@vess-id/mdl 0.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +179 -0
- package/README.md +181 -0
- package/lib/buffer_utils.d.ts +6 -0
- package/lib/buffer_utils.js +36 -0
- package/lib/cbor/DataItem.d.ts +26 -0
- package/lib/cbor/DataItem.js +77 -0
- package/lib/cbor/index.d.ts +15 -0
- package/lib/cbor/index.js +73 -0
- package/lib/cose/coseKey.d.ts +14 -0
- package/lib/cose/coseKey.js +36 -0
- package/lib/index.d.ts +12 -0
- package/lib/index.js +28 -0
- package/lib/mdoc/IssuerSignedItem.d.ts +18 -0
- package/lib/mdoc/IssuerSignedItem.js +101 -0
- package/lib/mdoc/Verifier.d.ts +33 -0
- package/lib/mdoc/Verifier.js +405 -0
- package/lib/mdoc/checkCallback.d.ts +49 -0
- package/lib/mdoc/checkCallback.js +63 -0
- package/lib/mdoc/errors.d.ts +7 -0
- package/lib/mdoc/errors.js +21 -0
- package/lib/mdoc/model/DeviceResponse.d.ts +120 -0
- package/lib/mdoc/model/DeviceResponse.js +295 -0
- package/lib/mdoc/model/DeviceSignedDocument.d.ts +20 -0
- package/lib/mdoc/model/DeviceSignedDocument.js +50 -0
- package/lib/mdoc/model/Document.d.ts +75 -0
- package/lib/mdoc/model/Document.js +249 -0
- package/lib/mdoc/model/IssuerAuth.d.ts +17 -0
- package/lib/mdoc/model/IssuerAuth.js +72 -0
- package/lib/mdoc/model/IssuerSignedDocument.d.ts +29 -0
- package/lib/mdoc/model/IssuerSignedDocument.js +49 -0
- package/lib/mdoc/model/MDoc.d.ts +21 -0
- package/lib/mdoc/model/MDoc.js +34 -0
- package/lib/mdoc/model/PresentationDefinition.d.ts +21 -0
- package/lib/mdoc/model/PresentationDefinition.js +3 -0
- package/lib/mdoc/model/types.d.ts +110 -0
- package/lib/mdoc/model/types.js +3 -0
- package/lib/mdoc/parser.d.ts +8 -0
- package/lib/mdoc/parser.js +88 -0
- package/lib/mdoc/utils.d.ts +17 -0
- package/lib/mdoc/utils.js +145 -0
- package/package.json +82 -0
|
@@ -0,0 +1,49 @@
|
|
|
1
|
+
export declare const VerificationAssessmentId: {
|
|
2
|
+
readonly ISSUER_AUTH: {
|
|
3
|
+
readonly IssuerCertificateValidity: "ISSUER_CERTIFICATE_VALIDITY";
|
|
4
|
+
readonly IssuerSignatureValidity: "ISSUER_SIGNATURE_VALIDITY";
|
|
5
|
+
readonly MsoSignedDateWithinCertificateValidity: "MSO_SIGNED_DATE_WITHIN_CERTIFICATE_VALIDITY";
|
|
6
|
+
readonly MsoValidityAtVerificationTime: "MSO_VALIDITY_AT_VERIFICATION_TIME";
|
|
7
|
+
readonly IssuerSubjectCountryNamePresence: "ISSUER_SUBJECT_COUNTRY_NAME_PRESENCE";
|
|
8
|
+
};
|
|
9
|
+
readonly DEVICE_AUTH: {
|
|
10
|
+
readonly DocumentDeviceSignaturePresence: "DOCUMENT_DEVICE_SIGNATURE_PRESENCE";
|
|
11
|
+
readonly DeviceAuthSignatureOrMacPresence: "DEVICE_AUTH_SIGNATURE_OR_MAC_PRESENCE";
|
|
12
|
+
readonly SessionTranscriptProvided: "SESSION_TRANSCRIPT_PROVIDED";
|
|
13
|
+
readonly DeviceKeyAvailableInIssuerAuth: "DEVICE_KEY_AVAILABLE_IN_ISSUERAUTH";
|
|
14
|
+
readonly DeviceSignatureValidity: "DEVICE_SIGNATURE_VALIDITY";
|
|
15
|
+
readonly DeviceMacPresence: "DEVICE_MAC_PRESENCE";
|
|
16
|
+
readonly DeviceMacAlgorithmCorrectness: "DEVICE_MAC_ALGORITHM_CORRECTNESS";
|
|
17
|
+
readonly EphemeralKeyPresence: "EPHEMERAL_KEY_PRESENCE";
|
|
18
|
+
readonly DeviceMacValidity: "DEVICE_MAC_VALIDITY";
|
|
19
|
+
};
|
|
20
|
+
readonly DATA_INTEGRITY: {
|
|
21
|
+
readonly IssuerAuthDigestAlgorithmSupported: "ISSUER_AUTH_DIGEST_ALGORITHM_SUPPORTED";
|
|
22
|
+
readonly IssuerAuthNamespaceDigestPresence: "ISSUER_AUTH_NAMESPACE_DIGEST_PRESENCE";
|
|
23
|
+
readonly AttributeDigestMatch: "ATTRIBUTE_DIGEST_MATCH";
|
|
24
|
+
readonly IssuingCountryMatchesCertificate: "ISSUING_COUNTRY_MATCHES_CERTIFICATE";
|
|
25
|
+
readonly IssuingJurisdictionMatchesCertificate: "ISSUING_JURISDICTION_MATCHES_CERTIFICATE";
|
|
26
|
+
};
|
|
27
|
+
readonly DOCUMENT_FORMAT: {
|
|
28
|
+
readonly DeviceResponseVersionPresence: "DEVICE_RESPONSE_VERSION_PRESENCE";
|
|
29
|
+
readonly DeviceResponseVersionSupported: "DEVICE_RESPONSE_VERSION_SUPPORTED";
|
|
30
|
+
readonly DeviceResponseDocumentPresence: "DEVICE_RESPONSE_DOCUMENT_PRESENCE";
|
|
31
|
+
};
|
|
32
|
+
};
|
|
33
|
+
export type VerificationAssessment = {
|
|
34
|
+
status: 'PASSED' | 'FAILED' | 'WARNING';
|
|
35
|
+
check: string;
|
|
36
|
+
reason?: string;
|
|
37
|
+
} & {
|
|
38
|
+
[C in keyof typeof VerificationAssessmentId]: {
|
|
39
|
+
category: C;
|
|
40
|
+
id: typeof VerificationAssessmentId[C][keyof typeof VerificationAssessmentId[C]];
|
|
41
|
+
};
|
|
42
|
+
}[keyof typeof VerificationAssessmentId];
|
|
43
|
+
export type VerificationCallback = (item: VerificationAssessment) => void;
|
|
44
|
+
export type UserDefinedVerificationCallback = (item: VerificationAssessment, original: VerificationCallback) => void;
|
|
45
|
+
export declare const defaultCallback: VerificationCallback;
|
|
46
|
+
export declare const buildCallback: (callback?: UserDefinedVerificationCallback) => VerificationCallback;
|
|
47
|
+
export declare const onCatCheck: <C extends keyof typeof VerificationAssessmentId>(onCheck: UserDefinedVerificationCallback, category: C) => (item: Omit<Extract<VerificationAssessment, {
|
|
48
|
+
category: C;
|
|
49
|
+
}>, "category">) => void;
|
|
@@ -0,0 +1,63 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
+
};
|
|
5
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
+
exports.onCatCheck = exports.buildCallback = exports.defaultCallback = exports.VerificationAssessmentId = void 0;
|
|
7
|
+
const debug_1 = __importDefault(require("debug"));
|
|
8
|
+
const errors_1 = require("./errors");
|
|
9
|
+
const log = (0, debug_1.default)('mdl');
|
|
10
|
+
exports.VerificationAssessmentId = {
|
|
11
|
+
ISSUER_AUTH: {
|
|
12
|
+
IssuerCertificateValidity: 'ISSUER_CERTIFICATE_VALIDITY',
|
|
13
|
+
IssuerSignatureValidity: 'ISSUER_SIGNATURE_VALIDITY',
|
|
14
|
+
MsoSignedDateWithinCertificateValidity: 'MSO_SIGNED_DATE_WITHIN_CERTIFICATE_VALIDITY',
|
|
15
|
+
MsoValidityAtVerificationTime: 'MSO_VALIDITY_AT_VERIFICATION_TIME',
|
|
16
|
+
IssuerSubjectCountryNamePresence: 'ISSUER_SUBJECT_COUNTRY_NAME_PRESENCE',
|
|
17
|
+
},
|
|
18
|
+
DEVICE_AUTH: {
|
|
19
|
+
DocumentDeviceSignaturePresence: 'DOCUMENT_DEVICE_SIGNATURE_PRESENCE',
|
|
20
|
+
DeviceAuthSignatureOrMacPresence: 'DEVICE_AUTH_SIGNATURE_OR_MAC_PRESENCE',
|
|
21
|
+
SessionTranscriptProvided: 'SESSION_TRANSCRIPT_PROVIDED',
|
|
22
|
+
DeviceKeyAvailableInIssuerAuth: 'DEVICE_KEY_AVAILABLE_IN_ISSUERAUTH',
|
|
23
|
+
DeviceSignatureValidity: 'DEVICE_SIGNATURE_VALIDITY',
|
|
24
|
+
DeviceMacPresence: 'DEVICE_MAC_PRESENCE',
|
|
25
|
+
DeviceMacAlgorithmCorrectness: 'DEVICE_MAC_ALGORITHM_CORRECTNESS',
|
|
26
|
+
EphemeralKeyPresence: 'EPHEMERAL_KEY_PRESENCE',
|
|
27
|
+
DeviceMacValidity: 'DEVICE_MAC_VALIDITY',
|
|
28
|
+
},
|
|
29
|
+
DATA_INTEGRITY: {
|
|
30
|
+
IssuerAuthDigestAlgorithmSupported: 'ISSUER_AUTH_DIGEST_ALGORITHM_SUPPORTED',
|
|
31
|
+
IssuerAuthNamespaceDigestPresence: 'ISSUER_AUTH_NAMESPACE_DIGEST_PRESENCE',
|
|
32
|
+
AttributeDigestMatch: 'ATTRIBUTE_DIGEST_MATCH',
|
|
33
|
+
IssuingCountryMatchesCertificate: 'ISSUING_COUNTRY_MATCHES_CERTIFICATE',
|
|
34
|
+
IssuingJurisdictionMatchesCertificate: 'ISSUING_JURISDICTION_MATCHES_CERTIFICATE',
|
|
35
|
+
},
|
|
36
|
+
DOCUMENT_FORMAT: {
|
|
37
|
+
DeviceResponseVersionPresence: 'DEVICE_RESPONSE_VERSION_PRESENCE',
|
|
38
|
+
DeviceResponseVersionSupported: 'DEVICE_RESPONSE_VERSION_SUPPORTED',
|
|
39
|
+
DeviceResponseDocumentPresence: 'DEVICE_RESPONSE_DOCUMENT_PRESENCE',
|
|
40
|
+
},
|
|
41
|
+
};
|
|
42
|
+
exports.defaultCallback = ((verification) => {
|
|
43
|
+
log(`Verification: ${verification.check} => ${verification.status}`);
|
|
44
|
+
if (verification.status !== 'FAILED')
|
|
45
|
+
return;
|
|
46
|
+
throw new errors_1.MDLError(verification.reason ?? verification.check, verification.id);
|
|
47
|
+
});
|
|
48
|
+
const buildCallback = (callback) => {
|
|
49
|
+
if (typeof callback === 'undefined') {
|
|
50
|
+
return exports.defaultCallback;
|
|
51
|
+
}
|
|
52
|
+
return (item) => {
|
|
53
|
+
callback(item, exports.defaultCallback);
|
|
54
|
+
};
|
|
55
|
+
};
|
|
56
|
+
exports.buildCallback = buildCallback;
|
|
57
|
+
const onCatCheck = (onCheck, category) => {
|
|
58
|
+
return (item) => {
|
|
59
|
+
onCheck({ ...item, category }, exports.defaultCallback);
|
|
60
|
+
};
|
|
61
|
+
};
|
|
62
|
+
exports.onCatCheck = onCatCheck;
|
|
63
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiY2hlY2tDYWxsYmFjay5qcyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uL3NyYy9tZG9jL2NoZWNrQ2FsbGJhY2sudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7Ozs7O0FBQUEsa0RBQTBCO0FBQzFCLHFDQUFvQztBQUVwQyxNQUFNLEdBQUcsR0FBRyxJQUFBLGVBQUssRUFBQyxLQUFLLENBQUMsQ0FBQztBQUVaLFFBQUEsd0JBQXdCLEdBQUc7SUFDdEMsV0FBVyxFQUFFO1FBQ1gseUJBQXlCLEVBQUUsNkJBQTZCO1FBQ3hELHVCQUF1QixFQUFFLDJCQUEyQjtRQUNwRCxzQ0FBc0MsRUFBRSw2Q0FBNkM7UUFDckYsNkJBQTZCLEVBQUUsbUNBQW1DO1FBQ2xFLGdDQUFnQyxFQUFFLHNDQUFzQztLQUN6RTtJQUVELFdBQVcsRUFBRTtRQUNYLCtCQUErQixFQUFFLG9DQUFvQztRQUNyRSxnQ0FBZ0MsRUFBRSx1Q0FBdUM7UUFDekUseUJBQXlCLEVBQUUsNkJBQTZCO1FBQ3hELDhCQUE4QixFQUFFLG9DQUFvQztRQUNwRSx1QkFBdUIsRUFBRSwyQkFBMkI7UUFDcEQsaUJBQWlCLEVBQUUscUJBQXFCO1FBQ3hDLDZCQUE2QixFQUFFLGtDQUFrQztRQUNqRSxvQkFBb0IsRUFBRSx3QkFBd0I7UUFDOUMsaUJBQWlCLEVBQUUscUJBQXFCO0tBQ3pDO0lBRUQsY0FBYyxFQUFFO1FBQ2Qsa0NBQWtDLEVBQUUsd0NBQXdDO1FBQzVFLGlDQUFpQyxFQUFFLHVDQUF1QztRQUMxRSxvQkFBb0IsRUFBRSx3QkFBd0I7UUFDOUMsZ0NBQWdDLEVBQUUscUNBQXFDO1FBQ3ZFLHFDQUFxQyxFQUFFLDBDQUEwQztLQUNsRjtJQUVELGVBQWUsRUFBRTtRQUNmLDZCQUE2QixFQUFFLGtDQUFrQztRQUNqRSw4QkFBOEIsRUFBRSxtQ0FBbUM7UUFDbkUsOEJBQThCLEVBQUUsbUNBQW1DO0tBQ3BFO0NBQ08sQ0FBQztBQWdCRSxRQUFBLGVBQWUsR0FBeUIsQ0FBQyxDQUFDLFlBQVksRUFBRSxFQUFFO0lBQ3JFLEdBQUcsQ0FBQyxpQkFBaUIsWUFBWSxDQUFDLEtBQUssT0FBTyxZQUFZLENBQUMsTUFBTSxFQUFFLENBQUMsQ0FBQztJQUNyRSxJQUFJLFlBQVksQ0FBQyxNQUFNLEtBQUssUUFBUTtRQUFFLE9BQU87SUFDN0MsTUFBTSxJQUFJLGlCQUFRLENBQUMsWUFBWSxDQUFDLE1BQU0sSUFBSSxZQUFZLENBQUMsS0FBSyxFQUFFLFlBQVksQ0FBQyxFQUFFLENBQUMsQ0FBQztBQUNqRixDQUFDLENBQUMsQ0FBQztBQUVJLE1BQU0sYUFBYSxHQUFHLENBQUMsUUFBMEMsRUFBd0IsRUFBRTtJQUNoRyxJQUFJLE9BQU8sUUFBUSxLQUFLLFdBQVcsRUFBRSxDQUFDO1FBQUMsT0FBTyx1QkFBZSxDQUFDO0lBQUMsQ0FBQztJQUNoRSxPQUFPLENBQUMsSUFBNEIsRUFBRSxFQUFFO1FBQ3RDLFFBQVEsQ0FBQyxJQUFJLEVBQUUsdUJBQWUsQ0FBQyxDQUFDO0lBQ2xDLENBQUMsQ0FBQztBQUNKLENBQUMsQ0FBQztBQUxXLFFBQUEsYUFBYSxpQkFLeEI7QUFFSyxNQUFNLFVBQVUsR0FBRyxDQUFrRCxPQUF3QyxFQUFFLFFBQVcsRUFBRSxFQUFFO0lBQ25JLE9BQU8sQ0FBQyxJQUF3RSxFQUFFLEVBQUU7UUFDbEYsT0FBTyxDQUFDLEVBQUUsR0FBRyxJQUFJLEVBQUUsUUFBUSxFQUE0QixFQUFFLHVCQUFlLENBQUMsQ0FBQztJQUM1RSxDQUFDLENBQUM7QUFDSixDQUFDLENBQUM7QUFKVyxRQUFBLFVBQVUsY0FJckIifQ==
|
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.MDLParseError = exports.MDLError = void 0;
|
|
4
|
+
class MDLError extends Error {
|
|
5
|
+
constructor(message, code) {
|
|
6
|
+
super(message);
|
|
7
|
+
this.name = new.target.name;
|
|
8
|
+
this.code = code;
|
|
9
|
+
Object.setPrototypeOf(this, new.target.prototype);
|
|
10
|
+
}
|
|
11
|
+
}
|
|
12
|
+
exports.MDLError = MDLError;
|
|
13
|
+
class MDLParseError extends Error {
|
|
14
|
+
constructor(message) {
|
|
15
|
+
super(message);
|
|
16
|
+
this.name = new.target.name;
|
|
17
|
+
Object.setPrototypeOf(this, new.target.prototype);
|
|
18
|
+
}
|
|
19
|
+
}
|
|
20
|
+
exports.MDLParseError = MDLParseError;
|
|
21
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1,120 @@
|
|
|
1
|
+
import * as jose from 'jose';
|
|
2
|
+
import { Buffer } from 'buffer';
|
|
3
|
+
import { PresentationDefinition } from './PresentationDefinition';
|
|
4
|
+
import { MDoc } from './MDoc';
|
|
5
|
+
import { MacSupportedAlgs, SupportedAlgs } from './types';
|
|
6
|
+
/**
|
|
7
|
+
* A builder class for creating a device response.
|
|
8
|
+
*/
|
|
9
|
+
export declare class DeviceResponse {
|
|
10
|
+
private mdoc;
|
|
11
|
+
private pd;
|
|
12
|
+
private sessionTranscriptBytes;
|
|
13
|
+
private useMac;
|
|
14
|
+
private devicePrivateKey;
|
|
15
|
+
deviceResponseCbor: Buffer;
|
|
16
|
+
nameSpaces: Record<string, Record<string, any>>;
|
|
17
|
+
private alg;
|
|
18
|
+
private macAlg;
|
|
19
|
+
private ephemeralPublicKey;
|
|
20
|
+
/**
|
|
21
|
+
* Create a DeviceResponse builder.
|
|
22
|
+
*
|
|
23
|
+
* @param {MDoc | Uint8Array} mdoc - The mdoc to use as a base for the device response.
|
|
24
|
+
* It can be either a parsed MDoc or a CBOR encoded MDoc.
|
|
25
|
+
* @returns {DeviceResponse} - A DeviceResponse builder.
|
|
26
|
+
*/
|
|
27
|
+
static from(mdoc: MDoc | Uint8Array): DeviceResponse;
|
|
28
|
+
constructor(mdoc: MDoc);
|
|
29
|
+
/**
|
|
30
|
+
*
|
|
31
|
+
* @param pd - The presentation definition to use for the device response.
|
|
32
|
+
* @returns {DeviceResponse}
|
|
33
|
+
*/
|
|
34
|
+
usingPresentationDefinition(pd: PresentationDefinition): DeviceResponse;
|
|
35
|
+
/**
|
|
36
|
+
* Set the session transcript data to use for the device response with the given handover data.
|
|
37
|
+
* this is a shortcut to calling {@link usingSessionTranscriptBytes}(`<cbor encoding of [null, null, handover] in a Tagged 24 structure>`),
|
|
38
|
+
* which is what the OID4VP protocol expects.
|
|
39
|
+
*
|
|
40
|
+
* @deprecated Use {@link usingSessionTranscriptForOID4VP} instead.
|
|
41
|
+
* @param {string[]} handover - The handover data to use in the session transcript.
|
|
42
|
+
* @returns {DeviceResponse}
|
|
43
|
+
*/
|
|
44
|
+
usingHandover(handover: string[]): DeviceResponse;
|
|
45
|
+
/**
|
|
46
|
+
* Set the session transcript data to use for the device response.
|
|
47
|
+
*
|
|
48
|
+
* This is arbitrary and should match the session transcript as it will be calculated by the verifier.
|
|
49
|
+
* The transcript must be a CBOR encoded DataItem of an array, there is no further requirement.
|
|
50
|
+
*
|
|
51
|
+
* Example: `usingSessionTranscriptBytes(cborEncode(DataItem.fromData([a,b,c])))` where `a`, `b` and `c` can be anything including `null`.
|
|
52
|
+
*
|
|
53
|
+
* It is preferable to use {@link usingSessionTranscriptForOID4VP} or {@link usingSessionTranscriptForWebAPI} when possible.
|
|
54
|
+
*
|
|
55
|
+
* @param {Buffer} sessionTranscriptBytes - The sessionTranscriptBytes data to use in the session transcript.
|
|
56
|
+
* @returns {DeviceResponse}
|
|
57
|
+
*/
|
|
58
|
+
usingSessionTranscriptBytes(sessionTranscriptBytes: Buffer): DeviceResponse;
|
|
59
|
+
/**
|
|
60
|
+
* Set the session transcript data to use for the device response as defined in ISO/IEC 18013-7 in Annex B (OID4VP), 2023 draft.
|
|
61
|
+
*
|
|
62
|
+
* This should match the session transcript as it will be calculated by the verifier.
|
|
63
|
+
*
|
|
64
|
+
* @param {string} mdocGeneratedNonce - A cryptographically random number with sufficient entropy.
|
|
65
|
+
* @param {string} clientId - The client_id Authorization Request parameter from the Authorization Request Object.
|
|
66
|
+
* @param {string} responseUri - The response_uri Authorization Request parameter from the Authorization Request Object.
|
|
67
|
+
* @param {string} verifierGeneratedNonce - The nonce Authorization Request parameter from the Authorization Request Object.
|
|
68
|
+
* @returns {DeviceResponse}
|
|
69
|
+
*/
|
|
70
|
+
usingSessionTranscriptForOID4VP(mdocGeneratedNonce: string, clientId: string, responseUri: string, verifierGeneratedNonce: string): DeviceResponse;
|
|
71
|
+
/**
|
|
72
|
+
* Set the session transcript data to use for the device response as defined in ISO/IEC 18013-7 in Annex A (Web API), 2023 draft.
|
|
73
|
+
*
|
|
74
|
+
* This should match the session transcript as it will be calculated by the verifier.
|
|
75
|
+
*
|
|
76
|
+
* @param {Buffer} deviceEngagementBytes - The device engagement, encoded as a Tagged 24 cbor
|
|
77
|
+
* @param {Buffer} readerEngagementBytes - The reader engagement, encoded as a Tagged 24 cbor
|
|
78
|
+
* @param {Buffer} eReaderKeyBytes - The reader ephemeral public key as a COSE Key, encoded as a Tagged 24 cbor
|
|
79
|
+
* @returns {DeviceResponse}
|
|
80
|
+
*/
|
|
81
|
+
usingSessionTranscriptForWebAPI(deviceEngagementBytes: Buffer, readerEngagementBytes: Buffer, eReaderKeyBytes: Buffer): DeviceResponse;
|
|
82
|
+
/**
|
|
83
|
+
* Add a name space to the device response.
|
|
84
|
+
*
|
|
85
|
+
* @param {string} nameSpace - The name space to add to the device response.
|
|
86
|
+
* @param {Record<string, any>} data - The data to add to the name space.
|
|
87
|
+
* @returns {DeviceResponse}
|
|
88
|
+
*/
|
|
89
|
+
addDeviceNameSpace(nameSpace: string, data: Record<string, any>): DeviceResponse;
|
|
90
|
+
/**
|
|
91
|
+
* Set the device's private key to be used for signing the device response.
|
|
92
|
+
*
|
|
93
|
+
* @param {jose.JWK | Uint8Array} devicePrivateKey - The device's private key either as a JWK or a COSEKey.
|
|
94
|
+
* @param {SupportedAlgs} alg - The algorithm to use for signing the device response.
|
|
95
|
+
* @returns {DeviceResponse}
|
|
96
|
+
*/
|
|
97
|
+
authenticateWithSignature(devicePrivateKey: jose.JWK | Uint8Array, alg: SupportedAlgs): DeviceResponse;
|
|
98
|
+
/**
|
|
99
|
+
* Set the reader shared key to be used for signing the device response with MAC.
|
|
100
|
+
*
|
|
101
|
+
* @param {jose.JWK | Uint8Array} devicePrivateKey - The device's private key either as a JWK or a COSEKey.
|
|
102
|
+
* @param {Uint8Array} ephemeralPublicKey - The public part of the ephemeral key generated by the MDOC.
|
|
103
|
+
* @param {SupportedAlgs} alg - The algorithm to use for signing the device response.
|
|
104
|
+
* @returns {DeviceResponse}
|
|
105
|
+
*/
|
|
106
|
+
authenticateWithMAC(devicePrivateKey: jose.JWK | Uint8Array, ephemeralPublicKey: Uint8Array, alg: MacSupportedAlgs): DeviceResponse;
|
|
107
|
+
/**
|
|
108
|
+
* Sign the device response and return the MDoc.
|
|
109
|
+
*
|
|
110
|
+
* @returns {Promise<MDoc>} - The device response as an MDoc.
|
|
111
|
+
*/
|
|
112
|
+
sign(): Promise<MDoc>;
|
|
113
|
+
private handleInputDescriptor;
|
|
114
|
+
private getDeviceSigned;
|
|
115
|
+
private getDeviceAuthMac;
|
|
116
|
+
private getDeviceAuthSign;
|
|
117
|
+
private prepareNamespaces;
|
|
118
|
+
private prepareDigest;
|
|
119
|
+
private handleAgeOverNN;
|
|
120
|
+
}
|
|
@@ -0,0 +1,295 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.DeviceResponse = void 0;
|
|
4
|
+
const cose_kit_1 = require("cose-kit");
|
|
5
|
+
const buffer_1 = require("buffer");
|
|
6
|
+
const MDoc_1 = require("./MDoc");
|
|
7
|
+
const DeviceSignedDocument_1 = require("./DeviceSignedDocument");
|
|
8
|
+
const parser_1 = require("../parser");
|
|
9
|
+
const utils_1 = require("../utils");
|
|
10
|
+
const cbor_1 = require("../../cbor");
|
|
11
|
+
/**
|
|
12
|
+
* A builder class for creating a device response.
|
|
13
|
+
*/
|
|
14
|
+
class DeviceResponse {
|
|
15
|
+
/**
|
|
16
|
+
* Create a DeviceResponse builder.
|
|
17
|
+
*
|
|
18
|
+
* @param {MDoc | Uint8Array} mdoc - The mdoc to use as a base for the device response.
|
|
19
|
+
* It can be either a parsed MDoc or a CBOR encoded MDoc.
|
|
20
|
+
* @returns {DeviceResponse} - A DeviceResponse builder.
|
|
21
|
+
*/
|
|
22
|
+
static from(mdoc) {
|
|
23
|
+
if (mdoc instanceof Uint8Array) {
|
|
24
|
+
return new DeviceResponse((0, parser_1.parse)(mdoc));
|
|
25
|
+
}
|
|
26
|
+
return new DeviceResponse(mdoc);
|
|
27
|
+
}
|
|
28
|
+
constructor(mdoc) {
|
|
29
|
+
this.useMac = true;
|
|
30
|
+
this.nameSpaces = {};
|
|
31
|
+
this.mdoc = mdoc;
|
|
32
|
+
}
|
|
33
|
+
/**
|
|
34
|
+
*
|
|
35
|
+
* @param pd - The presentation definition to use for the device response.
|
|
36
|
+
* @returns {DeviceResponse}
|
|
37
|
+
*/
|
|
38
|
+
usingPresentationDefinition(pd) {
|
|
39
|
+
if (!pd.input_descriptors.length) {
|
|
40
|
+
throw new Error('The Presentation Definition must have at least one Input Descriptor object.');
|
|
41
|
+
}
|
|
42
|
+
const hasDuplicates = pd.input_descriptors.some((id1, idx) => pd.input_descriptors.findIndex((id2) => id2.id === id1.id) !== idx);
|
|
43
|
+
if (hasDuplicates) {
|
|
44
|
+
throw new Error('Each Input Descriptor object must have a unique id property.');
|
|
45
|
+
}
|
|
46
|
+
this.pd = pd;
|
|
47
|
+
return this;
|
|
48
|
+
}
|
|
49
|
+
/**
|
|
50
|
+
* Set the session transcript data to use for the device response with the given handover data.
|
|
51
|
+
* this is a shortcut to calling {@link usingSessionTranscriptBytes}(`<cbor encoding of [null, null, handover] in a Tagged 24 structure>`),
|
|
52
|
+
* which is what the OID4VP protocol expects.
|
|
53
|
+
*
|
|
54
|
+
* @deprecated Use {@link usingSessionTranscriptForOID4VP} instead.
|
|
55
|
+
* @param {string[]} handover - The handover data to use in the session transcript.
|
|
56
|
+
* @returns {DeviceResponse}
|
|
57
|
+
*/
|
|
58
|
+
usingHandover(handover) {
|
|
59
|
+
this.usingSessionTranscriptBytes((0, cbor_1.cborEncode)(cbor_1.DataItem.fromData([
|
|
60
|
+
null, // deviceEngagementBytes
|
|
61
|
+
null, // eReaderKeyBytes
|
|
62
|
+
handover
|
|
63
|
+
])));
|
|
64
|
+
return this;
|
|
65
|
+
}
|
|
66
|
+
/**
|
|
67
|
+
* Set the session transcript data to use for the device response.
|
|
68
|
+
*
|
|
69
|
+
* This is arbitrary and should match the session transcript as it will be calculated by the verifier.
|
|
70
|
+
* The transcript must be a CBOR encoded DataItem of an array, there is no further requirement.
|
|
71
|
+
*
|
|
72
|
+
* Example: `usingSessionTranscriptBytes(cborEncode(DataItem.fromData([a,b,c])))` where `a`, `b` and `c` can be anything including `null`.
|
|
73
|
+
*
|
|
74
|
+
* It is preferable to use {@link usingSessionTranscriptForOID4VP} or {@link usingSessionTranscriptForWebAPI} when possible.
|
|
75
|
+
*
|
|
76
|
+
* @param {Buffer} sessionTranscriptBytes - The sessionTranscriptBytes data to use in the session transcript.
|
|
77
|
+
* @returns {DeviceResponse}
|
|
78
|
+
*/
|
|
79
|
+
usingSessionTranscriptBytes(sessionTranscriptBytes) {
|
|
80
|
+
if (this.sessionTranscriptBytes) {
|
|
81
|
+
throw new Error('A session transcript has already been set, either with .usingSessionTranscriptForOID4VP, .usingSessionTranscriptForWebAPI or .usingSessionTranscriptBytes');
|
|
82
|
+
}
|
|
83
|
+
this.sessionTranscriptBytes = sessionTranscriptBytes;
|
|
84
|
+
return this;
|
|
85
|
+
}
|
|
86
|
+
/**
|
|
87
|
+
* Set the session transcript data to use for the device response as defined in ISO/IEC 18013-7 in Annex B (OID4VP), 2023 draft.
|
|
88
|
+
*
|
|
89
|
+
* This should match the session transcript as it will be calculated by the verifier.
|
|
90
|
+
*
|
|
91
|
+
* @param {string} mdocGeneratedNonce - A cryptographically random number with sufficient entropy.
|
|
92
|
+
* @param {string} clientId - The client_id Authorization Request parameter from the Authorization Request Object.
|
|
93
|
+
* @param {string} responseUri - The response_uri Authorization Request parameter from the Authorization Request Object.
|
|
94
|
+
* @param {string} verifierGeneratedNonce - The nonce Authorization Request parameter from the Authorization Request Object.
|
|
95
|
+
* @returns {DeviceResponse}
|
|
96
|
+
*/
|
|
97
|
+
usingSessionTranscriptForOID4VP(mdocGeneratedNonce, clientId, responseUri, verifierGeneratedNonce) {
|
|
98
|
+
this.usingSessionTranscriptBytes((0, cbor_1.cborEncode)(cbor_1.DataItem.fromData([
|
|
99
|
+
null, // deviceEngagementBytes
|
|
100
|
+
null, // eReaderKeyBytes
|
|
101
|
+
[mdocGeneratedNonce, clientId, responseUri, verifierGeneratedNonce],
|
|
102
|
+
])));
|
|
103
|
+
return this;
|
|
104
|
+
}
|
|
105
|
+
/**
|
|
106
|
+
* Set the session transcript data to use for the device response as defined in ISO/IEC 18013-7 in Annex A (Web API), 2023 draft.
|
|
107
|
+
*
|
|
108
|
+
* This should match the session transcript as it will be calculated by the verifier.
|
|
109
|
+
*
|
|
110
|
+
* @param {Buffer} deviceEngagementBytes - The device engagement, encoded as a Tagged 24 cbor
|
|
111
|
+
* @param {Buffer} readerEngagementBytes - The reader engagement, encoded as a Tagged 24 cbor
|
|
112
|
+
* @param {Buffer} eReaderKeyBytes - The reader ephemeral public key as a COSE Key, encoded as a Tagged 24 cbor
|
|
113
|
+
* @returns {DeviceResponse}
|
|
114
|
+
*/
|
|
115
|
+
usingSessionTranscriptForWebAPI(deviceEngagementBytes, readerEngagementBytes, eReaderKeyBytes) {
|
|
116
|
+
this.usingSessionTranscriptBytes((0, cbor_1.cborEncode)(cbor_1.DataItem.fromData([
|
|
117
|
+
new cbor_1.DataItem({ buffer: deviceEngagementBytes }),
|
|
118
|
+
new cbor_1.DataItem({ buffer: eReaderKeyBytes }),
|
|
119
|
+
readerEngagementBytes,
|
|
120
|
+
])));
|
|
121
|
+
return this;
|
|
122
|
+
}
|
|
123
|
+
/**
|
|
124
|
+
* Add a name space to the device response.
|
|
125
|
+
*
|
|
126
|
+
* @param {string} nameSpace - The name space to add to the device response.
|
|
127
|
+
* @param {Record<string, any>} data - The data to add to the name space.
|
|
128
|
+
* @returns {DeviceResponse}
|
|
129
|
+
*/
|
|
130
|
+
addDeviceNameSpace(nameSpace, data) {
|
|
131
|
+
this.nameSpaces[nameSpace] = data;
|
|
132
|
+
return this;
|
|
133
|
+
}
|
|
134
|
+
/**
|
|
135
|
+
* Set the device's private key to be used for signing the device response.
|
|
136
|
+
*
|
|
137
|
+
* @param {jose.JWK | Uint8Array} devicePrivateKey - The device's private key either as a JWK or a COSEKey.
|
|
138
|
+
* @param {SupportedAlgs} alg - The algorithm to use for signing the device response.
|
|
139
|
+
* @returns {DeviceResponse}
|
|
140
|
+
*/
|
|
141
|
+
authenticateWithSignature(devicePrivateKey, alg) {
|
|
142
|
+
if (devicePrivateKey instanceof Uint8Array) {
|
|
143
|
+
this.devicePrivateKey = devicePrivateKey;
|
|
144
|
+
}
|
|
145
|
+
else {
|
|
146
|
+
this.devicePrivateKey = (0, cose_kit_1.COSEKeyFromJWK)(devicePrivateKey);
|
|
147
|
+
}
|
|
148
|
+
this.alg = alg;
|
|
149
|
+
this.useMac = false;
|
|
150
|
+
return this;
|
|
151
|
+
}
|
|
152
|
+
/**
|
|
153
|
+
* Set the reader shared key to be used for signing the device response with MAC.
|
|
154
|
+
*
|
|
155
|
+
* @param {jose.JWK | Uint8Array} devicePrivateKey - The device's private key either as a JWK or a COSEKey.
|
|
156
|
+
* @param {Uint8Array} ephemeralPublicKey - The public part of the ephemeral key generated by the MDOC.
|
|
157
|
+
* @param {SupportedAlgs} alg - The algorithm to use for signing the device response.
|
|
158
|
+
* @returns {DeviceResponse}
|
|
159
|
+
*/
|
|
160
|
+
authenticateWithMAC(devicePrivateKey, ephemeralPublicKey, alg) {
|
|
161
|
+
if (devicePrivateKey instanceof Uint8Array) {
|
|
162
|
+
this.devicePrivateKey = devicePrivateKey;
|
|
163
|
+
}
|
|
164
|
+
else {
|
|
165
|
+
this.devicePrivateKey = (0, cose_kit_1.COSEKeyFromJWK)(devicePrivateKey);
|
|
166
|
+
}
|
|
167
|
+
this.ephemeralPublicKey = ephemeralPublicKey;
|
|
168
|
+
this.macAlg = alg;
|
|
169
|
+
this.useMac = true;
|
|
170
|
+
return this;
|
|
171
|
+
}
|
|
172
|
+
/**
|
|
173
|
+
* Sign the device response and return the MDoc.
|
|
174
|
+
*
|
|
175
|
+
* @returns {Promise<MDoc>} - The device response as an MDoc.
|
|
176
|
+
*/
|
|
177
|
+
async sign() {
|
|
178
|
+
if (!this.pd)
|
|
179
|
+
throw new Error('Must provide a presentation definition with .usingPresentationDefinition()');
|
|
180
|
+
if (!this.sessionTranscriptBytes)
|
|
181
|
+
throw new Error('Must provide the session transcript with either .usingSessionTranscriptForOID4VP, .usingSessionTranscriptForWebAPI or .usingSessionTranscriptBytes');
|
|
182
|
+
const docs = await Promise.all(this.pd.input_descriptors.map((id) => this.handleInputDescriptor(id)));
|
|
183
|
+
return new MDoc_1.MDoc(docs);
|
|
184
|
+
}
|
|
185
|
+
async handleInputDescriptor(id) {
|
|
186
|
+
const document = (this.mdoc.documents || []).find((d) => d.docType === id.id);
|
|
187
|
+
if (!document) {
|
|
188
|
+
// TODO; probl need to create a DocumentError here, but let's just throw for now
|
|
189
|
+
throw new Error(`The mdoc does not have a document with DocType "${id.id}"`);
|
|
190
|
+
}
|
|
191
|
+
const nameSpaces = await this.prepareNamespaces(id, document);
|
|
192
|
+
return new DeviceSignedDocument_1.DeviceSignedDocument(document.docType, {
|
|
193
|
+
nameSpaces,
|
|
194
|
+
issuerAuth: document.issuerSigned.issuerAuth,
|
|
195
|
+
}, await this.getDeviceSigned(document.docType));
|
|
196
|
+
}
|
|
197
|
+
async getDeviceSigned(docType) {
|
|
198
|
+
const deviceAuthenticationBytes = (0, utils_1.calculateDeviceAutenticationBytes)(this.sessionTranscriptBytes, docType, this.nameSpaces);
|
|
199
|
+
const deviceSigned = {
|
|
200
|
+
nameSpaces: this.nameSpaces,
|
|
201
|
+
deviceAuth: this.useMac
|
|
202
|
+
? await this.getDeviceAuthMac(deviceAuthenticationBytes, this.sessionTranscriptBytes)
|
|
203
|
+
: await this.getDeviceAuthSign(deviceAuthenticationBytes),
|
|
204
|
+
};
|
|
205
|
+
return deviceSigned;
|
|
206
|
+
}
|
|
207
|
+
async getDeviceAuthMac(deviceAuthenticationBytes, sessionTranscriptBytes) {
|
|
208
|
+
const { kid } = (0, cose_kit_1.COSEKeyToJWK)(this.devicePrivateKey);
|
|
209
|
+
const ephemeralMacKey = await (0, utils_1.calculateEphemeralMacKey)(this.devicePrivateKey, this.ephemeralPublicKey, sessionTranscriptBytes);
|
|
210
|
+
const mac = await cose_kit_1.Mac0.create({ alg: this.macAlg }, { kid }, deviceAuthenticationBytes, ephemeralMacKey);
|
|
211
|
+
return { deviceMac: mac };
|
|
212
|
+
}
|
|
213
|
+
async getDeviceAuthSign(cborData) {
|
|
214
|
+
if (!this.devicePrivateKey)
|
|
215
|
+
throw new Error('Missing devicePrivateKey');
|
|
216
|
+
const key = await (0, cose_kit_1.importCOSEKey)(this.devicePrivateKey);
|
|
217
|
+
const { kid } = (0, cose_kit_1.COSEKeyToJWK)(this.devicePrivateKey);
|
|
218
|
+
const deviceSignature = await cose_kit_1.Sign1.sign({ alg: this.alg }, { kid }, buffer_1.Buffer.from(cborData), key);
|
|
219
|
+
return { deviceSignature };
|
|
220
|
+
}
|
|
221
|
+
async prepareNamespaces(id, document) {
|
|
222
|
+
const requestedFields = id.constraints.fields;
|
|
223
|
+
const nameSpaces = {};
|
|
224
|
+
for await (const field of requestedFields) {
|
|
225
|
+
const result = await this.prepareDigest(field.path, document);
|
|
226
|
+
if (!result) {
|
|
227
|
+
// TODO: Do we add an entry to DocumentErrors if not found?
|
|
228
|
+
console.log(`No matching field found for ${field.path}`);
|
|
229
|
+
continue;
|
|
230
|
+
}
|
|
231
|
+
const { nameSpace, digest } = result;
|
|
232
|
+
if (!nameSpaces[nameSpace])
|
|
233
|
+
nameSpaces[nameSpace] = [];
|
|
234
|
+
nameSpaces[nameSpace].push(digest);
|
|
235
|
+
}
|
|
236
|
+
return nameSpaces;
|
|
237
|
+
}
|
|
238
|
+
async prepareDigest(paths, document) {
|
|
239
|
+
/**
|
|
240
|
+
* path looks like this: "$['org.iso.18013.5.1']['family_name']"
|
|
241
|
+
* the regex creates two groups with contents between "['" and "']"
|
|
242
|
+
* the second entry in each group contains the result without the "'[" or "']"
|
|
243
|
+
*/
|
|
244
|
+
for (const path of paths) {
|
|
245
|
+
// eslint-disable-next-line @typescript-eslint/no-unused-vars
|
|
246
|
+
const [[_1, nameSpace], [_2, elementIdentifier]] = [...path.matchAll(/\['(.*?)'\]/g)];
|
|
247
|
+
if (!nameSpace)
|
|
248
|
+
throw new Error(`Failed to parse namespace from path "${path}"`);
|
|
249
|
+
if (!elementIdentifier)
|
|
250
|
+
throw new Error(`Failed to parse elementIdentifier from path "${path}"`);
|
|
251
|
+
const nsAttrs = document.issuerSigned.nameSpaces[nameSpace] || [];
|
|
252
|
+
const digest = nsAttrs.find((d) => d.elementIdentifier === elementIdentifier);
|
|
253
|
+
if (elementIdentifier.startsWith('age_over_')) {
|
|
254
|
+
return this.handleAgeOverNN(elementIdentifier, nameSpace, nsAttrs);
|
|
255
|
+
}
|
|
256
|
+
if (digest) {
|
|
257
|
+
return {
|
|
258
|
+
nameSpace,
|
|
259
|
+
digest,
|
|
260
|
+
};
|
|
261
|
+
}
|
|
262
|
+
}
|
|
263
|
+
return null;
|
|
264
|
+
}
|
|
265
|
+
handleAgeOverNN(request, nameSpace, attributes) {
|
|
266
|
+
const ageOverList = attributes
|
|
267
|
+
.map((a, i) => {
|
|
268
|
+
const { elementIdentifier: key, elementValue: value } = a;
|
|
269
|
+
return { key, value, index: i };
|
|
270
|
+
})
|
|
271
|
+
.filter((i) => i.key.startsWith('age_over_'))
|
|
272
|
+
.map((i) => ({
|
|
273
|
+
nn: parseInt(i.key.replace('age_over_', ''), 10),
|
|
274
|
+
...i,
|
|
275
|
+
}))
|
|
276
|
+
.sort((a, b) => a.nn - b.nn);
|
|
277
|
+
const reqNN = parseInt(request.replace('age_over_', ''), 10);
|
|
278
|
+
let item;
|
|
279
|
+
// Find nearest TRUE
|
|
280
|
+
item = ageOverList.filter((i) => i.value === true && i.nn >= reqNN)?.[0];
|
|
281
|
+
if (!item) {
|
|
282
|
+
// Find the nearest False
|
|
283
|
+
item = ageOverList.sort((a, b) => b.nn - a.nn).filter((i) => i.value === false && i.nn <= reqNN)?.[0];
|
|
284
|
+
}
|
|
285
|
+
if (!item) {
|
|
286
|
+
return null;
|
|
287
|
+
}
|
|
288
|
+
return {
|
|
289
|
+
nameSpace,
|
|
290
|
+
digest: attributes[item.index],
|
|
291
|
+
};
|
|
292
|
+
}
|
|
293
|
+
}
|
|
294
|
+
exports.DeviceResponse = DeviceResponse;
|
|
295
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"DeviceResponse.js","sourceRoot":"","sources":["../../../src/mdoc/model/DeviceResponse.ts"],"names":[],"mappings":";;;AACA,uCAAoF;AACpF,mCAAgC;AAEhC,iCAA8B;AAG9B,iEAA8D;AAE9D,sCAAkC;AAClC,oCAAuF;AACvF,qCAAkD;AAGlD;;GAEG;AACH,MAAa,cAAc;IAYzB;;;;;;OAMG;IACI,MAAM,CAAC,IAAI,CAAC,IAAuB;QACxC,IAAI,IAAI,YAAY,UAAU,EAAE,CAAC;YAC/B,OAAO,IAAI,cAAc,CAAC,IAAA,cAAK,EAAC,IAAI,CAAC,CAAC,CAAC;QACzC,CAAC;QACD,OAAO,IAAI,cAAc,CAAC,IAAI,CAAC,CAAC;IAClC,CAAC;IAED,YAAY,IAAU;QAtBd,WAAM,GAAG,IAAI,CAAC;QAGf,eAAU,GAAwC,EAAE,CAAC;QAoB1D,IAAI,CAAC,IAAI,GAAG,IAAI,CAAC;IACnB,CAAC;IAED;;;;OAIG;IACI,2BAA2B,CAAC,EAA0B;QAC3D,IAAI,CAAC,EAAE,CAAC,iBAAiB,CAAC,MAAM,EAAE,CAAC;YACjC,MAAM,IAAI,KAAK,CAAC,6EAA6E,CAAC,CAAC;QACjG,CAAC;QAED,MAAM,aAAa,GAAG,EAAE,CAAC,iBAAiB,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,GAAG,EAAE,EAAE,CAAC,EAAE,CAAC,iBAAiB,CAAC,SAAS,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,EAAE,KAAK,GAAG,CAAC,EAAE,CAAC,KAAK,GAAG,CAAC,CAAC;QAClI,IAAI,aAAa,EAAE,CAAC;YAClB,MAAM,IAAI,KAAK,CAAC,8DAA8D,CAAC,CAAC;QAClF,CAAC;QAED,IAAI,CAAC,EAAE,GAAG,EAAE,CAAC;QACb,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;;;;;OAQG;IACI,aAAa,CAAC,QAAkB;QACrC,IAAI,CAAC,2BAA2B,CAAC,IAAA,iBAAU,EAAC,eAAQ,CAAC,QAAQ,CAAC;YAC5D,IAAI,EAAE,wBAAwB;YAC9B,IAAI,EAAE,kBAAkB;YACxB,QAAQ;SAAC,CAAC,CAAC,CAAC,CAAC;QACf,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;;;;;;;;;OAYG;IACI,2BAA2B,CAAC,sBAA8B;QAC/D,IAAI,IAAI,CAAC,sBAAsB,EAAE,CAAC;YAChC,MAAM,IAAI,KAAK,CACb,2JAA2J,CAC5J,CAAC;QACJ,CAAC;QACD,IAAI,CAAC,sBAAsB,GAAG,sBAAsB,CAAC;QACrD,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;;;;;;;OAUG;IACI,+BAA+B,CACpC,kBAA0B,EAC1B,QAAgB,EAChB,WAAmB,EACnB,sBAA8B;QAE9B,IAAI,CAAC,2BAA2B,CAC9B,IAAA,iBAAU,EACR,eAAQ,CAAC,QAAQ,CAAC;YAChB,IAAI,EAAE,wBAAwB;YAC9B,IAAI,EAAE,kBAAkB;YACxB,CAAC,kBAAkB,EAAE,QAAQ,EAAE,WAAW,EAAE,sBAAsB,CAAC;SACpE,CAAC,CACH,CACF,CAAC;QACF,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;;;;;;OASG;IACI,+BAA+B,CACpC,qBAA6B,EAC7B,qBAA6B,EAC7B,eAAuB;QAEvB,IAAI,CAAC,2BAA2B,CAC9B,IAAA,iBAAU,EACR,eAAQ,CAAC,QAAQ,CAAC;YAChB,IAAI,eAAQ,CAAC,EAAE,MAAM,EAAE,qBAAqB,EAAE,CAAC;YAC/C,IAAI,eAAQ,CAAC,EAAE,MAAM,EAAE,eAAe,EAAE,CAAC;YACzC,qBAAqB;SACtB,CAAC,CACH,CACF,CAAC;QACF,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;;;OAMG;IACI,kBAAkB,CAAC,SAAiB,EAAE,IAAyB;QACpE,IAAI,CAAC,UAAU,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC;QAClC,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;;;OAMG;IACI,yBAAyB,CAC9B,gBAAuC,EACvC,GAAkB;QAElB,IAAI,gBAAgB,YAAY,UAAU,EAAE,CAAC;YAC3C,IAAI,CAAC,gBAAgB,GAAG,gBAAgB,CAAC;QAC3C,CAAC;aAAM,CAAC;YACN,IAAI,CAAC,gBAAgB,GAAG,IAAA,yBAAc,EAAC,gBAAgB,CAAC,CAAC;QAC3D,CAAC;QACD,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;QACf,IAAI,CAAC,MAAM,GAAG,KAAK,CAAC;QACpB,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;;;;OAOG;IACI,mBAAmB,CACxB,gBAAuC,EACvC,kBAA8B,EAC9B,GAAqB;QAErB,IAAI,gBAAgB,YAAY,UAAU,EAAE,CAAC;YAC3C,IAAI,CAAC,gBAAgB,GAAG,gBAAgB,CAAC;QAC3C,CAAC;aAAM,CAAC;YACN,IAAI,CAAC,gBAAgB,GAAG,IAAA,yBAAc,EAAC,gBAAgB,CAAC,CAAC;QAC3D,CAAC;QACD,IAAI,CAAC,kBAAkB,GAAG,kBAAkB,CAAC;QAC7C,IAAI,CAAC,MAAM,GAAG,GAAG,CAAC;QAClB,IAAI,CAAC,MAAM,GAAG,IAAI,CAAC;QACnB,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,IAAI;QACf,IAAI,CAAC,IAAI,CAAC,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,4EAA4E,CAAC,CAAC;QAC5G,IAAI,CAAC,IAAI,CAAC,sBAAsB;YAAE,MAAM,IAAI,KAAK,CAAC,oJAAoJ,CAAC,CAAC;QAExM,MAAM,IAAI,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,iBAAiB,CAAC,GAAG,CAAC,CAAC,EAAE,EAAE,EAAE,CAAC,IAAI,CAAC,qBAAqB,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;QACtG,OAAO,IAAI,WAAI,CAAC,IAAI,CAAC,CAAC;IACxB,CAAC;IAEO,KAAK,CAAC,qBAAqB,CAAC,EAAmB;QACrD,MAAM,QAAQ,GAAG,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,IAAI,EAAE,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,OAAO,KAAK,EAAE,CAAC,EAAE,CAAC,CAAC;QAC9E,IAAI,CAAC,QAAQ,EAAE,CAAC;YACd,gFAAgF;YAChF,MAAM,IAAI,KAAK,CAAC,mDAAmD,EAAE,CAAC,EAAE,GAAG,CAAC,CAAC;QAC/E,CAAC;QAED,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,EAAE,EAAE,QAAQ,CAAC,CAAC;QAE9D,OAAO,IAAI,2CAAoB,CAC7B,QAAQ,CAAC,OAAO,EAChB;YACE,UAAU;YACV,UAAU,EAAE,QAAQ,CAAC,YAAY,CAAC,UAAU;SAC7C,EACD,MAAM,IAAI,CAAC,eAAe,CAAC,QAAQ,CAAC,OAAO,CAAC,CAC7C,CAAC;IACJ,CAAC;IAEO,KAAK,CAAC,eAAe,CAAC,OAAe;QAC3C,MAAM,yBAAyB,GAAG,IAAA,yCAAiC,EACjE,IAAI,CAAC,sBAAsB,EAC3B,OAAO,EACP,IAAI,CAAC,UAAU,CAChB,CAAC;QAEF,MAAM,YAAY,GAAiB;YACjC,UAAU,EAAE,IAAI,CAAC,UAAU;YAC3B,UAAU,EAAE,IAAI,CAAC,MAAM;gBACrB,CAAC,CAAC,MAAM,IAAI,CAAC,gBAAgB,CAAC,yBAAyB,EAAE,IAAI,CAAC,sBAAsB,CAAC;gBACrF,CAAC,CAAC,MAAM,IAAI,CAAC,iBAAiB,CAAC,yBAAyB,CAAC;SAC5D,CAAC;QAEF,OAAO,YAAY,CAAC;IACtB,CAAC;IAEO,KAAK,CAAC,gBAAgB,CAC5B,yBAAqC,EACrC,sBAA2B;QAE3B,MAAM,EAAE,GAAG,EAAE,GAAG,IAAA,uBAAY,EAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;QAEpD,MAAM,eAAe,GAAG,MAAM,IAAA,gCAAwB,EACpD,IAAI,CAAC,gBAAgB,EACrB,IAAI,CAAC,kBAAkB,EACvB,sBAAsB,CACvB,CAAC;QAEF,MAAM,GAAG,GAAG,MAAM,eAAI,CAAC,MAAM,CAC3B,EAAE,GAAG,EAAE,IAAI,CAAC,MAAM,EAAE,EACpB,EAAE,GAAG,EAAE,EACP,yBAAyB,EACzB,eAAe,CAChB,CAAC;QAEF,OAAO,EAAE,SAAS,EAAE,GAAG,EAAE,CAAC;IAC5B,CAAC;IAEO,KAAK,CAAC,iBAAiB,CAAC,QAAoB;QAClD,IAAI,CAAC,IAAI,CAAC,gBAAgB;YAAE,MAAM,IAAI,KAAK,CAAC,0BAA0B,CAAC,CAAC;QACxE,MAAM,GAAG,GAAG,MAAM,IAAA,wBAAa,EAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;QACvD,MAAM,EAAE,GAAG,EAAE,GAAG,IAAA,uBAAY,EAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;QAEpD,MAAM,eAAe,GAAG,MAAM,gBAAK,CAAC,IAAI,CACtC,EAAE,GAAG,EAAE,IAAI,CAAC,GAAG,EAAE,EACjB,EAAE,GAAG,EAAE,EACP,eAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,EACrB,GAAG,CACJ,CAAC;QACF,OAAO,EAAE,eAAe,EAAE,CAAC;IAC7B,CAAC;IAEO,KAAK,CAAC,iBAAiB,CAAC,EAAmB,EAAE,QAA8B;QACjF,MAAM,eAAe,GAAG,EAAE,CAAC,WAAW,CAAC,MAAM,CAAC;QAC9C,MAAM,UAAU,GAA0B,EAAE,CAAC;QAC7C,IAAI,KAAK,EAAE,MAAM,KAAK,IAAI,eAAe,EAAE,CAAC;YAC1C,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,KAAK,CAAC,IAAI,EAAE,QAAQ,CAAC,CAAC;YAC9D,IAAI,CAAC,MAAM,EAAE,CAAC;gBACZ,2DAA2D;gBAC3D,OAAO,CAAC,GAAG,CAAC,+BAA+B,KAAK,CAAC,IAAI,EAAE,CAAC,CAAC;gBACzD,SAAS;YACX,CAAC;YAED,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,GAAG,MAAM,CAAC;YACrC,IAAI,CAAC,UAAU,CAAC,SAAS,CAAC;gBAAE,UAAU,CAAC,SAAS,CAAC,GAAG,EAAE,CAAC;YACvD,UAAU,CAAC,SAAS,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QACrC,CAAC;QAED,OAAO,UAAU,CAAC;IACpB,CAAC;IAEO,KAAK,CAAC,aAAa,CACzB,KAAe,EACf,QAA8B;QAE9B;;;;WAIG;QACH,KAAK,MAAM,IAAI,IAAI,KAAK,EAAE,CAAC;YACzB,6DAA6D;YAC7D,MAAM,CAAC,CAAC,EAAE,EAAE,SAAS,CAAC,EAAE,CAAC,EAAE,EAAE,iBAAiB,CAAC,CAAC,GAAG,CAAC,GAAG,IAAI,CAAC,QAAQ,CAAC,cAAc,CAAC,CAAC,CAAC;YACtF,IAAI,CAAC,SAAS;gBAAE,MAAM,IAAI,KAAK,CAAC,wCAAwC,IAAI,GAAG,CAAC,CAAC;YACjF,IAAI,CAAC,iBAAiB;gBAAE,MAAM,IAAI,KAAK,CAAC,gDAAgD,IAAI,GAAG,CAAC,CAAC;YAEjG,MAAM,OAAO,GAAuB,QAAQ,CAAC,YAAY,CAAC,UAAU,CAAC,SAAS,CAAC,IAAI,EAAE,CAAC;YACtF,MAAM,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,iBAAiB,KAAK,iBAAiB,CAAC,CAAC;YAE9E,IAAI,iBAAiB,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,CAAC;gBAC9C,OAAO,IAAI,CAAC,eAAe,CAAC,iBAAiB,EAAE,SAAS,EAAE,OAAO,CAAC,CAAC;YACrE,CAAC;YAED,IAAI,MAAM,EAAE,CAAC;gBACX,OAAO;oBACL,SAAS;oBACT,MAAM;iBACP,CAAC;YACJ,CAAC;QACH,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAEO,eAAe,CACrB,OAAe,EACf,SAAiB,EACjB,UAA8B;QAE9B,MAAM,WAAW,GAAG,UAAU;aAC3B,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE;YACZ,MAAM,EAAE,iBAAiB,EAAE,GAAG,EAAE,YAAY,EAAE,KAAK,EAAE,GAAG,CAAC,CAAC;YAC1D,OAAO,EAAE,GAAG,EAAE,KAAK,EAAE,KAAK,EAAE,CAAC,EAAE,CAAC;QAClC,CAAC,CAAC;aACD,MAAM,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,GAAG,CAAC,UAAU,CAAC,WAAW,CAAC,CAAC;aAC5C,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC;YACX,EAAE,EAAE,QAAQ,CAAC,CAAC,CAAC,GAAG,CAAC,OAAO,CAAC,WAAW,EAAE,EAAE,CAAC,EAAE,EAAE,CAAC;YAChD,GAAG,CAAC;SACL,CAAC,CAAC;aACF,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAE,CAAC,CAAC;QAE/B,MAAM,KAAK,GAAG,QAAQ,CAAC,OAAO,CAAC,OAAO,CAAC,WAAW,EAAE,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC;QAE7D,IAAI,IAAI,CAAC;QACT,oBAAoB;QACpB,IAAI,GAAG,WAAW,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,KAAK,KAAK,IAAI,IAAI,CAAC,CAAC,EAAE,IAAI,KAAK,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;QAEzE,IAAI,CAAC,IAAI,EAAE,CAAC;YACV,yBAAyB;YACzB,IAAI,GAAG,WAAW,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,EAAE,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,KAAK,KAAK,KAAK,IAAI,CAAC,CAAC,EAAE,IAAI,KAAK,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;QACxG,CAAC;QAED,IAAI,CAAC,IAAI,EAAE,CAAC;YACV,OAAO,IAAI,CAAC;QACd,CAAC;QAED,OAAO;YACL,SAAS;YACT,MAAM,EAAE,UAAU,CAAC,IAAI,CAAC,KAAK,CAAC;SAC/B,CAAC;IACJ,CAAC;CACF;AAxXD,wCAwXC"}
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
import { DeviceSigned, DocType, IssuerSigned } from './types';
|
|
2
|
+
import { IssuerSignedDocument } from './IssuerSignedDocument';
|
|
3
|
+
/**
|
|
4
|
+
* Represents a device signed document.
|
|
5
|
+
*
|
|
6
|
+
* Note: You don't need to instantiate this class.
|
|
7
|
+
* This is the return type of the parser and it will be generated by the DeviceResponse builder.
|
|
8
|
+
*/
|
|
9
|
+
export declare class DeviceSignedDocument extends IssuerSignedDocument {
|
|
10
|
+
readonly deviceSigned: DeviceSigned;
|
|
11
|
+
constructor(docType: DocType, issuerSigned: IssuerSigned, deviceSigned: DeviceSigned);
|
|
12
|
+
prepare(): Map<string, any>;
|
|
13
|
+
/**
|
|
14
|
+
* Helper method to get the values in a namespace as a JS object.
|
|
15
|
+
*
|
|
16
|
+
* @param {string} namespace - The namespace to add.
|
|
17
|
+
* @returns {Record<string, any>} - The values in the namespace as an object
|
|
18
|
+
*/
|
|
19
|
+
getDeviceNameSpace(namespace: string): Record<string, any>;
|
|
20
|
+
}
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.DeviceSignedDocument = void 0;
|
|
4
|
+
const DataItem_1 = require("../../cbor/DataItem");
|
|
5
|
+
const IssuerSignedDocument_1 = require("./IssuerSignedDocument");
|
|
6
|
+
/**
|
|
7
|
+
* Represents a device signed document.
|
|
8
|
+
*
|
|
9
|
+
* Note: You don't need to instantiate this class.
|
|
10
|
+
* This is the return type of the parser and it will be generated by the DeviceResponse builder.
|
|
11
|
+
*/
|
|
12
|
+
class DeviceSignedDocument extends IssuerSignedDocument_1.IssuerSignedDocument {
|
|
13
|
+
constructor(docType, issuerSigned, deviceSigned) {
|
|
14
|
+
super(docType, issuerSigned);
|
|
15
|
+
this.deviceSigned = deviceSigned;
|
|
16
|
+
}
|
|
17
|
+
prepare() {
|
|
18
|
+
const doc = super.prepare();
|
|
19
|
+
const deviceSignature = this.deviceSigned.deviceAuth.deviceSignature?.getContentForEncoding();
|
|
20
|
+
const deviceMac = this.deviceSigned.deviceAuth.deviceMac?.getContentForEncoding();
|
|
21
|
+
// detach payload
|
|
22
|
+
if (deviceMac) {
|
|
23
|
+
deviceMac[2] = null;
|
|
24
|
+
}
|
|
25
|
+
if (deviceSignature) {
|
|
26
|
+
deviceSignature[2] = null;
|
|
27
|
+
}
|
|
28
|
+
doc.set('deviceSigned', {
|
|
29
|
+
...this.deviceSigned,
|
|
30
|
+
nameSpaces: DataItem_1.DataItem.fromData(this.deviceSigned.nameSpaces),
|
|
31
|
+
deviceAuth: {
|
|
32
|
+
...this.deviceSigned.deviceAuth,
|
|
33
|
+
...(deviceSignature ? { deviceSignature } : {}),
|
|
34
|
+
...(deviceMac ? { deviceMac } : {}),
|
|
35
|
+
},
|
|
36
|
+
});
|
|
37
|
+
return doc;
|
|
38
|
+
}
|
|
39
|
+
/**
|
|
40
|
+
* Helper method to get the values in a namespace as a JS object.
|
|
41
|
+
*
|
|
42
|
+
* @param {string} namespace - The namespace to add.
|
|
43
|
+
* @returns {Record<string, any>} - The values in the namespace as an object
|
|
44
|
+
*/
|
|
45
|
+
getDeviceNameSpace(namespace) {
|
|
46
|
+
return this.deviceSigned.nameSpaces[namespace];
|
|
47
|
+
}
|
|
48
|
+
}
|
|
49
|
+
exports.DeviceSignedDocument = DeviceSignedDocument;
|
|
50
|
+
//# sourceMappingURL=data:application/json;base64,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
|