dcql 0.3.0-alpha-20250501093131 → 0.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.d.mts CHANGED
@@ -95,11 +95,31 @@ declare namespace DcqlMdocPresentation {
95
95
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
96
96
  readonly doctype: v.StringSchema<undefined>;
97
97
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
98
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
99
+ readonly type: v.LiteralSchema<"aki", undefined>;
100
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
101
+ }, undefined>, v.ObjectSchema<{
102
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
103
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
104
+ }, undefined>, v.ObjectSchema<{
105
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
106
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
107
+ }, undefined>], undefined>, undefined>;
98
108
  }, undefined>;
99
109
  const model: Model<v.ObjectSchema<{
100
110
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
101
111
  readonly doctype: v.StringSchema<undefined>;
102
112
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
113
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
114
+ readonly type: v.LiteralSchema<"aki", undefined>;
115
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
116
+ }, undefined>, v.ObjectSchema<{
117
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
118
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
119
+ }, undefined>, v.ObjectSchema<{
120
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
121
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
122
+ }, undefined>], undefined>, undefined>;
103
123
  }, undefined>>;
104
124
  type Model = InferModelTypes<typeof model>;
105
125
  }
@@ -109,11 +129,31 @@ declare namespace DcqlSdJwtVcPresentation {
109
129
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
110
130
  readonly vct: v.StringSchema<undefined>;
111
131
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
132
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
133
+ readonly type: v.LiteralSchema<"aki", undefined>;
134
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
135
+ }, undefined>, v.ObjectSchema<{
136
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
137
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
138
+ }, undefined>, v.ObjectSchema<{
139
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
140
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
141
+ }, undefined>], undefined>, undefined>;
112
142
  }, undefined>;
113
143
  const model: Model<v.ObjectSchema<{
114
144
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
115
145
  readonly vct: v.StringSchema<undefined>;
116
146
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
147
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
148
+ readonly type: v.LiteralSchema<"aki", undefined>;
149
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
150
+ }, undefined>, v.ObjectSchema<{
151
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
152
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
153
+ }, undefined>, v.ObjectSchema<{
154
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
155
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
156
+ }, undefined>], undefined>, undefined>;
117
157
  }, undefined>>;
118
158
  type Model = InferModelTypes<typeof model>;
119
159
  }
@@ -123,11 +163,31 @@ declare namespace DcqlW3cVcPresentation {
123
163
  readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
124
164
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
125
165
  readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
166
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
167
+ readonly type: v.LiteralSchema<"aki", undefined>;
168
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
169
+ }, undefined>, v.ObjectSchema<{
170
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
171
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
172
+ }, undefined>, v.ObjectSchema<{
173
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
174
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
175
+ }, undefined>], undefined>, undefined>;
126
176
  }, undefined>;
127
177
  const model: Model<v.ObjectSchema<{
128
178
  readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
129
179
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
130
180
  readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
181
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
182
+ readonly type: v.LiteralSchema<"aki", undefined>;
183
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
184
+ }, undefined>, v.ObjectSchema<{
185
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
186
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
187
+ }, undefined>, v.ObjectSchema<{
188
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
189
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
190
+ }, undefined>], undefined>, undefined>;
131
191
  }, undefined>>;
132
192
  type Model = InferModelTypes<typeof model>;
133
193
  }
@@ -137,14 +197,44 @@ declare namespace DcqlCredentialPresentation {
137
197
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
138
198
  readonly doctype: v.StringSchema<undefined>;
139
199
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
200
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
201
+ readonly type: v.LiteralSchema<"aki", undefined>;
202
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
203
+ }, undefined>, v.ObjectSchema<{
204
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
205
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
206
+ }, undefined>, v.ObjectSchema<{
207
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
208
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
209
+ }, undefined>], undefined>, undefined>;
140
210
  }, undefined>, v.ObjectSchema<{
141
211
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
142
212
  readonly vct: v.StringSchema<undefined>;
143
213
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
214
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
215
+ readonly type: v.LiteralSchema<"aki", undefined>;
216
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
217
+ }, undefined>, v.ObjectSchema<{
218
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
219
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
220
+ }, undefined>, v.ObjectSchema<{
221
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
222
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
223
+ }, undefined>], undefined>, undefined>;
144
224
  }, undefined>, v.ObjectSchema<{
145
225
  readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
146
226
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
147
227
  readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
228
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
229
+ readonly type: v.LiteralSchema<"aki", undefined>;
230
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
231
+ }, undefined>, v.ObjectSchema<{
232
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
233
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
234
+ }, undefined>, v.ObjectSchema<{
235
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
236
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
237
+ }, undefined>], undefined>, undefined>;
148
238
  }, undefined>], undefined>>;
149
239
  type Model = InferModelTypes<typeof model>;
150
240
  }
@@ -161,14 +251,44 @@ declare namespace DcqlQueryResult {
161
251
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
162
252
  readonly doctype: v.StringSchema<undefined>;
163
253
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
254
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
255
+ readonly type: v.LiteralSchema<"aki", undefined>;
256
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
257
+ }, undefined>, v.ObjectSchema<{
258
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
259
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
260
+ }, undefined>, v.ObjectSchema<{
261
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
262
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
263
+ }, undefined>], undefined>, undefined>;
164
264
  }, undefined>, v.ObjectSchema<{
165
265
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
166
266
  readonly vct: v.StringSchema<undefined>;
167
267
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
268
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
269
+ readonly type: v.LiteralSchema<"aki", undefined>;
270
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
271
+ }, undefined>, v.ObjectSchema<{
272
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
273
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
274
+ }, undefined>, v.ObjectSchema<{
275
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
276
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
277
+ }, undefined>], undefined>, undefined>;
168
278
  }, undefined>, v.ObjectSchema<{
169
279
  readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
170
280
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
171
281
  readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
282
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
283
+ readonly type: v.LiteralSchema<"aki", undefined>;
284
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
285
+ }, undefined>, v.ObjectSchema<{
286
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
287
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
288
+ }, undefined>, v.ObjectSchema<{
289
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
290
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
291
+ }, undefined>], undefined>, undefined>;
172
292
  }, undefined>], undefined>;
173
293
  }, undefined>, v.ObjectSchema<{
174
294
  readonly success: v.LiteralSchema<false, undefined>;
@@ -186,18 +306,48 @@ declare namespace DcqlQueryResult {
186
306
  [x: string]: unknown;
187
307
  };
188
308
  };
309
+ authority?: {
310
+ type: "aki";
311
+ value: string;
312
+ } | {
313
+ type: "etsi_tl";
314
+ value: string;
315
+ } | {
316
+ type: "openid_federation";
317
+ value: string;
318
+ } | undefined;
189
319
  } | {
190
320
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
191
321
  vct: string;
192
322
  claims: {
193
323
  [x: string]: Json;
194
324
  };
325
+ authority?: {
326
+ type: "aki";
327
+ value: string;
328
+ } | {
329
+ type: "etsi_tl";
330
+ value: string;
331
+ } | {
332
+ type: "openid_federation";
333
+ value: string;
334
+ } | undefined;
195
335
  } | {
196
336
  type: string[];
197
337
  credential_format: "ldp_vc" | "jwt_vc_json";
198
338
  claims: {
199
339
  [x: string]: Json;
200
340
  };
341
+ authority?: {
342
+ type: "aki";
343
+ value: string;
344
+ } | {
345
+ type: "etsi_tl";
346
+ value: string;
347
+ } | {
348
+ type: "openid_federation";
349
+ value: string;
350
+ } | undefined;
201
351
  };
202
352
  success: true;
203
353
  typed: true;
@@ -220,18 +370,48 @@ declare namespace DcqlQueryResult {
220
370
  [x: string]: unknown;
221
371
  };
222
372
  };
373
+ authority?: {
374
+ type: "aki";
375
+ value: string;
376
+ } | {
377
+ type: "etsi_tl";
378
+ value: string;
379
+ } | {
380
+ type: "openid_federation";
381
+ value: string;
382
+ } | undefined;
223
383
  } | {
224
384
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
225
385
  vct: string;
226
386
  claims: {
227
387
  [x: string]: Json;
228
388
  };
389
+ authority?: {
390
+ type: "aki";
391
+ value: string;
392
+ } | {
393
+ type: "etsi_tl";
394
+ value: string;
395
+ } | {
396
+ type: "openid_federation";
397
+ value: string;
398
+ } | undefined;
229
399
  } | {
230
400
  type: string[];
231
401
  credential_format: "ldp_vc" | "jwt_vc_json";
232
402
  claims: {
233
403
  [x: string]: Json;
234
404
  };
405
+ authority?: {
406
+ type: "aki";
407
+ value: string;
408
+ } | {
409
+ type: "etsi_tl";
410
+ value: string;
411
+ } | {
412
+ type: "openid_federation";
413
+ value: string;
414
+ } | undefined;
235
415
  };
236
416
  success: true;
237
417
  typed: true;
@@ -308,6 +488,22 @@ declare namespace DcqlQueryResult {
308
488
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
309
489
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
310
490
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
491
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
492
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
493
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
494
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
495
+ type: "aki" | "etsi_tl" | "openid_federation";
496
+ values: [string, ...string[]];
497
+ }, ...{
498
+ type: "aki" | "etsi_tl" | "openid_federation";
499
+ values: [string, ...string[]];
500
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
501
+ type: "aki" | "etsi_tl" | "openid_federation";
502
+ values: [string, ...string[]];
503
+ }, ...{
504
+ type: "aki" | "etsi_tl" | "openid_federation";
505
+ values: [string, ...string[]];
506
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
311
507
  }, undefined>, v.ObjectSchema<{
312
508
  readonly format: v.SchemaWithPipe<[v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>, v.DescriptionAction<"vc+sd-jwt" | "dc+sd-jwt", "REQUIRED. A string that specifies the format of the requested Verifiable Credential.">]>;
313
509
  readonly claims: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
@@ -340,6 +536,22 @@ declare namespace DcqlQueryResult {
340
536
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
341
537
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
342
538
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
539
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
540
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
541
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
542
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
543
+ type: "aki" | "etsi_tl" | "openid_federation";
544
+ values: [string, ...string[]];
545
+ }, ...{
546
+ type: "aki" | "etsi_tl" | "openid_federation";
547
+ values: [string, ...string[]];
548
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
549
+ type: "aki" | "etsi_tl" | "openid_federation";
550
+ values: [string, ...string[]];
551
+ }, ...{
552
+ type: "aki" | "etsi_tl" | "openid_federation";
553
+ values: [string, ...string[]];
554
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
343
555
  }, undefined>, v.ObjectSchema<{
344
556
  readonly format: v.PicklistSchema<["jwt_vc_json", "ldp_vc"], undefined>;
345
557
  readonly claims: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
@@ -362,6 +574,22 @@ declare namespace DcqlQueryResult {
362
574
  }, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
363
575
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
364
576
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
577
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
578
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
579
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
580
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
581
+ type: "aki" | "etsi_tl" | "openid_federation";
582
+ values: [string, ...string[]];
583
+ }, ...{
584
+ type: "aki" | "etsi_tl" | "openid_federation";
585
+ values: [string, ...string[]];
586
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
587
+ type: "aki" | "etsi_tl" | "openid_federation";
588
+ values: [string, ...string[]];
589
+ }, ...{
590
+ type: "aki" | "etsi_tl" | "openid_federation";
591
+ values: [string, ...string[]];
592
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
365
593
  }, undefined>], undefined>, undefined>, v.CustomSchema<[{
366
594
  id: string;
367
595
  format: "mso_mdoc";
@@ -387,6 +615,13 @@ declare namespace DcqlQueryResult {
387
615
  intent_to_retain?: boolean | undefined;
388
616
  })[]] | undefined;
389
617
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
618
+ trusted_authorities?: [{
619
+ type: "aki" | "etsi_tl" | "openid_federation";
620
+ values: [string, ...string[]];
621
+ }, ...{
622
+ type: "aki" | "etsi_tl" | "openid_federation";
623
+ values: [string, ...string[]];
624
+ }[]] | undefined;
390
625
  meta?: {
391
626
  doctype_value?: string | undefined;
392
627
  } | undefined;
@@ -403,6 +638,13 @@ declare namespace DcqlQueryResult {
403
638
  id?: string | undefined;
404
639
  }[]] | undefined;
405
640
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
641
+ trusted_authorities?: [{
642
+ type: "aki" | "etsi_tl" | "openid_federation";
643
+ values: [string, ...string[]];
644
+ }, ...{
645
+ type: "aki" | "etsi_tl" | "openid_federation";
646
+ values: [string, ...string[]];
647
+ }[]] | undefined;
406
648
  meta?: {
407
649
  vct_values?: string[] | undefined;
408
650
  } | undefined;
@@ -422,6 +664,13 @@ declare namespace DcqlQueryResult {
422
664
  id?: string | undefined;
423
665
  }[]] | undefined;
424
666
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
667
+ trusted_authorities?: [{
668
+ type: "aki" | "etsi_tl" | "openid_federation";
669
+ values: [string, ...string[]];
670
+ }, ...{
671
+ type: "aki" | "etsi_tl" | "openid_federation";
672
+ values: [string, ...string[]];
673
+ }[]] | undefined;
425
674
  }, ...({
426
675
  id: string;
427
676
  format: "mso_mdoc";
@@ -447,6 +696,13 @@ declare namespace DcqlQueryResult {
447
696
  intent_to_retain?: boolean | undefined;
448
697
  })[]] | undefined;
449
698
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
699
+ trusted_authorities?: [{
700
+ type: "aki" | "etsi_tl" | "openid_federation";
701
+ values: [string, ...string[]];
702
+ }, ...{
703
+ type: "aki" | "etsi_tl" | "openid_federation";
704
+ values: [string, ...string[]];
705
+ }[]] | undefined;
450
706
  meta?: {
451
707
  doctype_value?: string | undefined;
452
708
  } | undefined;
@@ -463,6 +719,13 @@ declare namespace DcqlQueryResult {
463
719
  id?: string | undefined;
464
720
  }[]] | undefined;
465
721
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
722
+ trusted_authorities?: [{
723
+ type: "aki" | "etsi_tl" | "openid_federation";
724
+ values: [string, ...string[]];
725
+ }, ...{
726
+ type: "aki" | "etsi_tl" | "openid_federation";
727
+ values: [string, ...string[]];
728
+ }[]] | undefined;
466
729
  meta?: {
467
730
  vct_values?: string[] | undefined;
468
731
  } | undefined;
@@ -482,6 +745,13 @@ declare namespace DcqlQueryResult {
482
745
  id?: string | undefined;
483
746
  }[]] | undefined;
484
747
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
748
+ trusted_authorities?: [{
749
+ type: "aki" | "etsi_tl" | "openid_federation";
750
+ values: [string, ...string[]];
751
+ }, ...{
752
+ type: "aki" | "etsi_tl" | "openid_federation";
753
+ values: [string, ...string[]];
754
+ }[]] | undefined;
485
755
  })[]], undefined>, v.DescriptionAction<[{
486
756
  id: string;
487
757
  format: "mso_mdoc";
@@ -507,6 +777,13 @@ declare namespace DcqlQueryResult {
507
777
  intent_to_retain?: boolean | undefined;
508
778
  })[]] | undefined;
509
779
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
780
+ trusted_authorities?: [{
781
+ type: "aki" | "etsi_tl" | "openid_federation";
782
+ values: [string, ...string[]];
783
+ }, ...{
784
+ type: "aki" | "etsi_tl" | "openid_federation";
785
+ values: [string, ...string[]];
786
+ }[]] | undefined;
510
787
  meta?: {
511
788
  doctype_value?: string | undefined;
512
789
  } | undefined;
@@ -523,6 +800,13 @@ declare namespace DcqlQueryResult {
523
800
  id?: string | undefined;
524
801
  }[]] | undefined;
525
802
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
803
+ trusted_authorities?: [{
804
+ type: "aki" | "etsi_tl" | "openid_federation";
805
+ values: [string, ...string[]];
806
+ }, ...{
807
+ type: "aki" | "etsi_tl" | "openid_federation";
808
+ values: [string, ...string[]];
809
+ }[]] | undefined;
526
810
  meta?: {
527
811
  vct_values?: string[] | undefined;
528
812
  } | undefined;
@@ -542,6 +826,13 @@ declare namespace DcqlQueryResult {
542
826
  id?: string | undefined;
543
827
  }[]] | undefined;
544
828
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
829
+ trusted_authorities?: [{
830
+ type: "aki" | "etsi_tl" | "openid_federation";
831
+ values: [string, ...string[]];
832
+ }, ...{
833
+ type: "aki" | "etsi_tl" | "openid_federation";
834
+ values: [string, ...string[]];
835
+ }[]] | undefined;
545
836
  }, ...({
546
837
  id: string;
547
838
  format: "mso_mdoc";
@@ -567,6 +858,13 @@ declare namespace DcqlQueryResult {
567
858
  intent_to_retain?: boolean | undefined;
568
859
  })[]] | undefined;
569
860
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
861
+ trusted_authorities?: [{
862
+ type: "aki" | "etsi_tl" | "openid_federation";
863
+ values: [string, ...string[]];
864
+ }, ...{
865
+ type: "aki" | "etsi_tl" | "openid_federation";
866
+ values: [string, ...string[]];
867
+ }[]] | undefined;
570
868
  meta?: {
571
869
  doctype_value?: string | undefined;
572
870
  } | undefined;
@@ -583,6 +881,13 @@ declare namespace DcqlQueryResult {
583
881
  id?: string | undefined;
584
882
  }[]] | undefined;
585
883
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
884
+ trusted_authorities?: [{
885
+ type: "aki" | "etsi_tl" | "openid_federation";
886
+ values: [string, ...string[]];
887
+ }, ...{
888
+ type: "aki" | "etsi_tl" | "openid_federation";
889
+ values: [string, ...string[]];
890
+ }[]] | undefined;
586
891
  meta?: {
587
892
  vct_values?: string[] | undefined;
588
893
  } | undefined;
@@ -602,6 +907,13 @@ declare namespace DcqlQueryResult {
602
907
  id?: string | undefined;
603
908
  }[]] | undefined;
604
909
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
910
+ trusted_authorities?: [{
911
+ type: "aki" | "etsi_tl" | "openid_federation";
912
+ values: [string, ...string[]];
913
+ }, ...{
914
+ type: "aki" | "etsi_tl" | "openid_federation";
915
+ values: [string, ...string[]];
916
+ }[]] | undefined;
605
917
  })[]], "REQUIRED. A non-empty array of Credential Queries that specify the requested Verifiable Credentials.">]>;
606
918
  readonly credential_matches: v.RecordSchema<v.SchemaWithPipe<[v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>]>, v.UnionSchema<[v.ObjectSchema<{
607
919
  readonly all: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.UnionSchema<[v.UndefinedSchema<undefined>, v.ObjectSchema<{
@@ -614,14 +926,44 @@ declare namespace DcqlQueryResult {
614
926
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
615
927
  readonly doctype: v.StringSchema<undefined>;
616
928
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
929
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
930
+ readonly type: v.LiteralSchema<"aki", undefined>;
931
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
932
+ }, undefined>, v.ObjectSchema<{
933
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
934
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
935
+ }, undefined>, v.ObjectSchema<{
936
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
937
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
938
+ }, undefined>], undefined>, undefined>;
617
939
  }, undefined>, v.ObjectSchema<{
618
940
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
619
941
  readonly vct: v.StringSchema<undefined>;
620
942
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
943
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
944
+ readonly type: v.LiteralSchema<"aki", undefined>;
945
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
946
+ }, undefined>, v.ObjectSchema<{
947
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
948
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
949
+ }, undefined>, v.ObjectSchema<{
950
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
951
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
952
+ }, undefined>], undefined>, undefined>;
621
953
  }, undefined>, v.ObjectSchema<{
622
954
  readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
623
955
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
624
956
  readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
957
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
958
+ readonly type: v.LiteralSchema<"aki", undefined>;
959
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
960
+ }, undefined>, v.ObjectSchema<{
961
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
962
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
963
+ }, undefined>, v.ObjectSchema<{
964
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
965
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
966
+ }, undefined>], undefined>, undefined>;
625
967
  }, undefined>], undefined>;
626
968
  }, undefined>, v.ObjectSchema<{
627
969
  readonly success: v.LiteralSchema<false, undefined>;
@@ -639,18 +981,48 @@ declare namespace DcqlQueryResult {
639
981
  [x: string]: unknown;
640
982
  };
641
983
  };
984
+ authority?: {
985
+ type: "aki";
986
+ value: string;
987
+ } | {
988
+ type: "etsi_tl";
989
+ value: string;
990
+ } | {
991
+ type: "openid_federation";
992
+ value: string;
993
+ } | undefined;
642
994
  } | {
643
995
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
644
996
  vct: string;
645
997
  claims: {
646
998
  [x: string]: Json;
647
999
  };
1000
+ authority?: {
1001
+ type: "aki";
1002
+ value: string;
1003
+ } | {
1004
+ type: "etsi_tl";
1005
+ value: string;
1006
+ } | {
1007
+ type: "openid_federation";
1008
+ value: string;
1009
+ } | undefined;
648
1010
  } | {
649
1011
  type: string[];
650
1012
  credential_format: "ldp_vc" | "jwt_vc_json";
651
1013
  claims: {
652
1014
  [x: string]: Json;
653
1015
  };
1016
+ authority?: {
1017
+ type: "aki";
1018
+ value: string;
1019
+ } | {
1020
+ type: "etsi_tl";
1021
+ value: string;
1022
+ } | {
1023
+ type: "openid_federation";
1024
+ value: string;
1025
+ } | undefined;
654
1026
  };
655
1027
  success: true;
656
1028
  typed: true;
@@ -673,18 +1045,48 @@ declare namespace DcqlQueryResult {
673
1045
  [x: string]: unknown;
674
1046
  };
675
1047
  };
1048
+ authority?: {
1049
+ type: "aki";
1050
+ value: string;
1051
+ } | {
1052
+ type: "etsi_tl";
1053
+ value: string;
1054
+ } | {
1055
+ type: "openid_federation";
1056
+ value: string;
1057
+ } | undefined;
676
1058
  } | {
677
1059
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
678
1060
  vct: string;
679
1061
  claims: {
680
1062
  [x: string]: Json;
681
1063
  };
1064
+ authority?: {
1065
+ type: "aki";
1066
+ value: string;
1067
+ } | {
1068
+ type: "etsi_tl";
1069
+ value: string;
1070
+ } | {
1071
+ type: "openid_federation";
1072
+ value: string;
1073
+ } | undefined;
682
1074
  } | {
683
1075
  type: string[];
684
1076
  credential_format: "ldp_vc" | "jwt_vc_json";
685
1077
  claims: {
686
1078
  [x: string]: Json;
687
1079
  };
1080
+ authority?: {
1081
+ type: "aki";
1082
+ value: string;
1083
+ } | {
1084
+ type: "etsi_tl";
1085
+ value: string;
1086
+ } | {
1087
+ type: "openid_federation";
1088
+ value: string;
1089
+ } | undefined;
688
1090
  };
689
1091
  success: true;
690
1092
  typed: true;
@@ -707,18 +1109,48 @@ declare namespace DcqlQueryResult {
707
1109
  [x: string]: unknown;
708
1110
  };
709
1111
  };
1112
+ authority?: {
1113
+ type: "aki";
1114
+ value: string;
1115
+ } | {
1116
+ type: "etsi_tl";
1117
+ value: string;
1118
+ } | {
1119
+ type: "openid_federation";
1120
+ value: string;
1121
+ } | undefined;
710
1122
  } | {
711
1123
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
712
1124
  vct: string;
713
1125
  claims: {
714
1126
  [x: string]: Json;
715
1127
  };
1128
+ authority?: {
1129
+ type: "aki";
1130
+ value: string;
1131
+ } | {
1132
+ type: "etsi_tl";
1133
+ value: string;
1134
+ } | {
1135
+ type: "openid_federation";
1136
+ value: string;
1137
+ } | undefined;
716
1138
  } | {
717
1139
  type: string[];
718
1140
  credential_format: "ldp_vc" | "jwt_vc_json";
719
1141
  claims: {
720
1142
  [x: string]: Json;
721
1143
  };
1144
+ authority?: {
1145
+ type: "aki";
1146
+ value: string;
1147
+ } | {
1148
+ type: "etsi_tl";
1149
+ value: string;
1150
+ } | {
1151
+ type: "openid_federation";
1152
+ value: string;
1153
+ } | undefined;
722
1154
  };
723
1155
  success: true;
724
1156
  typed: true;
@@ -741,18 +1173,48 @@ declare namespace DcqlQueryResult {
741
1173
  [x: string]: unknown;
742
1174
  };
743
1175
  };
1176
+ authority?: {
1177
+ type: "aki";
1178
+ value: string;
1179
+ } | {
1180
+ type: "etsi_tl";
1181
+ value: string;
1182
+ } | {
1183
+ type: "openid_federation";
1184
+ value: string;
1185
+ } | undefined;
744
1186
  } | {
745
1187
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
746
1188
  vct: string;
747
1189
  claims: {
748
1190
  [x: string]: Json;
749
1191
  };
1192
+ authority?: {
1193
+ type: "aki";
1194
+ value: string;
1195
+ } | {
1196
+ type: "etsi_tl";
1197
+ value: string;
1198
+ } | {
1199
+ type: "openid_federation";
1200
+ value: string;
1201
+ } | undefined;
750
1202
  } | {
751
1203
  type: string[];
752
1204
  credential_format: "ldp_vc" | "jwt_vc_json";
753
1205
  claims: {
754
1206
  [x: string]: Json;
755
1207
  };
1208
+ authority?: {
1209
+ type: "aki";
1210
+ value: string;
1211
+ } | {
1212
+ type: "etsi_tl";
1213
+ value: string;
1214
+ } | {
1215
+ type: "openid_federation";
1216
+ value: string;
1217
+ } | undefined;
756
1218
  };
757
1219
  success: true;
758
1220
  typed: true;
@@ -775,18 +1237,48 @@ declare namespace DcqlQueryResult {
775
1237
  [x: string]: unknown;
776
1238
  };
777
1239
  };
1240
+ authority?: {
1241
+ type: "aki";
1242
+ value: string;
1243
+ } | {
1244
+ type: "etsi_tl";
1245
+ value: string;
1246
+ } | {
1247
+ type: "openid_federation";
1248
+ value: string;
1249
+ } | undefined;
778
1250
  } | {
779
1251
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
780
1252
  vct: string;
781
1253
  claims: {
782
1254
  [x: string]: Json;
783
1255
  };
1256
+ authority?: {
1257
+ type: "aki";
1258
+ value: string;
1259
+ } | {
1260
+ type: "etsi_tl";
1261
+ value: string;
1262
+ } | {
1263
+ type: "openid_federation";
1264
+ value: string;
1265
+ } | undefined;
784
1266
  } | {
785
1267
  type: string[];
786
1268
  credential_format: "ldp_vc" | "jwt_vc_json";
787
1269
  claims: {
788
1270
  [x: string]: Json;
789
1271
  };
1272
+ authority?: {
1273
+ type: "aki";
1274
+ value: string;
1275
+ } | {
1276
+ type: "etsi_tl";
1277
+ value: string;
1278
+ } | {
1279
+ type: "openid_federation";
1280
+ value: string;
1281
+ } | undefined;
790
1282
  };
791
1283
  success: true;
792
1284
  typed: true;
@@ -809,18 +1301,48 @@ declare namespace DcqlQueryResult {
809
1301
  [x: string]: unknown;
810
1302
  };
811
1303
  };
1304
+ authority?: {
1305
+ type: "aki";
1306
+ value: string;
1307
+ } | {
1308
+ type: "etsi_tl";
1309
+ value: string;
1310
+ } | {
1311
+ type: "openid_federation";
1312
+ value: string;
1313
+ } | undefined;
812
1314
  } | {
813
1315
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
814
1316
  vct: string;
815
1317
  claims: {
816
1318
  [x: string]: Json;
817
1319
  };
1320
+ authority?: {
1321
+ type: "aki";
1322
+ value: string;
1323
+ } | {
1324
+ type: "etsi_tl";
1325
+ value: string;
1326
+ } | {
1327
+ type: "openid_federation";
1328
+ value: string;
1329
+ } | undefined;
818
1330
  } | {
819
1331
  type: string[];
820
1332
  credential_format: "ldp_vc" | "jwt_vc_json";
821
1333
  claims: {
822
1334
  [x: string]: Json;
823
1335
  };
1336
+ authority?: {
1337
+ type: "aki";
1338
+ value: string;
1339
+ } | {
1340
+ type: "etsi_tl";
1341
+ value: string;
1342
+ } | {
1343
+ type: "openid_federation";
1344
+ value: string;
1345
+ } | undefined;
824
1346
  };
825
1347
  success: true;
826
1348
  typed: true;
@@ -844,14 +1366,44 @@ declare namespace DcqlQueryResult {
844
1366
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
845
1367
  readonly doctype: v.StringSchema<undefined>;
846
1368
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
1369
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1370
+ readonly type: v.LiteralSchema<"aki", undefined>;
1371
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1372
+ }, undefined>, v.ObjectSchema<{
1373
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1374
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1375
+ }, undefined>, v.ObjectSchema<{
1376
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1377
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1378
+ }, undefined>], undefined>, undefined>;
847
1379
  }, undefined>, v.ObjectSchema<{
848
1380
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
849
1381
  readonly vct: v.StringSchema<undefined>;
850
1382
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
1383
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1384
+ readonly type: v.LiteralSchema<"aki", undefined>;
1385
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1386
+ }, undefined>, v.ObjectSchema<{
1387
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1388
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1389
+ }, undefined>, v.ObjectSchema<{
1390
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1391
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1392
+ }, undefined>], undefined>, undefined>;
851
1393
  }, undefined>, v.ObjectSchema<{
852
1394
  readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
853
1395
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
854
1396
  readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
1397
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1398
+ readonly type: v.LiteralSchema<"aki", undefined>;
1399
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1400
+ }, undefined>, v.ObjectSchema<{
1401
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1402
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1403
+ }, undefined>, v.ObjectSchema<{
1404
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1405
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1406
+ }, undefined>], undefined>, undefined>;
855
1407
  }, undefined>], undefined>;
856
1408
  }, undefined>, v.ObjectSchema<{
857
1409
  readonly success: v.LiteralSchema<false, undefined>;
@@ -865,14 +1417,44 @@ declare namespace DcqlQueryResult {
865
1417
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
866
1418
  readonly doctype: v.StringSchema<undefined>;
867
1419
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
1420
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1421
+ readonly type: v.LiteralSchema<"aki", undefined>;
1422
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1423
+ }, undefined>, v.ObjectSchema<{
1424
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1425
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1426
+ }, undefined>, v.ObjectSchema<{
1427
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1428
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1429
+ }, undefined>], undefined>, undefined>;
868
1430
  }, undefined>, v.ObjectSchema<{
869
1431
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
870
1432
  readonly vct: v.StringSchema<undefined>;
871
1433
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
1434
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1435
+ readonly type: v.LiteralSchema<"aki", undefined>;
1436
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1437
+ }, undefined>, v.ObjectSchema<{
1438
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1439
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1440
+ }, undefined>, v.ObjectSchema<{
1441
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1442
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1443
+ }, undefined>], undefined>, undefined>;
872
1444
  }, undefined>, v.ObjectSchema<{
873
1445
  readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
874
1446
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
875
1447
  readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
1448
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1449
+ readonly type: v.LiteralSchema<"aki", undefined>;
1450
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1451
+ }, undefined>, v.ObjectSchema<{
1452
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1453
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1454
+ }, undefined>, v.ObjectSchema<{
1455
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1456
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1457
+ }, undefined>], undefined>, undefined>;
876
1458
  }, undefined>], undefined>;
877
1459
  }, undefined>, v.ObjectSchema<{
878
1460
  readonly success: v.LiteralSchema<false, undefined>;
@@ -890,18 +1472,48 @@ declare namespace DcqlQueryResult {
890
1472
  [x: string]: unknown;
891
1473
  };
892
1474
  };
1475
+ authority?: {
1476
+ type: "aki";
1477
+ value: string;
1478
+ } | {
1479
+ type: "etsi_tl";
1480
+ value: string;
1481
+ } | {
1482
+ type: "openid_federation";
1483
+ value: string;
1484
+ } | undefined;
893
1485
  } | {
894
1486
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
895
1487
  vct: string;
896
1488
  claims: {
897
1489
  [x: string]: Json;
898
1490
  };
1491
+ authority?: {
1492
+ type: "aki";
1493
+ value: string;
1494
+ } | {
1495
+ type: "etsi_tl";
1496
+ value: string;
1497
+ } | {
1498
+ type: "openid_federation";
1499
+ value: string;
1500
+ } | undefined;
899
1501
  } | {
900
1502
  type: string[];
901
1503
  credential_format: "ldp_vc" | "jwt_vc_json";
902
1504
  claims: {
903
1505
  [x: string]: Json;
904
1506
  };
1507
+ authority?: {
1508
+ type: "aki";
1509
+ value: string;
1510
+ } | {
1511
+ type: "etsi_tl";
1512
+ value: string;
1513
+ } | {
1514
+ type: "openid_federation";
1515
+ value: string;
1516
+ } | undefined;
905
1517
  };
906
1518
  success: true;
907
1519
  typed: true;
@@ -924,18 +1536,48 @@ declare namespace DcqlQueryResult {
924
1536
  [x: string]: unknown;
925
1537
  };
926
1538
  };
1539
+ authority?: {
1540
+ type: "aki";
1541
+ value: string;
1542
+ } | {
1543
+ type: "etsi_tl";
1544
+ value: string;
1545
+ } | {
1546
+ type: "openid_federation";
1547
+ value: string;
1548
+ } | undefined;
927
1549
  } | {
928
1550
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
929
1551
  vct: string;
930
1552
  claims: {
931
1553
  [x: string]: Json;
932
1554
  };
1555
+ authority?: {
1556
+ type: "aki";
1557
+ value: string;
1558
+ } | {
1559
+ type: "etsi_tl";
1560
+ value: string;
1561
+ } | {
1562
+ type: "openid_federation";
1563
+ value: string;
1564
+ } | undefined;
933
1565
  } | {
934
1566
  type: string[];
935
1567
  credential_format: "ldp_vc" | "jwt_vc_json";
936
1568
  claims: {
937
1569
  [x: string]: Json;
938
1570
  };
1571
+ authority?: {
1572
+ type: "aki";
1573
+ value: string;
1574
+ } | {
1575
+ type: "etsi_tl";
1576
+ value: string;
1577
+ } | {
1578
+ type: "openid_federation";
1579
+ value: string;
1580
+ } | undefined;
939
1581
  };
940
1582
  success: true;
941
1583
  typed: true;
@@ -958,18 +1600,48 @@ declare namespace DcqlQueryResult {
958
1600
  [x: string]: unknown;
959
1601
  };
960
1602
  };
1603
+ authority?: {
1604
+ type: "aki";
1605
+ value: string;
1606
+ } | {
1607
+ type: "etsi_tl";
1608
+ value: string;
1609
+ } | {
1610
+ type: "openid_federation";
1611
+ value: string;
1612
+ } | undefined;
961
1613
  } | {
962
1614
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
963
1615
  vct: string;
964
1616
  claims: {
965
1617
  [x: string]: Json;
966
1618
  };
1619
+ authority?: {
1620
+ type: "aki";
1621
+ value: string;
1622
+ } | {
1623
+ type: "etsi_tl";
1624
+ value: string;
1625
+ } | {
1626
+ type: "openid_federation";
1627
+ value: string;
1628
+ } | undefined;
967
1629
  } | {
968
1630
  type: string[];
969
1631
  credential_format: "ldp_vc" | "jwt_vc_json";
970
1632
  claims: {
971
1633
  [x: string]: Json;
972
1634
  };
1635
+ authority?: {
1636
+ type: "aki";
1637
+ value: string;
1638
+ } | {
1639
+ type: "etsi_tl";
1640
+ value: string;
1641
+ } | {
1642
+ type: "openid_federation";
1643
+ value: string;
1644
+ } | undefined;
973
1645
  };
974
1646
  success: true;
975
1647
  typed: true;
@@ -992,18 +1664,48 @@ declare namespace DcqlQueryResult {
992
1664
  [x: string]: unknown;
993
1665
  };
994
1666
  };
1667
+ authority?: {
1668
+ type: "aki";
1669
+ value: string;
1670
+ } | {
1671
+ type: "etsi_tl";
1672
+ value: string;
1673
+ } | {
1674
+ type: "openid_federation";
1675
+ value: string;
1676
+ } | undefined;
995
1677
  } | {
996
1678
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
997
1679
  vct: string;
998
1680
  claims: {
999
1681
  [x: string]: Json;
1000
1682
  };
1683
+ authority?: {
1684
+ type: "aki";
1685
+ value: string;
1686
+ } | {
1687
+ type: "etsi_tl";
1688
+ value: string;
1689
+ } | {
1690
+ type: "openid_federation";
1691
+ value: string;
1692
+ } | undefined;
1001
1693
  } | {
1002
1694
  type: string[];
1003
1695
  credential_format: "ldp_vc" | "jwt_vc_json";
1004
1696
  claims: {
1005
1697
  [x: string]: Json;
1006
1698
  };
1699
+ authority?: {
1700
+ type: "aki";
1701
+ value: string;
1702
+ } | {
1703
+ type: "etsi_tl";
1704
+ value: string;
1705
+ } | {
1706
+ type: "openid_federation";
1707
+ value: string;
1708
+ } | undefined;
1007
1709
  };
1008
1710
  success: true;
1009
1711
  typed: true;
@@ -1026,18 +1728,48 @@ declare namespace DcqlQueryResult {
1026
1728
  [x: string]: unknown;
1027
1729
  };
1028
1730
  };
1731
+ authority?: {
1732
+ type: "aki";
1733
+ value: string;
1734
+ } | {
1735
+ type: "etsi_tl";
1736
+ value: string;
1737
+ } | {
1738
+ type: "openid_federation";
1739
+ value: string;
1740
+ } | undefined;
1029
1741
  } | {
1030
1742
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
1031
1743
  vct: string;
1032
1744
  claims: {
1033
1745
  [x: string]: Json;
1034
1746
  };
1747
+ authority?: {
1748
+ type: "aki";
1749
+ value: string;
1750
+ } | {
1751
+ type: "etsi_tl";
1752
+ value: string;
1753
+ } | {
1754
+ type: "openid_federation";
1755
+ value: string;
1756
+ } | undefined;
1035
1757
  } | {
1036
1758
  type: string[];
1037
1759
  credential_format: "ldp_vc" | "jwt_vc_json";
1038
1760
  claims: {
1039
1761
  [x: string]: Json;
1040
1762
  };
1763
+ authority?: {
1764
+ type: "aki";
1765
+ value: string;
1766
+ } | {
1767
+ type: "etsi_tl";
1768
+ value: string;
1769
+ } | {
1770
+ type: "openid_federation";
1771
+ value: string;
1772
+ } | undefined;
1041
1773
  };
1042
1774
  success: true;
1043
1775
  typed: true;
@@ -1060,18 +1792,48 @@ declare namespace DcqlQueryResult {
1060
1792
  [x: string]: unknown;
1061
1793
  };
1062
1794
  };
1795
+ authority?: {
1796
+ type: "aki";
1797
+ value: string;
1798
+ } | {
1799
+ type: "etsi_tl";
1800
+ value: string;
1801
+ } | {
1802
+ type: "openid_federation";
1803
+ value: string;
1804
+ } | undefined;
1063
1805
  } | {
1064
1806
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
1065
1807
  vct: string;
1066
1808
  claims: {
1067
1809
  [x: string]: Json;
1068
1810
  };
1811
+ authority?: {
1812
+ type: "aki";
1813
+ value: string;
1814
+ } | {
1815
+ type: "etsi_tl";
1816
+ value: string;
1817
+ } | {
1818
+ type: "openid_federation";
1819
+ value: string;
1820
+ } | undefined;
1069
1821
  } | {
1070
1822
  type: string[];
1071
1823
  credential_format: "ldp_vc" | "jwt_vc_json";
1072
1824
  claims: {
1073
1825
  [x: string]: Json;
1074
1826
  };
1827
+ authority?: {
1828
+ type: "aki";
1829
+ value: string;
1830
+ } | {
1831
+ type: "etsi_tl";
1832
+ value: string;
1833
+ } | {
1834
+ type: "openid_federation";
1835
+ value: string;
1836
+ } | undefined;
1075
1837
  };
1076
1838
  success: true;
1077
1839
  typed: true;
@@ -1138,11 +1900,31 @@ declare namespace DcqlMdocCredential {
1138
1900
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
1139
1901
  readonly doctype: v.StringSchema<undefined>;
1140
1902
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
1903
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1904
+ readonly type: v.LiteralSchema<"aki", undefined>;
1905
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1906
+ }, undefined>, v.ObjectSchema<{
1907
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1908
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1909
+ }, undefined>, v.ObjectSchema<{
1910
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1911
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1912
+ }, undefined>], undefined>, undefined>;
1141
1913
  }, undefined>;
1142
1914
  const model: Model<v.ObjectSchema<{
1143
1915
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
1144
1916
  readonly doctype: v.StringSchema<undefined>;
1145
1917
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
1918
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1919
+ readonly type: v.LiteralSchema<"aki", undefined>;
1920
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1921
+ }, undefined>, v.ObjectSchema<{
1922
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1923
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1924
+ }, undefined>, v.ObjectSchema<{
1925
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1926
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1927
+ }, undefined>], undefined>, undefined>;
1146
1928
  }, undefined>>;
1147
1929
  type Model = InferModelTypes<typeof model>;
1148
1930
  type NameSpaces = v.InferOutput<typeof vNamespaces>;
@@ -1154,11 +1936,31 @@ declare namespace DcqlSdJwtVcCredential {
1154
1936
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
1155
1937
  readonly vct: v.StringSchema<undefined>;
1156
1938
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
1939
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1940
+ readonly type: v.LiteralSchema<"aki", undefined>;
1941
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1942
+ }, undefined>, v.ObjectSchema<{
1943
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1944
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1945
+ }, undefined>, v.ObjectSchema<{
1946
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1947
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1948
+ }, undefined>], undefined>, undefined>;
1157
1949
  }, undefined>;
1158
1950
  const model: Model<v.ObjectSchema<{
1159
1951
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
1160
1952
  readonly vct: v.StringSchema<undefined>;
1161
1953
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
1954
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1955
+ readonly type: v.LiteralSchema<"aki", undefined>;
1956
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1957
+ }, undefined>, v.ObjectSchema<{
1958
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1959
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1960
+ }, undefined>, v.ObjectSchema<{
1961
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1962
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1963
+ }, undefined>], undefined>, undefined>;
1162
1964
  }, undefined>>;
1163
1965
  type Model = InferModelTypes<typeof model>;
1164
1966
  type Claims = Model['Output']['claims'];
@@ -1170,11 +1972,31 @@ declare namespace DcqlW3cVcCredential {
1170
1972
  readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
1171
1973
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
1172
1974
  readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
1975
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1976
+ readonly type: v.LiteralSchema<"aki", undefined>;
1977
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1978
+ }, undefined>, v.ObjectSchema<{
1979
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1980
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1981
+ }, undefined>, v.ObjectSchema<{
1982
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1983
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1984
+ }, undefined>], undefined>, undefined>;
1173
1985
  }, undefined>;
1174
1986
  const model: Model<v.ObjectSchema<{
1175
1987
  readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
1176
1988
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
1177
1989
  readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
1990
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
1991
+ readonly type: v.LiteralSchema<"aki", undefined>;
1992
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
1993
+ }, undefined>, v.ObjectSchema<{
1994
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
1995
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
1996
+ }, undefined>, v.ObjectSchema<{
1997
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
1998
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
1999
+ }, undefined>], undefined>, undefined>;
1178
2000
  }, undefined>>;
1179
2001
  type Model = InferModelTypes<typeof model>;
1180
2002
  type Claims = Model['Output']['claims'];
@@ -1185,14 +2007,44 @@ declare namespace DcqlCredential {
1185
2007
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
1186
2008
  readonly doctype: v.StringSchema<undefined>;
1187
2009
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
2010
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
2011
+ readonly type: v.LiteralSchema<"aki", undefined>;
2012
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
2013
+ }, undefined>, v.ObjectSchema<{
2014
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
2015
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
2016
+ }, undefined>, v.ObjectSchema<{
2017
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
2018
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
2019
+ }, undefined>], undefined>, undefined>;
1188
2020
  }, undefined>, v.ObjectSchema<{
1189
2021
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
1190
2022
  readonly vct: v.StringSchema<undefined>;
1191
2023
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
2024
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
2025
+ readonly type: v.LiteralSchema<"aki", undefined>;
2026
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
2027
+ }, undefined>, v.ObjectSchema<{
2028
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
2029
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
2030
+ }, undefined>, v.ObjectSchema<{
2031
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
2032
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
2033
+ }, undefined>], undefined>, undefined>;
1192
2034
  }, undefined>, v.ObjectSchema<{
1193
2035
  readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
1194
2036
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
1195
2037
  readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
2038
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
2039
+ readonly type: v.LiteralSchema<"aki", undefined>;
2040
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
2041
+ }, undefined>, v.ObjectSchema<{
2042
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
2043
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
2044
+ }, undefined>, v.ObjectSchema<{
2045
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
2046
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
2047
+ }, undefined>], undefined>, undefined>;
1196
2048
  }, undefined>], undefined>;
1197
2049
  const vParseSuccess: v.ObjectSchema<{
1198
2050
  readonly success: v.LiteralSchema<true, undefined>;
@@ -1204,14 +2056,44 @@ declare namespace DcqlCredential {
1204
2056
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
1205
2057
  readonly doctype: v.StringSchema<undefined>;
1206
2058
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
2059
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
2060
+ readonly type: v.LiteralSchema<"aki", undefined>;
2061
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
2062
+ }, undefined>, v.ObjectSchema<{
2063
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
2064
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
2065
+ }, undefined>, v.ObjectSchema<{
2066
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
2067
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
2068
+ }, undefined>], undefined>, undefined>;
1207
2069
  }, undefined>, v.ObjectSchema<{
1208
2070
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
1209
2071
  readonly vct: v.StringSchema<undefined>;
1210
2072
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
2073
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
2074
+ readonly type: v.LiteralSchema<"aki", undefined>;
2075
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
2076
+ }, undefined>, v.ObjectSchema<{
2077
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
2078
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
2079
+ }, undefined>, v.ObjectSchema<{
2080
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
2081
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
2082
+ }, undefined>], undefined>, undefined>;
1211
2083
  }, undefined>, v.ObjectSchema<{
1212
2084
  readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
1213
2085
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
1214
2086
  readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
2087
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
2088
+ readonly type: v.LiteralSchema<"aki", undefined>;
2089
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
2090
+ }, undefined>, v.ObjectSchema<{
2091
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
2092
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
2093
+ }, undefined>, v.ObjectSchema<{
2094
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
2095
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
2096
+ }, undefined>], undefined>, undefined>;
1215
2097
  }, undefined>], undefined>;
1216
2098
  }, undefined>;
1217
2099
  const vParseFailure: v.ObjectSchema<{
@@ -1226,14 +2108,44 @@ declare namespace DcqlCredential {
1226
2108
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
1227
2109
  readonly doctype: v.StringSchema<undefined>;
1228
2110
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
2111
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
2112
+ readonly type: v.LiteralSchema<"aki", undefined>;
2113
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
2114
+ }, undefined>, v.ObjectSchema<{
2115
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
2116
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
2117
+ }, undefined>, v.ObjectSchema<{
2118
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
2119
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
2120
+ }, undefined>], undefined>, undefined>;
1229
2121
  }, undefined>, v.ObjectSchema<{
1230
2122
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
1231
2123
  readonly vct: v.StringSchema<undefined>;
1232
2124
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
2125
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
2126
+ readonly type: v.LiteralSchema<"aki", undefined>;
2127
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
2128
+ }, undefined>, v.ObjectSchema<{
2129
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
2130
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
2131
+ }, undefined>, v.ObjectSchema<{
2132
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
2133
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
2134
+ }, undefined>], undefined>, undefined>;
1233
2135
  }, undefined>, v.ObjectSchema<{
1234
2136
  readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
1235
2137
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
1236
2138
  readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
2139
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
2140
+ readonly type: v.LiteralSchema<"aki", undefined>;
2141
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
2142
+ }, undefined>, v.ObjectSchema<{
2143
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
2144
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
2145
+ }, undefined>, v.ObjectSchema<{
2146
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
2147
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
2148
+ }, undefined>], undefined>, undefined>;
1237
2149
  }, undefined>], undefined>>;
1238
2150
  type Model = InferModelTypes<typeof model>;
1239
2151
  }
@@ -1309,6 +2221,22 @@ declare namespace DcqlQuery {
1309
2221
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
1310
2222
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
1311
2223
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
2224
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
2225
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
2226
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
2227
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
2228
+ type: "aki" | "etsi_tl" | "openid_federation";
2229
+ values: [string, ...string[]];
2230
+ }, ...{
2231
+ type: "aki" | "etsi_tl" | "openid_federation";
2232
+ values: [string, ...string[]];
2233
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
2234
+ type: "aki" | "etsi_tl" | "openid_federation";
2235
+ values: [string, ...string[]];
2236
+ }, ...{
2237
+ type: "aki" | "etsi_tl" | "openid_federation";
2238
+ values: [string, ...string[]];
2239
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
1312
2240
  }, undefined>, v.ObjectSchema<{
1313
2241
  readonly format: v.SchemaWithPipe<[v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>, v.DescriptionAction<"vc+sd-jwt" | "dc+sd-jwt", "REQUIRED. A string that specifies the format of the requested Verifiable Credential.">]>;
1314
2242
  readonly claims: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
@@ -1341,6 +2269,22 @@ declare namespace DcqlQuery {
1341
2269
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
1342
2270
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
1343
2271
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
2272
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
2273
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
2274
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
2275
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
2276
+ type: "aki" | "etsi_tl" | "openid_federation";
2277
+ values: [string, ...string[]];
2278
+ }, ...{
2279
+ type: "aki" | "etsi_tl" | "openid_federation";
2280
+ values: [string, ...string[]];
2281
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
2282
+ type: "aki" | "etsi_tl" | "openid_federation";
2283
+ values: [string, ...string[]];
2284
+ }, ...{
2285
+ type: "aki" | "etsi_tl" | "openid_federation";
2286
+ values: [string, ...string[]];
2287
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
1344
2288
  }, undefined>, v.ObjectSchema<{
1345
2289
  readonly format: v.PicklistSchema<["jwt_vc_json", "ldp_vc"], undefined>;
1346
2290
  readonly claims: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
@@ -1363,6 +2307,22 @@ declare namespace DcqlQuery {
1363
2307
  }, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
1364
2308
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
1365
2309
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
2310
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
2311
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
2312
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
2313
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
2314
+ type: "aki" | "etsi_tl" | "openid_federation";
2315
+ values: [string, ...string[]];
2316
+ }, ...{
2317
+ type: "aki" | "etsi_tl" | "openid_federation";
2318
+ values: [string, ...string[]];
2319
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
2320
+ type: "aki" | "etsi_tl" | "openid_federation";
2321
+ values: [string, ...string[]];
2322
+ }, ...{
2323
+ type: "aki" | "etsi_tl" | "openid_federation";
2324
+ values: [string, ...string[]];
2325
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
1366
2326
  }, undefined>], undefined>, undefined>, v.CustomSchema<[{
1367
2327
  id: string;
1368
2328
  format: "mso_mdoc";
@@ -1388,6 +2348,13 @@ declare namespace DcqlQuery {
1388
2348
  intent_to_retain?: boolean | undefined;
1389
2349
  })[]] | undefined;
1390
2350
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2351
+ trusted_authorities?: [{
2352
+ type: "aki" | "etsi_tl" | "openid_federation";
2353
+ values: [string, ...string[]];
2354
+ }, ...{
2355
+ type: "aki" | "etsi_tl" | "openid_federation";
2356
+ values: [string, ...string[]];
2357
+ }[]] | undefined;
1391
2358
  meta?: {
1392
2359
  doctype_value?: string | undefined;
1393
2360
  } | undefined;
@@ -1404,6 +2371,13 @@ declare namespace DcqlQuery {
1404
2371
  id?: string | undefined;
1405
2372
  }[]] | undefined;
1406
2373
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2374
+ trusted_authorities?: [{
2375
+ type: "aki" | "etsi_tl" | "openid_federation";
2376
+ values: [string, ...string[]];
2377
+ }, ...{
2378
+ type: "aki" | "etsi_tl" | "openid_federation";
2379
+ values: [string, ...string[]];
2380
+ }[]] | undefined;
1407
2381
  meta?: {
1408
2382
  vct_values?: string[] | undefined;
1409
2383
  } | undefined;
@@ -1423,6 +2397,13 @@ declare namespace DcqlQuery {
1423
2397
  id?: string | undefined;
1424
2398
  }[]] | undefined;
1425
2399
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2400
+ trusted_authorities?: [{
2401
+ type: "aki" | "etsi_tl" | "openid_federation";
2402
+ values: [string, ...string[]];
2403
+ }, ...{
2404
+ type: "aki" | "etsi_tl" | "openid_federation";
2405
+ values: [string, ...string[]];
2406
+ }[]] | undefined;
1426
2407
  }, ...({
1427
2408
  id: string;
1428
2409
  format: "mso_mdoc";
@@ -1448,6 +2429,13 @@ declare namespace DcqlQuery {
1448
2429
  intent_to_retain?: boolean | undefined;
1449
2430
  })[]] | undefined;
1450
2431
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2432
+ trusted_authorities?: [{
2433
+ type: "aki" | "etsi_tl" | "openid_federation";
2434
+ values: [string, ...string[]];
2435
+ }, ...{
2436
+ type: "aki" | "etsi_tl" | "openid_federation";
2437
+ values: [string, ...string[]];
2438
+ }[]] | undefined;
1451
2439
  meta?: {
1452
2440
  doctype_value?: string | undefined;
1453
2441
  } | undefined;
@@ -1464,6 +2452,13 @@ declare namespace DcqlQuery {
1464
2452
  id?: string | undefined;
1465
2453
  }[]] | undefined;
1466
2454
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2455
+ trusted_authorities?: [{
2456
+ type: "aki" | "etsi_tl" | "openid_federation";
2457
+ values: [string, ...string[]];
2458
+ }, ...{
2459
+ type: "aki" | "etsi_tl" | "openid_federation";
2460
+ values: [string, ...string[]];
2461
+ }[]] | undefined;
1467
2462
  meta?: {
1468
2463
  vct_values?: string[] | undefined;
1469
2464
  } | undefined;
@@ -1483,6 +2478,13 @@ declare namespace DcqlQuery {
1483
2478
  id?: string | undefined;
1484
2479
  }[]] | undefined;
1485
2480
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2481
+ trusted_authorities?: [{
2482
+ type: "aki" | "etsi_tl" | "openid_federation";
2483
+ values: [string, ...string[]];
2484
+ }, ...{
2485
+ type: "aki" | "etsi_tl" | "openid_federation";
2486
+ values: [string, ...string[]];
2487
+ }[]] | undefined;
1486
2488
  })[]], undefined>, v.DescriptionAction<[{
1487
2489
  id: string;
1488
2490
  format: "mso_mdoc";
@@ -1508,6 +2510,13 @@ declare namespace DcqlQuery {
1508
2510
  intent_to_retain?: boolean | undefined;
1509
2511
  })[]] | undefined;
1510
2512
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2513
+ trusted_authorities?: [{
2514
+ type: "aki" | "etsi_tl" | "openid_federation";
2515
+ values: [string, ...string[]];
2516
+ }, ...{
2517
+ type: "aki" | "etsi_tl" | "openid_federation";
2518
+ values: [string, ...string[]];
2519
+ }[]] | undefined;
1511
2520
  meta?: {
1512
2521
  doctype_value?: string | undefined;
1513
2522
  } | undefined;
@@ -1524,6 +2533,13 @@ declare namespace DcqlQuery {
1524
2533
  id?: string | undefined;
1525
2534
  }[]] | undefined;
1526
2535
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2536
+ trusted_authorities?: [{
2537
+ type: "aki" | "etsi_tl" | "openid_federation";
2538
+ values: [string, ...string[]];
2539
+ }, ...{
2540
+ type: "aki" | "etsi_tl" | "openid_federation";
2541
+ values: [string, ...string[]];
2542
+ }[]] | undefined;
1527
2543
  meta?: {
1528
2544
  vct_values?: string[] | undefined;
1529
2545
  } | undefined;
@@ -1543,6 +2559,13 @@ declare namespace DcqlQuery {
1543
2559
  id?: string | undefined;
1544
2560
  }[]] | undefined;
1545
2561
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2562
+ trusted_authorities?: [{
2563
+ type: "aki" | "etsi_tl" | "openid_federation";
2564
+ values: [string, ...string[]];
2565
+ }, ...{
2566
+ type: "aki" | "etsi_tl" | "openid_federation";
2567
+ values: [string, ...string[]];
2568
+ }[]] | undefined;
1546
2569
  }, ...({
1547
2570
  id: string;
1548
2571
  format: "mso_mdoc";
@@ -1568,6 +2591,13 @@ declare namespace DcqlQuery {
1568
2591
  intent_to_retain?: boolean | undefined;
1569
2592
  })[]] | undefined;
1570
2593
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2594
+ trusted_authorities?: [{
2595
+ type: "aki" | "etsi_tl" | "openid_federation";
2596
+ values: [string, ...string[]];
2597
+ }, ...{
2598
+ type: "aki" | "etsi_tl" | "openid_federation";
2599
+ values: [string, ...string[]];
2600
+ }[]] | undefined;
1571
2601
  meta?: {
1572
2602
  doctype_value?: string | undefined;
1573
2603
  } | undefined;
@@ -1584,6 +2614,13 @@ declare namespace DcqlQuery {
1584
2614
  id?: string | undefined;
1585
2615
  }[]] | undefined;
1586
2616
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2617
+ trusted_authorities?: [{
2618
+ type: "aki" | "etsi_tl" | "openid_federation";
2619
+ values: [string, ...string[]];
2620
+ }, ...{
2621
+ type: "aki" | "etsi_tl" | "openid_federation";
2622
+ values: [string, ...string[]];
2623
+ }[]] | undefined;
1587
2624
  meta?: {
1588
2625
  vct_values?: string[] | undefined;
1589
2626
  } | undefined;
@@ -1603,6 +2640,13 @@ declare namespace DcqlQuery {
1603
2640
  id?: string | undefined;
1604
2641
  }[]] | undefined;
1605
2642
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2643
+ trusted_authorities?: [{
2644
+ type: "aki" | "etsi_tl" | "openid_federation";
2645
+ values: [string, ...string[]];
2646
+ }, ...{
2647
+ type: "aki" | "etsi_tl" | "openid_federation";
2648
+ values: [string, ...string[]];
2649
+ }[]] | undefined;
1606
2650
  })[]], "REQUIRED. A non-empty array of Credential Queries that specify the requested Verifiable Credentials.">]>;
1607
2651
  readonly credential_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
1608
2652
  readonly options: v.SchemaWithPipe<[v.ArraySchema<v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, undefined>, v.CustomSchema<[string[], ...string[][]], undefined>, v.DescriptionAction<[string[], ...string[][]], "REQUIRED. A non-empty array, where each value in the array is a list of Credential Query identifiers representing one set of Credentials that satisfies the use case.">]>;
@@ -1665,6 +2709,13 @@ declare namespace DcqlQuery {
1665
2709
  intent_to_retain?: boolean | undefined;
1666
2710
  })[]] | undefined;
1667
2711
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2712
+ trusted_authorities?: [{
2713
+ type: "aki" | "etsi_tl" | "openid_federation";
2714
+ values: [string, ...string[]];
2715
+ }, ...{
2716
+ type: "aki" | "etsi_tl" | "openid_federation";
2717
+ values: [string, ...string[]];
2718
+ }[]] | undefined;
1668
2719
  meta?: {
1669
2720
  doctype_value?: string | undefined;
1670
2721
  } | undefined;
@@ -1681,6 +2732,13 @@ declare namespace DcqlQuery {
1681
2732
  id?: string | undefined;
1682
2733
  }[]] | undefined;
1683
2734
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2735
+ trusted_authorities?: [{
2736
+ type: "aki" | "etsi_tl" | "openid_federation";
2737
+ values: [string, ...string[]];
2738
+ }, ...{
2739
+ type: "aki" | "etsi_tl" | "openid_federation";
2740
+ values: [string, ...string[]];
2741
+ }[]] | undefined;
1684
2742
  meta?: {
1685
2743
  vct_values?: string[] | undefined;
1686
2744
  } | undefined;
@@ -1700,6 +2758,13 @@ declare namespace DcqlQuery {
1700
2758
  id?: string | undefined;
1701
2759
  }[]] | undefined;
1702
2760
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2761
+ trusted_authorities?: [{
2762
+ type: "aki" | "etsi_tl" | "openid_federation";
2763
+ values: [string, ...string[]];
2764
+ }, ...{
2765
+ type: "aki" | "etsi_tl" | "openid_federation";
2766
+ values: [string, ...string[]];
2767
+ }[]] | undefined;
1703
2768
  }, ...({
1704
2769
  id: string;
1705
2770
  format: "mso_mdoc";
@@ -1725,6 +2790,13 @@ declare namespace DcqlQuery {
1725
2790
  intent_to_retain?: boolean | undefined;
1726
2791
  })[]] | undefined;
1727
2792
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2793
+ trusted_authorities?: [{
2794
+ type: "aki" | "etsi_tl" | "openid_federation";
2795
+ values: [string, ...string[]];
2796
+ }, ...{
2797
+ type: "aki" | "etsi_tl" | "openid_federation";
2798
+ values: [string, ...string[]];
2799
+ }[]] | undefined;
1728
2800
  meta?: {
1729
2801
  doctype_value?: string | undefined;
1730
2802
  } | undefined;
@@ -1741,6 +2813,13 @@ declare namespace DcqlQuery {
1741
2813
  id?: string | undefined;
1742
2814
  }[]] | undefined;
1743
2815
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2816
+ trusted_authorities?: [{
2817
+ type: "aki" | "etsi_tl" | "openid_federation";
2818
+ values: [string, ...string[]];
2819
+ }, ...{
2820
+ type: "aki" | "etsi_tl" | "openid_federation";
2821
+ values: [string, ...string[]];
2822
+ }[]] | undefined;
1744
2823
  meta?: {
1745
2824
  vct_values?: string[] | undefined;
1746
2825
  } | undefined;
@@ -1760,6 +2839,13 @@ declare namespace DcqlQuery {
1760
2839
  id?: string | undefined;
1761
2840
  }[]] | undefined;
1762
2841
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
2842
+ trusted_authorities?: [{
2843
+ type: "aki" | "etsi_tl" | "openid_federation";
2844
+ values: [string, ...string[]];
2845
+ }, ...{
2846
+ type: "aki" | "etsi_tl" | "openid_federation";
2847
+ values: [string, ...string[]];
2848
+ }[]] | undefined;
1763
2849
  })[]];
1764
2850
  credential_matches: {
1765
2851
  [x: string]: {
@@ -1771,18 +2857,48 @@ declare namespace DcqlQuery {
1771
2857
  [x: string]: unknown;
1772
2858
  };
1773
2859
  };
2860
+ authority?: {
2861
+ type: "aki";
2862
+ value: string;
2863
+ } | {
2864
+ type: "etsi_tl";
2865
+ value: string;
2866
+ } | {
2867
+ type: "openid_federation";
2868
+ value: string;
2869
+ } | undefined;
1774
2870
  } | {
1775
2871
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
1776
2872
  vct: string;
1777
2873
  claims: {
1778
2874
  [x: string]: Json;
1779
2875
  };
2876
+ authority?: {
2877
+ type: "aki";
2878
+ value: string;
2879
+ } | {
2880
+ type: "etsi_tl";
2881
+ value: string;
2882
+ } | {
2883
+ type: "openid_federation";
2884
+ value: string;
2885
+ } | undefined;
1780
2886
  } | {
1781
2887
  type: string[];
1782
2888
  credential_format: "ldp_vc" | "jwt_vc_json";
1783
2889
  claims: {
1784
2890
  [x: string]: Json;
1785
2891
  };
2892
+ authority?: {
2893
+ type: "aki";
2894
+ value: string;
2895
+ } | {
2896
+ type: "etsi_tl";
2897
+ value: string;
2898
+ } | {
2899
+ type: "openid_federation";
2900
+ value: string;
2901
+ } | undefined;
1786
2902
  };
1787
2903
  success: true;
1788
2904
  typed: true;
@@ -1797,18 +2913,48 @@ declare namespace DcqlQuery {
1797
2913
  [x: string]: unknown;
1798
2914
  };
1799
2915
  };
2916
+ authority?: {
2917
+ type: "aki";
2918
+ value: string;
2919
+ } | {
2920
+ type: "etsi_tl";
2921
+ value: string;
2922
+ } | {
2923
+ type: "openid_federation";
2924
+ value: string;
2925
+ } | undefined;
1800
2926
  } | {
1801
2927
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
1802
2928
  vct: string;
1803
2929
  claims: {
1804
2930
  [x: string]: Json;
1805
2931
  };
2932
+ authority?: {
2933
+ type: "aki";
2934
+ value: string;
2935
+ } | {
2936
+ type: "etsi_tl";
2937
+ value: string;
2938
+ } | {
2939
+ type: "openid_federation";
2940
+ value: string;
2941
+ } | undefined;
1806
2942
  } | {
1807
2943
  type: string[];
1808
2944
  credential_format: "ldp_vc" | "jwt_vc_json";
1809
2945
  claims: {
1810
2946
  [x: string]: Json;
1811
2947
  };
2948
+ authority?: {
2949
+ type: "aki";
2950
+ value: string;
2951
+ } | {
2952
+ type: "etsi_tl";
2953
+ value: string;
2954
+ } | {
2955
+ type: "openid_federation";
2956
+ value: string;
2957
+ } | undefined;
1812
2958
  };
1813
2959
  success: true;
1814
2960
  typed: true;
@@ -1831,18 +2977,48 @@ declare namespace DcqlQuery {
1831
2977
  [x: string]: unknown;
1832
2978
  };
1833
2979
  };
2980
+ authority?: {
2981
+ type: "aki";
2982
+ value: string;
2983
+ } | {
2984
+ type: "etsi_tl";
2985
+ value: string;
2986
+ } | {
2987
+ type: "openid_federation";
2988
+ value: string;
2989
+ } | undefined;
1834
2990
  } | {
1835
2991
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
1836
2992
  vct: string;
1837
2993
  claims: {
1838
2994
  [x: string]: Json;
1839
2995
  };
2996
+ authority?: {
2997
+ type: "aki";
2998
+ value: string;
2999
+ } | {
3000
+ type: "etsi_tl";
3001
+ value: string;
3002
+ } | {
3003
+ type: "openid_federation";
3004
+ value: string;
3005
+ } | undefined;
1840
3006
  } | {
1841
3007
  type: string[];
1842
3008
  credential_format: "ldp_vc" | "jwt_vc_json";
1843
3009
  claims: {
1844
3010
  [x: string]: Json;
1845
3011
  };
3012
+ authority?: {
3013
+ type: "aki";
3014
+ value: string;
3015
+ } | {
3016
+ type: "etsi_tl";
3017
+ value: string;
3018
+ } | {
3019
+ type: "openid_federation";
3020
+ value: string;
3021
+ } | undefined;
1846
3022
  };
1847
3023
  success: true;
1848
3024
  typed: true;
@@ -1865,18 +3041,48 @@ declare namespace DcqlQuery {
1865
3041
  [x: string]: unknown;
1866
3042
  };
1867
3043
  };
3044
+ authority?: {
3045
+ type: "aki";
3046
+ value: string;
3047
+ } | {
3048
+ type: "etsi_tl";
3049
+ value: string;
3050
+ } | {
3051
+ type: "openid_federation";
3052
+ value: string;
3053
+ } | undefined;
1868
3054
  } | {
1869
3055
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
1870
3056
  vct: string;
1871
3057
  claims: {
1872
3058
  [x: string]: Json;
1873
3059
  };
3060
+ authority?: {
3061
+ type: "aki";
3062
+ value: string;
3063
+ } | {
3064
+ type: "etsi_tl";
3065
+ value: string;
3066
+ } | {
3067
+ type: "openid_federation";
3068
+ value: string;
3069
+ } | undefined;
1874
3070
  } | {
1875
3071
  type: string[];
1876
3072
  credential_format: "ldp_vc" | "jwt_vc_json";
1877
3073
  claims: {
1878
3074
  [x: string]: Json;
1879
3075
  };
3076
+ authority?: {
3077
+ type: "aki";
3078
+ value: string;
3079
+ } | {
3080
+ type: "etsi_tl";
3081
+ value: string;
3082
+ } | {
3083
+ type: "openid_federation";
3084
+ value: string;
3085
+ } | undefined;
1880
3086
  };
1881
3087
  success: true;
1882
3088
  typed: true;
@@ -1899,18 +3105,48 @@ declare namespace DcqlQuery {
1899
3105
  [x: string]: unknown;
1900
3106
  };
1901
3107
  };
3108
+ authority?: {
3109
+ type: "aki";
3110
+ value: string;
3111
+ } | {
3112
+ type: "etsi_tl";
3113
+ value: string;
3114
+ } | {
3115
+ type: "openid_federation";
3116
+ value: string;
3117
+ } | undefined;
1902
3118
  } | {
1903
3119
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
1904
3120
  vct: string;
1905
3121
  claims: {
1906
3122
  [x: string]: Json;
1907
3123
  };
3124
+ authority?: {
3125
+ type: "aki";
3126
+ value: string;
3127
+ } | {
3128
+ type: "etsi_tl";
3129
+ value: string;
3130
+ } | {
3131
+ type: "openid_federation";
3132
+ value: string;
3133
+ } | undefined;
1908
3134
  } | {
1909
3135
  type: string[];
1910
3136
  credential_format: "ldp_vc" | "jwt_vc_json";
1911
3137
  claims: {
1912
3138
  [x: string]: Json;
1913
3139
  };
3140
+ authority?: {
3141
+ type: "aki";
3142
+ value: string;
3143
+ } | {
3144
+ type: "etsi_tl";
3145
+ value: string;
3146
+ } | {
3147
+ type: "openid_federation";
3148
+ value: string;
3149
+ } | undefined;
1914
3150
  };
1915
3151
  success: true;
1916
3152
  typed: true;
@@ -1937,18 +3173,48 @@ declare namespace DcqlQuery {
1937
3173
  [x: string]: unknown;
1938
3174
  };
1939
3175
  };
3176
+ authority?: {
3177
+ type: "aki";
3178
+ value: string;
3179
+ } | {
3180
+ type: "etsi_tl";
3181
+ value: string;
3182
+ } | {
3183
+ type: "openid_federation";
3184
+ value: string;
3185
+ } | undefined;
1940
3186
  } | {
1941
3187
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
1942
3188
  vct: string;
1943
3189
  claims: {
1944
3190
  [x: string]: Json;
1945
3191
  };
3192
+ authority?: {
3193
+ type: "aki";
3194
+ value: string;
3195
+ } | {
3196
+ type: "etsi_tl";
3197
+ value: string;
3198
+ } | {
3199
+ type: "openid_federation";
3200
+ value: string;
3201
+ } | undefined;
1946
3202
  } | {
1947
3203
  type: string[];
1948
3204
  credential_format: "ldp_vc" | "jwt_vc_json";
1949
3205
  claims: {
1950
3206
  [x: string]: Json;
1951
3207
  };
3208
+ authority?: {
3209
+ type: "aki";
3210
+ value: string;
3211
+ } | {
3212
+ type: "etsi_tl";
3213
+ value: string;
3214
+ } | {
3215
+ type: "openid_federation";
3216
+ value: string;
3217
+ } | undefined;
1952
3218
  };
1953
3219
  success: true;
1954
3220
  typed: true;
@@ -1971,18 +3237,48 @@ declare namespace DcqlQuery {
1971
3237
  [x: string]: unknown;
1972
3238
  };
1973
3239
  };
3240
+ authority?: {
3241
+ type: "aki";
3242
+ value: string;
3243
+ } | {
3244
+ type: "etsi_tl";
3245
+ value: string;
3246
+ } | {
3247
+ type: "openid_federation";
3248
+ value: string;
3249
+ } | undefined;
1974
3250
  } | {
1975
3251
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
1976
3252
  vct: string;
1977
3253
  claims: {
1978
3254
  [x: string]: Json;
1979
3255
  };
3256
+ authority?: {
3257
+ type: "aki";
3258
+ value: string;
3259
+ } | {
3260
+ type: "etsi_tl";
3261
+ value: string;
3262
+ } | {
3263
+ type: "openid_federation";
3264
+ value: string;
3265
+ } | undefined;
1980
3266
  } | {
1981
3267
  type: string[];
1982
3268
  credential_format: "ldp_vc" | "jwt_vc_json";
1983
3269
  claims: {
1984
3270
  [x: string]: Json;
1985
3271
  };
3272
+ authority?: {
3273
+ type: "aki";
3274
+ value: string;
3275
+ } | {
3276
+ type: "etsi_tl";
3277
+ value: string;
3278
+ } | {
3279
+ type: "openid_federation";
3280
+ value: string;
3281
+ } | undefined;
1986
3282
  };
1987
3283
  success: true;
1988
3284
  typed: true;
@@ -2005,18 +3301,48 @@ declare namespace DcqlQuery {
2005
3301
  [x: string]: unknown;
2006
3302
  };
2007
3303
  };
3304
+ authority?: {
3305
+ type: "aki";
3306
+ value: string;
3307
+ } | {
3308
+ type: "etsi_tl";
3309
+ value: string;
3310
+ } | {
3311
+ type: "openid_federation";
3312
+ value: string;
3313
+ } | undefined;
2008
3314
  } | {
2009
3315
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
2010
3316
  vct: string;
2011
3317
  claims: {
2012
3318
  [x: string]: Json;
2013
3319
  };
3320
+ authority?: {
3321
+ type: "aki";
3322
+ value: string;
3323
+ } | {
3324
+ type: "etsi_tl";
3325
+ value: string;
3326
+ } | {
3327
+ type: "openid_federation";
3328
+ value: string;
3329
+ } | undefined;
2014
3330
  } | {
2015
3331
  type: string[];
2016
3332
  credential_format: "ldp_vc" | "jwt_vc_json";
2017
3333
  claims: {
2018
3334
  [x: string]: Json;
2019
3335
  };
3336
+ authority?: {
3337
+ type: "aki";
3338
+ value: string;
3339
+ } | {
3340
+ type: "etsi_tl";
3341
+ value: string;
3342
+ } | {
3343
+ type: "openid_federation";
3344
+ value: string;
3345
+ } | undefined;
2020
3346
  };
2021
3347
  success: true;
2022
3348
  typed: true;
@@ -2039,18 +3365,48 @@ declare namespace DcqlQuery {
2039
3365
  [x: string]: unknown;
2040
3366
  };
2041
3367
  };
3368
+ authority?: {
3369
+ type: "aki";
3370
+ value: string;
3371
+ } | {
3372
+ type: "etsi_tl";
3373
+ value: string;
3374
+ } | {
3375
+ type: "openid_federation";
3376
+ value: string;
3377
+ } | undefined;
2042
3378
  } | {
2043
3379
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
2044
3380
  vct: string;
2045
3381
  claims: {
2046
3382
  [x: string]: Json;
2047
3383
  };
3384
+ authority?: {
3385
+ type: "aki";
3386
+ value: string;
3387
+ } | {
3388
+ type: "etsi_tl";
3389
+ value: string;
3390
+ } | {
3391
+ type: "openid_federation";
3392
+ value: string;
3393
+ } | undefined;
2048
3394
  } | {
2049
3395
  type: string[];
2050
3396
  credential_format: "ldp_vc" | "jwt_vc_json";
2051
3397
  claims: {
2052
3398
  [x: string]: Json;
2053
3399
  };
3400
+ authority?: {
3401
+ type: "aki";
3402
+ value: string;
3403
+ } | {
3404
+ type: "etsi_tl";
3405
+ value: string;
3406
+ } | {
3407
+ type: "openid_federation";
3408
+ value: string;
3409
+ } | undefined;
2054
3410
  };
2055
3411
  success: true;
2056
3412
  typed: true;
@@ -2110,6 +3466,13 @@ declare namespace DcqlQuery {
2110
3466
  intent_to_retain?: boolean | undefined;
2111
3467
  })[]] | undefined;
2112
3468
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3469
+ trusted_authorities?: [{
3470
+ type: "aki" | "etsi_tl" | "openid_federation";
3471
+ values: [string, ...string[]];
3472
+ }, ...{
3473
+ type: "aki" | "etsi_tl" | "openid_federation";
3474
+ values: [string, ...string[]];
3475
+ }[]] | undefined;
2113
3476
  meta?: {
2114
3477
  doctype_value?: string | undefined;
2115
3478
  } | undefined;
@@ -2126,6 +3489,13 @@ declare namespace DcqlQuery {
2126
3489
  id?: string | undefined;
2127
3490
  }[]] | undefined;
2128
3491
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3492
+ trusted_authorities?: [{
3493
+ type: "aki" | "etsi_tl" | "openid_federation";
3494
+ values: [string, ...string[]];
3495
+ }, ...{
3496
+ type: "aki" | "etsi_tl" | "openid_federation";
3497
+ values: [string, ...string[]];
3498
+ }[]] | undefined;
2129
3499
  meta?: {
2130
3500
  vct_values?: string[] | undefined;
2131
3501
  } | undefined;
@@ -2145,6 +3515,13 @@ declare namespace DcqlQuery {
2145
3515
  id?: string | undefined;
2146
3516
  }[]] | undefined;
2147
3517
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3518
+ trusted_authorities?: [{
3519
+ type: "aki" | "etsi_tl" | "openid_federation";
3520
+ values: [string, ...string[]];
3521
+ }, ...{
3522
+ type: "aki" | "etsi_tl" | "openid_federation";
3523
+ values: [string, ...string[]];
3524
+ }[]] | undefined;
2148
3525
  }, ...({
2149
3526
  id: string;
2150
3527
  format: "mso_mdoc";
@@ -2170,6 +3547,13 @@ declare namespace DcqlQuery {
2170
3547
  intent_to_retain?: boolean | undefined;
2171
3548
  })[]] | undefined;
2172
3549
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3550
+ trusted_authorities?: [{
3551
+ type: "aki" | "etsi_tl" | "openid_federation";
3552
+ values: [string, ...string[]];
3553
+ }, ...{
3554
+ type: "aki" | "etsi_tl" | "openid_federation";
3555
+ values: [string, ...string[]];
3556
+ }[]] | undefined;
2173
3557
  meta?: {
2174
3558
  doctype_value?: string | undefined;
2175
3559
  } | undefined;
@@ -2186,6 +3570,13 @@ declare namespace DcqlQuery {
2186
3570
  id?: string | undefined;
2187
3571
  }[]] | undefined;
2188
3572
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3573
+ trusted_authorities?: [{
3574
+ type: "aki" | "etsi_tl" | "openid_federation";
3575
+ values: [string, ...string[]];
3576
+ }, ...{
3577
+ type: "aki" | "etsi_tl" | "openid_federation";
3578
+ values: [string, ...string[]];
3579
+ }[]] | undefined;
2189
3580
  meta?: {
2190
3581
  vct_values?: string[] | undefined;
2191
3582
  } | undefined;
@@ -2205,6 +3596,13 @@ declare namespace DcqlQuery {
2205
3596
  id?: string | undefined;
2206
3597
  }[]] | undefined;
2207
3598
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3599
+ trusted_authorities?: [{
3600
+ type: "aki" | "etsi_tl" | "openid_federation";
3601
+ values: [string, ...string[]];
3602
+ }, ...{
3603
+ type: "aki" | "etsi_tl" | "openid_federation";
3604
+ values: [string, ...string[]];
3605
+ }[]] | undefined;
2208
3606
  })[]];
2209
3607
  credential_sets?: [{
2210
3608
  options: [string[], ...string[][]];
@@ -2239,14 +3637,44 @@ declare namespace DcqlPresentationResult {
2239
3637
  readonly credential_format: v.LiteralSchema<"mso_mdoc", undefined>;
2240
3638
  readonly doctype: v.StringSchema<undefined>;
2241
3639
  readonly namespaces: v.RecordSchema<v.StringSchema<undefined>, v.RecordSchema<v.StringSchema<undefined>, v.UnknownSchema, undefined>, undefined>;
3640
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
3641
+ readonly type: v.LiteralSchema<"aki", undefined>;
3642
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
3643
+ }, undefined>, v.ObjectSchema<{
3644
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
3645
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
3646
+ }, undefined>, v.ObjectSchema<{
3647
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
3648
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
3649
+ }, undefined>], undefined>, undefined>;
2242
3650
  }, undefined>, v.ObjectSchema<{
2243
3651
  readonly credential_format: v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>;
2244
3652
  readonly vct: v.StringSchema<undefined>;
2245
3653
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
3654
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
3655
+ readonly type: v.LiteralSchema<"aki", undefined>;
3656
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
3657
+ }, undefined>, v.ObjectSchema<{
3658
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
3659
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
3660
+ }, undefined>, v.ObjectSchema<{
3661
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
3662
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
3663
+ }, undefined>], undefined>, undefined>;
2246
3664
  }, undefined>, v.ObjectSchema<{
2247
3665
  readonly credential_format: v.PicklistSchema<["ldp_vc", "jwt_vc_json"], undefined>;
2248
3666
  readonly claims: v.RecordSchema<v.StringSchema<undefined>, v.GenericSchema<Json, Json, v.BaseIssue<unknown>>, undefined>;
2249
3667
  readonly type: v.ArraySchema<v.StringSchema<undefined>, undefined>;
3668
+ readonly authority: v.OptionalSchema<v.VariantSchema<"type", readonly [v.ObjectSchema<{
3669
+ readonly type: v.LiteralSchema<"aki", undefined>;
3670
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
3671
+ }, undefined>, v.ObjectSchema<{
3672
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
3673
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
3674
+ }, undefined>, v.ObjectSchema<{
3675
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
3676
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
3677
+ }, undefined>], undefined>, undefined>;
2250
3678
  }, undefined>], undefined>;
2251
3679
  readonly success: v.LiteralSchema<true, undefined>;
2252
3680
  readonly typed: v.LiteralSchema<true, undefined>;
@@ -2312,6 +3740,22 @@ declare namespace DcqlPresentationResult {
2312
3740
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
2313
3741
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
2314
3742
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
3743
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
3744
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
3745
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
3746
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
3747
+ type: "aki" | "etsi_tl" | "openid_federation";
3748
+ values: [string, ...string[]];
3749
+ }, ...{
3750
+ type: "aki" | "etsi_tl" | "openid_federation";
3751
+ values: [string, ...string[]];
3752
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
3753
+ type: "aki" | "etsi_tl" | "openid_federation";
3754
+ values: [string, ...string[]];
3755
+ }, ...{
3756
+ type: "aki" | "etsi_tl" | "openid_federation";
3757
+ values: [string, ...string[]];
3758
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
2315
3759
  }, undefined>, v.ObjectSchema<{
2316
3760
  readonly format: v.SchemaWithPipe<[v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>, v.DescriptionAction<"vc+sd-jwt" | "dc+sd-jwt", "REQUIRED. A string that specifies the format of the requested Verifiable Credential.">]>;
2317
3761
  readonly claims: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
@@ -2344,6 +3788,22 @@ declare namespace DcqlPresentationResult {
2344
3788
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
2345
3789
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
2346
3790
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
3791
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
3792
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
3793
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
3794
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
3795
+ type: "aki" | "etsi_tl" | "openid_federation";
3796
+ values: [string, ...string[]];
3797
+ }, ...{
3798
+ type: "aki" | "etsi_tl" | "openid_federation";
3799
+ values: [string, ...string[]];
3800
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
3801
+ type: "aki" | "etsi_tl" | "openid_federation";
3802
+ values: [string, ...string[]];
3803
+ }, ...{
3804
+ type: "aki" | "etsi_tl" | "openid_federation";
3805
+ values: [string, ...string[]];
3806
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
2347
3807
  }, undefined>, v.ObjectSchema<{
2348
3808
  readonly format: v.PicklistSchema<["jwt_vc_json", "ldp_vc"], undefined>;
2349
3809
  readonly claims: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
@@ -2366,6 +3826,22 @@ declare namespace DcqlPresentationResult {
2366
3826
  }, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
2367
3827
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
2368
3828
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
3829
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
3830
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
3831
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
3832
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
3833
+ type: "aki" | "etsi_tl" | "openid_federation";
3834
+ values: [string, ...string[]];
3835
+ }, ...{
3836
+ type: "aki" | "etsi_tl" | "openid_federation";
3837
+ values: [string, ...string[]];
3838
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
3839
+ type: "aki" | "etsi_tl" | "openid_federation";
3840
+ values: [string, ...string[]];
3841
+ }, ...{
3842
+ type: "aki" | "etsi_tl" | "openid_federation";
3843
+ values: [string, ...string[]];
3844
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
2369
3845
  }, undefined>], undefined>, undefined>, v.CustomSchema<[{
2370
3846
  id: string;
2371
3847
  format: "mso_mdoc";
@@ -2391,6 +3867,13 @@ declare namespace DcqlPresentationResult {
2391
3867
  intent_to_retain?: boolean | undefined;
2392
3868
  })[]] | undefined;
2393
3869
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3870
+ trusted_authorities?: [{
3871
+ type: "aki" | "etsi_tl" | "openid_federation";
3872
+ values: [string, ...string[]];
3873
+ }, ...{
3874
+ type: "aki" | "etsi_tl" | "openid_federation";
3875
+ values: [string, ...string[]];
3876
+ }[]] | undefined;
2394
3877
  meta?: {
2395
3878
  doctype_value?: string | undefined;
2396
3879
  } | undefined;
@@ -2407,6 +3890,13 @@ declare namespace DcqlPresentationResult {
2407
3890
  id?: string | undefined;
2408
3891
  }[]] | undefined;
2409
3892
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3893
+ trusted_authorities?: [{
3894
+ type: "aki" | "etsi_tl" | "openid_federation";
3895
+ values: [string, ...string[]];
3896
+ }, ...{
3897
+ type: "aki" | "etsi_tl" | "openid_federation";
3898
+ values: [string, ...string[]];
3899
+ }[]] | undefined;
2410
3900
  meta?: {
2411
3901
  vct_values?: string[] | undefined;
2412
3902
  } | undefined;
@@ -2426,6 +3916,13 @@ declare namespace DcqlPresentationResult {
2426
3916
  id?: string | undefined;
2427
3917
  }[]] | undefined;
2428
3918
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3919
+ trusted_authorities?: [{
3920
+ type: "aki" | "etsi_tl" | "openid_federation";
3921
+ values: [string, ...string[]];
3922
+ }, ...{
3923
+ type: "aki" | "etsi_tl" | "openid_federation";
3924
+ values: [string, ...string[]];
3925
+ }[]] | undefined;
2429
3926
  }, ...({
2430
3927
  id: string;
2431
3928
  format: "mso_mdoc";
@@ -2451,6 +3948,13 @@ declare namespace DcqlPresentationResult {
2451
3948
  intent_to_retain?: boolean | undefined;
2452
3949
  })[]] | undefined;
2453
3950
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3951
+ trusted_authorities?: [{
3952
+ type: "aki" | "etsi_tl" | "openid_federation";
3953
+ values: [string, ...string[]];
3954
+ }, ...{
3955
+ type: "aki" | "etsi_tl" | "openid_federation";
3956
+ values: [string, ...string[]];
3957
+ }[]] | undefined;
2454
3958
  meta?: {
2455
3959
  doctype_value?: string | undefined;
2456
3960
  } | undefined;
@@ -2467,6 +3971,13 @@ declare namespace DcqlPresentationResult {
2467
3971
  id?: string | undefined;
2468
3972
  }[]] | undefined;
2469
3973
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
3974
+ trusted_authorities?: [{
3975
+ type: "aki" | "etsi_tl" | "openid_federation";
3976
+ values: [string, ...string[]];
3977
+ }, ...{
3978
+ type: "aki" | "etsi_tl" | "openid_federation";
3979
+ values: [string, ...string[]];
3980
+ }[]] | undefined;
2470
3981
  meta?: {
2471
3982
  vct_values?: string[] | undefined;
2472
3983
  } | undefined;
@@ -2486,6 +3997,13 @@ declare namespace DcqlPresentationResult {
2486
3997
  id?: string | undefined;
2487
3998
  }[]] | undefined;
2488
3999
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4000
+ trusted_authorities?: [{
4001
+ type: "aki" | "etsi_tl" | "openid_federation";
4002
+ values: [string, ...string[]];
4003
+ }, ...{
4004
+ type: "aki" | "etsi_tl" | "openid_federation";
4005
+ values: [string, ...string[]];
4006
+ }[]] | undefined;
2489
4007
  })[]], undefined>, v.DescriptionAction<[{
2490
4008
  id: string;
2491
4009
  format: "mso_mdoc";
@@ -2511,6 +4029,13 @@ declare namespace DcqlPresentationResult {
2511
4029
  intent_to_retain?: boolean | undefined;
2512
4030
  })[]] | undefined;
2513
4031
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4032
+ trusted_authorities?: [{
4033
+ type: "aki" | "etsi_tl" | "openid_federation";
4034
+ values: [string, ...string[]];
4035
+ }, ...{
4036
+ type: "aki" | "etsi_tl" | "openid_federation";
4037
+ values: [string, ...string[]];
4038
+ }[]] | undefined;
2514
4039
  meta?: {
2515
4040
  doctype_value?: string | undefined;
2516
4041
  } | undefined;
@@ -2527,6 +4052,13 @@ declare namespace DcqlPresentationResult {
2527
4052
  id?: string | undefined;
2528
4053
  }[]] | undefined;
2529
4054
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4055
+ trusted_authorities?: [{
4056
+ type: "aki" | "etsi_tl" | "openid_federation";
4057
+ values: [string, ...string[]];
4058
+ }, ...{
4059
+ type: "aki" | "etsi_tl" | "openid_federation";
4060
+ values: [string, ...string[]];
4061
+ }[]] | undefined;
2530
4062
  meta?: {
2531
4063
  vct_values?: string[] | undefined;
2532
4064
  } | undefined;
@@ -2546,6 +4078,13 @@ declare namespace DcqlPresentationResult {
2546
4078
  id?: string | undefined;
2547
4079
  }[]] | undefined;
2548
4080
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4081
+ trusted_authorities?: [{
4082
+ type: "aki" | "etsi_tl" | "openid_federation";
4083
+ values: [string, ...string[]];
4084
+ }, ...{
4085
+ type: "aki" | "etsi_tl" | "openid_federation";
4086
+ values: [string, ...string[]];
4087
+ }[]] | undefined;
2549
4088
  }, ...({
2550
4089
  id: string;
2551
4090
  format: "mso_mdoc";
@@ -2571,6 +4110,13 @@ declare namespace DcqlPresentationResult {
2571
4110
  intent_to_retain?: boolean | undefined;
2572
4111
  })[]] | undefined;
2573
4112
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4113
+ trusted_authorities?: [{
4114
+ type: "aki" | "etsi_tl" | "openid_federation";
4115
+ values: [string, ...string[]];
4116
+ }, ...{
4117
+ type: "aki" | "etsi_tl" | "openid_federation";
4118
+ values: [string, ...string[]];
4119
+ }[]] | undefined;
2574
4120
  meta?: {
2575
4121
  doctype_value?: string | undefined;
2576
4122
  } | undefined;
@@ -2587,6 +4133,13 @@ declare namespace DcqlPresentationResult {
2587
4133
  id?: string | undefined;
2588
4134
  }[]] | undefined;
2589
4135
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4136
+ trusted_authorities?: [{
4137
+ type: "aki" | "etsi_tl" | "openid_federation";
4138
+ values: [string, ...string[]];
4139
+ }, ...{
4140
+ type: "aki" | "etsi_tl" | "openid_federation";
4141
+ values: [string, ...string[]];
4142
+ }[]] | undefined;
2590
4143
  meta?: {
2591
4144
  vct_values?: string[] | undefined;
2592
4145
  } | undefined;
@@ -2606,6 +4159,13 @@ declare namespace DcqlPresentationResult {
2606
4159
  id?: string | undefined;
2607
4160
  }[]] | undefined;
2608
4161
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4162
+ trusted_authorities?: [{
4163
+ type: "aki" | "etsi_tl" | "openid_federation";
4164
+ values: [string, ...string[]];
4165
+ }, ...{
4166
+ type: "aki" | "etsi_tl" | "openid_federation";
4167
+ values: [string, ...string[]];
4168
+ }[]] | undefined;
2609
4169
  })[]], "REQUIRED. A non-empty array of Credential Queries that specify the requested Verifiable Credentials.">]>;
2610
4170
  readonly credential_sets: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
2611
4171
  readonly matching_options: v.UnionSchema<[v.UndefinedSchema<undefined>, v.SchemaWithPipe<[v.ArraySchema<v.ArraySchema<v.StringSchema<undefined>, undefined>, undefined>, v.CustomSchema<[string[], ...string[][]], undefined>]>], undefined>;
@@ -2673,6 +4233,13 @@ declare namespace DcqlPresentationResult {
2673
4233
  intent_to_retain?: boolean | undefined;
2674
4234
  })[]] | undefined;
2675
4235
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4236
+ trusted_authorities?: [{
4237
+ type: "aki" | "etsi_tl" | "openid_federation";
4238
+ values: [string, ...string[]];
4239
+ }, ...{
4240
+ type: "aki" | "etsi_tl" | "openid_federation";
4241
+ values: [string, ...string[]];
4242
+ }[]] | undefined;
2676
4243
  meta?: {
2677
4244
  doctype_value?: string | undefined;
2678
4245
  } | undefined;
@@ -2689,6 +4256,13 @@ declare namespace DcqlPresentationResult {
2689
4256
  id?: string | undefined;
2690
4257
  }[]] | undefined;
2691
4258
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4259
+ trusted_authorities?: [{
4260
+ type: "aki" | "etsi_tl" | "openid_federation";
4261
+ values: [string, ...string[]];
4262
+ }, ...{
4263
+ type: "aki" | "etsi_tl" | "openid_federation";
4264
+ values: [string, ...string[]];
4265
+ }[]] | undefined;
2692
4266
  meta?: {
2693
4267
  vct_values?: string[] | undefined;
2694
4268
  } | undefined;
@@ -2708,6 +4282,13 @@ declare namespace DcqlPresentationResult {
2708
4282
  id?: string | undefined;
2709
4283
  }[]] | undefined;
2710
4284
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4285
+ trusted_authorities?: [{
4286
+ type: "aki" | "etsi_tl" | "openid_federation";
4287
+ values: [string, ...string[]];
4288
+ }, ...{
4289
+ type: "aki" | "etsi_tl" | "openid_federation";
4290
+ values: [string, ...string[]];
4291
+ }[]] | undefined;
2711
4292
  }, ...({
2712
4293
  id: string;
2713
4294
  format: "mso_mdoc";
@@ -2733,6 +4314,13 @@ declare namespace DcqlPresentationResult {
2733
4314
  intent_to_retain?: boolean | undefined;
2734
4315
  })[]] | undefined;
2735
4316
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4317
+ trusted_authorities?: [{
4318
+ type: "aki" | "etsi_tl" | "openid_federation";
4319
+ values: [string, ...string[]];
4320
+ }, ...{
4321
+ type: "aki" | "etsi_tl" | "openid_federation";
4322
+ values: [string, ...string[]];
4323
+ }[]] | undefined;
2736
4324
  meta?: {
2737
4325
  doctype_value?: string | undefined;
2738
4326
  } | undefined;
@@ -2749,6 +4337,13 @@ declare namespace DcqlPresentationResult {
2749
4337
  id?: string | undefined;
2750
4338
  }[]] | undefined;
2751
4339
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4340
+ trusted_authorities?: [{
4341
+ type: "aki" | "etsi_tl" | "openid_federation";
4342
+ values: [string, ...string[]];
4343
+ }, ...{
4344
+ type: "aki" | "etsi_tl" | "openid_federation";
4345
+ values: [string, ...string[]];
4346
+ }[]] | undefined;
2752
4347
  meta?: {
2753
4348
  vct_values?: string[] | undefined;
2754
4349
  } | undefined;
@@ -2768,6 +4363,13 @@ declare namespace DcqlPresentationResult {
2768
4363
  id?: string | undefined;
2769
4364
  }[]] | undefined;
2770
4365
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4366
+ trusted_authorities?: [{
4367
+ type: "aki" | "etsi_tl" | "openid_federation";
4368
+ values: [string, ...string[]];
4369
+ }, ...{
4370
+ type: "aki" | "etsi_tl" | "openid_federation";
4371
+ values: [string, ...string[]];
4372
+ }[]] | undefined;
2771
4373
  })[]];
2772
4374
  canBeSatisfied: boolean;
2773
4375
  invalid_matches: {
@@ -2790,18 +4392,48 @@ declare namespace DcqlPresentationResult {
2790
4392
  [x: string]: unknown;
2791
4393
  };
2792
4394
  };
4395
+ authority?: {
4396
+ type: "aki";
4397
+ value: string;
4398
+ } | {
4399
+ type: "etsi_tl";
4400
+ value: string;
4401
+ } | {
4402
+ type: "openid_federation";
4403
+ value: string;
4404
+ } | undefined;
2793
4405
  } | {
2794
4406
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
2795
4407
  vct: string;
2796
4408
  claims: {
2797
4409
  [x: string]: Json;
2798
4410
  };
4411
+ authority?: {
4412
+ type: "aki";
4413
+ value: string;
4414
+ } | {
4415
+ type: "etsi_tl";
4416
+ value: string;
4417
+ } | {
4418
+ type: "openid_federation";
4419
+ value: string;
4420
+ } | undefined;
2799
4421
  } | {
2800
4422
  type: string[];
2801
4423
  credential_format: "ldp_vc" | "jwt_vc_json";
2802
4424
  claims: {
2803
4425
  [x: string]: Json;
2804
4426
  };
4427
+ authority?: {
4428
+ type: "aki";
4429
+ value: string;
4430
+ } | {
4431
+ type: "etsi_tl";
4432
+ value: string;
4433
+ } | {
4434
+ type: "openid_federation";
4435
+ value: string;
4436
+ } | undefined;
2805
4437
  };
2806
4438
  success: true;
2807
4439
  typed: true;
@@ -2861,6 +4493,13 @@ declare namespace DcqlPresentationResult {
2861
4493
  intent_to_retain?: boolean | undefined;
2862
4494
  })[]] | undefined;
2863
4495
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4496
+ trusted_authorities?: [{
4497
+ type: "aki" | "etsi_tl" | "openid_federation";
4498
+ values: [string, ...string[]];
4499
+ }, ...{
4500
+ type: "aki" | "etsi_tl" | "openid_federation";
4501
+ values: [string, ...string[]];
4502
+ }[]] | undefined;
2864
4503
  meta?: {
2865
4504
  doctype_value?: string | undefined;
2866
4505
  } | undefined;
@@ -2877,6 +4516,13 @@ declare namespace DcqlPresentationResult {
2877
4516
  id?: string | undefined;
2878
4517
  }[]] | undefined;
2879
4518
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4519
+ trusted_authorities?: [{
4520
+ type: "aki" | "etsi_tl" | "openid_federation";
4521
+ values: [string, ...string[]];
4522
+ }, ...{
4523
+ type: "aki" | "etsi_tl" | "openid_federation";
4524
+ values: [string, ...string[]];
4525
+ }[]] | undefined;
2880
4526
  meta?: {
2881
4527
  vct_values?: string[] | undefined;
2882
4528
  } | undefined;
@@ -2896,6 +4542,13 @@ declare namespace DcqlPresentationResult {
2896
4542
  id?: string | undefined;
2897
4543
  }[]] | undefined;
2898
4544
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4545
+ trusted_authorities?: [{
4546
+ type: "aki" | "etsi_tl" | "openid_federation";
4547
+ values: [string, ...string[]];
4548
+ }, ...{
4549
+ type: "aki" | "etsi_tl" | "openid_federation";
4550
+ values: [string, ...string[]];
4551
+ }[]] | undefined;
2899
4552
  }, ...({
2900
4553
  id: string;
2901
4554
  format: "mso_mdoc";
@@ -2921,6 +4574,13 @@ declare namespace DcqlPresentationResult {
2921
4574
  intent_to_retain?: boolean | undefined;
2922
4575
  })[]] | undefined;
2923
4576
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4577
+ trusted_authorities?: [{
4578
+ type: "aki" | "etsi_tl" | "openid_federation";
4579
+ values: [string, ...string[]];
4580
+ }, ...{
4581
+ type: "aki" | "etsi_tl" | "openid_federation";
4582
+ values: [string, ...string[]];
4583
+ }[]] | undefined;
2924
4584
  meta?: {
2925
4585
  doctype_value?: string | undefined;
2926
4586
  } | undefined;
@@ -2937,6 +4597,13 @@ declare namespace DcqlPresentationResult {
2937
4597
  id?: string | undefined;
2938
4598
  }[]] | undefined;
2939
4599
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4600
+ trusted_authorities?: [{
4601
+ type: "aki" | "etsi_tl" | "openid_federation";
4602
+ values: [string, ...string[]];
4603
+ }, ...{
4604
+ type: "aki" | "etsi_tl" | "openid_federation";
4605
+ values: [string, ...string[]];
4606
+ }[]] | undefined;
2940
4607
  meta?: {
2941
4608
  vct_values?: string[] | undefined;
2942
4609
  } | undefined;
@@ -2956,6 +4623,13 @@ declare namespace DcqlPresentationResult {
2956
4623
  id?: string | undefined;
2957
4624
  }[]] | undefined;
2958
4625
  claim_sets?: [[string, ...string[]], ...[string, ...string[]][]] | undefined;
4626
+ trusted_authorities?: [{
4627
+ type: "aki" | "etsi_tl" | "openid_federation";
4628
+ values: [string, ...string[]];
4629
+ }, ...{
4630
+ type: "aki" | "etsi_tl" | "openid_federation";
4631
+ values: [string, ...string[]];
4632
+ }[]] | undefined;
2959
4633
  })[]];
2960
4634
  canBeSatisfied: boolean;
2961
4635
  invalid_matches: {
@@ -2978,18 +4652,48 @@ declare namespace DcqlPresentationResult {
2978
4652
  [x: string]: unknown;
2979
4653
  };
2980
4654
  };
4655
+ authority?: {
4656
+ type: "aki";
4657
+ value: string;
4658
+ } | {
4659
+ type: "etsi_tl";
4660
+ value: string;
4661
+ } | {
4662
+ type: "openid_federation";
4663
+ value: string;
4664
+ } | undefined;
2981
4665
  } | {
2982
4666
  credential_format: "vc+sd-jwt" | "dc+sd-jwt";
2983
4667
  vct: string;
2984
4668
  claims: {
2985
4669
  [x: string]: Json;
2986
4670
  };
4671
+ authority?: {
4672
+ type: "aki";
4673
+ value: string;
4674
+ } | {
4675
+ type: "etsi_tl";
4676
+ value: string;
4677
+ } | {
4678
+ type: "openid_federation";
4679
+ value: string;
4680
+ } | undefined;
2987
4681
  } | {
2988
4682
  type: string[];
2989
4683
  credential_format: "ldp_vc" | "jwt_vc_json";
2990
4684
  claims: {
2991
4685
  [x: string]: Json;
2992
4686
  };
4687
+ authority?: {
4688
+ type: "aki";
4689
+ value: string;
4690
+ } | {
4691
+ type: "etsi_tl";
4692
+ value: string;
4693
+ } | {
4694
+ type: "openid_federation";
4695
+ value: string;
4696
+ } | undefined;
2993
4697
  };
2994
4698
  success: true;
2995
4699
  typed: true;
@@ -3092,6 +4796,37 @@ declare namespace DcqlClaimsQuery {
3092
4796
  }
3093
4797
  type DcqlClaimsQuery = DcqlClaimsQuery.Out;
3094
4798
 
4799
+ /**
4800
+ * Specifies trusted authorities within a requested Credential.
4801
+ */
4802
+ declare namespace DcqlTrustedAuthoritiesQuery {
4803
+ const vModel: v.VariantSchema<"type", v.ObjectSchema<{
4804
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
4805
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
4806
+ }, undefined>[], undefined>;
4807
+ type Input = v.InferInput<typeof vModel>;
4808
+ type Out = v.InferOutput<typeof vModel>;
4809
+ }
4810
+ type DcqlTrustedAuthoritiesQuery = DcqlTrustedAuthoritiesQuery.Out;
4811
+ /**
4812
+ * Specifies trusted authorities within a requested Credential.
4813
+ */
4814
+ declare namespace DcqlCredentialTrustedAuthority {
4815
+ const vModel: v.VariantSchema<"type", readonly [v.ObjectSchema<{
4816
+ readonly type: v.LiteralSchema<"aki", undefined>;
4817
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]>;
4818
+ }, undefined>, v.ObjectSchema<{
4819
+ readonly type: v.LiteralSchema<"etsi_tl", undefined>;
4820
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]>;
4821
+ }, undefined>, v.ObjectSchema<{
4822
+ readonly type: v.LiteralSchema<"openid_federation", undefined>;
4823
+ readonly value: v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>;
4824
+ }, undefined>], undefined>;
4825
+ type Input = v.InferInput<typeof vModel>;
4826
+ type Out = v.InferOutput<typeof vModel>;
4827
+ }
4828
+ type DcqlCredentialTrustedAuthority = DcqlCredentialTrustedAuthority.Out;
4829
+
3095
4830
  /**
3096
4831
  * A Credential Query is an object representing a request for a presentation of one Credential.
3097
4832
  */
@@ -3156,6 +4891,22 @@ declare namespace DcqlCredentialQuery {
3156
4891
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
3157
4892
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
3158
4893
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
4894
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
4895
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
4896
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
4897
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
4898
+ type: "aki" | "etsi_tl" | "openid_federation";
4899
+ values: [string, ...string[]];
4900
+ }, ...{
4901
+ type: "aki" | "etsi_tl" | "openid_federation";
4902
+ values: [string, ...string[]];
4903
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
4904
+ type: "aki" | "etsi_tl" | "openid_federation";
4905
+ values: [string, ...string[]];
4906
+ }, ...{
4907
+ type: "aki" | "etsi_tl" | "openid_federation";
4908
+ values: [string, ...string[]];
4909
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
3159
4910
  }, undefined>;
3160
4911
  type Mdoc = v.InferOutput<typeof vMdoc>;
3161
4912
  const vSdJwtVc: v.ObjectSchema<{
@@ -3190,6 +4941,22 @@ declare namespace DcqlCredentialQuery {
3190
4941
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
3191
4942
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
3192
4943
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
4944
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
4945
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
4946
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
4947
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
4948
+ type: "aki" | "etsi_tl" | "openid_federation";
4949
+ values: [string, ...string[]];
4950
+ }, ...{
4951
+ type: "aki" | "etsi_tl" | "openid_federation";
4952
+ values: [string, ...string[]];
4953
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
4954
+ type: "aki" | "etsi_tl" | "openid_federation";
4955
+ values: [string, ...string[]];
4956
+ }, ...{
4957
+ type: "aki" | "etsi_tl" | "openid_federation";
4958
+ values: [string, ...string[]];
4959
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
3193
4960
  }, undefined>;
3194
4961
  type SdJwtVc = v.InferOutput<typeof vSdJwtVc>;
3195
4962
  const vW3cVc: v.ObjectSchema<{
@@ -3214,6 +4981,22 @@ declare namespace DcqlCredentialQuery {
3214
4981
  }, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
3215
4982
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
3216
4983
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
4984
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
4985
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
4986
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
4987
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
4988
+ type: "aki" | "etsi_tl" | "openid_federation";
4989
+ values: [string, ...string[]];
4990
+ }, ...{
4991
+ type: "aki" | "etsi_tl" | "openid_federation";
4992
+ values: [string, ...string[]];
4993
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
4994
+ type: "aki" | "etsi_tl" | "openid_federation";
4995
+ values: [string, ...string[]];
4996
+ }, ...{
4997
+ type: "aki" | "etsi_tl" | "openid_federation";
4998
+ values: [string, ...string[]];
4999
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
3217
5000
  }, undefined>;
3218
5001
  type W3cVc = v.InferOutput<typeof vW3cVc>;
3219
5002
  const vModel: v.VariantSchema<"format", [v.ObjectSchema<{
@@ -3276,6 +5059,22 @@ declare namespace DcqlCredentialQuery {
3276
5059
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
3277
5060
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
3278
5061
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
5062
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
5063
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
5064
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
5065
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
5066
+ type: "aki" | "etsi_tl" | "openid_federation";
5067
+ values: [string, ...string[]];
5068
+ }, ...{
5069
+ type: "aki" | "etsi_tl" | "openid_federation";
5070
+ values: [string, ...string[]];
5071
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
5072
+ type: "aki" | "etsi_tl" | "openid_federation";
5073
+ values: [string, ...string[]];
5074
+ }, ...{
5075
+ type: "aki" | "etsi_tl" | "openid_federation";
5076
+ values: [string, ...string[]];
5077
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
3279
5078
  }, undefined>, v.ObjectSchema<{
3280
5079
  readonly format: v.SchemaWithPipe<[v.PicklistSchema<["vc+sd-jwt", "dc+sd-jwt"], undefined>, v.DescriptionAction<"vc+sd-jwt" | "dc+sd-jwt", "REQUIRED. A string that specifies the format of the requested Verifiable Credential.">]>;
3281
5080
  readonly claims: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
@@ -3308,6 +5107,22 @@ declare namespace DcqlCredentialQuery {
3308
5107
  } | undefined, "OPTIONAL. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
3309
5108
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
3310
5109
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
5110
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
5111
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
5112
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
5113
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
5114
+ type: "aki" | "etsi_tl" | "openid_federation";
5115
+ values: [string, ...string[]];
5116
+ }, ...{
5117
+ type: "aki" | "etsi_tl" | "openid_federation";
5118
+ values: [string, ...string[]];
5119
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
5120
+ type: "aki" | "etsi_tl" | "openid_federation";
5121
+ values: [string, ...string[]];
5122
+ }, ...{
5123
+ type: "aki" | "etsi_tl" | "openid_federation";
5124
+ values: [string, ...string[]];
5125
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
3311
5126
  }, undefined>, v.ObjectSchema<{
3312
5127
  readonly format: v.PicklistSchema<["jwt_vc_json", "ldp_vc"], undefined>;
3313
5128
  readonly claims: v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.ObjectSchema<{
@@ -3330,6 +5145,22 @@ declare namespace DcqlCredentialQuery {
3330
5145
  }, "REQUIRED. An object defining additional properties requested by the Verifier that apply to the metadata and validity data of the Credential.">]>;
3331
5146
  readonly id: v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.DescriptionAction<string, "REQUIRED. A string identifying the Credential in the response and, if provided, the constraints in 'credential_sets'.">]>;
3332
5147
  readonly claim_sets: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, undefined>, v.NonEmptyAction<string, undefined>]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>]>, undefined>, v.CustomSchema<[[string, ...string[]], ...[string, ...string[]][]], undefined>]>, undefined>, v.DescriptionAction<[[string, ...string[]], ...[string, ...string[]][]] | undefined, "OPTIONAL. A non-empty array containing arrays of identifiers for elements in 'claims' that specifies which combinations of 'claims' for the Credential are requested.">]>;
5148
+ readonly trusted_authorities: v.SchemaWithPipe<[v.OptionalSchema<v.SchemaWithPipe<[v.ArraySchema<v.VariantSchema<"type", v.ObjectSchema<{
5149
+ readonly type: v.SchemaWithPipe<[v.LiteralSchema<"aki", undefined> | v.LiteralSchema<"etsi_tl", undefined> | v.LiteralSchema<"openid_federation", undefined>, v.DescriptionAction<"aki" | "etsi_tl" | "openid_federation", "REQUIRED. A string uniquely identifying the type of information about the issuer trust framework.">]>;
5150
+ readonly values: v.SchemaWithPipe<[v.ArraySchema<v.SchemaWithPipe<[v.StringSchema<undefined>, v.RegexAction<string, "must be base64url">, v.DescriptionAction<string, "Contains the KeyIdentifier of the AuthorityKeyIdentifier as defined in Section 4.2.1.1 of [RFC5280], encoded as base64url. The raw byte representation of this element MUST match with the AuthorityKeyIdentifier element of an X.509 certificate in the certificate chain present in the credential (e.g., in the header of an mdoc or SD-JWT). Note that the chain can consist of a single certificate and the credential can include the entire X.509 chain or parts of it.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "etsi_tl trusted authority value must be a valid https url">, v.DescriptionAction<string, "The identifier of a Trusted List as specified in ETSI TS 119 612 [ETSI.TL]. An ETSI Trusted List contains references to other Trusted Lists, creating a list of trusted lists, or entries for Trust Service Providers with corresponding service description and X.509 Certificates. The trust chain of a matching Credential MUST contain at least one X.509 Certificate that matches one of the entries of the Trusted List or its cascading Trusted Lists.">]> | v.SchemaWithPipe<[v.StringSchema<undefined>, v.UrlAction<string, undefined>, v.CheckAction<string, "openid_federation trusted authority value must be a valid https url">, v.DescriptionAction<string, "The Entity Identifier as defined in Section 1 of [OpenID.Federation] that is bound to an entity in a federation. While this Entity Identifier could be any entity in that ecosystem, this entity would usually have the Entity Configuration of a Trust Anchor. A valid trust path, including the given Entity Identifier, must be constructible from a matching credential.">]>, undefined>, v.CustomSchema<[string, ...string[]], undefined>, v.DescriptionAction<[string, ...string[]], "REQUIRED. An array of strings, where each string (value) contains information specific to the used Trusted Authorities Query type that allows to identify an issuer, trust framework, or a federation that an issuer belongs to.">]>;
5151
+ }, undefined>[], undefined>, undefined>, v.CustomSchema<[{
5152
+ type: "aki" | "etsi_tl" | "openid_federation";
5153
+ values: [string, ...string[]];
5154
+ }, ...{
5155
+ type: "aki" | "etsi_tl" | "openid_federation";
5156
+ values: [string, ...string[]];
5157
+ }[]], undefined>]>, undefined>, v.DescriptionAction<[{
5158
+ type: "aki" | "etsi_tl" | "openid_federation";
5159
+ values: [string, ...string[]];
5160
+ }, ...{
5161
+ type: "aki" | "etsi_tl" | "openid_federation";
5162
+ values: [string, ...string[]];
5163
+ }[]] | undefined, "OPTIONAL. A non-empty array of objects as defined in Section 6.1.1 that specifies expected authorities or trust frameworks that certify Issuers, that the Verifier will accept. Every Credential returned by the Wallet SHOULD match at least one of the conditions present in the corresponding trusted_authorities array if present.">]>;
3333
5164
  }, undefined>], undefined>;
3334
5165
  type Input = v.InferInput<typeof vModel>;
3335
5166
  type Output = v.InferOutput<typeof vModel>;
@@ -3354,4 +5185,4 @@ declare namespace CredentialSetQuery {
3354
5185
  }
3355
5186
  type CredentialSetQuery = CredentialSetQuery.Output;
3356
5187
 
3357
- export { CredentialSetQuery, DcqlClaimsQuery, DcqlCredential, DcqlCredentialPresentation, DcqlCredentialQuery, DcqlCredentialSetError, DcqlError, DcqlInvalidClaimsQueryIdError, DcqlInvalidPresentationRecordError, DcqlMdocCredential, DcqlMdocPresentation, DcqlMissingClaimSetParseError, DcqlNonUniqueCredentialQueryIdsError, DcqlParseError, DcqlPresentation, DcqlPresentationResult, DcqlPresentationResultError, DcqlQuery, DcqlQueryResult, DcqlSdJwtVcCredential, DcqlSdJwtVcPresentation, DcqlUndefinedClaimSetIdError, DcqlW3cVcCredential, DcqlW3cVcPresentation, getCauseFromUnknown, getDcqlErrorFromUnknown, runDcqlQuery };
5188
+ export { CredentialSetQuery, DcqlClaimsQuery, DcqlCredential, DcqlCredentialPresentation, DcqlCredentialQuery, DcqlCredentialSetError, DcqlCredentialTrustedAuthority, DcqlError, DcqlInvalidClaimsQueryIdError, DcqlInvalidPresentationRecordError, DcqlMdocCredential, DcqlMdocPresentation, DcqlMissingClaimSetParseError, DcqlNonUniqueCredentialQueryIdsError, DcqlParseError, DcqlPresentation, DcqlPresentationResult, DcqlPresentationResultError, DcqlQuery, DcqlQueryResult, DcqlSdJwtVcCredential, DcqlSdJwtVcPresentation, DcqlTrustedAuthoritiesQuery, DcqlUndefinedClaimSetIdError, DcqlW3cVcCredential, DcqlW3cVcPresentation, getCauseFromUnknown, getDcqlErrorFromUnknown, runDcqlQuery };