diff --git a/pkg/service/verifycredential/verifycredential_service.go b/pkg/service/verifycredential/verifycredential_service.go index 81032812a..1d9d97c75 100644 --- a/pkg/service/verifycredential/verifycredential_service.go +++ b/pkg/service/verifycredential/verifycredential_service.go @@ -127,7 +127,7 @@ func (s *Service) parseAndVerifyVC(vcBytes []byte, isJWT bool) (*verifiable.Cred // Use empty domain and challenge in order to skip the validation. // See usage of vcInVPValidation variable in ValidateCredentialProof method. // TODO: define verifier purpose field. - verifiable.WithExpectedDataIntegrityFields(crypto.Authentication, "", ""), + verifiable.WithExpectedDataIntegrityFields(crypto.AssertionMethod, "", ""), } if !isJWT { diff --git a/pkg/service/verifycredential/verifycredential_service_test.go b/pkg/service/verifycredential/verifycredential_service_test.go index eee6ad07e..81fa7a0ba 100644 --- a/pkg/service/verifycredential/verifycredential_service_test.go +++ b/pkg/service/verifycredential/verifycredential_service_test.go @@ -780,7 +780,7 @@ func Test_DataIntegrity_SignVerify(t *testing.T) { didResolver := &vdrmock.VDRegistry{ ResolveFunc: func(didID string, opts ...vdrapi.DIDMethodOption) (*did.DocResolution, error) { - return makeMockDIDResolution(signingDID, verificationMethod, did.Authentication), nil + return makeMockDIDResolution(signingDID, verificationMethod, did.AssertionMethod), nil }} signerSuite := ecdsa2019.NewSignerInitializer(&ecdsa2019.SignerInitializerOptions{ @@ -795,7 +795,7 @@ func Test_DataIntegrity_SignVerify(t *testing.T) { signContext := &verifiable.DataIntegrityProofContext{ SigningKeyID: signingDID + vmID, - ProofPurpose: crypto.Authentication, + ProofPurpose: crypto.AssertionMethod, CryptoSuite: ecdsa2019.SuiteType, Created: nil, Domain: "mock-domain",