@@ -1937,6 +1937,14 @@ const s = function() {
1937
1937
rhcloud: o16,
1938
1938
render: b,
1939
1939
onrender: o16,
1940
+ code: {
1941
+ $: 0,
1942
+ succ: {
1943
+ builder: o16,
1944
+ "dev-builder": o16,
1945
+ "stg-builder": o16
1946
+ }
1947
+ },
1940
1948
logoip: o16,
1941
1949
scrysec: o16,
1942
1950
"firewall-gateway": o16,
@@ -8605,7 +8613,8 @@ const s = function() {
8605
8613
pm: {
8606
8614
$: 1,
8607
8615
succ: {
8608
- own: o16
8616
+ own: o16,
8617
+ name: o16
8609
8618
}
8610
8619
},
8611
8620
pn: {
@@ -9125,7 +9134,12 @@ const s = function() {
9125
9134
},
9126
9135
td: s8,
9127
9136
tel: a15,
9128
- tf: a15,
9137
+ tf: {
9138
+ $: 1,
9139
+ succ: {
9140
+ sch: o16
9141
+ }
9142
+ },
9129
9143
tg: a15,
9130
9144
th: {
9131
9145
$: 1,
@@ -9720,7 +9734,13 @@ const s = function() {
9720
9734
me: o16
9721
9735
}
9722
9736
},
9723
- wf: a15,
9737
+ wf: {
9738
+ $: 1,
9739
+ succ: {
9740
+ biz: o16,
9741
+ sch: o16
9742
+ }
9743
+ },
9724
9744
ws: {
9725
9745
$: 1,
9726
9746
succ: {
@@ -18745,7 +18765,7 @@ class RelativeDistinguishedNames extends PkiObject {
18745
18765
RelativeDistinguishedNames.CLASS_NAME = "RelativeDistinguishedNames";
18746
18766
const TYPE$4 = "type";
18747
18767
const VALUE$5 = "value";
18748
- function builtInStandardAttributes(parameters = {}, optional = false ) {
18768
+ function builtInStandardAttributes(parameters = {}, optional) {
18749
18769
const names = getParametersValue(parameters, "names", {});
18750
18770
return new Sequence({
18751
18771
optional,
@@ -18891,7 +18911,7 @@ function builtInStandardAttributes(parameters = {}, optional = false) {
18891
18911
]
18892
18912
});
18893
18913
}
18894
- function builtInDomainDefinedAttributes(optional = false ) {
18914
+ function builtInDomainDefinedAttributes(optional) {
18895
18915
return new Sequence({
18896
18916
optional,
18897
18917
value: [
@@ -18900,7 +18920,7 @@ function builtInDomainDefinedAttributes(optional = false) {
18900
18920
]
18901
18921
});
18902
18922
}
18903
- function extensionAttributes(optional = false ) {
18923
+ function extensionAttributes(optional) {
18904
18924
return new Set1({
18905
18925
optional,
18906
18926
value: [
@@ -32483,24 +32503,26 @@ class EnvelopedData extends PkiObject {
32483
32503
valueHex: wrappedKey
32484
32504
});
32485
32505
};
32506
+ const res = [];
32486
32507
for(let i100 = 0; i100 < this.recipientInfos.length; i100++){
32487
32508
switch(this.recipientInfos[i100].variant){
32488
32509
case 1:
32489
- await SubKeyTransRecipientInfo(i100);
32510
+ res.push( await SubKeyTransRecipientInfo(i100) );
32490
32511
break;
32491
32512
case 2:
32492
- await SubKeyAgreeRecipientInfo(i100);
32513
+ res.push( await SubKeyAgreeRecipientInfo(i100) );
32493
32514
break;
32494
32515
case 3:
32495
- await SubKEKRecipientInfo(i100);
32516
+ res.push( await SubKEKRecipientInfo(i100) );
32496
32517
break;
32497
32518
case 4:
32498
- await SubPasswordRecipientinfo(i100);
32519
+ res.push( await SubPasswordRecipientinfo(i100) );
32499
32520
break;
32500
32521
default:
32501
32522
throw new Error(`Unknown recipient type in array with index ${i100}`);
32502
32523
}
32503
32524
}
32525
+ return res;
32504
32526
}
32505
32527
async decrypt(recipientIndex, parameters, crypto = getCrypto(true)) {
32506
32528
const decryptionParameters = parameters || {};
@@ -40680,6 +40702,7 @@ function pemToBase64(pem) {
40680
40702
if (!isPem(pem)) {
40681
40703
throw new Error("expected PEM string as input");
40682
40704
}
40705
+ pem = pem.replace(/^\n/, "");
40683
40706
let pemArr = pem.split("\n");
40684
40707
pemArr = pemArr.slice(1, pemArr.length - 2);
40685
40708
return pemArr.join("");
@@ -41949,15 +41972,15 @@ function packedParseFn(attStmt) {
41949
41972
ret.set("sig", sig);
41950
41973
return ret;
41951
41974
}
41952
- function packedValidateFn() {
41975
+ async function packedValidateFn() {
41953
41976
const x5c = this.authnrData.get("x5c");
41954
41977
const ecdaaKeyId = this.authnrData.get("ecdaaKeyId");
41955
41978
if (x5c !== undefined && ecdaaKeyId !== undefined) {
41956
41979
throw new Error("packed attestation: should be 'basic' or 'ecdaa', got both");
41957
41980
}
41958
- if (x5c) return packedValidateBasic.call(this);
41959
- if (ecdaaKeyId) return packedValidateEcdaa.call(this);
41960
- return packedValidateSurrogate.call(this);
41981
+ if (x5c) return await packedValidateBasic.call(this);
41982
+ if (ecdaaKeyId) return await packedValidateEcdaa.call(this);
41983
+ return await packedValidateSurrogate.call(this);
41961
41984
}
41962
41985
async function packedValidateBasic() {
41963
41986
const { algName , hashAlg , } = this.authnrData.get("alg");
@@ -42042,13 +42065,13 @@ async function validateSelfSignature(rawClientData, authenticatorData, sig, hash
42042
42065
const verify2 = await mod2.verifySignature(publicKeyPem, sig, appendBuffer(authenticatorData, clientDataHash), hashAlg);
42043
42066
return verify2;
42044
42067
}
42045
- function packedValidateSurrogate() {
42068
+ async function packedValidateSurrogate() {
42046
42069
const { algName , hashAlg , } = this.authnrData.get("alg");
42047
42070
if (algName === undefined) {
42048
42071
throw new Error("packed attestation: unknown algorithm " + algName);
42049
42072
}
42050
- const res = validateSelfSignature(this.clientData.get("rawClientDataJson"), this.authnrData.get("rawAuthnrData"), this.authnrData.get("sig"), hashAlg, this.authnrData.get("credentialPublicKeyPem"));
42051
- if (!res) {
42073
+ const res = await validateSelfSignature(this.clientData.get("rawClientDataJson"), this.authnrData.get("rawAuthnrData"), this.authnrData.get("sig"), hashAlg, this.authnrData.get("credentialPublicKeyPem"));
42074
+ if (!res || typeof res !== "boolean" ) {
42052
42075
throw new Error("packed attestation signature verification failed");
42053
42076
}
42054
42077
this.audit.journal.add("sig");
0 commit comments