@inco/js 0.1.9
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +201 -0
- package/README.md +50 -0
- package/dist/binary.d.ts +17 -0
- package/dist/chain.d.ts +22 -0
- package/dist/encryption/encryption.d.ts +118 -0
- package/dist/encryption/index.d.ts +1 -0
- package/dist/fhevm/fhe-environment.d.ts +9 -0
- package/dist/fhevm/fhevm.d.ts +41 -0
- package/dist/fhevm/index.cjs +87 -0
- package/dist/fhevm/index.d.ts +1 -0
- package/dist/fhevm/index.mjs +83 -0
- package/dist/fhevm/reencrypt.d.ts +20 -0
- package/dist/fhevm/tfhe.d.ts +74 -0
- package/dist/fhevm/types.d.ts +3 -0
- package/dist/generated/abis/inco-fhevm.d.ts +8698 -0
- package/dist/generated/abis/inco-lite.d.ts +21794 -0
- package/dist/generated/es/cosmos/ics23/v1/proofs_pb.d.ts +593 -0
- package/dist/generated/es/cosmos/msg/v1/msg_pb.d.ts +29 -0
- package/dist/generated/es/cosmos_proto/cosmos_pb.d.ts +174 -0
- package/dist/generated/es/google/api/annotations_pb.d.ts +13 -0
- package/dist/generated/es/google/api/http_pb.d.ts +440 -0
- package/dist/generated/es/inco/fhe/v1/events_pb.d.ts +79 -0
- package/dist/generated/es/inco/fhe/v1/genesis_pb.d.ts +252 -0
- package/dist/generated/es/inco/fhe/v1/query_pb.d.ts +569 -0
- package/dist/generated/es/inco/fhe/v1/tx_pb.d.ts +494 -0
- package/dist/generated/es/inco/fhe/v1/types_pb.d.ts +419 -0
- package/dist/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +181 -0
- package/dist/generated/es/inco/kms/lite/v1/types_pb.d.ts +212 -0
- package/dist/generated/es/inco/preflight/v1/genesis_pb.d.ts +56 -0
- package/dist/generated/es/inco/preflight/v1/query_pb.d.ts +100 -0
- package/dist/generated/es/inco/preflight/v1/tx_pb.d.ts +193 -0
- package/dist/generated/es/inco/preflight/v1/types_pb.d.ts +144 -0
- package/dist/generated/es/kms/base_pb.d.ts +765 -0
- package/dist/generated/es/sf/ethereum/type/v2/type_pb.d.ts +1736 -0
- package/dist/generated/fhe-environments.d.ts +14 -0
- package/dist/generated/inco-lite.d.ts +61 -0
- package/dist/generated/ts/amino/amino.d.ts +1 -0
- package/dist/generated/ts/cometbft/abci/v1/types.d.ts +597 -0
- package/dist/generated/ts/cometbft/crypto/v1/keys.d.ts +27 -0
- package/dist/generated/ts/cometbft/crypto/v1/proof.d.ts +60 -0
- package/dist/generated/ts/cometbft/types/v1/params.d.ts +179 -0
- package/dist/generated/ts/cometbft/types/v1/validator.d.ts +61 -0
- package/dist/generated/ts/cosmos/app/v1alpha1/module.d.ts +104 -0
- package/dist/generated/ts/cosmos/msg/v1/msg.d.ts +1 -0
- package/dist/generated/ts/cosmos_proto/cosmos.d.ts +80 -0
- package/dist/generated/ts/gogoproto/gogo.d.ts +1 -0
- package/dist/generated/ts/google/api/annotations.d.ts +1 -0
- package/dist/generated/ts/google/api/http.d.ts +371 -0
- package/dist/generated/ts/google/protobuf/descriptor.d.ts +1228 -0
- package/dist/generated/ts/google/protobuf/duration.d.ts +99 -0
- package/dist/generated/ts/google/protobuf/timestamp.d.ts +128 -0
- package/dist/generated/ts/google/protobuf/wrappers.d.ts +111 -0
- package/dist/generated/ts/inco/abci/v1/types.d.ts +35 -0
- package/dist/generated/ts/inco/fhe/module/v1/module.d.ts +31 -0
- package/dist/generated/ts/inco/fhe/v1/events.d.ts +66 -0
- package/dist/generated/ts/inco/fhe/v1/genesis.d.ts +117 -0
- package/dist/generated/ts/inco/fhe/v1/query.d.ts +366 -0
- package/dist/generated/ts/inco/fhe/v1/tx.d.ts +409 -0
- package/dist/generated/ts/inco/fhe/v1/types.d.ts +225 -0
- package/dist/generated/ts/inco/originchain/module/v1/module.d.ts +30 -0
- package/dist/generated/ts/inco/originchain/v1/abci.d.ts +80 -0
- package/dist/generated/ts/inco/originchain/v1/events.d.ts +60 -0
- package/dist/generated/ts/inco/originchain/v1/genesis.d.ts +28 -0
- package/dist/generated/ts/inco/originchain/v1/query.d.ts +116 -0
- package/dist/generated/ts/inco/originchain/v1/tx.d.ts +89 -0
- package/dist/generated/ts/inco/originchain/v1/types.d.ts +58 -0
- package/dist/generated/ts/inco/preflight/module/v1/module.d.ts +31 -0
- package/dist/generated/ts/inco/preflight/v1/genesis.d.ts +41 -0
- package/dist/generated/ts/inco/preflight/v1/query.d.ts +93 -0
- package/dist/generated/ts/inco/preflight/v1/tx.d.ts +187 -0
- package/dist/generated/ts/inco/preflight/v1/types.d.ts +84 -0
- package/dist/handle.d.ts +41 -0
- package/dist/index.cjs +22952 -0
- package/dist/index.d.ts +4 -0
- package/dist/index.mjs +24026 -0
- package/dist/l1/client.d.ts +35 -0
- package/dist/l1/index.d.ts +2 -0
- package/dist/l1/preflight.d.ts +20 -0
- package/dist/lite/deployments.d.ts +6 -0
- package/dist/lite/ecies.d.ts +26 -0
- package/dist/lite/hadu.d.ts +24 -0
- package/dist/lite/index.cjs +54911 -0
- package/dist/lite/index.d.ts +6 -0
- package/dist/lite/index.mjs +73891 -0
- package/dist/lite/reencrypt.d.ts +23 -0
- package/dist/reencryption/eip712.d.ts +29 -0
- package/dist/reencryption/index.cjs +22675 -0
- package/dist/reencryption/index.d.ts +2 -0
- package/dist/reencryption/index.mjs +22671 -0
- package/dist/reencryption/types.d.ts +24 -0
- package/dist/schema.d.ts +4 -0
- package/dist/viem.d.ts +385 -0
- package/package.json +92 -0
@@ -0,0 +1,419 @@
|
|
1
|
+
import type { GenEnum, GenFile, GenMessage } from "@bufbuild/protobuf/codegenv1";
|
2
|
+
import type { Message } from "@bufbuild/protobuf";
|
3
|
+
/**
|
4
|
+
* Describes the file inco/fhe/v1/types.proto.
|
5
|
+
*/
|
6
|
+
export declare const file_inco_fhe_v1_types: GenFile;
|
7
|
+
/**
|
8
|
+
* TypedCiphertext represents a ciphertext with its type and handle.
|
9
|
+
* This type is inspired from Zama's TypedCiphertext:
|
10
|
+
* ref: https://github.com/zama-ai/kms-core/blob/fcc54ba0933e6190d8e8091ef495bcf437c06f6a/core/grpc/proto/kms.v1.proto#L180-L187
|
11
|
+
*
|
12
|
+
* The encryption and format of the encrypted plaintext must be specified at the site of its use.
|
13
|
+
*
|
14
|
+
* @generated from message inco.fhe.v1.TypedCiphertext
|
15
|
+
*/
|
16
|
+
export type TypedCiphertext = Message<"inco.fhe.v1.TypedCiphertext"> & {
|
17
|
+
/**
|
18
|
+
* The actual ciphertext to decrypt, taken directly from the fhevm.
|
19
|
+
*
|
20
|
+
* @generated from field: bytes ciphertext = 1;
|
21
|
+
*/
|
22
|
+
ciphertext: Uint8Array;
|
23
|
+
/**
|
24
|
+
* The type of plaintext encrypted.
|
25
|
+
*
|
26
|
+
* @generated from field: inco.fhe.v1.FheType fhe_type = 2;
|
27
|
+
*/
|
28
|
+
fheType: FheType;
|
29
|
+
/**
|
30
|
+
* The handle of the ciphertext.
|
31
|
+
* TODO scalar declaration.
|
32
|
+
*
|
33
|
+
* @generated from field: string handle = 3;
|
34
|
+
*/
|
35
|
+
handle: string;
|
36
|
+
};
|
37
|
+
/**
|
38
|
+
* Describes the message inco.fhe.v1.TypedCiphertext.
|
39
|
+
* Use `create(TypedCiphertextSchema)` to create a new message.
|
40
|
+
*/
|
41
|
+
export declare const TypedCiphertextSchema: GenMessage<TypedCiphertext>;
|
42
|
+
/**
|
43
|
+
* Covalidator represents a covalidator that can vote on the CA Root.
|
44
|
+
*
|
45
|
+
* @generated from message inco.fhe.v1.Covalidator
|
46
|
+
*/
|
47
|
+
export type Covalidator = Message<"inco.fhe.v1.Covalidator"> & {
|
48
|
+
/**
|
49
|
+
* inco_address is the Cosmos bech32 address of the covalidator.
|
50
|
+
*
|
51
|
+
* @generated from field: string inco_address = 1;
|
52
|
+
*/
|
53
|
+
incoAddress: string;
|
54
|
+
/**
|
55
|
+
* grpc_url is the gRPC endpoint of the covalidator, in the format
|
56
|
+
* "host:port".
|
57
|
+
*
|
58
|
+
* @generated from field: string grpc_url = 2;
|
59
|
+
*/
|
60
|
+
grpcUrl: string;
|
61
|
+
};
|
62
|
+
/**
|
63
|
+
* Describes the message inco.fhe.v1.Covalidator.
|
64
|
+
* Use `create(CovalidatorSchema)` to create a new message.
|
65
|
+
*/
|
66
|
+
export declare const CovalidatorSchema: GenMessage<Covalidator>;
|
67
|
+
/**
|
68
|
+
* KeysetInfo represents information on how to retrieve the keyset from the KMS.
|
69
|
+
*
|
70
|
+
* @generated from message inco.fhe.v1.KeysetInfo
|
71
|
+
*/
|
72
|
+
export type KeysetInfo = Message<"inco.fhe.v1.KeysetInfo"> & {
|
73
|
+
/**
|
74
|
+
* id is the unique identifier of the keyset. It is a 20-byte hash
|
75
|
+
* represented as a hex string with no prefix.
|
76
|
+
* More specification of the keyset ID can be found in Zama's
|
77
|
+
* documentation:
|
78
|
+
* https://github.com/zama-ai/kms-core/blob/v0.9.0-rc3/config/dev/README.md#kms-key-id
|
79
|
+
*
|
80
|
+
* @generated from field: string id = 1;
|
81
|
+
*/
|
82
|
+
id: string;
|
83
|
+
/**
|
84
|
+
* kms_grpc_url is the gRPC endpoint of the KMS that manages the keyset, in
|
85
|
+
* the format "host:port". They keyset can be retrieved via the
|
86
|
+
* inco.kms.*.v1.KmsService#Key RPC method.
|
87
|
+
*
|
88
|
+
* @generated from field: string kms_grpc_url = 2;
|
89
|
+
*/
|
90
|
+
kmsGrpcUrl: string;
|
91
|
+
};
|
92
|
+
/**
|
93
|
+
* Describes the message inco.fhe.v1.KeysetInfo.
|
94
|
+
* Use `create(KeysetInfoSchema)` to create a new message.
|
95
|
+
*/
|
96
|
+
export declare const KeysetInfoSchema: GenMessage<KeysetInfo>;
|
97
|
+
/**
|
98
|
+
* FheEnv represents the environment in which the FHE keys are used, which is
|
99
|
+
* composed of a host chain and a keyset.
|
100
|
+
*
|
101
|
+
* @generated from message inco.fhe.v1.FheEnv
|
102
|
+
*/
|
103
|
+
export type FheEnv = Message<"inco.fhe.v1.FheEnv"> & {
|
104
|
+
/**
|
105
|
+
* host_chain_id is the chain ID of the host chain. See the x/hostchain module
|
106
|
+
* for a specification of the chain ID.
|
107
|
+
*
|
108
|
+
* @generated from field: string host_chain_id = 1;
|
109
|
+
*/
|
110
|
+
hostChainId: string;
|
111
|
+
/**
|
112
|
+
* keyset_id is the unique identifier of the keyset.
|
113
|
+
*
|
114
|
+
* @generated from field: string keyset_id = 2;
|
115
|
+
*/
|
116
|
+
keysetId: string;
|
117
|
+
/**
|
118
|
+
* authorization is the authorization configuration for the FHE environment.
|
119
|
+
*
|
120
|
+
* @generated from oneof inco.fhe.v1.FheEnv.authorization
|
121
|
+
*/
|
122
|
+
authorization: {
|
123
|
+
/**
|
124
|
+
* zama_access_control is the access control configuration for Zama's ACL.
|
125
|
+
*
|
126
|
+
* @generated from field: inco.fhe.v1.ZamaAccessControl zama_access_control = 10;
|
127
|
+
*/
|
128
|
+
value: ZamaAccessControl;
|
129
|
+
case: "zamaAccessControl";
|
130
|
+
} | {
|
131
|
+
/**
|
132
|
+
* inco_lite_access_control is the access control configuration for IncoLite.
|
133
|
+
*
|
134
|
+
* @generated from field: inco.fhe.v1.IncoLiteAccessControl inco_lite_access_control = 11;
|
135
|
+
*/
|
136
|
+
value: IncoLiteAccessControl;
|
137
|
+
case: "incoLiteAccessControl";
|
138
|
+
} | {
|
139
|
+
case: undefined;
|
140
|
+
value?: undefined;
|
141
|
+
};
|
142
|
+
};
|
143
|
+
/**
|
144
|
+
* Describes the message inco.fhe.v1.FheEnv.
|
145
|
+
* Use `create(FheEnvSchema)` to create a new message.
|
146
|
+
*/
|
147
|
+
export declare const FheEnvSchema: GenMessage<FheEnv>;
|
148
|
+
/**
|
149
|
+
* ZamaAccessControl represents the access control configuration used by Zama.
|
150
|
+
* It is characterized by having separate storage slots for decryption,
|
151
|
+
* reencryption, and delegated reencryption.
|
152
|
+
*
|
153
|
+
* @generated from message inco.fhe.v1.ZamaAccessControl
|
154
|
+
*/
|
155
|
+
export type ZamaAccessControl = Message<"inco.fhe.v1.ZamaAccessControl"> & {
|
156
|
+
/**
|
157
|
+
* acl_address is the host chain address of the ACL contract to use for
|
158
|
+
* verifying the ACL proof. For EVM chains it's a non-prefixed hex string.
|
159
|
+
*
|
160
|
+
* @generated from field: string acl_address = 1;
|
161
|
+
*/
|
162
|
+
aclAddress: string;
|
163
|
+
/**
|
164
|
+
* decryption_storage_index is the storage slot of the ACL contract to use for
|
165
|
+
* verifying decyrption. It is usually called `allowedForDecryption` in the
|
166
|
+
* ACL.sol contract. It is encoded as a non-prefixed hex string.
|
167
|
+
*
|
168
|
+
* The Solidity type at this storage is expected to be:
|
169
|
+
* mapping(uint256 => bool)
|
170
|
+
*
|
171
|
+
* @generated from field: string decryption_storage_index = 2;
|
172
|
+
*/
|
173
|
+
decryptionStorageIndex: string;
|
174
|
+
/**
|
175
|
+
* reencryption_storage_index is the storage slot of the ACL contract to use
|
176
|
+
* for verifying reencryption. It is usually called `persistedAllowedPairs`
|
177
|
+
* in the ACL.sol contract. It is encoded as a non-prefixed hex string.
|
178
|
+
*
|
179
|
+
* The Solidity type at this storage is expected to be:
|
180
|
+
* mapping(uint256 handle => mapping(address account => bool isAllowed))
|
181
|
+
*
|
182
|
+
* @generated from field: string reencryption_storage_index = 3;
|
183
|
+
*/
|
184
|
+
reencryptionStorageIndex: string;
|
185
|
+
/**
|
186
|
+
* delegations_storage slot is the storage slot of the ACL contract to use
|
187
|
+
* for verifying reencryptions using delegations. It is usually called
|
188
|
+
* `delegates` in the ACL.sol contract. It is encoded as a non-prefixed hex
|
189
|
+
* string.
|
190
|
+
*
|
191
|
+
* The Solidity type at this storage is expected to be:
|
192
|
+
* mapping(address account => mapping(address delegatee => mapping(address
|
193
|
+
* contractAddress => bool isDelegate)))
|
194
|
+
*
|
195
|
+
* @generated from field: string delegations_storage_index = 4;
|
196
|
+
*/
|
197
|
+
delegationsStorageIndex: string;
|
198
|
+
};
|
199
|
+
/**
|
200
|
+
* Describes the message inco.fhe.v1.ZamaAccessControl.
|
201
|
+
* Use `create(ZamaAccessControlSchema)` to create a new message.
|
202
|
+
*/
|
203
|
+
export declare const ZamaAccessControlSchema: GenMessage<ZamaAccessControl>;
|
204
|
+
/**
|
205
|
+
* IncoLiteAccessControl represents the access control configuration used by
|
206
|
+
* IncoLite, which is empty.
|
207
|
+
*
|
208
|
+
* @generated from message inco.fhe.v1.IncoLiteAccessControl
|
209
|
+
*/
|
210
|
+
export type IncoLiteAccessControl = Message<"inco.fhe.v1.IncoLiteAccessControl"> & {};
|
211
|
+
/**
|
212
|
+
* Describes the message inco.fhe.v1.IncoLiteAccessControl.
|
213
|
+
* Use `create(IncoLiteAccessControlSchema)` to create a new message.
|
214
|
+
*/
|
215
|
+
export declare const IncoLiteAccessControlSchema: GenMessage<IncoLiteAccessControl>;
|
216
|
+
/**
|
217
|
+
* CARoot represents the CA Root that is voted on by the covalidators.
|
218
|
+
*
|
219
|
+
* @generated from message inco.fhe.v1.CARoot
|
220
|
+
*/
|
221
|
+
export type CARoot = Message<"inco.fhe.v1.CARoot"> & {
|
222
|
+
/**
|
223
|
+
* hash is the CA Root hash that was voted on.
|
224
|
+
*
|
225
|
+
* @generated from field: bytes hash = 1;
|
226
|
+
*/
|
227
|
+
hash: Uint8Array;
|
228
|
+
};
|
229
|
+
/**
|
230
|
+
* Describes the message inco.fhe.v1.CARoot.
|
231
|
+
* Use `create(CARootSchema)` to create a new message.
|
232
|
+
*/
|
233
|
+
export declare const CARootSchema: GenMessage<CARoot>;
|
234
|
+
/**
|
235
|
+
* FheEnvBlock represents a specific host chain block in a specific FHE environment.
|
236
|
+
*
|
237
|
+
* @generated from message inco.fhe.v1.FheEnvBlock
|
238
|
+
*/
|
239
|
+
export type FheEnvBlock = Message<"inco.fhe.v1.FheEnvBlock"> & {
|
240
|
+
/**
|
241
|
+
* host_chain_id is the chain ID of the host chain. See the x/hostchain module
|
242
|
+
* for a specification of the chain ID.
|
243
|
+
*
|
244
|
+
* @generated from field: string host_chain_id = 1;
|
245
|
+
*/
|
246
|
+
hostChainId: string;
|
247
|
+
/**
|
248
|
+
* keyset_id is the unique identifier of the keyset.
|
249
|
+
*
|
250
|
+
* @generated from field: string keyset_id = 2;
|
251
|
+
*/
|
252
|
+
keysetId: string;
|
253
|
+
/**
|
254
|
+
* block_hash is the block hash of the host chain.
|
255
|
+
* The hash is 0x-prefixed hex bytes.
|
256
|
+
* TODO scalar declaration.
|
257
|
+
*
|
258
|
+
* @generated from field: string block_hash = 3;
|
259
|
+
*/
|
260
|
+
blockHash: string;
|
261
|
+
/**
|
262
|
+
* block_height is the block height of the block.
|
263
|
+
*
|
264
|
+
* @generated from field: uint64 block_height = 4;
|
265
|
+
*/
|
266
|
+
blockHeight: bigint;
|
267
|
+
};
|
268
|
+
/**
|
269
|
+
* Describes the message inco.fhe.v1.FheEnvBlock.
|
270
|
+
* Use `create(FheEnvBlockSchema)` to create a new message.
|
271
|
+
*/
|
272
|
+
export declare const FheEnvBlockSchema: GenMessage<FheEnvBlock>;
|
273
|
+
/**
|
274
|
+
* BlockTopo represents the topology information for a host chain block.
|
275
|
+
*
|
276
|
+
* @generated from message inco.fhe.v1.BlockTopo
|
277
|
+
*/
|
278
|
+
export type BlockTopo = Message<"inco.fhe.v1.BlockTopo"> & {
|
279
|
+
/**
|
280
|
+
* parent_hash is the block hash of this block's parent, or empty if unknown.
|
281
|
+
* If present, the parent block's height must be height-1.
|
282
|
+
* The hash is 0x-prefixed hex bytes.
|
283
|
+
* TODO scalar declaration.
|
284
|
+
*
|
285
|
+
* @generated from field: string parent_hash = 1;
|
286
|
+
*/
|
287
|
+
parentHash: string;
|
288
|
+
};
|
289
|
+
/**
|
290
|
+
* Describes the message inco.fhe.v1.BlockTopo.
|
291
|
+
* Use `create(BlockTopoSchema)` to create a new message.
|
292
|
+
*/
|
293
|
+
export declare const BlockTopoSchema: GenMessage<BlockTopo>;
|
294
|
+
/**
|
295
|
+
* BlockTopoStore represents the topology information for a host chain block,
|
296
|
+
* optimized for storage.
|
297
|
+
*
|
298
|
+
* @generated from message inco.fhe.v1.BlockTopoStore
|
299
|
+
*/
|
300
|
+
export type BlockTopoStore = Message<"inco.fhe.v1.BlockTopoStore"> & {
|
301
|
+
/**
|
302
|
+
* parent_hash is the block hash of this block's parent, or empty if unknown.
|
303
|
+
* If present, the parent block's height must be height-1.
|
304
|
+
*
|
305
|
+
* @generated from field: bytes parent_hash = 1;
|
306
|
+
*/
|
307
|
+
parentHash: Uint8Array;
|
308
|
+
};
|
309
|
+
/**
|
310
|
+
* Describes the message inco.fhe.v1.BlockTopoStore.
|
311
|
+
* Use `create(BlockTopoStoreSchema)` to create a new message.
|
312
|
+
*/
|
313
|
+
export declare const BlockTopoStoreSchema: GenMessage<BlockTopoStore>;
|
314
|
+
/**
|
315
|
+
* HandleBinding is the information bound to a ciphertext handle through covalidator consensus.
|
316
|
+
*
|
317
|
+
* @generated from message inco.fhe.v1.HandleBinding
|
318
|
+
*/
|
319
|
+
export type HandleBinding = Message<"inco.fhe.v1.HandleBinding"> & {
|
320
|
+
/**
|
321
|
+
* ciphertext_hash is the TODO-Algorithm-TODO hash of the ciphertext.
|
322
|
+
*
|
323
|
+
* @generated from field: bytes ciphertext_hash = 1;
|
324
|
+
*/
|
325
|
+
ciphertextHash: Uint8Array;
|
326
|
+
};
|
327
|
+
/**
|
328
|
+
* Describes the message inco.fhe.v1.HandleBinding.
|
329
|
+
* Use `create(HandleBindingSchema)` to create a new message.
|
330
|
+
*/
|
331
|
+
export declare const HandleBindingSchema: GenMessage<HandleBinding>;
|
332
|
+
/**
|
333
|
+
* HandleBindingEntry is a handle together with its HandleBinding.
|
334
|
+
*
|
335
|
+
* @generated from message inco.fhe.v1.HandleBindingEntry
|
336
|
+
*/
|
337
|
+
export type HandleBindingEntry = Message<"inco.fhe.v1.HandleBindingEntry"> & {
|
338
|
+
/**
|
339
|
+
* handle is the ciphertext handle for this entry.
|
340
|
+
* The handle is 0x-prefixed hex bytes.
|
341
|
+
* TODO scalar declaration.
|
342
|
+
*
|
343
|
+
* @generated from field: string handle = 1;
|
344
|
+
*/
|
345
|
+
handle: string;
|
346
|
+
/**
|
347
|
+
* binding is the HandleBinding for the handle.
|
348
|
+
*
|
349
|
+
* @generated from field: inco.fhe.v1.HandleBinding binding = 2;
|
350
|
+
*/
|
351
|
+
binding?: HandleBinding;
|
352
|
+
};
|
353
|
+
/**
|
354
|
+
* Describes the message inco.fhe.v1.HandleBindingEntry.
|
355
|
+
* Use `create(HandleBindingEntrySchema)` to create a new message.
|
356
|
+
*/
|
357
|
+
export declare const HandleBindingEntrySchema: GenMessage<HandleBindingEntry>;
|
358
|
+
/**
|
359
|
+
* FheType represents the type of the plaintext encrypted in either in the FHE
|
360
|
+
* or the TEE ciphertext.
|
361
|
+
* For compatibility with Zama's FheType, we use the same values.
|
362
|
+
* ref: https://github.com/zama-ai/kms-core/blob/fcc54ba0933e6190d8e8091ef495bcf437c06f6a/core/grpc/proto/kms.v1.proto#L32
|
363
|
+
*
|
364
|
+
* @generated from enum inco.fhe.v1.FheType
|
365
|
+
*/
|
366
|
+
export declare enum FheType {
|
367
|
+
/**
|
368
|
+
* @generated from enum value: FHE_TYPE_EBOOL = 0;
|
369
|
+
*/
|
370
|
+
EBOOL = 0,
|
371
|
+
/**
|
372
|
+
* @generated from enum value: FHE_TYPE_EUINT4 = 1;
|
373
|
+
*/
|
374
|
+
EUINT4 = 1,
|
375
|
+
/**
|
376
|
+
* @generated from enum value: FHE_TYPE_EUINT8 = 2;
|
377
|
+
*/
|
378
|
+
EUINT8 = 2,
|
379
|
+
/**
|
380
|
+
* @generated from enum value: FHE_TYPE_EUINT16 = 3;
|
381
|
+
*/
|
382
|
+
EUINT16 = 3,
|
383
|
+
/**
|
384
|
+
* @generated from enum value: FHE_TYPE_EUINT32 = 4;
|
385
|
+
*/
|
386
|
+
EUINT32 = 4,
|
387
|
+
/**
|
388
|
+
* @generated from enum value: FHE_TYPE_EUINT64 = 5;
|
389
|
+
*/
|
390
|
+
EUINT64 = 5,
|
391
|
+
/**
|
392
|
+
* @generated from enum value: FHE_TYPE_EUINT128 = 6;
|
393
|
+
*/
|
394
|
+
EUINT128 = 6,
|
395
|
+
/**
|
396
|
+
* @generated from enum value: FHE_TYPE_EUINT160 = 7;
|
397
|
+
*/
|
398
|
+
EUINT160 = 7,
|
399
|
+
/**
|
400
|
+
* @generated from enum value: FHE_TYPE_EUINT256 = 8;
|
401
|
+
*/
|
402
|
+
EUINT256 = 8,
|
403
|
+
/**
|
404
|
+
* @generated from enum value: FHE_TYPE_EUINT512 = 9;
|
405
|
+
*/
|
406
|
+
EUINT512 = 9,
|
407
|
+
/**
|
408
|
+
* @generated from enum value: FHE_TYPE_EUINT1024 = 10;
|
409
|
+
*/
|
410
|
+
EUINT1024 = 10,
|
411
|
+
/**
|
412
|
+
* @generated from enum value: FHE_TYPE_EUINT2048 = 11;
|
413
|
+
*/
|
414
|
+
EUINT2048 = 11
|
415
|
+
}
|
416
|
+
/**
|
417
|
+
* Describes the enum inco.fhe.v1.FheType.
|
418
|
+
*/
|
419
|
+
export declare const FheTypeSchema: GenEnum<FheType>;
|
@@ -0,0 +1,181 @@
|
|
1
|
+
import type { GenFile, GenMessage, GenService } from "@bufbuild/protobuf/codegenv1";
|
2
|
+
import type { TypedCiphertext } from "../../../fhe/v1/types_pb";
|
3
|
+
import type { ECIESKeyset, HandleWithProof } from "./types_pb";
|
4
|
+
import type { Message } from "@bufbuild/protobuf";
|
5
|
+
/**
|
6
|
+
* Describes the file inco/kms/lite/v1/kms_service.proto.
|
7
|
+
*/
|
8
|
+
export declare const file_inco_kms_lite_v1_kms_service: GenFile;
|
9
|
+
/**
|
10
|
+
* KeyRequest is the request type for the KmsService/Keys RPC method.
|
11
|
+
*
|
12
|
+
* @generated from message inco.kms.lite.v1.KeyRequest
|
13
|
+
*/
|
14
|
+
export type KeyRequest = Message<"inco.kms.lite.v1.KeyRequest"> & {};
|
15
|
+
/**
|
16
|
+
* Describes the message inco.kms.lite.v1.KeyRequest.
|
17
|
+
* Use `create(KeyRequestSchema)` to create a new message.
|
18
|
+
*/
|
19
|
+
export declare const KeyRequestSchema: GenMessage<KeyRequest>;
|
20
|
+
/**
|
21
|
+
* KeyResponse is the response type for the KmsService/Keys RPC method.
|
22
|
+
*
|
23
|
+
* @generated from message inco.kms.lite.v1.KeyResponse
|
24
|
+
*/
|
25
|
+
export type KeyResponse = Message<"inco.kms.lite.v1.KeyResponse"> & {
|
26
|
+
/**
|
27
|
+
* keyset is the keyset for the IncoLite KMS.
|
28
|
+
*
|
29
|
+
* @generated from field: inco.kms.lite.v1.ECIESKeyset keyset = 1;
|
30
|
+
*/
|
31
|
+
keyset?: ECIESKeyset;
|
32
|
+
/**
|
33
|
+
* signing_address is the Ethereum EOA signing address of the KMS, encoded
|
34
|
+
* as a 0x-prefixed hex string.
|
35
|
+
* TODO scalar annotation.
|
36
|
+
*
|
37
|
+
* @generated from field: string signing_address = 2;
|
38
|
+
*/
|
39
|
+
signingAddress: string;
|
40
|
+
};
|
41
|
+
/**
|
42
|
+
* Describes the message inco.kms.lite.v1.KeyResponse.
|
43
|
+
* Use `create(KeyResponseSchema)` to create a new message.
|
44
|
+
*/
|
45
|
+
export declare const KeyResponseSchema: GenMessage<KeyResponse>;
|
46
|
+
/**
|
47
|
+
* ReencryptRequest is the request type for the KmsService/Reencrypt RPC method.
|
48
|
+
*
|
49
|
+
* @generated from message inco.kms.lite.v1.ReencryptRequest
|
50
|
+
*/
|
51
|
+
export type ReencryptRequest = Message<"inco.kms.lite.v1.ReencryptRequest"> & {
|
52
|
+
/**
|
53
|
+
* user_address is the Ethereum address of the user who requested the
|
54
|
+
* reencryption, prefixed with 0x.
|
55
|
+
*
|
56
|
+
* @generated from field: string user_address = 1;
|
57
|
+
*/
|
58
|
+
userAddress: string;
|
59
|
+
/**
|
60
|
+
* ephemeral_pub_key is the encoding of the user's public ephemeral
|
61
|
+
* encryption key (secp256k1), generated by the user for this reencryption
|
62
|
+
* request. It is encoded in its 33-byte compressed format.
|
63
|
+
*
|
64
|
+
* @generated from field: bytes ephemeral_pub_key = 2;
|
65
|
+
*/
|
66
|
+
ephemeralPubKey: Uint8Array;
|
67
|
+
/**
|
68
|
+
* eip712_signature is an EIP-712 signature of the following EIP-712 typed data by
|
69
|
+
* `user_address` (note that we only give a JSON representation for the sake of
|
70
|
+
* readability, but the actual signed data is defined in the EIP-712 spec):
|
71
|
+
*
|
72
|
+
* ```json
|
73
|
+
* {
|
74
|
+
* "types": {
|
75
|
+
* "EIP712Domain": [
|
76
|
+
* { "name": "name", "type": "string" },
|
77
|
+
* { "name": "version", "type": "string" },
|
78
|
+
* { "name": "chainId", "type": "uint256" }
|
79
|
+
* ],
|
80
|
+
* "ReencryptionRequest": [
|
81
|
+
* { "name": "publicKey", "type": "bytes" }
|
82
|
+
* ]
|
83
|
+
* },
|
84
|
+
* "primaryType": "ReencryptionRequest",
|
85
|
+
* "domain": {
|
86
|
+
* "name": "IncoReencryption",
|
87
|
+
* "version": "0.1.0",
|
88
|
+
* "chainId": "<host_chain_id>",
|
89
|
+
* "verifyingContract": "<acl_address>",
|
90
|
+
* "salt": "0x0000000000000000000000000000000000000000000000000000000000000000"
|
91
|
+
* },
|
92
|
+
* "message": {
|
93
|
+
* "publicKey": "<ephemeral_pub_key>"
|
94
|
+
* }
|
95
|
+
* }
|
96
|
+
* ```
|
97
|
+
*
|
98
|
+
* @generated from field: bytes eip712_signature = 3;
|
99
|
+
*/
|
100
|
+
eip712Signature: Uint8Array;
|
101
|
+
/**
|
102
|
+
* handles_with_proofs is the list of handles of the ciphertexts to reencrypt,
|
103
|
+
* along with the ACL proof that the user has access to the ciphertext.
|
104
|
+
*
|
105
|
+
* @generated from field: repeated inco.kms.lite.v1.HandleWithProof handles_with_proofs = 4;
|
106
|
+
*/
|
107
|
+
handlesWithProofs: HandleWithProof[];
|
108
|
+
};
|
109
|
+
/**
|
110
|
+
* Describes the message inco.kms.lite.v1.ReencryptRequest.
|
111
|
+
* Use `create(ReencryptRequestSchema)` to create a new message.
|
112
|
+
*/
|
113
|
+
export declare const ReencryptRequestSchema: GenMessage<ReencryptRequest>;
|
114
|
+
/**
|
115
|
+
* ReencryptResponse is the response type for the KmsService/Reencrypt RPC method.
|
116
|
+
*
|
117
|
+
* @generated from message inco.kms.lite.v1.ReencryptResponse
|
118
|
+
*/
|
119
|
+
export type ReencryptResponse = Message<"inco.kms.lite.v1.ReencryptResponse"> & {
|
120
|
+
/**
|
121
|
+
* payload is the reencryption response payload.
|
122
|
+
*
|
123
|
+
* @generated from field: inco.kms.lite.v1.ReencryptionResponsePayload payload = 1;
|
124
|
+
*/
|
125
|
+
payload?: ReencryptionResponsePayload;
|
126
|
+
};
|
127
|
+
/**
|
128
|
+
* Describes the message inco.kms.lite.v1.ReencryptResponse.
|
129
|
+
* Use `create(ReencryptResponseSchema)` to create a new message.
|
130
|
+
*/
|
131
|
+
export declare const ReencryptResponseSchema: GenMessage<ReencryptResponse>;
|
132
|
+
/**
|
133
|
+
* ReencryptionResponsePayload is the payload of the ReencryptResponse,
|
134
|
+
* separated out because it is signed by the KMS using its signing key.
|
135
|
+
*
|
136
|
+
* @generated from message inco.kms.lite.v1.ReencryptionResponsePayload
|
137
|
+
*/
|
138
|
+
export type ReencryptionResponsePayload = Message<"inco.kms.lite.v1.ReencryptionResponsePayload"> & {
|
139
|
+
/**
|
140
|
+
* user_ciphertexts is the list of ciphertexts that were reencrypted to the
|
141
|
+
* user's public key. Each ciphertext at index `i` corresponds to the ciphertext
|
142
|
+
* at index `i` in the `ReencryptRequest`.
|
143
|
+
*
|
144
|
+
* @generated from field: repeated inco.fhe.v1.TypedCiphertext user_ciphertexts = 1;
|
145
|
+
*/
|
146
|
+
userCiphertexts: TypedCiphertext[];
|
147
|
+
};
|
148
|
+
/**
|
149
|
+
* Describes the message inco.kms.lite.v1.ReencryptionResponsePayload.
|
150
|
+
* Use `create(ReencryptionResponsePayloadSchema)` to create a new message.
|
151
|
+
*/
|
152
|
+
export declare const ReencryptionResponsePayloadSchema: GenMessage<ReencryptionResponsePayload>;
|
153
|
+
/**
|
154
|
+
* KmsService is the service for the IncoLite KMS, which will run
|
155
|
+
* inside the TEE.
|
156
|
+
*
|
157
|
+
* @generated from service inco.kms.lite.v1.KmsService
|
158
|
+
*/
|
159
|
+
export declare const KmsService: GenService<{
|
160
|
+
/**
|
161
|
+
* Key returns the public keys exposed by the KMS.
|
162
|
+
*
|
163
|
+
* @generated from rpc inco.kms.lite.v1.KmsService.Key
|
164
|
+
*/
|
165
|
+
key: {
|
166
|
+
methodKind: "unary";
|
167
|
+
input: typeof KeyRequestSchema;
|
168
|
+
output: typeof KeyResponseSchema;
|
169
|
+
};
|
170
|
+
/**
|
171
|
+
* Reencrypt reencrypts a ciphertext using the ephemeral public key of the
|
172
|
+
* user.
|
173
|
+
*
|
174
|
+
* @generated from rpc inco.kms.lite.v1.KmsService.Reencrypt
|
175
|
+
*/
|
176
|
+
reencrypt: {
|
177
|
+
methodKind: "unary";
|
178
|
+
input: typeof ReencryptRequestSchema;
|
179
|
+
output: typeof ReencryptResponseSchema;
|
180
|
+
};
|
181
|
+
}>;
|