· 7 years ago · Jul 07, 2018, 05:18 PM
1diff --git b/index.js a/index.js
2old mode 100755
3new mode 100644
4index 4a7dbc7..0706e0e
5--- b/index.js
6+++ a/index.js
7@@ -2,37 +2,37 @@ var nacl = require("tweetnacl");
8 var bs58 = require("bs58");
9
10
11-var fromSeed = function(seed){
12+var fromSeed = function (kSeed) {
13
14- var x = nacl.sign.keyPair.fromSeed(seed);
15- var secretKey = x.secretKey.subarray(0, 32);
16- var signKey = bs58.encode(secretKey);
17- var keyPair = nacl.box.keyPair.fromSecretKey(secretKey);
18+ var KepX = nacl.sign.keyPair.fromSeed(kSeed);
19+ var secKey = KepX.secretKey.subarray(0, 32);
20+ var kSigKey = bs58.encode(secKey);
21+ var keyPair = nacl.box.keyPair.fromSecretKey(secKey);
22
23 return {
24
25- did: bs58.encode(x.publicKey.subarray(0, 16)),
26- verifyKey: bs58.encode(x.publicKey),
27- encryptionPublicKey: bs58.encode(keyPair.publicKey),
28+ kID: bs58.encode(KepX.publicKey.subarray(0, 16)),
29+ kVKey: bs58.encode(KepX.publicKey),
30+ uniKey: bs58.encode(keyPair.publicKey),
31
32 secret: {
33- seed: Buffer.from(seed).toString("hex"),
34- signKey: signKey,
35- encryptionPrivateKey: bs58.encode(keyPair.secretKey),
36+ kSeed: Buffer.from(kSeed).toString("hex"),
37+ kSigKey: kSigKey,
38+ secKey: bs58.encode(keyPair.secretKey),
39 },
40 };
41 };
42
43-var verifySignedMessage = function(signedMessage, verifyKey) {
44- var decodedKey = bs58.decode(verifyKey);
45+var verifySignedMessage = function (signedMessage, kVKey) {
46+ var decodedKey = bs58.decode(kVKey);
47 var signed = nacl.sign.open(signedMessage, decodedKey);
48 return signed !== null ? new Buffer(signed).toString("utf8") : false;
49 };
50
51-var signMessage = function(message, signKey, verifyKey) {
52- verifyKey = bs58.decode(verifyKey);
53- signKey = bs58.decode(signKey);
54- var fullSignKey = Buffer.concat([signKey, verifyKey]);
55+var signMessage = function (message, kSigKey, kVKey) {
56+ kVKey = bs58.decode(kVKey);
57+ kSigKey = bs58.decode(kSigKey);
58+ var fullSignKey = Buffer.concat([kSigKey, kVKey]);
59 var arrayMessage = Buffer.from(message, "utf8");
60 return nacl.sign(arrayMessage, fullSignKey);
61 };
62@@ -41,33 +41,33 @@ function getArrayFromKey(key) {
63 return Uint8Array.from(bs58.decode(key));
64 }
65
66-var getNonce = function () {
67+var getKNonce = function () {
68 return nacl.randomBytes(nacl.box.nonceLength);
69 };
70
71-var getKeyPairFromSignKey = function (signKey) {
72- return nacl.box.keyPair.fromSecretKey(getArrayFromKey(signKey));
73+var getKeyPairFromSignKey = function (kSigKey) {
74+ return nacl.box.keyPair.fromSecretKey(getArrayFromKey(kSigKey));
75 };
76
77-var getSharedSecret = function (theirVerifyKey, mySigningKey) {
78- theirVerifyKey = typeof theirVerifyKey === "string" ? bs58.decode(theirVerifyKey) : theirVerifyKey;
79- mySigningKey = typeof mySigningKey === "string" ? bs58.decode(mySigningKey) : mySigningKey;
80- return nacl.box.before(theirVerifyKey, mySigningKey)
81+var getSharedSecret = function (theirKVKey, myKSigKey) {
82+ theirKVKey = typeof theirKVKey === "string" ? bs58.decode(theirKVKey) : theirKVKey;
83+ myKSigKey = typeof myKSigKey === "string" ? bs58.decode(myKSigKey) : myKSigKey;
84+ return nacl.box.before(theirKVKey, myKSigKey)
85 };
86
87-var decryptMessage = function (encryptedMessage, nonce, sharedSecret) {
88- var verifiedEncrypTion = nacl.box.open.after(encryptedMessage, nonce, sharedSecret);
89+var decryptMessage = function (encryptedMessage, kNonce, sharedSecret) {
90+ var verifiedEncrypTion = nacl.box.open.after(encryptedMessage, kNonce, sharedSecret);
91 return verifiedEncrypTion !== null ? new Buffer(verifiedEncrypTion).toString("utf8") : false;
92 };
93
94-var encryptMessage = function (message, nonce, sharedSecret) {
95- return nacl.box.after(Buffer.from(message, "utf8"), nonce, sharedSecret);
96+var encryptMessage = function (message, kNonce, sharedSecret) {
97+ return nacl.box.after(Buffer.from(message, "utf8"), kNonce, sharedSecret);
98 };
99
100 module.exports = {
101- gen: function(){
102- var seed = nacl.randomBytes(nacl.sign.seedLength);
103- return fromSeed(seed);
104+ goKep: function () {
105+ var kSeed = nacl.randomBytes(nacl.sign.seedLength);
106+ return fromSeed(kSeed);
107 },
108 fromSeed: fromSeed,
109 signMessage: signMessage,
110@@ -76,5 +76,5 @@ module.exports = {
111 getSharedSecret: getSharedSecret,
112 decryptMessage: decryptMessage,
113 encryptMessage: encryptMessage,
114- getNonce: getNonce,
115+ getKNonce: getKNonce,
116 };
117diff --git b/package.json a/package.json
118old mode 100755
119new mode 100644
120index b34d076..dd2efa0
121--- b/package.json
122+++ a/package.json
123@@ -1,7 +1,7 @@
124 {
125- "name": "sovrin-did",
126- "version": "1.3.0",
127- "description": "node.js module to generate DID and Ed25519 keys to use with Sovrin",
128+ "name": "kepler-keys",
129+ "version": "1.0.0",
130+ "description": "Kepler's Javascript-based Cryptography Library For The Bench Network.",
131 "main": "index.js",
132 "scripts": {
133 "start": "onchange -i *.js -- npm test -s",
134@@ -9,23 +9,23 @@
135 },
136 "repository": {
137 "type": "git",
138- "url": "git+https://github.com/Picolab/node-sovrin-did.git"
139+ "url": "git+https://github.com/benchlab/KeplerKeys.git"
140 },
141 "keywords": [
142- "sovrin",
143- "crypto",
144- "cryptography",
145- "signatures",
146- "did",
147- "decentralized",
148- "identity"
149+ "bench-network",
150+ "bench-crypto",
151+ "bench-cryptography",
152+ "bench-signatures",
153+ "ed25519",
154+ "bench-identity",
155+ "kepler-service"
156 ],
157- "author": "Picolab",
158- "license": "MIT",
159+ "author": "Jared Rice Sr.",
160+ "license": "BENCH",
161 "bugs": {
162- "url": "https://github.com/Picolab/node-sovrin-did/issues"
163+ "url": "https://github.com/benchlab/KeplerKeys/issues"
164 },
165- "homepage": "https://github.com/Picolab/node-sovrin-did#readme",
166+ "homepage": "https://github.com/benchlab/KeplerKeys#readme",
167 "devDependencies": {
168 "onchange": "^3.2.1",
169 "tape": "^4.8.0"
170diff --git b/tests.js a/tests.js
171old mode 100755
172new mode 100644
173index 20f84cd..9ccc1ab
174--- b/tests.js
175+++ a/tests.js
176@@ -1,119 +1,119 @@
177 var test = require("tape");
178 var nacl = require("tweetnacl");
179-var sovrinDID = require("./");
180+var kID = require("./");
181
182-test("sovrinDID.fromSeed(seed)", function(t){
183+test("kID.fromSeed(kSeed)", function(t){
184
185 var tst = function(seed_hex, expected){
186- var seed = Buffer.from(seed_hex, "hex");
187- var r = sovrinDID.fromSeed(seed);
188+ var kSeed = Buffer.from(seed_hex, "hex");
189+ var r = kID.fromSeed(kSeed);
190 t.deepEquals(r, expected);
191 };
192
193- tst("3b75434f4fb431bfcdd1d7f3e0544fde12e5bb7d19b36a7f6cffe1a0bf1fd8ff", {
194+ tst("a95e58d4b13ae0904f216d7b6c88dbfd786d7c860476769fccc78a56b7168711", {
195
196- did: "jbJWZXeXSsD5o1iWhYGFc",
197- verifyKey: "QDQ7Y69yg6eeJNstq62rXw8mK8HmnnsocPwvo9DU2tS",
198- encryptionPublicKey: "C2CLejK2c3SC9Rz4JLFuNtWJM8WDRq2CEMJuRqaJvr35",
199+ kID: "4jifBtJ25m8jizVRzoAGS2",
200+ kVKey: "337tgZ21yZDNCW2iYkDH53fFM7twpZxJEw677eu1VFRA",
201+ uniKey: "AuHAYMqugn1oq6YKcpAMcuY3pguz8imt6bZMeSDkeBKt",
202
203 secret: {
204- seed: "3b75434f4fb431bfcdd1d7f3e0544fde12e5bb7d19b36a7f6cffe1a0bf1fd8ff",
205- signKey: "516mChDX1BRjwHJc2w838W8cXxy8a6Eb35HKXjPR2fD8",
206- encryptionPrivateKey: "516mChDX1BRjwHJc2w838W8cXxy8a6Eb35HKXjPR2fD8",
207+ kSeed: "a95e58d4b13ae0904f216d7b6c88dbfd786d7c860476769fccc78a56b7168711",
208+ kSigKey: "CQ9Lq6R4iFVzKnjTSJUivBFtvyE7JXTKQKdDJVVN5HXN",
209+ secKey: "CQ9Lq6R4iFVzKnjTSJUivBFtvyE7JXTKQKdDJVVN5HXN",
210 },
211 });
212
213- tst("5d40a10e4723a41216f98a3cc4c1082a4fa51a0ffa6196960ad931efe654dd2e", {
214+ tst("8fab3b922700b431ddc41216a1abc98ab666b77da36d95ed70d7f78ce7229dc1", {
215
216- did: "E7cwAzuB9kSU3mj2n9p97P",
217- verifyKey: "89ZgeKmTktxWg9UrGFzL2PbcHrToKNMPpLQtjbh17pfT",
218- encryptionPublicKey: "5UAXeov4Gi7ioSTLDoMPtdvqX6RRmJcQAWagVgdaxUej",
219+ kID: "6KqxGE5L3nSjgXZdgwY6si",
220+ kVKey: "3uLAkanKNzXGhz22juSiKJVEs1MbcdHuRELV9rnaRjwb",
221+ uniKey: "Dm5KMsm79RHiGKJAZhnyW1B8fE6cz92dFAWgowZ3UJ8v",
222
223 secret: {
224- seed: "5d40a10e4723a41216f98a3cc4c1082a4fa51a0ffa6196960ad931efe654dd2e",
225- signKey: "7H25Jfb2ND51hhaomL5FPhhqQvBGujd1jJeSjZZ8HQzR",
226- encryptionPrivateKey: "7H25Jfb2ND51hhaomL5FPhhqQvBGujd1jJeSjZZ8HQzR",
227+ kSeed: "8fab3b922700b431ddc41216a1abc98ab666b77da36d95ed70d7f78ce7229dc1",
228+ kSigKey: "Afpjuqz38PjtbusCsZvkRJdSbByZnvV26EbKKQPfbF84",
229+ secKey: "Afpjuqz38PjtbusCsZvkRJdSbByZnvV26EbKKQPfbF84",
230 },
231 });
232
233- tst("7cb46171cd7a9bf9440e9c74c0752b37ae89b72184bb6693d8dc73752078ea0f", {
234+ tst("95ccb459d36317f64611319b4b202e3d862214ac010f5a2cd86ff9b48acd1d80", {
235
236- did: "TvqM6vQHEZb4EDYkfUVVUp",
237- verifyKey: "FgFdznhQTymQEBKNoboDLKDGWB7eezrhvKKQK2uKUSU5",
238- encryptionPublicKey: "3mosoLnk91yNrGga3vJtLaFNXf9yi85gSNisMT643HyH",
239+ kID: "V6sM3cECR2YHGALtv7E8uf",
240+ kVKey: "GKLLoefDxVEK6UKpmKMJ9UwNALFEBhaA4JcSPM3vRosm",
241+ uniKey: "HENTdXzShzPGMgaukyNhgqtvGJgoFQS9phZy9Y5CLFBg",
242
243 secret: {
244- seed: "7cb46171cd7a9bf9440e9c74c0752b37ae89b72184bb6693d8dc73752078ea0f",
245- signKey: "9Po5sqUto67MYFyfXXgV3PwvXoRxCfEXpSoMKn1eFtcv",
246- encryptionPrivateKey: "9Po5sqUto67MYFyfXXgV3PwvXoRxCfEXpSoMKn1eFtcv",
247+ kSeed: "95ccb459d36317f64611319b4b202e3d862214ac010f5a2cd86ff9b48acd1d80",
248+ kSigKey: "B5knk43jCGberzaUwkn5PJ7jY8XRpPk5BZHhuBMdprzT",
249+ secKey: "B5knk43jCGberzaUwkn5PJ7jY8XRpPk5BZHhuBMdprzT",
250 },
251 });
252
253- tst("35604fb84e67d18a76b956d1cbf9ba7384994c3fba1e140ba95928cc98823058", {
254+ tst("337765fd4629cd4955f13605851fd2faaca57a3c4da0051da3ca3fbe06f5125a", {
255
256- did: "MAF6ioWmybYvjYU2HD9oBE",
257- verifyKey: "BzH5a2wLEyKxySUALpfBiBjHZtZudCG68J17QwWkRsdN",
258- encryptionPublicKey: "7QhcMiFkfZLf6TScAucX2kw3A9561MHMukWUhnsSzba8",
259+ kID: "PVCYTeW3mecQsfNcNFFjPv",
260+ kVKey: "DFqJVtSdMtAJP29LQ9vPjZbbt1Z2if71H7nMAMcKkmHs",
261+ uniKey: "Eivy5nCEe9BZqd8a9yidBGDLAvrvdMJSUYKU5SWCmC4X",
262
263 secret: {
264- seed: "35604fb84e67d18a76b956d1cbf9ba7384994c3fba1e140ba95928cc98823058",
265- signKey: "4bMnc36WuLYJqsWTZtiazJJrtkvPwgyWnirn7gKk7ium",
266- encryptionPrivateKey: "4bMnc36WuLYJqsWTZtiazJJrtkvPwgyWnirn7gKk7ium",
267+ kSeed: "337765fd4629cd4955f13605851fd2faaca57a3c4da0051da3ca3fbe06f5125a",
268+ kSigKey: "4TuPa3QgeKmChACiQYWv6JkQWD9HDu78BFqirGaVt3iq",
269+ secKey: "4TuPa3QgeKmChACiQYWv6JkQWD9HDu78BFqirGaVt3iq",
270 },
271 });
272
273 t.end();
274 });
275
276-test("sovrinDID.gen()", function(t){
277+test("kID.goKep()", function(t){
278
279- var g1 = sovrinDID.gen();
280- var seed = Buffer.from(g1.secret.seed, "hex");
281+ var g1 = kID.goKep();
282+ var kSeed = Buffer.from(g1.secret.kSeed, "hex");
283
284- t.deepEquals(sovrinDID.fromSeed(seed), g1, "gen should just wrap .fromSeed(seed)");
285+ t.deepEquals(kID.fromSeed(kSeed), g1, "goKep should just wrap .fromSeed(kSeed)");
286
287- t.notEquals(g1.secret.seed, sovrinDID.gen().secret.seed);
288- t.notEquals(g1.secret.seed, sovrinDID.gen().secret.seed);
289- t.notEquals(g1.secret.seed, sovrinDID.gen().secret.seed);
290+ t.notEquals(g1.secret.kSeed, kID.goKep().secret.kSeed);
291+ t.notEquals(g1.secret.kSeed, kID.goKep().secret.kSeed);
292+ t.notEquals(g1.secret.kSeed, kID.goKep().secret.kSeed);
293
294 t.end();
295 });
296
297-test("sovrinDID.signMessage(message, signKey, verifyKey)", function(t) {
298+test("kID.signMessage(message, kSigKey, kVKey)", function(t) {
299
300- var signKey = "4bMnc36WuLYJqsWTZtiazJJrtkvPwgyWnirn7gKk7ium";
301- var verifyKey = "BzH5a2wLEyKxySUALpfBiBjHZtZudCG68J17QwWkRsdN";
302- var message = "Hello World!!";
303+ var kSigKey = "8F6Ub3U7a7sG14mGftYXcwAYU1h7x3KEaxjwLRTpwhp9";
304+ var kVKey = "CAvg8J3mR73uYMbwzxmsvHwBPfEDXqBMWhnLZ9fhBNWx";
305+ var message = "One Major Step.";
306
307- var signedMessage = sovrinDID.signMessage(message, signKey, verifyKey);
308+ var signedMessage = kID.signMessage(message, kSigKey, kVKey);
309 t.notEqual(message, signedMessage);
310 t.end();
311 });
312
313-test("sovrinDID.verifySignedMessage(signedMessage, verifyKey)", function(t) {
314+test("kID.verifySignedMessage(signedMessage, kVKey)", function(t) {
315
316- var signKey = "4bMnc36WuLYJqsWTZtiazJJrtkvPwgyWnirn7gKk7ium";
317- var verifyKey = "BzH5a2wLEyKxySUALpfBiBjHZtZudCG68J17QwWkRsdN";
318- var verifyKey2 = "QDQ7Y69yg6eeJNstq62rXw8mK8HmnnsocPwvo9DU2tS";
319- var signKey2 = "516mChDX1BRjwHJc2w838W8cXxy8a6Eb35HKXjPR2fD8";
320- var message = "Hello World!!";
321- var message2 = "I want to take over the world!!";
322+ var kSigKey = "6i3CZj7MHrfuCJ3T1twdvWaKEkThAdFDxq6Tia1HCvWc";
323+ var kVKey = "4AfKzGmumQhA87VuGmftJrsJVzFGutKRoWQsoxVmpLRY";
324+ var kVKey2 = "34Nj6TtcUjknrBH2vuBeNdsrngm8PqHp2x336otsya2r";
325+ var kSigKey2 = "8dchV2pWzR4g3SwYiaQyYbHN5qCFgQNLuMdSUwcPpGop";
326+ var message = "One small step.";
327+ var message2 = "For mankind.";
328
329- var signedMessage = sovrinDID.signMessage(message, signKey, verifyKey);
330- var signedMessage2 = sovrinDID.signMessage(message2, signKey2, verifyKey2);
331+ var signedMessage = kID.signMessage(message, kSigKey, kVKey);
332+ var signedMessage2 = kID.signMessage(message2, kSigKey2, kVKey2);
333
334- t.equal(sovrinDID.verifySignedMessage(signedMessage, verifyKey), message);
335- t.equal(sovrinDID.verifySignedMessage(signedMessage, verifyKey2), false);
336+ t.equal(kID.verifySignedMessage(signedMessage, kVKey), message);
337+ t.equal(kID.verifySignedMessage(signedMessage, kVKey2), false);
338
339- t.equal(sovrinDID.verifySignedMessage(signedMessage2, verifyKey2), message2);
340- t.equal(sovrinDID.verifySignedMessage(signedMessage2, verifyKey), false);
341+ t.equal(kID.verifySignedMessage(signedMessage2, kVKey2), message2);
342+ t.equal(kID.verifySignedMessage(signedMessage2, kVKey), false);
343
344 t.end();
345 });
346
347-test("sovrinDID.getKeyPairFromSignKey(signKey)", function(t) {
348- var signKey = "4bMnc36WuLYJqsWTZtiazJJrtkvPwgyWnirn7gKk7ium";
349- var keyPair = sovrinDID.getKeyPairFromSignKey(signKey);
350+test("kID.getKeyPairFromSignKey(kSigKey)", function(t) {
351+ var kSigKey = "Dsc4doSuoqTBUTuJuWGDSMeD2cG6fcSBNwwMRL6hHghi";
352+ var keyPair = kID.getKeyPairFromSignKey(kSigKey);
353
354 t.equal(keyPair.publicKey.length, 32);
355 t.equal(keyPair.secretKey.length, 32);
356@@ -121,27 +121,27 @@ test("sovrinDID.getKeyPairFromSignKey(signKey)", function(t) {
357 t.end();
358 });
359
360-test("sovrinDID.getSharedSecret(theirVerifyKey, mySigningKey)", function(t) {
361- var signKey1 = "4bMnc36WuLYJqsWTZtiazJJrtkvPwgyWnirn7gKk7ium";
362- var signKey2 = "516mChDX1BRjwHJc2w838W8cXxy8a6Eb35HKXjPR2fD8";
363- var signKey3 = "7H25Jfb2ND51hhaomL5FPhhqQvBGujd1jJeSjZZ8HQzR";
364+test("kID.getSharedSecret(theirKVKey, myKSigKey)", function(t) {
365+ var kSigKey1 = "NfwG9qyKa4VEaf3ZXrsjTv7wBReoibWEPkMXhSkc1CX";
366+ var kSigKey2 = "DM5Kp4RdmDCP5Gj9cEsdb79wDoQGr3ZaFTxtLXF97t26";
367+ var kSigKey3 = "7LYwAW3HmZaB2ATsvYh2cxfwMQfsp9FcyCiy8p56KVCu";
368
369- var keyPair1 = sovrinDID.getKeyPairFromSignKey(signKey1);
370- var keyPair2 = sovrinDID.getKeyPairFromSignKey(signKey2);
371- var keyPair3 = sovrinDID.getKeyPairFromSignKey(signKey3);
372+ var keyPair1 = kID.getKeyPairFromSignKey(kSigKey1);
373+ var keyPair2 = kID.getKeyPairFromSignKey(kSigKey2);
374+ var keyPair3 = kID.getKeyPairFromSignKey(kSigKey3);
375
376- var sovrin1 = sovrinDID.gen();
377- var sovrin2 = sovrinDID.gen();
378+ var k1 = kID.goKep();
379+ var k2 = kID.goKep();
380
381 // Create shared secrets from the string version of the keys
382- var sharedSecret1 = sovrinDID.getSharedSecret(sovrin2.encryptionPublicKey, sovrin1.secret.encryptionPrivateKey);
383- var sharedSecret2 = sovrinDID.getSharedSecret(sovrin1.encryptionPublicKey, sovrin2.secret.encryptionPrivateKey);
384+ var sharedSecret1 = kID.getSharedSecret(k2.uniKey, k1.secret.secKey);
385+ var sharedSecret2 = kID.getSharedSecret(k1.uniKey, k2.secret.secKey);
386 t.equal(nacl.verify(sharedSecret1, sharedSecret2), true);
387
388
389- var sharedSecret1To2 = sovrinDID.getSharedSecret(keyPair2.publicKey, keyPair1.secretKey);
390- var sharedSecret2To1 = sovrinDID.getSharedSecret(keyPair1.publicKey, keyPair2.secretKey);
391- var sharedSecret3To1 = sovrinDID.getSharedSecret(keyPair3.publicKey, keyPair1.secretKey);
392+ var sharedSecret1To2 = kID.getSharedSecret(keyPair2.publicKey, keyPair1.secretKey);
393+ var sharedSecret2To1 = kID.getSharedSecret(keyPair1.publicKey, keyPair2.secretKey);
394+ var sharedSecret3To1 = kID.getSharedSecret(keyPair3.publicKey, keyPair1.secretKey);
395
396 t.equal(nacl.verify(sharedSecret1To2, sharedSecret2To1), true);
397 t.equal(nacl.verify(sharedSecret3To1, sharedSecret2To1), false);
398@@ -149,43 +149,43 @@ test("sovrinDID.getSharedSecret(theirVerifyKey, mySigningKey)", function(t) {
399 t.end();
400 });
401
402-test("sovrinDID.encryptMessage(message, nonce, sharedSecret)", function (t) {
403- var signKey1 = "4bMnc36WuLYJqsWTZtiazJJrtkvPwgyWnirn7gKk7ium";
404- var signKey2 = "516mChDX1BRjwHJc2w838W8cXxy8a6Eb35HKXjPR2fD8";
405+test("kID.encryptMessage(message, kNonce, sharedSecret)", function (t) {
406+ var kSigKey1 = "3cXULEbf8eeVqnzHTACY7HaV1irxo5fdMVXUjgEcbcS8";
407+ var kSigKey2 = "CHrWt1DVXqCNxJWWP7RhQBvcsp6MMLavaEmpC7aVFp1D";
408
409- var keyPair1 = sovrinDID.getKeyPairFromSignKey(signKey1);
410- var keyPair2 = sovrinDID.getKeyPairFromSignKey(signKey2);
411+ var keyPair1 = kID.getKeyPairFromSignKey(kSigKey1);
412+ var keyPair2 = kID.getKeyPairFromSignKey(kSigKey2);
413
414- var sharedSecret1To2 = sovrinDID.getSharedSecret(keyPair2.publicKey, keyPair1.secretKey);
415+ var sharedSecret1To2 = kID.getSharedSecret(keyPair2.publicKey, keyPair1.secretKey);
416
417 var message = "Hello World!!";
418- var nonce = sovrinDID.getNonce();
419- var encryptedMessage = sovrinDID.encryptMessage(message, nonce, sharedSecret1To2);
420+ var kNonce = kID.getKNonce();
421+ var encryptedMessage = kID.encryptMessage(message, kNonce, sharedSecret1To2);
422
423 t.notEqual(message, encryptedMessage);
424
425 t.end();
426 });
427
428-test("sovrinDID.decryptMessage(theirVerifyKey, mySigningKey", function(t) {
429- var signKey1 = "4bMnc36WuLYJqsWTZtiazJJrtkvPwgyWnirn7gKk7ium";
430- var signKey2 = "516mChDX1BRjwHJc2w838W8cXxy8a6Eb35HKXjPR2fD8";
431- var signKey3 = "7H25Jfb2ND51hhaomL5FPhhqQvBGujd1jJeSjZZ8HQzR";
432+test("kID.decryptMessage(theirKVKey, myKSigKey", function(t) {
433+ var kSigKey1 = "6Z6cHSL6Y7TmaBHfQWVCiaLkN1EH9podPGfjT8wv7mEh";
434+ var kSigKey2 = "1KfYMpmNMFMTWxT1NZFrTbrxQoyBEM4WGcD8Ha7V9K7";
435+ var kSigKey3 = "ENQB8LowXPk1X3MNyLPDC98b6bd4BQ5Q3nwpWmTQ5gcE";
436
437- var keyPair1 = sovrinDID.getKeyPairFromSignKey(signKey1);
438- var keyPair2 = sovrinDID.getKeyPairFromSignKey(signKey2);
439- var keyPair3 = sovrinDID.getKeyPairFromSignKey(signKey3);
440+ var keyPair1 = kID.getKeyPairFromSignKey(kSigKey1);
441+ var keyPair2 = kID.getKeyPairFromSignKey(kSigKey2);
442+ var keyPair3 = kID.getKeyPairFromSignKey(kSigKey3);
443
444- var sharedSecret1To2 = sovrinDID.getSharedSecret(keyPair2.publicKey, keyPair1.secretKey);
445- var sharedSecret2To1 = sovrinDID.getSharedSecret(keyPair1.publicKey, keyPair2.secretKey);
446- var sharedSecret3To1 = sovrinDID.getSharedSecret(keyPair3.publicKey, keyPair1.secretKey);
447+ var sharedSecret1To2 = kID.getSharedSecret(keyPair2.publicKey, keyPair1.secretKey);
448+ var sharedSecret2To1 = kID.getSharedSecret(keyPair1.publicKey, keyPair2.secretKey);
449+ var sharedSecret3To1 = kID.getSharedSecret(keyPair3.publicKey, keyPair1.secretKey);
450
451- var message = "Hello World!!";
452- var nonce = sovrinDID.getNonce();
453+ var message = "One small step.";
454+ var kNonce = kID.getKNonce();
455
456- var encryptedMessage = sovrinDID.encryptMessage(message, nonce, sharedSecret1To2);
457- var decryptedMessage = sovrinDID.decryptMessage(encryptedMessage, nonce, sharedSecret2To1);
458- var attemptedDecryption = sovrinDID.decryptMessage(encryptedMessage, nonce, sharedSecret3To1);
459+ var encryptedMessage = kID.encryptMessage(message, kNonce, sharedSecret1To2);
460+ var decryptedMessage = kID.decryptMessage(encryptedMessage, kNonce, sharedSecret2To1);
461+ var attemptedDecryption = kID.decryptMessage(encryptedMessage, kNonce, sharedSecret3To1);
462
463 t.equal(decryptedMessage, message);
464 t.notEqual(message, attemptedDecryption);