From edcbf7e7e364c95c29f0fe2866adc90ef1af4ffa Mon Sep 17 00:00:00 2001
From: Manu Sporny Verification
implementations MUST run when verifying a verifiable credential or a
verifiable presentation. This algorithm takes a sequence of bytes
([=byte sequence=] inputBytes) and a media type
-([=string=] inputMediaType) as inputs, and produces a result
-([=map=] result) that contains the following:
+([=string=] inputMediaType) as inputs, and returns a [=map=]
+that contains the following: