-
Notifications
You must be signed in to change notification settings - Fork 18
feat: add sd-jwt with jades support package #280
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from all commits
419c7c0
1819578
0e88f26
a2d916e
be72583
6fecc90
bbfdeab
48a8579
73b6016
f66b394
730a53b
8b25d7b
f8e7051
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
# Change Log | ||
|
||
All notable changes to this project will be documented in this file. | ||
See [Conventional Commits](https://conventionalcommits.org) for commit guidelines. | ||
|
||
## [0.1.2](https://github.com/lukasjhan/sd-jwt-vc-dm-owf/compare/v0.1.1...v0.1.2) (2025-02-09) | ||
|
||
**Note:** Version bump only for package sd-jwt-jades | ||
|
||
|
||
|
||
|
||
|
||
## 0.1.1 (2025-02-09) | ||
|
||
**Note:** Version bump only for package jades |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,210 @@ | ||
# SD JWT VC + JAdES Typescript | ||
|
||
> ⚠️ **Platform Support**: This package currently supports Node.js environments only. | ||
|
||
Typescript implementation of SD JWT VCDM profile. | ||
|
||
A library that integrates SD-JWT with W3C Verifiable Credentials Data Model and implements JAdES digital signature standards. | ||
|
||
## Features | ||
|
||
### JAdES Digital Signature Integration | ||
|
||
Implements JAdES (JSON Advanced Electronic Signatures) standard for SD-JWT with support for the following signature profiles: | ||
|
||
- **B-B (Basic - Baseline)**: Basic signature format | ||
- **B-T (Basic with Time)**: Signatures with timestamp | ||
- **B-LT (Basic Long-Term)**: Signatures with validation data for long-term preservation | ||
- **B-LTA (Basic Long-Term with Archive timestamps)**: Long-term preservation with periodic timestamp renewal | ||
|
||
## Installation | ||
|
||
```bash | ||
pnpm add @sd-jwt/jades | ||
``` | ||
|
||
## Usage | ||
|
||
### B-B | ||
|
||
```typescript | ||
import { JAdES, parseCerts, createKidFromCert } from '@sd-jwt/jades'; | ||
import * as fs from 'fs'; | ||
import { createPrivateKey } from 'node:crypto'; | ||
|
||
(async () => { | ||
const jades = new JAdES.Sign({ data: 'data 1', target: 'data 2' }); | ||
|
||
const certPem = fs.readFileSync('./fixtures/certificate.crt', 'utf-8'); | ||
const certs = parseCerts(certPem); | ||
const kid = createKidFromCert(certs[0]); | ||
|
||
const keyPem = fs.readFileSync('./fixtures/private.pem', 'utf-8'); | ||
const privateKey = createPrivateKey(keyPem); | ||
|
||
await jades | ||
.setProtectedHeader({ | ||
alg: 'RS256', | ||
typ: 'dc+sd-jwt', | ||
}) | ||
.setX5c(certs) | ||
.setDisclosureFrame({ | ||
_sd: ['data'], | ||
}) | ||
.setSignedAt() | ||
.sign(privateKey, kid); | ||
|
||
const serialized = jades.toJSON(); | ||
console.log(serialized); | ||
})(); | ||
``` | ||
|
||
### B-T | ||
|
||
```typescript | ||
import { JAdES, parseCerts, createKidFromCert } from '@sd-jwt/jades'; | ||
import * as fs from 'fs'; | ||
import { createPrivateKey } from 'node:crypto'; | ||
|
||
(async () => { | ||
const jades = new JAdES.Sign({ data: 'data 1', target: 'data 2' }); | ||
|
||
const certPem = fs.readFileSync('./fixtures/certificate.crt', 'utf-8'); | ||
const certs = parseCerts(certPem); | ||
const kid = createKidFromCert(certs[0]); | ||
|
||
const keyPem = fs.readFileSync('./fixtures/private.pem', 'utf-8'); | ||
const privateKey = createPrivateKey(keyPem); | ||
|
||
await jades | ||
.setProtectedHeader({ | ||
alg: 'RS256', | ||
typ: 'dc+sd-jwt', | ||
}) | ||
.setX5c(certs) | ||
.setDisclosureFrame({ | ||
_sd: ['data'], | ||
}) | ||
.setSignedAt() | ||
.setUnprotectedHeader({ | ||
etsiU: [ | ||
{ | ||
sigTst: { | ||
tstTokens: [ | ||
{ | ||
val: 'Base64-encoded RFC 3161 Timestamp Token', | ||
}, | ||
], | ||
}, | ||
}, | ||
], | ||
}) | ||
.sign(privateKey, kid); | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Is it also possible to get the hash so I do not need to pass the private key? In most situations when using JADES, the key is managed in an HSM. So we need to receive the values to sign it. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Oh I see, I didn't think about use cases with HSM. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. It could be implemented like: https://github.com/Xevolab/jades/blob/7f5bef00a57bef16514e988c3160ff655bde1761/src/classes/Token.ts#L97 There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I see, I'll add that function :) |
||
|
||
const serialized = jades.toJSON(); | ||
console.log(serialized); | ||
})(); | ||
``` | ||
|
||
### B-LT | ||
|
||
```typescript | ||
import { JAdES, parseCerts, createKidFromCert } from '@sd-jwt/jades'; | ||
import * as fs from 'fs'; | ||
import { createPrivateKey } from 'node:crypto'; | ||
|
||
(async () => { | ||
const jades = new JAdES.Sign({ data: 'data 1', target: 'data 2' }); | ||
|
||
const certPem = fs.readFileSync('./fixtures/certificate.crt', 'utf-8'); | ||
const certs = parseCerts(certPem); | ||
const kid = createKidFromCert(certs[0]); | ||
|
||
const keyPem = fs.readFileSync('./fixtures/private.pem', 'utf-8'); | ||
const privateKey = createPrivateKey(keyPem); | ||
|
||
await jades | ||
.setProtectedHeader({ | ||
alg: 'RS256', | ||
typ: 'dc+sd-jwt', | ||
}) | ||
.setX5c(certs) | ||
.setDisclosureFrame({ | ||
_sd: ['data'], | ||
}) | ||
.setSignedAt() | ||
.setUnprotectedHeader({ | ||
etsiU: [ | ||
{ | ||
sigTst: { | ||
tstTokens: [ | ||
{ | ||
val: 'Base64-encoded RFC 3161 Timestamp Token', | ||
}, | ||
], | ||
}, | ||
}, | ||
{ | ||
xVals: [ | ||
{ x509Cert: 'Base64-encoded Trust Anchor' }, | ||
{ x509Cert: 'Base64-encoded CA Certificate' }, | ||
], | ||
}, | ||
{ | ||
rVals: { | ||
crlVals: ['Base64-encoded CRL'], | ||
ocspVals: ['Base64-encoded OCSP Response'], | ||
}, | ||
}, | ||
], | ||
}) | ||
.sign(privateKey, kid); | ||
|
||
const serialized = jades.toJSON(); | ||
console.log(serialized); | ||
})(); | ||
``` | ||
|
||
### B-LTA | ||
|
||
```typescript | ||
import { JAdES, parseCerts, createKidFromCert } from '@sd-jwt/jades'; | ||
import * as fs from 'fs'; | ||
import { createPrivateKey } from 'node:crypto'; | ||
|
||
(async () => { | ||
const jades = new JAdES.Sign({ data: 'data 1', target: 'data 2' }); | ||
|
||
const certPem = fs.readFileSync('./fixtures/certificate.crt', 'utf-8'); | ||
const certs = parseCerts(certPem); | ||
const kid = createKidFromCert(certs[0]); | ||
|
||
const keyPem = fs.readFileSync('./fixtures/private.pem', 'utf-8'); | ||
const privateKey = createPrivateKey(keyPem); | ||
|
||
await jades | ||
.setProtectedHeader({ | ||
alg: 'RS256', | ||
typ: 'dc+sd-jwt', | ||
}) | ||
.setX5c(certs) | ||
.setDisclosureFrame({ | ||
_sd: ['data'], | ||
}) | ||
.setSignedAt() | ||
.sign(privateKey, kid); | ||
|
||
const serialized = jades.toJSON(); | ||
console.log(serialized); | ||
})(); | ||
``` | ||
|
||
## License | ||
|
||
Apache License 2.0 | ||
|
||
## References | ||
|
||
- [SD-JWT VC Data Model](https://github.com/danielfett/sd-jwt-vc-dm) | ||
- [OpenID4VC HAIP Profile](https://github.com/openid/oid4vc-haip/pull/147/files#diff-762ef65fd82909517226ac1bb7e8855792bb57021abc1637c15b8557154dbbf1) | ||
- [ETSI TS 119 182-1 - JAdES Baseline Signatures](https://www.etsi.org/deliver/etsi_ts/119100_119199/11918201/01.02.01_60/ts_11918201v010201p.pdf) |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,55 @@ | ||
{ | ||
"name": "sd-jwt-jades", | ||
"version": "0.1.2", | ||
"description": "JADES implementation in typescript", | ||
"main": "dist/index.js", | ||
"module": "dist/index.mjs", | ||
"types": "dist/index.d.ts", | ||
"exports": { | ||
".": { | ||
"import": "./dist/index.mjs", | ||
"require": "./dist/index.js" | ||
} | ||
}, | ||
"scripts": { | ||
"build": "rm -rf **/dist && tsup", | ||
"lint": "biome lint ./src", | ||
"test": "pnpm run test:node && pnpm run test:browser && pnpm run test:cov", | ||
"test:node": "vitest run ./src/test/*.spec.ts", | ||
"test:browser": "vitest run ./src/test/*.spec.ts --environment jsdom", | ||
"test:cov": "vitest run --coverage" | ||
}, | ||
"keywords": [ | ||
"jades", | ||
"sd-jwt", | ||
"jwt" | ||
], | ||
"engines": { | ||
"node": ">=16" | ||
}, | ||
"author": "Lukas.J.Han <[email protected]>", | ||
"license": "Apache-2.0", | ||
"publishConfig": { | ||
"access": "public" | ||
}, | ||
"tsup": { | ||
"entry": [ | ||
"./src/index.ts" | ||
], | ||
"sourceMap": true, | ||
"splitting": false, | ||
"clean": true, | ||
"dts": true, | ||
"format": [ | ||
"cjs", | ||
"esm" | ||
] | ||
}, | ||
"dependencies": { | ||
"@sd-jwt/core": "workspace:*", | ||
"@sd-jwt/crypto-nodejs": "workspace:*", | ||
"@sd-jwt/types": "workspace:*", | ||
"@sd-jwt/utils": "workspace:*", | ||
"asn1js": "^3.0.5" | ||
} | ||
} |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
import { constants } from 'node:crypto'; | ||
|
||
export const ALGORITHMS = { | ||
// RSA | ||
RS256: { hash: 'sha256', padding: constants.RSA_PKCS1_PADDING }, | ||
RS384: { hash: 'sha384', padding: constants.RSA_PKCS1_PADDING }, | ||
RS512: { hash: 'sha512', padding: constants.RSA_PKCS1_PADDING }, | ||
|
||
// RSA-PSS | ||
PS256: { hash: 'sha256', padding: constants.RSA_PKCS1_PSS_PADDING }, | ||
PS384: { hash: 'sha384', padding: constants.RSA_PKCS1_PSS_PADDING }, | ||
PS512: { hash: 'sha512', padding: constants.RSA_PKCS1_PSS_PADDING }, | ||
|
||
// ECDSA | ||
ES256: { hash: 'sha256', namedCurve: 'P-256' }, | ||
ES384: { hash: 'sha384', namedCurve: 'P-384' }, | ||
ES512: { hash: 'sha512', namedCurve: 'P-521' }, | ||
}; | ||
|
||
export enum CommitmentOIDs { | ||
proofOfOrigin = '1.2.840.113549.1.9.16.6.1', | ||
proofOfReceipt = '1.2.840.113549.1.9.16.6.2', | ||
proofOfDelivery = '1.2.840.113549.1.9.16.6.3', | ||
proofOfSender = '1.2.840.113549.1.9.16.6.4', | ||
proofOfApproval = '1.2.840.113549.1.9.16.6.5', | ||
proofOfCreation = '1.2.840.113549.1.9.16.6.6', | ||
} |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,8 @@ | ||
import { Sign } from './sign'; | ||
export * from './type'; | ||
export * from './constant'; | ||
export * from './utils'; | ||
|
||
export const JAdES = { | ||
Sign, | ||
}; |
Uh oh!
There was an error while loading. Please reload this page.