Replies: 1 comment 4 replies
-
Excellent questions, kudos for sharing the details upfront! In your first setup, you need to pass the JWT as the raw message to ``handleMessage, like so: const handledMessage = await agent.handleMessage({
raw: verifiableCredential.proof.jwt
}) In your second setup, you need an extra crypto suite that can work with You can add it to your setup like so: new CredentialIssuerLD({
contextMaps: [LdDefaultContexts, extraContexts],
suites: [
new VeramoEd25519Signature2018(),
new VeramoEcdsaSecp256k1RecoverySignature2020()
]
}) Alternatively, you could call Also, you can use the same verification API to verify JWT credentials as well as JSON-LD. We know that calling That being said, the new verification API that you are using is now being developed, and feedback is very welcome. |
Beta Was this translation helpful? Give feedback.
-
Hello,
I am trying to verify some VCs but I ran into some issues. This is clearly user-error but I don't know what I'm doing wrong (at least for the JWT).
Creating and verifying a JWT VC:
I'm guessing I am not calling the handleMessage function correctly. I tried other methods,
using raw, type etc. but couldn't make it work.
My agent is setup as such:
This returns : Unsupported message type in the console.
As for the JSON-LD, I ran into another issue. I get the following message: Error: key_not_found: No suitable signing key found for did:ethr....
I read up on signing keys on the did:ethr registry but I thought that a generated key pair would have signed keys. Do I need to add an option when creating the did?
here is the agent setup:
the function:
Beta Was this translation helpful? Give feedback.
All reactions