@inco/js 0.8.0-devnet-5 → 0.8.0-devnet-7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/advancedacl/session-key.d.ts +11 -10
- package/dist/cjs/advancedacl/session-key.js +7 -11
- package/dist/cjs/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/cjs/attestedcompute/attested-compute.js +2 -2
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +8 -8
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +6 -6
- package/dist/cjs/encryption/encryption.d.ts +10 -10
- package/dist/cjs/encryption/encryption.js +5 -5
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +270 -7
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.js +98 -12
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +0 -6
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +2 -8
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +213 -0
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +36 -11
- package/dist/cjs/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +3 -3
- package/dist/cjs/kms/quorumClient.d.ts +5 -4
- package/dist/cjs/kms/quorumClient.js +33 -30
- package/dist/cjs/lite/index.d.ts +1 -1
- package/dist/cjs/lite/index.js +15 -2
- package/dist/cjs/lite/lightning.d.ts +33 -24
- package/dist/cjs/lite/lightning.js +67 -38
- package/dist/cjs/lite/xwing.d.ts +123 -0
- package/dist/cjs/lite/xwing.js +275 -0
- package/dist/cjs/reencryption/types.d.ts +2 -2
- package/dist/esm/advancedacl/session-key.d.ts +11 -10
- package/dist/esm/advancedacl/session-key.js +7 -11
- package/dist/esm/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/esm/attestedcompute/attested-compute.js +2 -2
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +8 -8
- package/dist/esm/attesteddecrypt/attested-decrypt.js +4 -4
- package/dist/esm/encryption/encryption.d.ts +10 -10
- package/dist/esm/encryption/encryption.js +5 -5
- package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +270 -7
- package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.js +97 -11
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +0 -6
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +2 -8
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +213 -0
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +35 -10
- package/dist/esm/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +3 -3
- package/dist/esm/kms/quorumClient.d.ts +5 -4
- package/dist/esm/kms/quorumClient.js +33 -30
- package/dist/esm/lite/index.d.ts +1 -1
- package/dist/esm/lite/index.js +2 -2
- package/dist/esm/lite/lightning.d.ts +33 -24
- package/dist/esm/lite/lightning.js +67 -38
- package/dist/esm/lite/xwing.d.ts +123 -0
- package/dist/esm/lite/xwing.js +263 -0
- package/dist/esm/reencryption/types.d.ts +2 -2
- package/dist/types/advancedacl/session-key.d.ts +11 -10
- package/dist/types/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +8 -8
- package/dist/types/encryption/encryption.d.ts +10 -10
- package/dist/types/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +270 -7
- package/dist/types/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +0 -6
- package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +213 -0
- package/dist/types/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +3 -3
- package/dist/types/kms/quorumClient.d.ts +5 -4
- package/dist/types/lite/index.d.ts +1 -1
- package/dist/types/lite/lightning.d.ts +33 -24
- package/dist/types/lite/xwing.d.ts +123 -0
- package/dist/types/reencryption/types.d.ts +2 -2
- package/package.json +6 -6
- package/dist/cjs/lite/ecies.d.ts +0 -26
- package/dist/cjs/lite/ecies.js +0 -146
- package/dist/esm/lite/ecies.d.ts +0 -26
- package/dist/esm/lite/ecies.js +0 -134
- package/dist/types/lite/ecies.d.ts +0 -26
|
@@ -9,7 +9,7 @@ const types_pb_1 = require("../../../kms/lite/v1/types_pb");
|
|
|
9
9
|
/**
|
|
10
10
|
* Describes the file inco/covalidator/compute/v1/types.proto.
|
|
11
11
|
*/
|
|
12
|
-
exports.file_inco_covalidator_compute_v1_types = (0, codegenv2_1.fileDesc)("
|
|
12
|
+
exports.file_inco_covalidator_compute_v1_types = (0, codegenv2_1.fileDesc)("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", [types_pb_1.file_inco_kms_lite_v1_types]);
|
|
13
13
|
/**
|
|
14
14
|
* Describes the message inco.covalidator.compute.v1.InputContext.
|
|
15
15
|
* Use `create(InputContextSchema)` to create a new message.
|
|
@@ -59,12 +59,6 @@ var InputVersion;
|
|
|
59
59
|
* @generated from enum value: INPUT_VERSION_UNSPECIFIED = 0;
|
|
60
60
|
*/
|
|
61
61
|
InputVersion[InputVersion["UNSPECIFIED"] = 0] = "UNSPECIFIED";
|
|
62
|
-
/**
|
|
63
|
-
* INPUT_VERSION_ECIES is the InputPayload message encrypted using ECIES with the primary key version.
|
|
64
|
-
*
|
|
65
|
-
* @generated from enum value: INPUT_VERSION_ECIES = 1;
|
|
66
|
-
*/
|
|
67
|
-
InputVersion[InputVersion["ECIES"] = 1] = "ECIES";
|
|
68
62
|
/**
|
|
69
63
|
* INPUT_VERSION_XWING is the InputPayload message encrypted using HPKE-XWING-CHACHA20POLY1305-SHA256 with the primary key version.
|
|
70
64
|
*
|
|
@@ -83,4 +77,4 @@ var InputVersion;
|
|
|
83
77
|
* Describes the enum inco.covalidator.compute.v1.InputVersion.
|
|
84
78
|
*/
|
|
85
79
|
exports.InputVersionSchema = (0, codegenv2_1.enumDesc)(exports.file_inco_covalidator_compute_v1_types, 0);
|
|
86
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
80
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -106,6 +106,105 @@ export type AttestedDecryptRequest = Message<"inco.kms.lite.v1.AttestedDecryptRe
|
|
|
106
106
|
* Use `create(AttestedDecryptRequestSchema)` to create a new message.
|
|
107
107
|
*/
|
|
108
108
|
export declare const AttestedDecryptRequestSchema: GenMessage<AttestedDecryptRequest>;
|
|
109
|
+
/**
|
|
110
|
+
* EListAttestedDecryptRequest is the request type for the KmsService/EListAttestedDecrypt RPC method.
|
|
111
|
+
*
|
|
112
|
+
* @generated from message inco.kms.lite.v1.EListAttestedDecryptRequest
|
|
113
|
+
*/
|
|
114
|
+
export type EListAttestedDecryptRequest = Message<"inco.kms.lite.v1.EListAttestedDecryptRequest"> & {
|
|
115
|
+
/**
|
|
116
|
+
* user_address is the Ethereum address of the user who requested the
|
|
117
|
+
* decryption, prefixed with 0x.
|
|
118
|
+
*
|
|
119
|
+
* @generated from field: string user_address = 1;
|
|
120
|
+
*/
|
|
121
|
+
userAddress: string;
|
|
122
|
+
/**
|
|
123
|
+
* reencrypt_pub_key is the encoding of the user's public
|
|
124
|
+
* encryption key (secp256k1) used to reencrypt the result for.
|
|
125
|
+
* It is encoded in its 33-byte compressed format.
|
|
126
|
+
* If empty, the KMS will return plaintext decryption instead of reencryption.
|
|
127
|
+
*
|
|
128
|
+
* @generated from field: bytes reencrypt_pub_key = 2;
|
|
129
|
+
*/
|
|
130
|
+
reencryptPubKey: Uint8Array;
|
|
131
|
+
/**
|
|
132
|
+
* eip712_signature is an EIP-712 signature of the following EIP-712 typed data by
|
|
133
|
+
* `user_address` (note that we only give a JSON representation for the sake of
|
|
134
|
+
* readability, but the actual signed data is defined in the EIP-712 spec) where:
|
|
135
|
+
* handles - list of 0x prefixed handles to decrypt
|
|
136
|
+
* publicKey - 0x prefixed reencrypt_pub_key (if any). "0x" otherwise if empty.
|
|
137
|
+
*
|
|
138
|
+
* ```json
|
|
139
|
+
* {
|
|
140
|
+
* "types": {
|
|
141
|
+
* "EIP712Domain": [
|
|
142
|
+
* { "name": "name", "type": "string" },
|
|
143
|
+
* { "name": "version", "type": "string" },
|
|
144
|
+
* { "name": "chainId", "type": "uint256" }
|
|
145
|
+
* ],
|
|
146
|
+
* "AttestedDecryptRequest": [
|
|
147
|
+
* { "name": "handles", "type": "bytes32[]" },
|
|
148
|
+
* { "name": "publicKey", "type": "bytes" },
|
|
149
|
+
* ]
|
|
150
|
+
* },
|
|
151
|
+
* "primaryType": "AttestedDecryptRequest",
|
|
152
|
+
* "domain": {
|
|
153
|
+
* "name": "IncoAttestedDecrypt",
|
|
154
|
+
* "version": "1",
|
|
155
|
+
* "chainId": "<host_chain_id>",
|
|
156
|
+
* },
|
|
157
|
+
* "message": {
|
|
158
|
+
* "handles": ["<handle1>", "<handle2>", ...],
|
|
159
|
+
* "publicKey": "0x<reencrypt_pub_key>"
|
|
160
|
+
* }
|
|
161
|
+
* }
|
|
162
|
+
* ```
|
|
163
|
+
*
|
|
164
|
+
* @generated from field: bytes eip712_signature = 3;
|
|
165
|
+
*/
|
|
166
|
+
eip712Signature: Uint8Array;
|
|
167
|
+
/**
|
|
168
|
+
* handle_with_proof is the handle of an elist ciphertext with proof to decrypt.
|
|
169
|
+
* Either the user_address or sharer must have ACL access to the elist handle for the attested
|
|
170
|
+
* decryption to succeed.
|
|
171
|
+
*
|
|
172
|
+
* @generated from field: inco.kms.lite.v1.HandleWithProof elist_handle_with_proof = 4;
|
|
173
|
+
*/
|
|
174
|
+
elistHandleWithProof?: HandleWithProof;
|
|
175
|
+
};
|
|
176
|
+
/**
|
|
177
|
+
* Describes the message inco.kms.lite.v1.EListAttestedDecryptRequest.
|
|
178
|
+
* Use `create(EListAttestedDecryptRequestSchema)` to create a new message.
|
|
179
|
+
*/
|
|
180
|
+
export declare const EListAttestedDecryptRequestSchema: GenMessage<EListAttestedDecryptRequest>;
|
|
181
|
+
/**
|
|
182
|
+
* EListAttestedDecryptResponse is the response type for the KmsService/EListAttestedDecryptResponse RPC method.
|
|
183
|
+
*
|
|
184
|
+
* @generated from message inco.kms.lite.v1.EListAttestedDecryptResponse
|
|
185
|
+
*/
|
|
186
|
+
export type EListAttestedDecryptResponse = Message<"inco.kms.lite.v1.EListAttestedDecryptResponse"> & {
|
|
187
|
+
/**
|
|
188
|
+
* commitment_proof_attestation is the signed commitment_proof of the decrypted elist values and their corresponding commitments.
|
|
189
|
+
* commitment_proof = hash(concat([
|
|
190
|
+
* hash(concat([commitment1, v1])),
|
|
191
|
+
* ...]))
|
|
192
|
+
*
|
|
193
|
+
* @generated from field: inco.kms.lite.v1.DecryptionAttestation commitment_proof_attestation = 1;
|
|
194
|
+
*/
|
|
195
|
+
commitmentProofAttestation?: DecryptionAttestation;
|
|
196
|
+
/**
|
|
197
|
+
* values is the list of decrypted elist values.
|
|
198
|
+
*
|
|
199
|
+
* @generated from field: repeated inco.kms.lite.v1.EListElement values = 2;
|
|
200
|
+
*/
|
|
201
|
+
values: EListElement[];
|
|
202
|
+
};
|
|
203
|
+
/**
|
|
204
|
+
* Describes the message inco.kms.lite.v1.EListAttestedDecryptResponse.
|
|
205
|
+
* Use `create(EListAttestedDecryptResponseSchema)` to create a new message.
|
|
206
|
+
*/
|
|
207
|
+
export declare const EListAttestedDecryptResponseSchema: GenMessage<EListAttestedDecryptResponse>;
|
|
109
208
|
/**
|
|
110
209
|
* AttestedRevealRequest is the request type for the KmsService/AttestedReveal RPC method.
|
|
111
210
|
*
|
|
@@ -125,6 +224,25 @@ export type AttestedRevealRequest = Message<"inco.kms.lite.v1.AttestedRevealRequ
|
|
|
125
224
|
* Use `create(AttestedRevealRequestSchema)` to create a new message.
|
|
126
225
|
*/
|
|
127
226
|
export declare const AttestedRevealRequestSchema: GenMessage<AttestedRevealRequest>;
|
|
227
|
+
/**
|
|
228
|
+
* EListAttestedRevealRequest is the request type for the KmsService/EListAttestedReveal RPC method.
|
|
229
|
+
*
|
|
230
|
+
* @generated from message inco.kms.lite.v1.EListAttestedRevealRequest
|
|
231
|
+
*/
|
|
232
|
+
export type EListAttestedRevealRequest = Message<"inco.kms.lite.v1.EListAttestedRevealRequest"> & {
|
|
233
|
+
/**
|
|
234
|
+
* handle is the handle of the elist ciphertext to decrypt.
|
|
235
|
+
* The handle must have been revealed beforehand with the on-chain .reveal() call.
|
|
236
|
+
*
|
|
237
|
+
* @generated from field: string handle = 3;
|
|
238
|
+
*/
|
|
239
|
+
handle: string;
|
|
240
|
+
};
|
|
241
|
+
/**
|
|
242
|
+
* Describes the message inco.kms.lite.v1.EListAttestedRevealRequest.
|
|
243
|
+
* Use `create(EListAttestedRevealRequestSchema)` to create a new message.
|
|
244
|
+
*/
|
|
245
|
+
export declare const EListAttestedRevealRequestSchema: GenMessage<EListAttestedRevealRequest>;
|
|
128
246
|
/**
|
|
129
247
|
* AttestedComputeRequest is the request type for the KmsService/AttestedDecrypt RPC method.
|
|
130
248
|
*
|
|
@@ -261,6 +379,30 @@ export type AttestedRevealResponse = Message<"inco.kms.lite.v1.AttestedRevealRes
|
|
|
261
379
|
* Use `create(AttestedRevealResponseSchema)` to create a new message.
|
|
262
380
|
*/
|
|
263
381
|
export declare const AttestedRevealResponseSchema: GenMessage<AttestedRevealResponse>;
|
|
382
|
+
/**
|
|
383
|
+
* EListAttestedRevealResponse is the response type for the KmsService/EListAttestedReveal RPC method.
|
|
384
|
+
*
|
|
385
|
+
* @generated from message inco.kms.lite.v1.EListAttestedRevealResponse
|
|
386
|
+
*/
|
|
387
|
+
export type EListAttestedRevealResponse = Message<"inco.kms.lite.v1.EListAttestedRevealResponse"> & {
|
|
388
|
+
/**
|
|
389
|
+
* commitment_proof_attestation is the signed commitment_proof of the concatenation of the hashes of individual elist values.
|
|
390
|
+
*
|
|
391
|
+
* @generated from field: inco.kms.lite.v1.DecryptionAttestation commitment_proof_attestation = 1;
|
|
392
|
+
*/
|
|
393
|
+
commitmentProofAttestation?: DecryptionAttestation;
|
|
394
|
+
/**
|
|
395
|
+
* values is the list of decrypted elist values.
|
|
396
|
+
*
|
|
397
|
+
* @generated from field: repeated inco.kms.lite.v1.EListElement values = 2;
|
|
398
|
+
*/
|
|
399
|
+
values: EListElement[];
|
|
400
|
+
};
|
|
401
|
+
/**
|
|
402
|
+
* Describes the message inco.kms.lite.v1.EListAttestedRevealResponse.
|
|
403
|
+
* Use `create(EListAttestedRevealResponseSchema)` to create a new message.
|
|
404
|
+
*/
|
|
405
|
+
export declare const EListAttestedRevealResponseSchema: GenMessage<EListAttestedRevealResponse>;
|
|
264
406
|
/**
|
|
265
407
|
* AttestedComputeResponse is the response type for the KmsService/AttestedCompute RPC method.
|
|
266
408
|
*
|
|
@@ -321,6 +463,53 @@ export type Reencryption = Message<"inco.kms.lite.v1.Reencryption"> & {
|
|
|
321
463
|
* Use `create(ReencryptionSchema)` to create a new message.
|
|
322
464
|
*/
|
|
323
465
|
export declare const ReencryptionSchema: GenMessage<Reencryption>;
|
|
466
|
+
/**
|
|
467
|
+
* EListElement contains the decryptions/reencryptions for elist element.
|
|
468
|
+
*
|
|
469
|
+
* @generated from message inco.kms.lite.v1.EListElement
|
|
470
|
+
*/
|
|
471
|
+
export type EListElement = Message<"inco.kms.lite.v1.EListElement"> & {
|
|
472
|
+
/**
|
|
473
|
+
* index is the index of the element in the elist.
|
|
474
|
+
*
|
|
475
|
+
* @generated from field: uint32 index = 1;
|
|
476
|
+
*/
|
|
477
|
+
index: number;
|
|
478
|
+
/**
|
|
479
|
+
* commitment is the random commitment applied to the element when calculating elist commitment_proof.
|
|
480
|
+
*
|
|
481
|
+
* @generated from field: bytes commitment = 2;
|
|
482
|
+
*/
|
|
483
|
+
commitment: Uint8Array;
|
|
484
|
+
/**
|
|
485
|
+
* @generated from oneof inco.kms.lite.v1.EListElement.value
|
|
486
|
+
*/
|
|
487
|
+
value: {
|
|
488
|
+
/**
|
|
489
|
+
* Returns plaintext if reencrypt_pub_key was empty in the request
|
|
490
|
+
*
|
|
491
|
+
* @generated from field: inco.kms.lite.v1.Plaintext plaintext = 3;
|
|
492
|
+
*/
|
|
493
|
+
value: Plaintext;
|
|
494
|
+
case: "plaintext";
|
|
495
|
+
} | {
|
|
496
|
+
/**
|
|
497
|
+
* Returns encrypted ciphertext if reencrypt_pub_key was set in the request
|
|
498
|
+
*
|
|
499
|
+
* @generated from field: inco.kms.lite.v1.Reencryption reencryption = 4;
|
|
500
|
+
*/
|
|
501
|
+
value: Reencryption;
|
|
502
|
+
case: "reencryption";
|
|
503
|
+
} | {
|
|
504
|
+
case: undefined;
|
|
505
|
+
value?: undefined;
|
|
506
|
+
};
|
|
507
|
+
};
|
|
508
|
+
/**
|
|
509
|
+
* Describes the message inco.kms.lite.v1.EListElement.
|
|
510
|
+
* Use `create(EListElementSchema)` to create a new message.
|
|
511
|
+
*/
|
|
512
|
+
export declare const EListElementSchema: GenMessage<EListElement>;
|
|
324
513
|
/**
|
|
325
514
|
* DecryptionAttestation contains the attestation for the decryption of a single handle.
|
|
326
515
|
*
|
|
@@ -453,4 +642,28 @@ export declare const KmsService: GenService<{
|
|
|
453
642
|
input: typeof AttestedRevealRequestSchema;
|
|
454
643
|
output: typeof AttestedRevealResponseSchema;
|
|
455
644
|
};
|
|
645
|
+
/**
|
|
646
|
+
* EListAttestedDecrypt decrypts a single elist ciphertext and provides an attestation
|
|
647
|
+
* that the decryption was performed correctly.
|
|
648
|
+
* Can optionally reencrypt the result of the decryption to a desired public key.
|
|
649
|
+
*
|
|
650
|
+
* @generated from rpc inco.kms.lite.v1.KmsService.EListAttestedDecrypt
|
|
651
|
+
*/
|
|
652
|
+
eListAttestedDecrypt: {
|
|
653
|
+
methodKind: "unary";
|
|
654
|
+
input: typeof EListAttestedDecryptRequestSchema;
|
|
655
|
+
output: typeof EListAttestedDecryptResponseSchema;
|
|
656
|
+
};
|
|
657
|
+
/**
|
|
658
|
+
* EListAttestedReveal decrypts a single elist ciphertext and provides an attestation
|
|
659
|
+
* that the decryption was performed correctly.
|
|
660
|
+
* Doesn't require authentication if the handle is publicly revealed with the on-chain .reveal() call beforehand.
|
|
661
|
+
*
|
|
662
|
+
* @generated from rpc inco.kms.lite.v1.KmsService.EListAttestedReveal
|
|
663
|
+
*/
|
|
664
|
+
eListAttestedReveal: {
|
|
665
|
+
methodKind: "unary";
|
|
666
|
+
input: typeof EListAttestedRevealRequestSchema;
|
|
667
|
+
output: typeof EListAttestedRevealResponseSchema;
|
|
668
|
+
};
|
|
456
669
|
}>;
|
|
@@ -3,13 +3,13 @@
|
|
|
3
3
|
// @generated from file inco/kms/lite/v1/kms_service.proto (package inco.kms.lite.v1, syntax proto3)
|
|
4
4
|
/* eslint-disable */
|
|
5
5
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
-
exports.KmsService = exports.DecryptionAttestationSchema = exports.ReencryptionSchema = exports.PlaintextSchema = exports.AttestedComputeResponseSchema = exports.AttestedRevealResponseSchema = exports.AttestedDecryptResponseSchema = exports.AttestedComputeRequestSchema = exports.AttestedRevealRequestSchema = exports.AttestedDecryptRequestSchema = exports.IsReadyResponseSchema = exports.IsReadyRequestSchema = exports.file_inco_kms_lite_v1_kms_service = void 0;
|
|
6
|
+
exports.KmsService = exports.DecryptionAttestationSchema = exports.EListElementSchema = exports.ReencryptionSchema = exports.PlaintextSchema = exports.AttestedComputeResponseSchema = exports.EListAttestedRevealResponseSchema = exports.AttestedRevealResponseSchema = exports.AttestedDecryptResponseSchema = exports.AttestedComputeRequestSchema = exports.EListAttestedRevealRequestSchema = exports.AttestedRevealRequestSchema = exports.EListAttestedDecryptResponseSchema = exports.EListAttestedDecryptRequestSchema = exports.AttestedDecryptRequestSchema = exports.IsReadyResponseSchema = exports.IsReadyRequestSchema = exports.file_inco_kms_lite_v1_kms_service = void 0;
|
|
7
7
|
const codegenv2_1 = require("@bufbuild/protobuf/codegenv2");
|
|
8
8
|
const types_pb_1 = require("./types_pb");
|
|
9
9
|
/**
|
|
10
10
|
* Describes the file inco/kms/lite/v1/kms_service.proto.
|
|
11
11
|
*/
|
|
12
|
-
exports.file_inco_kms_lite_v1_kms_service = (0, codegenv2_1.fileDesc)("CiJpbmNvL2ttcy9saXRlL3YxL2ttc19zZXJ2aWNlLnByb3RvEhBpbmNvLmttcy5saXRlLnYxIhAKDklzUmVhZHlSZXF1ZXN0IiAKD0lzUmVhZHlSZXNwb25zZRINCgVyZWFkeRgBIAEoCCKjAQoWQXR0ZXN0ZWREZWNyeXB0UmVxdWVzdBIUCgx1c2VyX2FkZHJlc3MYASABKAkSGQoRcmVlbmNyeXB0X3B1Yl9rZXkYAiABKAwSGAoQZWlwNzEyX3NpZ25hdHVyZRgDIAEoDBI+
|
|
12
|
+
exports.file_inco_kms_lite_v1_kms_service = (0, codegenv2_1.fileDesc)("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", [types_pb_1.file_inco_kms_lite_v1_types]);
|
|
13
13
|
/**
|
|
14
14
|
* Describes the message inco.kms.lite.v1.IsReadyRequest.
|
|
15
15
|
* Use `create(IsReadyRequestSchema)` to create a new message.
|
|
@@ -25,46 +25,71 @@ exports.IsReadyResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_k
|
|
|
25
25
|
* Use `create(AttestedDecryptRequestSchema)` to create a new message.
|
|
26
26
|
*/
|
|
27
27
|
exports.AttestedDecryptRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service, 2);
|
|
28
|
+
/**
|
|
29
|
+
* Describes the message inco.kms.lite.v1.EListAttestedDecryptRequest.
|
|
30
|
+
* Use `create(EListAttestedDecryptRequestSchema)` to create a new message.
|
|
31
|
+
*/
|
|
32
|
+
exports.EListAttestedDecryptRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service, 3);
|
|
33
|
+
/**
|
|
34
|
+
* Describes the message inco.kms.lite.v1.EListAttestedDecryptResponse.
|
|
35
|
+
* Use `create(EListAttestedDecryptResponseSchema)` to create a new message.
|
|
36
|
+
*/
|
|
37
|
+
exports.EListAttestedDecryptResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service, 4);
|
|
28
38
|
/**
|
|
29
39
|
* Describes the message inco.kms.lite.v1.AttestedRevealRequest.
|
|
30
40
|
* Use `create(AttestedRevealRequestSchema)` to create a new message.
|
|
31
41
|
*/
|
|
32
|
-
exports.AttestedRevealRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service,
|
|
42
|
+
exports.AttestedRevealRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service, 5);
|
|
43
|
+
/**
|
|
44
|
+
* Describes the message inco.kms.lite.v1.EListAttestedRevealRequest.
|
|
45
|
+
* Use `create(EListAttestedRevealRequestSchema)` to create a new message.
|
|
46
|
+
*/
|
|
47
|
+
exports.EListAttestedRevealRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service, 6);
|
|
33
48
|
/**
|
|
34
49
|
* Describes the message inco.kms.lite.v1.AttestedComputeRequest.
|
|
35
50
|
* Use `create(AttestedComputeRequestSchema)` to create a new message.
|
|
36
51
|
*/
|
|
37
|
-
exports.AttestedComputeRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service,
|
|
52
|
+
exports.AttestedComputeRequestSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service, 7);
|
|
38
53
|
/**
|
|
39
54
|
* Describes the message inco.kms.lite.v1.AttestedDecryptResponse.
|
|
40
55
|
* Use `create(AttestedDecryptResponseSchema)` to create a new message.
|
|
41
56
|
*/
|
|
42
|
-
exports.AttestedDecryptResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service,
|
|
57
|
+
exports.AttestedDecryptResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service, 8);
|
|
43
58
|
/**
|
|
44
59
|
* Describes the message inco.kms.lite.v1.AttestedRevealResponse.
|
|
45
60
|
* Use `create(AttestedRevealResponseSchema)` to create a new message.
|
|
46
61
|
*/
|
|
47
|
-
exports.AttestedRevealResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service,
|
|
62
|
+
exports.AttestedRevealResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service, 9);
|
|
63
|
+
/**
|
|
64
|
+
* Describes the message inco.kms.lite.v1.EListAttestedRevealResponse.
|
|
65
|
+
* Use `create(EListAttestedRevealResponseSchema)` to create a new message.
|
|
66
|
+
*/
|
|
67
|
+
exports.EListAttestedRevealResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service, 10);
|
|
48
68
|
/**
|
|
49
69
|
* Describes the message inco.kms.lite.v1.AttestedComputeResponse.
|
|
50
70
|
* Use `create(AttestedComputeResponseSchema)` to create a new message.
|
|
51
71
|
*/
|
|
52
|
-
exports.AttestedComputeResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service,
|
|
72
|
+
exports.AttestedComputeResponseSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service, 11);
|
|
53
73
|
/**
|
|
54
74
|
* Describes the message inco.kms.lite.v1.Plaintext.
|
|
55
75
|
* Use `create(PlaintextSchema)` to create a new message.
|
|
56
76
|
*/
|
|
57
|
-
exports.PlaintextSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service,
|
|
77
|
+
exports.PlaintextSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service, 12);
|
|
58
78
|
/**
|
|
59
79
|
* Describes the message inco.kms.lite.v1.Reencryption.
|
|
60
80
|
* Use `create(ReencryptionSchema)` to create a new message.
|
|
61
81
|
*/
|
|
62
|
-
exports.ReencryptionSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service,
|
|
82
|
+
exports.ReencryptionSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service, 13);
|
|
83
|
+
/**
|
|
84
|
+
* Describes the message inco.kms.lite.v1.EListElement.
|
|
85
|
+
* Use `create(EListElementSchema)` to create a new message.
|
|
86
|
+
*/
|
|
87
|
+
exports.EListElementSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service, 14);
|
|
63
88
|
/**
|
|
64
89
|
* Describes the message inco.kms.lite.v1.DecryptionAttestation.
|
|
65
90
|
* Use `create(DecryptionAttestationSchema)` to create a new message.
|
|
66
91
|
*/
|
|
67
|
-
exports.DecryptionAttestationSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service,
|
|
92
|
+
exports.DecryptionAttestationSchema = (0, codegenv2_1.messageDesc)(exports.file_inco_kms_lite_v1_kms_service, 15);
|
|
68
93
|
/**
|
|
69
94
|
* KmsService is the service for the IncoLite KMS, which will run
|
|
70
95
|
* inside the TEE.
|
|
@@ -72,4 +97,4 @@ exports.DecryptionAttestationSchema = (0, codegenv2_1.messageDesc)(exports.file_
|
|
|
72
97
|
* @generated from service inco.kms.lite.v1.KmsService
|
|
73
98
|
*/
|
|
74
99
|
exports.KmsService = (0, codegenv2_1.serviceDesc)(exports.file_inco_kms_lite_v1_kms_service, 0);
|
|
75
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
100
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -107,9 +107,9 @@ export type TeeKeys = Message<"inco.sealingfetcher.v1.TeeKeys"> & {
|
|
|
107
107
|
*/
|
|
108
108
|
eoaPrivkey: Uint8Array;
|
|
109
109
|
/**
|
|
110
|
-
* The Network private key that the TEE generated during the bootstrap process.
|
|
111
|
-
* This is
|
|
112
|
-
*
|
|
110
|
+
* The Network private key (X-Wing) that the TEE generated during the bootstrap process.
|
|
111
|
+
* This is a 32-byte seed used to derive the X-Wing keypair for input encryption.
|
|
112
|
+
* X-Wing is a post-quantum hybrid KEM combining ML-KEM-768 and X25519.
|
|
113
113
|
*
|
|
114
114
|
* @generated from field: bytes network_privkey = 2;
|
|
115
115
|
*/
|
|
@@ -1,7 +1,8 @@
|
|
|
1
1
|
import type { Address } from 'viem';
|
|
2
2
|
import type { DecryptionAttestation, EncryptedDecryptionAttestation } from '../attesteddecrypt/types.js';
|
|
3
|
-
import type {
|
|
3
|
+
import type { EncryptionScheme, SupportedFheType } from '../encryption/encryption.js';
|
|
4
4
|
import type { AttestedComputeRequest, AttestedDecryptRequest, AttestedRevealRequest } from '../generated/es/inco/kms/lite/v1/kms_service_pb.js';
|
|
5
|
+
import type { XwingKeypair } from '../lite/index.js';
|
|
5
6
|
import type { BackoffConfig } from '../retry.js';
|
|
6
7
|
import { type KmsClient } from './client.js';
|
|
7
8
|
export declare class KmsQuorumClient {
|
|
@@ -28,9 +29,9 @@ export declare class KmsQuorumClient {
|
|
|
28
29
|
* @throws {Error} If KMS clients array is empty or threshold is invalid
|
|
29
30
|
*/
|
|
30
31
|
static fromKmsClients(kmsClients: KmsClient[], threshold: number): KmsQuorumClient;
|
|
31
|
-
attestedDecrypt(request: AttestedDecryptRequest, backoffConfig?: Partial<BackoffConfig
|
|
32
|
-
attestedCompute(request: AttestedComputeRequest, backoffConfig?: Partial<BackoffConfig
|
|
33
|
-
attestedReveal(request: AttestedRevealRequest, backoffConfig?: Partial<BackoffConfig>): Promise<(DecryptionAttestation<
|
|
32
|
+
attestedDecrypt(request: AttestedDecryptRequest, backoffConfig?: Partial<BackoffConfig>, reencryptKeypair?: XwingKeypair): Promise<(DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>)[]>;
|
|
33
|
+
attestedCompute(request: AttestedComputeRequest, backoffConfig?: Partial<BackoffConfig>, reencryptKeypair?: XwingKeypair): Promise<DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>;
|
|
34
|
+
attestedReveal(request: AttestedRevealRequest, backoffConfig?: Partial<BackoffConfig>): Promise<(DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>)[]>;
|
|
34
35
|
/**
|
|
35
36
|
* Generic method to execute a KMS operation across all clients with retry and threshold logic.
|
|
36
37
|
* Returns results with both the response and signer address.
|