@triveria/wallet 0.0.172 → 0.0.173

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. package/api.d.ts +293 -281
  2. package/api.js +473 -473
  3. package/package.json +1 -1
package/api.js CHANGED
@@ -98,7 +98,7 @@ exports.SystemImpactStatusEnum = {
98
98
  Critical: 'critical'
99
99
  };
100
100
  /**
101
- *
101
+ * Defines the capabilities which the wallet has. It may be any of \"holder\", \"issuer\" and \"verifier\".
102
102
  * @export
103
103
  * @enum {string}
104
104
  */
@@ -131,17 +131,20 @@ exports.WalletNotificationEventType = {
131
131
  const DefaultApiAxiosParamCreator = function (configuration) {
132
132
  return {
133
133
  /**
134
- * TBD
134
+ * Adds created Verifiable Credential draft to issuance queue for a specified client using authorized in-time or deferred flow.
135
+ * @param {string} credentialId
135
136
  * @param {string} walletId
136
- * @param {AccreditationRequest} [accreditationRequest]
137
+ * @param {IssuanceQueueCredentialAdd} [issuanceQueueCredentialAdd]
137
138
  * @param {*} [options] Override http request option.
138
139
  * @throws {RequiredError}
139
140
  */
140
- accreditAs: (walletId, accreditationRequest, options = {}) => __awaiter(this, void 0, void 0, function* () {
141
+ credentialAddToIssuanceQueue: (credentialId, walletId, issuanceQueueCredentialAdd, options = {}) => __awaiter(this, void 0, void 0, function* () {
142
+ // verify required parameter 'credentialId' is not null or undefined
143
+ (0, common_1.assertParamExists)('credentialAddToIssuanceQueue', 'credentialId', credentialId);
141
144
  // verify required parameter 'walletId' is not null or undefined
142
- (0, common_1.assertParamExists)('accreditAs', 'walletId', walletId);
143
- const localVarPath = `/wallets/{wallet_id}/accredit`
144
- .replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
145
+ (0, common_1.assertParamExists)('credentialAddToIssuanceQueue', 'walletId', walletId);
146
+ const localVarPath = `/credentials/{credential_id}/add`
147
+ .replace(`{${"credential_id"}}`, encodeURIComponent(String(credentialId)));
145
148
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
146
149
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
147
150
  let baseOptions;
@@ -154,49 +157,21 @@ const DefaultApiAxiosParamCreator = function (configuration) {
154
157
  // authentication accessToken required
155
158
  // http bearer authentication required
156
159
  yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
157
- localVarHeaderParameter['Content-Type'] = 'application/json';
158
- (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
159
- let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
160
- localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
161
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(accreditationRequest, localVarRequestOptions, configuration);
162
- return {
163
- url: (0, common_1.toPathString)(localVarUrlObj),
164
- options: localVarRequestOptions,
165
- };
166
- }),
167
- /**
168
- * TBD
169
- * @param {string} walletId
170
- * @param {*} [options] Override http request option.
171
- * @throws {RequiredError}
172
- */
173
- accreditAsTrustedIssuer: (walletId, options = {}) => __awaiter(this, void 0, void 0, function* () {
174
- // verify required parameter 'walletId' is not null or undefined
175
- (0, common_1.assertParamExists)('accreditAsTrustedIssuer', 'walletId', walletId);
176
- const localVarPath = `/wallets/{wallet_id}/accredit-as-trusted-issuer`
177
- .replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
178
- // use dummy base URL string because the URL constructor only accepts absolute URLs.
179
- const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
180
- let baseOptions;
181
- if (configuration) {
182
- baseOptions = configuration.baseOptions;
160
+ if (walletId != null) {
161
+ localVarHeaderParameter['wallet-id'] = String(walletId);
183
162
  }
184
- const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
185
- const localVarHeaderParameter = {};
186
- const localVarQueryParameter = {};
187
- // authentication accessToken required
188
- // http bearer authentication required
189
- yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
163
+ localVarHeaderParameter['Content-Type'] = 'application/json';
190
164
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
191
165
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
192
166
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
167
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(issuanceQueueCredentialAdd, localVarRequestOptions, configuration);
193
168
  return {
194
169
  url: (0, common_1.toPathString)(localVarUrlObj),
195
170
  options: localVarRequestOptions,
196
171
  };
197
172
  }),
198
173
  /**
199
- * Creates a new credential, which is always created in a draft state.
174
+ * Creates a new draft credential.
200
175
  * @param {string} walletId
201
176
  * @param {CredentialPayload} [credentialPayload] A Verifiable Credential payload in JSON format.
202
177
  * @param {*} [options] Override http request option.
@@ -442,7 +417,43 @@ const DefaultApiAxiosParamCreator = function (configuration) {
442
417
  };
443
418
  }),
444
419
  /**
445
- *
420
+ * Requests a credential issuance from the issuer and retrieves requirements for holder authorization.
421
+ * @param {string} walletId
422
+ * @param {CredentialRequest} [credentialRequest] A Verifiable Credential request: types and URL of the issuer
423
+ * @param {*} [options] Override http request option.
424
+ * @throws {RequiredError}
425
+ */
426
+ credentialRequestInit: (walletId, credentialRequest, options = {}) => __awaiter(this, void 0, void 0, function* () {
427
+ // verify required parameter 'walletId' is not null or undefined
428
+ (0, common_1.assertParamExists)('credentialRequestInit', 'walletId', walletId);
429
+ const localVarPath = `/credentials/request/init`;
430
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
431
+ const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
432
+ let baseOptions;
433
+ if (configuration) {
434
+ baseOptions = configuration.baseOptions;
435
+ }
436
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'POST' }, baseOptions), options);
437
+ const localVarHeaderParameter = {};
438
+ const localVarQueryParameter = {};
439
+ // authentication accessToken required
440
+ // http bearer authentication required
441
+ yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
442
+ if (walletId != null) {
443
+ localVarHeaderParameter['wallet-id'] = String(walletId);
444
+ }
445
+ localVarHeaderParameter['Content-Type'] = 'application/json';
446
+ (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
447
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
448
+ localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
449
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(credentialRequest, localVarRequestOptions, configuration);
450
+ return {
451
+ url: (0, common_1.toPathString)(localVarUrlObj),
452
+ options: localVarRequestOptions,
453
+ };
454
+ }),
455
+ /**
456
+ * Revoke a specific Verifiable Credential
446
457
  * @param {string} credentialId Verifiable Credential Identifier
447
458
  * @param {string} walletId
448
459
  * @param {*} [options] Override http request option.
@@ -521,9 +532,9 @@ const DefaultApiAxiosParamCreator = function (configuration) {
521
532
  * @param {*} [options] Override http request option.
522
533
  * @throws {RequiredError}
523
534
  */
524
- getCurrentDid: (walletId, options = {}) => __awaiter(this, void 0, void 0, function* () {
535
+ didGet: (walletId, options = {}) => __awaiter(this, void 0, void 0, function* () {
525
536
  // verify required parameter 'walletId' is not null or undefined
526
- (0, common_1.assertParamExists)('getCurrentDid', 'walletId', walletId);
537
+ (0, common_1.assertParamExists)('didGet', 'walletId', walletId);
527
538
  const localVarPath = `/did`;
528
539
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
529
540
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
@@ -609,81 +620,89 @@ const DefaultApiAxiosParamCreator = function (configuration) {
609
620
  };
610
621
  }),
611
622
  /**
612
- * TBD
623
+ * Presenting Verifiable Credentials after holder\'s consent.
613
624
  * @param {string} walletId
625
+ * @param {string} interactionId
626
+ * @param {InteractionAuthorizationConsent} [interactionAuthorizationConsent]
614
627
  * @param {*} [options] Override http request option.
615
628
  * @throws {RequiredError}
616
629
  */
617
- insertIssuerProxy: (walletId, options = {}) => __awaiter(this, void 0, void 0, function* () {
630
+ holderCredentialsPresentAfterConsent: (walletId, interactionId, interactionAuthorizationConsent, options = {}) => __awaiter(this, void 0, void 0, function* () {
618
631
  // verify required parameter 'walletId' is not null or undefined
619
- (0, common_1.assertParamExists)('insertIssuerProxy', 'walletId', walletId);
620
- const localVarPath = `/wallets/{wallet_id}/insert-issuer-proxy`
621
- .replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
632
+ (0, common_1.assertParamExists)('holderCredentialsPresentAfterConsent', 'walletId', walletId);
633
+ // verify required parameter 'interactionId' is not null or undefined
634
+ (0, common_1.assertParamExists)('holderCredentialsPresentAfterConsent', 'interactionId', interactionId);
635
+ const localVarPath = `/holder/present/{interaction_id}`
636
+ .replace(`{${"interaction_id"}}`, encodeURIComponent(String(interactionId)));
622
637
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
623
638
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
624
639
  let baseOptions;
625
640
  if (configuration) {
626
641
  baseOptions = configuration.baseOptions;
627
642
  }
628
- const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
643
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'POST' }, baseOptions), options);
629
644
  const localVarHeaderParameter = {};
630
645
  const localVarQueryParameter = {};
631
- // authentication accessToken required
632
- // http bearer authentication required
633
- yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
646
+ if (walletId != null) {
647
+ localVarHeaderParameter['wallet-id'] = String(walletId);
648
+ }
649
+ localVarHeaderParameter['Content-Type'] = 'application/json';
634
650
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
635
651
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
636
652
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
653
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(interactionAuthorizationConsent, localVarRequestOptions, configuration);
637
654
  return {
638
655
  url: (0, common_1.toPathString)(localVarUrlObj),
639
656
  options: localVarRequestOptions,
640
657
  };
641
658
  }),
642
659
  /**
643
- * Returns verifiable credential format and types that are supported by the issuer. - format: the verifiable credential format (for example \"jwt_vc\") - type: a list of strings that define supported verifiable credential type(s)
644
- * @param {string} url
660
+ * Responds to an ID token request
661
+ * @param {string} walletId
662
+ * @param {IdTokenSendRequest} [idTokenSendRequest]
645
663
  * @param {*} [options] Override http request option.
646
664
  * @throws {RequiredError}
647
665
  */
648
- issuerCredentialTypesList: (url, options = {}) => __awaiter(this, void 0, void 0, function* () {
649
- // verify required parameter 'url' is not null or undefined
650
- (0, common_1.assertParamExists)('issuerCredentialTypesList', 'url', url);
651
- const localVarPath = `/issuer/credential/types`;
666
+ holderIdTokenSend: (walletId, idTokenSendRequest, options = {}) => __awaiter(this, void 0, void 0, function* () {
667
+ // verify required parameter 'walletId' is not null or undefined
668
+ (0, common_1.assertParamExists)('holderIdTokenSend', 'walletId', walletId);
669
+ const localVarPath = `/holder/id-token/send`;
652
670
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
653
671
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
654
672
  let baseOptions;
655
673
  if (configuration) {
656
674
  baseOptions = configuration.baseOptions;
657
675
  }
658
- const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
676
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'POST' }, baseOptions), options);
659
677
  const localVarHeaderParameter = {};
660
678
  const localVarQueryParameter = {};
661
- if (url !== undefined) {
662
- localVarQueryParameter['url'] = url;
679
+ // authentication accessToken required
680
+ // http bearer authentication required
681
+ yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
682
+ if (walletId != null) {
683
+ localVarHeaderParameter['wallet-id'] = String(walletId);
663
684
  }
685
+ localVarHeaderParameter['Content-Type'] = 'application/json';
664
686
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
665
687
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
666
688
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
689
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(idTokenSendRequest, localVarRequestOptions, configuration);
667
690
  return {
668
691
  url: (0, common_1.toPathString)(localVarUrlObj),
669
692
  options: localVarRequestOptions,
670
693
  };
671
694
  }),
672
695
  /**
673
- * Adds created Verifiable Credential draft to issuance queue for a specified client using authorized in-time or deferred flow.
674
- * @param {string} credentialId
696
+ * Issue the Verifiable Credential using OIDC4VCI offer acceptance
675
697
  * @param {string} walletId
676
- * @param {IssuanceQueueCredentialAdd} [issuanceQueueCredentialAdd]
698
+ * @param {VcOffer} [vcOffer] Offer URL and optional PIN for the request
677
699
  * @param {*} [options] Override http request option.
678
700
  * @throws {RequiredError}
679
701
  */
680
- oidcAddCredToIssuanceQueue: (credentialId, walletId, issuanceQueueCredentialAdd, options = {}) => __awaiter(this, void 0, void 0, function* () {
681
- // verify required parameter 'credentialId' is not null or undefined
682
- (0, common_1.assertParamExists)('oidcAddCredToIssuanceQueue', 'credentialId', credentialId);
702
+ holderOfferPassAuthInfo: (walletId, vcOffer, options = {}) => __awaiter(this, void 0, void 0, function* () {
683
703
  // verify required parameter 'walletId' is not null or undefined
684
- (0, common_1.assertParamExists)('oidcAddCredToIssuanceQueue', 'walletId', walletId);
685
- const localVarPath = `/credentials/{credential_id}/add`
686
- .replace(`{${"credential_id"}}`, encodeURIComponent(String(credentialId)));
704
+ (0, common_1.assertParamExists)('holderOfferPassAuthInfo', 'walletId', walletId);
705
+ const localVarPath = `/holder/offer/pass-auth-info`;
687
706
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
688
707
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
689
708
  let baseOptions;
@@ -703,22 +722,27 @@ const DefaultApiAxiosParamCreator = function (configuration) {
703
722
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
704
723
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
705
724
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
706
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(issuanceQueueCredentialAdd, localVarRequestOptions, configuration);
725
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(vcOffer, localVarRequestOptions, configuration);
707
726
  return {
708
727
  url: (0, common_1.toPathString)(localVarUrlObj),
709
728
  options: localVarRequestOptions,
710
729
  };
711
730
  }),
712
731
  /**
713
- * Creates an ID token request.
732
+ * Gives consent to process credential offer specified by `interaction_id`
714
733
  * @param {string} walletId
734
+ * @param {string} interactionId
735
+ * @param {InteractionAuthorizationConsent} [interactionAuthorizationConsent]
715
736
  * @param {*} [options] Override http request option.
716
737
  * @throws {RequiredError}
717
738
  */
718
- oidcCreateIdTokenRequest: (walletId, options = {}) => __awaiter(this, void 0, void 0, function* () {
739
+ holderOfferProcessAfterConsent: (walletId, interactionId, interactionAuthorizationConsent, options = {}) => __awaiter(this, void 0, void 0, function* () {
719
740
  // verify required parameter 'walletId' is not null or undefined
720
- (0, common_1.assertParamExists)('oidcCreateIdTokenRequest', 'walletId', walletId);
721
- const localVarPath = `/id-token/request`;
741
+ (0, common_1.assertParamExists)('holderOfferProcessAfterConsent', 'walletId', walletId);
742
+ // verify required parameter 'interactionId' is not null or undefined
743
+ (0, common_1.assertParamExists)('holderOfferProcessAfterConsent', 'interactionId', interactionId);
744
+ const localVarPath = `/holder/offer/{interaction_id}/process`
745
+ .replace(`{${"interaction_id"}}`, encodeURIComponent(String(interactionId)));
722
746
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
723
747
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
724
748
  let baseOptions;
@@ -728,31 +752,30 @@ const DefaultApiAxiosParamCreator = function (configuration) {
728
752
  const localVarRequestOptions = Object.assign(Object.assign({ method: 'POST' }, baseOptions), options);
729
753
  const localVarHeaderParameter = {};
730
754
  const localVarQueryParameter = {};
731
- // authentication accessToken required
732
- // http bearer authentication required
733
- yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
734
755
  if (walletId != null) {
735
756
  localVarHeaderParameter['wallet-id'] = String(walletId);
736
757
  }
758
+ localVarHeaderParameter['Content-Type'] = 'application/json';
737
759
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
738
760
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
739
761
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
762
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(interactionAuthorizationConsent, localVarRequestOptions, configuration);
740
763
  return {
741
764
  url: (0, common_1.toPathString)(localVarUrlObj),
742
765
  options: localVarRequestOptions,
743
766
  };
744
767
  }),
745
768
  /**
746
- * Requests a credential issuance from the issuer and retrieves requirements for holder authorization.
769
+ * Initiates a presentation of credentials to a verifier.
747
770
  * @param {string} walletId
748
- * @param {CredentialRequest} [credentialRequest] A Verifiable Credential request: types and URL of the issuer
771
+ * @param {PresentationRequest} [presentationRequest]
749
772
  * @param {*} [options] Override http request option.
750
773
  * @throws {RequiredError}
751
774
  */
752
- oidcCredentialRequestInit: (walletId, credentialRequest, options = {}) => __awaiter(this, void 0, void 0, function* () {
775
+ holderPresentPassAuthInfo: (walletId, presentationRequest, options = {}) => __awaiter(this, void 0, void 0, function* () {
753
776
  // verify required parameter 'walletId' is not null or undefined
754
- (0, common_1.assertParamExists)('oidcCredentialRequestInit', 'walletId', walletId);
755
- const localVarPath = `/credentials/request/init`;
777
+ (0, common_1.assertParamExists)('holderPresentPassAuthInfo', 'walletId', walletId);
778
+ const localVarPath = `/holder/present/pass-auth-info`;
756
779
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
757
780
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
758
781
  let baseOptions;
@@ -772,23 +795,22 @@ const DefaultApiAxiosParamCreator = function (configuration) {
772
795
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
773
796
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
774
797
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
775
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(credentialRequest, localVarRequestOptions, configuration);
798
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(presentationRequest, localVarRequestOptions, configuration);
776
799
  return {
777
800
  url: (0, common_1.toPathString)(localVarUrlObj),
778
801
  options: localVarRequestOptions,
779
802
  };
780
803
  }),
781
804
  /**
782
- * Initiates issuing of the credential using the authorized deferred flow, in which the holder will receive credential asynchronously.
805
+ * Creates an ID token request.
783
806
  * @param {string} walletId
784
- * @param {InitAuthOffer} [initAuthOffer]
785
807
  * @param {*} [options] Override http request option.
786
808
  * @throws {RequiredError}
787
809
  */
788
- oidcInitiateDeferred: (walletId, initAuthOffer, options = {}) => __awaiter(this, void 0, void 0, function* () {
810
+ idTokenRequestCreate: (walletId, options = {}) => __awaiter(this, void 0, void 0, function* () {
789
811
  // verify required parameter 'walletId' is not null or undefined
790
- (0, common_1.assertParamExists)('oidcInitiateDeferred', 'walletId', walletId);
791
- const localVarPath = `/issuer/initiate/deferred`;
812
+ (0, common_1.assertParamExists)('idTokenRequestCreate', 'walletId', walletId);
813
+ const localVarPath = `/id-token/request`;
792
814
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
793
815
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
794
816
  let baseOptions;
@@ -804,63 +826,55 @@ const DefaultApiAxiosParamCreator = function (configuration) {
804
826
  if (walletId != null) {
805
827
  localVarHeaderParameter['wallet-id'] = String(walletId);
806
828
  }
807
- localVarHeaderParameter['Content-Type'] = 'application/json';
808
829
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
809
830
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
810
831
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
811
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(initAuthOffer, localVarRequestOptions, configuration);
812
832
  return {
813
833
  url: (0, common_1.toPathString)(localVarUrlObj),
814
834
  options: localVarRequestOptions,
815
835
  };
816
836
  }),
817
837
  /**
818
- * Initiates issuing of the verifiable credential using authorized flow.
819
- * @param {string} walletId
820
- * @param {InitAuthOffer} [initAuthOffer]
838
+ * Returns verifiable credential format and types that are supported by the issuer. - format: the verifiable credential format (for example \"jwt_vc\") - type: a list of strings that define supported verifiable credential type(s)
839
+ * @param {string} url
821
840
  * @param {*} [options] Override http request option.
822
841
  * @throws {RequiredError}
823
842
  */
824
- oidcInitiateIntime: (walletId, initAuthOffer, options = {}) => __awaiter(this, void 0, void 0, function* () {
825
- // verify required parameter 'walletId' is not null or undefined
826
- (0, common_1.assertParamExists)('oidcInitiateIntime', 'walletId', walletId);
827
- const localVarPath = `/issuer/initiate/intime`;
843
+ issuerCredentialTypesList: (url, options = {}) => __awaiter(this, void 0, void 0, function* () {
844
+ // verify required parameter 'url' is not null or undefined
845
+ (0, common_1.assertParamExists)('issuerCredentialTypesList', 'url', url);
846
+ const localVarPath = `/issuer/credential/types`;
828
847
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
829
848
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
830
849
  let baseOptions;
831
850
  if (configuration) {
832
851
  baseOptions = configuration.baseOptions;
833
852
  }
834
- const localVarRequestOptions = Object.assign(Object.assign({ method: 'POST' }, baseOptions), options);
853
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
835
854
  const localVarHeaderParameter = {};
836
855
  const localVarQueryParameter = {};
837
- // authentication accessToken required
838
- // http bearer authentication required
839
- yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
840
- if (walletId != null) {
841
- localVarHeaderParameter['wallet-id'] = String(walletId);
856
+ if (url !== undefined) {
857
+ localVarQueryParameter['url'] = url;
842
858
  }
843
- localVarHeaderParameter['Content-Type'] = 'application/json';
844
859
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
845
860
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
846
861
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
847
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(initAuthOffer, localVarRequestOptions, configuration);
848
862
  return {
849
863
  url: (0, common_1.toPathString)(localVarUrlObj),
850
864
  options: localVarRequestOptions,
851
865
  };
852
866
  }),
853
867
  /**
854
- * Initiates issuing of the verifiable credential using pre-authorized flow.
868
+ * Initiates issuing of Verifiable Credentials using the authorized deferred flow, in which the holder will receive credential asynchronously.
855
869
  * @param {string} walletId
856
- * @param {InitPreAuthOffer} [initPreAuthOffer]
870
+ * @param {InitAuthOffer} [initAuthOffer]
857
871
  * @param {*} [options] Override http request option.
858
872
  * @throws {RequiredError}
859
873
  */
860
- oidcInitiatePreauth: (walletId, initPreAuthOffer, options = {}) => __awaiter(this, void 0, void 0, function* () {
874
+ issuerInitiateDeferred: (walletId, initAuthOffer, options = {}) => __awaiter(this, void 0, void 0, function* () {
861
875
  // verify required parameter 'walletId' is not null or undefined
862
- (0, common_1.assertParamExists)('oidcInitiatePreauth', 'walletId', walletId);
863
- const localVarPath = `/issuer/initiate/preauth`;
876
+ (0, common_1.assertParamExists)('issuerInitiateDeferred', 'walletId', walletId);
877
+ const localVarPath = `/issuer/initiate/deferred`;
864
878
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
865
879
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
866
880
  let baseOptions;
@@ -880,23 +894,23 @@ const DefaultApiAxiosParamCreator = function (configuration) {
880
894
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
881
895
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
882
896
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
883
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(initPreAuthOffer, localVarRequestOptions, configuration);
897
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(initAuthOffer, localVarRequestOptions, configuration);
884
898
  return {
885
899
  url: (0, common_1.toPathString)(localVarUrlObj),
886
900
  options: localVarRequestOptions,
887
901
  };
888
902
  }),
889
903
  /**
890
- * Issue verifiable credential using OIDC4VCI offer acceptance
904
+ * Initiates issuing of Verifiable Credentials using authorized flow.
891
905
  * @param {string} walletId
892
- * @param {VcOffer} [vcOffer] Offer URL and optional PIN for the request
906
+ * @param {InitAuthOffer} [initAuthOffer]
893
907
  * @param {*} [options] Override http request option.
894
908
  * @throws {RequiredError}
895
909
  */
896
- oidcPassOfferAuthInfo: (walletId, vcOffer, options = {}) => __awaiter(this, void 0, void 0, function* () {
910
+ issuerInitiateIntime: (walletId, initAuthOffer, options = {}) => __awaiter(this, void 0, void 0, function* () {
897
911
  // verify required parameter 'walletId' is not null or undefined
898
- (0, common_1.assertParamExists)('oidcPassOfferAuthInfo', 'walletId', walletId);
899
- const localVarPath = `/holder/offer/pass-auth-info`;
912
+ (0, common_1.assertParamExists)('issuerInitiateIntime', 'walletId', walletId);
913
+ const localVarPath = `/issuer/initiate/intime`;
900
914
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
901
915
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
902
916
  let baseOptions;
@@ -916,27 +930,23 @@ const DefaultApiAxiosParamCreator = function (configuration) {
916
930
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
917
931
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
918
932
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
919
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(vcOffer, localVarRequestOptions, configuration);
933
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(initAuthOffer, localVarRequestOptions, configuration);
920
934
  return {
921
935
  url: (0, common_1.toPathString)(localVarUrlObj),
922
936
  options: localVarRequestOptions,
923
937
  };
924
938
  }),
925
939
  /**
926
- *
940
+ * Initiates issuing of Verifiable Credentials using pre-authorized flow.
927
941
  * @param {string} walletId
928
- * @param {string} interactionId
929
- * @param {InteractionAuthorizationConsent} [interactionAuthorizationConsent]
942
+ * @param {InitPreAuthOffer} [initPreAuthOffer]
930
943
  * @param {*} [options] Override http request option.
931
944
  * @throws {RequiredError}
932
945
  */
933
- oidcPresentCredentialsAfterConsent: (walletId, interactionId, interactionAuthorizationConsent, options = {}) => __awaiter(this, void 0, void 0, function* () {
946
+ issuerInitiatePreauth: (walletId, initPreAuthOffer, options = {}) => __awaiter(this, void 0, void 0, function* () {
934
947
  // verify required parameter 'walletId' is not null or undefined
935
- (0, common_1.assertParamExists)('oidcPresentCredentialsAfterConsent', 'walletId', walletId);
936
- // verify required parameter 'interactionId' is not null or undefined
937
- (0, common_1.assertParamExists)('oidcPresentCredentialsAfterConsent', 'interactionId', interactionId);
938
- const localVarPath = `/holder/present/{interaction_id}`
939
- .replace(`{${"interaction_id"}}`, encodeURIComponent(String(interactionId)));
948
+ (0, common_1.assertParamExists)('issuerInitiatePreauth', 'walletId', walletId);
949
+ const localVarPath = `/issuer/initiate/preauth`;
940
950
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
941
951
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
942
952
  let baseOptions;
@@ -946,6 +956,9 @@ const DefaultApiAxiosParamCreator = function (configuration) {
946
956
  const localVarRequestOptions = Object.assign(Object.assign({ method: 'POST' }, baseOptions), options);
947
957
  const localVarHeaderParameter = {};
948
958
  const localVarQueryParameter = {};
959
+ // authentication accessToken required
960
+ // http bearer authentication required
961
+ yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
949
962
  if (walletId != null) {
950
963
  localVarHeaderParameter['wallet-id'] = String(walletId);
951
964
  }
@@ -953,23 +966,24 @@ const DefaultApiAxiosParamCreator = function (configuration) {
953
966
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
954
967
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
955
968
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
956
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(interactionAuthorizationConsent, localVarRequestOptions, configuration);
969
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(initPreAuthOffer, localVarRequestOptions, configuration);
957
970
  return {
958
971
  url: (0, common_1.toPathString)(localVarUrlObj),
959
972
  options: localVarRequestOptions,
960
973
  };
961
974
  }),
962
975
  /**
963
- * Initiates a presentation of credentials to a verifier.
976
+ * Accredits a legal entity as RTAO or TAO.
964
977
  * @param {string} walletId
965
- * @param {PresentationRequest} [presentationRequest]
978
+ * @param {AccreditationRequest} [accreditationRequest]
966
979
  * @param {*} [options] Override http request option.
967
980
  * @throws {RequiredError}
968
981
  */
969
- oidcPresentPassAuthInfo: (walletId, presentationRequest, options = {}) => __awaiter(this, void 0, void 0, function* () {
982
+ tfAccreditAs: (walletId, accreditationRequest, options = {}) => __awaiter(this, void 0, void 0, function* () {
970
983
  // verify required parameter 'walletId' is not null or undefined
971
- (0, common_1.assertParamExists)('oidcPresentPassAuthInfo', 'walletId', walletId);
972
- const localVarPath = `/holder/present/pass-auth-info`;
984
+ (0, common_1.assertParamExists)('tfAccreditAs', 'walletId', walletId);
985
+ const localVarPath = `/tf/{wallet_id}/accredit`
986
+ .replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
973
987
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
974
988
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
975
989
  let baseOptions;
@@ -982,103 +996,89 @@ const DefaultApiAxiosParamCreator = function (configuration) {
982
996
  // authentication accessToken required
983
997
  // http bearer authentication required
984
998
  yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
985
- if (walletId != null) {
986
- localVarHeaderParameter['wallet-id'] = String(walletId);
987
- }
988
999
  localVarHeaderParameter['Content-Type'] = 'application/json';
989
1000
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
990
1001
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
991
1002
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
992
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(presentationRequest, localVarRequestOptions, configuration);
1003
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(accreditationRequest, localVarRequestOptions, configuration);
993
1004
  return {
994
1005
  url: (0, common_1.toPathString)(localVarUrlObj),
995
1006
  options: localVarRequestOptions,
996
1007
  };
997
1008
  }),
998
1009
  /**
999
- * Gives consent to process credential offer specified by `interaction_id`
1010
+ * Accredits the wallet as a trusted issuer.
1000
1011
  * @param {string} walletId
1001
- * @param {string} interactionId
1002
- * @param {InteractionAuthorizationConsent} [interactionAuthorizationConsent]
1003
1012
  * @param {*} [options] Override http request option.
1004
1013
  * @throws {RequiredError}
1005
1014
  */
1006
- oidcProcessOfferAfterConsent: (walletId, interactionId, interactionAuthorizationConsent, options = {}) => __awaiter(this, void 0, void 0, function* () {
1015
+ tfAccreditAsTrustedIssuer: (walletId, options = {}) => __awaiter(this, void 0, void 0, function* () {
1007
1016
  // verify required parameter 'walletId' is not null or undefined
1008
- (0, common_1.assertParamExists)('oidcProcessOfferAfterConsent', 'walletId', walletId);
1009
- // verify required parameter 'interactionId' is not null or undefined
1010
- (0, common_1.assertParamExists)('oidcProcessOfferAfterConsent', 'interactionId', interactionId);
1011
- const localVarPath = `/holder/offer/{interaction_id}/process`
1012
- .replace(`{${"interaction_id"}}`, encodeURIComponent(String(interactionId)));
1017
+ (0, common_1.assertParamExists)('tfAccreditAsTrustedIssuer', 'walletId', walletId);
1018
+ const localVarPath = `/tf/{wallet_id}/accredit-as-trusted-issuer`
1019
+ .replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
1013
1020
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
1014
1021
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
1015
1022
  let baseOptions;
1016
1023
  if (configuration) {
1017
1024
  baseOptions = configuration.baseOptions;
1018
1025
  }
1019
- const localVarRequestOptions = Object.assign(Object.assign({ method: 'POST' }, baseOptions), options);
1026
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
1020
1027
  const localVarHeaderParameter = {};
1021
1028
  const localVarQueryParameter = {};
1022
- if (walletId != null) {
1023
- localVarHeaderParameter['wallet-id'] = String(walletId);
1024
- }
1025
- localVarHeaderParameter['Content-Type'] = 'application/json';
1029
+ // authentication accessToken required
1030
+ // http bearer authentication required
1031
+ yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
1026
1032
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
1027
1033
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
1028
1034
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
1029
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(interactionAuthorizationConsent, localVarRequestOptions, configuration);
1030
1035
  return {
1031
1036
  url: (0, common_1.toPathString)(localVarUrlObj),
1032
1037
  options: localVarRequestOptions,
1033
1038
  };
1034
1039
  }),
1035
1040
  /**
1036
- * Responds to an ID token request
1041
+ * Registers an issuer proxy used by EBSI for the credential status retrieval through EBSI network.
1037
1042
  * @param {string} walletId
1038
- * @param {IdTokenSendRequest} [idTokenSendRequest]
1039
1043
  * @param {*} [options] Override http request option.
1040
1044
  * @throws {RequiredError}
1041
1045
  */
1042
- oidcSendIdToken: (walletId, idTokenSendRequest, options = {}) => __awaiter(this, void 0, void 0, function* () {
1046
+ tfInsertIssuerProxy: (walletId, options = {}) => __awaiter(this, void 0, void 0, function* () {
1043
1047
  // verify required parameter 'walletId' is not null or undefined
1044
- (0, common_1.assertParamExists)('oidcSendIdToken', 'walletId', walletId);
1045
- const localVarPath = `/holder/id-token/send`;
1048
+ (0, common_1.assertParamExists)('tfInsertIssuerProxy', 'walletId', walletId);
1049
+ const localVarPath = `/tf/{wallet_id}/insert-issuer-proxy`
1050
+ .replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
1046
1051
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
1047
1052
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
1048
1053
  let baseOptions;
1049
1054
  if (configuration) {
1050
1055
  baseOptions = configuration.baseOptions;
1051
1056
  }
1052
- const localVarRequestOptions = Object.assign(Object.assign({ method: 'POST' }, baseOptions), options);
1057
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
1053
1058
  const localVarHeaderParameter = {};
1054
1059
  const localVarQueryParameter = {};
1055
1060
  // authentication accessToken required
1056
1061
  // http bearer authentication required
1057
1062
  yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
1058
- if (walletId != null) {
1059
- localVarHeaderParameter['wallet-id'] = String(walletId);
1060
- }
1061
- localVarHeaderParameter['Content-Type'] = 'application/json';
1062
1063
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
1063
1064
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
1064
1065
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
1065
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(idTokenSendRequest, localVarRequestOptions, configuration);
1066
1066
  return {
1067
1067
  url: (0, common_1.toPathString)(localVarUrlObj),
1068
1068
  options: localVarRequestOptions,
1069
1069
  };
1070
1070
  }),
1071
1071
  /**
1072
- * Returns an url where verifier accepts presentations.
1072
+ * Onboards legal entity to the trust framework based on the wallet configuration.
1073
1073
  * @param {string} walletId
1074
- * @param {VerifyInitRequest} [verifyInitRequest]
1075
1074
  * @param {*} [options] Override http request option.
1076
1075
  * @throws {RequiredError}
1077
1076
  */
1078
- oidcVerifyInitUrl: (walletId, verifyInitRequest, options = {}) => __awaiter(this, void 0, void 0, function* () {
1077
+ tfOnboardLegalEntity: (walletId, options = {}) => __awaiter(this, void 0, void 0, function* () {
1079
1078
  // verify required parameter 'walletId' is not null or undefined
1080
- (0, common_1.assertParamExists)('oidcVerifyInitUrl', 'walletId', walletId);
1081
- const localVarPath = `/verifier/init`;
1079
+ (0, common_1.assertParamExists)('tfOnboardLegalEntity', 'walletId', walletId);
1080
+ const localVarPath = `/tf/{wallet_id}/onboard-legal-entity`
1081
+ .replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
1082
1082
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
1083
1083
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
1084
1084
  let baseOptions;
@@ -1091,29 +1091,25 @@ const DefaultApiAxiosParamCreator = function (configuration) {
1091
1091
  // authentication accessToken required
1092
1092
  // http bearer authentication required
1093
1093
  yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
1094
- if (walletId != null) {
1095
- localVarHeaderParameter['wallet-id'] = String(walletId);
1096
- }
1097
- localVarHeaderParameter['Content-Type'] = 'application/json';
1098
1094
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
1099
1095
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
1100
1096
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
1101
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(verifyInitRequest, localVarRequestOptions, configuration);
1102
1097
  return {
1103
1098
  url: (0, common_1.toPathString)(localVarUrlObj),
1104
1099
  options: localVarRequestOptions,
1105
1100
  };
1106
1101
  }),
1107
1102
  /**
1108
- * TBD
1103
+ * Prepares another legal entity\'s wallet DID for accreditation.
1109
1104
  * @param {string} walletId
1105
+ * @param {PrepareToAccreditRequest} [prepareToAccreditRequest]
1110
1106
  * @param {*} [options] Override http request option.
1111
1107
  * @throws {RequiredError}
1112
1108
  */
1113
- onboardLegalEntity: (walletId, options = {}) => __awaiter(this, void 0, void 0, function* () {
1109
+ tfPrepareToAccredit: (walletId, prepareToAccreditRequest, options = {}) => __awaiter(this, void 0, void 0, function* () {
1114
1110
  // verify required parameter 'walletId' is not null or undefined
1115
- (0, common_1.assertParamExists)('onboardLegalEntity', 'walletId', walletId);
1116
- const localVarPath = `/wallets/{wallet_id}/onboard-legal-entity`
1111
+ (0, common_1.assertParamExists)('tfPrepareToAccredit', 'walletId', walletId);
1112
+ const localVarPath = `/tf/{wallet_id}/prepare-to-accredit`
1117
1113
  .replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
1118
1114
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
1119
1115
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
@@ -1127,25 +1123,27 @@ const DefaultApiAxiosParamCreator = function (configuration) {
1127
1123
  // authentication accessToken required
1128
1124
  // http bearer authentication required
1129
1125
  yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
1126
+ localVarHeaderParameter['Content-Type'] = 'application/json';
1130
1127
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
1131
1128
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
1132
1129
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
1130
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(prepareToAccreditRequest, localVarRequestOptions, configuration);
1133
1131
  return {
1134
1132
  url: (0, common_1.toPathString)(localVarUrlObj),
1135
1133
  options: localVarRequestOptions,
1136
1134
  };
1137
1135
  }),
1138
1136
  /**
1139
- * TBD
1137
+ * Revokes another legal entity\'s wallet DID accreditation.
1140
1138
  * @param {string} walletId
1141
1139
  * @param {PrepareToAccreditRequest} [prepareToAccreditRequest]
1142
1140
  * @param {*} [options] Override http request option.
1143
1141
  * @throws {RequiredError}
1144
1142
  */
1145
- prepareToAccredit: (walletId, prepareToAccreditRequest, options = {}) => __awaiter(this, void 0, void 0, function* () {
1143
+ tfRevokeAccreditation: (walletId, prepareToAccreditRequest, options = {}) => __awaiter(this, void 0, void 0, function* () {
1146
1144
  // verify required parameter 'walletId' is not null or undefined
1147
- (0, common_1.assertParamExists)('prepareToAccredit', 'walletId', walletId);
1148
- const localVarPath = `/wallets/{wallet_id}/prepare-to-accredit`
1145
+ (0, common_1.assertParamExists)('tfRevokeAccreditation', 'walletId', walletId);
1146
+ const localVarPath = `/tf/{wallet_id}/revoke-accredit`
1149
1147
  .replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
1150
1148
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
1151
1149
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
@@ -1170,17 +1168,16 @@ const DefaultApiAxiosParamCreator = function (configuration) {
1170
1168
  };
1171
1169
  }),
1172
1170
  /**
1173
- * TBD
1171
+ * Returns an url where verifier accepts presentations from a holder.
1174
1172
  * @param {string} walletId
1175
- * @param {PrepareToAccreditRequest} [prepareToAccreditRequest]
1173
+ * @param {VerifyInitRequest} [verifyInitRequest]
1176
1174
  * @param {*} [options] Override http request option.
1177
1175
  * @throws {RequiredError}
1178
1176
  */
1179
- revokeAccreditation: (walletId, prepareToAccreditRequest, options = {}) => __awaiter(this, void 0, void 0, function* () {
1177
+ verifierInitUrlCreate: (walletId, verifyInitRequest, options = {}) => __awaiter(this, void 0, void 0, function* () {
1180
1178
  // verify required parameter 'walletId' is not null or undefined
1181
- (0, common_1.assertParamExists)('revokeAccreditation', 'walletId', walletId);
1182
- const localVarPath = `/wallets/{wallet_id}/revoke-accredit`
1183
- .replace(`{${"wallet_id"}}`, encodeURIComponent(String(walletId)));
1179
+ (0, common_1.assertParamExists)('verifierInitUrlCreate', 'walletId', walletId);
1180
+ const localVarPath = `/verifier/init`;
1184
1181
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
1185
1182
  const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
1186
1183
  let baseOptions;
@@ -1193,18 +1190,21 @@ const DefaultApiAxiosParamCreator = function (configuration) {
1193
1190
  // authentication accessToken required
1194
1191
  // http bearer authentication required
1195
1192
  yield (0, common_1.setBearerAuthToObject)(localVarHeaderParameter, configuration);
1193
+ if (walletId != null) {
1194
+ localVarHeaderParameter['wallet-id'] = String(walletId);
1195
+ }
1196
1196
  localVarHeaderParameter['Content-Type'] = 'application/json';
1197
1197
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
1198
1198
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
1199
1199
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
1200
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(prepareToAccreditRequest, localVarRequestOptions, configuration);
1200
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(verifyInitRequest, localVarRequestOptions, configuration);
1201
1201
  return {
1202
1202
  url: (0, common_1.toPathString)(localVarUrlObj),
1203
1203
  options: localVarRequestOptions,
1204
1204
  };
1205
1205
  }),
1206
1206
  /**
1207
- * The call will authenticate the client and create a new wallet that will be accessible only to the client.
1207
+ * Creates a new wallet for the authenticated client.
1208
1208
  * @param {Wallet} [wallet]
1209
1209
  * @param {*} [options] Override http request option.
1210
1210
  * @throws {RequiredError}
@@ -1550,38 +1550,24 @@ const DefaultApiFp = function (configuration) {
1550
1550
  const localVarAxiosParamCreator = (0, exports.DefaultApiAxiosParamCreator)(configuration);
1551
1551
  return {
1552
1552
  /**
1553
- * TBD
1554
- * @param {string} walletId
1555
- * @param {AccreditationRequest} [accreditationRequest]
1556
- * @param {*} [options] Override http request option.
1557
- * @throws {RequiredError}
1558
- */
1559
- accreditAs(walletId, accreditationRequest, options) {
1560
- var _a, _b, _c;
1561
- return __awaiter(this, void 0, void 0, function* () {
1562
- const localVarAxiosArgs = yield localVarAxiosParamCreator.accreditAs(walletId, accreditationRequest, options);
1563
- const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
1564
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.accreditAs']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1565
- return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
1566
- });
1567
- },
1568
- /**
1569
- * TBD
1553
+ * Adds created Verifiable Credential draft to issuance queue for a specified client using authorized in-time or deferred flow.
1554
+ * @param {string} credentialId
1570
1555
  * @param {string} walletId
1556
+ * @param {IssuanceQueueCredentialAdd} [issuanceQueueCredentialAdd]
1571
1557
  * @param {*} [options] Override http request option.
1572
1558
  * @throws {RequiredError}
1573
1559
  */
1574
- accreditAsTrustedIssuer(walletId, options) {
1560
+ credentialAddToIssuanceQueue(credentialId, walletId, issuanceQueueCredentialAdd, options) {
1575
1561
  var _a, _b, _c;
1576
1562
  return __awaiter(this, void 0, void 0, function* () {
1577
- const localVarAxiosArgs = yield localVarAxiosParamCreator.accreditAsTrustedIssuer(walletId, options);
1563
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.credentialAddToIssuanceQueue(credentialId, walletId, issuanceQueueCredentialAdd, options);
1578
1564
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
1579
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.accreditAsTrustedIssuer']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1565
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.credentialAddToIssuanceQueue']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1580
1566
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
1581
1567
  });
1582
1568
  },
1583
1569
  /**
1584
- * Creates a new credential, which is always created in a draft state.
1570
+ * Creates a new draft credential.
1585
1571
  * @param {string} walletId
1586
1572
  * @param {CredentialPayload} [credentialPayload] A Verifiable Credential payload in JSON format.
1587
1573
  * @param {*} [options] Override http request option.
@@ -1685,7 +1671,23 @@ const DefaultApiFp = function (configuration) {
1685
1671
  });
1686
1672
  },
1687
1673
  /**
1688
- *
1674
+ * Requests a credential issuance from the issuer and retrieves requirements for holder authorization.
1675
+ * @param {string} walletId
1676
+ * @param {CredentialRequest} [credentialRequest] A Verifiable Credential request: types and URL of the issuer
1677
+ * @param {*} [options] Override http request option.
1678
+ * @throws {RequiredError}
1679
+ */
1680
+ credentialRequestInit(walletId, credentialRequest, options) {
1681
+ var _a, _b, _c;
1682
+ return __awaiter(this, void 0, void 0, function* () {
1683
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.credentialRequestInit(walletId, credentialRequest, options);
1684
+ const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
1685
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.credentialRequestInit']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1686
+ return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
1687
+ });
1688
+ },
1689
+ /**
1690
+ * Revoke a specific Verifiable Credential
1689
1691
  * @param {string} credentialId Verifiable Credential Identifier
1690
1692
  * @param {string} walletId
1691
1693
  * @param {*} [options] Override http request option.
@@ -1722,12 +1724,12 @@ const DefaultApiFp = function (configuration) {
1722
1724
  * @param {*} [options] Override http request option.
1723
1725
  * @throws {RequiredError}
1724
1726
  */
1725
- getCurrentDid(walletId, options) {
1727
+ didGet(walletId, options) {
1726
1728
  var _a, _b, _c;
1727
1729
  return __awaiter(this, void 0, void 0, function* () {
1728
- const localVarAxiosArgs = yield localVarAxiosParamCreator.getCurrentDid(walletId, options);
1730
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.didGet(walletId, options);
1729
1731
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
1730
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.getCurrentDid']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1732
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.didGet']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1731
1733
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
1732
1734
  });
1733
1735
  },
@@ -1762,278 +1764,276 @@ const DefaultApiFp = function (configuration) {
1762
1764
  });
1763
1765
  },
1764
1766
  /**
1765
- * TBD
1767
+ * Presenting Verifiable Credentials after holder\'s consent.
1766
1768
  * @param {string} walletId
1769
+ * @param {string} interactionId
1770
+ * @param {InteractionAuthorizationConsent} [interactionAuthorizationConsent]
1767
1771
  * @param {*} [options] Override http request option.
1768
1772
  * @throws {RequiredError}
1769
1773
  */
1770
- insertIssuerProxy(walletId, options) {
1774
+ holderCredentialsPresentAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options) {
1771
1775
  var _a, _b, _c;
1772
1776
  return __awaiter(this, void 0, void 0, function* () {
1773
- const localVarAxiosArgs = yield localVarAxiosParamCreator.insertIssuerProxy(walletId, options);
1777
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.holderCredentialsPresentAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options);
1774
1778
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
1775
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.insertIssuerProxy']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1779
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.holderCredentialsPresentAfterConsent']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1776
1780
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
1777
1781
  });
1778
1782
  },
1779
1783
  /**
1780
- * Returns verifiable credential format and types that are supported by the issuer. - format: the verifiable credential format (for example \"jwt_vc\") - type: a list of strings that define supported verifiable credential type(s)
1781
- * @param {string} url
1784
+ * Responds to an ID token request
1785
+ * @param {string} walletId
1786
+ * @param {IdTokenSendRequest} [idTokenSendRequest]
1782
1787
  * @param {*} [options] Override http request option.
1783
1788
  * @throws {RequiredError}
1784
1789
  */
1785
- issuerCredentialTypesList(url, options) {
1790
+ holderIdTokenSend(walletId, idTokenSendRequest, options) {
1786
1791
  var _a, _b, _c;
1787
1792
  return __awaiter(this, void 0, void 0, function* () {
1788
- const localVarAxiosArgs = yield localVarAxiosParamCreator.issuerCredentialTypesList(url, options);
1793
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.holderIdTokenSend(walletId, idTokenSendRequest, options);
1789
1794
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
1790
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.issuerCredentialTypesList']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1795
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.holderIdTokenSend']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1791
1796
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
1792
1797
  });
1793
1798
  },
1794
1799
  /**
1795
- * Adds created Verifiable Credential draft to issuance queue for a specified client using authorized in-time or deferred flow.
1796
- * @param {string} credentialId
1800
+ * Issue the Verifiable Credential using OIDC4VCI offer acceptance
1797
1801
  * @param {string} walletId
1798
- * @param {IssuanceQueueCredentialAdd} [issuanceQueueCredentialAdd]
1802
+ * @param {VcOffer} [vcOffer] Offer URL and optional PIN for the request
1799
1803
  * @param {*} [options] Override http request option.
1800
1804
  * @throws {RequiredError}
1801
1805
  */
1802
- oidcAddCredToIssuanceQueue(credentialId, walletId, issuanceQueueCredentialAdd, options) {
1806
+ holderOfferPassAuthInfo(walletId, vcOffer, options) {
1803
1807
  var _a, _b, _c;
1804
1808
  return __awaiter(this, void 0, void 0, function* () {
1805
- const localVarAxiosArgs = yield localVarAxiosParamCreator.oidcAddCredToIssuanceQueue(credentialId, walletId, issuanceQueueCredentialAdd, options);
1809
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.holderOfferPassAuthInfo(walletId, vcOffer, options);
1806
1810
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
1807
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.oidcAddCredToIssuanceQueue']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1811
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.holderOfferPassAuthInfo']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1808
1812
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
1809
1813
  });
1810
1814
  },
1811
1815
  /**
1812
- * Creates an ID token request.
1816
+ * Gives consent to process credential offer specified by `interaction_id`
1813
1817
  * @param {string} walletId
1818
+ * @param {string} interactionId
1819
+ * @param {InteractionAuthorizationConsent} [interactionAuthorizationConsent]
1814
1820
  * @param {*} [options] Override http request option.
1815
1821
  * @throws {RequiredError}
1816
1822
  */
1817
- oidcCreateIdTokenRequest(walletId, options) {
1823
+ holderOfferProcessAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options) {
1818
1824
  var _a, _b, _c;
1819
1825
  return __awaiter(this, void 0, void 0, function* () {
1820
- const localVarAxiosArgs = yield localVarAxiosParamCreator.oidcCreateIdTokenRequest(walletId, options);
1826
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.holderOfferProcessAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options);
1821
1827
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
1822
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.oidcCreateIdTokenRequest']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1828
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.holderOfferProcessAfterConsent']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1823
1829
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
1824
1830
  });
1825
1831
  },
1826
1832
  /**
1827
- * Requests a credential issuance from the issuer and retrieves requirements for holder authorization.
1833
+ * Initiates a presentation of credentials to a verifier.
1828
1834
  * @param {string} walletId
1829
- * @param {CredentialRequest} [credentialRequest] A Verifiable Credential request: types and URL of the issuer
1835
+ * @param {PresentationRequest} [presentationRequest]
1830
1836
  * @param {*} [options] Override http request option.
1831
1837
  * @throws {RequiredError}
1832
1838
  */
1833
- oidcCredentialRequestInit(walletId, credentialRequest, options) {
1839
+ holderPresentPassAuthInfo(walletId, presentationRequest, options) {
1834
1840
  var _a, _b, _c;
1835
1841
  return __awaiter(this, void 0, void 0, function* () {
1836
- const localVarAxiosArgs = yield localVarAxiosParamCreator.oidcCredentialRequestInit(walletId, credentialRequest, options);
1842
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.holderPresentPassAuthInfo(walletId, presentationRequest, options);
1837
1843
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
1838
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.oidcCredentialRequestInit']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1844
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.holderPresentPassAuthInfo']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1839
1845
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
1840
1846
  });
1841
1847
  },
1842
1848
  /**
1843
- * Initiates issuing of the credential using the authorized deferred flow, in which the holder will receive credential asynchronously.
1849
+ * Creates an ID token request.
1844
1850
  * @param {string} walletId
1845
- * @param {InitAuthOffer} [initAuthOffer]
1846
1851
  * @param {*} [options] Override http request option.
1847
1852
  * @throws {RequiredError}
1848
1853
  */
1849
- oidcInitiateDeferred(walletId, initAuthOffer, options) {
1854
+ idTokenRequestCreate(walletId, options) {
1850
1855
  var _a, _b, _c;
1851
1856
  return __awaiter(this, void 0, void 0, function* () {
1852
- const localVarAxiosArgs = yield localVarAxiosParamCreator.oidcInitiateDeferred(walletId, initAuthOffer, options);
1857
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.idTokenRequestCreate(walletId, options);
1853
1858
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
1854
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.oidcInitiateDeferred']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1859
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.idTokenRequestCreate']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1855
1860
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
1856
1861
  });
1857
1862
  },
1858
1863
  /**
1859
- * Initiates issuing of the verifiable credential using authorized flow.
1860
- * @param {string} walletId
1861
- * @param {InitAuthOffer} [initAuthOffer]
1864
+ * Returns verifiable credential format and types that are supported by the issuer. - format: the verifiable credential format (for example \"jwt_vc\") - type: a list of strings that define supported verifiable credential type(s)
1865
+ * @param {string} url
1862
1866
  * @param {*} [options] Override http request option.
1863
1867
  * @throws {RequiredError}
1864
1868
  */
1865
- oidcInitiateIntime(walletId, initAuthOffer, options) {
1869
+ issuerCredentialTypesList(url, options) {
1866
1870
  var _a, _b, _c;
1867
1871
  return __awaiter(this, void 0, void 0, function* () {
1868
- const localVarAxiosArgs = yield localVarAxiosParamCreator.oidcInitiateIntime(walletId, initAuthOffer, options);
1872
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.issuerCredentialTypesList(url, options);
1869
1873
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
1870
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.oidcInitiateIntime']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1874
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.issuerCredentialTypesList']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1871
1875
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
1872
1876
  });
1873
1877
  },
1874
1878
  /**
1875
- * Initiates issuing of the verifiable credential using pre-authorized flow.
1879
+ * Initiates issuing of Verifiable Credentials using the authorized deferred flow, in which the holder will receive credential asynchronously.
1876
1880
  * @param {string} walletId
1877
- * @param {InitPreAuthOffer} [initPreAuthOffer]
1881
+ * @param {InitAuthOffer} [initAuthOffer]
1878
1882
  * @param {*} [options] Override http request option.
1879
1883
  * @throws {RequiredError}
1880
1884
  */
1881
- oidcInitiatePreauth(walletId, initPreAuthOffer, options) {
1885
+ issuerInitiateDeferred(walletId, initAuthOffer, options) {
1882
1886
  var _a, _b, _c;
1883
1887
  return __awaiter(this, void 0, void 0, function* () {
1884
- const localVarAxiosArgs = yield localVarAxiosParamCreator.oidcInitiatePreauth(walletId, initPreAuthOffer, options);
1888
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.issuerInitiateDeferred(walletId, initAuthOffer, options);
1885
1889
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
1886
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.oidcInitiatePreauth']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1890
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.issuerInitiateDeferred']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1887
1891
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
1888
1892
  });
1889
1893
  },
1890
1894
  /**
1891
- * Issue verifiable credential using OIDC4VCI offer acceptance
1895
+ * Initiates issuing of Verifiable Credentials using authorized flow.
1892
1896
  * @param {string} walletId
1893
- * @param {VcOffer} [vcOffer] Offer URL and optional PIN for the request
1897
+ * @param {InitAuthOffer} [initAuthOffer]
1894
1898
  * @param {*} [options] Override http request option.
1895
1899
  * @throws {RequiredError}
1896
1900
  */
1897
- oidcPassOfferAuthInfo(walletId, vcOffer, options) {
1901
+ issuerInitiateIntime(walletId, initAuthOffer, options) {
1898
1902
  var _a, _b, _c;
1899
1903
  return __awaiter(this, void 0, void 0, function* () {
1900
- const localVarAxiosArgs = yield localVarAxiosParamCreator.oidcPassOfferAuthInfo(walletId, vcOffer, options);
1904
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.issuerInitiateIntime(walletId, initAuthOffer, options);
1901
1905
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
1902
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.oidcPassOfferAuthInfo']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1906
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.issuerInitiateIntime']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1903
1907
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
1904
1908
  });
1905
1909
  },
1906
1910
  /**
1907
- *
1911
+ * Initiates issuing of Verifiable Credentials using pre-authorized flow.
1908
1912
  * @param {string} walletId
1909
- * @param {string} interactionId
1910
- * @param {InteractionAuthorizationConsent} [interactionAuthorizationConsent]
1913
+ * @param {InitPreAuthOffer} [initPreAuthOffer]
1911
1914
  * @param {*} [options] Override http request option.
1912
1915
  * @throws {RequiredError}
1913
1916
  */
1914
- oidcPresentCredentialsAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options) {
1917
+ issuerInitiatePreauth(walletId, initPreAuthOffer, options) {
1915
1918
  var _a, _b, _c;
1916
1919
  return __awaiter(this, void 0, void 0, function* () {
1917
- const localVarAxiosArgs = yield localVarAxiosParamCreator.oidcPresentCredentialsAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options);
1920
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.issuerInitiatePreauth(walletId, initPreAuthOffer, options);
1918
1921
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
1919
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.oidcPresentCredentialsAfterConsent']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1922
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.issuerInitiatePreauth']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1920
1923
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
1921
1924
  });
1922
1925
  },
1923
1926
  /**
1924
- * Initiates a presentation of credentials to a verifier.
1927
+ * Accredits a legal entity as RTAO or TAO.
1925
1928
  * @param {string} walletId
1926
- * @param {PresentationRequest} [presentationRequest]
1929
+ * @param {AccreditationRequest} [accreditationRequest]
1927
1930
  * @param {*} [options] Override http request option.
1928
1931
  * @throws {RequiredError}
1929
1932
  */
1930
- oidcPresentPassAuthInfo(walletId, presentationRequest, options) {
1933
+ tfAccreditAs(walletId, accreditationRequest, options) {
1931
1934
  var _a, _b, _c;
1932
1935
  return __awaiter(this, void 0, void 0, function* () {
1933
- const localVarAxiosArgs = yield localVarAxiosParamCreator.oidcPresentPassAuthInfo(walletId, presentationRequest, options);
1936
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.tfAccreditAs(walletId, accreditationRequest, options);
1934
1937
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
1935
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.oidcPresentPassAuthInfo']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1938
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.tfAccreditAs']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1936
1939
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
1937
1940
  });
1938
1941
  },
1939
1942
  /**
1940
- * Gives consent to process credential offer specified by `interaction_id`
1943
+ * Accredits the wallet as a trusted issuer.
1941
1944
  * @param {string} walletId
1942
- * @param {string} interactionId
1943
- * @param {InteractionAuthorizationConsent} [interactionAuthorizationConsent]
1944
1945
  * @param {*} [options] Override http request option.
1945
1946
  * @throws {RequiredError}
1946
1947
  */
1947
- oidcProcessOfferAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options) {
1948
+ tfAccreditAsTrustedIssuer(walletId, options) {
1948
1949
  var _a, _b, _c;
1949
1950
  return __awaiter(this, void 0, void 0, function* () {
1950
- const localVarAxiosArgs = yield localVarAxiosParamCreator.oidcProcessOfferAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options);
1951
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.tfAccreditAsTrustedIssuer(walletId, options);
1951
1952
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
1952
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.oidcProcessOfferAfterConsent']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1953
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.tfAccreditAsTrustedIssuer']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1953
1954
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
1954
1955
  });
1955
1956
  },
1956
1957
  /**
1957
- * Responds to an ID token request
1958
+ * Registers an issuer proxy used by EBSI for the credential status retrieval through EBSI network.
1958
1959
  * @param {string} walletId
1959
- * @param {IdTokenSendRequest} [idTokenSendRequest]
1960
1960
  * @param {*} [options] Override http request option.
1961
1961
  * @throws {RequiredError}
1962
1962
  */
1963
- oidcSendIdToken(walletId, idTokenSendRequest, options) {
1963
+ tfInsertIssuerProxy(walletId, options) {
1964
1964
  var _a, _b, _c;
1965
1965
  return __awaiter(this, void 0, void 0, function* () {
1966
- const localVarAxiosArgs = yield localVarAxiosParamCreator.oidcSendIdToken(walletId, idTokenSendRequest, options);
1966
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.tfInsertIssuerProxy(walletId, options);
1967
1967
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
1968
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.oidcSendIdToken']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1968
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.tfInsertIssuerProxy']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1969
1969
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
1970
1970
  });
1971
1971
  },
1972
1972
  /**
1973
- * Returns an url where verifier accepts presentations.
1973
+ * Onboards legal entity to the trust framework based on the wallet configuration.
1974
1974
  * @param {string} walletId
1975
- * @param {VerifyInitRequest} [verifyInitRequest]
1976
1975
  * @param {*} [options] Override http request option.
1977
1976
  * @throws {RequiredError}
1978
1977
  */
1979
- oidcVerifyInitUrl(walletId, verifyInitRequest, options) {
1978
+ tfOnboardLegalEntity(walletId, options) {
1980
1979
  var _a, _b, _c;
1981
1980
  return __awaiter(this, void 0, void 0, function* () {
1982
- const localVarAxiosArgs = yield localVarAxiosParamCreator.oidcVerifyInitUrl(walletId, verifyInitRequest, options);
1981
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.tfOnboardLegalEntity(walletId, options);
1983
1982
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
1984
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.oidcVerifyInitUrl']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1983
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.tfOnboardLegalEntity']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1985
1984
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
1986
1985
  });
1987
1986
  },
1988
1987
  /**
1989
- * TBD
1988
+ * Prepares another legal entity\'s wallet DID for accreditation.
1990
1989
  * @param {string} walletId
1990
+ * @param {PrepareToAccreditRequest} [prepareToAccreditRequest]
1991
1991
  * @param {*} [options] Override http request option.
1992
1992
  * @throws {RequiredError}
1993
1993
  */
1994
- onboardLegalEntity(walletId, options) {
1994
+ tfPrepareToAccredit(walletId, prepareToAccreditRequest, options) {
1995
1995
  var _a, _b, _c;
1996
1996
  return __awaiter(this, void 0, void 0, function* () {
1997
- const localVarAxiosArgs = yield localVarAxiosParamCreator.onboardLegalEntity(walletId, options);
1997
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.tfPrepareToAccredit(walletId, prepareToAccreditRequest, options);
1998
1998
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
1999
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.onboardLegalEntity']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
1999
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.tfPrepareToAccredit']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
2000
2000
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
2001
2001
  });
2002
2002
  },
2003
2003
  /**
2004
- * TBD
2004
+ * Revokes another legal entity\'s wallet DID accreditation.
2005
2005
  * @param {string} walletId
2006
2006
  * @param {PrepareToAccreditRequest} [prepareToAccreditRequest]
2007
2007
  * @param {*} [options] Override http request option.
2008
2008
  * @throws {RequiredError}
2009
2009
  */
2010
- prepareToAccredit(walletId, prepareToAccreditRequest, options) {
2010
+ tfRevokeAccreditation(walletId, prepareToAccreditRequest, options) {
2011
2011
  var _a, _b, _c;
2012
2012
  return __awaiter(this, void 0, void 0, function* () {
2013
- const localVarAxiosArgs = yield localVarAxiosParamCreator.prepareToAccredit(walletId, prepareToAccreditRequest, options);
2013
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.tfRevokeAccreditation(walletId, prepareToAccreditRequest, options);
2014
2014
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
2015
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.prepareToAccredit']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
2015
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.tfRevokeAccreditation']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
2016
2016
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
2017
2017
  });
2018
2018
  },
2019
2019
  /**
2020
- * TBD
2020
+ * Returns an url where verifier accepts presentations from a holder.
2021
2021
  * @param {string} walletId
2022
- * @param {PrepareToAccreditRequest} [prepareToAccreditRequest]
2022
+ * @param {VerifyInitRequest} [verifyInitRequest]
2023
2023
  * @param {*} [options] Override http request option.
2024
2024
  * @throws {RequiredError}
2025
2025
  */
2026
- revokeAccreditation(walletId, prepareToAccreditRequest, options) {
2026
+ verifierInitUrlCreate(walletId, verifyInitRequest, options) {
2027
2027
  var _a, _b, _c;
2028
2028
  return __awaiter(this, void 0, void 0, function* () {
2029
- const localVarAxiosArgs = yield localVarAxiosParamCreator.revokeAccreditation(walletId, prepareToAccreditRequest, options);
2029
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.verifierInitUrlCreate(walletId, verifyInitRequest, options);
2030
2030
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
2031
- const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.revokeAccreditation']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
2031
+ const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['DefaultApi.verifierInitUrlCreate']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
2032
2032
  return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
2033
2033
  });
2034
2034
  },
2035
2035
  /**
2036
- * The call will authenticate the client and create a new wallet that will be accessible only to the client.
2036
+ * Creates a new wallet for the authenticated client.
2037
2037
  * @param {Wallet} [wallet]
2038
2038
  * @param {*} [options] Override http request option.
2039
2039
  * @throws {RequiredError}
@@ -2200,26 +2200,18 @@ const DefaultApiFactory = function (configuration, basePath, axios) {
2200
2200
  const localVarFp = (0, exports.DefaultApiFp)(configuration);
2201
2201
  return {
2202
2202
  /**
2203
- * TBD
2204
- * @param {string} walletId
2205
- * @param {AccreditationRequest} [accreditationRequest]
2206
- * @param {*} [options] Override http request option.
2207
- * @throws {RequiredError}
2208
- */
2209
- accreditAs(walletId, accreditationRequest, options) {
2210
- return localVarFp.accreditAs(walletId, accreditationRequest, options).then((request) => request(axios, basePath));
2211
- },
2212
- /**
2213
- * TBD
2203
+ * Adds created Verifiable Credential draft to issuance queue for a specified client using authorized in-time or deferred flow.
2204
+ * @param {string} credentialId
2214
2205
  * @param {string} walletId
2206
+ * @param {IssuanceQueueCredentialAdd} [issuanceQueueCredentialAdd]
2215
2207
  * @param {*} [options] Override http request option.
2216
2208
  * @throws {RequiredError}
2217
2209
  */
2218
- accreditAsTrustedIssuer(walletId, options) {
2219
- return localVarFp.accreditAsTrustedIssuer(walletId, options).then((request) => request(axios, basePath));
2210
+ credentialAddToIssuanceQueue(credentialId, walletId, issuanceQueueCredentialAdd, options) {
2211
+ return localVarFp.credentialAddToIssuanceQueue(credentialId, walletId, issuanceQueueCredentialAdd, options).then((request) => request(axios, basePath));
2220
2212
  },
2221
2213
  /**
2222
- * Creates a new credential, which is always created in a draft state.
2214
+ * Creates a new draft credential.
2223
2215
  * @param {string} walletId
2224
2216
  * @param {CredentialPayload} [credentialPayload] A Verifiable Credential payload in JSON format.
2225
2217
  * @param {*} [options] Override http request option.
@@ -2287,7 +2279,17 @@ const DefaultApiFactory = function (configuration, basePath, axios) {
2287
2279
  return localVarFp.credentialPatch(credentialId, walletId, credentialPayload, options).then((request) => request(axios, basePath));
2288
2280
  },
2289
2281
  /**
2290
- *
2282
+ * Requests a credential issuance from the issuer and retrieves requirements for holder authorization.
2283
+ * @param {string} walletId
2284
+ * @param {CredentialRequest} [credentialRequest] A Verifiable Credential request: types and URL of the issuer
2285
+ * @param {*} [options] Override http request option.
2286
+ * @throws {RequiredError}
2287
+ */
2288
+ credentialRequestInit(walletId, credentialRequest, options) {
2289
+ return localVarFp.credentialRequestInit(walletId, credentialRequest, options).then((request) => request(axios, basePath));
2290
+ },
2291
+ /**
2292
+ * Revoke a specific Verifiable Credential
2291
2293
  * @param {string} credentialId Verifiable Credential Identifier
2292
2294
  * @param {string} walletId
2293
2295
  * @param {*} [options] Override http request option.
@@ -2312,8 +2314,8 @@ const DefaultApiFactory = function (configuration, basePath, axios) {
2312
2314
  * @param {*} [options] Override http request option.
2313
2315
  * @throws {RequiredError}
2314
2316
  */
2315
- getCurrentDid(walletId, options) {
2316
- return localVarFp.getCurrentDid(walletId, options).then((request) => request(axios, basePath));
2317
+ didGet(walletId, options) {
2318
+ return localVarFp.didGet(walletId, options).then((request) => request(axios, basePath));
2317
2319
  },
2318
2320
  /**
2319
2321
  *
@@ -2334,176 +2336,174 @@ const DefaultApiFactory = function (configuration, basePath, axios) {
2334
2336
  return localVarFp.holderCreateAuthOffer(walletId, holderAuthOfferCreationRequest, options).then((request) => request(axios, basePath));
2335
2337
  },
2336
2338
  /**
2337
- * TBD
2339
+ * Presenting Verifiable Credentials after holder\'s consent.
2338
2340
  * @param {string} walletId
2341
+ * @param {string} interactionId
2342
+ * @param {InteractionAuthorizationConsent} [interactionAuthorizationConsent]
2339
2343
  * @param {*} [options] Override http request option.
2340
2344
  * @throws {RequiredError}
2341
2345
  */
2342
- insertIssuerProxy(walletId, options) {
2343
- return localVarFp.insertIssuerProxy(walletId, options).then((request) => request(axios, basePath));
2346
+ holderCredentialsPresentAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options) {
2347
+ return localVarFp.holderCredentialsPresentAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options).then((request) => request(axios, basePath));
2344
2348
  },
2345
2349
  /**
2346
- * Returns verifiable credential format and types that are supported by the issuer. - format: the verifiable credential format (for example \"jwt_vc\") - type: a list of strings that define supported verifiable credential type(s)
2347
- * @param {string} url
2350
+ * Responds to an ID token request
2351
+ * @param {string} walletId
2352
+ * @param {IdTokenSendRequest} [idTokenSendRequest]
2348
2353
  * @param {*} [options] Override http request option.
2349
2354
  * @throws {RequiredError}
2350
2355
  */
2351
- issuerCredentialTypesList(url, options) {
2352
- return localVarFp.issuerCredentialTypesList(url, options).then((request) => request(axios, basePath));
2356
+ holderIdTokenSend(walletId, idTokenSendRequest, options) {
2357
+ return localVarFp.holderIdTokenSend(walletId, idTokenSendRequest, options).then((request) => request(axios, basePath));
2353
2358
  },
2354
2359
  /**
2355
- * Adds created Verifiable Credential draft to issuance queue for a specified client using authorized in-time or deferred flow.
2356
- * @param {string} credentialId
2360
+ * Issue the Verifiable Credential using OIDC4VCI offer acceptance
2357
2361
  * @param {string} walletId
2358
- * @param {IssuanceQueueCredentialAdd} [issuanceQueueCredentialAdd]
2362
+ * @param {VcOffer} [vcOffer] Offer URL and optional PIN for the request
2359
2363
  * @param {*} [options] Override http request option.
2360
2364
  * @throws {RequiredError}
2361
2365
  */
2362
- oidcAddCredToIssuanceQueue(credentialId, walletId, issuanceQueueCredentialAdd, options) {
2363
- return localVarFp.oidcAddCredToIssuanceQueue(credentialId, walletId, issuanceQueueCredentialAdd, options).then((request) => request(axios, basePath));
2366
+ holderOfferPassAuthInfo(walletId, vcOffer, options) {
2367
+ return localVarFp.holderOfferPassAuthInfo(walletId, vcOffer, options).then((request) => request(axios, basePath));
2364
2368
  },
2365
2369
  /**
2366
- * Creates an ID token request.
2370
+ * Gives consent to process credential offer specified by `interaction_id`
2367
2371
  * @param {string} walletId
2372
+ * @param {string} interactionId
2373
+ * @param {InteractionAuthorizationConsent} [interactionAuthorizationConsent]
2368
2374
  * @param {*} [options] Override http request option.
2369
2375
  * @throws {RequiredError}
2370
2376
  */
2371
- oidcCreateIdTokenRequest(walletId, options) {
2372
- return localVarFp.oidcCreateIdTokenRequest(walletId, options).then((request) => request(axios, basePath));
2377
+ holderOfferProcessAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options) {
2378
+ return localVarFp.holderOfferProcessAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options).then((request) => request(axios, basePath));
2373
2379
  },
2374
2380
  /**
2375
- * Requests a credential issuance from the issuer and retrieves requirements for holder authorization.
2381
+ * Initiates a presentation of credentials to a verifier.
2376
2382
  * @param {string} walletId
2377
- * @param {CredentialRequest} [credentialRequest] A Verifiable Credential request: types and URL of the issuer
2383
+ * @param {PresentationRequest} [presentationRequest]
2378
2384
  * @param {*} [options] Override http request option.
2379
2385
  * @throws {RequiredError}
2380
2386
  */
2381
- oidcCredentialRequestInit(walletId, credentialRequest, options) {
2382
- return localVarFp.oidcCredentialRequestInit(walletId, credentialRequest, options).then((request) => request(axios, basePath));
2387
+ holderPresentPassAuthInfo(walletId, presentationRequest, options) {
2388
+ return localVarFp.holderPresentPassAuthInfo(walletId, presentationRequest, options).then((request) => request(axios, basePath));
2383
2389
  },
2384
2390
  /**
2385
- * Initiates issuing of the credential using the authorized deferred flow, in which the holder will receive credential asynchronously.
2391
+ * Creates an ID token request.
2386
2392
  * @param {string} walletId
2387
- * @param {InitAuthOffer} [initAuthOffer]
2388
2393
  * @param {*} [options] Override http request option.
2389
2394
  * @throws {RequiredError}
2390
2395
  */
2391
- oidcInitiateDeferred(walletId, initAuthOffer, options) {
2392
- return localVarFp.oidcInitiateDeferred(walletId, initAuthOffer, options).then((request) => request(axios, basePath));
2396
+ idTokenRequestCreate(walletId, options) {
2397
+ return localVarFp.idTokenRequestCreate(walletId, options).then((request) => request(axios, basePath));
2393
2398
  },
2394
2399
  /**
2395
- * Initiates issuing of the verifiable credential using authorized flow.
2396
- * @param {string} walletId
2397
- * @param {InitAuthOffer} [initAuthOffer]
2400
+ * Returns verifiable credential format and types that are supported by the issuer. - format: the verifiable credential format (for example \"jwt_vc\") - type: a list of strings that define supported verifiable credential type(s)
2401
+ * @param {string} url
2398
2402
  * @param {*} [options] Override http request option.
2399
2403
  * @throws {RequiredError}
2400
2404
  */
2401
- oidcInitiateIntime(walletId, initAuthOffer, options) {
2402
- return localVarFp.oidcInitiateIntime(walletId, initAuthOffer, options).then((request) => request(axios, basePath));
2405
+ issuerCredentialTypesList(url, options) {
2406
+ return localVarFp.issuerCredentialTypesList(url, options).then((request) => request(axios, basePath));
2403
2407
  },
2404
2408
  /**
2405
- * Initiates issuing of the verifiable credential using pre-authorized flow.
2409
+ * Initiates issuing of Verifiable Credentials using the authorized deferred flow, in which the holder will receive credential asynchronously.
2406
2410
  * @param {string} walletId
2407
- * @param {InitPreAuthOffer} [initPreAuthOffer]
2411
+ * @param {InitAuthOffer} [initAuthOffer]
2408
2412
  * @param {*} [options] Override http request option.
2409
2413
  * @throws {RequiredError}
2410
2414
  */
2411
- oidcInitiatePreauth(walletId, initPreAuthOffer, options) {
2412
- return localVarFp.oidcInitiatePreauth(walletId, initPreAuthOffer, options).then((request) => request(axios, basePath));
2415
+ issuerInitiateDeferred(walletId, initAuthOffer, options) {
2416
+ return localVarFp.issuerInitiateDeferred(walletId, initAuthOffer, options).then((request) => request(axios, basePath));
2413
2417
  },
2414
2418
  /**
2415
- * Issue verifiable credential using OIDC4VCI offer acceptance
2419
+ * Initiates issuing of Verifiable Credentials using authorized flow.
2416
2420
  * @param {string} walletId
2417
- * @param {VcOffer} [vcOffer] Offer URL and optional PIN for the request
2421
+ * @param {InitAuthOffer} [initAuthOffer]
2418
2422
  * @param {*} [options] Override http request option.
2419
2423
  * @throws {RequiredError}
2420
2424
  */
2421
- oidcPassOfferAuthInfo(walletId, vcOffer, options) {
2422
- return localVarFp.oidcPassOfferAuthInfo(walletId, vcOffer, options).then((request) => request(axios, basePath));
2425
+ issuerInitiateIntime(walletId, initAuthOffer, options) {
2426
+ return localVarFp.issuerInitiateIntime(walletId, initAuthOffer, options).then((request) => request(axios, basePath));
2423
2427
  },
2424
2428
  /**
2425
- *
2429
+ * Initiates issuing of Verifiable Credentials using pre-authorized flow.
2426
2430
  * @param {string} walletId
2427
- * @param {string} interactionId
2428
- * @param {InteractionAuthorizationConsent} [interactionAuthorizationConsent]
2431
+ * @param {InitPreAuthOffer} [initPreAuthOffer]
2429
2432
  * @param {*} [options] Override http request option.
2430
2433
  * @throws {RequiredError}
2431
2434
  */
2432
- oidcPresentCredentialsAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options) {
2433
- return localVarFp.oidcPresentCredentialsAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options).then((request) => request(axios, basePath));
2435
+ issuerInitiatePreauth(walletId, initPreAuthOffer, options) {
2436
+ return localVarFp.issuerInitiatePreauth(walletId, initPreAuthOffer, options).then((request) => request(axios, basePath));
2434
2437
  },
2435
2438
  /**
2436
- * Initiates a presentation of credentials to a verifier.
2439
+ * Accredits a legal entity as RTAO or TAO.
2437
2440
  * @param {string} walletId
2438
- * @param {PresentationRequest} [presentationRequest]
2441
+ * @param {AccreditationRequest} [accreditationRequest]
2439
2442
  * @param {*} [options] Override http request option.
2440
2443
  * @throws {RequiredError}
2441
2444
  */
2442
- oidcPresentPassAuthInfo(walletId, presentationRequest, options) {
2443
- return localVarFp.oidcPresentPassAuthInfo(walletId, presentationRequest, options).then((request) => request(axios, basePath));
2445
+ tfAccreditAs(walletId, accreditationRequest, options) {
2446
+ return localVarFp.tfAccreditAs(walletId, accreditationRequest, options).then((request) => request(axios, basePath));
2444
2447
  },
2445
2448
  /**
2446
- * Gives consent to process credential offer specified by `interaction_id`
2449
+ * Accredits the wallet as a trusted issuer.
2447
2450
  * @param {string} walletId
2448
- * @param {string} interactionId
2449
- * @param {InteractionAuthorizationConsent} [interactionAuthorizationConsent]
2450
2451
  * @param {*} [options] Override http request option.
2451
2452
  * @throws {RequiredError}
2452
2453
  */
2453
- oidcProcessOfferAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options) {
2454
- return localVarFp.oidcProcessOfferAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options).then((request) => request(axios, basePath));
2454
+ tfAccreditAsTrustedIssuer(walletId, options) {
2455
+ return localVarFp.tfAccreditAsTrustedIssuer(walletId, options).then((request) => request(axios, basePath));
2455
2456
  },
2456
2457
  /**
2457
- * Responds to an ID token request
2458
+ * Registers an issuer proxy used by EBSI for the credential status retrieval through EBSI network.
2458
2459
  * @param {string} walletId
2459
- * @param {IdTokenSendRequest} [idTokenSendRequest]
2460
2460
  * @param {*} [options] Override http request option.
2461
2461
  * @throws {RequiredError}
2462
2462
  */
2463
- oidcSendIdToken(walletId, idTokenSendRequest, options) {
2464
- return localVarFp.oidcSendIdToken(walletId, idTokenSendRequest, options).then((request) => request(axios, basePath));
2463
+ tfInsertIssuerProxy(walletId, options) {
2464
+ return localVarFp.tfInsertIssuerProxy(walletId, options).then((request) => request(axios, basePath));
2465
2465
  },
2466
2466
  /**
2467
- * Returns an url where verifier accepts presentations.
2467
+ * Onboards legal entity to the trust framework based on the wallet configuration.
2468
2468
  * @param {string} walletId
2469
- * @param {VerifyInitRequest} [verifyInitRequest]
2470
2469
  * @param {*} [options] Override http request option.
2471
2470
  * @throws {RequiredError}
2472
2471
  */
2473
- oidcVerifyInitUrl(walletId, verifyInitRequest, options) {
2474
- return localVarFp.oidcVerifyInitUrl(walletId, verifyInitRequest, options).then((request) => request(axios, basePath));
2472
+ tfOnboardLegalEntity(walletId, options) {
2473
+ return localVarFp.tfOnboardLegalEntity(walletId, options).then((request) => request(axios, basePath));
2475
2474
  },
2476
2475
  /**
2477
- * TBD
2476
+ * Prepares another legal entity\'s wallet DID for accreditation.
2478
2477
  * @param {string} walletId
2478
+ * @param {PrepareToAccreditRequest} [prepareToAccreditRequest]
2479
2479
  * @param {*} [options] Override http request option.
2480
2480
  * @throws {RequiredError}
2481
2481
  */
2482
- onboardLegalEntity(walletId, options) {
2483
- return localVarFp.onboardLegalEntity(walletId, options).then((request) => request(axios, basePath));
2482
+ tfPrepareToAccredit(walletId, prepareToAccreditRequest, options) {
2483
+ return localVarFp.tfPrepareToAccredit(walletId, prepareToAccreditRequest, options).then((request) => request(axios, basePath));
2484
2484
  },
2485
2485
  /**
2486
- * TBD
2486
+ * Revokes another legal entity\'s wallet DID accreditation.
2487
2487
  * @param {string} walletId
2488
2488
  * @param {PrepareToAccreditRequest} [prepareToAccreditRequest]
2489
2489
  * @param {*} [options] Override http request option.
2490
2490
  * @throws {RequiredError}
2491
2491
  */
2492
- prepareToAccredit(walletId, prepareToAccreditRequest, options) {
2493
- return localVarFp.prepareToAccredit(walletId, prepareToAccreditRequest, options).then((request) => request(axios, basePath));
2492
+ tfRevokeAccreditation(walletId, prepareToAccreditRequest, options) {
2493
+ return localVarFp.tfRevokeAccreditation(walletId, prepareToAccreditRequest, options).then((request) => request(axios, basePath));
2494
2494
  },
2495
2495
  /**
2496
- * TBD
2496
+ * Returns an url where verifier accepts presentations from a holder.
2497
2497
  * @param {string} walletId
2498
- * @param {PrepareToAccreditRequest} [prepareToAccreditRequest]
2498
+ * @param {VerifyInitRequest} [verifyInitRequest]
2499
2499
  * @param {*} [options] Override http request option.
2500
2500
  * @throws {RequiredError}
2501
2501
  */
2502
- revokeAccreditation(walletId, prepareToAccreditRequest, options) {
2503
- return localVarFp.revokeAccreditation(walletId, prepareToAccreditRequest, options).then((request) => request(axios, basePath));
2502
+ verifierInitUrlCreate(walletId, verifyInitRequest, options) {
2503
+ return localVarFp.verifierInitUrlCreate(walletId, verifyInitRequest, options).then((request) => request(axios, basePath));
2504
2504
  },
2505
2505
  /**
2506
- * The call will authenticate the client and create a new wallet that will be accessible only to the client.
2506
+ * Creates a new wallet for the authenticated client.
2507
2507
  * @param {Wallet} [wallet]
2508
2508
  * @param {*} [options] Override http request option.
2509
2509
  * @throws {RequiredError}
@@ -2610,28 +2610,19 @@ exports.DefaultApiFactory = DefaultApiFactory;
2610
2610
  */
2611
2611
  class DefaultApi extends base_1.BaseAPI {
2612
2612
  /**
2613
- * TBD
2614
- * @param {string} walletId
2615
- * @param {AccreditationRequest} [accreditationRequest]
2616
- * @param {*} [options] Override http request option.
2617
- * @throws {RequiredError}
2618
- * @memberof DefaultApi
2619
- */
2620
- accreditAs(walletId, accreditationRequest, options) {
2621
- return (0, exports.DefaultApiFp)(this.configuration).accreditAs(walletId, accreditationRequest, options).then((request) => request(this.axios, this.basePath));
2622
- }
2623
- /**
2624
- * TBD
2613
+ * Adds created Verifiable Credential draft to issuance queue for a specified client using authorized in-time or deferred flow.
2614
+ * @param {string} credentialId
2625
2615
  * @param {string} walletId
2616
+ * @param {IssuanceQueueCredentialAdd} [issuanceQueueCredentialAdd]
2626
2617
  * @param {*} [options] Override http request option.
2627
2618
  * @throws {RequiredError}
2628
2619
  * @memberof DefaultApi
2629
2620
  */
2630
- accreditAsTrustedIssuer(walletId, options) {
2631
- return (0, exports.DefaultApiFp)(this.configuration).accreditAsTrustedIssuer(walletId, options).then((request) => request(this.axios, this.basePath));
2621
+ credentialAddToIssuanceQueue(credentialId, walletId, issuanceQueueCredentialAdd, options) {
2622
+ return (0, exports.DefaultApiFp)(this.configuration).credentialAddToIssuanceQueue(credentialId, walletId, issuanceQueueCredentialAdd, options).then((request) => request(this.axios, this.basePath));
2632
2623
  }
2633
2624
  /**
2634
- * Creates a new credential, which is always created in a draft state.
2625
+ * Creates a new draft credential.
2635
2626
  * @param {string} walletId
2636
2627
  * @param {CredentialPayload} [credentialPayload] A Verifiable Credential payload in JSON format.
2637
2628
  * @param {*} [options] Override http request option.
@@ -2705,7 +2696,18 @@ class DefaultApi extends base_1.BaseAPI {
2705
2696
  return (0, exports.DefaultApiFp)(this.configuration).credentialPatch(credentialId, walletId, credentialPayload, options).then((request) => request(this.axios, this.basePath));
2706
2697
  }
2707
2698
  /**
2708
- *
2699
+ * Requests a credential issuance from the issuer and retrieves requirements for holder authorization.
2700
+ * @param {string} walletId
2701
+ * @param {CredentialRequest} [credentialRequest] A Verifiable Credential request: types and URL of the issuer
2702
+ * @param {*} [options] Override http request option.
2703
+ * @throws {RequiredError}
2704
+ * @memberof DefaultApi
2705
+ */
2706
+ credentialRequestInit(walletId, credentialRequest, options) {
2707
+ return (0, exports.DefaultApiFp)(this.configuration).credentialRequestInit(walletId, credentialRequest, options).then((request) => request(this.axios, this.basePath));
2708
+ }
2709
+ /**
2710
+ * Revoke a specific Verifiable Credential
2709
2711
  * @param {string} credentialId Verifiable Credential Identifier
2710
2712
  * @param {string} walletId
2711
2713
  * @param {*} [options] Override http request option.
@@ -2733,8 +2735,8 @@ class DefaultApi extends base_1.BaseAPI {
2733
2735
  * @throws {RequiredError}
2734
2736
  * @memberof DefaultApi
2735
2737
  */
2736
- getCurrentDid(walletId, options) {
2737
- return (0, exports.DefaultApiFp)(this.configuration).getCurrentDid(walletId, options).then((request) => request(this.axios, this.basePath));
2738
+ didGet(walletId, options) {
2739
+ return (0, exports.DefaultApiFp)(this.configuration).didGet(walletId, options).then((request) => request(this.axios, this.basePath));
2738
2740
  }
2739
2741
  /**
2740
2742
  *
@@ -2757,193 +2759,191 @@ class DefaultApi extends base_1.BaseAPI {
2757
2759
  return (0, exports.DefaultApiFp)(this.configuration).holderCreateAuthOffer(walletId, holderAuthOfferCreationRequest, options).then((request) => request(this.axios, this.basePath));
2758
2760
  }
2759
2761
  /**
2760
- * TBD
2762
+ * Presenting Verifiable Credentials after holder\'s consent.
2761
2763
  * @param {string} walletId
2764
+ * @param {string} interactionId
2765
+ * @param {InteractionAuthorizationConsent} [interactionAuthorizationConsent]
2762
2766
  * @param {*} [options] Override http request option.
2763
2767
  * @throws {RequiredError}
2764
2768
  * @memberof DefaultApi
2765
2769
  */
2766
- insertIssuerProxy(walletId, options) {
2767
- return (0, exports.DefaultApiFp)(this.configuration).insertIssuerProxy(walletId, options).then((request) => request(this.axios, this.basePath));
2770
+ holderCredentialsPresentAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options) {
2771
+ return (0, exports.DefaultApiFp)(this.configuration).holderCredentialsPresentAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options).then((request) => request(this.axios, this.basePath));
2768
2772
  }
2769
2773
  /**
2770
- * Returns verifiable credential format and types that are supported by the issuer. - format: the verifiable credential format (for example \"jwt_vc\") - type: a list of strings that define supported verifiable credential type(s)
2771
- * @param {string} url
2774
+ * Responds to an ID token request
2775
+ * @param {string} walletId
2776
+ * @param {IdTokenSendRequest} [idTokenSendRequest]
2772
2777
  * @param {*} [options] Override http request option.
2773
2778
  * @throws {RequiredError}
2774
2779
  * @memberof DefaultApi
2775
2780
  */
2776
- issuerCredentialTypesList(url, options) {
2777
- return (0, exports.DefaultApiFp)(this.configuration).issuerCredentialTypesList(url, options).then((request) => request(this.axios, this.basePath));
2781
+ holderIdTokenSend(walletId, idTokenSendRequest, options) {
2782
+ return (0, exports.DefaultApiFp)(this.configuration).holderIdTokenSend(walletId, idTokenSendRequest, options).then((request) => request(this.axios, this.basePath));
2778
2783
  }
2779
2784
  /**
2780
- * Adds created Verifiable Credential draft to issuance queue for a specified client using authorized in-time or deferred flow.
2781
- * @param {string} credentialId
2785
+ * Issue the Verifiable Credential using OIDC4VCI offer acceptance
2782
2786
  * @param {string} walletId
2783
- * @param {IssuanceQueueCredentialAdd} [issuanceQueueCredentialAdd]
2787
+ * @param {VcOffer} [vcOffer] Offer URL and optional PIN for the request
2784
2788
  * @param {*} [options] Override http request option.
2785
2789
  * @throws {RequiredError}
2786
2790
  * @memberof DefaultApi
2787
2791
  */
2788
- oidcAddCredToIssuanceQueue(credentialId, walletId, issuanceQueueCredentialAdd, options) {
2789
- return (0, exports.DefaultApiFp)(this.configuration).oidcAddCredToIssuanceQueue(credentialId, walletId, issuanceQueueCredentialAdd, options).then((request) => request(this.axios, this.basePath));
2792
+ holderOfferPassAuthInfo(walletId, vcOffer, options) {
2793
+ return (0, exports.DefaultApiFp)(this.configuration).holderOfferPassAuthInfo(walletId, vcOffer, options).then((request) => request(this.axios, this.basePath));
2790
2794
  }
2791
2795
  /**
2792
- * Creates an ID token request.
2796
+ * Gives consent to process credential offer specified by `interaction_id`
2793
2797
  * @param {string} walletId
2798
+ * @param {string} interactionId
2799
+ * @param {InteractionAuthorizationConsent} [interactionAuthorizationConsent]
2794
2800
  * @param {*} [options] Override http request option.
2795
2801
  * @throws {RequiredError}
2796
2802
  * @memberof DefaultApi
2797
2803
  */
2798
- oidcCreateIdTokenRequest(walletId, options) {
2799
- return (0, exports.DefaultApiFp)(this.configuration).oidcCreateIdTokenRequest(walletId, options).then((request) => request(this.axios, this.basePath));
2804
+ holderOfferProcessAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options) {
2805
+ return (0, exports.DefaultApiFp)(this.configuration).holderOfferProcessAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options).then((request) => request(this.axios, this.basePath));
2800
2806
  }
2801
2807
  /**
2802
- * Requests a credential issuance from the issuer and retrieves requirements for holder authorization.
2808
+ * Initiates a presentation of credentials to a verifier.
2803
2809
  * @param {string} walletId
2804
- * @param {CredentialRequest} [credentialRequest] A Verifiable Credential request: types and URL of the issuer
2810
+ * @param {PresentationRequest} [presentationRequest]
2805
2811
  * @param {*} [options] Override http request option.
2806
2812
  * @throws {RequiredError}
2807
2813
  * @memberof DefaultApi
2808
2814
  */
2809
- oidcCredentialRequestInit(walletId, credentialRequest, options) {
2810
- return (0, exports.DefaultApiFp)(this.configuration).oidcCredentialRequestInit(walletId, credentialRequest, options).then((request) => request(this.axios, this.basePath));
2815
+ holderPresentPassAuthInfo(walletId, presentationRequest, options) {
2816
+ return (0, exports.DefaultApiFp)(this.configuration).holderPresentPassAuthInfo(walletId, presentationRequest, options).then((request) => request(this.axios, this.basePath));
2811
2817
  }
2812
2818
  /**
2813
- * Initiates issuing of the credential using the authorized deferred flow, in which the holder will receive credential asynchronously.
2819
+ * Creates an ID token request.
2814
2820
  * @param {string} walletId
2815
- * @param {InitAuthOffer} [initAuthOffer]
2816
2821
  * @param {*} [options] Override http request option.
2817
2822
  * @throws {RequiredError}
2818
2823
  * @memberof DefaultApi
2819
2824
  */
2820
- oidcInitiateDeferred(walletId, initAuthOffer, options) {
2821
- return (0, exports.DefaultApiFp)(this.configuration).oidcInitiateDeferred(walletId, initAuthOffer, options).then((request) => request(this.axios, this.basePath));
2825
+ idTokenRequestCreate(walletId, options) {
2826
+ return (0, exports.DefaultApiFp)(this.configuration).idTokenRequestCreate(walletId, options).then((request) => request(this.axios, this.basePath));
2822
2827
  }
2823
2828
  /**
2824
- * Initiates issuing of the verifiable credential using authorized flow.
2825
- * @param {string} walletId
2826
- * @param {InitAuthOffer} [initAuthOffer]
2829
+ * Returns verifiable credential format and types that are supported by the issuer. - format: the verifiable credential format (for example \"jwt_vc\") - type: a list of strings that define supported verifiable credential type(s)
2830
+ * @param {string} url
2827
2831
  * @param {*} [options] Override http request option.
2828
2832
  * @throws {RequiredError}
2829
2833
  * @memberof DefaultApi
2830
2834
  */
2831
- oidcInitiateIntime(walletId, initAuthOffer, options) {
2832
- return (0, exports.DefaultApiFp)(this.configuration).oidcInitiateIntime(walletId, initAuthOffer, options).then((request) => request(this.axios, this.basePath));
2835
+ issuerCredentialTypesList(url, options) {
2836
+ return (0, exports.DefaultApiFp)(this.configuration).issuerCredentialTypesList(url, options).then((request) => request(this.axios, this.basePath));
2833
2837
  }
2834
2838
  /**
2835
- * Initiates issuing of the verifiable credential using pre-authorized flow.
2839
+ * Initiates issuing of Verifiable Credentials using the authorized deferred flow, in which the holder will receive credential asynchronously.
2836
2840
  * @param {string} walletId
2837
- * @param {InitPreAuthOffer} [initPreAuthOffer]
2841
+ * @param {InitAuthOffer} [initAuthOffer]
2838
2842
  * @param {*} [options] Override http request option.
2839
2843
  * @throws {RequiredError}
2840
2844
  * @memberof DefaultApi
2841
2845
  */
2842
- oidcInitiatePreauth(walletId, initPreAuthOffer, options) {
2843
- return (0, exports.DefaultApiFp)(this.configuration).oidcInitiatePreauth(walletId, initPreAuthOffer, options).then((request) => request(this.axios, this.basePath));
2846
+ issuerInitiateDeferred(walletId, initAuthOffer, options) {
2847
+ return (0, exports.DefaultApiFp)(this.configuration).issuerInitiateDeferred(walletId, initAuthOffer, options).then((request) => request(this.axios, this.basePath));
2844
2848
  }
2845
2849
  /**
2846
- * Issue verifiable credential using OIDC4VCI offer acceptance
2850
+ * Initiates issuing of Verifiable Credentials using authorized flow.
2847
2851
  * @param {string} walletId
2848
- * @param {VcOffer} [vcOffer] Offer URL and optional PIN for the request
2852
+ * @param {InitAuthOffer} [initAuthOffer]
2849
2853
  * @param {*} [options] Override http request option.
2850
2854
  * @throws {RequiredError}
2851
2855
  * @memberof DefaultApi
2852
2856
  */
2853
- oidcPassOfferAuthInfo(walletId, vcOffer, options) {
2854
- return (0, exports.DefaultApiFp)(this.configuration).oidcPassOfferAuthInfo(walletId, vcOffer, options).then((request) => request(this.axios, this.basePath));
2857
+ issuerInitiateIntime(walletId, initAuthOffer, options) {
2858
+ return (0, exports.DefaultApiFp)(this.configuration).issuerInitiateIntime(walletId, initAuthOffer, options).then((request) => request(this.axios, this.basePath));
2855
2859
  }
2856
2860
  /**
2857
- *
2861
+ * Initiates issuing of Verifiable Credentials using pre-authorized flow.
2858
2862
  * @param {string} walletId
2859
- * @param {string} interactionId
2860
- * @param {InteractionAuthorizationConsent} [interactionAuthorizationConsent]
2863
+ * @param {InitPreAuthOffer} [initPreAuthOffer]
2861
2864
  * @param {*} [options] Override http request option.
2862
2865
  * @throws {RequiredError}
2863
2866
  * @memberof DefaultApi
2864
2867
  */
2865
- oidcPresentCredentialsAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options) {
2866
- return (0, exports.DefaultApiFp)(this.configuration).oidcPresentCredentialsAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options).then((request) => request(this.axios, this.basePath));
2868
+ issuerInitiatePreauth(walletId, initPreAuthOffer, options) {
2869
+ return (0, exports.DefaultApiFp)(this.configuration).issuerInitiatePreauth(walletId, initPreAuthOffer, options).then((request) => request(this.axios, this.basePath));
2867
2870
  }
2868
2871
  /**
2869
- * Initiates a presentation of credentials to a verifier.
2872
+ * Accredits a legal entity as RTAO or TAO.
2870
2873
  * @param {string} walletId
2871
- * @param {PresentationRequest} [presentationRequest]
2874
+ * @param {AccreditationRequest} [accreditationRequest]
2872
2875
  * @param {*} [options] Override http request option.
2873
2876
  * @throws {RequiredError}
2874
2877
  * @memberof DefaultApi
2875
2878
  */
2876
- oidcPresentPassAuthInfo(walletId, presentationRequest, options) {
2877
- return (0, exports.DefaultApiFp)(this.configuration).oidcPresentPassAuthInfo(walletId, presentationRequest, options).then((request) => request(this.axios, this.basePath));
2879
+ tfAccreditAs(walletId, accreditationRequest, options) {
2880
+ return (0, exports.DefaultApiFp)(this.configuration).tfAccreditAs(walletId, accreditationRequest, options).then((request) => request(this.axios, this.basePath));
2878
2881
  }
2879
2882
  /**
2880
- * Gives consent to process credential offer specified by `interaction_id`
2883
+ * Accredits the wallet as a trusted issuer.
2881
2884
  * @param {string} walletId
2882
- * @param {string} interactionId
2883
- * @param {InteractionAuthorizationConsent} [interactionAuthorizationConsent]
2884
2885
  * @param {*} [options] Override http request option.
2885
2886
  * @throws {RequiredError}
2886
2887
  * @memberof DefaultApi
2887
2888
  */
2888
- oidcProcessOfferAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options) {
2889
- return (0, exports.DefaultApiFp)(this.configuration).oidcProcessOfferAfterConsent(walletId, interactionId, interactionAuthorizationConsent, options).then((request) => request(this.axios, this.basePath));
2889
+ tfAccreditAsTrustedIssuer(walletId, options) {
2890
+ return (0, exports.DefaultApiFp)(this.configuration).tfAccreditAsTrustedIssuer(walletId, options).then((request) => request(this.axios, this.basePath));
2890
2891
  }
2891
2892
  /**
2892
- * Responds to an ID token request
2893
+ * Registers an issuer proxy used by EBSI for the credential status retrieval through EBSI network.
2893
2894
  * @param {string} walletId
2894
- * @param {IdTokenSendRequest} [idTokenSendRequest]
2895
2895
  * @param {*} [options] Override http request option.
2896
2896
  * @throws {RequiredError}
2897
2897
  * @memberof DefaultApi
2898
2898
  */
2899
- oidcSendIdToken(walletId, idTokenSendRequest, options) {
2900
- return (0, exports.DefaultApiFp)(this.configuration).oidcSendIdToken(walletId, idTokenSendRequest, options).then((request) => request(this.axios, this.basePath));
2899
+ tfInsertIssuerProxy(walletId, options) {
2900
+ return (0, exports.DefaultApiFp)(this.configuration).tfInsertIssuerProxy(walletId, options).then((request) => request(this.axios, this.basePath));
2901
2901
  }
2902
2902
  /**
2903
- * Returns an url where verifier accepts presentations.
2903
+ * Onboards legal entity to the trust framework based on the wallet configuration.
2904
2904
  * @param {string} walletId
2905
- * @param {VerifyInitRequest} [verifyInitRequest]
2906
2905
  * @param {*} [options] Override http request option.
2907
2906
  * @throws {RequiredError}
2908
2907
  * @memberof DefaultApi
2909
2908
  */
2910
- oidcVerifyInitUrl(walletId, verifyInitRequest, options) {
2911
- return (0, exports.DefaultApiFp)(this.configuration).oidcVerifyInitUrl(walletId, verifyInitRequest, options).then((request) => request(this.axios, this.basePath));
2909
+ tfOnboardLegalEntity(walletId, options) {
2910
+ return (0, exports.DefaultApiFp)(this.configuration).tfOnboardLegalEntity(walletId, options).then((request) => request(this.axios, this.basePath));
2912
2911
  }
2913
2912
  /**
2914
- * TBD
2913
+ * Prepares another legal entity\'s wallet DID for accreditation.
2915
2914
  * @param {string} walletId
2915
+ * @param {PrepareToAccreditRequest} [prepareToAccreditRequest]
2916
2916
  * @param {*} [options] Override http request option.
2917
2917
  * @throws {RequiredError}
2918
2918
  * @memberof DefaultApi
2919
2919
  */
2920
- onboardLegalEntity(walletId, options) {
2921
- return (0, exports.DefaultApiFp)(this.configuration).onboardLegalEntity(walletId, options).then((request) => request(this.axios, this.basePath));
2920
+ tfPrepareToAccredit(walletId, prepareToAccreditRequest, options) {
2921
+ return (0, exports.DefaultApiFp)(this.configuration).tfPrepareToAccredit(walletId, prepareToAccreditRequest, options).then((request) => request(this.axios, this.basePath));
2922
2922
  }
2923
2923
  /**
2924
- * TBD
2924
+ * Revokes another legal entity\'s wallet DID accreditation.
2925
2925
  * @param {string} walletId
2926
2926
  * @param {PrepareToAccreditRequest} [prepareToAccreditRequest]
2927
2927
  * @param {*} [options] Override http request option.
2928
2928
  * @throws {RequiredError}
2929
2929
  * @memberof DefaultApi
2930
2930
  */
2931
- prepareToAccredit(walletId, prepareToAccreditRequest, options) {
2932
- return (0, exports.DefaultApiFp)(this.configuration).prepareToAccredit(walletId, prepareToAccreditRequest, options).then((request) => request(this.axios, this.basePath));
2931
+ tfRevokeAccreditation(walletId, prepareToAccreditRequest, options) {
2932
+ return (0, exports.DefaultApiFp)(this.configuration).tfRevokeAccreditation(walletId, prepareToAccreditRequest, options).then((request) => request(this.axios, this.basePath));
2933
2933
  }
2934
2934
  /**
2935
- * TBD
2935
+ * Returns an url where verifier accepts presentations from a holder.
2936
2936
  * @param {string} walletId
2937
- * @param {PrepareToAccreditRequest} [prepareToAccreditRequest]
2937
+ * @param {VerifyInitRequest} [verifyInitRequest]
2938
2938
  * @param {*} [options] Override http request option.
2939
2939
  * @throws {RequiredError}
2940
2940
  * @memberof DefaultApi
2941
2941
  */
2942
- revokeAccreditation(walletId, prepareToAccreditRequest, options) {
2943
- return (0, exports.DefaultApiFp)(this.configuration).revokeAccreditation(walletId, prepareToAccreditRequest, options).then((request) => request(this.axios, this.basePath));
2942
+ verifierInitUrlCreate(walletId, verifyInitRequest, options) {
2943
+ return (0, exports.DefaultApiFp)(this.configuration).verifierInitUrlCreate(walletId, verifyInitRequest, options).then((request) => request(this.axios, this.basePath));
2944
2944
  }
2945
2945
  /**
2946
- * The call will authenticate the client and create a new wallet that will be accessible only to the client.
2946
+ * Creates a new wallet for the authenticated client.
2947
2947
  * @param {Wallet} [wallet]
2948
2948
  * @param {*} [options] Override http request option.
2949
2949
  * @throws {RequiredError}