···5959 return err
6060 }
61616262- k, err := oauth.ParseJWKFromBytes(b)
6262+ k, err := helpers.ParseJWKFromBytes(b)
6363 if err != nil {
6464 return err
6565 }
···6969 return err
7070 }
71717272- return e.JSON(200, oauth.CreateJwksResponseObject(pubKey))
7272+ return e.JSON(200, helpers.CreateJwksResponseObject(pubKey))
7373}
7474```
7575···9090 return err
9191}
92929393-k, err := oauth.ParseJWKFromBytes(b)
9393+k, err := helpers.ParseJWKFromBytes(b)
9494if err != nil {
9595 return err
9696}
97979898-cli, err := oauth.NewClient(oauth.ClientArgs{
9898+cli, err := helpers.NewClient(oauth.ClientArgs{
9999 ClientJwk: k,
100100 ClientId: clientId,
101101 RedirectUri: callbackUrl,
···147147You'll need to create a private DPoP JWK for the user before directing them to their PDS to authenticate. You'll need to store this in a later step, and you will need to pass it along inside the PAR request, so go ahead and marshal it as well.
148148149149```go
150150-k, err := oauth.GenerateKey(nil)
150150+k, err := helpers.GenerateKey(nil)
151151if err != nil {
152152 return err
153153}
···268268oauthSession, err := s.getOauthSession(e.Request().Context(), did)
269269270270// Parse the user's JWK to pass into arguments
271271-privateJwk, err := oauth.ParseJWKFromBytes([]byte(oauthSession.DpopPrivateJwk))
271271+privateJwk, err := helpers.ParseJWKFromBytes([]byte(oauthSession.DpopPrivateJwk))
272272if err != nil {
273273 return nil, false, err
274274}