-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
JWS Algorithms EdDSA, none #162
Comments
None should be easy and EdDSA would be something beside ECDSA. There are some technical details I'm not sure of, but it should be doable |
Hi @nodh The actual credential issuer uses mostlyES256 (https://issuer-backend.eudiw.dev/.well-known/openid-credential-issuer) The authorization server does advertise more algorithms but I think we can remove them, since they aren't essential (for the credential issuer). If that's the case you can file an issue https://github.com/eu-digital-identity-wallet/eudi-srv-pid-issuer |
@babisRoutis Thanks for your comment. We've worked around this issue in https://github.com/a-sit-plus/vck by deserializing strings first, and parse them to algorithms afterwards. I think that's more future proof. |
i still thinks it's a good idea to keep this one open, because we will need that anyways at some point |
We'll want to parse the EUDIW Reference Backend Issuer metadata located at https://auth.eudiw.dev/realms/pid-issuer-realm/.well-known/openid-configuration in VC-K. It contains the JWS algorithms
EdDSA
andnone
, but those aren't implemented in signum.Both values don't fit into the current layout easily, how to proceed?
The text was updated successfully, but these errors were encountered: