@sphereon/ssi-sdk-ext.did-resolver-key 0.28.1-feature.oyd.cmsm.improv.21 → 0.28.1-next.54
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs +527 -0
- package/dist/index.cjs.map +1 -0
- package/dist/index.d.cts +21 -0
- package/dist/index.d.ts +18 -5
- package/dist/index.js +491 -87
- package/dist/index.js.map +1 -1
- package/package.json +23 -10
- package/src/__tests__/__snapshots__/secp256r1.test.ts.snap +249 -1
- package/src/__tests__/__snapshots__/secp384r1.test.ts.snap +249 -1
- package/src/__tests__/__snapshots__/secp521r1.test.ts.snap +280 -1
- package/src/__tests__/key_resolver.test.ts +2 -1
- package/src/__tests__/secp256r1.test.ts +4 -4
- package/src/__tests__/secp384r1.test.ts +3 -3
- package/src/__tests__/secp521r1.test.ts +3 -2
- package/src/drivers/bls12381g2.ts +3 -1
- package/src/drivers/ed25519.ts +6 -4
- package/src/drivers/secp256k1.ts +3 -1
- package/src/drivers/secp256r1.ts +4 -3
- package/src/drivers/secp384r1.ts +3 -1
- package/src/drivers/secp521r1.ts +3 -1
- package/src/index.ts +3 -1
- package/dist/drivers/bls12381g2.d.ts +0 -8
- package/dist/drivers/bls12381g2.d.ts.map +0 -1
- package/dist/drivers/bls12381g2.js +0 -49
- package/dist/drivers/bls12381g2.js.map +0 -1
- package/dist/drivers/ed25519.d.ts +0 -8
- package/dist/drivers/ed25519.d.ts.map +0 -1
- package/dist/drivers/ed25519.js +0 -118
- package/dist/drivers/ed25519.js.map +0 -1
- package/dist/drivers/jwk.jcs.d.ts +0 -8
- package/dist/drivers/jwk.jcs.d.ts.map +0 -1
- package/dist/drivers/jwk.jcs.js +0 -23
- package/dist/drivers/jwk.jcs.js.map +0 -1
- package/dist/drivers/secp256k1.d.ts +0 -8
- package/dist/drivers/secp256k1.d.ts.map +0 -1
- package/dist/drivers/secp256k1.js +0 -49
- package/dist/drivers/secp256k1.js.map +0 -1
- package/dist/drivers/secp256r1.d.ts +0 -24
- package/dist/drivers/secp256r1.d.ts.map +0 -1
- package/dist/drivers/secp256r1.js +0 -99
- package/dist/drivers/secp256r1.js.map +0 -1
- package/dist/drivers/secp384r1.d.ts +0 -24
- package/dist/drivers/secp384r1.d.ts.map +0 -1
- package/dist/drivers/secp384r1.js +0 -99
- package/dist/drivers/secp384r1.js.map +0 -1
- package/dist/drivers/secp521r1.d.ts +0 -23
- package/dist/drivers/secp521r1.d.ts.map +0 -1
- package/dist/drivers/secp521r1.js +0 -87
- package/dist/drivers/secp521r1.js.map +0 -1
- package/dist/index.d.ts.map +0 -1
- package/dist/types.d.ts +0 -14
- package/dist/types.d.ts.map +0 -1
- package/dist/types.js +0 -6
- package/dist/types.js.map +0 -1
|
@@ -1,4 +1,283 @@
|
|
|
1
|
-
//
|
|
1
|
+
// Vitest Snapshot v1, https://vitest.dev/guide/snapshot.html
|
|
2
|
+
|
|
3
|
+
exports[`Secp521r1 mapper > successfully resolves the document from did 1`] = `
|
|
4
|
+
{
|
|
5
|
+
"assertionMethod": [
|
|
6
|
+
"did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
|
|
7
|
+
],
|
|
8
|
+
"authentication": [
|
|
9
|
+
"did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
|
|
10
|
+
],
|
|
11
|
+
"capabilityDelegation": [
|
|
12
|
+
"did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
|
|
13
|
+
],
|
|
14
|
+
"capabilityInvocation": [
|
|
15
|
+
"did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
|
|
16
|
+
],
|
|
17
|
+
"id": "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
|
|
18
|
+
"verificationMethod": [
|
|
19
|
+
{
|
|
20
|
+
"controller": "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
|
|
21
|
+
"id": "did:key:z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f#z2J9gcGdb2nEyMDmzQYv2QZQcM1vXktvy1Pw4MduSWxGabLZ9XESSWLQgbuPhwnXN7zP7HpTzWqrMTzaY5zWe6hpzJ2jnw4f",
|
|
22
|
+
"publicKeyJwk": {
|
|
23
|
+
"crv": "P-521",
|
|
24
|
+
"kty": "EC",
|
|
25
|
+
"x": "AQgyFy6EwH3_u_KXPw8aTXTY7WSVytmbuJeFpq4U6LipxtSmBJe_jjRzms9qubnwm_fGoHMQlvQ1vzS2YLusR2V0",
|
|
26
|
+
"y": "Ab06MCcgoG7dM2I-VppdLV1k3lDoeHMvyYqHVfP05Ep2O7Zu0Qwd6IVzfZi9K0KMDud22wdnGUpUtFukZo0EeO15",
|
|
27
|
+
},
|
|
28
|
+
"type": "JsonWebKey2020",
|
|
29
|
+
},
|
|
30
|
+
],
|
|
31
|
+
}
|
|
32
|
+
`;
|
|
33
|
+
|
|
34
|
+
exports[`Secp521r1 mapper > successfully resolves the document from did 2`] = `
|
|
35
|
+
{
|
|
36
|
+
"assertionMethod": [
|
|
37
|
+
"did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
|
|
38
|
+
],
|
|
39
|
+
"authentication": [
|
|
40
|
+
"did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
|
|
41
|
+
],
|
|
42
|
+
"capabilityDelegation": [
|
|
43
|
+
"did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
|
|
44
|
+
],
|
|
45
|
+
"capabilityInvocation": [
|
|
46
|
+
"did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
|
|
47
|
+
],
|
|
48
|
+
"id": "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
|
|
49
|
+
"verificationMethod": [
|
|
50
|
+
{
|
|
51
|
+
"controller": "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
|
|
52
|
+
"id": "did:key:z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7#z2J9gaYxrKVpdoG9A4gRnmpnRCcxU6agDtFVVBVdn1JedouoZN7SzcyREXXzWgt3gGiwpoHq7K68X4m32D8HgzG8wv3sY5j7",
|
|
53
|
+
"publicKeyJwk": {
|
|
54
|
+
"crv": "P-521",
|
|
55
|
+
"kty": "EC",
|
|
56
|
+
"x": "ASUHPMyichQ0QbHZ9ofNx_l4y7luncn5feKLo3OpJ2nSbZoC7mffolj5uy7s6KSKXFmnNWxGJ42IOrjZ47qqwqyS",
|
|
57
|
+
"y": "AW9ziIC4ZQQVSNmLlp59yYKrjRY0_VqO-GOIYQ9tYpPraBKUloEId6cI_vynCzlZWZtWpgOM3HPhYEgawQ703RjC",
|
|
58
|
+
},
|
|
59
|
+
"type": "JsonWebKey2020",
|
|
60
|
+
},
|
|
61
|
+
],
|
|
62
|
+
}
|
|
63
|
+
`;
|
|
64
|
+
|
|
65
|
+
exports[`Secp521r1 mapper > successfully resolves the document from did 3`] = `
|
|
66
|
+
{
|
|
67
|
+
"assertionMethod": [
|
|
68
|
+
"did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
|
|
69
|
+
],
|
|
70
|
+
"authentication": [
|
|
71
|
+
"did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
|
|
72
|
+
],
|
|
73
|
+
"capabilityDelegation": [
|
|
74
|
+
"did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
|
|
75
|
+
],
|
|
76
|
+
"capabilityInvocation": [
|
|
77
|
+
"did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
|
|
78
|
+
],
|
|
79
|
+
"id": "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
|
|
80
|
+
"verificationMethod": [
|
|
81
|
+
{
|
|
82
|
+
"controller": "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
|
|
83
|
+
"id": "did:key:z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX#z2J9gaYaTUV4Ps5GYNNMm4nAyj4pGxd3Nh2zyeFjpEy631ZJ3dYfTDZ68GAhYbNuTn2eMAhKd6hhbzfxLn66vrQ6992jCSxX",
|
|
84
|
+
"publicKeyJwk": {
|
|
85
|
+
"crv": "P-521",
|
|
86
|
+
"kty": "EC",
|
|
87
|
+
"x": "J0LoEVR-DONWXQbGIietbBoWZUtxQU3YCeBIJRBtoNQpVWfZ5Xjxpry-x3TF2HGMhPVJdbtU1bOOXajTLQAlLBA",
|
|
88
|
+
"y": "AUekQSvoIkQ9utmhBYe-xlJhSDJwH9BXB9befk2SKz2hrMpvz7JdHe98bZjF1dcBtJjesmn8BcbyMSCV3VYCsSXE",
|
|
89
|
+
},
|
|
90
|
+
"type": "JsonWebKey2020",
|
|
91
|
+
},
|
|
92
|
+
],
|
|
93
|
+
}
|
|
94
|
+
`;
|
|
95
|
+
|
|
96
|
+
exports[`Secp521r1 mapper > successfully resolves the document from did 4`] = `
|
|
97
|
+
{
|
|
98
|
+
"assertionMethod": [
|
|
99
|
+
"did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
|
|
100
|
+
],
|
|
101
|
+
"authentication": [
|
|
102
|
+
"did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
|
|
103
|
+
],
|
|
104
|
+
"capabilityDelegation": [
|
|
105
|
+
"did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
|
|
106
|
+
],
|
|
107
|
+
"capabilityInvocation": [
|
|
108
|
+
"did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
|
|
109
|
+
],
|
|
110
|
+
"id": "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
|
|
111
|
+
"verificationMethod": [
|
|
112
|
+
{
|
|
113
|
+
"controller": "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
|
|
114
|
+
"id": "did:key:z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs#z2J9gcGTLNfNooB4Mvx7qeEBccSWARJ3y1xjwbMH9A7ra6oq71rD1daVSVm2YmjUZRWJms18QTZXTnhaH5ihiKiVaG52cuAs",
|
|
115
|
+
"publicKeyJwk": {
|
|
116
|
+
"crv": "P-521",
|
|
117
|
+
"kty": "EC",
|
|
118
|
+
"x": "lAMfJtiinea2OZt3D9asExhRdC2pVvlIOYv8GlgDCXPKTrRa9Af6ln3HsFDRk5hSqQzdKTwQM6tVnMvTL_1R0tQ",
|
|
119
|
+
"y": "AXE4bU-iKe8p2hf9wxUVwMV80Mgohap-kw8JdZ1VVL90YgtgKnUCceTAJDMy0KOKOMEssRI-Q_q3A5F4_zkcOtjV",
|
|
120
|
+
},
|
|
121
|
+
"type": "JsonWebKey2020",
|
|
122
|
+
},
|
|
123
|
+
],
|
|
124
|
+
}
|
|
125
|
+
`;
|
|
126
|
+
|
|
127
|
+
exports[`Secp521r1 mapper > successfully resolves the document from did 5`] = `
|
|
128
|
+
{
|
|
129
|
+
"assertionMethod": [
|
|
130
|
+
"did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
|
|
131
|
+
],
|
|
132
|
+
"authentication": [
|
|
133
|
+
"did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
|
|
134
|
+
],
|
|
135
|
+
"capabilityDelegation": [
|
|
136
|
+
"did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
|
|
137
|
+
],
|
|
138
|
+
"capabilityInvocation": [
|
|
139
|
+
"did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
|
|
140
|
+
],
|
|
141
|
+
"id": "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
|
|
142
|
+
"verificationMethod": [
|
|
143
|
+
{
|
|
144
|
+
"controller": "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
|
|
145
|
+
"id": "did:key:z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1#z2J9gaZDkUkcV4j5nMPp4dzks3vygMwKRSZWg9j7HNYcR5JLRu361LN6TwrBK3r19VisFYUZEGEXhqqffAprjgmVtCwfCUB1",
|
|
146
|
+
"publicKeyJwk": {
|
|
147
|
+
"crv": "P-521",
|
|
148
|
+
"kty": "EC",
|
|
149
|
+
"x": "Ac3d57-5NBNeQ6ZUkSiTwPsP-h2K5GrPLvCkEQD2kmVgZ6BzaHYyDsVBptzB5yS-lb2DahZmNnTeApVum959s5Eo",
|
|
150
|
+
"y": "EgGJ0pcidrh5h-V3bgS1zR6NJ-eaoiKkfPwlJVcMCRI5z5ayOSrueM5oMAisimLAD7r_zzDMbtBp8rNG8yMmd2A",
|
|
151
|
+
},
|
|
152
|
+
"type": "JsonWebKey2020",
|
|
153
|
+
},
|
|
154
|
+
],
|
|
155
|
+
}
|
|
156
|
+
`;
|
|
157
|
+
|
|
158
|
+
exports[`Secp521r1 mapper > successfully resolves the document from did 6`] = `
|
|
159
|
+
{
|
|
160
|
+
"assertionMethod": [
|
|
161
|
+
"did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
|
|
162
|
+
],
|
|
163
|
+
"authentication": [
|
|
164
|
+
"did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
|
|
165
|
+
],
|
|
166
|
+
"capabilityDelegation": [
|
|
167
|
+
"did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
|
|
168
|
+
],
|
|
169
|
+
"capabilityInvocation": [
|
|
170
|
+
"did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
|
|
171
|
+
],
|
|
172
|
+
"id": "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
|
|
173
|
+
"verificationMethod": [
|
|
174
|
+
{
|
|
175
|
+
"controller": "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
|
|
176
|
+
"id": "did:key:z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z#z2J9gaYd3MzVdZSQDj1zqsxv2tLD5Np3oD7G5F5dHbsF7Sbf1ovGkRfFcaUZMSSDKheREWxapez3vzVwkRYvrSMt4PM4Am1z",
|
|
177
|
+
"publicKeyJwk": {
|
|
178
|
+
"crv": "P-521",
|
|
179
|
+
"kty": "EC",
|
|
180
|
+
"x": "RIvbfcfZLNaNNZZj87hk-mEhA6rEwob5Pj363BLlrexzEGmIqQbyFX9svSFF7H40vfAbpNGjLxx2tmeNG6pOBYE",
|
|
181
|
+
"y": "711FNq0Y9fk-DvGKy0tYf7Cxd8wF18xKunAK-jmA8REzXkRmFYrMBQu91FkBqAYhH2iPkQjSDllveUnKtMiprWY",
|
|
182
|
+
},
|
|
183
|
+
"type": "JsonWebKey2020",
|
|
184
|
+
},
|
|
185
|
+
],
|
|
186
|
+
}
|
|
187
|
+
`;
|
|
188
|
+
|
|
189
|
+
exports[`Secp521r1 mapper > successfully resolves the document from did 7`] = `
|
|
190
|
+
{
|
|
191
|
+
"assertionMethod": [
|
|
192
|
+
"did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
|
|
193
|
+
],
|
|
194
|
+
"authentication": [
|
|
195
|
+
"did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
|
|
196
|
+
],
|
|
197
|
+
"capabilityDelegation": [
|
|
198
|
+
"did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
|
|
199
|
+
],
|
|
200
|
+
"capabilityInvocation": [
|
|
201
|
+
"did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
|
|
202
|
+
],
|
|
203
|
+
"id": "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
|
|
204
|
+
"verificationMethod": [
|
|
205
|
+
{
|
|
206
|
+
"controller": "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
|
|
207
|
+
"id": "did:key:z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P#z2J9gaYhkf4Ax2QA65KkcrSxr8JDSxUBwzFq3jmq5iBroY2tE7s1uohXVqEvALPxbvdzbWWQTtHvTprUdbNFha3HawyPcD9P",
|
|
208
|
+
"publicKeyJwk": {
|
|
209
|
+
"crv": "P-521",
|
|
210
|
+
"kty": "EC",
|
|
211
|
+
"x": "efE2eR719GHSoSzmtzVlBmaFD6wTYVg4r661VhHrxlqsatRDJr4628mgVowOitFEQMbz_osNgBn9tiIHW1YfYW4",
|
|
212
|
+
"y": "AcXkiFup65KvqBXF2r52zMTS-yjyOrQYFIDIPp870eRQEfo7tiID4EbosLY62BKmR74lG5pjnvTbA258IIUA3zO-",
|
|
213
|
+
},
|
|
214
|
+
"type": "JsonWebKey2020",
|
|
215
|
+
},
|
|
216
|
+
],
|
|
217
|
+
}
|
|
218
|
+
`;
|
|
219
|
+
|
|
220
|
+
exports[`Secp521r1 mapper > successfully resolves the document from did 8`] = `
|
|
221
|
+
{
|
|
222
|
+
"assertionMethod": [
|
|
223
|
+
"did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
|
|
224
|
+
],
|
|
225
|
+
"authentication": [
|
|
226
|
+
"did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
|
|
227
|
+
],
|
|
228
|
+
"capabilityDelegation": [
|
|
229
|
+
"did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
|
|
230
|
+
],
|
|
231
|
+
"capabilityInvocation": [
|
|
232
|
+
"did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
|
|
233
|
+
],
|
|
234
|
+
"id": "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
|
|
235
|
+
"verificationMethod": [
|
|
236
|
+
{
|
|
237
|
+
"controller": "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
|
|
238
|
+
"id": "did:key:z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6#z2J9gcGdbo8riFqfRzgo3gjJyFcbNJm75hrnpDrZTNqQQxgNVBTtKndBiKxzGXrAbyw5W88VDbR1B1FvRQNTnSezghqnJ7p6",
|
|
239
|
+
"publicKeyJwk": {
|
|
240
|
+
"crv": "P-521",
|
|
241
|
+
"kty": "EC",
|
|
242
|
+
"x": "AQhYV0yHhVL9n7sjCIxMjeQjQiy2F4lv3Qd7diAVP4xJW3kl1Na4aKIeEzYP3Un6ThoCxC-KFhHePvjM5QNk9mp7",
|
|
243
|
+
"y": "Aewp6gi7EiTP1tVqLCefC6gQ7BTxsY2t0D_qMXJPUoXqlihkyBMKA9CRFAXq16sfXhWFMckcnk-MLRjNC6XB4Pmj",
|
|
244
|
+
},
|
|
245
|
+
"type": "JsonWebKey2020",
|
|
246
|
+
},
|
|
247
|
+
],
|
|
248
|
+
}
|
|
249
|
+
`;
|
|
250
|
+
|
|
251
|
+
exports[`Secp521r1 mapper > successfully resolves the document from did 9`] = `
|
|
252
|
+
{
|
|
253
|
+
"assertionMethod": [
|
|
254
|
+
"did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
|
|
255
|
+
],
|
|
256
|
+
"authentication": [
|
|
257
|
+
"did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
|
|
258
|
+
],
|
|
259
|
+
"capabilityDelegation": [
|
|
260
|
+
"did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
|
|
261
|
+
],
|
|
262
|
+
"capabilityInvocation": [
|
|
263
|
+
"did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
|
|
264
|
+
],
|
|
265
|
+
"id": "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
|
|
266
|
+
"verificationMethod": [
|
|
267
|
+
{
|
|
268
|
+
"controller": "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
|
|
269
|
+
"id": "did:key:z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT#z2J9gcGTjd3NaNifwmaNZN27xioMAzHHCDBmkuQ552hm9kWrzhUepDCSAhiuRYBj1sSXR1LBxgqh6vasYzc8JhC12FpaNDhT",
|
|
270
|
+
"publicKeyJwk": {
|
|
271
|
+
"crv": "P-521",
|
|
272
|
+
"kty": "EC",
|
|
273
|
+
"x": "mI3pqrt5mbpgyopw74-q4WX6M2FkUPgroJHo3l9eG6pVXesQm4K51-M2yoxjt_ap6MtsaP78F-gzcn_lh5t_q5I",
|
|
274
|
+
"y": "AQpsaMuiW3OjliI8bINPPmtK95KBXr7wOaPsFTh-J7pm-sMV83VrVJWCqGXaMbQNUIv3my2n34gk057_ZwFlkRSD",
|
|
275
|
+
},
|
|
276
|
+
"type": "JsonWebKey2020",
|
|
277
|
+
},
|
|
278
|
+
],
|
|
279
|
+
}
|
|
280
|
+
`;
|
|
2
281
|
|
|
3
282
|
exports[`Secp521r1 mapper successfully resolves the document from did 1`] = `
|
|
4
283
|
{
|
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
import { Resolver } from 'did-resolver'
|
|
2
|
-
import { DID_JSON, DID_LD_JSON, getResolver } from '../index'
|
|
3
2
|
import * as fs from 'fs'
|
|
3
|
+
import { describe, expect, it } from 'vitest'
|
|
4
|
+
import { DID_JSON, DID_LD_JSON, getResolver } from '../index'
|
|
4
5
|
|
|
5
6
|
const ed25519Fixtures = JSON.parse(fs.readFileSync(`${__dirname}/fixtures/ed25519-x25519.json`, { encoding: 'utf-8' }))
|
|
6
7
|
|
|
@@ -1,11 +1,11 @@
|
|
|
1
1
|
// @ts-nocheck
|
|
2
|
-
|
|
3
|
-
|
|
2
|
+
import { base58btc } from 'multiformats/bases/base58'
|
|
3
|
+
import * as u8a from 'uint8arrays'
|
|
4
4
|
import * as varint from 'varint'
|
|
5
|
+
// Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
|
|
6
|
+
import { describe, expect, it, test } from 'vitest'
|
|
5
7
|
// import { base58btc } from 'multiformats/bases/base58'
|
|
6
8
|
import * as mapper from '../drivers/secp256r1'
|
|
7
|
-
import * as u8a from 'uint8arrays'
|
|
8
|
-
import { base58btc } from 'multiformats/bases/base58'
|
|
9
9
|
|
|
10
10
|
describe('Secp256r1 mapper', () => {
|
|
11
11
|
it('successfully resolves the document from did:key from raw public key', async () => {
|
|
@@ -1,11 +1,11 @@
|
|
|
1
1
|
// Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
|
|
2
2
|
|
|
3
|
+
import { base58btc } from 'multiformats/bases/base58'
|
|
4
|
+
import * as u8a from 'uint8arrays'
|
|
3
5
|
import * as varint from 'varint'
|
|
6
|
+
import { describe, expect, it, test } from 'vitest'
|
|
4
7
|
// import { base58btc } from 'multiformats/bases/base58'
|
|
5
8
|
import * as mapper from '../drivers/secp384r1'
|
|
6
|
-
import * as u8a from 'uint8arrays'
|
|
7
|
-
|
|
8
|
-
import { base58btc } from 'multiformats/bases/base58'
|
|
9
9
|
|
|
10
10
|
describe('Secp384r1 mapper', () => {
|
|
11
11
|
it('Secp384r1 mapper successfully resolves the document from did:key from raw public key', async () => {
|
|
@@ -1,9 +1,10 @@
|
|
|
1
1
|
// Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
|
|
2
2
|
|
|
3
|
+
import { base58btc } from 'multiformats/bases/base58'
|
|
4
|
+
import * as u8a from 'uint8arrays'
|
|
3
5
|
import * as varint from 'varint'
|
|
6
|
+
import { describe, expect, it, test } from 'vitest'
|
|
4
7
|
import * as mapper from '../drivers/secp521r1'
|
|
5
|
-
import * as u8a from 'uint8arrays'
|
|
6
|
-
import { base58btc } from 'multiformats/bases/base58'
|
|
7
8
|
|
|
8
9
|
describe('Secp521r1 mapper', () => {
|
|
9
10
|
/* const mf = await import('multiformats/bases/base58')
|
|
@@ -1,5 +1,7 @@
|
|
|
1
1
|
import { DIDDocument } from 'did-resolver'
|
|
2
|
+
// @ts-ignore
|
|
2
3
|
import * as u8a from 'uint8arrays'
|
|
4
|
+
const { toString } = u8a
|
|
3
5
|
import { KeyToDidDocArgs } from '../index'
|
|
4
6
|
|
|
5
7
|
export const keyToDidDoc = ({ pubKeyBytes, fingerprint }: KeyToDidDocArgs): DIDDocument => {
|
|
@@ -12,7 +14,7 @@ export const keyToDidDoc = ({ pubKeyBytes, fingerprint }: KeyToDidDocArgs): DIDD
|
|
|
12
14
|
id: keyId,
|
|
13
15
|
type: 'Bls12381G2Key2020',
|
|
14
16
|
controller: did,
|
|
15
|
-
publicKeyBase58:
|
|
17
|
+
publicKeyBase58: toString(pubKeyBytes, 'base58btc'),
|
|
16
18
|
},
|
|
17
19
|
],
|
|
18
20
|
authentication: [keyId],
|
package/src/drivers/ed25519.ts
CHANGED
|
@@ -1,4 +1,6 @@
|
|
|
1
|
+
// @ts-ignore
|
|
1
2
|
import * as u8a from 'uint8arrays'
|
|
3
|
+
const { toString } = u8a
|
|
2
4
|
import { DIDDocument } from 'did-resolver'
|
|
3
5
|
// import { edwardsToMontgomery } from '@noble/curves/ed25519'
|
|
4
6
|
import { convertPublicKeyToX25519 } from '@stablelib/ed25519'
|
|
@@ -11,7 +13,7 @@ function encodeKey(key: Uint8Array, encodeKey?: number) {
|
|
|
11
13
|
// See js-multicodec for a general implementation
|
|
12
14
|
bytes[1] = 0x01
|
|
13
15
|
bytes.set(key, 2)
|
|
14
|
-
return `z${
|
|
16
|
+
return `z${toString(bytes, 'base58btc')}`
|
|
15
17
|
}
|
|
16
18
|
|
|
17
19
|
export const keyToDidDoc = (args: KeyToDidDocArgs) => {
|
|
@@ -36,7 +38,7 @@ const keyToDidDoc2018_2019 = ({ pubKeyBytes, fingerprint, contentType }: KeyToDi
|
|
|
36
38
|
const keyId = `${did}#${fingerprint}`
|
|
37
39
|
|
|
38
40
|
//todo: Move to noble lib. x25519 values differ between below methods. Current implementation is correct according to DID:key spec
|
|
39
|
-
// const pubKeyHex =
|
|
41
|
+
// const pubKeyHex = toString(pubKeyBytes, 'base16')
|
|
40
42
|
// const x25519PubBytes = edwardsToMontgomery(pubKeyHex)
|
|
41
43
|
const x25519PubBytes = convertPublicKeyToX25519(pubKeyBytes)
|
|
42
44
|
|
|
@@ -55,13 +57,13 @@ const keyToDidDoc2018_2019 = ({ pubKeyBytes, fingerprint, contentType }: KeyToDi
|
|
|
55
57
|
id: keyId,
|
|
56
58
|
type: 'Ed25519VerificationKey2018',
|
|
57
59
|
controller: did,
|
|
58
|
-
publicKeyBase58:
|
|
60
|
+
publicKeyBase58: toString(pubKeyBytes, 'base58btc'),
|
|
59
61
|
},
|
|
60
62
|
{
|
|
61
63
|
id: x25519KeyId,
|
|
62
64
|
type: 'X25519KeyAgreementKey2019',
|
|
63
65
|
controller: did,
|
|
64
|
-
publicKeyBase58:
|
|
66
|
+
publicKeyBase58: toString(x25519PubBytes, 'base58btc'),
|
|
65
67
|
},
|
|
66
68
|
],
|
|
67
69
|
authentication: [keyId],
|
package/src/drivers/secp256k1.ts
CHANGED
|
@@ -1,4 +1,6 @@
|
|
|
1
|
+
// @ts-ignore
|
|
1
2
|
import * as u8a from 'uint8arrays'
|
|
3
|
+
const { toString } = u8a
|
|
2
4
|
import { DIDDocument } from 'did-resolver'
|
|
3
5
|
import { KeyToDidDocArgs } from '../types'
|
|
4
6
|
|
|
@@ -12,7 +14,7 @@ export const keyToDidDoc = ({ pubKeyBytes, fingerprint }: KeyToDidDocArgs): DIDD
|
|
|
12
14
|
id: keyId,
|
|
13
15
|
type: 'Secp256k1VerificationKey2018',
|
|
14
16
|
controller: did,
|
|
15
|
-
publicKeyBase58:
|
|
17
|
+
publicKeyBase58: toString(pubKeyBytes, 'base58btc'),
|
|
16
18
|
},
|
|
17
19
|
],
|
|
18
20
|
authentication: [keyId],
|
package/src/drivers/secp256r1.ts
CHANGED
|
@@ -1,9 +1,10 @@
|
|
|
1
1
|
// Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
|
|
2
2
|
|
|
3
|
-
import * as u8a from 'uint8arrays'
|
|
4
|
-
|
|
5
3
|
import * as nist_weierstrauss from 'nist-weierstrauss'
|
|
6
4
|
import { base64urlPoint } from 'nist-weierstrauss'
|
|
5
|
+
// @ts-ignore
|
|
6
|
+
import * as u8a from 'uint8arrays'
|
|
7
|
+
const { fromString } = u8a
|
|
7
8
|
import { KeyToDidDocArgs } from '../types'
|
|
8
9
|
|
|
9
10
|
/**
|
|
@@ -70,7 +71,7 @@ export function pubKeyBytesToXY(pubKeyBytes: Uint8Array): base64urlPoint {
|
|
|
70
71
|
// compressed p-256 key, SEC format
|
|
71
72
|
if (bytesCount == 33) {
|
|
72
73
|
if (publicKeyHex.slice(0, 2) == '03' || publicKeyHex.slice(0, 2) == '02') {
|
|
73
|
-
const publicKey =
|
|
74
|
+
const publicKey = fromString(publicKeyHex, 'base16')
|
|
74
75
|
const point = nist_weierstrauss.secp256r1.ECPointDecompress(publicKey)
|
|
75
76
|
return nist_weierstrauss.nist_weierstrauss_common.publicKeyIntToXY(point)
|
|
76
77
|
}
|
package/src/drivers/secp384r1.ts
CHANGED
|
@@ -1,6 +1,8 @@
|
|
|
1
1
|
// Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
|
|
2
2
|
|
|
3
|
+
// @ts-ignore
|
|
3
4
|
import * as u8a from 'uint8arrays'
|
|
5
|
+
const { fromString } = u8a
|
|
4
6
|
|
|
5
7
|
import * as nist_weierstrauss from 'nist-weierstrauss'
|
|
6
8
|
import { base64urlPoint } from 'nist-weierstrauss'
|
|
@@ -70,7 +72,7 @@ export function pubKeyBytesToXY(pubKeyBytes: Uint8Array): base64urlPoint {
|
|
|
70
72
|
// compressed p-384 key, SEC format
|
|
71
73
|
if (bytesCount == 49) {
|
|
72
74
|
if (publicKeyHex.slice(0, 2) == '03' || publicKeyHex.slice(0, 2) == '02') {
|
|
73
|
-
const publicKey =
|
|
75
|
+
const publicKey = fromString(publicKeyHex, 'base16')
|
|
74
76
|
const point = nist_weierstrauss.secp384r1.ECPointDecompress(publicKey)
|
|
75
77
|
return nist_weierstrauss.nist_weierstrauss_common.publicKeyIntToXY(point)
|
|
76
78
|
}
|
package/src/drivers/secp521r1.ts
CHANGED
|
@@ -1,6 +1,8 @@
|
|
|
1
1
|
// Brent Shambaugh <brent.shambaugh@gmail.com>. 2021.
|
|
2
2
|
|
|
3
|
+
// @ts-ignore
|
|
3
4
|
import * as u8a from 'uint8arrays'
|
|
5
|
+
const { fromString } = u8a
|
|
4
6
|
|
|
5
7
|
import * as nist_weierstrauss from 'nist-weierstrauss'
|
|
6
8
|
import { base64urlPoint } from 'nist-weierstrauss'
|
|
@@ -56,7 +58,7 @@ export function pubKeyBytesToXY(pubKeyBytes: Uint8Array): base64urlPoint {
|
|
|
56
58
|
// publicKeyHex.length / 2.0 = 67.0 bytes
|
|
57
59
|
if (132 <= publicKeyHex.length && publicKeyHex.length <= 134) {
|
|
58
60
|
if (publicKeyHex.slice(0, 2) == '03' || publicKeyHex.slice(0, 2) == '02') {
|
|
59
|
-
const publicKey =
|
|
61
|
+
const publicKey = fromString(publicKeyHex, 'base16')
|
|
60
62
|
const point = nist_weierstrauss.secp521r1.ECPointDecompress(publicKey)
|
|
61
63
|
return nist_weierstrauss.nist_weierstrauss_common.publicKeyIntToXY(point)
|
|
62
64
|
}
|
package/src/index.ts
CHANGED
|
@@ -1,8 +0,0 @@
|
|
|
1
|
-
import { DIDDocument } from 'did-resolver';
|
|
2
|
-
import { KeyToDidDocArgs } from '../index';
|
|
3
|
-
export declare const keyToDidDoc: ({ pubKeyBytes, fingerprint }: KeyToDidDocArgs) => DIDDocument;
|
|
4
|
-
declare const _default: {
|
|
5
|
-
keyToDidDoc: ({ pubKeyBytes, fingerprint }: KeyToDidDocArgs) => DIDDocument;
|
|
6
|
-
};
|
|
7
|
-
export default _default;
|
|
8
|
-
//# sourceMappingURL=bls12381g2.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"bls12381g2.d.ts","sourceRoot":"","sources":["../../src/drivers/bls12381g2.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,WAAW,EAAE,MAAM,cAAc,CAAA;AAE1C,OAAO,EAAE,eAAe,EAAE,MAAM,UAAU,CAAA;AAE1C,eAAO,MAAM,WAAW,iCAAkC,eAAe,KAAG,WAkB3E,CAAA;;gDAlByD,eAAe,KAAG,WAAW;;AAmBvF,wBAA8B"}
|
|
@@ -1,49 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
-
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
-
}) : function(o, v) {
|
|
16
|
-
o["default"] = v;
|
|
17
|
-
});
|
|
18
|
-
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
-
if (mod && mod.__esModule) return mod;
|
|
20
|
-
var result = {};
|
|
21
|
-
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
-
__setModuleDefault(result, mod);
|
|
23
|
-
return result;
|
|
24
|
-
};
|
|
25
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
26
|
-
exports.keyToDidDoc = void 0;
|
|
27
|
-
const u8a = __importStar(require("uint8arrays"));
|
|
28
|
-
const keyToDidDoc = ({ pubKeyBytes, fingerprint }) => {
|
|
29
|
-
const did = `did:key:${fingerprint}`;
|
|
30
|
-
const keyId = `${did}#${fingerprint}`;
|
|
31
|
-
return {
|
|
32
|
-
id: did,
|
|
33
|
-
verificationMethod: [
|
|
34
|
-
{
|
|
35
|
-
id: keyId,
|
|
36
|
-
type: 'Bls12381G2Key2020',
|
|
37
|
-
controller: did,
|
|
38
|
-
publicKeyBase58: u8a.toString(pubKeyBytes, 'base58btc'),
|
|
39
|
-
},
|
|
40
|
-
],
|
|
41
|
-
authentication: [keyId],
|
|
42
|
-
assertionMethod: [keyId],
|
|
43
|
-
capabilityDelegation: [keyId],
|
|
44
|
-
capabilityInvocation: [keyId],
|
|
45
|
-
};
|
|
46
|
-
};
|
|
47
|
-
exports.keyToDidDoc = keyToDidDoc;
|
|
48
|
-
exports.default = { keyToDidDoc: exports.keyToDidDoc };
|
|
49
|
-
//# sourceMappingURL=bls12381g2.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"bls12381g2.js","sourceRoot":"","sources":["../../src/drivers/bls12381g2.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;AACA,iDAAkC;AAG3B,MAAM,WAAW,GAAG,CAAC,EAAE,WAAW,EAAE,WAAW,EAAmB,EAAe,EAAE;IACxF,MAAM,GAAG,GAAG,WAAW,WAAW,EAAE,CAAA;IACpC,MAAM,KAAK,GAAG,GAAG,GAAG,IAAI,WAAW,EAAE,CAAA;IACrC,OAAO;QACL,EAAE,EAAE,GAAG;QACP,kBAAkB,EAAE;YAClB;gBACE,EAAE,EAAE,KAAK;gBACT,IAAI,EAAE,mBAAmB;gBACzB,UAAU,EAAE,GAAG;gBACf,eAAe,EAAE,GAAG,CAAC,QAAQ,CAAC,WAAW,EAAE,WAAW,CAAC;aACxD;SACF;QACD,cAAc,EAAE,CAAC,KAAK,CAAC;QACvB,eAAe,EAAE,CAAC,KAAK,CAAC;QACxB,oBAAoB,EAAE,CAAC,KAAK,CAAC;QAC7B,oBAAoB,EAAE,CAAC,KAAK,CAAC;KAC9B,CAAA;AACH,CAAC,CAAA;AAlBY,QAAA,WAAW,eAkBvB;AACD,kBAAe,EAAE,WAAW,EAAX,mBAAW,EAAE,CAAA"}
|
|
@@ -1,8 +0,0 @@
|
|
|
1
|
-
import { DIDDocument } from 'did-resolver';
|
|
2
|
-
import { KeyToDidDocArgs } from '../types';
|
|
3
|
-
export declare const keyToDidDoc: (args: KeyToDidDocArgs) => DIDDocument;
|
|
4
|
-
declare const _default: {
|
|
5
|
-
keyToDidDoc: (args: KeyToDidDocArgs) => DIDDocument;
|
|
6
|
-
};
|
|
7
|
-
export default _default;
|
|
8
|
-
//# sourceMappingURL=ed25519.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"ed25519.d.ts","sourceRoot":"","sources":["../../src/drivers/ed25519.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,WAAW,EAAE,MAAM,cAAc,CAAA;AAG1C,OAAO,EAAe,eAAe,EAAE,MAAM,UAAU,CAAA;AAYvD,eAAO,MAAM,WAAW,SAAU,eAAe,gBAgBhD,CAAA;;wBAhBiC,eAAe;;AAkGjD,wBAA8B"}
|