
+ {
51
+ "controller": "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
52
+ "id": "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
53
+ "publicKeyJwk": {
54
+ "crv": "P-521",
55
+ "kty": "EC",
56
+ "x": "ASUHPMyichQ0QbHZ9ofNx_l4y7luncn5feKLo3OpJ2nSbZoC7mffolj5uy7s6KSKXFmnNWxGJ42IOrjZ47qqwqyS",
57
+ "y": "AW9ziIC4ZQQVSNmLlp59yYKrjRY0_VqO-GOIYQ9tYpPraBKUloEId6cI_vynCzlZWZtWpgOM3HPhYEgawQ703RjC",
58
+ },
59
+ "type": "JsonWebKey2020",
60
+ },
61
+ ],
62
+ }
63
+ `;
64
+
65
+ exports[`Secp521r1 mapper > successfully resolves the document from did 3`] = `
66
+ {
67
+ "assertionMethod": [
68
+ "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
69
+ ],
70
+ "authentication": [
71
+ "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
72
+ ],
73
+ "capabilityDelegation": [
74
+ "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
75
+ ],
76
+ "capabilityInvocation": [
77
+ "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
78
+ ],
79
+ "id": "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
80
+ "verificationMethod": [
81
+ {
82
+ "controller": "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
83
+ "id": "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
84
+ "publicKeyJwk": {
85
+ "crv": "P-521",
86
+ "kty": "EC",
87
+ "x": "J0LoEVR-DONWXQbGIietbBoWZUtxQU3YCeBIJRBtoNQpVWfZ5Xjxpry-x3TF2HGMhPVJdbtU1bOOXajTLQAlLBA",
88
+ "y": "AUekQSvoIkQ9utmhBYe-xlJhSDJwH9BXB9befk2SKz2hrMpvz7JdHe98bZjF1dcBtJjesmn8BcbyMSCV3VYCsSXE",
89
+ },
90
+ "type": "JsonWebKey2020",
91
+ },
92
+ ],
93
+ }
94
+ `;
95
+
96
+ exports[`Secp521r1 mapper > successfully resolves the document from did 4`] = `
97
+ {
98
+ "assertionMethod": [
99
+ "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
100
+ ],
101
+ "authentication": [
102
+ "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
103
+ ],
104
+ "capabilityDelegation": [
105
+ "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
106
+ ],
107
+ "capabilityInvocation": [
108
+ "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
109
+ ],
110
+ "id": "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
111
+ "verificationMethod": [
112
+ {
113
+ "controller": "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
114
+ "id": "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
115
+ "publicKeyJwk": {
116
+ "crv": "P-521",
117
+ "kty": "EC",
118
+ "x": "lAMfJtiinea2OZt3D9asExhRdC2pVvlIOYv8GlgDCXPKTrRa9Af6ln3HsFDRk5hSqQzdKTwQM6tVnMvTL_1R0tQ",
119
+ "y": "AXE4bU-iKe8p2hf9wxUVwMV80Mgohap-kw8JdZ1VVL90YgtgKnUCceTAJDMy0KOKOMEssRI-Q_q3A5F4_zkcOtjV",
120
+ },
121
+ "type": "JsonWebKey2020",
122
+ },
123
+ ],
124
+ }
125
+ `;
126
+
127
+ exports[`Secp521r1 mapper > successfully resolves the document from did 5`] = `
128
+ {
129
+ "assertionMethod": [
130
+ "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
131
+ ],
132
+ "authentication": [
133
+ "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
134
+ ],
135
+ "capabilityDelegation": [
136
+ "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
137
+ ],
138
+ "capabilityInvocation": [
139
+ "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
140
+ ],
141
+ "id": "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
142
+ "verificationMethod": [
143
+ {
144
+ "controller": "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
145
+ "id": "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
146
+ "publicKeyJwk": {
147
+ "crv": "P-521",
148
+ "kty": "EC",
149
+ "x": "Ac3d57-5NBNeQ6ZUkSiTwPsP-h2K5GrPLvCkEQD2kmVgZ6BzaHYyDsVBptzB5yS-lb2DahZmNnTeApVum959s5Eo",
150
+ "y": "EgGJ0pcidrh5h-V3bgS1zR6NJ-eaoiKkfPwlJVcMCRI5z5ayOSrueM5oMAisimLAD7r_zzDMbtBp8rNG8yMmd2A",
151
+ },
152
+ "type": "JsonWebKey2020",
153
+ },
154
+ ],
155
+ }
156
+ `;
157
+
158
+ exports[`Secp521r1 mapper > successfully resolves the document from did 6`] = `
159
+ {
160
+ "assertionMethod": [
161
+ "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
162
+ ],
163
+ "authentication": [
164
+ "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
165
+ ],
166
+ "capabilityDelegation": [
167
+ "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
168
+ ],
169
+ "capabilityInvocation": [
170
+ "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
171
+ ],
172
+ "id": "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
173
+ "verificationMethod": [
174
+ {
175
+ "controller": "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
176
+ "id": "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
177
+ "publicKeyJwk": {
178
+ "crv": "P-521",
179
+ "kty": "EC",
180
+ "x": "RIvbfcfZLNaNNZZj87hk-mEhA6rEwob5Pj363BLlrexzEGmIqQbyFX9svSFF7H40vfAbpNGjLxx2tmeNG6pOBYE",
181
+ "y": "711FNq0Y9fk-DvGKy0tYf7Cxd8wF18xKunAK-jmA8REzXkRmFYrMBQu91FkBqAYhH2iPkQjSDllveUnKtMiprWY",
182
+ },
183
+ "type": "JsonWebKey2020",
184
+ },
185
+ ],
186
+ }
187
+ `;
188
+
189
+ exports[`Secp521r1 mapper > successfully resolves the document from did 7`] = `
190
+ {
191
+ "assertionMethod": [
192
+ "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
193
+ ],
194
+ "authentication": [
195
+ "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
196
+ ],
197
+ "capabilityDelegation": [
198
+ "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
199
+ ],
200
+ "capabilityInvocation": [
201
+ "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
202
+ ],
203
+ "id": "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
204
+ "verificationMethod": [
205
+ {
206
+ "controller": "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
207
+ "id": "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
208
+ "publicKeyJwk": {
209
+ "crv": "P-521",
210
+ "kty": "EC",
211
+ "x": "efE2eR719GHSoSzmtzVlBmaFD6wTYVg4r661VhHrxlqsatRDJr4628mgVowOitFEQMbz_osNgBn9tiIHW1YfYW4",
212
+ "y": "AcXkiFup65KvqBXF2r52zMTS-yjyOrQYFIDIPp870eRQEfo7tiID4EbosLY62BKmR74lG5pjnvTbA258IIUA3zO-",
213
+ },
214
+ "type": "JsonWebKey2020",
215
+ },
216
+ ],
217
+ }
218
+ `;
219
+
220
+ exports[`Secp521r1 mapper > successfully resolves the document from did 8`] = `
221
+ {
222
+ "assertionMethod": [
223
+ "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
224
+ ],
225
+ "authentication": [
226
+ "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
227
+ ],
228
+ "capabilityDelegation": [
229
+ "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
230
+ ],
231
+ "capabilityInvocation": [
232
+ "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
233
+ ],
234
+ "id": "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
235
+ "verificationMethod": [
236
+ {
237
+ "controller": "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
238
+ "id": "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
239
+ "publicKeyJwk": {
240
+ "crv": "P-521",
241
+ "kty": "EC",
242
+ "x": "AQhYV0yHhVL9n7sjCIxMjeQjQiy2F4lv3Qd7diAVP4xJW3kl1Na4aKIeEzYP3Un6ThoCxC-KFhHePvjM5QNk9mp7",
243
+ "y": "Aewp6gi7EiTP1tVqLCefC6gQ7BTxsY2t0D_qMXJPUoXqlihkyBMKA9CRFAXq16sfXhWFMckcnk-MLRjNC6XB4Pmj",
244
+ },
245
+ "type": "JsonWebKey2020",
246
+ },
247
+ ],
248
+ }
249
+ `;
250
+
251
+ exports[`Secp521r1 mapper > successfully resolves the document from did 9`] = `
252
+ {
253
+ "assertionMethod": [
254
+ "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
255
+ ],
256
+ "authentication": [
257
+ "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
258
+ ],
259
+ "capabilityDelegation": [
260
+ "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
261
+ ],
262
+ "capabilityInvocation": [
263
+ "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
264
+ ],
265
+ "id": "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
266
+ "verificationMethod": [
267
+ {
268
+ "controller": "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
269
+ "id": "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
270
+ "publicKeyJwk": {
271
+ "crv": "P-521",
272
+ "kty": "EC",
273
+ "x": "mI3pqrt5mbpgyopw74-q4WX6M2FkUPgroJHo3l9eG6pVXesQm4K51-M2yoxjt_ap6MtsaP78F-gzcn_lh5t_q5I",
274
+ "y": "AQpsaMuiW3OjliI8bINPPmtK95KBXr7wOaPsFTh-J7pm-sMV83VrVJWCqGXaMbQNUIv3my2n34gk057_ZwFlkRSD",
275
+ },
276
+ "type": "JsonWebKey2020",
277
+ },
278
+ ],
279
+ }
280
+ `;
2
281
 
3
282
  exports[`Secp521r1 mapper successfully resolves the document from did 1`] = `
4
283
  {
@@ -1,6 +1,7 @@
1
1
  import { Resolver } from 'did-resolver'
2
- import { DID_JSON, DID_LD_JSON, getResolver } from '../index'
3
2
  import * as fs from 'fs'
3
+ import { describe, expect, it } from 'vitest'
4
+ import { DID_JSON, DID_LD_JSON, getResolver } from '../index'
4
5
 
5
6
  const ed25519Fixtures = JSON.parse(fs.readFileSync(`${__dirname}/fixtures/ed25519-x25519.json`, { encoding: 'utf-8' }))
6
7
 
@@ -1,11 +1,11 @@
1
1
  // @ts-nocheck
2
- // Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
3
-
2
+ import { base58btc } from 'multiformats/bases/base58'
3
+ import * as u8a from 'uint8arrays'
4
4
  import * as varint from 'varint'
5
+ // Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
6
+ import { describe, expect, it, test } from 'vitest'
5
7
  // import { base58btc } from 'multiformats/bases/base58'
6
8
  import * as mapper from '../drivers/secp256r1'
7
- import * as u8a from 'uint8arrays'
8
- import { base58btc } from 'multiformats/bases/base58'
9
9
 
10
10
  describe('Secp256r1 mapper', () => {
11
11
  it('successfully resolves the document from did:key from raw public key', async () => {
@@ -1,11 +1,11 @@
1
1
  // Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
2
2
 
3
+ import { base58btc } from 'multiformats/bases/base58'
4
+ import * as u8a from 'uint8arrays'
3
5
  import * as varint from 'varint'
6
+ import { describe, expect, it, test } from 'vitest'
4
7
  // import { base58btc } from 'multiformats/bases/base58'
5
8
  import * as mapper from '../drivers/secp384r1'
6
- import * as u8a from 'uint8arrays'
7
-
8
- import { base58btc } from 'multiformats/bases/base58'
9
9
 
10
10
  describe('Secp384r1 mapper', () => {
11
11
  it('Secp384r1 mapper successfully resolves the document from did:key from raw public key', async () => {
@@ -1,9 +1,10 @@
1
1
  // Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
2
2
 
3
+ import { base58btc } from 'multiformats/bases/base58'
4
+ import * as u8a from 'uint8arrays'
3
5
  import * as varint from 'varint'
6
+ import { describe, expect, it, test } from 'vitest'
4
7
  import * as mapper from '../drivers/secp521r1'
5
- import * as u8a from 'uint8arrays'
6
- import { base58btc } from 'multiformats/bases/base58'
7
8
 
8
9
  describe('Secp521r1 mapper', () => {
9
10
  /* const mf = await import('multiformats/bases/base58')
@@ -1,5 +1,7 @@
1
1
  import { DIDDocument } from 'did-resolver'
2
+ // @ts-ignore
2
3
  import * as u8a from 'uint8arrays'
4
+ const { toString } = u8a
3
5
  import { KeyToDidDocArgs } from '../index'
4
6
 
5
7
  export const keyToDidDoc = ({ pubKeyBytes, fingerprint }: KeyToDidDocArgs): DIDDocument => {
@@ -12,7 +14,7 @@ export const keyToDidDoc = ({ pubKeyBytes, fingerprint }: KeyToDidDocArgs): DIDD
12
14
  id: keyId,
13
15
  type: 'Bls12381G2Key2020',
14
16
  controller: did,
15
- publicKeyBase58: u8a.toString(pubKeyBytes, 'base58btc'),
17
+ publicKeyBase58: toString(pubKeyBytes, 'base58btc'),
16
18
  },
17
19
  ],
18
20
  authentication: [keyId],
@@ -1,4 +1,6 @@
1
+ // @ts-ignore
1
2
  import * as u8a from 'uint8arrays'
3
+ const { toString } = u8a
2
4
  import { DIDDocument } from 'did-resolver'
3
5
  // import { edwardsToMontgomery } from '@noble/curves/ed25519'
4
6
  import { convertPublicKeyToX25519 } from '@stablelib/ed25519'
@@ -11,7 +13,7 @@ function encodeKey(key: Uint8Array, encodeKey?: number) {
11
13
  // See js-multicodec for a general implementation
12
14
  bytes[1] = 0x01
13
15
  bytes.set(key, 2)
14
- return `z${u8a.toString(bytes, 'base58btc')}`
16
+ return `z${toString(bytes, 'base58btc')}`
15
17
  }
16
18
 
17
19
  export const keyToDidDoc = (args: KeyToDidDocArgs) => {
@@ -36,7 +38,7 @@ const keyToDidDoc2018_2019 = ({ pubKeyBytes, fingerprint, contentType }: KeyToDi
36
38
  const keyId = `${did}#${fingerprint}`
37
39
 
38
40
  //todo: Move to noble lib. x25519 values differ between below methods. Current implementation is correct according to DID:key spec
39
- // const pubKeyHex = u8a.toString(pubKeyBytes, 'base16')
41
+ // const pubKeyHex = toString(pubKeyBytes, 'base16')
40
42
  // const x25519PubBytes = edwardsToMontgomery(pubKeyHex)
41
43
  const x25519PubBytes = convertPublicKeyToX25519(pubKeyBytes)
42
44
 
@@ -55,13 +57,13 @@ const keyToDidDoc2018_2019 = ({ pubKeyBytes, fingerprint, contentType }: KeyToDi
55
57
  id: keyId,
56
58
  type: 'Ed25519VerificationKey2018',
57
59
  controller: did,
58
- publicKeyBase58: u8a.toString(pubKeyBytes, 'base58btc'),
60
+ publicKeyBase58: toString(pubKeyBytes, 'base58btc'),
59
61
  },
60
62
  {
61
63
  id: x25519KeyId,
62
64
  type: 'X25519KeyAgreementKey2019',
63
65
  controller: did,
64
- publicKeyBase58: u8a.toString(x25519PubBytes, 'base58btc'),
66
+ publicKeyBase58: toString(x25519PubBytes, 'base58btc'),
65
67
  },
66
68
  ],
67
69
  authentication: [keyId],
@@ -1,4 +1,6 @@
1
+ // @ts-ignore
1
2
  import * as u8a from 'uint8arrays'
3
+ const { toString } = u8a
2
4
  import { DIDDocument } from 'did-resolver'
3
5
  import { KeyToDidDocArgs } from '../types'
4
6
 
@@ -12,7 +14,7 @@ export const keyToDidDoc = ({ pubKeyBytes, fingerprint }: KeyToDidDocArgs): DIDD
12
14
  id: keyId,
13
15
  type: 'Secp256k1VerificationKey2018',
14
16
  controller: did,
15
- publicKeyBase58: u8a.toString(pubKeyBytes, 'base58btc'),
17
+ publicKeyBase58: toString(pubKeyBytes, 'base58btc'),
16
18
  },
17
19
  ],
18
20
  authentication: [keyId],
@@ -1,9 +1,10 @@
1
1
  // Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
2
2
 
3
- import * as u8a from 'uint8arrays'
4
-
5
3
  import * as nist_weierstrauss from 'nist-weierstrauss'
6
4
  import { base64urlPoint } from 'nist-weierstrauss'
5
+ // @ts-ignore
6
+ import * as u8a from 'uint8arrays'
7
+ const { fromString } = u8a
7
8
  import { KeyToDidDocArgs } from '../types'
8
9
 
9
10
  /**
@@ -70,7 +71,7 @@ export function pubKeyBytesToXY(pubKeyBytes: Uint8Array): base64urlPoint {
70
71
  // compressed p-256 key, SEC format
71
72
  if (bytesCount == 33) {
72
73
  if (publicKeyHex.slice(0, 2) == '03' || publicKeyHex.slice(0, 2) == '02') {
73
- const publicKey = u8a.fromString(publicKeyHex, 'base16')
74
+ const publicKey = fromString(publicKeyHex, 'base16')
74
75
  const point = nist_weierstrauss.secp256r1.ECPointDecompress(publicKey)
75
76
  return nist_weierstrauss.nist_weierstrauss_common.publicKeyIntToXY(point)
76
77
  }
@@ -1,6 +1,8 @@
1
1
  // Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
2
2
 
3
+ // @ts-ignore
3
4
  import * as u8a from 'uint8arrays'
5
+ const { fromString } = u8a
4
6
 
5
7
  import * as nist_weierstrauss from 'nist-weierstrauss'
6
8
  import { base64urlPoint } from 'nist-weierstrauss'
@@ -70,7 +72,7 @@ export function pubKeyBytesToXY(pubKeyBytes: Uint8Array): base64urlPoint {
70
72
  // compressed p-384 key, SEC format
71
73
  if (bytesCount == 49) {
72
74
  if (publicKeyHex.slice(0, 2) == '03' || publicKeyHex.slice(0, 2) == '02') {
73
- const publicKey = u8a.fromString(publicKeyHex, 'base16')
75
+ const publicKey = fromString(publicKeyHex, 'base16')
74
76
  const point = nist_weierstrauss.secp384r1.ECPointDecompress(publicKey)
75
77
  return nist_weierstrauss.nist_weierstrauss_common.publicKeyIntToXY(point)
76
78
  }
@@ -1,6 +1,8 @@
1
1
  // Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
2
2
 
3
+ // @ts-ignore
3
4
  import * as u8a from 'uint8arrays'
5
+ const { fromString } = u8a
4
6
 
5
7
  import * as nist_weierstrauss from 'nist-weierstrauss'
6
8
  import { base64urlPoint } from 'nist-weierstrauss'
@@ -56,7 +58,7 @@ export function pubKeyBytesToXY(pubKeyBytes: Uint8Array): base64urlPoint {
56
58
  // publicKeyHex.length / 2.0 = 67.0 bytes
57
59
  if (132 <= publicKeyHex.length && publicKeyHex.length <= 134) {
58
60
  if (publicKeyHex.slice(0, 2) == '03' || publicKeyHex.slice(0, 2) == '02') {
59
- const publicKey = u8a.fromString(publicKeyHex, 'base16')
61
+ const publicKey = fromString(publicKeyHex, 'base16')
60
62
  const point = nist_weierstrauss.secp521r1.ECPointDecompress(publicKey)
61
63
  return nist_weierstrauss.nist_weierstrauss_common.publicKeyIntToXY(point)
62
64
  }
package/src/index.ts CHANGED
@@ -1,4 +1,6 @@
1
- import { decode } from 'varint'
1
+ import varint from 'varint'
2
+ const { decode } = varint
3
+ // @ts-ignore
2
4
  import { base58btc } from 'multiformats/bases/base58'
3
5
  import ed25519 from './drivers/ed25519'
4
6
  import bls12381g2 from './drivers/bls12381g2'
@@ -1,8 +0,0 @@
1
- import { DIDDocument } from 'did-resolver';
2
- import { KeyToDidDocArgs } from '../index';
3
- export declare const keyToDidDoc: ({ pubKeyBytes, fingerprint }: KeyToDidDocArgs) => DIDDocument;
4
- declare const _default: {
5
- keyToDidDoc: ({ pubKeyBytes, fingerprint }: KeyToDidDocArgs) => DIDDocument;
6
- };
7
- export default _default;
8
- //# sourceMappingURL=bls12381g2.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"bls12381g2.d.ts","sourceRoot":"","sources":["../../src/drivers/bls12381g2.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,WAAW,EAAE,MAAM,cAAc,CAAA;AAE1C,OAAO,EAAE,eAAe,EAAE,MAAM,UAAU,CAAA;AAE1C,eAAO,MAAM,WAAW,iCAAkC,eAAe,KAAG,WAkB3E,CAAA;;gDAlByD,eAAe,KAAG,WAAW;;AAmBvF,wBAA8B"}
@@ -1,49 +0,0 @@
1
- "use strict";
2
- var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
- if (k2 === undefined) k2 = k;
4
- var desc = Object.getOwnPropertyDescriptor(m, k);
5
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
- desc = { enumerable: true, get: function() { return m[k]; } };
7
- }
8
- Object.defineProperty(o, k2, desc);
9
- }) : (function(o, m, k, k2) {
10
- if (k2 === undefined) k2 = k;
11
- o[k2] = m[k];
12
- }));
13
- var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
- Object.defineProperty(o, "default", { enumerable: true, value: v });
15
- }) : function(o, v) {
16
- o["default"] = v;
17
- });
18
- var __importStar = (this && this.__importStar) || function (mod) {
19
- if (mod && mod.__esModule) return mod;
20
- var result = {};
21
- if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
- __setModuleDefault(result, mod);
23
- return result;
24
- };
25
- Object.defineProperty(exports, "__esModule", { value: true });
26
- exports.keyToDidDoc = void 0;
27
- const u8a = __importStar(require("uint8arrays"));
28
- const keyToDidDoc = ({ pubKeyBytes, fingerprint }) => {
29
- const did = `did:key:${fingerprint}`;
30
- const keyId = `${did}#${fingerprint}`;
31
- return {
32
- id: did,
33
- verificationMethod: [
34
- {
35
- id: keyId,
36
- type: 'Bls12381G2Key2020',
37
- controller: did,
38
- publicKeyBase58: u8a.toString(pubKeyBytes, 'base58btc'),
39
- },
40
- ],
41
- authentication: [keyId],
42
- assertionMethod: [keyId],
43
- capabilityDelegation: [keyId],
44
- capabilityInvocation: [keyId],
45
- };
46
- };
47
- exports.keyToDidDoc = keyToDidDoc;
48
- exports.default = { keyToDidDoc: exports.keyToDidDoc };
49
- //# sourceMappingURL=bls12381g2.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"bls12381g2.js","sourceRoot":"","sources":["../../src/drivers/bls12381g2.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;AACA,iDAAkC;AAG3B,MAAM,WAAW,GAAG,CAAC,EAAE,WAAW,EAAE,WAAW,EAAmB,EAAe,EAAE;IACxF,MAAM,GAAG,GAAG,WAAW,WAAW,EAAE,CAAA;IACpC,MAAM,KAAK,GAAG,GAAG,GAAG,IAAI,WAAW,EAAE,CAAA;IACrC,OAAO;QACL,EAAE,EAAE,GAAG;QACP,kBAAkB,EAAE;YAClB;gBACE,EAAE,EAAE,KAAK;gBACT,IAAI,EAAE,mBAAmB;gBACzB,UAAU,EAAE,GAAG;gBACf,eAAe,EAAE,GAAG,CAAC,QAAQ,CAAC,WAAW,EAAE,WAAW,CAAC;aACxD;SACF;QACD,cAAc,EAAE,CAAC,KAAK,CAAC;QACvB,eAAe,EAAE,CAAC,KAAK,CAAC;QACxB,oBAAoB,EAAE,CAAC,KAAK,CAAC;QAC7B,oBAAoB,EAAE,CAAC,KAAK,CAAC;KAC9B,CAAA;AACH,CAAC,CAAA;AAlBY,QAAA,WAAW,eAkBvB;AACD,kBAAe,EAAE,WAAW,EAAX,mBAAW,EAAE,CAAA"}
@@ -1,8 +0,0 @@
1
- import { DIDDocument } from 'did-resolver';
2
- import { KeyToDidDocArgs } from '../types';
3
- export declare const keyToDidDoc: (args: KeyToDidDocArgs) => DIDDocument;
4
- declare const _default: {
5
- keyToDidDoc: (args: KeyToDidDocArgs) => DIDDocument;
6
- };
7
- export default _default;
8
- //# sourceMappingURL=ed25519.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"ed25519.d.ts","sourceRoot":"","sources":["../../src/drivers/ed25519.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,WAAW,EAAE,MAAM,cAAc,CAAA;AAG1C,OAAO,EAAe,eAAe,EAAE,MAAM,UAAU,CAAA;AAYvD,eAAO,MAAM,WAAW,SAAU,eAAe,gBAgBhD,CAAA;;wBAhBiC,eAAe;;AAkGjD,wBAA8B"}