@inco/js 0.7.6 → 0.7.8

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (37) hide show
  1. package/dist/cjs/attestedcompute/types.d.ts +1 -1
  2. package/dist/cjs/attestedcompute/types.js +8 -8
  3. package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +376 -1
  4. package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.js +34 -3
  5. package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +26 -20
  6. package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +12 -11
  7. package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +3 -139
  8. package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +12 -112
  9. package/dist/cjs/generated/es/inco/kms/lite/v1/types_pb.d.ts +94 -1
  10. package/dist/cjs/generated/es/inco/kms/lite/v1/types_pb.js +97 -3
  11. package/dist/cjs/generated/local-node.d.ts +8 -0
  12. package/dist/cjs/generated/local-node.js +13 -1
  13. package/dist/cjs/lite/ecies.js +2 -9
  14. package/dist/cjs/lite/hadu.js +8 -18
  15. package/dist/cjs/lite/lightning.js +1 -3
  16. package/dist/esm/attestedcompute/types.d.ts +1 -1
  17. package/dist/esm/attestedcompute/types.js +2 -2
  18. package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +376 -1
  19. package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.js +33 -2
  20. package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +26 -20
  21. package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +11 -10
  22. package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +3 -139
  23. package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +12 -112
  24. package/dist/esm/generated/es/inco/kms/lite/v1/types_pb.d.ts +94 -1
  25. package/dist/esm/generated/es/inco/kms/lite/v1/types_pb.js +97 -3
  26. package/dist/esm/generated/local-node.d.ts +8 -0
  27. package/dist/esm/generated/local-node.js +13 -1
  28. package/dist/esm/lite/ecies.js +2 -9
  29. package/dist/esm/lite/hadu.js +8 -18
  30. package/dist/esm/lite/lightning.js +1 -3
  31. package/dist/types/attestedcompute/types.d.ts +1 -1
  32. package/dist/types/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +376 -1
  33. package/dist/types/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +26 -20
  34. package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +3 -139
  35. package/dist/types/generated/es/inco/kms/lite/v1/types_pb.d.ts +94 -1
  36. package/dist/types/generated/local-node.d.ts +8 -0
  37. package/package.json +1 -1
@@ -1,7 +1,7 @@
1
1
  import type { DecryptionAttestation } from '../attesteddecrypt/types.js';
2
2
  import { HexString } from '../binary.js';
3
3
  import { EncryptionScheme, SupportedFheType } from '../encryption/encryption.js';
4
- import { SupportedScalarBinaryOp } from '../generated/es/inco/kms/lite/v1/kms_service_pb.js';
4
+ import { SupportedScalarBinaryOp } from '../generated/es/inco/kms/lite/v1/types_pb.js';
5
5
  import type { BackoffConfig } from '../retry.js';
6
6
  /**
7
7
  * Supported attested compute operations.
@@ -1,7 +1,7 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.AttestedComputeError = exports.AttestedComputeSupportedOps = void 0;
4
- const kms_service_pb_js_1 = require("../generated/es/inco/kms/lite/v1/kms_service_pb.js");
4
+ const types_pb_js_1 = require("../generated/es/inco/kms/lite/v1/types_pb.js");
5
5
  /**
6
6
  * Supported attested compute operations.
7
7
  */
@@ -20,12 +20,12 @@ exports.AttestedComputeSupportedOps = {
20
20
  Rotl: SupportedScalarBinaryOp.FHE_ROTL,
21
21
  Rotr: SupportedScalarBinaryOp.FHE_ROTR,
22
22
  */
23
- Eq: kms_service_pb_js_1.SupportedScalarBinaryOp.FHE_EQ,
24
- Ne: kms_service_pb_js_1.SupportedScalarBinaryOp.FHE_NE,
25
- Ge: kms_service_pb_js_1.SupportedScalarBinaryOp.FHE_GE,
26
- Gt: kms_service_pb_js_1.SupportedScalarBinaryOp.FHE_GT,
27
- Le: kms_service_pb_js_1.SupportedScalarBinaryOp.FHE_LE,
28
- Lt: kms_service_pb_js_1.SupportedScalarBinaryOp.FHE_LT,
23
+ Eq: types_pb_js_1.SupportedScalarBinaryOp.FHE_EQ,
24
+ Ne: types_pb_js_1.SupportedScalarBinaryOp.FHE_NE,
25
+ Ge: types_pb_js_1.SupportedScalarBinaryOp.FHE_GE,
26
+ Gt: types_pb_js_1.SupportedScalarBinaryOp.FHE_GT,
27
+ Le: types_pb_js_1.SupportedScalarBinaryOp.FHE_LE,
28
+ Lt: types_pb_js_1.SupportedScalarBinaryOp.FHE_LT,
29
29
  /*
30
30
  Min: SupportedScalarBinaryOp.FHE_MIN,
31
31
  Max: SupportedScalarBinaryOp.FHE_MAX,
@@ -43,4 +43,4 @@ class AttestedComputeError extends Error {
43
43
  }
44
44
  }
45
45
  exports.AttestedComputeError = AttestedComputeError;
46
- //# sourceMappingURL=data:application/json;base64,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
46
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidHlwZXMuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvYXR0ZXN0ZWRjb21wdXRlL3R5cGVzLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7OztBQU1BLDhFQUF1RjtBQUd2Rjs7R0FFRztBQUNVLFFBQUEsMkJBQTJCLEdBQUc7SUFDekM7Ozs7Ozs7Ozs7Ozs7TUFhRTtJQUNGLEVBQUUsRUFBRSxxQ0FBdUIsQ0FBQyxNQUFNO0lBQ2xDLEVBQUUsRUFBRSxxQ0FBdUIsQ0FBQyxNQUFNO0lBQ2xDLEVBQUUsRUFBRSxxQ0FBdUIsQ0FBQyxNQUFNO0lBQ2xDLEVBQUUsRUFBRSxxQ0FBdUIsQ0FBQyxNQUFNO0lBQ2xDLEVBQUUsRUFBRSxxQ0FBdUIsQ0FBQyxNQUFNO0lBQ2xDLEVBQUUsRUFBRSxxQ0FBdUIsQ0FBQyxNQUFNO0lBQ2xDOzs7TUFHRTtDQUNNLENBQUM7QUFRWDs7R0FFRztBQUNILE1BQWEsb0JBQXFCLFNBQVEsS0FBSztJQUczQjtJQUZsQixZQUNFLE9BQWUsRUFDQyxLQUFlO1FBRS9CLEtBQUssQ0FBQyxPQUFPLENBQUMsQ0FBQztRQUZDLFVBQUssR0FBTCxLQUFLLENBQVU7UUFHL0IsSUFBSSxDQUFDLElBQUksR0FBRyxzQkFBc0IsQ0FBQztJQUNyQyxDQUFDO0NBQ0Y7QUFSRCxvREFRQyJ9
@@ -1,5 +1,7 @@
1
1
  import type { GenEnum, GenFile, GenMessage, GenService } from "@bufbuild/protobuf/codegenv2";
2
- import type { InputCryptogram, StoredCryptogram } from "./types_pb";
2
+ import type { CryptogramWithProof, InputCryptogram, StoredCryptogram } from "./types_pb";
3
+ import type { DecryptionAttestation } from "../../../kms/lite/v1/kms_service_pb";
4
+ import type { ACLProof, SupportedScalarBinaryOp } from "../../../kms/lite/v1/types_pb";
3
5
  import type { RATlsServer } from "../../../sealingfetcher/v1/sealingfetcher_pb";
4
6
  import type { Message } from "@bufbuild/protobuf";
5
7
  /**
@@ -22,6 +24,10 @@ export type SingleCastOpRequest = Message<"inco.covalidator.compute.v1.SingleCas
22
24
  * @generated from field: int32 toType = 3;
23
25
  */
24
26
  toType: number;
27
+ /**
28
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 4;
29
+ */
30
+ configureRequest?: ConfigureRequest;
25
31
  };
26
32
  /**
27
33
  * Describes the message inco.covalidator.compute.v1.SingleCastOpRequest.
@@ -40,6 +46,10 @@ export type SingleUnaryOpRequest = Message<"inco.covalidator.compute.v1.SingleUn
40
46
  * @generated from field: inco.covalidator.compute.v1.StoredCryptogram ct = 2;
41
47
  */
42
48
  ct?: StoredCryptogram;
49
+ /**
50
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 3;
51
+ */
52
+ configureRequest?: ConfigureRequest;
43
53
  };
44
54
  /**
45
55
  * Describes the message inco.covalidator.compute.v1.SingleUnaryOpRequest.
@@ -62,6 +72,10 @@ export type SingleBinaryOpRequest = Message<"inco.covalidator.compute.v1.SingleB
62
72
  * @generated from field: inco.covalidator.compute.v1.StoredCryptogram rhs = 3;
63
73
  */
64
74
  rhs?: StoredCryptogram;
75
+ /**
76
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 4;
77
+ */
78
+ configureRequest?: ConfigureRequest;
65
79
  };
66
80
  /**
67
81
  * Describes the message inco.covalidator.compute.v1.SingleBinaryOpRequest.
@@ -84,6 +98,10 @@ export type SingleBinaryOpScalarRequest = Message<"inco.covalidator.compute.v1.S
84
98
  * @generated from field: bytes rhs = 3;
85
99
  */
86
100
  rhs: Uint8Array;
101
+ /**
102
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 4;
103
+ */
104
+ configureRequest?: ConfigureRequest;
87
105
  };
88
106
  /**
89
107
  * Describes the message inco.covalidator.compute.v1.SingleBinaryOpScalarRequest.
@@ -110,6 +128,10 @@ export type SingleTernaryOpRequest = Message<"inco.covalidator.compute.v1.Single
110
128
  * @generated from field: inco.covalidator.compute.v1.StoredCryptogram rhs = 4;
111
129
  */
112
130
  rhs?: StoredCryptogram;
131
+ /**
132
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 5;
133
+ */
134
+ configureRequest?: ConfigureRequest;
113
135
  };
114
136
  /**
115
137
  * Describes the message inco.covalidator.compute.v1.SingleTernaryOpRequest.
@@ -128,6 +150,10 @@ export type SingleTrivialOpRequest = Message<"inco.covalidator.compute.v1.Single
128
150
  * @generated from field: int32 toType = 2;
129
151
  */
130
152
  toType: number;
153
+ /**
154
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 3;
155
+ */
156
+ configureRequest?: ConfigureRequest;
131
157
  };
132
158
  /**
133
159
  * Describes the message inco.covalidator.compute.v1.SingleTrivialOpRequest.
@@ -150,6 +176,10 @@ export type SingleRandOpRequest = Message<"inco.covalidator.compute.v1.SingleRan
150
176
  * @generated from field: bytes counterRand = 3;
151
177
  */
152
178
  counterRand: Uint8Array;
179
+ /**
180
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 4;
181
+ */
182
+ configureRequest?: ConfigureRequest;
153
183
  };
154
184
  /**
155
185
  * Describes the message inco.covalidator.compute.v1.SingleRandOpRequest.
@@ -176,6 +206,10 @@ export type SingleRandBoundedOpRequest = Message<"inco.covalidator.compute.v1.Si
176
206
  * @generated from field: bytes counterRand = 4;
177
207
  */
178
208
  counterRand: Uint8Array;
209
+ /**
210
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 5;
211
+ */
212
+ configureRequest?: ConfigureRequest;
179
213
  };
180
214
  /**
181
215
  * Describes the message inco.covalidator.compute.v1.SingleRandBoundedOpRequest.
@@ -194,6 +228,10 @@ export type SingleNewEListOpRequest = Message<"inco.covalidator.compute.v1.Singl
194
228
  * @generated from field: int32 listType = 3;
195
229
  */
196
230
  listType: number;
231
+ /**
232
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 4;
233
+ */
234
+ configureRequest?: ConfigureRequest;
197
235
  };
198
236
  /**
199
237
  * Describes the message inco.covalidator.compute.v1.SingleNewEListOpRequest.
@@ -212,6 +250,10 @@ export type SingleEListAppendOpRequest = Message<"inco.covalidator.compute.v1.Si
212
250
  * @generated from field: inco.covalidator.compute.v1.StoredCryptogram value = 3;
213
251
  */
214
252
  value?: StoredCryptogram;
253
+ /**
254
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 4;
255
+ */
256
+ configureRequest?: ConfigureRequest;
215
257
  };
216
258
  /**
217
259
  * Describes the message inco.covalidator.compute.v1.SingleEListAppendOpRequest.
@@ -234,6 +276,10 @@ export type SingleEListInsertOpRequest = Message<"inco.covalidator.compute.v1.Si
234
276
  * @generated from field: inco.covalidator.compute.v1.StoredCryptogram value = 4;
235
277
  */
236
278
  value?: StoredCryptogram;
279
+ /**
280
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 5;
281
+ */
282
+ configureRequest?: ConfigureRequest;
237
283
  };
238
284
  /**
239
285
  * Describes the message inco.covalidator.compute.v1.SingleEListInsertOpRequest.
@@ -252,6 +298,10 @@ export type SingleEListConcatOpRequest = Message<"inco.covalidator.compute.v1.Si
252
298
  * @generated from field: inco.covalidator.compute.v1.StoredCryptogram elist2 = 2;
253
299
  */
254
300
  elist2?: StoredCryptogram;
301
+ /**
302
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 3;
303
+ */
304
+ configureRequest?: ConfigureRequest;
255
305
  };
256
306
  /**
257
307
  * Describes the message inco.covalidator.compute.v1.SingleEListConcatOpRequest.
@@ -278,6 +328,10 @@ export type SingleEListSliceOpRequest = Message<"inco.covalidator.compute.v1.Sin
278
328
  * @generated from field: inco.covalidator.compute.v1.StoredCryptogram defaultValue = 4;
279
329
  */
280
330
  defaultValue?: StoredCryptogram;
331
+ /**
332
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 5;
333
+ */
334
+ configureRequest?: ConfigureRequest;
281
335
  };
282
336
  /**
283
337
  * Describes the message inco.covalidator.compute.v1.SingleEListSliceOpRequest.
@@ -296,6 +350,10 @@ export type SingleEListGetOpRequest = Message<"inco.covalidator.compute.v1.Singl
296
350
  * @generated from field: int32 index = 2;
297
351
  */
298
352
  index: number;
353
+ /**
354
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 3;
355
+ */
356
+ configureRequest?: ConfigureRequest;
299
357
  };
300
358
  /**
301
359
  * Describes the message inco.covalidator.compute.v1.SingleEListGetOpRequest.
@@ -318,6 +376,10 @@ export type SingleEListGetOrOpRequest = Message<"inco.covalidator.compute.v1.Sin
318
376
  * @generated from field: inco.covalidator.compute.v1.StoredCryptogram defaultValue = 3;
319
377
  */
320
378
  defaultValue?: StoredCryptogram;
379
+ /**
380
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 4;
381
+ */
382
+ configureRequest?: ConfigureRequest;
321
383
  };
322
384
  /**
323
385
  * Describes the message inco.covalidator.compute.v1.SingleEListGetOrOpRequest.
@@ -340,6 +402,10 @@ export type SingleEListSetOpRequest = Message<"inco.covalidator.compute.v1.Singl
340
402
  * @generated from field: inco.covalidator.compute.v1.StoredCryptogram value = 3;
341
403
  */
342
404
  value?: StoredCryptogram;
405
+ /**
406
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 4;
407
+ */
408
+ configureRequest?: ConfigureRequest;
343
409
  };
344
410
  /**
345
411
  * Describes the message inco.covalidator.compute.v1.SingleEListSetOpRequest.
@@ -358,6 +424,10 @@ export type SingleEListRangeOpRequest = Message<"inco.covalidator.compute.v1.Sin
358
424
  * @generated from field: int32 end = 2;
359
425
  */
360
426
  end: number;
427
+ /**
428
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 3;
429
+ */
430
+ configureRequest?: ConfigureRequest;
361
431
  };
362
432
  /**
363
433
  * Describes the message inco.covalidator.compute.v1.SingleEListRangeOpRequest.
@@ -376,6 +446,10 @@ export type SingleEListShuffleOpRequest = Message<"inco.covalidator.compute.v1.S
376
446
  * @generated from field: bytes nonce = 2;
377
447
  */
378
448
  nonce: Uint8Array;
449
+ /**
450
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 3;
451
+ */
452
+ configureRequest?: ConfigureRequest;
379
453
  };
380
454
  /**
381
455
  * Describes the message inco.covalidator.compute.v1.SingleEListShuffleOpRequest.
@@ -390,6 +464,10 @@ export type SingleEListReverseOpRequest = Message<"inco.covalidator.compute.v1.S
390
464
  * @generated from field: inco.covalidator.compute.v1.StoredCryptogram elist = 1;
391
465
  */
392
466
  elist?: StoredCryptogram;
467
+ /**
468
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 2;
469
+ */
470
+ configureRequest?: ConfigureRequest;
393
471
  };
394
472
  /**
395
473
  * Describes the message inco.covalidator.compute.v1.SingleEListReverseOpRequest.
@@ -449,6 +527,10 @@ export type InputToStoredCryptogramRequest = Message<"inco.covalidator.compute.v
449
527
  * @generated from field: int32 index_handle = 3;
450
528
  */
451
529
  indexHandle: number;
530
+ /**
531
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 4;
532
+ */
533
+ configureRequest?: ConfigureRequest;
452
534
  };
453
535
  /**
454
536
  * Describes the message inco.covalidator.compute.v1.InputToStoredCryptogramRequest.
@@ -509,6 +591,263 @@ export type ConfigureResponse = Message<"inco.covalidator.compute.v1.ConfigureRe
509
591
  * Use `create(ConfigureResponseSchema)` to create a new message.
510
592
  */
511
593
  export declare const ConfigureResponseSchema: GenMessage<ConfigureResponse>;
594
+ /**
595
+ * AttestedDecryptRequest is the request type for the ComputeService/AttestedDecrypt RPC method.
596
+ *
597
+ * @generated from message inco.covalidator.compute.v1.AttestedDecryptRequest
598
+ */
599
+ export type AttestedDecryptRequest = Message<"inco.covalidator.compute.v1.AttestedDecryptRequest"> & {
600
+ /**
601
+ * user_address is the Ethereum address of the user who requested the
602
+ * decryption, prefixed with 0x.
603
+ *
604
+ * @generated from field: string user_address = 1;
605
+ */
606
+ userAddress: string;
607
+ /**
608
+ * reencrypt_pub_key is the encoding of the user's public
609
+ * encryption key (secp256k1) used to reencrypt the result for.
610
+ * It is encoded in its 33-byte compressed format.
611
+ * If empty, the KMS will return plaintext decryption instead of reencryption.
612
+ *
613
+ * @generated from field: bytes reencrypt_pub_key = 2;
614
+ */
615
+ reencryptPubKey: Uint8Array;
616
+ /**
617
+ * eip712_signature is an EIP-712 signature of the following EIP-712 typed data by
618
+ * `user_address` (note that we only give a JSON representation for the sake of
619
+ * readability, but the actual signed data is defined in the EIP-712 spec) where:
620
+ * handles - list of 0x prefixed handles to decrypt
621
+ * publicKey - 0x prefixed reencrypt_pub_key (if any). "0x" otherwise if empty.
622
+ *
623
+ * ```json
624
+ * {
625
+ * "types": {
626
+ * "EIP712Domain": [
627
+ * { "name": "name", "type": "string" },
628
+ * { "name": "version", "type": "string" },
629
+ * { "name": "chainId", "type": "uint256" }
630
+ * ],
631
+ * "AttestedDecryptRequest": [
632
+ * { "name": "handles", "type": "bytes32[]" },
633
+ * { "name": "publicKey", "type": "bytes" },
634
+ * ]
635
+ * },
636
+ * "primaryType": "AttestedDecryptRequest",
637
+ * "domain": {
638
+ * "name": "IncoAttestedDecrypt",
639
+ * "version": "0.1.0",
640
+ * "chainId": "<host_chain_id>",
641
+ * },
642
+ * "message": {
643
+ * "handles": ["<handle1>", "<handle2>", ...],
644
+ * "publicKey": "0x<reencrypt_pub_key>"
645
+ * }
646
+ * }
647
+ * ```
648
+ *
649
+ * @generated from field: bytes eip712_signature = 3;
650
+ */
651
+ eip712Signature: Uint8Array;
652
+ /**
653
+ * cryptograms_with_proofs is the list of cryptograms with proofs to decrypt.
654
+ * Either the user_address or sharer must have ACL access to the cryptogram handles for the attested
655
+ * decryption to succeed.
656
+ *
657
+ * @generated from field: repeated inco.covalidator.compute.v1.CryptogramWithProof cryptograms_with_proofs = 4;
658
+ */
659
+ cryptogramsWithProofs: CryptogramWithProof[];
660
+ /**
661
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 5;
662
+ */
663
+ configureRequest?: ConfigureRequest;
664
+ };
665
+ /**
666
+ * Describes the message inco.covalidator.compute.v1.AttestedDecryptRequest.
667
+ * Use `create(AttestedDecryptRequestSchema)` to create a new message.
668
+ */
669
+ export declare const AttestedDecryptRequestSchema: GenMessage<AttestedDecryptRequest>;
670
+ /**
671
+ * AttestedDecryptResponse is the response type for the ComputeService/AttestedDecrypt RPC method.
672
+ *
673
+ * @generated from message inco.covalidator.compute.v1.AttestedDecryptResponse
674
+ */
675
+ export type AttestedDecryptResponse = Message<"inco.covalidator.compute.v1.AttestedDecryptResponse"> & {
676
+ /**
677
+ * decryption_attestations is the list of decryption attestations. The item at index `i`
678
+ * corresponds to the cryptogram at index `i` in the `AttestedDecryptRequest`.
679
+ *
680
+ * @generated from field: repeated inco.kms.lite.v1.DecryptionAttestation decryption_attestations = 1;
681
+ */
682
+ decryptionAttestations: DecryptionAttestation[];
683
+ };
684
+ /**
685
+ * Describes the message inco.covalidator.compute.v1.AttestedDecryptResponse.
686
+ * Use `create(AttestedDecryptResponseSchema)` to create a new message.
687
+ */
688
+ export declare const AttestedDecryptResponseSchema: GenMessage<AttestedDecryptResponse>;
689
+ /**
690
+ * AttestedRevealRequest is the request type for the ComputeService/AttestedReveal RPC method.
691
+ *
692
+ * @generated from message inco.covalidator.compute.v1.AttestedRevealRequest
693
+ */
694
+ export type AttestedRevealRequest = Message<"inco.covalidator.compute.v1.AttestedRevealRequest"> & {
695
+ /**
696
+ * cryptograms is the list of ciphertexts to decrypt.
697
+ * The handles of these values must have been revealed beforehand with the on-chain .reveal() call.
698
+ *
699
+ * @generated from field: repeated inco.covalidator.compute.v1.StoredCryptogram cryptograms = 3;
700
+ */
701
+ cryptograms: StoredCryptogram[];
702
+ /**
703
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 4;
704
+ */
705
+ configureRequest?: ConfigureRequest;
706
+ };
707
+ /**
708
+ * Describes the message inco.covalidator.compute.v1.AttestedRevealRequest.
709
+ * Use `create(AttestedRevealRequestSchema)` to create a new message.
710
+ */
711
+ export declare const AttestedRevealRequestSchema: GenMessage<AttestedRevealRequest>;
712
+ /**
713
+ * AttestedRevealResponse is the response type for the ComputeService/AttestedReveal RPC method.
714
+ *
715
+ * @generated from message inco.covalidator.compute.v1.AttestedRevealResponse
716
+ */
717
+ export type AttestedRevealResponse = Message<"inco.covalidator.compute.v1.AttestedRevealResponse"> & {
718
+ /**
719
+ * decryption_attestations is the list of decryption attestations. The item at index `i`
720
+ * corresponds to the cryptogram at index `i` in the `AttestedRevealRequest`.
721
+ *
722
+ * @generated from field: repeated inco.kms.lite.v1.DecryptionAttestation decryption_attestations = 1;
723
+ */
724
+ decryptionAttestations: DecryptionAttestation[];
725
+ };
726
+ /**
727
+ * Describes the message inco.covalidator.compute.v1.AttestedRevealResponse.
728
+ * Use `create(AttestedRevealResponseSchema)` to create a new message.
729
+ */
730
+ export declare const AttestedRevealResponseSchema: GenMessage<AttestedRevealResponse>;
731
+ /**
732
+ * AttestedComputeRequest is the request type for the ComputeService/AttestedDecrypt RPC method.
733
+ *
734
+ * @generated from message inco.covalidator.compute.v1.AttestedComputeRequest
735
+ */
736
+ export type AttestedComputeRequest = Message<"inco.covalidator.compute.v1.AttestedComputeRequest"> & {
737
+ /**
738
+ * user_address is the Ethereum address of the user who requested the
739
+ * decryption, prefixed with 0x.
740
+ *
741
+ * @generated from field: string user_address = 1;
742
+ */
743
+ userAddress: string;
744
+ /**
745
+ * reencrypt_pub_key is the encoding of the user's public
746
+ * encryption key (secp256k1) used to reencrypt the result for.
747
+ * It is encoded in its 33-byte compressed format.
748
+ * If empty, the KMS will return plaintext decryption instead of reencryption.
749
+ *
750
+ * @generated from field: bytes reencrypt_pub_key = 2;
751
+ */
752
+ reencryptPubKey: Uint8Array;
753
+ /**
754
+ * eip712_signature is an EIP-712 signature of the following EIP-712 typed data by
755
+ * `user_address` (note that we only give a JSON representation for the sake of
756
+ * readability, but the actual signed data is defined in the EIP-712 spec) where:
757
+ * op - operation to perform
758
+ * lhs - handle of the ciphertext to perform computation on
759
+ * rhs - second plaintext scalar operand
760
+ * publicKey - 0x prefixed reencrypt_pub_key (if any). "0x" otherwise if empty.
761
+ *
762
+ * ```json
763
+ * {
764
+ * "types": {
765
+ * "EIP712Domain": [
766
+ * { "name": "name", "type": "string" },
767
+ * { "name": "version", "type": "string" },
768
+ * { "name": "chainId", "type": "uint256" }
769
+ * ],
770
+ * "AttestedComputeRequest": [
771
+ * { "name": "op", "type": "uint8"},
772
+ * { "name": "lhs", "type": "bytes32"},
773
+ * { "name": "rhs", "type": "bytes32"},
774
+ * { "name": "publicKey", "type": "bytes" },
775
+ * ]
776
+ * },
777
+ * "primaryType": "AttestedComputeRequest",
778
+ * "domain": {
779
+ * "name": "IncoAttestedCompute",
780
+ * "version": "1",
781
+ * "chainId": "<host_chain_id>",
782
+ * },
783
+ * "message": {
784
+ * "op": <operation>,
785
+ * "lhs": "<handle1>",
786
+ * "rhs": <plaintextBytes>, // Also add a comment on length & encoding
787
+ * "publicKey": "0x<reencrypt_pub_key>"
788
+ * }
789
+ * }
790
+ * ```
791
+ *
792
+ * @generated from field: bytes eip712_signature = 3;
793
+ */
794
+ eip712Signature: Uint8Array;
795
+ /**
796
+ * Subset of supported binary operations that can be performed on a handle.
797
+ *
798
+ * @generated from field: inco.kms.lite.v1.SupportedScalarBinaryOp op = 4;
799
+ */
800
+ op: SupportedScalarBinaryOp;
801
+ /**
802
+ * lhs holds the value to perform computation on.
803
+ * The user_address must have ACL access to the lhs for the attested
804
+ * compute to succeed.
805
+ *
806
+ * @generated from field: inco.covalidator.compute.v1.StoredCryptogram lhs = 5;
807
+ */
808
+ lhs?: StoredCryptogram;
809
+ /**
810
+ * Second plaintext scalar operand encoded as a hex string (with or without 0x prefix)
811
+ *
812
+ * @generated from field: string rhs_plaintext = 6;
813
+ */
814
+ rhsPlaintext: string;
815
+ /**
816
+ * acl_proof is the proof that the user has access to compute on the lhs_handle.
817
+ * Either the user_address or sharer must have ACL access to the handles for the attested
818
+ * compute to succeed.
819
+ *
820
+ * @generated from field: inco.kms.lite.v1.ACLProof acl_proof = 7;
821
+ */
822
+ aclProof?: ACLProof;
823
+ /**
824
+ * @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 8;
825
+ */
826
+ configureRequest?: ConfigureRequest;
827
+ };
828
+ /**
829
+ * Describes the message inco.covalidator.compute.v1.AttestedComputeRequest.
830
+ * Use `create(AttestedComputeRequestSchema)` to create a new message.
831
+ */
832
+ export declare const AttestedComputeRequestSchema: GenMessage<AttestedComputeRequest>;
833
+ /**
834
+ * AttestedComputeResponse is the response type for the ComputeService/AttestedCompute RPC method.
835
+ *
836
+ * @generated from message inco.covalidator.compute.v1.AttestedComputeResponse
837
+ */
838
+ export type AttestedComputeResponse = Message<"inco.covalidator.compute.v1.AttestedComputeResponse"> & {
839
+ /**
840
+ * decryption_attestation is the signed decryption of the result of the computation.
841
+ *
842
+ * @generated from field: inco.kms.lite.v1.DecryptionAttestation decryption_attestation = 1;
843
+ */
844
+ decryptionAttestation?: DecryptionAttestation;
845
+ };
846
+ /**
847
+ * Describes the message inco.covalidator.compute.v1.AttestedComputeResponse.
848
+ * Use `create(AttestedComputeResponseSchema)` to create a new message.
849
+ */
850
+ export declare const AttestedComputeResponseSchema: GenMessage<AttestedComputeResponse>;
512
851
  /**
513
852
  * @generated from enum inco.covalidator.compute.v1.FheOperation
514
853
  */
@@ -821,4 +1160,40 @@ export declare const ComputeService: GenService<{
821
1160
  input: typeof SingleEListReverseOpRequestSchema;
822
1161
  output: typeof SingleCiphertextResponseSchema;
823
1162
  };
1163
+ /**
1164
+ * AttestedDecrypt decrypts multiple ciphertexts and provides an attestation
1165
+ * that the decryption was performed correctly.
1166
+ * Can optionally reencrypt the result of the decryption to a desired public key.
1167
+ *
1168
+ * @generated from rpc inco.covalidator.compute.v1.ComputeService.AttestedDecrypt
1169
+ */
1170
+ attestedDecrypt: {
1171
+ methodKind: "unary";
1172
+ input: typeof AttestedDecryptRequestSchema;
1173
+ output: typeof AttestedDecryptResponseSchema;
1174
+ };
1175
+ /**
1176
+ * AttestedCompute decrypts the result of a scalar binary operation on a handle and provides an attestation
1177
+ * that the computation and decryption were performed correctly.
1178
+ *
1179
+ * @generated from rpc inco.covalidator.compute.v1.ComputeService.AttestedCompute
1180
+ */
1181
+ attestedCompute: {
1182
+ methodKind: "unary";
1183
+ input: typeof AttestedComputeRequestSchema;
1184
+ output: typeof AttestedComputeResponseSchema;
1185
+ };
1186
+ /**
1187
+ * AttestedReveal decrypts multiple ciphertexts and provides an attestation
1188
+ * that the decryption was performed correctly.
1189
+ * Doesn't require authentication if the handle is publicly revealed with the on-chain .reveal() call beforehand.
1190
+ * Compare to kms.lite.v1.KmsService.AttestedReveal.
1191
+ *
1192
+ * @generated from rpc inco.covalidator.compute.v1.ComputeService.AttestedReveal
1193
+ */
1194
+ attestedReveal: {
1195
+ methodKind: "unary";
1196
+ input: typeof AttestedRevealRequestSchema;
1197
+ output: typeof AttestedRevealResponseSchema;
1198
+ };
824
1199
  }>;