Skip to content

Commit a93a5f3

Browse files
authored
Test vectors and Explanatory Text (#12)
* Added raw test vector files and directories. * Update some of the raw test vector files. Add in examples referencing raw test vector files. * Start adding explanatory text to test vector examples. * Finish initial test vector explanatory text and edit previous test vector explanatory text. * remove intermediate test vector files.
1 parent a303ba2 commit a93a5f3

19 files changed

Lines changed: 486 additions & 50 deletions

index.html

Lines changed: 145 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -1915,97 +1915,192 @@ <h2>Privacy Considerations</h2>
19151915
<h2>Test Vectors</h2>
19161916
<section>
19171917
<h4>Test Vector Common Inputs</h4>
1918-
<p class="ednote">Proof Options, Unsigned Document will be shown here.
1919-
</p>
1920-
<p class="ednote">Test vector "outputs" for common algorithms are reused
1921-
as inputs to cyphersuite specific test vectors.
1918+
<p>
1919+
Inputs used in two or more test vectors are given in this section. They include
1920+
the unsigned document, general proof options, and cryptographic keys.
19221921
</p>
1923-
</section>
1924-
<section>
1925-
<h4>Common Algorithms: Proof Configuration</h4>
1922+
19261923
<section>
1927-
<h5>Proof Configuration (`rdfc`, `sha-256`)</h5>
1924+
<h5>Unsecured Data Document</h5>
1925+
<p>
1926+
The common <a>unsecured data document</a> used for generating all test vectors
1927+
that require this input is given below.
1928+
</p>
1929+
<pre class="example nohighlight" title="Unsigned Document"
1930+
data-include="testVectors/inputs/employmentAuth.json"
1931+
data-include-format="text">
19281932
</section>
19291933
<section>
1930-
<h5>Proof Configuration (`rdfc`, `sha-384`)</h5>
1934+
<h5>Proof Options</h5>
1935+
<p>
1936+
A general template for the <em>proof options</em> used by test vectors that
1937+
require this input is given below.
1938+
</p>
1939+
<pre class="example nohighlight" title="Proof Options (general)"
1940+
data-include="testVectors/inputs/proofOptions-general.json"
1941+
data-include-format="text">
1942+
</pre>
1943+
<p>
1944+
For each specific test case the `cryptosuite` and `verificationMethod` fields
1945+
need to be set. For example, for the `slhdsa128-rdfc-2024` cryptosuite using the
1946+
appropriate public key information from section [[[#TestKeys]]] the specific
1947+
proof options is given below.
1948+
</p>
1949+
<pre class="example nohighlight" title="Proof Options (slhdsa128-rdfc-2024 example)"
1950+
data-include="testVectors/inputs/proofOptions-slhdsa128-rdfc-2024.json"
1951+
data-include-format="text">
1952+
</pre>
19311953
</section>
1954+
1955+
<section id="TestKeys">
1956+
<h5>Example Cryptographic Keys</h5>
1957+
<p>
1958+
Cryptographic keys for used to generate output for specific signature suites are
1959+
given below. This includes public and private (secret) keys in hexadeximal
1960+
format and the public key as a `publicKeyMultibase`.
1961+
</p>
1962+
<pre class="example nohighlight" title="Private and Public keys for ML-DSA-44"
1963+
data-include="testVectors/inputs/KeysMLDSA.json"
1964+
data-include-format="text">
1965+
</pre>
1966+
1967+
<pre class="example nohighlight" title="Private and Public keys for SLH-DSA-SHA2-128s"
1968+
data-include="testVectors/inputs/KeysSLHDSA.json"
1969+
data-include-format="text">
1970+
</pre>
1971+
</section>
1972+
</section>
1973+
<section>
1974+
<h4>Common Algorithms: Proof Configuration</h4>
1975+
<p>
1976+
The Proof Configuration algorithm output is dependent on the specific <em>proof
1977+
options</em> as well as the parameters, hence an output test vector for Proof
1978+
Configuration is given for each supported `cyphersuite`.
1979+
</p>
19321980
<section>
1933-
<h5>Proof Configuration (`rdfc`, `sha-512`)</h5>
1981+
<h5>Proof Configuration (`rdfc`, `sha-256`)</h5>
1982+
<pre class="example nohighlight" title="Proof Configuration mldsa44-rdfc-2024"
1983+
data-include="testVectors/commonAlgs/proofConfig-mldsa44-rdfc-2024.txt"
1984+
data-include-format="text">
1985+
</pre>
1986+
1987+
<pre class="example nohighlight" title="Proof Configuration slhdsa128-rdfc-2024"
1988+
data-include="testVectors/commonAlgs/proofConfig-slhdsa128-rdfc-2024.txt"
1989+
data-include-format="text">
1990+
</pre>
19341991
</section>
19351992
<section>
19361993
<h5>Proof Configuration (`jcs`)</h5>
1994+
1995+
<pre class="example nohighlight" title="Proof Configuration mldsa44-jcs-2024"
1996+
data-include="testVectors/commonAlgs/proofConfig-mldsa44-jcs-2024.txt"
1997+
data-include-format="text">
1998+
</pre>
1999+
2000+
<pre class="example nohighlight" title="Proof Configuration slhdsa128-jcs-2024"
2001+
data-include="testVectors/commonAlgs/proofConfig-slhdsa128-jcs-2024.txt"
2002+
data-include-format="text">
2003+
</pre>
19372004
</section>
19382005
</section>
19392006
<section>
19402007
<h4>Common Algorithms: Transform</h4>
2008+
<p>
2009+
In addition to the common <a>unsecured data document</a> the Transform algorithm
2010+
takes parameters |canonScheme| and |hashName|. Only in the case of |canonScheme|
2011+
equal to `rdfc` does the |hashName| parameter matter. This is reflected in the
2012+
set of Transformation output test vectors given below.
2013+
</p>
19412014
<section>
19422015
<h5>Transform (`rdfc`, `sha-256`)</h5>
2016+
<pre class="example nohighlight" title="Transform RDFC, SHA-256"
2017+
data-include="testVectors/commonAlgs/transform-rdfc-sha256.txt"
2018+
data-include-format="text">
2019+
</pre>
19432020
</section>
19442021
<section>
19452022
<h5>Transform (`rdfc`, `sha-384`)</h5>
2023+
<pre class="example nohighlight" title="Transform RDFC, SHA-384"
2024+
data-include="testVectors/commonAlgs/transform-rdfc-sha384.txt"
2025+
data-include-format="text">
2026+
</pre>
19462027
</section>
19472028
<section>
19482029
<h5>Transform (`rdfc`, `sha-512`)</h5>
2030+
<pre class="example nohighlight" title="Transform RDFC, SHA-512"
2031+
data-include="testVectors/commonAlgs/transform-rdfc-sha512.txt"
2032+
data-include-format="text">
2033+
</pre>
19492034
</section>
19502035
<section>
19512036
<h5>Transform (`jcs`)</h5>
2037+
<pre class="example nohighlight" title="Transform JCS"
2038+
data-include="testVectors/commonAlgs/transform-jcs-sha256.txt"
2039+
data-include-format="text">
2040+
</pre>
19522041
</section>
19532042
</section>
19542043
<section>
19552044
<h4>Common Algorithms: Hashing</h4>
1956-
<section>
1957-
<h5>Hashing (`sha-256`)</h5>
1958-
</section>
1959-
<section>
1960-
<h5>Hashing (`sha-384`)</h5>
1961-
</section>
1962-
<section>
1963-
<h5>Hashing (`sha-512`)</h5>
1964-
</section>
2045+
<p>
2046+
The <em>Hashing</em> algorithm takes as inputs the results of the <em>Proof
2047+
Configuration</em> and <em>Transformation</em> algorithms. Since the <em>Proof
2048+
Configuration</em> algorithm output is cyphersuite specific the <em>Hashing</em>
2049+
algorithm output is given for each cyphersuite test case. The <em>Hashing</em>
2050+
output for each cyphersuite test case is given in hexadecimal format below.
2051+
</p>
2052+
<p class="note">
2053+
The first half of the hexadecimal <em>Hashing</em> result is the hash of the
2054+
output of the <em>Proof Configuration</em> algorithm, while the second half of
2055+
the hexidecimal value is the hash of the output from the <em>Transformation</em>
2056+
algorithm and both can be useful information when debugging.
2057+
</p>
2058+
<pre class="example nohighlight" title="Hashing (combined)"
2059+
data-include="testVectors/commonAlgs/hashing-combined.json"
2060+
data-include-format="text">
2061+
</pre>
19652062
</section>
19662063

1967-
<section id="TV-ML-DSA">
1968-
<h4>ML-DSA Cyphersuites</h4>
1969-
<p class="ednote">Only one test vector will be shown for each
1970-
cyphersuite, building on common algorithm outputs.</p>
1971-
<section>
1972-
<h5>ML-DSA Test Vector Key Material</h5>
1973-
</section>
2064+
<section id="TV-Create-Proof">
2065+
<h4>Create Proof</h4>
2066+
<p>
2067+
The <em>Create Proof</em> algorithm output is cyphersuite specific and uses the
2068+
outputs of the <em>Proof Configuration</em>, <em>Transformation</em>,
2069+
<em>Hashing</em>, and <em>Proof Serialization</em> algorithms. The output for
2070+
each cyphersuite test case is given below.
2071+
</p>
2072+
<p class="note">
2073+
The output of the <em>Proof Serialization</em> common algorithm is not given
2074+
separately since it is contained in the `proofValue` attribute in the following
2075+
examples and can be quite lengthy for some quantum safe signature algorithms.
2076+
</p>
19742077
<section>
19752078
<h5>Cyphersuite `mldsa44-rdfc-2024`</h5>
2079+
<pre class="example nohighlight" title="Signed credential `mldsa44-rdfc-2024`"
2080+
data-include="testVectors/mldsa44-rdfc-2024/signed-mldsa44-rdfc-2024.json"
2081+
data-include-format="text">
2082+
</pre>
19762083
</section>
19772084
<section>
19782085
<h5>Cyphersuite `mldsa44-jcs-2024`</h5>
1979-
</section>
1980-
<section>
1981-
<h5>Cyphersuite `mldsa65-rdfc-2024`</h5>
1982-
</section>
1983-
<section>
1984-
<h5>Cyphersuite `mldsa65-jcs-2024`</h5>
1985-
</section>
1986-
<section>
1987-
<h5>Cyphersuite `mldsa87-rdfc-2024`</h5>
1988-
</section>
1989-
<section>
1990-
<h5>Cyphersuite `mldsa87-jcs-2024`</h5>
1991-
</section>
1992-
</section>
1993-
<section>
1994-
<h4>SLH-DSA Cyphersuites</h4>
1995-
<section>
1996-
<h5>SLH-DSA Test Vector Key Material</h5>
2086+
<pre class="example nohighlight" title="Signed credential `mldsa44-jcs-2024`"
2087+
data-include="testVectors/mldsa44-jcs-2024/signed-mldsa44-jcs-2024.json"
2088+
data-include-format="text">
2089+
</pre>
19972090
</section>
19982091
<section>
19992092
<h5>Cyphersuite `slhdsa128-rdfc-2024`</h5>
2093+
<pre class="example nohighlight" title="Signed credential `slhdsa128-rdfc-2024`"
2094+
data-include="testVectors/slhdsa128-rdfc-2024/signed-slhdsa128-rdfc-2024.json"
2095+
data-include-format="text">
2096+
</pre>
20002097
</section>
20012098
<section>
20022099
<h5>Cyphersuite `slhdsa128-jcs-2024`</h5>
2003-
</section>
2004-
<section>
2005-
<h5>Cyphersuite `slhdsa192-rdfc-2024`</h5>
2006-
</section>
2007-
<section>
2008-
<h5>Cyphersuite `slhdsa192-jcs-2024`</h5>
2100+
<pre class="example nohighlight" title="Signed credential `slhdsa128-jcs-2024`"
2101+
data-include="testVectors/slhdsa128-jcs-2024/signed-slhdsa128-jcs-2024.json"
2102+
data-include-format="text">
2103+
</pre>
20092104
</section>
20102105
</section>
20112106
</section>
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"mldsa44-rdfc-2024": "fa074359f280ed66bd74b65c8f644175b2f413e24ef3b917d557b3bc261b28f203f59e5b04ab575b1172cb684f22eede72f0e9033e0b5c67d0e2506768d6ce11",
3+
"mldsa44-jcs-2024": "1f49de8352bfcdef9457b14be9f4375c7288fb914cf1c974eab20f3d145b011a6ca388adaff807c71d063f666548493ba60c8c0fa109b3dd1e2564d61abe09cc",
4+
"slhdsa128-rdfc-2024": "26c114126bfe7aa69e33fe6c66150d816134726e71e3b1ab7f991a132f2b6ef803f59e5b04ab575b1172cb684f22eede72f0e9033e0b5c67d0e2506768d6ce11",
5+
"slhdsa128-jcs-2024": "7cc816b810b96de7a90e38d1ff5bb1666476e1f53a16ea7e14a8447fa5ac34566ca388adaff807c71d063f666548493ba60c8c0fa109b3dd1e2564d61abe09cc"
6+
}
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
{"@context":["https://www.w3.org/ns/credentials/v2","https://w3id.org/citizenship/v4rc1"],"created":"2023-02-24T23:36:38Z","cryptosuite":"mldsa44-jcs-2024","proofPurpose":"assertionMethod","type":"DataIntegrityProof","verificationMethod":"did:key:ukCRKDtY8Do_dXzYGyuX7BY-1dDYM4FuSiw0gFdO-eJXFH0eqlt4_CP4sEISGAzNlKDzLpUJWoInRywXOpd7FCp_QAJAlL7iRo4cepKhzhlq8xt6qd5jkhYF9tNH8z3RGDl9aunNy_06fWLYNScWd5RmGg46Po8T-kIjMMkJftaqqZcGDxktpu9Et2bnaZMx4K98YyG1urUpM9lgvldgg2qv-6XCrm2uXlJ9U-HN4xtQKn4Ug-5xPwbhPGR2pbcBScTFotkhBqLc2eQLL6zPutWF83sSZbOhD_11BjMkeiLyJbMeHCIhz5GDIbPksEFIaSho3MdFo5fpQ8QZoqCit3Jn4ddfuShfIoLU1Hw5EZ0xBiqOU7e-TINd7-7HsgHLmYMGnpqljm1ot3c3cfalYsg87WQuSscO7XNH3Ewa-cgU6Bnj1SGn0plTy6Yq-GxU8XUBPwsK_IoIJbXWC0UD97c9UYpNiZi0-ECnbB-Y5_SM8auMfoIeap_buAOdXlJZmcp8xNCXI59AN9-96Sdhks5L-JmsELzyjAgjqNx8Zt3KPFc2jSwNjDVC1fEa8FdDdDT3WNkF6KTt65lb5_aIkFh20nOvT7kIJcKTgmhRGNJZgGSPYVbMypaQoaac8dtEoQjvYgnO-rM_RcsiWMHNc29br3o5wdiLXdr63MoX1lEWu_THBfeP1JuxrSbUmHOByepWbubbSM4iVQITCxBHZT0Mj2bWwIxd3nZUajzebyEnsfitV01kpzlO7bzY2uxSzyplTkRfppc_7YH0y0PHaggw0cIXNSh73wVqNZmzmJx5W0_akrvy5oSz9ZB1Io2p_fTxzibefwO700bUqbElV_yuCjD7EJ_Hfqbog80y_g9TK6koX7wYwqFNQxBVavKC-HbcT7yPdvzs9hlC2MNWCT3W7gVgeYr4AFgbV9EgMcH0GtJDKYw8vkpB_vTsaSTGZAj3TNKalAwiGO50VAmF5tknF96kOrWmNL0MdkXhnm1vXgDpP68bMt4r2Qr-hNdJ4s3_nqmSDYTnZRA4qjXjrgKQfO19txt0tX7LifE1GZ1bQyS7NqHWXyMEhw6_F8pc_tS16VhvJO_FM7CX51mLLkLCGl7DsmbnEIsVUW9qlCxb6bj53UyijTYdu6uLZW9JISE2B4EevxzwDu9UGcJPHmJYi1rRQAP__jH97GiQC8FvkdAEfKqcwV9jAbBPQPG6lUkBLcoijgR3Bcwd-ta92oeZmcpoJ97PzzBbCL-NrppJ2HHQ1SMsYWoPveZTmZc66YBA0P9YfT4hZ0RQiP2gxB4snTvMFI0Ot6Q2nQ0p5DMxmWqIaCKW53rqn16AVXQeqC2TJjlbjA9sC6pr8GEGY2OQUgEmWu5GmnOSz1lNY7fNHJypChnieI_hyYiy06qouUpoHA5z_IUtfzZoMIG0yJiGUUpF9BJvYChDECCqaUM1kWnO5tKcohSKq5Hqwu_EWDRYF2tj7igSimZkS4Pts41tu8nIaVk5EkzAX9gCR2EX3Lk869mIxSyBS3MyG_NotPcbm6uXDn_YkV5Z0HkxUxYRA9hIG-UhKhK3VOaHZP8GcQN8noOMa2CnPd208X6HOzlIlxs7SRbzppUs_fHN1eROglNy-2oJWGmo-xOy0Qd44TtY0S_bYhu6iH6inrx3-yncSrWFxEiYosvYJD4ZBSyrV4d6UsfeNSHYS0ODTsdPqz4SYTeloZbIx8XWz7fxLXlNyLr3s9tp-Q25f1vTIrmQL"}
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
_:c14n0 <http://purl.org/dc/terms/created> "2023-02-24T23:36:38Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
2+
_:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/security#DataIntegrityProof> .
3+
_:c14n0 <https://w3id.org/security#cryptosuite> "mldsa44-rdfc-2024"^^<https://w3id.org/security#cryptosuiteString> .
4+
_:c14n0 <https://w3id.org/security#proofPurpose> <https://w3id.org/security#assertionMethod> .
5+
_:c14n0 <https://w3id.org/security#verificationMethod> <did:key:ukCRKDtY8Do_dXzYGyuX7BY-1dDYM4FuSiw0gFdO-eJXFH0eqlt4_CP4sEISGAzNlKDzLpUJWoInRywXOpd7FCp_QAJAlL7iRo4cepKhzhlq8xt6qd5jkhYF9tNH8z3RGDl9aunNy_06fWLYNScWd5RmGg46Po8T-kIjMMkJftaqqZcGDxktpu9Et2bnaZMx4K98YyG1urUpM9lgvldgg2qv-6XCrm2uXlJ9U-HN4xtQKn4Ug-5xPwbhPGR2pbcBScTFotkhBqLc2eQLL6zPutWF83sSZbOhD_11BjMkeiLyJbMeHCIhz5GDIbPksEFIaSho3MdFo5fpQ8QZoqCit3Jn4ddfuShfIoLU1Hw5EZ0xBiqOU7e-TINd7-7HsgHLmYMGnpqljm1ot3c3cfalYsg87WQuSscO7XNH3Ewa-cgU6Bnj1SGn0plTy6Yq-GxU8XUBPwsK_IoIJbXWC0UD97c9UYpNiZi0-ECnbB-Y5_SM8auMfoIeap_buAOdXlJZmcp8xNCXI59AN9-96Sdhks5L-JmsELzyjAgjqNx8Zt3KPFc2jSwNjDVC1fEa8FdDdDT3WNkF6KTt65lb5_aIkFh20nOvT7kIJcKTgmhRGNJZgGSPYVbMypaQoaac8dtEoQjvYgnO-rM_RcsiWMHNc29br3o5wdiLXdr63MoX1lEWu_THBfeP1JuxrSbUmHOByepWbubbSM4iVQITCxBHZT0Mj2bWwIxd3nZUajzebyEnsfitV01kpzlO7bzY2uxSzyplTkRfppc_7YH0y0PHaggw0cIXNSh73wVqNZmzmJx5W0_akrvy5oSz9ZB1Io2p_fTxzibefwO700bUqbElV_yuCjD7EJ_Hfqbog80y_g9TK6koX7wYwqFNQxBVavKC-HbcT7yPdvzs9hlC2MNWCT3W7gVgeYr4AFgbV9EgMcH0GtJDKYw8vkpB_vTsaSTGZAj3TNKalAwiGO50VAmF5tknF96kOrWmNL0MdkXhnm1vXgDpP68bMt4r2Qr-hNdJ4s3_nqmSDYTnZRA4qjXjrgKQfO19txt0tX7LifE1GZ1bQyS7NqHWXyMEhw6_F8pc_tS16VhvJO_FM7CX51mLLkLCGl7DsmbnEIsVUW9qlCxb6bj53UyijTYdu6uLZW9JISE2B4EevxzwDu9UGcJPHmJYi1rRQAP__jH97GiQC8FvkdAEfKqcwV9jAbBPQPG6lUkBLcoijgR3Bcwd-ta92oeZmcpoJ97PzzBbCL-NrppJ2HHQ1SMsYWoPveZTmZc66YBA0P9YfT4hZ0RQiP2gxB4snTvMFI0Ot6Q2nQ0p5DMxmWqIaCKW53rqn16AVXQeqC2TJjlbjA9sC6pr8GEGY2OQUgEmWu5GmnOSz1lNY7fNHJypChnieI_hyYiy06qouUpoHA5z_IUtfzZoMIG0yJiGUUpF9BJvYChDECCqaUM1kWnO5tKcohSKq5Hqwu_EWDRYF2tj7igSimZkS4Pts41tu8nIaVk5EkzAX9gCR2EX3Lk869mIxSyBS3MyG_NotPcbm6uXDn_YkV5Z0HkxUxYRA9hIG-UhKhK3VOaHZP8GcQN8noOMa2CnPd208X6HOzlIlxs7SRbzppUs_fHN1eROglNy-2oJWGmo-xOy0Qd44TtY0S_bYhu6iH6inrx3-yncSrWFxEiYosvYJD4ZBSyrV4d6UsfeNSHYS0ODTsdPqz4SYTeloZbIx8XWz7fxLXlNyLr3s9tp-Q25f1vTIrmQL> .
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
{"@context":["https://www.w3.org/ns/credentials/v2","https://www.w3.org/ns/credentials/examples/v2"],"created":"2023-02-24T23:36:38Z","cryptosuite":"slhdsa128-jcs-2024","proofPurpose":"assertionMethod","type":"DataIntegrityProof","verificationMethod":"did:key:uoCRINKVf8moX85R6JlvEIQk6Yp0uhjOB-Pn21k9wfPLpWw"}
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
_:c14n0 <http://purl.org/dc/terms/created> "2023-02-24T23:36:38Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
2+
_:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/security#DataIntegrityProof> .
3+
_:c14n0 <https://w3id.org/security#cryptosuite> "slhdsa128-rdfc-2024"^^<https://w3id.org/security#cryptosuiteString> .
4+
_:c14n0 <https://w3id.org/security#proofPurpose> <https://w3id.org/security#assertionMethod> .
5+
_:c14n0 <https://w3id.org/security#verificationMethod> <did:key:uoCRINKVf8moX85R6JlvEIQk6Yp0uhjOB-Pn21k9wfPLpWw> .
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
{"@context":["https://www.w3.org/ns/credentials/v2","https://w3id.org/citizenship/v4rc1"],"credentialSubject":{"additionalName":"JACOB","birthCountry":"Bahamas","birthDate":"1999-07-17","employmentAuthorizationDocument":{"identifier":"83627465","lprCategory":"C09","lprNumber":"999-999-999","type":"EmploymentAuthorizationDocument"},"familyName":"SMITH","gender":"Male","givenName":"JOHN","image":"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==","residentSince":"2015-01-01","type":["Person","EmployablePerson"]},"description":"Example Employment Authorization Document.","issuer":{"id":"did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76","image":"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg=="},"name":"Employment Authorization Document","type":["VerifiableCredential","EmploymentAuthorizationDocumentCredential"],"validFrom":"2019-12-03T00:00:00Z","validUntil":"2029-12-03T00:00:00Z"}
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
<did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76> <https://schema.org/image> <data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2NgUPr/HwADaAIhG61j/AAAAABJRU5ErkJggg==> .
2+
_:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmploymentAuthorizationDocumentCredential> .
3+
_:c14n0 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://www.w3.org/2018/credentials#VerifiableCredential> .
4+
_:c14n0 <https://schema.org/description> "Example Employment Authorization Document." .
5+
_:c14n0 <https://schema.org/name> "Employment Authorization Document" .
6+
_:c14n0 <https://www.w3.org/2018/credentials#credentialSubject> _:c14n1 .
7+
_:c14n0 <https://www.w3.org/2018/credentials#issuer> <did:key:zDnaegE6RR3atJtHKwTRTWHsJ3kNHqFwv7n9YjTgmU7TyfU76> .
8+
_:c14n0 <https://www.w3.org/2018/credentials#validFrom> "2019-12-03T00:00:00Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
9+
_:c14n0 <https://www.w3.org/2018/credentials#validUntil> "2029-12-03T00:00:00Z"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
10+
_:c14n1 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://schema.org/Person> .
11+
_:c14n1 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmployablePerson> .
12+
_:c14n1 <https://schema.org/additionalName> "JACOB" .
13+
_:c14n1 <https://schema.org/birthDate> "1999-07-17"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
14+
_:c14n1 <https://schema.org/familyName> "SMITH" .
15+
_:c14n1 <https://schema.org/gender> "Male" .
16+
_:c14n1 <https://schema.org/givenName> "JOHN" .
17+
_:c14n1 <https://schema.org/image> <data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAADUlEQVQIW2Ng+M/wHwAEAQH/7yMK/gAAAABJRU5ErkJggg==> .
18+
_:c14n1 <https://w3id.org/citizenship#birthCountry> "Bahamas" .
19+
_:c14n1 <https://w3id.org/citizenship#employmentAuthorizationDocument> _:c14n2 .
20+
_:c14n1 <https://w3id.org/citizenship#residentSince> "2015-01-01"^^<http://www.w3.org/2001/XMLSchema#dateTime> .
21+
_:c14n2 <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <https://w3id.org/citizenship#EmploymentAuthorizationDocument> .
22+
_:c14n2 <https://schema.org/identifier> "83627465" .
23+
_:c14n2 <https://w3id.org/citizenship#lprCategory> "C09" .
24+
_:c14n2 <https://w3id.org/citizenship#lprNumber> "999-999-999" .

0 commit comments

Comments
 (0)