Skip to content

Commit 635cb04

Browse files
committed
fix: lang fix
1 parent 88a20a8 commit 635cb04

File tree

1 file changed

+1
-2
lines changed

1 file changed

+1
-2
lines changed

openid4vc-high-assurance-interoperability-profile-1_0.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -250,8 +250,7 @@ The following requirements apply to OpenID for Verifiable Presentations, irrespe
250250
* The DCQL query and response as defined in Section 6 of [@!OIDF.OID4VP] MUST be used.
251251
* Response encryption MUST be performed as specified in [@!OIDF.OID4VP, section 8.3]. The JWE `alg` (algorithm) header parameter (see [@!RFC7516, section 4.1.1])
252252
value `ECDH-ES` (as defined in [@!RFC7518, section 4.6]), with key agreement utilizing keys on the `P-256` curve (see [@!RFC7518, section 6.2.1.1]) MUST be supported.
253-
Furthermore, Verifiers MUST include `A128GCM` and `A256GCM` in `encrypted_response_enc_values_supported` in the client metadata. Wallets MUST support `A128GCM` or `A256GCM`, or both. If both are supported, the Wallet SHOULD use A256GCM for response encryption.
254-
The JWE `enc` (encryption algorithm) header parameter (see [@!RFC7516, section 4.1.2]) value `A128GCM` and `A256GCM` (as defined in [@!RFC7518, section 5.3]) MUST be supported by Verifiers. Wallets MUST support `A128GCM` or `A256GCM`, or both. If Verifiers include `encrypted_response_enc_values_supported` in their client metadata, they MUST list both `A128GCM` and `A256GCM`.
253+
The JWE `enc` (encryption algorithm) header parameter (see [@!RFC7516, section 4.1.2]) value `A128GCM` and `A256GCM` (as defined in [@!RFC7518, section 5.3]) MUST be supported by Verifiers. Wallets MUST support `A128GCM` or `A256GCM`, or both. If both are supported, the Wallet SHOULD use `A256GCM` for the JWE `enc`. If Verifiers include `encrypted_response_enc_values_supported` in their client metadata, they MUST list both `A128GCM` and `A256GCM`.
255254
* Verifiers MUST supply ephemeral encryption public keys specific to each Authorization Request passed via client metadata as specified in Section 8.3 of [@!OIDF.OID4VP].
256255
* The Authority Key Identifier (`aki`)-based Trusted Authority Query (`trusted_authorities`) for DCQL, as defined in section 6.1.1.1 of [@!OIDF.OID4VP], MUST be supported. Note that the Authority Key Identifiers mechanism can be used to support multiple X.509-based trust mechanisms, such as ISO mDL VICAL (as introduced in [@ISO.18013-5]) or ETSI Trusted Lists [@ETSI.TL]. This is achieved by collecting the relevant X.509 certificates for the trusted Issuers and including the encoded Key Identifiers from the certificates in the `aki` array .
257256

0 commit comments

Comments
 (0)