New Case Study:See how Anthropic automated 95% of dependency reviews with Socket.Learn More

@notabene/pii-sdk

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@notabene/pii-sdk - npm Package Compare versions

Comparing version

to
1.16.2

var $iyY9t$ethersprojectbytes = require("@ethersproject/bytes");
var $iyY9t$noblecurvesed25519 = require("@noble/curves/ed25519");
var $iyY9t$stablelibed25519 = require("@stablelib/ed25519");
var $iyY9t$transmutedidkeyed25519 = require("@transmute/did-key-ed25519");
var $iyY9t$base64url = require("base64url");
var $iyY9t$bs58 = require("bs58");
var $iyY9t$crypto = require("crypto");
var $iyY9t$didjwt = require("did-jwt");

@@ -56,3 +55,2 @@ var $iyY9t$multibase = require("multibase");

class $a9e8dc10b29de72d$export$7a95228d63ff9c73 extends Error {

@@ -64,7 +62,2 @@ constructor(message){

}
class $a9e8dc10b29de72d$export$965207dcc8e85742 extends $a9e8dc10b29de72d$export$7a95228d63ff9c73 {
constructor(){
super("Failed to generate private keypair");
}
}
class $a9e8dc10b29de72d$export$6056393a42e6200 extends $a9e8dc10b29de72d$export$7a95228d63ff9c73 {

@@ -92,5 +85,2 @@ constructor(){

function $cfd6274aae82b2e8$var$base58ToBytes(s) {
return (0, ($parcel$interopDefault($iyY9t$bs58))).decode(s);
}
function $cfd6274aae82b2e8$var$decodeJoseBlob(blob) {

@@ -105,7 +95,7 @@ return JSON.parse(Buffer.from((0, ($parcel$interopDefault($iyY9t$base64url))).decode(blob), "utf-8").toString());

async function $cfd6274aae82b2e8$var$computeRecipient(didkey) {
const { didDocument: didDocument } = await $iyY9t$transmutedidkeyed25519.resolve(didkey);
const pubk = didDocument.verificationMethod[0].publicKeyBase58;
const publicKeyBytes = await $cfd6274aae82b2e8$var$base58ToBytes(pubk);
const publicKeyHex = Buffer.from(await $cfd6274aae82b2e8$var$base58ToBytes(pubk)).toString("hex");
const kid = didDocument.id + "#" + $cfd6274aae82b2e8$var$convertPublicKeyToX25519Kid(publicKeyHex);
// decode did:key public key
didkey = didkey.split("#")[0]; // sanitize potential anchors
const publicKeyBytes = (0, ($parcel$interopDefault($iyY9t$bs58))).decode(didkey.replace("did:key:z", "")).slice(2);
const publicKeyHex = Buffer.from(publicKeyBytes).toString("hex");
const kid = didkey + "#" + $cfd6274aae82b2e8$var$convertPublicKeyToX25519Kid(publicKeyHex);
return {

@@ -119,9 +109,13 @@ kid: kid,

async createKey() {
const kp = await $iyY9t$transmutedidkeyed25519.Ed25519KeyPair.generate({
secureRandom: ()=>(0, ($parcel$interopDefault($iyY9t$crypto))).randomBytes(32)
});
if (!kp.privateKey) throw new (0, $a9e8dc10b29de72d$export$965207dcc8e85742)();
const did = kp.controller;
const publicKeyHex = Buffer.from(kp.publicKey).toString("hex");
const privateKeyHex = Buffer.from(kp.privateKey).toString("hex");
// We replaced "@transmute/did-key-ed25519" by "@noble/curves/ed25519", below is the did:key generation part
const priv = (0, $iyY9t$noblecurvesed25519.ed25519).utils.randomPrivateKey();
const privateKeyHex = Buffer.from(priv).toString("hex");
const pub = (0, $iyY9t$noblecurvesed25519.ed25519).getPublicKey(priv);
const publicKeyHex = Buffer.from(pub).toString("hex");
const buffer = new Uint8Array(2 + pub.length);
buffer[0] = 237; // ED25519_MULTICODEC_IDENTIFIER;
buffer[1] = 1; // VARIABLE_INTEGER_TRAILING_BYTE;
buffer.set(pub, 2);
const fingerprint = `z${(0, ($parcel$interopDefault($iyY9t$bs58))).encode(buffer)}`;
const did = `did:key:${fingerprint}`;
return {

@@ -142,3 +136,3 @@ did: did,

kms: "local",
privateKeyHex: privateKeyHex
privateKeyHex: privateKeyHex + publicKeyHex
}

@@ -145,0 +139,0 @@ ],

@@ -11,3 +11,3 @@ {

"license": "MIT",
"version": "1.16.1",
"version": "1.16.2",
"packageManager": "yarn@3.2.2",

@@ -87,4 +87,4 @@ "source": "./src/index.ts",

"@ethersproject/bytes": "5.7.0",
"@noble/curves": "^1.1.0",
"@stablelib/ed25519": "1.0.3",
"@transmute/did-key-ed25519": "0.3.0-unstable.10",
"axios": "^0.27.2",

@@ -91,0 +91,0 @@ "axios-oauth-client": "^1.5.0",