Skip to content

Commit dcef50e

Browse files
committed
Remove jwk hash from session_info
1 parent a01f090 commit dcef50e

File tree

1 file changed

+10
-17
lines changed

1 file changed

+10
-17
lines changed

1.1/openid-4-verifiable-presentations-1_1.md

Lines changed: 10 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1426,14 +1426,12 @@ When the response mode is `direct_post.jwt` the encoding is as follows:
14261426

14271427
```example
14281428
session_info = ASCII("OpenID4VP si") ||
1429-
BYTE(255) ||
1430-
ASCII(clientId) ||
1431-
BYTE(255) ||
1432-
ASCII(nonce) ||
1433-
BYTE(255) ||
1434-
BYTE(jwkThumbprint) ||
1435-
BYTE(255) ||
1436-
ASCII(responseUri)
1429+
BYTE(255) ||
1430+
ASCII(clientId) ||
1431+
BYTE(255) ||
1432+
ASCII(nonce) ||
1433+
BYTE(255) ||
1434+
ASCII(responseUri)
14371435
```
14381436

14391437
Where:
@@ -1442,19 +1440,18 @@ Where:
14421440
- BYTE(255): In each occurence is a separator byte (0xFF) used to delimit fields.
14431441
- ASCII(clientId): The `client_id` request parameter. If applicable, this includes the Client Identifier Prefix.
14441442
- ASCII(nonce): The `nonce` request parameter.
1445-
- Byte(jwkThumbprint): The `JWK SHA-256 Thumbprint as defined in [RFC7638], encoded as a Byte, of the Verifier's public key used to encrypt the response.
14461443
- ASCII(responseUri): The `redirect_uri` or `response_uri` request parameter, depending on which is present, as determined by the Response Mode.
14471444

14481445
The following is a non-normative example of the `session_info` structure for `direct_post.jwt` response mode:
14491446

14501447
```example
1451-
"OpenID4VP si\xffx509_san_dns:example.com\xffexc7gBkxjx1rdc9udRrveKvSsJIq80avlXeLHhGwqtA\xffB\x83ì\x92zàò\x08Úª-\x02j\x81O+"Ü¥,ø_ú\x8f?\x86&ƽf\x90G\xffhttps://example.com/response"
1448+
"OpenID4VP si\xffx509_san_dns:example.com\xffexc7gBkxjx1rdc9udRrveKvSsJIq80avlXeLHhGwqtA\xffhttps://example.com/response"
14521449
```
14531450

14541451
The corresponding hexadecimal representation is:
14551452

14561453
```
1457-
4f70656e4944345650207369ff783530395f73616e5f646e733a6578616d706c652e636f6dff6578633767426b786a7831726463397564527276654b7653734a4971383061766c58654c48684777717441ff4283ec927ae0f208daaa2d026a814f2b22dca52cf85ffa8f3f8626c6bd669047ff68747470733a2f2f6578616d706c652e636f6d2f726573706f6e7365
1454+
4f70656e4944345650207369ff783530395f73616e5f646e733a6578616d706c652e636f6dff6578633767426b786a7831726463397564527276654b7653734a4971383061766c58654c48684777717441ff68747470733a2f2f6578616d706c652e636f6d2f726573706f6e7365
14581455
```
14591456

14601457
When the response mode is `dc_api.jwt` the encoding is as follows:
@@ -1465,9 +1462,6 @@ When the response mode is `dc_api.jwt` the encoding is as follows:
14651462
ASCII(origin) ||
14661463
BYTE(255) ||
14671464
ASCII(nonce) ||
1468-
BYTE(255) ||
1469-
BYTE(jwkThumbprint) ||
1470-
14711465
```
14721466

14731467
Where:
@@ -1476,18 +1470,17 @@ Where:
14761470
- BYTE(255): In each occurence is a separator byte (0xFF) used to delimit fields.
14771471
- ASCII(origin): The ASCII string representing the Origin of the request as described in (#dc_api_request). It MUST NOT be prefixed with origin:.
14781472
- ASCII(nonce): The `nonce` request parameter.
1479-
- Byte(jwkThumbprint): The `JWK SHA-256 Thumbprint as defined in [RFC7638], encoded as a Byte, of the Verifier's public key used to encrypt the response.
14801473

14811474
The following is a non-normative example of the `session_info` structure for `dc_api.jwt` response mode:
14821475

14831476
```example
1484-
"OpenID4VPDCAPI si\xffhttps://example.com\xffexc7gBkxjx1rdc9udRrveKvSsJIq80avlXeLHhGwqtA\xffB\x83ì\x92zàò\x08Úª-\x02j\x81O+"Ü¥,ø_ú\x8f?\x86&ƽf\x90G"
1477+
"OpenID4VPDCAPI si\xffhttps://example.com\xffexc7gBkxjx1rdc9udRrveKvSsJIq80avlXeLHhGwqtA"
14851478
```
14861479

14871480
The corresponding hexadecimal representation is:
14881481

14891482
```
1490-
4f70656e49443456504443415049207369ff68747470733a2f2f6578616d706c652e636f6dff6578633767426b786a7831726463397564527276654b7653734a4971383061766c58654c48684777717441ff4283ec927ae0f208daaa2d026a814f2b22dca52cf85ffa8f3f8626c6bd669047
1483+
4f70656e49443456504443415049207369ff68747470733a2f2f6578616d706c652e636f6dff6578633767426b786a7831726463397564527276654b7653734a4971383061766c58654c48684777717441
14911484
```
14921485

14931486
The `session_info` structure's bytes are used as the value of the `info` parameter when using Integrated Encryption as the Key Management Mode. If the `recipient_structure` is being used then it is used as the value of the `recipient_extra_info` parameter instead.

0 commit comments

Comments
 (0)