From d78af16ce4439a313ceff31593013a1a35fd428e Mon Sep 17 00:00:00 2001
From: Enrico Marconi A span of time. An implementor of An implementor of IJwsVerifier
that can handle the
+EcDSA
algorithm.IJwsVerifier
that can handle the
EdDSA
algorithm.
Controls validation behaviour when checking whether or not a credential has been revoked by its
-credentialStatus
.
Validate the status if supported, reject any unsupported
-credentialStatus
types.
Only RevocationBitmap2022
is currently supported.
This is the default.
-Validate the status if supported, skip any unsupported
-credentialStatus
types.
Skip all status checks.
+Purpose of a StatusList2021.
Declares how credential subjects must relate to the presentation holder.
See also the Subject-Holder Relationship section of the specification.
@@ -291,13 +273,20 @@ This variant is the default.The holder is not required to have any kind of relationship to any credential subject.
Purpose of a StatusList2021.
-Declares when validation should return if an error occurs.
Return after the first error occurs.
Controls validation behaviour when checking whether or not a credential has been revoked by its
credentialStatus
.
This function does not check whether alg = EdDSA
in the protected header. Callers are expected to assert this
prior to calling the function.
Initializes the console error panic hook for better error messages
-string
Encode the given bytes in url-safe base64.
any
|
+
+
+## EcDSAJwsVerifier
+An implementor of `IJwsVerifier` that can handle the
+`EcDSA` algorithm.
+
+**Kind**: global class
+
+* [EcDSAJwsVerifier](#EcDSAJwsVerifier)
+ * [new EcDSAJwsVerifier()](#new_EcDSAJwsVerifier_new)
+ * [.verify(alg, signingInput, decodedSignature, publicKey)](#EcDSAJwsVerifier+verify)
+
+
+
+### new EcDSAJwsVerifier()
+Constructs an EcDSAJwsVerifier.
+
+
+
+### ecDSAJwsVerifier.verify(alg, signingInput, decodedSignature, publicKey)
+Verify a JWS signature secured with the `EcDSA` algorithm.
+Only the `ES256` and `ES256K` curves are supported for now.
+
+# Warning
+
+This function does not check the `alg` property in the protected header. Callers are expected to assert this
+prior to calling the function.
+
+**Kind**: instance method of [EcDSAJwsVerifier
](#EcDSAJwsVerifier)
+
+| Param | Type |
+| --- | --- |
+| alg | JwsAlgorithm
|
+| signingInput | Uint8Array
|
+| decodedSignature | Uint8Array
|
+| publicKey | [Jwk
](#Jwk) |
+
## EdDSAJwsVerifier
@@ -3224,7 +3241,7 @@ Utility functions for validating JPT credentials.
### JptCredentialValidatorUtils.extractIssuer(credential) ⇒ [CoreDID
](#CoreDID)
-Utility for extracting the issuer field of a [`Credential`](`Credential`) as a DID.
+Utility for extracting the issuer field of a [Credential](#Credential) as a DID.
# Errors
Fails if the issuer field is not a valid DID.
@@ -5450,7 +5467,8 @@ Supported verification method types.
* _static_
* [.Ed25519VerificationKey2018()](#MethodType.Ed25519VerificationKey2018) ⇒ [MethodType
](#MethodType)
* [.X25519KeyAgreementKey2019()](#MethodType.X25519KeyAgreementKey2019) ⇒ [MethodType
](#MethodType)
- * [.JsonWebKey()](#MethodType.JsonWebKey) ⇒ [MethodType
](#MethodType)
+ * ~~[.JsonWebKey()](#MethodType.JsonWebKey)~~
+ * [.JsonWebKey2020()](#MethodType.JsonWebKey2020) ⇒ [MethodType
](#MethodType)
* [.custom(type_)](#MethodType.custom) ⇒ [MethodType
](#MethodType)
* [.fromJSON(json)](#MethodType.fromJSON) ⇒ [MethodType
](#MethodType)
@@ -5482,7 +5500,13 @@ Deep clones the object.
**Kind**: static method of [MethodType
](#MethodType)
-### MethodType.JsonWebKey() ⇒ [MethodType
](#MethodType)
+### ~~MethodType.JsonWebKey()~~
+***Deprecated***
+
+**Kind**: static method of [MethodType
](#MethodType)
+
+
+### MethodType.JsonWebKey2020() ⇒ [MethodType
](#MethodType)
A verification method for use with JWT verification as prescribed by the [Jwk](#Jwk)
in the `publicKeyJwk` entry.
@@ -7529,46 +7553,11 @@ Deserializes an instance from a JSON object.
| --- | --- |
| json | any
|
+
-**Kind**: global variable
-
-
-## StatusCheck
-Controls validation behaviour when checking whether or not a credential has been revoked by its
-[`credentialStatus`](https://www.w3.org/TR/vc-data-model/#status).
+## StatusPurpose
+Purpose of a [StatusList2021](#StatusList2021).
-**Kind**: global variable
-
-
-## Strict
-Validate the status if supported, reject any unsupported
-[`credentialStatus`](https://www.w3.org/TR/vc-data-model/#status) types.
-
-Only `RevocationBitmap2022` is currently supported.
-
-This is the default.
-
-**Kind**: global variable
-
-
-## SkipUnsupported
-Validate the status if supported, skip any unsupported
-[`credentialStatus`](https://www.w3.org/TR/vc-data-model/#status) types.
-
-**Kind**: global variable
-
-
-## SkipAll
-Skip all status checks.
-
-**Kind**: global variable
-
-
-## SerializationType
-**Kind**: global variable
-
-
-## MethodRelationship
**Kind**: global variable
@@ -7596,12 +7585,35 @@ The holder must match the subject only for credentials where the [`nonTransferab
## Any
The holder is not required to have any kind of relationship to any credential subject.
-## StateMetadataEncoding
+**Kind**: global variable
+
+
+## ProofAlgorithm
**Kind**: global variable
## StateMetadataEncoding
**Kind**: global variable
+
+
+## CredentialStatus
+**Kind**: global variable
+
+
+## PayloadType
+**Kind**: global variable
+
+
+## PresentationProofAlgorithm
+**Kind**: global variable
+
+
+## MethodRelationship
+**Kind**: global variable
+
+
+## SerializationType
+**Kind**: global variable
## FailFast
@@ -7620,6 +7632,35 @@ Return all errors that occur during validation.
Return after the first error occurs.
**Kind**: global variable
+
+
+## StatusCheck
+Controls validation behaviour when checking whether or not a credential has been revoked by its
+[`credentialStatus`](https://www.w3.org/TR/vc-data-model/#status).
+
+**Kind**: global variable
+
+
+## Strict
+Validate the status if supported, reject any unsupported
+[`credentialStatus`](https://www.w3.org/TR/vc-data-model/#status) types.
+
+Only `RevocationBitmap2022` is currently supported.
+
+This is the default.
+
+**Kind**: global variable
+
+
+## SkipUnsupported
+Validate the status if supported, skip any unsupported
+[`credentialStatus`](https://www.w3.org/TR/vc-data-model/#status) types.
+
+**Kind**: global variable
+
+
+## SkipAll
+Skip all status checks.
**Kind**: global variable
@@ -7644,12 +7685,6 @@ prior to calling the function.
| decodedSignature | Uint8Array
|
| publicKey | [Jwk
](#Jwk) |
-
-
-## start()
-Initializes the console error panic hook for better error messages
-
-**Kind**: global function
## encodeB64(data) ⇒ string
diff --git a/bindings/wasm/src/verification/jws_verifier.rs b/bindings/wasm/src/verification/jws_verifier.rs
index 6113674828..d7c4e4368d 100644
--- a/bindings/wasm/src/verification/jws_verifier.rs
+++ b/bindings/wasm/src/verification/jws_verifier.rs
@@ -3,6 +3,7 @@
use identity_eddsa_verifier::Ed25519Verifier;
use identity_eddsa_verifier::EdDSAJwsVerifier;
+use identity_ecdsa_verifier::EcDSAJwsVerifier;
use identity_iota::verification::jws::JwsAlgorithm;
use identity_iota::verification::jws::JwsVerifier;
use identity_iota::verification::jws::VerificationInput;
@@ -80,3 +81,44 @@ impl WasmEdDSAJwsVerifier {
EdDSAJwsVerifier::default().verify(input, &publicKey.0).wasm_result()
}
}
+
+/// An implementor of `IJwsVerifier` that can handle the
+/// `EcDSA` algorithm.
+#[wasm_bindgen(js_name = EcDSAJwsVerifier)]
+pub struct WasmEcDSAJwsVerifier();
+
+#[wasm_bindgen(js_class = EcDSAJwsVerifier)]
+#[allow(clippy::new_without_default)]
+impl WasmEcDSAJwsVerifier {
+ /// Constructs an EcDSAJwsVerifier.
+ #[wasm_bindgen(constructor)]
+ pub fn new() -> Self {
+ Self()
+ }
+
+ /// Verify a JWS signature secured with the `EcDSA` algorithm.
+ /// Only the `ES256` and `ES256K` curves are supported for now.
+ ///
+ /// # Warning
+ ///
+ /// This function does not check the `alg` property in the protected header. Callers are expected to assert this
+ /// prior to calling the function.
+ #[wasm_bindgen]
+ #[allow(non_snake_case)]
+ pub fn verify(
+ &self,
+ alg: WasmJwsAlgorithm,
+ signingInput: &[u8],
+ decodedSignature: &[u8],
+ publicKey: &WasmJwk,
+ ) -> Result<(), JsValue> {
+ let alg: JwsAlgorithm = JwsAlgorithm::try_from(alg)?;
+ let input: VerificationInput = VerificationInput {
+ alg,
+ signing_input: signingInput.into(),
+ decoded_signature: decodedSignature.into(),
+ };
+ EcDSAJwsVerifier::default().verify(input, &publicKey.0).wasm_result()
+ }
+}
+
From a56d5a258d6f08e0f7bb1b840e4ba8c9a51d9e47 Mon Sep 17 00:00:00 2001
From: Enrico Marconi Purpose of a StatusList2021.
+Controls validation behaviour when checking whether or not a credential has been revoked by its
+credentialStatus
.
Validate the status if supported, reject any unsupported
+credentialStatus
types.
Only RevocationBitmap2022
is currently supported.
This is the default.
+Validate the status if supported, skip any unsupported
+credentialStatus
types.
Skip all status checks.
Declares how credential subjects must relate to the presentation holder.
@@ -273,19 +287,14 @@ This variant is the default.The holder is not required to have any kind of relationship to any credential subject.
Purpose of a StatusList2021.
+Declares when validation should return if an error occurs.
@@ -296,23 +305,14 @@ This variant is the default.Return after the first error occurs.
Controls validation behaviour when checking whether or not a credential has been revoked by its
-credentialStatus
.
Validate the status if supported, reject any unsupported
-credentialStatus
types.
Only RevocationBitmap2022
is currently supported.
This is the default.
-Validate the status if supported, skip any unsupported
-credentialStatus
types.
Skip all status checks.
-This function does not check whether alg = EdDSA
in the protected header. Callers are expected to assert this
prior to calling the function.
Initializes the console error panic hook for better error messages
+string
Encode the given bytes in url-safe base64.
Uint8Array
Decode the given url-safe base64-encoded slice into its raw bytes.
Initializes the console error panic hook for better error messages
-VerificationMethod
](#VerificationMethod) \| undefined
* [.attachMethodRelationship(didUrl, relationship)](#CoreDocument+attachMethodRelationship) ⇒ boolean
* [.detachMethodRelationship(didUrl, relationship)](#CoreDocument+detachMethodRelationship) ⇒ boolean
- * [.verifyJws(jws, options, signatureVerifier, [detachedPayload])](#CoreDocument+verifyJws) ⇒ [DecodedJws
](#DecodedJws)
+ * [.verifyJws(jws, options, [signatureVerifier], [detachedPayload])](#CoreDocument+verifyJws) ⇒ [DecodedJws
](#DecodedJws)
* [.revokeCredentials(serviceQuery, indices)](#CoreDocument+revokeCredentials)
* [.unrevokeCredentials(serviceQuery, indices)](#CoreDocument+unrevokeCredentials)
* [.clone()](#CoreDocument+clone) ⇒ [CoreDocument
](#CoreDocument)
@@ -832,7 +832,7 @@ Detaches the given relationship from the given method, if the method exists.
-### coreDocument.verifyJws(jws, options, signatureVerifier, [detachedPayload]) ⇒ [DecodedJws
](#DecodedJws)
+### coreDocument.verifyJws(jws, options, [signatureVerifier], [detachedPayload]) ⇒ [DecodedJws
](#DecodedJws)
Decodes and verifies the provided JWS according to the passed `options` and `signatureVerifier`.
If no `signatureVerifier` argument is provided a default verifier will be used that is (only) capable of
verifying EdDSA signatures.
@@ -849,7 +849,7 @@ or set explicitly in the `options`.
| --- | --- |
| jws | [Jws
](#Jws) |
| options | [JwsVerificationOptions
](#JwsVerificationOptions) |
-| signatureVerifier | IJwsVerifier
|
+| [signatureVerifier] | IJwsVerifier
\| undefined
|
| [detachedPayload] | string
\| undefined
|
@@ -2211,7 +2211,7 @@ if the object is being concurrently modified.
* [.resolveMethod(query, [scope])](#IotaDocument+resolveMethod) ⇒ [VerificationMethod
](#VerificationMethod) \| undefined
* [.attachMethodRelationship(didUrl, relationship)](#IotaDocument+attachMethodRelationship) ⇒ boolean
* [.detachMethodRelationship(didUrl, relationship)](#IotaDocument+detachMethodRelationship) ⇒ boolean
- * [.verifyJws(jws, options, signatureVerifier, [detachedPayload])](#IotaDocument+verifyJws) ⇒ [DecodedJws
](#DecodedJws)
+ * [.verifyJws(jws, options, [signatureVerifier], [detachedPayload])](#IotaDocument+verifyJws) ⇒ [DecodedJws
](#DecodedJws)
* [.pack()](#IotaDocument+pack) ⇒ Uint8Array
* [.packWithEncoding(encoding)](#IotaDocument+packWithEncoding) ⇒ Uint8Array
* [.metadata()](#IotaDocument+metadata) ⇒ [IotaDocumentMetadata
](#IotaDocumentMetadata)
@@ -2452,7 +2452,7 @@ Detaches the given relationship from the given method, if the method exists.
-### iotaDocument.verifyJws(jws, options, signatureVerifier, [detachedPayload]) ⇒ [DecodedJws
](#DecodedJws)
+### iotaDocument.verifyJws(jws, options, [signatureVerifier], [detachedPayload]) ⇒ [DecodedJws
](#DecodedJws)
Decodes and verifies the provided JWS according to the passed `options` and `signatureVerifier`.
If no `signatureVerifier` argument is provided a default verifier will be used that is (only) capable of
verifying EdDSA signatures.
@@ -2468,7 +2468,7 @@ take place.
| --- | --- |
| jws | [Jws
](#Jws) |
| options | [JwsVerificationOptions
](#JwsVerificationOptions) |
-| signatureVerifier | IJwsVerifier
|
+| [signatureVerifier] | IJwsVerifier
\| undefined
|
| [detachedPayload] | string
\| undefined
|
@@ -4549,7 +4549,7 @@ A type for decoding and validating [Credential](#Credential).
**Kind**: global class
* [JwtCredentialValidator](#JwtCredentialValidator)
- * [new JwtCredentialValidator(signatureVerifier)](#new_JwtCredentialValidator_new)
+ * [new JwtCredentialValidator([signatureVerifier])](#new_JwtCredentialValidator_new)
* _instance_
* [.validate(credential_jwt, issuer, options, fail_fast)](#JwtCredentialValidator+validate) ⇒ [DecodedJwtCredential
](#DecodedJwtCredential)
* [.verifySignature(credential, trustedIssuers, options)](#JwtCredentialValidator+verifySignature) ⇒ [DecodedJwtCredential
](#DecodedJwtCredential)
@@ -4564,7 +4564,7 @@ A type for decoding and validating [Credential](#Credential).
-### new JwtCredentialValidator(signatureVerifier)
+### new JwtCredentialValidator([signatureVerifier])
Creates a new [JwtCredentialValidator](#JwtCredentialValidator). If a `signatureVerifier` is provided it will be used when
verifying decoded JWS signatures, otherwise the default which is only capable of handling the `EdDSA`
algorithm will be used.
@@ -4572,7 +4572,7 @@ algorithm will be used.
| Param | Type |
| --- | --- |
-| signatureVerifier | IJwsVerifier
|
+| [signatureVerifier] | IJwsVerifier
\| undefined
|
@@ -4743,21 +4743,21 @@ A validator for a Domain Linkage Configuration and Credentials.
**Kind**: global class
* [JwtDomainLinkageValidator](#JwtDomainLinkageValidator)
- * [new JwtDomainLinkageValidator(signatureVerifier)](#new_JwtDomainLinkageValidator_new)
+ * [new JwtDomainLinkageValidator([signatureVerifier])](#new_JwtDomainLinkageValidator_new)
* [.validateLinkage(issuer, configuration, domain, options)](#JwtDomainLinkageValidator+validateLinkage)
* [.validateCredential(issuer, credentialJwt, domain, options)](#JwtDomainLinkageValidator+validateCredential)
-### new JwtDomainLinkageValidator(signatureVerifier)
+### new JwtDomainLinkageValidator([signatureVerifier])
Creates a new [JwtDomainLinkageValidator](#JwtDomainLinkageValidator). If a `signatureVerifier` is provided it will be used when
-verifying decoded JWS signatures, otherwise the default which is only capable of handling the `EdDSA`
-algorithm will be used.
+verifying decoded JWS signatures, otherwise the default which is capable of handling the `EdDSA`, `ES256`, `ES256K`
+algorithms will be used.
| Param | Type |
| --- | --- |
-| signatureVerifier | IJwsVerifier
|
+| [signatureVerifier] | IJwsVerifier
\| undefined
|
@@ -4907,7 +4907,7 @@ Deserializes an instance from a JSON object.
**Kind**: global class
* [JwtPresentationValidator](#JwtPresentationValidator)
- * [new JwtPresentationValidator(signatureVerifier)](#new_JwtPresentationValidator_new)
+ * [new JwtPresentationValidator([signatureVerifier])](#new_JwtPresentationValidator_new)
* _instance_
* [.validate(presentationJwt, holder, validation_options)](#JwtPresentationValidator+validate) ⇒ [DecodedJwtPresentation
](#DecodedJwtPresentation)
* _static_
@@ -4916,7 +4916,7 @@ Deserializes an instance from a JSON object.
-### new JwtPresentationValidator(signatureVerifier)
+### new JwtPresentationValidator([signatureVerifier])
Creates a new [JwtPresentationValidator](#JwtPresentationValidator). If a `signatureVerifier` is provided it will be used when
verifying decoded JWS signatures, otherwise the default which is only capable of handling the `EdDSA`
algorithm will be used.
@@ -4924,7 +4924,7 @@ algorithm will be used.
| Param | Type |
| --- | --- |
-| signatureVerifier | IJwsVerifier
|
+| [signatureVerifier] | IJwsVerifier
\| undefined
|
@@ -6432,14 +6432,14 @@ A type for decoding and validating [Credential](#Credential).
**Kind**: global class
* [SdJwtCredentialValidator](#SdJwtCredentialValidator)
- * [new SdJwtCredentialValidator(signatureVerifier)](#new_SdJwtCredentialValidator_new)
+ * [new SdJwtCredentialValidator([signatureVerifier])](#new_SdJwtCredentialValidator_new)
* [.validateCredential(sd_jwt, issuer, options, fail_fast)](#SdJwtCredentialValidator+validateCredential) ⇒ [DecodedJwtCredential
](#DecodedJwtCredential)
* [.verifySignature(credential, trustedIssuers, options)](#SdJwtCredentialValidator+verifySignature) ⇒ [DecodedJwtCredential
](#DecodedJwtCredential)
* [.validateKeyBindingJwt(sdJwt, holder, options)](#SdJwtCredentialValidator+validateKeyBindingJwt) ⇒ [KeyBindingJwtClaims
](#KeyBindingJwtClaims)
-### new SdJwtCredentialValidator(signatureVerifier)
+### new SdJwtCredentialValidator([signatureVerifier])
Creates a new `SdJwtCredentialValidator`. If a `signatureVerifier` is provided it will be used when
verifying decoded JWS signatures, otherwise the default which is only capable of handling the `EdDSA`
algorithm will be used.
@@ -6447,7 +6447,7 @@ algorithm will be used.
| Param | Type |
| --- | --- |
-| signatureVerifier | IJwsVerifier
|
+| [signatureVerifier] | IJwsVerifier
\| undefined
|
@@ -7553,10 +7553,35 @@ Deserializes an instance from a JSON object.
| --- | --- |
| json | any
|
-
+
-## StatusPurpose
-Purpose of a [StatusList2021](#StatusList2021).
+## StatusCheck
+Controls validation behaviour when checking whether or not a credential has been revoked by its
+[`credentialStatus`](https://www.w3.org/TR/vc-data-model/#status).
+
+**Kind**: global variable
+
+
+## Strict
+Validate the status if supported, reject any unsupported
+[`credentialStatus`](https://www.w3.org/TR/vc-data-model/#status) types.
+
+Only `RevocationBitmap2022` is currently supported.
+
+This is the default.
+
+**Kind**: global variable
+
+
+## SkipUnsupported
+Validate the status if supported, skip any unsupported
+[`credentialStatus`](https://www.w3.org/TR/vc-data-model/#status) types.
+
+**Kind**: global variable
+
+
+## SkipAll
+Skip all status checks.
**Kind**: global variable
@@ -7586,33 +7611,23 @@ The holder must match the subject only for credentials where the [`nonTransferab
The holder is not required to have any kind of relationship to any credential subject.
**Kind**: global variable
-
-
-## ProofAlgorithm
-**Kind**: global variable
-
-
-## StateMetadataEncoding
-**Kind**: global variable
-
+
-## CredentialStatus
+## PresentationProofAlgorithm
**Kind**: global variable
-
+
-## PayloadType
-**Kind**: global variable
-
+## StatusPurpose
+Purpose of a [StatusList2021](#StatusList2021).
-## PresentationProofAlgorithm
**Kind**: global variable
-
+
-## MethodRelationship
+## ProofAlgorithm
**Kind**: global variable
-
+
-## SerializationType
+## CredentialStatus
**Kind**: global variable
@@ -7632,36 +7647,21 @@ Return all errors that occur during validation.
Return after the first error occurs.
**Kind**: global variable
-
-
-## StatusCheck
-Controls validation behaviour when checking whether or not a credential has been revoked by its
-[`credentialStatus`](https://www.w3.org/TR/vc-data-model/#status).
+
+## StateMetadataEncoding
**Kind**: global variable
-
-
-## Strict
-Validate the status if supported, reject any unsupported
-[`credentialStatus`](https://www.w3.org/TR/vc-data-model/#status) types.
-
-Only `RevocationBitmap2022` is currently supported.
-
-This is the default.
+
+## SerializationType
**Kind**: global variable
-
-
-## SkipUnsupported
-Validate the status if supported, skip any unsupported
-[`credentialStatus`](https://www.w3.org/TR/vc-data-model/#status) types.
+
+## PayloadType
**Kind**: global variable
-
-
-## SkipAll
-Skip all status checks.
+
+## MethodRelationship
**Kind**: global variable
@@ -7685,6 +7685,12 @@ prior to calling the function.
| decodedSignature | Uint8Array
|
| publicKey | [Jwk
](#Jwk) |
+
+
+## start()
+Initializes the console error panic hook for better error messages
+
+**Kind**: global function
## encodeB64(data) ⇒ string
@@ -7707,9 +7713,3 @@ Decode the given url-safe base64-encoded slice into its raw bytes.
| --- | --- |
| data | Uint8Array
|
-
-
-## start()
-Initializes the console error panic hook for better error messages
-
-**Kind**: global function
diff --git a/bindings/wasm/src/credential/domain_linkage_validator.rs b/bindings/wasm/src/credential/domain_linkage_validator.rs
index a71da00675..37674e21b7 100644
--- a/bindings/wasm/src/credential/domain_linkage_validator.rs
+++ b/bindings/wasm/src/credential/domain_linkage_validator.rs
@@ -24,7 +24,7 @@ pub struct WasmJwtDomainLinkageValidator {
#[wasm_bindgen(js_class = JwtDomainLinkageValidator)]
impl WasmJwtDomainLinkageValidator {
/// Creates a new {@link JwtDomainLinkageValidator}. If a `signatureVerifier` is provided it will be used when
- /// verifying decoded JWS signatures, otherwise the default which is capable of handling the `EdDSA`, `ES256`, `ES256K`
+ /// verifying decoded JWS signatures, otherwise a default verifier capable of handling the `EdDSA`, `ES256`, `ES256K`
/// algorithms will be used.
#[wasm_bindgen(constructor)]
#[allow(non_snake_case)]
diff --git a/bindings/wasm/src/credential/jwt_credential_validation/jwt_credential_validator.rs b/bindings/wasm/src/credential/jwt_credential_validation/jwt_credential_validator.rs
index ed45f4d683..b6a26c35d5 100644
--- a/bindings/wasm/src/credential/jwt_credential_validation/jwt_credential_validator.rs
+++ b/bindings/wasm/src/credential/jwt_credential_validation/jwt_credential_validator.rs
@@ -37,8 +37,8 @@ pub struct WasmJwtCredentialValidator(JwtCredentialValidator