Liking cljdoc? Tell your friends :D

chromex.ext.cryptotoken-private

cljClojure

chrome.cryptotokenPrivate API that provides hooks to Chrome to be used by cryptotoken component extension. In the context of this API, an AppId is roughly an origin and is formally defined in

the FIDO spec

  • available since Chrome 41
chrome.cryptotokenPrivate API that provides hooks to Chrome to
be used by cryptotoken component extension.
In the context of this API, an AppId is roughly an origin and is formally
defined in

the FIDO spec

  * available since Chrome 41

api-table

source

can-app-id-get-attestationmacro

(can-app-id-get-attestation options)

Checks whether the given appId may receive attestation data that identifies the token. If not, the attestation from the token must be substituted with a randomly generated certificate since webauthn and U2F require that some attestation be provided.

|options| - ?

This function returns a core.async channel of type promise-chan which eventually receives a result value. Signature of the result value put on the channel is [result] where:

|result| - ?

In case of an error the channel closes without receiving any value and relevant error object can be obtained via chromex.error/get-last-error.

Checks whether the given appId may receive attestation data that identifies the token. If not, the attestation from the
token must be substituted with a randomly generated certificate since webauthn and U2F require that some attestation be
provided.

  |options| - ?

This function returns a core.async channel of type `promise-chan` which eventually receives a result value.
Signature of the result value put on the channel is [result] where:

  |result| - ?

In case of an error the channel closes without receiving any value and relevant error object can be obtained via
chromex.error/get-last-error.
sourceraw docstring

can-app-id-get-attestation*

(can-app-id-get-attestation* config options)
source

can-origin-assert-app-idmacro

(can-origin-assert-app-id security-origin app-id-url)

Checks whether the origin is allowed to assert the appId, according to the same origin policy defined at http://fidoalliance.org/specs/fido-u2f-v1.0-ps-20141009/ fido-appid-and-facets-ps-20141009.html |securityOrigin| is the origin as seen by the extension, and |appIdUrl| is the appId being asserted by the origin.

|security-origin| - ? |app-id-url| - ?

This function returns a core.async channel of type promise-chan which eventually receives a result value. Signature of the result value put on the channel is [result] where:

|result| - ?

In case of an error the channel closes without receiving any value and relevant error object can be obtained via chromex.error/get-last-error.

Checks whether the origin is allowed to assert the appId, according to the same origin policy defined at
http://fidoalliance.org/specs/fido-u2f-v1.0-ps-20141009/     fido-appid-and-facets-ps-20141009.html |securityOrigin| is the
origin as seen by the extension, and |appIdUrl| is the appId being asserted by the origin.

  |security-origin| - ?
  |app-id-url| - ?

This function returns a core.async channel of type `promise-chan` which eventually receives a result value.
Signature of the result value put on the channel is [result] where:

  |result| - ?

In case of an error the channel closes without receiving any value and relevant error object can be obtained via
chromex.error/get-last-error.
sourceraw docstring

can-origin-assert-app-id*

(can-origin-assert-app-id* config security-origin app-id-url)
source

gen-call

source

gen-wrapmacro

(gen-wrap kind item-id config & args)
source

is-app-id-hash-in-enterprise-contextmacro

(is-app-id-hash-in-enterprise-context app-id-hash)

Checks whether the given appId is specified in the SecurityKeyPermitAttestation policy. This causes a signal to be sent to the token that informs it that an individually-identifying attestation certificate may be used. Without that signal, the token is required to use its batch attestation certificate.

|app-id-hash| - ?

This function returns a core.async channel of type promise-chan which eventually receives a result value. Signature of the result value put on the channel is [result] where:

|result| - ?

In case of an error the channel closes without receiving any value and relevant error object can be obtained via chromex.error/get-last-error.

Checks whether the given appId is specified in the SecurityKeyPermitAttestation policy. This causes a signal to be sent to
the token that informs it that an individually-identifying attestation certificate may be used. Without that signal, the
token is required to use its batch attestation certificate.

  |app-id-hash| - ?

This function returns a core.async channel of type `promise-chan` which eventually receives a result value.
Signature of the result value put on the channel is [result] where:

  |result| - ?

In case of an error the channel closes without receiving any value and relevant error object can be obtained via
chromex.error/get-last-error.
sourceraw docstring

is-app-id-hash-in-enterprise-context*

(is-app-id-hash-in-enterprise-context* config app-id-hash)
source

tap-all-eventsmacro

(tap-all-events chan)

Taps all valid non-deprecated events in chromex.ext.cryptotoken-private namespace.

Taps all valid non-deprecated events in chromex.ext.cryptotoken-private namespace.
sourceraw docstring

cljdoc is a website building & hosting documentation for Clojure/Script libraries

× close