chrome.cryptotokenPrivate API that provides hooks to Chrome to be used by cryptotoken component extension. In the context of this API, an AppId is roughly an origin and is formally defined in
the FIDO spec
chrome.cryptotokenPrivate API that provides hooks to Chrome to be used by cryptotoken component extension. In the context of this API, an AppId is roughly an origin and is formally defined in the FIDO spec * available since Chrome 41
(can-app-id-get-attestation options)
Checks whether the given appId may receive attestation data that identifies the token. If not, the attestation from the token must be substituted with a randomly generated certificate since webauthn and U2F require that some attestation be provided.
|options| - ?
This function returns a core.async channel of type promise-chan
which eventually receives a result value.
Signature of the result value put on the channel is [result] where:
|result| - ?
In case of an error the channel closes without receiving any value and relevant error object can be obtained via chromex.error/get-last-error.
Checks whether the given appId may receive attestation data that identifies the token. If not, the attestation from the token must be substituted with a randomly generated certificate since webauthn and U2F require that some attestation be provided. |options| - ? This function returns a core.async channel of type `promise-chan` which eventually receives a result value. Signature of the result value put on the channel is [result] where: |result| - ? In case of an error the channel closes without receiving any value and relevant error object can be obtained via chromex.error/get-last-error.
(can-origin-assert-app-id security-origin app-id-url)
Checks whether the origin is allowed to assert the appId, according to the same origin policy defined at http://fidoalliance.org/specs/fido-u2f-v1.0-ps-20141009/ fido-appid-and-facets-ps-20141009.html |securityOrigin| is the origin as seen by the extension, and |appIdUrl| is the appId being asserted by the origin.
|security-origin| - ? |app-id-url| - ?
This function returns a core.async channel of type promise-chan
which eventually receives a result value.
Signature of the result value put on the channel is [result] where:
|result| - ?
In case of an error the channel closes without receiving any value and relevant error object can be obtained via chromex.error/get-last-error.
Checks whether the origin is allowed to assert the appId, according to the same origin policy defined at http://fidoalliance.org/specs/fido-u2f-v1.0-ps-20141009/ fido-appid-and-facets-ps-20141009.html |securityOrigin| is the origin as seen by the extension, and |appIdUrl| is the appId being asserted by the origin. |security-origin| - ? |app-id-url| - ? This function returns a core.async channel of type `promise-chan` which eventually receives a result value. Signature of the result value put on the channel is [result] where: |result| - ? In case of an error the channel closes without receiving any value and relevant error object can be obtained via chromex.error/get-last-error.
(can-proxy-to-web-authn)
Checks whether Cryptotoken can proxy the request through to WebAuthn.
This function returns a core.async channel of type promise-chan
which eventually receives a result value.
Signature of the result value put on the channel is [result] where:
|result| - ?
In case of an error the channel closes without receiving any value and relevant error object can be obtained via chromex.error/get-last-error.
Checks whether Cryptotoken can proxy the request through to WebAuthn. This function returns a core.async channel of type `promise-chan` which eventually receives a result value. Signature of the result value put on the channel is [result] where: |result| - ? In case of an error the channel closes without receiving any value and relevant error object can be obtained via chromex.error/get-last-error.
(is-app-id-hash-in-enterprise-context app-id-hash)
Checks whether the given appId is specified in the SecurityKeyPermitAttestation policy. This causes a signal to be sent to the token that informs it that an individually-identifying attestation certificate may be used. Without that signal, the token is required to use its batch attestation certificate.
|app-id-hash| - ?
This function returns a core.async channel of type promise-chan
which eventually receives a result value.
Signature of the result value put on the channel is [result] where:
|result| - ?
In case of an error the channel closes without receiving any value and relevant error object can be obtained via chromex.error/get-last-error.
Checks whether the given appId is specified in the SecurityKeyPermitAttestation policy. This causes a signal to be sent to the token that informs it that an individually-identifying attestation certificate may be used. Without that signal, the token is required to use its batch attestation certificate. |app-id-hash| - ? This function returns a core.async channel of type `promise-chan` which eventually receives a result value. Signature of the result value put on the channel is [result] where: |result| - ? In case of an error the channel closes without receiving any value and relevant error object can be obtained via chromex.error/get-last-error.
(is-app-id-hash-in-enterprise-context* config app-id-hash)
(tap-all-events chan)
Taps all valid non-deprecated events in chromex.ext.cryptotoken-private namespace.
Taps all valid non-deprecated events in chromex.ext.cryptotoken-private namespace.
cljdoc is a website building & hosting documentation for Clojure/Script libraries
× close