dcql 0.2.22 → 0.3.0-alpha-20250527162348

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.d.mts CHANGED
@@ -95,11 +95,31 @@ declare namespace DcqlMdocPresentation {
95
95
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
96
96
  readonly doctype: v.StringSchema<undefined>;
97
97
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
98
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
99
+ readonly type: v.LiteralSchema<"aki", undefined>;
100
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
101
+ }, undefined>, v.ObjectSchema<{
102
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
103
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
104
+ }, undefined>, v.ObjectSchema<{
105
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
106
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
107
+ }, undefined>], undefined>, undefined>;
98
108
  }, undefined>;
99
109
  const model: Model<v.ObjectSchema<{
100
110
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
101
111
  readonly doctype: v.StringSchema<undefined>;
102
112
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
113
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
114
+ readonly type: v.LiteralSchema<"aki", undefined>;
115
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
116
+ }, undefined>, v.ObjectSchema<{
117
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
118
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
119
+ }, undefined>, v.ObjectSchema<{
120
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
121
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
122
+ }, undefined>], undefined>, undefined>;
103
123
  }, undefined>>;
104
124
  type Model = InferModelTypes<typeof model>;
105
125
  }
@@ -109,23 +129,65 @@ declare namespace DcqlSdJwtVcPresentation {
109
129
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
110
130
  readonly vct: v.StringSchema<undefined>;
111
131
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
132
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
133
+ readonly type: v.LiteralSchema<"aki", undefined>;
134
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
135
+ }, undefined>, v.ObjectSchema<{
136
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
137
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
138
+ }, undefined>, v.ObjectSchema<{
139
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
140
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
141
+ }, undefined>], undefined>, undefined>;
112
142
  }, undefined>;
113
143
  const model: Model<v.ObjectSchema<{
114
144
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
115
145
  readonly vct: v.StringSchema<undefined>;
116
146
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
147
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
148
+ readonly type: v.LiteralSchema<"aki", undefined>;
149
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
150
+ }, undefined>, v.ObjectSchema<{
151
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
152
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
153
+ }, undefined>, v.ObjectSchema<{
154
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
155
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
156
+ }, undefined>], undefined>, undefined>;
117
157
  }, undefined>>;
118
158
  type Model = InferModelTypes<typeof model>;
119
159
  }
120
160
  type DcqlSdJwtVcPresentation = DcqlSdJwtVcPresentation.Model['Output'];
121
161
  declare namespace DcqlW3cVcPresentation {
122
162
  const vModel: v.ObjectSchema<{
123
- readonly credential_format: v.PicklistSchema<["jwt_vc_json-ld", "jwt_vc_json"], undefined>;
163
+ readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
124
164
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
165
+ readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
166
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
167
+ readonly type: v.LiteralSchema<"aki", undefined>;
168
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
169
+ }, undefined>, v.ObjectSchema<{
170
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
171
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
172
+ }, undefined>, v.ObjectSchema<{
173
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
174
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
175
+ }, undefined>], undefined>, undefined>;
125
176
  }, undefined>;
126
177
  const model: Model<v.ObjectSchema<{
127
- readonly credential_format: v.PicklistSchema<["jwt_vc_json-ld", "jwt_vc_json"], undefined>;
178
+ readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
128
179
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
180
+ readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
181
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
182
+ readonly type: v.LiteralSchema<"aki", undefined>;
183
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
184
+ }, undefined>, v.ObjectSchema<{
185
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
186
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
187
+ }, undefined>, v.ObjectSchema<{
188
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
189
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
190
+ }, undefined>], undefined>, undefined>;
129
191
  }, undefined>>;
130
192
  type Model = InferModelTypes<typeof model>;
131
193
  }
@@ -135,13 +197,44 @@ declare namespace DcqlCredentialPresentation {
135
197
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
136
198
  readonly doctype: v.StringSchema<undefined>;
137
199
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
200
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
201
+ readonly type: v.LiteralSchema<"aki", undefined>;
202
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
203
+ }, undefined>, v.ObjectSchema<{
204
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
205
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
206
+ }, undefined>, v.ObjectSchema<{
207
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
208
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
209
+ }, undefined>], undefined>, undefined>;
138
210
  }, undefined>, v.ObjectSchema<{
139
211
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
140
212
  readonly vct: v.StringSchema<undefined>;
141
213
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
214
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
215
+ readonly type: v.LiteralSchema<"aki", undefined>;
216
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
217
+ }, undefined>, v.ObjectSchema<{
218
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
219
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
220
+ }, undefined>, v.ObjectSchema<{
221
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
222
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
223
+ }, undefined>], undefined>, undefined>;
142
224
  }, undefined>, v.ObjectSchema<{
143
- readonly credential_format: v.PicklistSchema<["jwt_vc_json-ld", "jwt_vc_json"], undefined>;
225
+ readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
144
226
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
227
+ readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
228
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
229
+ readonly type: v.LiteralSchema<"aki", undefined>;
230
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
231
+ }, undefined>, v.ObjectSchema<{
232
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
233
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
234
+ }, undefined>, v.ObjectSchema<{
235
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
236
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
237
+ }, undefined>], undefined>, undefined>;
145
238
  }, undefined>], undefined>>;
146
239
  type Model = InferModelTypes<typeof model>;
147
240
  }
@@ -158,13 +251,44 @@ declare namespace DcqlQueryResult {
158
251
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
159
252
  readonly doctype: v.StringSchema<undefined>;
160
253
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
254
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
255
+ readonly type: v.LiteralSchema<"aki", undefined>;
256
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
257
+ }, undefined>, v.ObjectSchema<{
258
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
259
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
260
+ }, undefined>, v.ObjectSchema<{
261
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
262
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
263
+ }, undefined>], undefined>, undefined>;
161
264
  }, undefined>, v.ObjectSchema<{
162
265
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
163
266
  readonly vct: v.StringSchema<undefined>;
164
267
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
268
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
269
+ readonly type: v.LiteralSchema<"aki", undefined>;
270
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
271
+ }, undefined>, v.ObjectSchema<{
272
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
273
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
274
+ }, undefined>, v.ObjectSchema<{
275
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
276
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
277
+ }, undefined>], undefined>, undefined>;
165
278
  }, undefined>, v.ObjectSchema<{
166
- readonly credential_format: v.PicklistSchema<["jwt_vc_json-ld", "jwt_vc_json"], undefined>;
279
+ readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
167
280
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
281
+ readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
282
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
283
+ readonly type: v.LiteralSchema<"aki", undefined>;
284
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
285
+ }, undefined>, v.ObjectSchema<{
286
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
287
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
288
+ }, undefined>, v.ObjectSchema<{
289
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
290
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
291
+ }, undefined>], undefined>, undefined>;
168
292
  }, undefined>], undefined>;
169
293
  }, undefined>, v.ObjectSchema<{
170
294
  readonly success: v.LiteralSchema<false, undefined>;
@@ -182,17 +306,48 @@ declare namespace DcqlQueryResult {
182
306
  [x: string]: unknown;
183
307
  };
184
308
  };
309
+ authority?: {
310
+ type: "aki";
311
+ value: string;
312
+ } | {
313
+ type: "etsi_tl";
314
+ value: string;
315
+ } | {
316
+ type: "openid_federation";
317
+ value: string;
318
+ } | undefined;
185
319
  } | {
186
320
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
187
321
  vct: string;
188
322
  claims: {
189
323
  [x: string]: Json;
190
324
  };
325
+ authority?: {
326
+ type: "aki";
327
+ value: string;
328
+ } | {
329
+ type: "etsi_tl";
330
+ value: string;
331
+ } | {
332
+ type: "openid_federation";
333
+ value: string;
334
+ } | undefined;
191
335
  } | {
192
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
336
+ type: string[];
337
+ credential_format: "ldp_vc" | "jwt_vc_json";
193
338
  claims: {
194
339
  [x: string]: Json;
195
340
  };
341
+ authority?: {
342
+ type: "aki";
343
+ value: string;
344
+ } | {
345
+ type: "etsi_tl";
346
+ value: string;
347
+ } | {
348
+ type: "openid_federation";
349
+ value: string;
350
+ } | undefined;
196
351
  };
197
352
  success: true;
198
353
  typed: true;
@@ -215,17 +370,48 @@ declare namespace DcqlQueryResult {
215
370
  [x: string]: unknown;
216
371
  };
217
372
  };
373
+ authority?: {
374
+ type: "aki";
375
+ value: string;
376
+ } | {
377
+ type: "etsi_tl";
378
+ value: string;
379
+ } | {
380
+ type: "openid_federation";
381
+ value: string;
382
+ } | undefined;
218
383
  } | {
219
384
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
220
385
  vct: string;
221
386
  claims: {
222
387
  [x: string]: Json;
223
388
  };
389
+ authority?: {
390
+ type: "aki";
391
+ value: string;
392
+ } | {
393
+ type: "etsi_tl";
394
+ value: string;
395
+ } | {
396
+ type: "openid_federation";
397
+ value: string;
398
+ } | undefined;
224
399
  } | {
225
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
400
+ type: string[];
401
+ credential_format: "ldp_vc" | "jwt_vc_json";
226
402
  claims: {
227
403
  [x: string]: Json;
228
404
  };
405
+ authority?: {
406
+ type: "aki";
407
+ value: string;
408
+ } | {
409
+ type: "etsi_tl";
410
+ value: string;
411
+ } | {
412
+ type: "openid_federation";
413
+ value: string;
414
+ } | undefined;
229
415
  };
230
416
  success: true;
231
417
  typed: true;
@@ -302,6 +488,22 @@ declare namespace DcqlQueryResult {
302
488
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
303
489
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
304
490
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
491
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
492
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
493
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
494
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
495
+ type: "aki" | "etsi_tl" | "openid_federation";
496
+ values: [string, ...string[]];
497
+ }, ...{
498
+ type: "aki" | "etsi_tl" | "openid_federation";
499
+ values: [string, ...string[]];
500
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
501
+ type: "aki" | "etsi_tl" | "openid_federation";
502
+ values: [string, ...string[]];
503
+ }, ...{
504
+ type: "aki" | "etsi_tl" | "openid_federation";
505
+ values: [string, ...string[]];
506
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
305
507
  }, undefined>, v.ObjectSchema<{
306
508
  readonly format: v.SchemaWithPipe<[v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>, v.DescriptionAction<"vc+sd-jwt" | "dc+sd-jwt", "REQUIRED. A string that specifies the format of the requested Verifiable Credential.">]>;
307
509
  readonly claims: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
@@ -334,8 +536,24 @@ declare namespace DcqlQueryResult {
334
536
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
335
537
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
336
538
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
539
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
540
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
541
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
542
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
543
+ type: "aki" | "etsi_tl" | "openid_federation";
544
+ values: [string, ...string[]];
545
+ }, ...{
546
+ type: "aki" | "etsi_tl" | "openid_federation";
547
+ values: [string, ...string[]];
548
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
549
+ type: "aki" | "etsi_tl" | "openid_federation";
550
+ values: [string, ...string[]];
551
+ }, ...{
552
+ type: "aki" | "etsi_tl" | "openid_federation";
553
+ values: [string, ...string[]];
554
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
337
555
  }, undefined>, v.ObjectSchema<{
338
- readonly format: v.PicklistSchema<["jwt_vc_json", "jwt_vc_json-ld"], undefined>;
556
+ readonly format: v.PicklistSchema<["jwt_vc_json", "ldp_vc"], undefined>;
339
557
  readonly claims: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
340
558
  readonly id: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.DescriptionAction<string | undefined, "A string identifying the particular claim. The value MUST be a non-empty string consisting of alphanumeric, underscore (_) or hyphen (-) characters. Within the particular claims array, the same id MUST NOT be present more than once.">]>;
341
559
  readonly path: v.SchemaWithPipe<[v.ArraySchema<v.UnionSchema<[v.StringSchema<undefined>, v.SchemaWithPipe<[v.NumberSchema<undefined>, v.IntegerAction<number, undefined>, v.MinValueAction<number, 0, undefined>]>, v.NullSchema<undefined>], undefined>, undefined>, v.CustomSchema<[string | number | null, ...(string | number | null)[]], undefined>, v.DescriptionAction<[string | number | null, ...(string | number | null)[]], "A non-empty array representing a claims path pointer that specifies the path to a claim within the Verifiable Credential.">]>;
@@ -349,8 +567,29 @@ declare namespace DcqlQueryResult {
349
567
  values?: (string | number | boolean)[] | undefined;
350
568
  id?: string | undefined;
351
569
  }[]], undefined>]>, undefined>;
570
+ readonly meta: v.SchemaWithPipe<[v.SchemaWithPipe<[v.ObjectSchema<{
571
+ readonly type_values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.StringSchema<undefined>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]], "REQUIRED. An array of string arrays that specifies the fully expanded types (IRIs) after the @context was applied that the Verifier accepts to be presented in the Presentation. Each of the top-level arrays specifies one alternative to match the type values of the Verifiable Credential against. Each inner array specifies a set of fully expanded types that MUST be present in the type property of the Verifiable Credential, regardless of order or the presence of additional types.">]>;
572
+ }, undefined>]>, v.DescriptionAction<{
573
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
574
+ }, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
352
575
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
353
576
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
577
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
578
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
579
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
580
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
581
+ type: "aki" | "etsi_tl" | "openid_federation";
582
+ values: [string, ...string[]];
583
+ }, ...{
584
+ type: "aki" | "etsi_tl" | "openid_federation";
585
+ values: [string, ...string[]];
586
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
587
+ type: "aki" | "etsi_tl" | "openid_federation";
588
+ values: [string, ...string[]];
589
+ }, ...{
590
+ type: "aki" | "etsi_tl" | "openid_federation";
591
+ values: [string, ...string[]];
592
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
354
593
  }, undefined>], undefined>, undefined>, v.CustomSchema<[{
355
594
  id: string;
356
595
  format: "mso_mdoc";
@@ -376,6 +615,13 @@ declare namespace DcqlQueryResult {
376
615
  intent_to_retain?: boolean | undefined;
377
616
  })[]] | undefined;
378
617
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
618
+ trusted_authorities?: [{
619
+ type: "aki" | "etsi_tl" | "openid_federation";
620
+ values: [string, ...string[]];
621
+ }, ...{
622
+ type: "aki" | "etsi_tl" | "openid_federation";
623
+ values: [string, ...string[]];
624
+ }[]] | undefined;
379
625
  meta?: {
380
626
  doctype_value?: string | undefined;
381
627
  } | undefined;
@@ -392,12 +638,22 @@ declare namespace DcqlQueryResult {
392
638
  id?: string | undefined;
393
639
  }[]] | undefined;
394
640
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
641
+ trusted_authorities?: [{
642
+ type: "aki" | "etsi_tl" | "openid_federation";
643
+ values: [string, ...string[]];
644
+ }, ...{
645
+ type: "aki" | "etsi_tl" | "openid_federation";
646
+ values: [string, ...string[]];
647
+ }[]] | undefined;
395
648
  meta?: {
396
649
  vct_values?: string[] | undefined;
397
650
  } | undefined;
398
651
  } | {
399
652
  id: string;
400
- format: "jwt_vc_json-ld" | "jwt_vc_json";
653
+ format: "ldp_vc" | "jwt_vc_json";
654
+ meta: {
655
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
656
+ };
401
657
  claims?: [{
402
658
  path: [string | number | null, ...(string | number | null)[]];
403
659
  values?: (string | number | boolean)[] | undefined;
@@ -408,6 +664,13 @@ declare namespace DcqlQueryResult {
408
664
  id?: string | undefined;
409
665
  }[]] | undefined;
410
666
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
667
+ trusted_authorities?: [{
668
+ type: "aki" | "etsi_tl" | "openid_federation";
669
+ values: [string, ...string[]];
670
+ }, ...{
671
+ type: "aki" | "etsi_tl" | "openid_federation";
672
+ values: [string, ...string[]];
673
+ }[]] | undefined;
411
674
  }, ...({
412
675
  id: string;
413
676
  format: "mso_mdoc";
@@ -433,6 +696,13 @@ declare namespace DcqlQueryResult {
433
696
  intent_to_retain?: boolean | undefined;
434
697
  })[]] | undefined;
435
698
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
699
+ trusted_authorities?: [{
700
+ type: "aki" | "etsi_tl" | "openid_federation";
701
+ values: [string, ...string[]];
702
+ }, ...{
703
+ type: "aki" | "etsi_tl" | "openid_federation";
704
+ values: [string, ...string[]];
705
+ }[]] | undefined;
436
706
  meta?: {
437
707
  doctype_value?: string | undefined;
438
708
  } | undefined;
@@ -449,12 +719,22 @@ declare namespace DcqlQueryResult {
449
719
  id?: string | undefined;
450
720
  }[]] | undefined;
451
721
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
722
+ trusted_authorities?: [{
723
+ type: "aki" | "etsi_tl" | "openid_federation";
724
+ values: [string, ...string[]];
725
+ }, ...{
726
+ type: "aki" | "etsi_tl" | "openid_federation";
727
+ values: [string, ...string[]];
728
+ }[]] | undefined;
452
729
  meta?: {
453
730
  vct_values?: string[] | undefined;
454
731
  } | undefined;
455
732
  } | {
456
733
  id: string;
457
- format: "jwt_vc_json-ld" | "jwt_vc_json";
734
+ format: "ldp_vc" | "jwt_vc_json";
735
+ meta: {
736
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
737
+ };
458
738
  claims?: [{
459
739
  path: [string | number | null, ...(string | number | null)[]];
460
740
  values?: (string | number | boolean)[] | undefined;
@@ -465,6 +745,13 @@ declare namespace DcqlQueryResult {
465
745
  id?: string | undefined;
466
746
  }[]] | undefined;
467
747
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
748
+ trusted_authorities?: [{
749
+ type: "aki" | "etsi_tl" | "openid_federation";
750
+ values: [string, ...string[]];
751
+ }, ...{
752
+ type: "aki" | "etsi_tl" | "openid_federation";
753
+ values: [string, ...string[]];
754
+ }[]] | undefined;
468
755
  })[]], undefined>, v.DescriptionAction<[{
469
756
  id: string;
470
757
  format: "mso_mdoc";
@@ -490,6 +777,13 @@ declare namespace DcqlQueryResult {
490
777
  intent_to_retain?: boolean | undefined;
491
778
  })[]] | undefined;
492
779
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
780
+ trusted_authorities?: [{
781
+ type: "aki" | "etsi_tl" | "openid_federation";
782
+ values: [string, ...string[]];
783
+ }, ...{
784
+ type: "aki" | "etsi_tl" | "openid_federation";
785
+ values: [string, ...string[]];
786
+ }[]] | undefined;
493
787
  meta?: {
494
788
  doctype_value?: string | undefined;
495
789
  } | undefined;
@@ -506,12 +800,22 @@ declare namespace DcqlQueryResult {
506
800
  id?: string | undefined;
507
801
  }[]] | undefined;
508
802
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
803
+ trusted_authorities?: [{
804
+ type: "aki" | "etsi_tl" | "openid_federation";
805
+ values: [string, ...string[]];
806
+ }, ...{
807
+ type: "aki" | "etsi_tl" | "openid_federation";
808
+ values: [string, ...string[]];
809
+ }[]] | undefined;
509
810
  meta?: {
510
811
  vct_values?: string[] | undefined;
511
812
  } | undefined;
512
813
  } | {
513
814
  id: string;
514
- format: "jwt_vc_json-ld" | "jwt_vc_json";
815
+ format: "ldp_vc" | "jwt_vc_json";
816
+ meta: {
817
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
818
+ };
515
819
  claims?: [{
516
820
  path: [string | number | null, ...(string | number | null)[]];
517
821
  values?: (string | number | boolean)[] | undefined;
@@ -522,6 +826,13 @@ declare namespace DcqlQueryResult {
522
826
  id?: string | undefined;
523
827
  }[]] | undefined;
524
828
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
829
+ trusted_authorities?: [{
830
+ type: "aki" | "etsi_tl" | "openid_federation";
831
+ values: [string, ...string[]];
832
+ }, ...{
833
+ type: "aki" | "etsi_tl" | "openid_federation";
834
+ values: [string, ...string[]];
835
+ }[]] | undefined;
525
836
  }, ...({
526
837
  id: string;
527
838
  format: "mso_mdoc";
@@ -547,6 +858,13 @@ declare namespace DcqlQueryResult {
547
858
  intent_to_retain?: boolean | undefined;
548
859
  })[]] | undefined;
549
860
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
861
+ trusted_authorities?: [{
862
+ type: "aki" | "etsi_tl" | "openid_federation";
863
+ values: [string, ...string[]];
864
+ }, ...{
865
+ type: "aki" | "etsi_tl" | "openid_federation";
866
+ values: [string, ...string[]];
867
+ }[]] | undefined;
550
868
  meta?: {
551
869
  doctype_value?: string | undefined;
552
870
  } | undefined;
@@ -563,12 +881,22 @@ declare namespace DcqlQueryResult {
563
881
  id?: string | undefined;
564
882
  }[]] | undefined;
565
883
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
884
+ trusted_authorities?: [{
885
+ type: "aki" | "etsi_tl" | "openid_federation";
886
+ values: [string, ...string[]];
887
+ }, ...{
888
+ type: "aki" | "etsi_tl" | "openid_federation";
889
+ values: [string, ...string[]];
890
+ }[]] | undefined;
566
891
  meta?: {
567
892
  vct_values?: string[] | undefined;
568
893
  } | undefined;
569
894
  } | {
570
895
  id: string;
571
- format: "jwt_vc_json-ld" | "jwt_vc_json";
896
+ format: "ldp_vc" | "jwt_vc_json";
897
+ meta: {
898
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
899
+ };
572
900
  claims?: [{
573
901
  path: [string | number | null, ...(string | number | null)[]];
574
902
  values?: (string | number | boolean)[] | undefined;
@@ -579,6 +907,13 @@ declare namespace DcqlQueryResult {
579
907
  id?: string | undefined;
580
908
  }[]] | undefined;
581
909
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
910
+ trusted_authorities?: [{
911
+ type: "aki" | "etsi_tl" | "openid_federation";
912
+ values: [string, ...string[]];
913
+ }, ...{
914
+ type: "aki" | "etsi_tl" | "openid_federation";
915
+ values: [string, ...string[]];
916
+ }[]] | undefined;
582
917
  })[]], "REQUIRED. A non-empty array of Credential Queries that specify the requested Verifiable Credentials.">]>;
583
918
  readonly credential_matches: v.RecordSchema<v.SchemaWithPipe<[v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>]>, v.UnionSchema<[v.ObjectSchema<{
584
919
  readonly all: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.UnionSchema<[v.UndefinedSchema<undefined>, v.ObjectSchema<{
@@ -591,13 +926,44 @@ declare namespace DcqlQueryResult {
591
926
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
592
927
  readonly doctype: v.StringSchema<undefined>;
593
928
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
929
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
930
+ readonly type: v.LiteralSchema<"aki", undefined>;
931
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
932
+ }, undefined>, v.ObjectSchema<{
933
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
934
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
935
+ }, undefined>, v.ObjectSchema<{
936
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
937
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
938
+ }, undefined>], undefined>, undefined>;
594
939
  }, undefined>, v.ObjectSchema<{
595
940
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
596
941
  readonly vct: v.StringSchema<undefined>;
597
942
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
943
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
944
+ readonly type: v.LiteralSchema<"aki", undefined>;
945
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
946
+ }, undefined>, v.ObjectSchema<{
947
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
948
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
949
+ }, undefined>, v.ObjectSchema<{
950
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
951
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
952
+ }, undefined>], undefined>, undefined>;
598
953
  }, undefined>, v.ObjectSchema<{
599
- readonly credential_format: v.PicklistSchema<["jwt_vc_json-ld", "jwt_vc_json"], undefined>;
954
+ readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
600
955
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
956
+ readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
957
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
958
+ readonly type: v.LiteralSchema<"aki", undefined>;
959
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
960
+ }, undefined>, v.ObjectSchema<{
961
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
962
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
963
+ }, undefined>, v.ObjectSchema<{
964
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
965
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
966
+ }, undefined>], undefined>, undefined>;
601
967
  }, undefined>], undefined>;
602
968
  }, undefined>, v.ObjectSchema<{
603
969
  readonly success: v.LiteralSchema<false, undefined>;
@@ -615,17 +981,48 @@ declare namespace DcqlQueryResult {
615
981
  [x: string]: unknown;
616
982
  };
617
983
  };
984
+ authority?: {
985
+ type: "aki";
986
+ value: string;
987
+ } | {
988
+ type: "etsi_tl";
989
+ value: string;
990
+ } | {
991
+ type: "openid_federation";
992
+ value: string;
993
+ } | undefined;
618
994
  } | {
619
995
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
620
996
  vct: string;
621
997
  claims: {
622
998
  [x: string]: Json;
623
999
  };
1000
+ authority?: {
1001
+ type: "aki";
1002
+ value: string;
1003
+ } | {
1004
+ type: "etsi_tl";
1005
+ value: string;
1006
+ } | {
1007
+ type: "openid_federation";
1008
+ value: string;
1009
+ } | undefined;
624
1010
  } | {
625
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
1011
+ type: string[];
1012
+ credential_format: "ldp_vc" | "jwt_vc_json";
626
1013
  claims: {
627
1014
  [x: string]: Json;
628
1015
  };
1016
+ authority?: {
1017
+ type: "aki";
1018
+ value: string;
1019
+ } | {
1020
+ type: "etsi_tl";
1021
+ value: string;
1022
+ } | {
1023
+ type: "openid_federation";
1024
+ value: string;
1025
+ } | undefined;
629
1026
  };
630
1027
  success: true;
631
1028
  typed: true;
@@ -648,17 +1045,48 @@ declare namespace DcqlQueryResult {
648
1045
  [x: string]: unknown;
649
1046
  };
650
1047
  };
1048
+ authority?: {
1049
+ type: "aki";
1050
+ value: string;
1051
+ } | {
1052
+ type: "etsi_tl";
1053
+ value: string;
1054
+ } | {
1055
+ type: "openid_federation";
1056
+ value: string;
1057
+ } | undefined;
651
1058
  } | {
652
1059
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
653
1060
  vct: string;
654
1061
  claims: {
655
1062
  [x: string]: Json;
656
1063
  };
1064
+ authority?: {
1065
+ type: "aki";
1066
+ value: string;
1067
+ } | {
1068
+ type: "etsi_tl";
1069
+ value: string;
1070
+ } | {
1071
+ type: "openid_federation";
1072
+ value: string;
1073
+ } | undefined;
657
1074
  } | {
658
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
1075
+ type: string[];
1076
+ credential_format: "ldp_vc" | "jwt_vc_json";
659
1077
  claims: {
660
1078
  [x: string]: Json;
661
1079
  };
1080
+ authority?: {
1081
+ type: "aki";
1082
+ value: string;
1083
+ } | {
1084
+ type: "etsi_tl";
1085
+ value: string;
1086
+ } | {
1087
+ type: "openid_federation";
1088
+ value: string;
1089
+ } | undefined;
662
1090
  };
663
1091
  success: true;
664
1092
  typed: true;
@@ -681,17 +1109,48 @@ declare namespace DcqlQueryResult {
681
1109
  [x: string]: unknown;
682
1110
  };
683
1111
  };
1112
+ authority?: {
1113
+ type: "aki";
1114
+ value: string;
1115
+ } | {
1116
+ type: "etsi_tl";
1117
+ value: string;
1118
+ } | {
1119
+ type: "openid_federation";
1120
+ value: string;
1121
+ } | undefined;
684
1122
  } | {
685
1123
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
686
1124
  vct: string;
687
1125
  claims: {
688
1126
  [x: string]: Json;
689
1127
  };
1128
+ authority?: {
1129
+ type: "aki";
1130
+ value: string;
1131
+ } | {
1132
+ type: "etsi_tl";
1133
+ value: string;
1134
+ } | {
1135
+ type: "openid_federation";
1136
+ value: string;
1137
+ } | undefined;
690
1138
  } | {
691
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
1139
+ type: string[];
1140
+ credential_format: "ldp_vc" | "jwt_vc_json";
692
1141
  claims: {
693
1142
  [x: string]: Json;
694
1143
  };
1144
+ authority?: {
1145
+ type: "aki";
1146
+ value: string;
1147
+ } | {
1148
+ type: "etsi_tl";
1149
+ value: string;
1150
+ } | {
1151
+ type: "openid_federation";
1152
+ value: string;
1153
+ } | undefined;
695
1154
  };
696
1155
  success: true;
697
1156
  typed: true;
@@ -714,17 +1173,48 @@ declare namespace DcqlQueryResult {
714
1173
  [x: string]: unknown;
715
1174
  };
716
1175
  };
1176
+ authority?: {
1177
+ type: "aki";
1178
+ value: string;
1179
+ } | {
1180
+ type: "etsi_tl";
1181
+ value: string;
1182
+ } | {
1183
+ type: "openid_federation";
1184
+ value: string;
1185
+ } | undefined;
717
1186
  } | {
718
1187
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
719
1188
  vct: string;
720
1189
  claims: {
721
1190
  [x: string]: Json;
722
1191
  };
1192
+ authority?: {
1193
+ type: "aki";
1194
+ value: string;
1195
+ } | {
1196
+ type: "etsi_tl";
1197
+ value: string;
1198
+ } | {
1199
+ type: "openid_federation";
1200
+ value: string;
1201
+ } | undefined;
723
1202
  } | {
724
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
1203
+ type: string[];
1204
+ credential_format: "ldp_vc" | "jwt_vc_json";
725
1205
  claims: {
726
1206
  [x: string]: Json;
727
1207
  };
1208
+ authority?: {
1209
+ type: "aki";
1210
+ value: string;
1211
+ } | {
1212
+ type: "etsi_tl";
1213
+ value: string;
1214
+ } | {
1215
+ type: "openid_federation";
1216
+ value: string;
1217
+ } | undefined;
728
1218
  };
729
1219
  success: true;
730
1220
  typed: true;
@@ -747,17 +1237,48 @@ declare namespace DcqlQueryResult {
747
1237
  [x: string]: unknown;
748
1238
  };
749
1239
  };
1240
+ authority?: {
1241
+ type: "aki";
1242
+ value: string;
1243
+ } | {
1244
+ type: "etsi_tl";
1245
+ value: string;
1246
+ } | {
1247
+ type: "openid_federation";
1248
+ value: string;
1249
+ } | undefined;
750
1250
  } | {
751
1251
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
752
1252
  vct: string;
753
1253
  claims: {
754
1254
  [x: string]: Json;
755
1255
  };
1256
+ authority?: {
1257
+ type: "aki";
1258
+ value: string;
1259
+ } | {
1260
+ type: "etsi_tl";
1261
+ value: string;
1262
+ } | {
1263
+ type: "openid_federation";
1264
+ value: string;
1265
+ } | undefined;
756
1266
  } | {
757
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
1267
+ type: string[];
1268
+ credential_format: "ldp_vc" | "jwt_vc_json";
758
1269
  claims: {
759
1270
  [x: string]: Json;
760
1271
  };
1272
+ authority?: {
1273
+ type: "aki";
1274
+ value: string;
1275
+ } | {
1276
+ type: "etsi_tl";
1277
+ value: string;
1278
+ } | {
1279
+ type: "openid_federation";
1280
+ value: string;
1281
+ } | undefined;
761
1282
  };
762
1283
  success: true;
763
1284
  typed: true;
@@ -780,17 +1301,48 @@ declare namespace DcqlQueryResult {
780
1301
  [x: string]: unknown;
781
1302
  };
782
1303
  };
1304
+ authority?: {
1305
+ type: "aki";
1306
+ value: string;
1307
+ } | {
1308
+ type: "etsi_tl";
1309
+ value: string;
1310
+ } | {
1311
+ type: "openid_federation";
1312
+ value: string;
1313
+ } | undefined;
783
1314
  } | {
784
1315
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
785
1316
  vct: string;
786
1317
  claims: {
787
1318
  [x: string]: Json;
788
1319
  };
1320
+ authority?: {
1321
+ type: "aki";
1322
+ value: string;
1323
+ } | {
1324
+ type: "etsi_tl";
1325
+ value: string;
1326
+ } | {
1327
+ type: "openid_federation";
1328
+ value: string;
1329
+ } | undefined;
789
1330
  } | {
790
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
1331
+ type: string[];
1332
+ credential_format: "ldp_vc" | "jwt_vc_json";
791
1333
  claims: {
792
1334
  [x: string]: Json;
793
1335
  };
1336
+ authority?: {
1337
+ type: "aki";
1338
+ value: string;
1339
+ } | {
1340
+ type: "etsi_tl";
1341
+ value: string;
1342
+ } | {
1343
+ type: "openid_federation";
1344
+ value: string;
1345
+ } | undefined;
794
1346
  };
795
1347
  success: true;
796
1348
  typed: true;
@@ -814,13 +1366,44 @@ declare namespace DcqlQueryResult {
814
1366
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
815
1367
  readonly doctype: v.StringSchema<undefined>;
816
1368
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
1369
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1370
+ readonly type: v.LiteralSchema<"aki", undefined>;
1371
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1372
+ }, undefined>, v.ObjectSchema<{
1373
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1374
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1375
+ }, undefined>, v.ObjectSchema<{
1376
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1377
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1378
+ }, undefined>], undefined>, undefined>;
817
1379
  }, undefined>, v.ObjectSchema<{
818
1380
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
819
1381
  readonly vct: v.StringSchema<undefined>;
820
1382
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
1383
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1384
+ readonly type: v.LiteralSchema<"aki", undefined>;
1385
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1386
+ }, undefined>, v.ObjectSchema<{
1387
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1388
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1389
+ }, undefined>, v.ObjectSchema<{
1390
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1391
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1392
+ }, undefined>], undefined>, undefined>;
821
1393
  }, undefined>, v.ObjectSchema<{
822
- readonly credential_format: v.PicklistSchema<["jwt_vc_json-ld", "jwt_vc_json"], undefined>;
1394
+ readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
823
1395
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
1396
+ readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
1397
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1398
+ readonly type: v.LiteralSchema<"aki", undefined>;
1399
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1400
+ }, undefined>, v.ObjectSchema<{
1401
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1402
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1403
+ }, undefined>, v.ObjectSchema<{
1404
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1405
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1406
+ }, undefined>], undefined>, undefined>;
824
1407
  }, undefined>], undefined>;
825
1408
  }, undefined>, v.ObjectSchema<{
826
1409
  readonly success: v.LiteralSchema<false, undefined>;
@@ -834,13 +1417,44 @@ declare namespace DcqlQueryResult {
834
1417
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
835
1418
  readonly doctype: v.StringSchema<undefined>;
836
1419
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
1420
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1421
+ readonly type: v.LiteralSchema<"aki", undefined>;
1422
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1423
+ }, undefined>, v.ObjectSchema<{
1424
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1425
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1426
+ }, undefined>, v.ObjectSchema<{
1427
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1428
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1429
+ }, undefined>], undefined>, undefined>;
837
1430
  }, undefined>, v.ObjectSchema<{
838
1431
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
839
1432
  readonly vct: v.StringSchema<undefined>;
840
1433
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
1434
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1435
+ readonly type: v.LiteralSchema<"aki", undefined>;
1436
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1437
+ }, undefined>, v.ObjectSchema<{
1438
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1439
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1440
+ }, undefined>, v.ObjectSchema<{
1441
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1442
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1443
+ }, undefined>], undefined>, undefined>;
841
1444
  }, undefined>, v.ObjectSchema<{
842
- readonly credential_format: v.PicklistSchema<["jwt_vc_json-ld", "jwt_vc_json"], undefined>;
1445
+ readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
843
1446
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
1447
+ readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
1448
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1449
+ readonly type: v.LiteralSchema<"aki", undefined>;
1450
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1451
+ }, undefined>, v.ObjectSchema<{
1452
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1453
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1454
+ }, undefined>, v.ObjectSchema<{
1455
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1456
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1457
+ }, undefined>], undefined>, undefined>;
844
1458
  }, undefined>], undefined>;
845
1459
  }, undefined>, v.ObjectSchema<{
846
1460
  readonly success: v.LiteralSchema<false, undefined>;
@@ -858,17 +1472,48 @@ declare namespace DcqlQueryResult {
858
1472
  [x: string]: unknown;
859
1473
  };
860
1474
  };
1475
+ authority?: {
1476
+ type: "aki";
1477
+ value: string;
1478
+ } | {
1479
+ type: "etsi_tl";
1480
+ value: string;
1481
+ } | {
1482
+ type: "openid_federation";
1483
+ value: string;
1484
+ } | undefined;
861
1485
  } | {
862
1486
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
863
1487
  vct: string;
864
1488
  claims: {
865
1489
  [x: string]: Json;
866
1490
  };
1491
+ authority?: {
1492
+ type: "aki";
1493
+ value: string;
1494
+ } | {
1495
+ type: "etsi_tl";
1496
+ value: string;
1497
+ } | {
1498
+ type: "openid_federation";
1499
+ value: string;
1500
+ } | undefined;
867
1501
  } | {
868
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
1502
+ type: string[];
1503
+ credential_format: "ldp_vc" | "jwt_vc_json";
869
1504
  claims: {
870
1505
  [x: string]: Json;
871
1506
  };
1507
+ authority?: {
1508
+ type: "aki";
1509
+ value: string;
1510
+ } | {
1511
+ type: "etsi_tl";
1512
+ value: string;
1513
+ } | {
1514
+ type: "openid_federation";
1515
+ value: string;
1516
+ } | undefined;
872
1517
  };
873
1518
  success: true;
874
1519
  typed: true;
@@ -891,17 +1536,48 @@ declare namespace DcqlQueryResult {
891
1536
  [x: string]: unknown;
892
1537
  };
893
1538
  };
1539
+ authority?: {
1540
+ type: "aki";
1541
+ value: string;
1542
+ } | {
1543
+ type: "etsi_tl";
1544
+ value: string;
1545
+ } | {
1546
+ type: "openid_federation";
1547
+ value: string;
1548
+ } | undefined;
894
1549
  } | {
895
1550
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
896
1551
  vct: string;
897
1552
  claims: {
898
1553
  [x: string]: Json;
899
1554
  };
1555
+ authority?: {
1556
+ type: "aki";
1557
+ value: string;
1558
+ } | {
1559
+ type: "etsi_tl";
1560
+ value: string;
1561
+ } | {
1562
+ type: "openid_federation";
1563
+ value: string;
1564
+ } | undefined;
900
1565
  } | {
901
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
1566
+ type: string[];
1567
+ credential_format: "ldp_vc" | "jwt_vc_json";
902
1568
  claims: {
903
1569
  [x: string]: Json;
904
1570
  };
1571
+ authority?: {
1572
+ type: "aki";
1573
+ value: string;
1574
+ } | {
1575
+ type: "etsi_tl";
1576
+ value: string;
1577
+ } | {
1578
+ type: "openid_federation";
1579
+ value: string;
1580
+ } | undefined;
905
1581
  };
906
1582
  success: true;
907
1583
  typed: true;
@@ -924,17 +1600,48 @@ declare namespace DcqlQueryResult {
924
1600
  [x: string]: unknown;
925
1601
  };
926
1602
  };
1603
+ authority?: {
1604
+ type: "aki";
1605
+ value: string;
1606
+ } | {
1607
+ type: "etsi_tl";
1608
+ value: string;
1609
+ } | {
1610
+ type: "openid_federation";
1611
+ value: string;
1612
+ } | undefined;
927
1613
  } | {
928
1614
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
929
1615
  vct: string;
930
1616
  claims: {
931
1617
  [x: string]: Json;
932
1618
  };
1619
+ authority?: {
1620
+ type: "aki";
1621
+ value: string;
1622
+ } | {
1623
+ type: "etsi_tl";
1624
+ value: string;
1625
+ } | {
1626
+ type: "openid_federation";
1627
+ value: string;
1628
+ } | undefined;
933
1629
  } | {
934
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
1630
+ type: string[];
1631
+ credential_format: "ldp_vc" | "jwt_vc_json";
935
1632
  claims: {
936
1633
  [x: string]: Json;
937
1634
  };
1635
+ authority?: {
1636
+ type: "aki";
1637
+ value: string;
1638
+ } | {
1639
+ type: "etsi_tl";
1640
+ value: string;
1641
+ } | {
1642
+ type: "openid_federation";
1643
+ value: string;
1644
+ } | undefined;
938
1645
  };
939
1646
  success: true;
940
1647
  typed: true;
@@ -957,17 +1664,48 @@ declare namespace DcqlQueryResult {
957
1664
  [x: string]: unknown;
958
1665
  };
959
1666
  };
1667
+ authority?: {
1668
+ type: "aki";
1669
+ value: string;
1670
+ } | {
1671
+ type: "etsi_tl";
1672
+ value: string;
1673
+ } | {
1674
+ type: "openid_federation";
1675
+ value: string;
1676
+ } | undefined;
960
1677
  } | {
961
1678
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
962
1679
  vct: string;
963
1680
  claims: {
964
1681
  [x: string]: Json;
965
1682
  };
1683
+ authority?: {
1684
+ type: "aki";
1685
+ value: string;
1686
+ } | {
1687
+ type: "etsi_tl";
1688
+ value: string;
1689
+ } | {
1690
+ type: "openid_federation";
1691
+ value: string;
1692
+ } | undefined;
966
1693
  } | {
967
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
1694
+ type: string[];
1695
+ credential_format: "ldp_vc" | "jwt_vc_json";
968
1696
  claims: {
969
1697
  [x: string]: Json;
970
1698
  };
1699
+ authority?: {
1700
+ type: "aki";
1701
+ value: string;
1702
+ } | {
1703
+ type: "etsi_tl";
1704
+ value: string;
1705
+ } | {
1706
+ type: "openid_federation";
1707
+ value: string;
1708
+ } | undefined;
971
1709
  };
972
1710
  success: true;
973
1711
  typed: true;
@@ -990,17 +1728,48 @@ declare namespace DcqlQueryResult {
990
1728
  [x: string]: unknown;
991
1729
  };
992
1730
  };
1731
+ authority?: {
1732
+ type: "aki";
1733
+ value: string;
1734
+ } | {
1735
+ type: "etsi_tl";
1736
+ value: string;
1737
+ } | {
1738
+ type: "openid_federation";
1739
+ value: string;
1740
+ } | undefined;
993
1741
  } | {
994
1742
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
995
1743
  vct: string;
996
1744
  claims: {
997
1745
  [x: string]: Json;
998
1746
  };
1747
+ authority?: {
1748
+ type: "aki";
1749
+ value: string;
1750
+ } | {
1751
+ type: "etsi_tl";
1752
+ value: string;
1753
+ } | {
1754
+ type: "openid_federation";
1755
+ value: string;
1756
+ } | undefined;
999
1757
  } | {
1000
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
1758
+ type: string[];
1759
+ credential_format: "ldp_vc" | "jwt_vc_json";
1001
1760
  claims: {
1002
1761
  [x: string]: Json;
1003
1762
  };
1763
+ authority?: {
1764
+ type: "aki";
1765
+ value: string;
1766
+ } | {
1767
+ type: "etsi_tl";
1768
+ value: string;
1769
+ } | {
1770
+ type: "openid_federation";
1771
+ value: string;
1772
+ } | undefined;
1004
1773
  };
1005
1774
  success: true;
1006
1775
  typed: true;
@@ -1023,17 +1792,48 @@ declare namespace DcqlQueryResult {
1023
1792
  [x: string]: unknown;
1024
1793
  };
1025
1794
  };
1795
+ authority?: {
1796
+ type: "aki";
1797
+ value: string;
1798
+ } | {
1799
+ type: "etsi_tl";
1800
+ value: string;
1801
+ } | {
1802
+ type: "openid_federation";
1803
+ value: string;
1804
+ } | undefined;
1026
1805
  } | {
1027
1806
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
1028
1807
  vct: string;
1029
1808
  claims: {
1030
1809
  [x: string]: Json;
1031
1810
  };
1811
+ authority?: {
1812
+ type: "aki";
1813
+ value: string;
1814
+ } | {
1815
+ type: "etsi_tl";
1816
+ value: string;
1817
+ } | {
1818
+ type: "openid_federation";
1819
+ value: string;
1820
+ } | undefined;
1032
1821
  } | {
1033
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
1822
+ type: string[];
1823
+ credential_format: "ldp_vc" | "jwt_vc_json";
1034
1824
  claims: {
1035
1825
  [x: string]: Json;
1036
1826
  };
1827
+ authority?: {
1828
+ type: "aki";
1829
+ value: string;
1830
+ } | {
1831
+ type: "etsi_tl";
1832
+ value: string;
1833
+ } | {
1834
+ type: "openid_federation";
1835
+ value: string;
1836
+ } | undefined;
1037
1837
  };
1038
1838
  success: true;
1039
1839
  typed: true;
@@ -1100,11 +1900,31 @@ declare namespace DcqlMdocCredential {
1100
1900
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
1101
1901
  readonly doctype: v.StringSchema<undefined>;
1102
1902
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
1903
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1904
+ readonly type: v.LiteralSchema<"aki", undefined>;
1905
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1906
+ }, undefined>, v.ObjectSchema<{
1907
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1908
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1909
+ }, undefined>, v.ObjectSchema<{
1910
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1911
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1912
+ }, undefined>], undefined>, undefined>;
1103
1913
  }, undefined>;
1104
1914
  const model: Model<v.ObjectSchema<{
1105
1915
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
1106
1916
  readonly doctype: v.StringSchema<undefined>;
1107
1917
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
1918
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1919
+ readonly type: v.LiteralSchema<"aki", undefined>;
1920
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1921
+ }, undefined>, v.ObjectSchema<{
1922
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1923
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1924
+ }, undefined>, v.ObjectSchema<{
1925
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1926
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1927
+ }, undefined>], undefined>, undefined>;
1108
1928
  }, undefined>>;
1109
1929
  type Model = InferModelTypes<typeof model>;
1110
1930
  type NameSpaces = v.InferOutput<typeof vNamespaces>;
@@ -1116,11 +1936,31 @@ declare namespace DcqlSdJwtVcCredential {
1116
1936
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
1117
1937
  readonly vct: v.StringSchema<undefined>;
1118
1938
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
1939
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1940
+ readonly type: v.LiteralSchema<"aki", undefined>;
1941
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1942
+ }, undefined>, v.ObjectSchema<{
1943
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1944
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1945
+ }, undefined>, v.ObjectSchema<{
1946
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1947
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1948
+ }, undefined>], undefined>, undefined>;
1119
1949
  }, undefined>;
1120
1950
  const model: Model<v.ObjectSchema<{
1121
1951
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
1122
1952
  readonly vct: v.StringSchema<undefined>;
1123
1953
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
1954
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1955
+ readonly type: v.LiteralSchema<"aki", undefined>;
1956
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1957
+ }, undefined>, v.ObjectSchema<{
1958
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1959
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1960
+ }, undefined>, v.ObjectSchema<{
1961
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1962
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1963
+ }, undefined>], undefined>, undefined>;
1124
1964
  }, undefined>>;
1125
1965
  type Model = InferModelTypes<typeof model>;
1126
1966
  type Claims = Model['Output']['claims'];
@@ -1129,12 +1969,34 @@ type DcqlSdJwtVcCredential = DcqlSdJwtVcCredential.Model['Output'];
1129
1969
  declare namespace DcqlW3cVcCredential {
1130
1970
  const vClaims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
1131
1971
  const vModel: v.ObjectSchema<{
1132
- readonly credential_format: v.PicklistSchema<["jwt_vc_json-ld", "jwt_vc_json"], undefined>;
1972
+ readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
1133
1973
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
1974
+ readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
1975
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1976
+ readonly type: v.LiteralSchema<"aki", undefined>;
1977
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1978
+ }, undefined>, v.ObjectSchema<{
1979
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1980
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1981
+ }, undefined>, v.ObjectSchema<{
1982
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1983
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1984
+ }, undefined>], undefined>, undefined>;
1134
1985
  }, undefined>;
1135
1986
  const model: Model<v.ObjectSchema<{
1136
- readonly credential_format: v.PicklistSchema<["jwt_vc_json-ld", "jwt_vc_json"], undefined>;
1987
+ readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
1137
1988
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
1989
+ readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
1990
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1991
+ readonly type: v.LiteralSchema<"aki", undefined>;
1992
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1993
+ }, undefined>, v.ObjectSchema<{
1994
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1995
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1996
+ }, undefined>, v.ObjectSchema<{
1997
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1998
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1999
+ }, undefined>], undefined>, undefined>;
1138
2000
  }, undefined>>;
1139
2001
  type Model = InferModelTypes<typeof model>;
1140
2002
  type Claims = Model['Output']['claims'];
@@ -1145,13 +2007,44 @@ declare namespace DcqlCredential {
1145
2007
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
1146
2008
  readonly doctype: v.StringSchema<undefined>;
1147
2009
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
2010
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
2011
+ readonly type: v.LiteralSchema<"aki", undefined>;
2012
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
2013
+ }, undefined>, v.ObjectSchema<{
2014
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
2015
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
2016
+ }, undefined>, v.ObjectSchema<{
2017
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
2018
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
2019
+ }, undefined>], undefined>, undefined>;
1148
2020
  }, undefined>, v.ObjectSchema<{
1149
2021
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
1150
2022
  readonly vct: v.StringSchema<undefined>;
1151
2023
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
2024
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
2025
+ readonly type: v.LiteralSchema<"aki", undefined>;
2026
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
2027
+ }, undefined>, v.ObjectSchema<{
2028
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
2029
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
2030
+ }, undefined>, v.ObjectSchema<{
2031
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
2032
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
2033
+ }, undefined>], undefined>, undefined>;
1152
2034
  }, undefined>, v.ObjectSchema<{
1153
- readonly credential_format: v.PicklistSchema<["jwt_vc_json-ld", "jwt_vc_json"], undefined>;
2035
+ readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
1154
2036
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
2037
+ readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
2038
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
2039
+ readonly type: v.LiteralSchema<"aki", undefined>;
2040
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
2041
+ }, undefined>, v.ObjectSchema<{
2042
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
2043
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
2044
+ }, undefined>, v.ObjectSchema<{
2045
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
2046
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
2047
+ }, undefined>], undefined>, undefined>;
1155
2048
  }, undefined>], undefined>;
1156
2049
  const vParseSuccess: v.ObjectSchema<{
1157
2050
  readonly success: v.LiteralSchema<true, undefined>;
@@ -1163,13 +2056,44 @@ declare namespace DcqlCredential {
1163
2056
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
1164
2057
  readonly doctype: v.StringSchema<undefined>;
1165
2058
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
2059
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
2060
+ readonly type: v.LiteralSchema<"aki", undefined>;
2061
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
2062
+ }, undefined>, v.ObjectSchema<{
2063
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
2064
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
2065
+ }, undefined>, v.ObjectSchema<{
2066
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
2067
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
2068
+ }, undefined>], undefined>, undefined>;
1166
2069
  }, undefined>, v.ObjectSchema<{
1167
2070
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
1168
2071
  readonly vct: v.StringSchema<undefined>;
1169
2072
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
2073
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
2074
+ readonly type: v.LiteralSchema<"aki", undefined>;
2075
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
2076
+ }, undefined>, v.ObjectSchema<{
2077
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
2078
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
2079
+ }, undefined>, v.ObjectSchema<{
2080
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
2081
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
2082
+ }, undefined>], undefined>, undefined>;
1170
2083
  }, undefined>, v.ObjectSchema<{
1171
- readonly credential_format: v.PicklistSchema<["jwt_vc_json-ld", "jwt_vc_json"], undefined>;
2084
+ readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
1172
2085
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
2086
+ readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
2087
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
2088
+ readonly type: v.LiteralSchema<"aki", undefined>;
2089
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
2090
+ }, undefined>, v.ObjectSchema<{
2091
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
2092
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
2093
+ }, undefined>, v.ObjectSchema<{
2094
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
2095
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
2096
+ }, undefined>], undefined>, undefined>;
1173
2097
  }, undefined>], undefined>;
1174
2098
  }, undefined>;
1175
2099
  const vParseFailure: v.ObjectSchema<{
@@ -1184,13 +2108,44 @@ declare namespace DcqlCredential {
1184
2108
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
1185
2109
  readonly doctype: v.StringSchema<undefined>;
1186
2110
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
2111
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
2112
+ readonly type: v.LiteralSchema<"aki", undefined>;
2113
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
2114
+ }, undefined>, v.ObjectSchema<{
2115
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
2116
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
2117
+ }, undefined>, v.ObjectSchema<{
2118
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
2119
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
2120
+ }, undefined>], undefined>, undefined>;
1187
2121
  }, undefined>, v.ObjectSchema<{
1188
2122
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
1189
2123
  readonly vct: v.StringSchema<undefined>;
1190
2124
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
2125
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
2126
+ readonly type: v.LiteralSchema<"aki", undefined>;
2127
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
2128
+ }, undefined>, v.ObjectSchema<{
2129
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
2130
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
2131
+ }, undefined>, v.ObjectSchema<{
2132
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
2133
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
2134
+ }, undefined>], undefined>, undefined>;
1191
2135
  }, undefined>, v.ObjectSchema<{
1192
- readonly credential_format: v.PicklistSchema<["jwt_vc_json-ld", "jwt_vc_json"], undefined>;
2136
+ readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
1193
2137
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
2138
+ readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
2139
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
2140
+ readonly type: v.LiteralSchema<"aki", undefined>;
2141
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
2142
+ }, undefined>, v.ObjectSchema<{
2143
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
2144
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
2145
+ }, undefined>, v.ObjectSchema<{
2146
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
2147
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
2148
+ }, undefined>], undefined>, undefined>;
1194
2149
  }, undefined>], undefined>>;
1195
2150
  type Model = InferModelTypes<typeof model>;
1196
2151
  }
@@ -1266,6 +2221,22 @@ declare namespace DcqlQuery {
1266
2221
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
1267
2222
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
1268
2223
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
2224
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
2225
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
2226
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
2227
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
2228
+ type: "aki" | "etsi_tl" | "openid_federation";
2229
+ values: [string, ...string[]];
2230
+ }, ...{
2231
+ type: "aki" | "etsi_tl" | "openid_federation";
2232
+ values: [string, ...string[]];
2233
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
2234
+ type: "aki" | "etsi_tl" | "openid_federation";
2235
+ values: [string, ...string[]];
2236
+ }, ...{
2237
+ type: "aki" | "etsi_tl" | "openid_federation";
2238
+ values: [string, ...string[]];
2239
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
1269
2240
  }, undefined>, v.ObjectSchema<{
1270
2241
  readonly format: v.SchemaWithPipe<[v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>, v.DescriptionAction<"vc+sd-jwt" | "dc+sd-jwt", "REQUIRED. A string that specifies the format of the requested Verifiable Credential.">]>;
1271
2242
  readonly claims: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
@@ -1298,8 +2269,24 @@ declare namespace DcqlQuery {
1298
2269
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
1299
2270
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
1300
2271
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
2272
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
2273
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
2274
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
2275
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
2276
+ type: "aki" | "etsi_tl" | "openid_federation";
2277
+ values: [string, ...string[]];
2278
+ }, ...{
2279
+ type: "aki" | "etsi_tl" | "openid_federation";
2280
+ values: [string, ...string[]];
2281
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
2282
+ type: "aki" | "etsi_tl" | "openid_federation";
2283
+ values: [string, ...string[]];
2284
+ }, ...{
2285
+ type: "aki" | "etsi_tl" | "openid_federation";
2286
+ values: [string, ...string[]];
2287
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
1301
2288
  }, undefined>, v.ObjectSchema<{
1302
- readonly format: v.PicklistSchema<["jwt_vc_json", "jwt_vc_json-ld"], undefined>;
2289
+ readonly format: v.PicklistSchema<["jwt_vc_json", "ldp_vc"], undefined>;
1303
2290
  readonly claims: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
1304
2291
  readonly id: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.DescriptionAction<string | undefined, "A string identifying the particular claim. The value MUST be a non-empty string consisting of alphanumeric, underscore (_) or hyphen (-) characters. Within the particular claims array, the same id MUST NOT be present more than once.">]>;
1305
2292
  readonly path: v.SchemaWithPipe<[v.ArraySchema<v.UnionSchema<[v.StringSchema<undefined>, v.SchemaWithPipe<[v.NumberSchema<undefined>, v.IntegerAction<number, undefined>, v.MinValueAction<number, 0, undefined>]>, v.NullSchema<undefined>], undefined>, undefined>, v.CustomSchema<[string | number | null, ...(string | number | null)[]], undefined>, v.DescriptionAction<[string | number | null, ...(string | number | null)[]], "A non-empty array representing a claims path pointer that specifies the path to a claim within the Verifiable Credential.">]>;
@@ -1313,8 +2300,29 @@ declare namespace DcqlQuery {
1313
2300
  values?: (string | number | boolean)[] | undefined;
1314
2301
  id?: string | undefined;
1315
2302
  }[]], undefined>]>, undefined>;
2303
+ readonly meta: v.SchemaWithPipe<[v.SchemaWithPipe<[v.ObjectSchema<{
2304
+ readonly type_values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.StringSchema<undefined>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]], "REQUIRED. An array of string arrays that specifies the fully expanded types (IRIs) after the @context was applied that the Verifier accepts to be presented in the Presentation. Each of the top-level arrays specifies one alternative to match the type values of the Verifiable Credential against. Each inner array specifies a set of fully expanded types that MUST be present in the type property of the Verifiable Credential, regardless of order or the presence of additional types.">]>;
2305
+ }, undefined>]>, v.DescriptionAction<{
2306
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
2307
+ }, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
1316
2308
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
1317
2309
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
2310
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
2311
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
2312
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
2313
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
2314
+ type: "aki" | "etsi_tl" | "openid_federation";
2315
+ values: [string, ...string[]];
2316
+ }, ...{
2317
+ type: "aki" | "etsi_tl" | "openid_federation";
2318
+ values: [string, ...string[]];
2319
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
2320
+ type: "aki" | "etsi_tl" | "openid_federation";
2321
+ values: [string, ...string[]];
2322
+ }, ...{
2323
+ type: "aki" | "etsi_tl" | "openid_federation";
2324
+ values: [string, ...string[]];
2325
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
1318
2326
  }, undefined>], undefined>, undefined>, v.CustomSchema<[{
1319
2327
  id: string;
1320
2328
  format: "mso_mdoc";
@@ -1340,6 +2348,13 @@ declare namespace DcqlQuery {
1340
2348
  intent_to_retain?: boolean | undefined;
1341
2349
  })[]] | undefined;
1342
2350
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2351
+ trusted_authorities?: [{
2352
+ type: "aki" | "etsi_tl" | "openid_federation";
2353
+ values: [string, ...string[]];
2354
+ }, ...{
2355
+ type: "aki" | "etsi_tl" | "openid_federation";
2356
+ values: [string, ...string[]];
2357
+ }[]] | undefined;
1343
2358
  meta?: {
1344
2359
  doctype_value?: string | undefined;
1345
2360
  } | undefined;
@@ -1356,12 +2371,22 @@ declare namespace DcqlQuery {
1356
2371
  id?: string | undefined;
1357
2372
  }[]] | undefined;
1358
2373
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2374
+ trusted_authorities?: [{
2375
+ type: "aki" | "etsi_tl" | "openid_federation";
2376
+ values: [string, ...string[]];
2377
+ }, ...{
2378
+ type: "aki" | "etsi_tl" | "openid_federation";
2379
+ values: [string, ...string[]];
2380
+ }[]] | undefined;
1359
2381
  meta?: {
1360
2382
  vct_values?: string[] | undefined;
1361
2383
  } | undefined;
1362
2384
  } | {
1363
2385
  id: string;
1364
- format: "jwt_vc_json-ld" | "jwt_vc_json";
2386
+ format: "ldp_vc" | "jwt_vc_json";
2387
+ meta: {
2388
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
2389
+ };
1365
2390
  claims?: [{
1366
2391
  path: [string | number | null, ...(string | number | null)[]];
1367
2392
  values?: (string | number | boolean)[] | undefined;
@@ -1372,6 +2397,13 @@ declare namespace DcqlQuery {
1372
2397
  id?: string | undefined;
1373
2398
  }[]] | undefined;
1374
2399
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2400
+ trusted_authorities?: [{
2401
+ type: "aki" | "etsi_tl" | "openid_federation";
2402
+ values: [string, ...string[]];
2403
+ }, ...{
2404
+ type: "aki" | "etsi_tl" | "openid_federation";
2405
+ values: [string, ...string[]];
2406
+ }[]] | undefined;
1375
2407
  }, ...({
1376
2408
  id: string;
1377
2409
  format: "mso_mdoc";
@@ -1397,6 +2429,13 @@ declare namespace DcqlQuery {
1397
2429
  intent_to_retain?: boolean | undefined;
1398
2430
  })[]] | undefined;
1399
2431
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2432
+ trusted_authorities?: [{
2433
+ type: "aki" | "etsi_tl" | "openid_federation";
2434
+ values: [string, ...string[]];
2435
+ }, ...{
2436
+ type: "aki" | "etsi_tl" | "openid_federation";
2437
+ values: [string, ...string[]];
2438
+ }[]] | undefined;
1400
2439
  meta?: {
1401
2440
  doctype_value?: string | undefined;
1402
2441
  } | undefined;
@@ -1413,12 +2452,22 @@ declare namespace DcqlQuery {
1413
2452
  id?: string | undefined;
1414
2453
  }[]] | undefined;
1415
2454
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2455
+ trusted_authorities?: [{
2456
+ type: "aki" | "etsi_tl" | "openid_federation";
2457
+ values: [string, ...string[]];
2458
+ }, ...{
2459
+ type: "aki" | "etsi_tl" | "openid_federation";
2460
+ values: [string, ...string[]];
2461
+ }[]] | undefined;
1416
2462
  meta?: {
1417
2463
  vct_values?: string[] | undefined;
1418
2464
  } | undefined;
1419
2465
  } | {
1420
2466
  id: string;
1421
- format: "jwt_vc_json-ld" | "jwt_vc_json";
2467
+ format: "ldp_vc" | "jwt_vc_json";
2468
+ meta: {
2469
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
2470
+ };
1422
2471
  claims?: [{
1423
2472
  path: [string | number | null, ...(string | number | null)[]];
1424
2473
  values?: (string | number | boolean)[] | undefined;
@@ -1429,6 +2478,13 @@ declare namespace DcqlQuery {
1429
2478
  id?: string | undefined;
1430
2479
  }[]] | undefined;
1431
2480
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2481
+ trusted_authorities?: [{
2482
+ type: "aki" | "etsi_tl" | "openid_federation";
2483
+ values: [string, ...string[]];
2484
+ }, ...{
2485
+ type: "aki" | "etsi_tl" | "openid_federation";
2486
+ values: [string, ...string[]];
2487
+ }[]] | undefined;
1432
2488
  })[]], undefined>, v.DescriptionAction<[{
1433
2489
  id: string;
1434
2490
  format: "mso_mdoc";
@@ -1454,6 +2510,13 @@ declare namespace DcqlQuery {
1454
2510
  intent_to_retain?: boolean | undefined;
1455
2511
  })[]] | undefined;
1456
2512
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2513
+ trusted_authorities?: [{
2514
+ type: "aki" | "etsi_tl" | "openid_federation";
2515
+ values: [string, ...string[]];
2516
+ }, ...{
2517
+ type: "aki" | "etsi_tl" | "openid_federation";
2518
+ values: [string, ...string[]];
2519
+ }[]] | undefined;
1457
2520
  meta?: {
1458
2521
  doctype_value?: string | undefined;
1459
2522
  } | undefined;
@@ -1470,12 +2533,22 @@ declare namespace DcqlQuery {
1470
2533
  id?: string | undefined;
1471
2534
  }[]] | undefined;
1472
2535
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2536
+ trusted_authorities?: [{
2537
+ type: "aki" | "etsi_tl" | "openid_federation";
2538
+ values: [string, ...string[]];
2539
+ }, ...{
2540
+ type: "aki" | "etsi_tl" | "openid_federation";
2541
+ values: [string, ...string[]];
2542
+ }[]] | undefined;
1473
2543
  meta?: {
1474
2544
  vct_values?: string[] | undefined;
1475
2545
  } | undefined;
1476
2546
  } | {
1477
2547
  id: string;
1478
- format: "jwt_vc_json-ld" | "jwt_vc_json";
2548
+ format: "ldp_vc" | "jwt_vc_json";
2549
+ meta: {
2550
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
2551
+ };
1479
2552
  claims?: [{
1480
2553
  path: [string | number | null, ...(string | number | null)[]];
1481
2554
  values?: (string | number | boolean)[] | undefined;
@@ -1486,6 +2559,13 @@ declare namespace DcqlQuery {
1486
2559
  id?: string | undefined;
1487
2560
  }[]] | undefined;
1488
2561
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2562
+ trusted_authorities?: [{
2563
+ type: "aki" | "etsi_tl" | "openid_federation";
2564
+ values: [string, ...string[]];
2565
+ }, ...{
2566
+ type: "aki" | "etsi_tl" | "openid_federation";
2567
+ values: [string, ...string[]];
2568
+ }[]] | undefined;
1489
2569
  }, ...({
1490
2570
  id: string;
1491
2571
  format: "mso_mdoc";
@@ -1511,6 +2591,13 @@ declare namespace DcqlQuery {
1511
2591
  intent_to_retain?: boolean | undefined;
1512
2592
  })[]] | undefined;
1513
2593
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2594
+ trusted_authorities?: [{
2595
+ type: "aki" | "etsi_tl" | "openid_federation";
2596
+ values: [string, ...string[]];
2597
+ }, ...{
2598
+ type: "aki" | "etsi_tl" | "openid_federation";
2599
+ values: [string, ...string[]];
2600
+ }[]] | undefined;
1514
2601
  meta?: {
1515
2602
  doctype_value?: string | undefined;
1516
2603
  } | undefined;
@@ -1527,12 +2614,22 @@ declare namespace DcqlQuery {
1527
2614
  id?: string | undefined;
1528
2615
  }[]] | undefined;
1529
2616
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2617
+ trusted_authorities?: [{
2618
+ type: "aki" | "etsi_tl" | "openid_federation";
2619
+ values: [string, ...string[]];
2620
+ }, ...{
2621
+ type: "aki" | "etsi_tl" | "openid_federation";
2622
+ values: [string, ...string[]];
2623
+ }[]] | undefined;
1530
2624
  meta?: {
1531
2625
  vct_values?: string[] | undefined;
1532
2626
  } | undefined;
1533
2627
  } | {
1534
2628
  id: string;
1535
- format: "jwt_vc_json-ld" | "jwt_vc_json";
2629
+ format: "ldp_vc" | "jwt_vc_json";
2630
+ meta: {
2631
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
2632
+ };
1536
2633
  claims?: [{
1537
2634
  path: [string | number | null, ...(string | number | null)[]];
1538
2635
  values?: (string | number | boolean)[] | undefined;
@@ -1543,6 +2640,13 @@ declare namespace DcqlQuery {
1543
2640
  id?: string | undefined;
1544
2641
  }[]] | undefined;
1545
2642
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2643
+ trusted_authorities?: [{
2644
+ type: "aki" | "etsi_tl" | "openid_federation";
2645
+ values: [string, ...string[]];
2646
+ }, ...{
2647
+ type: "aki" | "etsi_tl" | "openid_federation";
2648
+ values: [string, ...string[]];
2649
+ }[]] | undefined;
1546
2650
  })[]], "REQUIRED. A non-empty array of Credential Queries that specify the requested Verifiable Credentials.">]>;
1547
2651
  readonly credential_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
1548
2652
  readonly options: v.SchemaWithPipe<[v.ArraySchema<v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, undefined>, v.CustomSchema<[string[], ...string[][]], undefined>, v.DescriptionAction<[string[], ...string[][]], "REQUIRED. A non-empty array, where each value in the array is a list of Credential Query identifiers representing one set of Credentials that satisfies the use case.">]>;
@@ -1605,6 +2709,13 @@ declare namespace DcqlQuery {
1605
2709
  intent_to_retain?: boolean | undefined;
1606
2710
  })[]] | undefined;
1607
2711
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2712
+ trusted_authorities?: [{
2713
+ type: "aki" | "etsi_tl" | "openid_federation";
2714
+ values: [string, ...string[]];
2715
+ }, ...{
2716
+ type: "aki" | "etsi_tl" | "openid_federation";
2717
+ values: [string, ...string[]];
2718
+ }[]] | undefined;
1608
2719
  meta?: {
1609
2720
  doctype_value?: string | undefined;
1610
2721
  } | undefined;
@@ -1621,12 +2732,22 @@ declare namespace DcqlQuery {
1621
2732
  id?: string | undefined;
1622
2733
  }[]] | undefined;
1623
2734
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2735
+ trusted_authorities?: [{
2736
+ type: "aki" | "etsi_tl" | "openid_federation";
2737
+ values: [string, ...string[]];
2738
+ }, ...{
2739
+ type: "aki" | "etsi_tl" | "openid_federation";
2740
+ values: [string, ...string[]];
2741
+ }[]] | undefined;
1624
2742
  meta?: {
1625
2743
  vct_values?: string[] | undefined;
1626
2744
  } | undefined;
1627
2745
  } | {
1628
2746
  id: string;
1629
- format: "jwt_vc_json-ld" | "jwt_vc_json";
2747
+ format: "ldp_vc" | "jwt_vc_json";
2748
+ meta: {
2749
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
2750
+ };
1630
2751
  claims?: [{
1631
2752
  path: [string | number | null, ...(string | number | null)[]];
1632
2753
  values?: (string | number | boolean)[] | undefined;
@@ -1637,6 +2758,13 @@ declare namespace DcqlQuery {
1637
2758
  id?: string | undefined;
1638
2759
  }[]] | undefined;
1639
2760
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2761
+ trusted_authorities?: [{
2762
+ type: "aki" | "etsi_tl" | "openid_federation";
2763
+ values: [string, ...string[]];
2764
+ }, ...{
2765
+ type: "aki" | "etsi_tl" | "openid_federation";
2766
+ values: [string, ...string[]];
2767
+ }[]] | undefined;
1640
2768
  }, ...({
1641
2769
  id: string;
1642
2770
  format: "mso_mdoc";
@@ -1662,6 +2790,13 @@ declare namespace DcqlQuery {
1662
2790
  intent_to_retain?: boolean | undefined;
1663
2791
  })[]] | undefined;
1664
2792
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2793
+ trusted_authorities?: [{
2794
+ type: "aki" | "etsi_tl" | "openid_federation";
2795
+ values: [string, ...string[]];
2796
+ }, ...{
2797
+ type: "aki" | "etsi_tl" | "openid_federation";
2798
+ values: [string, ...string[]];
2799
+ }[]] | undefined;
1665
2800
  meta?: {
1666
2801
  doctype_value?: string | undefined;
1667
2802
  } | undefined;
@@ -1678,12 +2813,22 @@ declare namespace DcqlQuery {
1678
2813
  id?: string | undefined;
1679
2814
  }[]] | undefined;
1680
2815
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2816
+ trusted_authorities?: [{
2817
+ type: "aki" | "etsi_tl" | "openid_federation";
2818
+ values: [string, ...string[]];
2819
+ }, ...{
2820
+ type: "aki" | "etsi_tl" | "openid_federation";
2821
+ values: [string, ...string[]];
2822
+ }[]] | undefined;
1681
2823
  meta?: {
1682
2824
  vct_values?: string[] | undefined;
1683
2825
  } | undefined;
1684
2826
  } | {
1685
2827
  id: string;
1686
- format: "jwt_vc_json-ld" | "jwt_vc_json";
2828
+ format: "ldp_vc" | "jwt_vc_json";
2829
+ meta: {
2830
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
2831
+ };
1687
2832
  claims?: [{
1688
2833
  path: [string | number | null, ...(string | number | null)[]];
1689
2834
  values?: (string | number | boolean)[] | undefined;
@@ -1694,6 +2839,13 @@ declare namespace DcqlQuery {
1694
2839
  id?: string | undefined;
1695
2840
  }[]] | undefined;
1696
2841
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2842
+ trusted_authorities?: [{
2843
+ type: "aki" | "etsi_tl" | "openid_federation";
2844
+ values: [string, ...string[]];
2845
+ }, ...{
2846
+ type: "aki" | "etsi_tl" | "openid_federation";
2847
+ values: [string, ...string[]];
2848
+ }[]] | undefined;
1697
2849
  })[]];
1698
2850
  credential_matches: {
1699
2851
  [x: string]: {
@@ -1705,17 +2857,48 @@ declare namespace DcqlQuery {
1705
2857
  [x: string]: unknown;
1706
2858
  };
1707
2859
  };
2860
+ authority?: {
2861
+ type: "aki";
2862
+ value: string;
2863
+ } | {
2864
+ type: "etsi_tl";
2865
+ value: string;
2866
+ } | {
2867
+ type: "openid_federation";
2868
+ value: string;
2869
+ } | undefined;
1708
2870
  } | {
1709
2871
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
1710
2872
  vct: string;
1711
2873
  claims: {
1712
2874
  [x: string]: Json;
1713
2875
  };
2876
+ authority?: {
2877
+ type: "aki";
2878
+ value: string;
2879
+ } | {
2880
+ type: "etsi_tl";
2881
+ value: string;
2882
+ } | {
2883
+ type: "openid_federation";
2884
+ value: string;
2885
+ } | undefined;
1714
2886
  } | {
1715
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
2887
+ type: string[];
2888
+ credential_format: "ldp_vc" | "jwt_vc_json";
1716
2889
  claims: {
1717
2890
  [x: string]: Json;
1718
2891
  };
2892
+ authority?: {
2893
+ type: "aki";
2894
+ value: string;
2895
+ } | {
2896
+ type: "etsi_tl";
2897
+ value: string;
2898
+ } | {
2899
+ type: "openid_federation";
2900
+ value: string;
2901
+ } | undefined;
1719
2902
  };
1720
2903
  success: true;
1721
2904
  typed: true;
@@ -1730,17 +2913,48 @@ declare namespace DcqlQuery {
1730
2913
  [x: string]: unknown;
1731
2914
  };
1732
2915
  };
2916
+ authority?: {
2917
+ type: "aki";
2918
+ value: string;
2919
+ } | {
2920
+ type: "etsi_tl";
2921
+ value: string;
2922
+ } | {
2923
+ type: "openid_federation";
2924
+ value: string;
2925
+ } | undefined;
1733
2926
  } | {
1734
2927
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
1735
2928
  vct: string;
1736
2929
  claims: {
1737
2930
  [x: string]: Json;
1738
2931
  };
2932
+ authority?: {
2933
+ type: "aki";
2934
+ value: string;
2935
+ } | {
2936
+ type: "etsi_tl";
2937
+ value: string;
2938
+ } | {
2939
+ type: "openid_federation";
2940
+ value: string;
2941
+ } | undefined;
1739
2942
  } | {
1740
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
2943
+ type: string[];
2944
+ credential_format: "ldp_vc" | "jwt_vc_json";
1741
2945
  claims: {
1742
2946
  [x: string]: Json;
1743
2947
  };
2948
+ authority?: {
2949
+ type: "aki";
2950
+ value: string;
2951
+ } | {
2952
+ type: "etsi_tl";
2953
+ value: string;
2954
+ } | {
2955
+ type: "openid_federation";
2956
+ value: string;
2957
+ } | undefined;
1744
2958
  };
1745
2959
  success: true;
1746
2960
  typed: true;
@@ -1763,17 +2977,48 @@ declare namespace DcqlQuery {
1763
2977
  [x: string]: unknown;
1764
2978
  };
1765
2979
  };
2980
+ authority?: {
2981
+ type: "aki";
2982
+ value: string;
2983
+ } | {
2984
+ type: "etsi_tl";
2985
+ value: string;
2986
+ } | {
2987
+ type: "openid_federation";
2988
+ value: string;
2989
+ } | undefined;
1766
2990
  } | {
1767
2991
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
1768
2992
  vct: string;
1769
2993
  claims: {
1770
2994
  [x: string]: Json;
1771
2995
  };
2996
+ authority?: {
2997
+ type: "aki";
2998
+ value: string;
2999
+ } | {
3000
+ type: "etsi_tl";
3001
+ value: string;
3002
+ } | {
3003
+ type: "openid_federation";
3004
+ value: string;
3005
+ } | undefined;
1772
3006
  } | {
1773
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
3007
+ type: string[];
3008
+ credential_format: "ldp_vc" | "jwt_vc_json";
1774
3009
  claims: {
1775
3010
  [x: string]: Json;
1776
3011
  };
3012
+ authority?: {
3013
+ type: "aki";
3014
+ value: string;
3015
+ } | {
3016
+ type: "etsi_tl";
3017
+ value: string;
3018
+ } | {
3019
+ type: "openid_federation";
3020
+ value: string;
3021
+ } | undefined;
1777
3022
  };
1778
3023
  success: true;
1779
3024
  typed: true;
@@ -1796,17 +3041,48 @@ declare namespace DcqlQuery {
1796
3041
  [x: string]: unknown;
1797
3042
  };
1798
3043
  };
3044
+ authority?: {
3045
+ type: "aki";
3046
+ value: string;
3047
+ } | {
3048
+ type: "etsi_tl";
3049
+ value: string;
3050
+ } | {
3051
+ type: "openid_federation";
3052
+ value: string;
3053
+ } | undefined;
1799
3054
  } | {
1800
3055
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
1801
3056
  vct: string;
1802
3057
  claims: {
1803
3058
  [x: string]: Json;
1804
3059
  };
3060
+ authority?: {
3061
+ type: "aki";
3062
+ value: string;
3063
+ } | {
3064
+ type: "etsi_tl";
3065
+ value: string;
3066
+ } | {
3067
+ type: "openid_federation";
3068
+ value: string;
3069
+ } | undefined;
1805
3070
  } | {
1806
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
3071
+ type: string[];
3072
+ credential_format: "ldp_vc" | "jwt_vc_json";
1807
3073
  claims: {
1808
3074
  [x: string]: Json;
1809
3075
  };
3076
+ authority?: {
3077
+ type: "aki";
3078
+ value: string;
3079
+ } | {
3080
+ type: "etsi_tl";
3081
+ value: string;
3082
+ } | {
3083
+ type: "openid_federation";
3084
+ value: string;
3085
+ } | undefined;
1810
3086
  };
1811
3087
  success: true;
1812
3088
  typed: true;
@@ -1829,17 +3105,48 @@ declare namespace DcqlQuery {
1829
3105
  [x: string]: unknown;
1830
3106
  };
1831
3107
  };
3108
+ authority?: {
3109
+ type: "aki";
3110
+ value: string;
3111
+ } | {
3112
+ type: "etsi_tl";
3113
+ value: string;
3114
+ } | {
3115
+ type: "openid_federation";
3116
+ value: string;
3117
+ } | undefined;
1832
3118
  } | {
1833
3119
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
1834
3120
  vct: string;
1835
3121
  claims: {
1836
3122
  [x: string]: Json;
1837
3123
  };
3124
+ authority?: {
3125
+ type: "aki";
3126
+ value: string;
3127
+ } | {
3128
+ type: "etsi_tl";
3129
+ value: string;
3130
+ } | {
3131
+ type: "openid_federation";
3132
+ value: string;
3133
+ } | undefined;
1838
3134
  } | {
1839
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
3135
+ type: string[];
3136
+ credential_format: "ldp_vc" | "jwt_vc_json";
1840
3137
  claims: {
1841
3138
  [x: string]: Json;
1842
3139
  };
3140
+ authority?: {
3141
+ type: "aki";
3142
+ value: string;
3143
+ } | {
3144
+ type: "etsi_tl";
3145
+ value: string;
3146
+ } | {
3147
+ type: "openid_federation";
3148
+ value: string;
3149
+ } | undefined;
1843
3150
  };
1844
3151
  success: true;
1845
3152
  typed: true;
@@ -1866,17 +3173,48 @@ declare namespace DcqlQuery {
1866
3173
  [x: string]: unknown;
1867
3174
  };
1868
3175
  };
3176
+ authority?: {
3177
+ type: "aki";
3178
+ value: string;
3179
+ } | {
3180
+ type: "etsi_tl";
3181
+ value: string;
3182
+ } | {
3183
+ type: "openid_federation";
3184
+ value: string;
3185
+ } | undefined;
1869
3186
  } | {
1870
3187
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
1871
3188
  vct: string;
1872
3189
  claims: {
1873
3190
  [x: string]: Json;
1874
3191
  };
3192
+ authority?: {
3193
+ type: "aki";
3194
+ value: string;
3195
+ } | {
3196
+ type: "etsi_tl";
3197
+ value: string;
3198
+ } | {
3199
+ type: "openid_federation";
3200
+ value: string;
3201
+ } | undefined;
1875
3202
  } | {
1876
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
3203
+ type: string[];
3204
+ credential_format: "ldp_vc" | "jwt_vc_json";
1877
3205
  claims: {
1878
3206
  [x: string]: Json;
1879
3207
  };
3208
+ authority?: {
3209
+ type: "aki";
3210
+ value: string;
3211
+ } | {
3212
+ type: "etsi_tl";
3213
+ value: string;
3214
+ } | {
3215
+ type: "openid_federation";
3216
+ value: string;
3217
+ } | undefined;
1880
3218
  };
1881
3219
  success: true;
1882
3220
  typed: true;
@@ -1899,17 +3237,48 @@ declare namespace DcqlQuery {
1899
3237
  [x: string]: unknown;
1900
3238
  };
1901
3239
  };
3240
+ authority?: {
3241
+ type: "aki";
3242
+ value: string;
3243
+ } | {
3244
+ type: "etsi_tl";
3245
+ value: string;
3246
+ } | {
3247
+ type: "openid_federation";
3248
+ value: string;
3249
+ } | undefined;
1902
3250
  } | {
1903
3251
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
1904
3252
  vct: string;
1905
3253
  claims: {
1906
3254
  [x: string]: Json;
1907
3255
  };
3256
+ authority?: {
3257
+ type: "aki";
3258
+ value: string;
3259
+ } | {
3260
+ type: "etsi_tl";
3261
+ value: string;
3262
+ } | {
3263
+ type: "openid_federation";
3264
+ value: string;
3265
+ } | undefined;
1908
3266
  } | {
1909
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
3267
+ type: string[];
3268
+ credential_format: "ldp_vc" | "jwt_vc_json";
1910
3269
  claims: {
1911
3270
  [x: string]: Json;
1912
3271
  };
3272
+ authority?: {
3273
+ type: "aki";
3274
+ value: string;
3275
+ } | {
3276
+ type: "etsi_tl";
3277
+ value: string;
3278
+ } | {
3279
+ type: "openid_federation";
3280
+ value: string;
3281
+ } | undefined;
1913
3282
  };
1914
3283
  success: true;
1915
3284
  typed: true;
@@ -1932,17 +3301,48 @@ declare namespace DcqlQuery {
1932
3301
  [x: string]: unknown;
1933
3302
  };
1934
3303
  };
3304
+ authority?: {
3305
+ type: "aki";
3306
+ value: string;
3307
+ } | {
3308
+ type: "etsi_tl";
3309
+ value: string;
3310
+ } | {
3311
+ type: "openid_federation";
3312
+ value: string;
3313
+ } | undefined;
1935
3314
  } | {
1936
3315
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
1937
3316
  vct: string;
1938
3317
  claims: {
1939
3318
  [x: string]: Json;
1940
3319
  };
3320
+ authority?: {
3321
+ type: "aki";
3322
+ value: string;
3323
+ } | {
3324
+ type: "etsi_tl";
3325
+ value: string;
3326
+ } | {
3327
+ type: "openid_federation";
3328
+ value: string;
3329
+ } | undefined;
1941
3330
  } | {
1942
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
3331
+ type: string[];
3332
+ credential_format: "ldp_vc" | "jwt_vc_json";
1943
3333
  claims: {
1944
3334
  [x: string]: Json;
1945
3335
  };
3336
+ authority?: {
3337
+ type: "aki";
3338
+ value: string;
3339
+ } | {
3340
+ type: "etsi_tl";
3341
+ value: string;
3342
+ } | {
3343
+ type: "openid_federation";
3344
+ value: string;
3345
+ } | undefined;
1946
3346
  };
1947
3347
  success: true;
1948
3348
  typed: true;
@@ -1965,17 +3365,48 @@ declare namespace DcqlQuery {
1965
3365
  [x: string]: unknown;
1966
3366
  };
1967
3367
  };
3368
+ authority?: {
3369
+ type: "aki";
3370
+ value: string;
3371
+ } | {
3372
+ type: "etsi_tl";
3373
+ value: string;
3374
+ } | {
3375
+ type: "openid_federation";
3376
+ value: string;
3377
+ } | undefined;
1968
3378
  } | {
1969
3379
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
1970
3380
  vct: string;
1971
3381
  claims: {
1972
3382
  [x: string]: Json;
1973
3383
  };
3384
+ authority?: {
3385
+ type: "aki";
3386
+ value: string;
3387
+ } | {
3388
+ type: "etsi_tl";
3389
+ value: string;
3390
+ } | {
3391
+ type: "openid_federation";
3392
+ value: string;
3393
+ } | undefined;
1974
3394
  } | {
1975
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
3395
+ type: string[];
3396
+ credential_format: "ldp_vc" | "jwt_vc_json";
1976
3397
  claims: {
1977
3398
  [x: string]: Json;
1978
3399
  };
3400
+ authority?: {
3401
+ type: "aki";
3402
+ value: string;
3403
+ } | {
3404
+ type: "etsi_tl";
3405
+ value: string;
3406
+ } | {
3407
+ type: "openid_federation";
3408
+ value: string;
3409
+ } | undefined;
1979
3410
  };
1980
3411
  success: true;
1981
3412
  typed: true;
@@ -2035,6 +3466,13 @@ declare namespace DcqlQuery {
2035
3466
  intent_to_retain?: boolean | undefined;
2036
3467
  })[]] | undefined;
2037
3468
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3469
+ trusted_authorities?: [{
3470
+ type: "aki" | "etsi_tl" | "openid_federation";
3471
+ values: [string, ...string[]];
3472
+ }, ...{
3473
+ type: "aki" | "etsi_tl" | "openid_federation";
3474
+ values: [string, ...string[]];
3475
+ }[]] | undefined;
2038
3476
  meta?: {
2039
3477
  doctype_value?: string | undefined;
2040
3478
  } | undefined;
@@ -2051,12 +3489,22 @@ declare namespace DcqlQuery {
2051
3489
  id?: string | undefined;
2052
3490
  }[]] | undefined;
2053
3491
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3492
+ trusted_authorities?: [{
3493
+ type: "aki" | "etsi_tl" | "openid_federation";
3494
+ values: [string, ...string[]];
3495
+ }, ...{
3496
+ type: "aki" | "etsi_tl" | "openid_federation";
3497
+ values: [string, ...string[]];
3498
+ }[]] | undefined;
2054
3499
  meta?: {
2055
3500
  vct_values?: string[] | undefined;
2056
3501
  } | undefined;
2057
3502
  } | {
2058
3503
  id: string;
2059
- format: "jwt_vc_json-ld" | "jwt_vc_json";
3504
+ format: "ldp_vc" | "jwt_vc_json";
3505
+ meta: {
3506
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
3507
+ };
2060
3508
  claims?: [{
2061
3509
  path: [string | number | null, ...(string | number | null)[]];
2062
3510
  values?: (string | number | boolean)[] | undefined;
@@ -2067,6 +3515,13 @@ declare namespace DcqlQuery {
2067
3515
  id?: string | undefined;
2068
3516
  }[]] | undefined;
2069
3517
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3518
+ trusted_authorities?: [{
3519
+ type: "aki" | "etsi_tl" | "openid_federation";
3520
+ values: [string, ...string[]];
3521
+ }, ...{
3522
+ type: "aki" | "etsi_tl" | "openid_federation";
3523
+ values: [string, ...string[]];
3524
+ }[]] | undefined;
2070
3525
  }, ...({
2071
3526
  id: string;
2072
3527
  format: "mso_mdoc";
@@ -2092,6 +3547,13 @@ declare namespace DcqlQuery {
2092
3547
  intent_to_retain?: boolean | undefined;
2093
3548
  })[]] | undefined;
2094
3549
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3550
+ trusted_authorities?: [{
3551
+ type: "aki" | "etsi_tl" | "openid_federation";
3552
+ values: [string, ...string[]];
3553
+ }, ...{
3554
+ type: "aki" | "etsi_tl" | "openid_federation";
3555
+ values: [string, ...string[]];
3556
+ }[]] | undefined;
2095
3557
  meta?: {
2096
3558
  doctype_value?: string | undefined;
2097
3559
  } | undefined;
@@ -2108,12 +3570,22 @@ declare namespace DcqlQuery {
2108
3570
  id?: string | undefined;
2109
3571
  }[]] | undefined;
2110
3572
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3573
+ trusted_authorities?: [{
3574
+ type: "aki" | "etsi_tl" | "openid_federation";
3575
+ values: [string, ...string[]];
3576
+ }, ...{
3577
+ type: "aki" | "etsi_tl" | "openid_federation";
3578
+ values: [string, ...string[]];
3579
+ }[]] | undefined;
2111
3580
  meta?: {
2112
3581
  vct_values?: string[] | undefined;
2113
3582
  } | undefined;
2114
3583
  } | {
2115
3584
  id: string;
2116
- format: "jwt_vc_json-ld" | "jwt_vc_json";
3585
+ format: "ldp_vc" | "jwt_vc_json";
3586
+ meta: {
3587
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
3588
+ };
2117
3589
  claims?: [{
2118
3590
  path: [string | number | null, ...(string | number | null)[]];
2119
3591
  values?: (string | number | boolean)[] | undefined;
@@ -2124,6 +3596,13 @@ declare namespace DcqlQuery {
2124
3596
  id?: string | undefined;
2125
3597
  }[]] | undefined;
2126
3598
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3599
+ trusted_authorities?: [{
3600
+ type: "aki" | "etsi_tl" | "openid_federation";
3601
+ values: [string, ...string[]];
3602
+ }, ...{
3603
+ type: "aki" | "etsi_tl" | "openid_federation";
3604
+ values: [string, ...string[]];
3605
+ }[]] | undefined;
2127
3606
  })[]];
2128
3607
  credential_sets?: [{
2129
3608
  options: [string[], ...string[][]];
@@ -2158,13 +3637,44 @@ declare namespace DcqlPresentationResult {
2158
3637
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
2159
3638
  readonly doctype: v.StringSchema<undefined>;
2160
3639
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
3640
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
3641
+ readonly type: v.LiteralSchema<"aki", undefined>;
3642
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
3643
+ }, undefined>, v.ObjectSchema<{
3644
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
3645
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
3646
+ }, undefined>, v.ObjectSchema<{
3647
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
3648
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
3649
+ }, undefined>], undefined>, undefined>;
2161
3650
  }, undefined>, v.ObjectSchema<{
2162
3651
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
2163
3652
  readonly vct: v.StringSchema<undefined>;
2164
3653
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
3654
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
3655
+ readonly type: v.LiteralSchema<"aki", undefined>;
3656
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
3657
+ }, undefined>, v.ObjectSchema<{
3658
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
3659
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
3660
+ }, undefined>, v.ObjectSchema<{
3661
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
3662
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
3663
+ }, undefined>], undefined>, undefined>;
2165
3664
  }, undefined>, v.ObjectSchema<{
2166
- readonly credential_format: v.PicklistSchema<["jwt_vc_json-ld", "jwt_vc_json"], undefined>;
3665
+ readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
2167
3666
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
3667
+ readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
3668
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
3669
+ readonly type: v.LiteralSchema<"aki", undefined>;
3670
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
3671
+ }, undefined>, v.ObjectSchema<{
3672
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
3673
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
3674
+ }, undefined>, v.ObjectSchema<{
3675
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
3676
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
3677
+ }, undefined>], undefined>, undefined>;
2168
3678
  }, undefined>], undefined>;
2169
3679
  readonly success: v.LiteralSchema<true, undefined>;
2170
3680
  readonly typed: v.LiteralSchema<true, undefined>;
@@ -2230,6 +3740,22 @@ declare namespace DcqlPresentationResult {
2230
3740
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
2231
3741
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
2232
3742
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
3743
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
3744
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
3745
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
3746
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
3747
+ type: "aki" | "etsi_tl" | "openid_federation";
3748
+ values: [string, ...string[]];
3749
+ }, ...{
3750
+ type: "aki" | "etsi_tl" | "openid_federation";
3751
+ values: [string, ...string[]];
3752
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
3753
+ type: "aki" | "etsi_tl" | "openid_federation";
3754
+ values: [string, ...string[]];
3755
+ }, ...{
3756
+ type: "aki" | "etsi_tl" | "openid_federation";
3757
+ values: [string, ...string[]];
3758
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
2233
3759
  }, undefined>, v.ObjectSchema<{
2234
3760
  readonly format: v.SchemaWithPipe<[v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>, v.DescriptionAction<"vc+sd-jwt" | "dc+sd-jwt", "REQUIRED. A string that specifies the format of the requested Verifiable Credential.">]>;
2235
3761
  readonly claims: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
@@ -2262,8 +3788,24 @@ declare namespace DcqlPresentationResult {
2262
3788
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
2263
3789
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
2264
3790
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
3791
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
3792
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
3793
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
3794
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
3795
+ type: "aki" | "etsi_tl" | "openid_federation";
3796
+ values: [string, ...string[]];
3797
+ }, ...{
3798
+ type: "aki" | "etsi_tl" | "openid_federation";
3799
+ values: [string, ...string[]];
3800
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
3801
+ type: "aki" | "etsi_tl" | "openid_federation";
3802
+ values: [string, ...string[]];
3803
+ }, ...{
3804
+ type: "aki" | "etsi_tl" | "openid_federation";
3805
+ values: [string, ...string[]];
3806
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
2265
3807
  }, undefined>, v.ObjectSchema<{
2266
- readonly format: v.PicklistSchema<["jwt_vc_json", "jwt_vc_json-ld"], undefined>;
3808
+ readonly format: v.PicklistSchema<["jwt_vc_json", "ldp_vc"], undefined>;
2267
3809
  readonly claims: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
2268
3810
  readonly id: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.DescriptionAction<string | undefined, "A string identifying the particular claim. The value MUST be a non-empty string consisting of alphanumeric, underscore (_) or hyphen (-) characters. Within the particular claims array, the same id MUST NOT be present more than once.">]>;
2269
3811
  readonly path: v.SchemaWithPipe<[v.ArraySchema<v.UnionSchema<[v.StringSchema<undefined>, v.SchemaWithPipe<[v.NumberSchema<undefined>, v.IntegerAction<number, undefined>, v.MinValueAction<number, 0, undefined>]>, v.NullSchema<undefined>], undefined>, undefined>, v.CustomSchema<[string | number | null, ...(string | number | null)[]], undefined>, v.DescriptionAction<[string | number | null, ...(string | number | null)[]], "A non-empty array representing a claims path pointer that specifies the path to a claim within the Verifiable Credential.">]>;
@@ -2277,8 +3819,29 @@ declare namespace DcqlPresentationResult {
2277
3819
  values?: (string | number | boolean)[] | undefined;
2278
3820
  id?: string | undefined;
2279
3821
  }[]], undefined>]>, undefined>;
3822
+ readonly meta: v.SchemaWithPipe<[v.SchemaWithPipe<[v.ObjectSchema<{
3823
+ readonly type_values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.StringSchema<undefined>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]], "REQUIRED. An array of string arrays that specifies the fully expanded types (IRIs) after the @context was applied that the Verifier accepts to be presented in the Presentation. Each of the top-level arrays specifies one alternative to match the type values of the Verifiable Credential against. Each inner array specifies a set of fully expanded types that MUST be present in the type property of the Verifiable Credential, regardless of order or the presence of additional types.">]>;
3824
+ }, undefined>]>, v.DescriptionAction<{
3825
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
3826
+ }, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
2280
3827
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
2281
3828
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
3829
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
3830
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
3831
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
3832
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
3833
+ type: "aki" | "etsi_tl" | "openid_federation";
3834
+ values: [string, ...string[]];
3835
+ }, ...{
3836
+ type: "aki" | "etsi_tl" | "openid_federation";
3837
+ values: [string, ...string[]];
3838
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
3839
+ type: "aki" | "etsi_tl" | "openid_federation";
3840
+ values: [string, ...string[]];
3841
+ }, ...{
3842
+ type: "aki" | "etsi_tl" | "openid_federation";
3843
+ values: [string, ...string[]];
3844
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
2282
3845
  }, undefined>], undefined>, undefined>, v.CustomSchema<[{
2283
3846
  id: string;
2284
3847
  format: "mso_mdoc";
@@ -2304,6 +3867,13 @@ declare namespace DcqlPresentationResult {
2304
3867
  intent_to_retain?: boolean | undefined;
2305
3868
  })[]] | undefined;
2306
3869
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3870
+ trusted_authorities?: [{
3871
+ type: "aki" | "etsi_tl" | "openid_federation";
3872
+ values: [string, ...string[]];
3873
+ }, ...{
3874
+ type: "aki" | "etsi_tl" | "openid_federation";
3875
+ values: [string, ...string[]];
3876
+ }[]] | undefined;
2307
3877
  meta?: {
2308
3878
  doctype_value?: string | undefined;
2309
3879
  } | undefined;
@@ -2320,12 +3890,22 @@ declare namespace DcqlPresentationResult {
2320
3890
  id?: string | undefined;
2321
3891
  }[]] | undefined;
2322
3892
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3893
+ trusted_authorities?: [{
3894
+ type: "aki" | "etsi_tl" | "openid_federation";
3895
+ values: [string, ...string[]];
3896
+ }, ...{
3897
+ type: "aki" | "etsi_tl" | "openid_federation";
3898
+ values: [string, ...string[]];
3899
+ }[]] | undefined;
2323
3900
  meta?: {
2324
3901
  vct_values?: string[] | undefined;
2325
3902
  } | undefined;
2326
3903
  } | {
2327
3904
  id: string;
2328
- format: "jwt_vc_json-ld" | "jwt_vc_json";
3905
+ format: "ldp_vc" | "jwt_vc_json";
3906
+ meta: {
3907
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
3908
+ };
2329
3909
  claims?: [{
2330
3910
  path: [string | number | null, ...(string | number | null)[]];
2331
3911
  values?: (string | number | boolean)[] | undefined;
@@ -2336,6 +3916,13 @@ declare namespace DcqlPresentationResult {
2336
3916
  id?: string | undefined;
2337
3917
  }[]] | undefined;
2338
3918
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3919
+ trusted_authorities?: [{
3920
+ type: "aki" | "etsi_tl" | "openid_federation";
3921
+ values: [string, ...string[]];
3922
+ }, ...{
3923
+ type: "aki" | "etsi_tl" | "openid_federation";
3924
+ values: [string, ...string[]];
3925
+ }[]] | undefined;
2339
3926
  }, ...({
2340
3927
  id: string;
2341
3928
  format: "mso_mdoc";
@@ -2361,6 +3948,13 @@ declare namespace DcqlPresentationResult {
2361
3948
  intent_to_retain?: boolean | undefined;
2362
3949
  })[]] | undefined;
2363
3950
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3951
+ trusted_authorities?: [{
3952
+ type: "aki" | "etsi_tl" | "openid_federation";
3953
+ values: [string, ...string[]];
3954
+ }, ...{
3955
+ type: "aki" | "etsi_tl" | "openid_federation";
3956
+ values: [string, ...string[]];
3957
+ }[]] | undefined;
2364
3958
  meta?: {
2365
3959
  doctype_value?: string | undefined;
2366
3960
  } | undefined;
@@ -2377,12 +3971,22 @@ declare namespace DcqlPresentationResult {
2377
3971
  id?: string | undefined;
2378
3972
  }[]] | undefined;
2379
3973
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3974
+ trusted_authorities?: [{
3975
+ type: "aki" | "etsi_tl" | "openid_federation";
3976
+ values: [string, ...string[]];
3977
+ }, ...{
3978
+ type: "aki" | "etsi_tl" | "openid_federation";
3979
+ values: [string, ...string[]];
3980
+ }[]] | undefined;
2380
3981
  meta?: {
2381
3982
  vct_values?: string[] | undefined;
2382
3983
  } | undefined;
2383
3984
  } | {
2384
3985
  id: string;
2385
- format: "jwt_vc_json-ld" | "jwt_vc_json";
3986
+ format: "ldp_vc" | "jwt_vc_json";
3987
+ meta: {
3988
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
3989
+ };
2386
3990
  claims?: [{
2387
3991
  path: [string | number | null, ...(string | number | null)[]];
2388
3992
  values?: (string | number | boolean)[] | undefined;
@@ -2393,6 +3997,13 @@ declare namespace DcqlPresentationResult {
2393
3997
  id?: string | undefined;
2394
3998
  }[]] | undefined;
2395
3999
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4000
+ trusted_authorities?: [{
4001
+ type: "aki" | "etsi_tl" | "openid_federation";
4002
+ values: [string, ...string[]];
4003
+ }, ...{
4004
+ type: "aki" | "etsi_tl" | "openid_federation";
4005
+ values: [string, ...string[]];
4006
+ }[]] | undefined;
2396
4007
  })[]], undefined>, v.DescriptionAction<[{
2397
4008
  id: string;
2398
4009
  format: "mso_mdoc";
@@ -2418,6 +4029,13 @@ declare namespace DcqlPresentationResult {
2418
4029
  intent_to_retain?: boolean | undefined;
2419
4030
  })[]] | undefined;
2420
4031
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4032
+ trusted_authorities?: [{
4033
+ type: "aki" | "etsi_tl" | "openid_federation";
4034
+ values: [string, ...string[]];
4035
+ }, ...{
4036
+ type: "aki" | "etsi_tl" | "openid_federation";
4037
+ values: [string, ...string[]];
4038
+ }[]] | undefined;
2421
4039
  meta?: {
2422
4040
  doctype_value?: string | undefined;
2423
4041
  } | undefined;
@@ -2434,12 +4052,22 @@ declare namespace DcqlPresentationResult {
2434
4052
  id?: string | undefined;
2435
4053
  }[]] | undefined;
2436
4054
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4055
+ trusted_authorities?: [{
4056
+ type: "aki" | "etsi_tl" | "openid_federation";
4057
+ values: [string, ...string[]];
4058
+ }, ...{
4059
+ type: "aki" | "etsi_tl" | "openid_federation";
4060
+ values: [string, ...string[]];
4061
+ }[]] | undefined;
2437
4062
  meta?: {
2438
4063
  vct_values?: string[] | undefined;
2439
4064
  } | undefined;
2440
4065
  } | {
2441
4066
  id: string;
2442
- format: "jwt_vc_json-ld" | "jwt_vc_json";
4067
+ format: "ldp_vc" | "jwt_vc_json";
4068
+ meta: {
4069
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
4070
+ };
2443
4071
  claims?: [{
2444
4072
  path: [string | number | null, ...(string | number | null)[]];
2445
4073
  values?: (string | number | boolean)[] | undefined;
@@ -2450,6 +4078,13 @@ declare namespace DcqlPresentationResult {
2450
4078
  id?: string | undefined;
2451
4079
  }[]] | undefined;
2452
4080
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4081
+ trusted_authorities?: [{
4082
+ type: "aki" | "etsi_tl" | "openid_federation";
4083
+ values: [string, ...string[]];
4084
+ }, ...{
4085
+ type: "aki" | "etsi_tl" | "openid_federation";
4086
+ values: [string, ...string[]];
4087
+ }[]] | undefined;
2453
4088
  }, ...({
2454
4089
  id: string;
2455
4090
  format: "mso_mdoc";
@@ -2475,6 +4110,13 @@ declare namespace DcqlPresentationResult {
2475
4110
  intent_to_retain?: boolean | undefined;
2476
4111
  })[]] | undefined;
2477
4112
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4113
+ trusted_authorities?: [{
4114
+ type: "aki" | "etsi_tl" | "openid_federation";
4115
+ values: [string, ...string[]];
4116
+ }, ...{
4117
+ type: "aki" | "etsi_tl" | "openid_federation";
4118
+ values: [string, ...string[]];
4119
+ }[]] | undefined;
2478
4120
  meta?: {
2479
4121
  doctype_value?: string | undefined;
2480
4122
  } | undefined;
@@ -2491,12 +4133,22 @@ declare namespace DcqlPresentationResult {
2491
4133
  id?: string | undefined;
2492
4134
  }[]] | undefined;
2493
4135
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4136
+ trusted_authorities?: [{
4137
+ type: "aki" | "etsi_tl" | "openid_federation";
4138
+ values: [string, ...string[]];
4139
+ }, ...{
4140
+ type: "aki" | "etsi_tl" | "openid_federation";
4141
+ values: [string, ...string[]];
4142
+ }[]] | undefined;
2494
4143
  meta?: {
2495
4144
  vct_values?: string[] | undefined;
2496
4145
  } | undefined;
2497
4146
  } | {
2498
4147
  id: string;
2499
- format: "jwt_vc_json-ld" | "jwt_vc_json";
4148
+ format: "ldp_vc" | "jwt_vc_json";
4149
+ meta: {
4150
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
4151
+ };
2500
4152
  claims?: [{
2501
4153
  path: [string | number | null, ...(string | number | null)[]];
2502
4154
  values?: (string | number | boolean)[] | undefined;
@@ -2507,6 +4159,13 @@ declare namespace DcqlPresentationResult {
2507
4159
  id?: string | undefined;
2508
4160
  }[]] | undefined;
2509
4161
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4162
+ trusted_authorities?: [{
4163
+ type: "aki" | "etsi_tl" | "openid_federation";
4164
+ values: [string, ...string[]];
4165
+ }, ...{
4166
+ type: "aki" | "etsi_tl" | "openid_federation";
4167
+ values: [string, ...string[]];
4168
+ }[]] | undefined;
2510
4169
  })[]], "REQUIRED. A non-empty array of Credential Queries that specify the requested Verifiable Credentials.">]>;
2511
4170
  readonly credential_sets: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
2512
4171
  readonly matching_options: v.UnionSchema<[v.UndefinedSchema<undefined>, v.SchemaWithPipe<[v.ArraySchema<v.ArraySchema<v.StringSchema<undefined>, undefined>, undefined>, v.CustomSchema<[string[], ...string[][]], undefined>]>], undefined>;
@@ -2574,6 +4233,13 @@ declare namespace DcqlPresentationResult {
2574
4233
  intent_to_retain?: boolean | undefined;
2575
4234
  })[]] | undefined;
2576
4235
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4236
+ trusted_authorities?: [{
4237
+ type: "aki" | "etsi_tl" | "openid_federation";
4238
+ values: [string, ...string[]];
4239
+ }, ...{
4240
+ type: "aki" | "etsi_tl" | "openid_federation";
4241
+ values: [string, ...string[]];
4242
+ }[]] | undefined;
2577
4243
  meta?: {
2578
4244
  doctype_value?: string | undefined;
2579
4245
  } | undefined;
@@ -2590,12 +4256,22 @@ declare namespace DcqlPresentationResult {
2590
4256
  id?: string | undefined;
2591
4257
  }[]] | undefined;
2592
4258
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4259
+ trusted_authorities?: [{
4260
+ type: "aki" | "etsi_tl" | "openid_federation";
4261
+ values: [string, ...string[]];
4262
+ }, ...{
4263
+ type: "aki" | "etsi_tl" | "openid_federation";
4264
+ values: [string, ...string[]];
4265
+ }[]] | undefined;
2593
4266
  meta?: {
2594
4267
  vct_values?: string[] | undefined;
2595
4268
  } | undefined;
2596
4269
  } | {
2597
4270
  id: string;
2598
- format: "jwt_vc_json-ld" | "jwt_vc_json";
4271
+ format: "ldp_vc" | "jwt_vc_json";
4272
+ meta: {
4273
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
4274
+ };
2599
4275
  claims?: [{
2600
4276
  path: [string | number | null, ...(string | number | null)[]];
2601
4277
  values?: (string | number | boolean)[] | undefined;
@@ -2606,6 +4282,13 @@ declare namespace DcqlPresentationResult {
2606
4282
  id?: string | undefined;
2607
4283
  }[]] | undefined;
2608
4284
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4285
+ trusted_authorities?: [{
4286
+ type: "aki" | "etsi_tl" | "openid_federation";
4287
+ values: [string, ...string[]];
4288
+ }, ...{
4289
+ type: "aki" | "etsi_tl" | "openid_federation";
4290
+ values: [string, ...string[]];
4291
+ }[]] | undefined;
2609
4292
  }, ...({
2610
4293
  id: string;
2611
4294
  format: "mso_mdoc";
@@ -2631,6 +4314,13 @@ declare namespace DcqlPresentationResult {
2631
4314
  intent_to_retain?: boolean | undefined;
2632
4315
  })[]] | undefined;
2633
4316
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4317
+ trusted_authorities?: [{
4318
+ type: "aki" | "etsi_tl" | "openid_federation";
4319
+ values: [string, ...string[]];
4320
+ }, ...{
4321
+ type: "aki" | "etsi_tl" | "openid_federation";
4322
+ values: [string, ...string[]];
4323
+ }[]] | undefined;
2634
4324
  meta?: {
2635
4325
  doctype_value?: string | undefined;
2636
4326
  } | undefined;
@@ -2647,12 +4337,22 @@ declare namespace DcqlPresentationResult {
2647
4337
  id?: string | undefined;
2648
4338
  }[]] | undefined;
2649
4339
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4340
+ trusted_authorities?: [{
4341
+ type: "aki" | "etsi_tl" | "openid_federation";
4342
+ values: [string, ...string[]];
4343
+ }, ...{
4344
+ type: "aki" | "etsi_tl" | "openid_federation";
4345
+ values: [string, ...string[]];
4346
+ }[]] | undefined;
2650
4347
  meta?: {
2651
4348
  vct_values?: string[] | undefined;
2652
4349
  } | undefined;
2653
4350
  } | {
2654
4351
  id: string;
2655
- format: "jwt_vc_json-ld" | "jwt_vc_json";
4352
+ format: "ldp_vc" | "jwt_vc_json";
4353
+ meta: {
4354
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
4355
+ };
2656
4356
  claims?: [{
2657
4357
  path: [string | number | null, ...(string | number | null)[]];
2658
4358
  values?: (string | number | boolean)[] | undefined;
@@ -2663,6 +4363,13 @@ declare namespace DcqlPresentationResult {
2663
4363
  id?: string | undefined;
2664
4364
  }[]] | undefined;
2665
4365
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4366
+ trusted_authorities?: [{
4367
+ type: "aki" | "etsi_tl" | "openid_federation";
4368
+ values: [string, ...string[]];
4369
+ }, ...{
4370
+ type: "aki" | "etsi_tl" | "openid_federation";
4371
+ values: [string, ...string[]];
4372
+ }[]] | undefined;
2666
4373
  })[]];
2667
4374
  canBeSatisfied: boolean;
2668
4375
  invalid_matches: {
@@ -2685,17 +4392,48 @@ declare namespace DcqlPresentationResult {
2685
4392
  [x: string]: unknown;
2686
4393
  };
2687
4394
  };
4395
+ authority?: {
4396
+ type: "aki";
4397
+ value: string;
4398
+ } | {
4399
+ type: "etsi_tl";
4400
+ value: string;
4401
+ } | {
4402
+ type: "openid_federation";
4403
+ value: string;
4404
+ } | undefined;
2688
4405
  } | {
2689
4406
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
2690
4407
  vct: string;
2691
4408
  claims: {
2692
4409
  [x: string]: Json;
2693
4410
  };
4411
+ authority?: {
4412
+ type: "aki";
4413
+ value: string;
4414
+ } | {
4415
+ type: "etsi_tl";
4416
+ value: string;
4417
+ } | {
4418
+ type: "openid_federation";
4419
+ value: string;
4420
+ } | undefined;
2694
4421
  } | {
2695
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
4422
+ type: string[];
4423
+ credential_format: "ldp_vc" | "jwt_vc_json";
2696
4424
  claims: {
2697
4425
  [x: string]: Json;
2698
4426
  };
4427
+ authority?: {
4428
+ type: "aki";
4429
+ value: string;
4430
+ } | {
4431
+ type: "etsi_tl";
4432
+ value: string;
4433
+ } | {
4434
+ type: "openid_federation";
4435
+ value: string;
4436
+ } | undefined;
2699
4437
  };
2700
4438
  success: true;
2701
4439
  typed: true;
@@ -2755,6 +4493,13 @@ declare namespace DcqlPresentationResult {
2755
4493
  intent_to_retain?: boolean | undefined;
2756
4494
  })[]] | undefined;
2757
4495
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4496
+ trusted_authorities?: [{
4497
+ type: "aki" | "etsi_tl" | "openid_federation";
4498
+ values: [string, ...string[]];
4499
+ }, ...{
4500
+ type: "aki" | "etsi_tl" | "openid_federation";
4501
+ values: [string, ...string[]];
4502
+ }[]] | undefined;
2758
4503
  meta?: {
2759
4504
  doctype_value?: string | undefined;
2760
4505
  } | undefined;
@@ -2771,12 +4516,22 @@ declare namespace DcqlPresentationResult {
2771
4516
  id?: string | undefined;
2772
4517
  }[]] | undefined;
2773
4518
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4519
+ trusted_authorities?: [{
4520
+ type: "aki" | "etsi_tl" | "openid_federation";
4521
+ values: [string, ...string[]];
4522
+ }, ...{
4523
+ type: "aki" | "etsi_tl" | "openid_federation";
4524
+ values: [string, ...string[]];
4525
+ }[]] | undefined;
2774
4526
  meta?: {
2775
4527
  vct_values?: string[] | undefined;
2776
4528
  } | undefined;
2777
4529
  } | {
2778
4530
  id: string;
2779
- format: "jwt_vc_json-ld" | "jwt_vc_json";
4531
+ format: "ldp_vc" | "jwt_vc_json";
4532
+ meta: {
4533
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
4534
+ };
2780
4535
  claims?: [{
2781
4536
  path: [string | number | null, ...(string | number | null)[]];
2782
4537
  values?: (string | number | boolean)[] | undefined;
@@ -2787,6 +4542,13 @@ declare namespace DcqlPresentationResult {
2787
4542
  id?: string | undefined;
2788
4543
  }[]] | undefined;
2789
4544
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4545
+ trusted_authorities?: [{
4546
+ type: "aki" | "etsi_tl" | "openid_federation";
4547
+ values: [string, ...string[]];
4548
+ }, ...{
4549
+ type: "aki" | "etsi_tl" | "openid_federation";
4550
+ values: [string, ...string[]];
4551
+ }[]] | undefined;
2790
4552
  }, ...({
2791
4553
  id: string;
2792
4554
  format: "mso_mdoc";
@@ -2812,6 +4574,13 @@ declare namespace DcqlPresentationResult {
2812
4574
  intent_to_retain?: boolean | undefined;
2813
4575
  })[]] | undefined;
2814
4576
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4577
+ trusted_authorities?: [{
4578
+ type: "aki" | "etsi_tl" | "openid_federation";
4579
+ values: [string, ...string[]];
4580
+ }, ...{
4581
+ type: "aki" | "etsi_tl" | "openid_federation";
4582
+ values: [string, ...string[]];
4583
+ }[]] | undefined;
2815
4584
  meta?: {
2816
4585
  doctype_value?: string | undefined;
2817
4586
  } | undefined;
@@ -2828,12 +4597,22 @@ declare namespace DcqlPresentationResult {
2828
4597
  id?: string | undefined;
2829
4598
  }[]] | undefined;
2830
4599
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4600
+ trusted_authorities?: [{
4601
+ type: "aki" | "etsi_tl" | "openid_federation";
4602
+ values: [string, ...string[]];
4603
+ }, ...{
4604
+ type: "aki" | "etsi_tl" | "openid_federation";
4605
+ values: [string, ...string[]];
4606
+ }[]] | undefined;
2831
4607
  meta?: {
2832
4608
  vct_values?: string[] | undefined;
2833
4609
  } | undefined;
2834
4610
  } | {
2835
4611
  id: string;
2836
- format: "jwt_vc_json-ld" | "jwt_vc_json";
4612
+ format: "ldp_vc" | "jwt_vc_json";
4613
+ meta: {
4614
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
4615
+ };
2837
4616
  claims?: [{
2838
4617
  path: [string | number | null, ...(string | number | null)[]];
2839
4618
  values?: (string | number | boolean)[] | undefined;
@@ -2844,6 +4623,13 @@ declare namespace DcqlPresentationResult {
2844
4623
  id?: string | undefined;
2845
4624
  }[]] | undefined;
2846
4625
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4626
+ trusted_authorities?: [{
4627
+ type: "aki" | "etsi_tl" | "openid_federation";
4628
+ values: [string, ...string[]];
4629
+ }, ...{
4630
+ type: "aki" | "etsi_tl" | "openid_federation";
4631
+ values: [string, ...string[]];
4632
+ }[]] | undefined;
2847
4633
  })[]];
2848
4634
  canBeSatisfied: boolean;
2849
4635
  invalid_matches: {
@@ -2866,17 +4652,48 @@ declare namespace DcqlPresentationResult {
2866
4652
  [x: string]: unknown;
2867
4653
  };
2868
4654
  };
4655
+ authority?: {
4656
+ type: "aki";
4657
+ value: string;
4658
+ } | {
4659
+ type: "etsi_tl";
4660
+ value: string;
4661
+ } | {
4662
+ type: "openid_federation";
4663
+ value: string;
4664
+ } | undefined;
2869
4665
  } | {
2870
4666
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
2871
4667
  vct: string;
2872
4668
  claims: {
2873
4669
  [x: string]: Json;
2874
4670
  };
4671
+ authority?: {
4672
+ type: "aki";
4673
+ value: string;
4674
+ } | {
4675
+ type: "etsi_tl";
4676
+ value: string;
4677
+ } | {
4678
+ type: "openid_federation";
4679
+ value: string;
4680
+ } | undefined;
2875
4681
  } | {
2876
- credential_format: "jwt_vc_json-ld" | "jwt_vc_json";
4682
+ type: string[];
4683
+ credential_format: "ldp_vc" | "jwt_vc_json";
2877
4684
  claims: {
2878
4685
  [x: string]: Json;
2879
4686
  };
4687
+ authority?: {
4688
+ type: "aki";
4689
+ value: string;
4690
+ } | {
4691
+ type: "etsi_tl";
4692
+ value: string;
4693
+ } | {
4694
+ type: "openid_federation";
4695
+ value: string;
4696
+ } | undefined;
2880
4697
  };
2881
4698
  success: true;
2882
4699
  typed: true;
@@ -2979,6 +4796,37 @@ declare namespace DcqlClaimsQuery {
2979
4796
  }
2980
4797
  type DcqlClaimsQuery = DcqlClaimsQuery.Out;
2981
4798
 
4799
+ /**
4800
+ * Specifies trusted authorities within a requested Credential.
4801
+ */
4802
+ declare namespace DcqlTrustedAuthoritiesQuery {
4803
+ const vModel: v.VariantSchema<"type", v.ObjectSchema<{
4804
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
4805
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
4806
+ }, undefined>[], undefined>;
4807
+ type Input = v.InferInput<typeof vModel>;
4808
+ type Out = v.InferOutput<typeof vModel>;
4809
+ }
4810
+ type DcqlTrustedAuthoritiesQuery = DcqlTrustedAuthoritiesQuery.Out;
4811
+ /**
4812
+ * Specifies trusted authorities within a requested Credential.
4813
+ */
4814
+ declare namespace DcqlCredentialTrustedAuthority {
4815
+ const vModel: v.VariantSchema<"type", readonly [v.ObjectSchema<{
4816
+ readonly type: v.LiteralSchema<"aki", undefined>;
4817
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
4818
+ }, undefined>, v.ObjectSchema<{
4819
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
4820
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
4821
+ }, undefined>, v.ObjectSchema<{
4822
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
4823
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
4824
+ }, undefined>], undefined>;
4825
+ type Input = v.InferInput<typeof vModel>;
4826
+ type Out = v.InferOutput<typeof vModel>;
4827
+ }
4828
+ type DcqlCredentialTrustedAuthority = DcqlCredentialTrustedAuthority.Out;
4829
+
2982
4830
  /**
2983
4831
  * A Credential Query is an object representing a request for a presentation of one Credential.
2984
4832
  */
@@ -3043,6 +4891,22 @@ declare namespace DcqlCredentialQuery {
3043
4891
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
3044
4892
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
3045
4893
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
4894
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
4895
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
4896
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
4897
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
4898
+ type: "aki" | "etsi_tl" | "openid_federation";
4899
+ values: [string, ...string[]];
4900
+ }, ...{
4901
+ type: "aki" | "etsi_tl" | "openid_federation";
4902
+ values: [string, ...string[]];
4903
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
4904
+ type: "aki" | "etsi_tl" | "openid_federation";
4905
+ values: [string, ...string[]];
4906
+ }, ...{
4907
+ type: "aki" | "etsi_tl" | "openid_federation";
4908
+ values: [string, ...string[]];
4909
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
3046
4910
  }, undefined>;
3047
4911
  type Mdoc = v.InferOutput<typeof vMdoc>;
3048
4912
  const vSdJwtVc: v.ObjectSchema<{
@@ -3077,10 +4941,26 @@ declare namespace DcqlCredentialQuery {
3077
4941
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
3078
4942
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
3079
4943
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
4944
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
4945
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
4946
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
4947
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
4948
+ type: "aki" | "etsi_tl" | "openid_federation";
4949
+ values: [string, ...string[]];
4950
+ }, ...{
4951
+ type: "aki" | "etsi_tl" | "openid_federation";
4952
+ values: [string, ...string[]];
4953
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
4954
+ type: "aki" | "etsi_tl" | "openid_federation";
4955
+ values: [string, ...string[]];
4956
+ }, ...{
4957
+ type: "aki" | "etsi_tl" | "openid_federation";
4958
+ values: [string, ...string[]];
4959
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
3080
4960
  }, undefined>;
3081
4961
  type SdJwtVc = v.InferOutput<typeof vSdJwtVc>;
3082
4962
  const vW3cVc: v.ObjectSchema<{
3083
- readonly format: v.PicklistSchema<["jwt_vc_json", "jwt_vc_json-ld"], undefined>;
4963
+ readonly format: v.PicklistSchema<["jwt_vc_json", "ldp_vc"], undefined>;
3084
4964
  readonly claims: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
3085
4965
  readonly id: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.DescriptionAction<string | undefined, "A string identifying the particular claim. The value MUST be a non-empty string consisting of alphanumeric, underscore (_) or hyphen (-) characters. Within the particular claims array, the same id MUST NOT be present more than once.">]>;
3086
4966
  readonly path: v.SchemaWithPipe<[v.ArraySchema<v.UnionSchema<[v.StringSchema<undefined>, v.SchemaWithPipe<[v.NumberSchema<undefined>, v.IntegerAction<number, undefined>, v.MinValueAction<number, 0, undefined>]>, v.NullSchema<undefined>], undefined>, undefined>, v.CustomSchema<[string | number | null, ...(string | number | null)[]], undefined>, v.DescriptionAction<[string | number | null, ...(string | number | null)[]], "A non-empty array representing a claims path pointer that specifies the path to a claim within the Verifiable Credential.">]>;
@@ -3094,8 +4974,29 @@ declare namespace DcqlCredentialQuery {
3094
4974
  values?: (string | number | boolean)[] | undefined;
3095
4975
  id?: string | undefined;
3096
4976
  }[]], undefined>]>, undefined>;
4977
+ readonly meta: v.SchemaWithPipe<[v.SchemaWithPipe<[v.ObjectSchema<{
4978
+ readonly type_values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.StringSchema<undefined>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]], "REQUIRED. An array of string arrays that specifies the fully expanded types (IRIs) after the @context was applied that the Verifier accepts to be presented in the Presentation. Each of the top-level arrays specifies one alternative to match the type values of the Verifiable Credential against. Each inner array specifies a set of fully expanded types that MUST be present in the type property of the Verifiable Credential, regardless of order or the presence of additional types.">]>;
4979
+ }, undefined>]>, v.DescriptionAction<{
4980
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
4981
+ }, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
3097
4982
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
3098
4983
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
4984
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
4985
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
4986
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
4987
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
4988
+ type: "aki" | "etsi_tl" | "openid_federation";
4989
+ values: [string, ...string[]];
4990
+ }, ...{
4991
+ type: "aki" | "etsi_tl" | "openid_federation";
4992
+ values: [string, ...string[]];
4993
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
4994
+ type: "aki" | "etsi_tl" | "openid_federation";
4995
+ values: [string, ...string[]];
4996
+ }, ...{
4997
+ type: "aki" | "etsi_tl" | "openid_federation";
4998
+ values: [string, ...string[]];
4999
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
3099
5000
  }, undefined>;
3100
5001
  type W3cVc = v.InferOutput<typeof vW3cVc>;
3101
5002
  const vModel: v.VariantSchema<"format", [v.ObjectSchema<{
@@ -3158,6 +5059,22 @@ declare namespace DcqlCredentialQuery {
3158
5059
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
3159
5060
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
3160
5061
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
5062
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
5063
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
5064
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
5065
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
5066
+ type: "aki" | "etsi_tl" | "openid_federation";
5067
+ values: [string, ...string[]];
5068
+ }, ...{
5069
+ type: "aki" | "etsi_tl" | "openid_federation";
5070
+ values: [string, ...string[]];
5071
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
5072
+ type: "aki" | "etsi_tl" | "openid_federation";
5073
+ values: [string, ...string[]];
5074
+ }, ...{
5075
+ type: "aki" | "etsi_tl" | "openid_federation";
5076
+ values: [string, ...string[]];
5077
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
3161
5078
  }, undefined>, v.ObjectSchema<{
3162
5079
  readonly format: v.SchemaWithPipe<[v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>, v.DescriptionAction<"vc+sd-jwt" | "dc+sd-jwt", "REQUIRED. A string that specifies the format of the requested Verifiable Credential.">]>;
3163
5080
  readonly claims: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
@@ -3190,8 +5107,24 @@ declare namespace DcqlCredentialQuery {
3190
5107
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
3191
5108
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
3192
5109
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
5110
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
5111
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
5112
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
5113
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
5114
+ type: "aki" | "etsi_tl" | "openid_federation";
5115
+ values: [string, ...string[]];
5116
+ }, ...{
5117
+ type: "aki" | "etsi_tl" | "openid_federation";
5118
+ values: [string, ...string[]];
5119
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
5120
+ type: "aki" | "etsi_tl" | "openid_federation";
5121
+ values: [string, ...string[]];
5122
+ }, ...{
5123
+ type: "aki" | "etsi_tl" | "openid_federation";
5124
+ values: [string, ...string[]];
5125
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
3193
5126
  }, undefined>, v.ObjectSchema<{
3194
- readonly format: v.PicklistSchema<["jwt_vc_json", "jwt_vc_json-ld"], undefined>;
5127
+ readonly format: v.PicklistSchema<["jwt_vc_json", "ldp_vc"], undefined>;
3195
5128
  readonly claims: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
3196
5129
  readonly id: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.DescriptionAction<string | undefined, "A string identifying the particular claim. The value MUST be a non-empty string consisting of alphanumeric, underscore (_) or hyphen (-) characters. Within the particular claims array, the same id MUST NOT be present more than once.">]>;
3197
5130
  readonly path: v.SchemaWithPipe<[v.ArraySchema<v.UnionSchema<[v.StringSchema<undefined>, v.SchemaWithPipe<[v.NumberSchema<undefined>, v.IntegerAction<number, undefined>, v.MinValueAction<number, 0, undefined>]>, v.NullSchema<undefined>], undefined>, undefined>, v.CustomSchema<[string | number | null, ...(string | number | null)[]], undefined>, v.DescriptionAction<[string | number | null, ...(string | number | null)[]], "A non-empty array representing a claims path pointer that specifies the path to a claim within the Verifiable Credential.">]>;
@@ -3205,8 +5138,29 @@ declare namespace DcqlCredentialQuery {
3205
5138
  values?: (string | number | boolean)[] | undefined;
3206
5139
  id?: string | undefined;
3207
5140
  }[]], undefined>]>, undefined>;
5141
+ readonly meta: v.SchemaWithPipe<[v.SchemaWithPipe<[v.ObjectSchema<{
5142
+ readonly type_values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.StringSchema<undefined>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]], "REQUIRED. An array of string arrays that specifies the fully expanded types (IRIs) after the @context was applied that the Verifier accepts to be presented in the Presentation. Each of the top-level arrays specifies one alternative to match the type values of the Verifiable Credential against. Each inner array specifies a set of fully expanded types that MUST be present in the type property of the Verifiable Credential, regardless of order or the presence of additional types.">]>;
5143
+ }, undefined>]>, v.DescriptionAction<{
5144
+ type_values: [[string, ...string[]], ...[string, ...string[]][]];
5145
+ }, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
3208
5146
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
3209
5147
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
5148
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
5149
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
5150
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
5151
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
5152
+ type: "aki" | "etsi_tl" | "openid_federation";
5153
+ values: [string, ...string[]];
5154
+ }, ...{
5155
+ type: "aki" | "etsi_tl" | "openid_federation";
5156
+ values: [string, ...string[]];
5157
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
5158
+ type: "aki" | "etsi_tl" | "openid_federation";
5159
+ values: [string, ...string[]];
5160
+ }, ...{
5161
+ type: "aki" | "etsi_tl" | "openid_federation";
5162
+ values: [string, ...string[]];
5163
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
3210
5164
  }, undefined>], undefined>;
3211
5165
  type Input = v.InferInput<typeof vModel>;
3212
5166
  type Output = v.InferOutput<typeof vModel>;
@@ -3231,4 +5185,4 @@ declare namespace CredentialSetQuery {
3231
5185
  }
3232
5186
  type CredentialSetQuery = CredentialSetQuery.Output;
3233
5187
 
3234
- export { CredentialSetQuery, DcqlClaimsQuery, DcqlCredential, DcqlCredentialPresentation, DcqlCredentialQuery, DcqlCredentialSetError, DcqlError, DcqlInvalidClaimsQueryIdError, DcqlInvalidPresentationRecordError, DcqlMdocCredential, DcqlMdocPresentation, DcqlMissingClaimSetParseError, DcqlNonUniqueCredentialQueryIdsError, DcqlParseError, DcqlPresentation, DcqlPresentationResult, DcqlPresentationResultError, DcqlQuery, DcqlQueryResult, DcqlSdJwtVcCredential, DcqlSdJwtVcPresentation, DcqlUndefinedClaimSetIdError, DcqlW3cVcCredential, DcqlW3cVcPresentation, getCauseFromUnknown, getDcqlErrorFromUnknown, runDcqlQuery };
5188
+ export { CredentialSetQuery, DcqlClaimsQuery, DcqlCredential, DcqlCredentialPresentation, DcqlCredentialQuery, DcqlCredentialSetError, DcqlCredentialTrustedAuthority, DcqlError, DcqlInvalidClaimsQueryIdError, DcqlInvalidPresentationRecordError, DcqlMdocCredential, DcqlMdocPresentation, DcqlMissingClaimSetParseError, DcqlNonUniqueCredentialQueryIdsError, DcqlParseError, DcqlPresentation, DcqlPresentationResult, DcqlPresentationResultError, DcqlQuery, DcqlQueryResult, DcqlSdJwtVcCredential, DcqlSdJwtVcPresentation, DcqlTrustedAuthoritiesQuery, DcqlUndefinedClaimSetIdError, DcqlW3cVcCredential, DcqlW3cVcPresentation, getCauseFromUnknown, getDcqlErrorFromUnknown, runDcqlQuery };