@inco/js 0.8.0-devnet-5 → 0.8.0-devnet-7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/advancedacl/session-key.d.ts +11 -10
- package/dist/cjs/advancedacl/session-key.js +7 -11
- package/dist/cjs/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/cjs/attestedcompute/attested-compute.js +2 -2
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +8 -8
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +6 -6
- package/dist/cjs/encryption/encryption.d.ts +10 -10
- package/dist/cjs/encryption/encryption.js +5 -5
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +270 -7
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.js +98 -12
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +0 -6
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +2 -8
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +213 -0
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +36 -11
- package/dist/cjs/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +3 -3
- package/dist/cjs/kms/quorumClient.d.ts +5 -4
- package/dist/cjs/kms/quorumClient.js +33 -30
- package/dist/cjs/lite/index.d.ts +1 -1
- package/dist/cjs/lite/index.js +15 -2
- package/dist/cjs/lite/lightning.d.ts +33 -24
- package/dist/cjs/lite/lightning.js +67 -38
- package/dist/cjs/lite/xwing.d.ts +123 -0
- package/dist/cjs/lite/xwing.js +275 -0
- package/dist/cjs/reencryption/types.d.ts +2 -2
- package/dist/esm/advancedacl/session-key.d.ts +11 -10
- package/dist/esm/advancedacl/session-key.js +7 -11
- package/dist/esm/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/esm/attestedcompute/attested-compute.js +2 -2
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +8 -8
- package/dist/esm/attesteddecrypt/attested-decrypt.js +4 -4
- package/dist/esm/encryption/encryption.d.ts +10 -10
- package/dist/esm/encryption/encryption.js +5 -5
- package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +270 -7
- package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.js +97 -11
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +0 -6
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +2 -8
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +213 -0
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +35 -10
- package/dist/esm/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +3 -3
- package/dist/esm/kms/quorumClient.d.ts +5 -4
- package/dist/esm/kms/quorumClient.js +33 -30
- package/dist/esm/lite/index.d.ts +1 -1
- package/dist/esm/lite/index.js +2 -2
- package/dist/esm/lite/lightning.d.ts +33 -24
- package/dist/esm/lite/lightning.js +67 -38
- package/dist/esm/lite/xwing.d.ts +123 -0
- package/dist/esm/lite/xwing.js +263 -0
- package/dist/esm/reencryption/types.d.ts +2 -2
- package/dist/types/advancedacl/session-key.d.ts +11 -10
- package/dist/types/attestedcompute/attested-compute.d.ts +6 -6
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +8 -8
- package/dist/types/encryption/encryption.d.ts +10 -10
- package/dist/types/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +270 -7
- package/dist/types/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +0 -6
- package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +213 -0
- package/dist/types/generated/es/inco/sealingfetcher/v1/sealingfetcher_pb.d.ts +3 -3
- package/dist/types/kms/quorumClient.d.ts +5 -4
- package/dist/types/lite/index.d.ts +1 -1
- package/dist/types/lite/lightning.d.ts +33 -24
- package/dist/types/lite/xwing.d.ts +123 -0
- package/dist/types/reencryption/types.d.ts +2 -2
- package/package.json +6 -6
- package/dist/cjs/lite/ecies.d.ts +0 -26
- package/dist/cjs/lite/ecies.js +0 -146
- package/dist/esm/lite/ecies.d.ts +0 -26
- package/dist/esm/lite/ecies.js +0 -134
- package/dist/types/lite/ecies.d.ts +0 -26
|
@@ -7,7 +7,7 @@ import { incoVerifierAbi } from '../generated/abis/verifier.js';
|
|
|
7
7
|
import { AttestedDecryptRequestSchema, AttestedRevealRequestSchema, } from '../generated/es/inco/kms/lite/v1/kms_service_pb.js';
|
|
8
8
|
import { HandleWithProofSchema, } from '../generated/es/inco/kms/lite/v1/types_pb.js';
|
|
9
9
|
import { getHandleType } from '../handle.js';
|
|
10
|
-
import { decrypt } from '../lite/
|
|
10
|
+
import { decrypt } from '../lite/xwing.js';
|
|
11
11
|
import { createEIP712Payload } from '../reencryption/eip712.js';
|
|
12
12
|
import { AttestedDecryptError, } from './types.js';
|
|
13
13
|
export const ATTESTED_DECRYPT_DOMAIN_NAME = 'IncoAttestedDecrypt';
|
|
@@ -45,7 +45,7 @@ export async function attestedDecrypt({ handles, backoffConfig, walletClient, ch
|
|
|
45
45
|
});
|
|
46
46
|
// Call quorum client which returns aggregated attestations directly
|
|
47
47
|
// The quorum client handles retry logic internally for each KMS client
|
|
48
|
-
response = await kmsQuorumClient.attestedDecrypt(attestedDecryptRequest, backoffConfig);
|
|
48
|
+
response = await kmsQuorumClient.attestedDecrypt(attestedDecryptRequest, backoffConfig, reencryptKeypair);
|
|
49
49
|
// If reencryptPubKey is provided with a keypair, decrypt the encrypted attestations
|
|
50
50
|
if (reencryptPubKey !== undefined && reencryptKeypair) {
|
|
51
51
|
response = await decryptEncryptedAttestations(response, reencryptKeypair);
|
|
@@ -154,7 +154,7 @@ export async function decryptEncryptedAttestations(attestations, reencryptKeypai
|
|
|
154
154
|
}));
|
|
155
155
|
return {
|
|
156
156
|
handle: encryptedAtt.handle,
|
|
157
|
-
plaintext: bigintToPlaintext(encryptionSchemes.
|
|
157
|
+
plaintext: bigintToPlaintext(encryptionSchemes.xwing, handleType, bigIntValue),
|
|
158
158
|
covalidatorSignatures: decryptedSignatures,
|
|
159
159
|
};
|
|
160
160
|
}
|
|
@@ -171,4 +171,4 @@ export function validateHandle(handle) {
|
|
|
171
171
|
throw new AttestedDecryptError('Invalid handle format: must be a 32-byte hex string with 0x prefix');
|
|
172
172
|
}
|
|
173
173
|
}
|
|
174
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
174
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -14,19 +14,19 @@ export type SupportedFheTypeName = typeof SupportedFheTypeName.Type;
|
|
|
14
14
|
export declare const SupportedFheType: Schema.SchemaClass<0 | 5 | 7 | 8, 0 | 5 | 7 | 8, never>;
|
|
15
15
|
export type SupportedFheType = typeof SupportedFheType.Type;
|
|
16
16
|
export declare const encryptionSchemes: {
|
|
17
|
-
readonly
|
|
17
|
+
readonly xwing: 2;
|
|
18
18
|
};
|
|
19
19
|
export declare function getEncryptionSchemeName(scheme: number): string;
|
|
20
20
|
export type EncryptionSchemes = typeof encryptionSchemes;
|
|
21
|
-
export type
|
|
22
|
-
export declare const EncryptionScheme: Schema.Literal<[
|
|
21
|
+
export type XwingScheme = EncryptionSchemes['xwing'];
|
|
22
|
+
export declare const EncryptionScheme: Schema.Literal<[2]>;
|
|
23
23
|
export type EncryptionScheme = typeof EncryptionScheme.Type;
|
|
24
24
|
type DistType<P, S extends EncryptionScheme, T extends SupportedFheType> = P extends any ? P & {
|
|
25
25
|
scheme: S;
|
|
26
26
|
type: T;
|
|
27
27
|
} : never;
|
|
28
28
|
export declare const Ciphertext: Schema.Struct<{
|
|
29
|
-
scheme: Schema.Literal<[
|
|
29
|
+
scheme: Schema.Literal<[2]>;
|
|
30
30
|
type: Schema.SchemaClass<0 | 5 | 7 | 8, 0 | 5 | 7 | 8, never>;
|
|
31
31
|
value: Schema.TemplateLiteral<`0x${string}`>;
|
|
32
32
|
}>;
|
|
@@ -34,7 +34,7 @@ export type Ciphertext = typeof Ciphertext.Type;
|
|
|
34
34
|
export type CiphertextOf<S extends EncryptionScheme, T extends SupportedFheType> = DistType<Ciphertext, S, T>;
|
|
35
35
|
export declare const CiphertextWithContext: Schema.Struct<{
|
|
36
36
|
ciphertext: Schema.Struct<{
|
|
37
|
-
scheme: Schema.Literal<[
|
|
37
|
+
scheme: Schema.Literal<[2]>;
|
|
38
38
|
type: Schema.SchemaClass<0 | 5 | 7 | 8, 0 | 5 | 7 | 8, never>;
|
|
39
39
|
value: Schema.TemplateLiteral<`0x${string}`>;
|
|
40
40
|
}>;
|
|
@@ -52,7 +52,7 @@ export type CiphertextWithContextOf<S extends EncryptionScheme, T extends Suppor
|
|
|
52
52
|
};
|
|
53
53
|
export declare const EncryptResult: Schema.Struct<{
|
|
54
54
|
ciphertext: Schema.Struct<{
|
|
55
|
-
scheme: Schema.Literal<[
|
|
55
|
+
scheme: Schema.Literal<[2]>;
|
|
56
56
|
type: Schema.SchemaClass<0 | 5 | 7 | 8, 0 | 5 | 7 | 8, never>;
|
|
57
57
|
value: Schema.TemplateLiteral<`0x${string}`>;
|
|
58
58
|
}>;
|
|
@@ -71,11 +71,11 @@ export type EncryptResultOf<S extends EncryptionScheme, T extends SupportedFheTy
|
|
|
71
71
|
ciphertext: CiphertextOf<S, T>;
|
|
72
72
|
};
|
|
73
73
|
export declare const Plaintext: Schema.Union<[Schema.Struct<{
|
|
74
|
-
scheme: Schema.Literal<[
|
|
74
|
+
scheme: Schema.Literal<[2]>;
|
|
75
75
|
type: Schema.Literal<[5, 7, 8]>;
|
|
76
76
|
value: typeof Schema.BigInt;
|
|
77
77
|
}>, Schema.Struct<{
|
|
78
|
-
scheme: Schema.Literal<[
|
|
78
|
+
scheme: Schema.Literal<[2]>;
|
|
79
79
|
type: Schema.Literal<[0]>;
|
|
80
80
|
value: typeof Schema.Boolean;
|
|
81
81
|
}>]>;
|
|
@@ -83,11 +83,11 @@ export type Plaintext = typeof Plaintext.Type;
|
|
|
83
83
|
export type PlaintextOf<S extends EncryptionScheme, T extends SupportedFheType> = DistType<Plaintext, S, T>;
|
|
84
84
|
export declare const PlaintextWithContext: Schema.Struct<{
|
|
85
85
|
plaintext: Schema.Union<[Schema.Struct<{
|
|
86
|
-
scheme: Schema.Literal<[
|
|
86
|
+
scheme: Schema.Literal<[2]>;
|
|
87
87
|
type: Schema.Literal<[5, 7, 8]>;
|
|
88
88
|
value: typeof Schema.BigInt;
|
|
89
89
|
}>, Schema.Struct<{
|
|
90
|
-
scheme: Schema.Literal<[
|
|
90
|
+
scheme: Schema.Literal<[2]>;
|
|
91
91
|
type: Schema.Literal<[0]>;
|
|
92
92
|
value: typeof Schema.Boolean;
|
|
93
93
|
}>]>;
|
|
@@ -14,17 +14,17 @@ export const SupportedFheTypeName = Schema.Literal(...supportedFheTypeNames);
|
|
|
14
14
|
// TODO: extend to all types
|
|
15
15
|
export const SupportedFheType = Schema.Literal(...Object.values(supportedFheTypes));
|
|
16
16
|
export const encryptionSchemes = {
|
|
17
|
-
|
|
17
|
+
xwing: 2,
|
|
18
18
|
};
|
|
19
19
|
export function getEncryptionSchemeName(scheme) {
|
|
20
20
|
switch (scheme) {
|
|
21
|
-
case encryptionSchemes.
|
|
22
|
-
return '
|
|
21
|
+
case encryptionSchemes.xwing:
|
|
22
|
+
return 'X-Wing';
|
|
23
23
|
default:
|
|
24
24
|
throw new Error(`Unknown encryption scheme: ${scheme}`);
|
|
25
25
|
}
|
|
26
26
|
}
|
|
27
|
-
export const EncryptionScheme = Schema.Literal(encryptionSchemes.
|
|
27
|
+
export const EncryptionScheme = Schema.Literal(encryptionSchemes.xwing);
|
|
28
28
|
export const Ciphertext = Schema.Struct({
|
|
29
29
|
scheme: EncryptionScheme,
|
|
30
30
|
type: SupportedFheType,
|
|
@@ -121,4 +121,4 @@ export function bytes32ToPlaintext(plaintext, scheme, type) {
|
|
|
121
121
|
export function bytesToPlaintext(plaintext, scheme, type) {
|
|
122
122
|
return bigintToPlaintext(scheme, type, BigInt(bytesToBigInt(plaintext)));
|
|
123
123
|
}
|
|
124
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
124
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import type { GenEnum, GenFile, GenMessage, GenService } from "@bufbuild/protobuf/codegenv2";
|
|
2
2
|
import type { CryptogramWithProof, InputCryptogram, StoredCryptogram } from "./types_pb";
|
|
3
|
-
import type { DecryptionAttestation } from "../../../kms/lite/v1/kms_service_pb";
|
|
3
|
+
import type { DecryptionAttestation, EListElement } from "../../../kms/lite/v1/kms_service_pb";
|
|
4
4
|
import type { ACLProof, SupportedScalarBinaryOp } from "../../../kms/lite/v1/types_pb";
|
|
5
5
|
import type { RATlsServer } from "../../../sealingfetcher/v1/sealingfetcher_pb";
|
|
6
6
|
import type { StartHeliosRequest } from "../../../helioswrapper/v1/helioswrapper_pb";
|
|
@@ -580,6 +580,24 @@ export type ConfigureRequest = Message<"inco.covalidator.compute.v1.ConfigureReq
|
|
|
580
580
|
* Use `create(ConfigureRequestSchema)` to create a new message.
|
|
581
581
|
*/
|
|
582
582
|
export declare const ConfigureRequestSchema: GenMessage<ConfigureRequest>;
|
|
583
|
+
/**
|
|
584
|
+
* HeliosConfigureRequest is a request to configure the helios light client.
|
|
585
|
+
*
|
|
586
|
+
* @generated from message inco.covalidator.compute.v1.HeliosConfigureRequest
|
|
587
|
+
*/
|
|
588
|
+
export type HeliosConfigureRequest = Message<"inco.covalidator.compute.v1.HeliosConfigureRequest"> & {
|
|
589
|
+
/**
|
|
590
|
+
* Provide Helios-specific configuration to start the Helios from compute service.
|
|
591
|
+
*
|
|
592
|
+
* @generated from field: inco.helioswrapper.v1.StartHeliosRequest helios_config = 2;
|
|
593
|
+
*/
|
|
594
|
+
heliosConfig?: StartHeliosRequest;
|
|
595
|
+
};
|
|
596
|
+
/**
|
|
597
|
+
* Describes the message inco.covalidator.compute.v1.HeliosConfigureRequest.
|
|
598
|
+
* Use `create(HeliosConfigureRequestSchema)` to create a new message.
|
|
599
|
+
*/
|
|
600
|
+
export declare const HeliosConfigureRequestSchema: GenMessage<HeliosConfigureRequest>;
|
|
583
601
|
/**
|
|
584
602
|
* ConfigureResponse is a response to ConfigureRequest.
|
|
585
603
|
*
|
|
@@ -604,6 +622,24 @@ export type ConfigureResponse = Message<"inco.covalidator.compute.v1.ConfigureRe
|
|
|
604
622
|
* Use `create(ConfigureResponseSchema)` to create a new message.
|
|
605
623
|
*/
|
|
606
624
|
export declare const ConfigureResponseSchema: GenMessage<ConfigureResponse>;
|
|
625
|
+
/**
|
|
626
|
+
* HeliosConfigureResponse is a response to HeliosConfigureRequest.
|
|
627
|
+
*
|
|
628
|
+
* @generated from message inco.covalidator.compute.v1.HeliosConfigureResponse
|
|
629
|
+
*/
|
|
630
|
+
export type HeliosConfigureResponse = Message<"inco.covalidator.compute.v1.HeliosConfigureResponse"> & {
|
|
631
|
+
/**
|
|
632
|
+
* True if the Helios light client was started successfully.
|
|
633
|
+
*
|
|
634
|
+
* @generated from field: bool helios_started = 1;
|
|
635
|
+
*/
|
|
636
|
+
heliosStarted: boolean;
|
|
637
|
+
};
|
|
638
|
+
/**
|
|
639
|
+
* Describes the message inco.covalidator.compute.v1.HeliosConfigureResponse.
|
|
640
|
+
* Use `create(HeliosConfigureResponseSchema)` to create a new message.
|
|
641
|
+
*/
|
|
642
|
+
export declare const HeliosConfigureResponseSchema: GenMessage<HeliosConfigureResponse>;
|
|
607
643
|
/**
|
|
608
644
|
* AttestedDecryptRequest is the request type for the ComputeService/AttestedDecrypt RPC method.
|
|
609
645
|
*
|
|
@@ -619,8 +655,8 @@ export type AttestedDecryptRequest = Message<"inco.covalidator.compute.v1.Attest
|
|
|
619
655
|
userAddress: string;
|
|
620
656
|
/**
|
|
621
657
|
* reencrypt_pub_key is the encoding of the user's public
|
|
622
|
-
* encryption key (
|
|
623
|
-
* It is encoded in its
|
|
658
|
+
* encryption key (X-Wing) used to reencrypt the result for.
|
|
659
|
+
* It is encoded in its 1216-byte format.
|
|
624
660
|
* If empty, the KMS will return plaintext decryption instead of reencryption.
|
|
625
661
|
*
|
|
626
662
|
* @generated from field: bytes reencrypt_pub_key = 2;
|
|
@@ -680,6 +716,82 @@ export type AttestedDecryptRequest = Message<"inco.covalidator.compute.v1.Attest
|
|
|
680
716
|
* Use `create(AttestedDecryptRequestSchema)` to create a new message.
|
|
681
717
|
*/
|
|
682
718
|
export declare const AttestedDecryptRequestSchema: GenMessage<AttestedDecryptRequest>;
|
|
719
|
+
/**
|
|
720
|
+
* EListAttestedDecryptRequest is the request type for the ComputeService/EListAttestedDecrypt RPC method.
|
|
721
|
+
*
|
|
722
|
+
* @generated from message inco.covalidator.compute.v1.EListAttestedDecryptRequest
|
|
723
|
+
*/
|
|
724
|
+
export type EListAttestedDecryptRequest = Message<"inco.covalidator.compute.v1.EListAttestedDecryptRequest"> & {
|
|
725
|
+
/**
|
|
726
|
+
* user_address is the Ethereum address of the user who requested the
|
|
727
|
+
* decryption, prefixed with 0x.
|
|
728
|
+
*
|
|
729
|
+
* @generated from field: string user_address = 1;
|
|
730
|
+
*/
|
|
731
|
+
userAddress: string;
|
|
732
|
+
/**
|
|
733
|
+
* reencrypt_pub_key is the encoding of the user's public
|
|
734
|
+
* encryption key (secp256k1) used to reencrypt the result for.
|
|
735
|
+
* It is encoded in its 33-byte compressed format.
|
|
736
|
+
* If empty, the KMS will return plaintext decryption instead of reencryption.
|
|
737
|
+
*
|
|
738
|
+
* @generated from field: bytes reencrypt_pub_key = 2;
|
|
739
|
+
*/
|
|
740
|
+
reencryptPubKey: Uint8Array;
|
|
741
|
+
/**
|
|
742
|
+
* eip712_signature is an EIP-712 signature of the following EIP-712 typed data by
|
|
743
|
+
* `user_address` (note that we only give a JSON representation for the sake of
|
|
744
|
+
* readability, but the actual signed data is defined in the EIP-712 spec) where:
|
|
745
|
+
* handles - list of 0x prefixed handles to decrypt
|
|
746
|
+
* publicKey - 0x prefixed reencrypt_pub_key (if any). "0x" otherwise if empty.
|
|
747
|
+
*
|
|
748
|
+
* ```json
|
|
749
|
+
* {
|
|
750
|
+
* "types": {
|
|
751
|
+
* "EIP712Domain": [
|
|
752
|
+
* { "name": "name", "type": "string" },
|
|
753
|
+
* { "name": "version", "type": "string" },
|
|
754
|
+
* { "name": "chainId", "type": "uint256" }
|
|
755
|
+
* ],
|
|
756
|
+
* "AttestedDecryptRequest": [
|
|
757
|
+
* { "name": "handles", "type": "bytes32[]" },
|
|
758
|
+
* { "name": "publicKey", "type": "bytes" },
|
|
759
|
+
* ]
|
|
760
|
+
* },
|
|
761
|
+
* "primaryType": "AttestedDecryptRequest",
|
|
762
|
+
* "domain": {
|
|
763
|
+
* "name": "IncoAttestedDecrypt",
|
|
764
|
+
* "version": "0.1.0",
|
|
765
|
+
* "chainId": "<host_chain_id>",
|
|
766
|
+
* },
|
|
767
|
+
* "message": {
|
|
768
|
+
* "handles": ["<handle1>", "<handle2>", ...],
|
|
769
|
+
* "publicKey": "0x<reencrypt_pub_key>"
|
|
770
|
+
* }
|
|
771
|
+
* }
|
|
772
|
+
* ```
|
|
773
|
+
*
|
|
774
|
+
* @generated from field: bytes eip712_signature = 3;
|
|
775
|
+
*/
|
|
776
|
+
eip712Signature: Uint8Array;
|
|
777
|
+
/**
|
|
778
|
+
* cryptogram_with_proof is the cryptogram for elist with proof to decrypt.
|
|
779
|
+
* Either the user_address or sharer must have ACL access to the elist cryptogram handle for the attested
|
|
780
|
+
* decryption to succeed.
|
|
781
|
+
*
|
|
782
|
+
* @generated from field: inco.covalidator.compute.v1.CryptogramWithProof cryptogram_with_proof = 4;
|
|
783
|
+
*/
|
|
784
|
+
cryptogramWithProof?: CryptogramWithProof;
|
|
785
|
+
/**
|
|
786
|
+
* @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 5;
|
|
787
|
+
*/
|
|
788
|
+
configureRequest?: ConfigureRequest;
|
|
789
|
+
};
|
|
790
|
+
/**
|
|
791
|
+
* Describes the message inco.covalidator.compute.v1.EListAttestedDecryptRequest.
|
|
792
|
+
* Use `create(EListAttestedDecryptRequestSchema)` to create a new message.
|
|
793
|
+
*/
|
|
794
|
+
export declare const EListAttestedDecryptRequestSchema: GenMessage<EListAttestedDecryptRequest>;
|
|
683
795
|
/**
|
|
684
796
|
* AttestedDecryptResponse is the response type for the ComputeService/AttestedDecrypt RPC method.
|
|
685
797
|
*
|
|
@@ -699,6 +811,30 @@ export type AttestedDecryptResponse = Message<"inco.covalidator.compute.v1.Attes
|
|
|
699
811
|
* Use `create(AttestedDecryptResponseSchema)` to create a new message.
|
|
700
812
|
*/
|
|
701
813
|
export declare const AttestedDecryptResponseSchema: GenMessage<AttestedDecryptResponse>;
|
|
814
|
+
/**
|
|
815
|
+
* EListAttestedDecryptResponse is the response type for the ComputeService/EListAttestedDecrypt RPC method.
|
|
816
|
+
*
|
|
817
|
+
* @generated from message inco.covalidator.compute.v1.EListAttestedDecryptResponse
|
|
818
|
+
*/
|
|
819
|
+
export type EListAttestedDecryptResponse = Message<"inco.covalidator.compute.v1.EListAttestedDecryptResponse"> & {
|
|
820
|
+
/**
|
|
821
|
+
* commitment_proof_attestation is the signed commitment proof of the decrypted elist values.
|
|
822
|
+
*
|
|
823
|
+
* @generated from field: inco.kms.lite.v1.DecryptionAttestation commitment_proof_attestation = 1;
|
|
824
|
+
*/
|
|
825
|
+
commitmentProofAttestation?: DecryptionAttestation;
|
|
826
|
+
/**
|
|
827
|
+
* values is the list of decrypted elist elements.
|
|
828
|
+
*
|
|
829
|
+
* @generated from field: repeated inco.kms.lite.v1.EListElement values = 2;
|
|
830
|
+
*/
|
|
831
|
+
values: EListElement[];
|
|
832
|
+
};
|
|
833
|
+
/**
|
|
834
|
+
* Describes the message inco.covalidator.compute.v1.EListAttestedDecryptResponse.
|
|
835
|
+
* Use `create(EListAttestedDecryptResponseSchema)` to create a new message.
|
|
836
|
+
*/
|
|
837
|
+
export declare const EListAttestedDecryptResponseSchema: GenMessage<EListAttestedDecryptResponse>;
|
|
702
838
|
/**
|
|
703
839
|
* AttestedRevealRequest is the request type for the ComputeService/AttestedReveal RPC method.
|
|
704
840
|
*
|
|
@@ -722,6 +858,29 @@ export type AttestedRevealRequest = Message<"inco.covalidator.compute.v1.Atteste
|
|
|
722
858
|
* Use `create(AttestedRevealRequestSchema)` to create a new message.
|
|
723
859
|
*/
|
|
724
860
|
export declare const AttestedRevealRequestSchema: GenMessage<AttestedRevealRequest>;
|
|
861
|
+
/**
|
|
862
|
+
* EListAttestedRevealRequest is the request type for the ComputeService/EListAttestedReveal RPC method.
|
|
863
|
+
*
|
|
864
|
+
* @generated from message inco.covalidator.compute.v1.EListAttestedRevealRequest
|
|
865
|
+
*/
|
|
866
|
+
export type EListAttestedRevealRequest = Message<"inco.covalidator.compute.v1.EListAttestedRevealRequest"> & {
|
|
867
|
+
/**
|
|
868
|
+
* cryptogram is the elist ciphertext to decrypt.
|
|
869
|
+
* The elist handle must have been revealed beforehand with the on-chain .reveal() call.
|
|
870
|
+
*
|
|
871
|
+
* @generated from field: inco.covalidator.compute.v1.StoredCryptogram cryptogram = 3;
|
|
872
|
+
*/
|
|
873
|
+
cryptogram?: StoredCryptogram;
|
|
874
|
+
/**
|
|
875
|
+
* @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 4;
|
|
876
|
+
*/
|
|
877
|
+
configureRequest?: ConfigureRequest;
|
|
878
|
+
};
|
|
879
|
+
/**
|
|
880
|
+
* Describes the message inco.covalidator.compute.v1.EListAttestedRevealRequest.
|
|
881
|
+
* Use `create(EListAttestedRevealRequestSchema)` to create a new message.
|
|
882
|
+
*/
|
|
883
|
+
export declare const EListAttestedRevealRequestSchema: GenMessage<EListAttestedRevealRequest>;
|
|
725
884
|
/**
|
|
726
885
|
* AttestedRevealResponse is the response type for the ComputeService/AttestedReveal RPC method.
|
|
727
886
|
*
|
|
@@ -741,6 +900,30 @@ export type AttestedRevealResponse = Message<"inco.covalidator.compute.v1.Attest
|
|
|
741
900
|
* Use `create(AttestedRevealResponseSchema)` to create a new message.
|
|
742
901
|
*/
|
|
743
902
|
export declare const AttestedRevealResponseSchema: GenMessage<AttestedRevealResponse>;
|
|
903
|
+
/**
|
|
904
|
+
* EListAttestedRevealResponse is the response type for the ComputeService/EListAttestedRevealResponse RPC method.
|
|
905
|
+
*
|
|
906
|
+
* @generated from message inco.covalidator.compute.v1.EListAttestedRevealResponse
|
|
907
|
+
*/
|
|
908
|
+
export type EListAttestedRevealResponse = Message<"inco.covalidator.compute.v1.EListAttestedRevealResponse"> & {
|
|
909
|
+
/**
|
|
910
|
+
* commitment_proof_attestation is the signed commitment proof of the decrypted elist values.
|
|
911
|
+
*
|
|
912
|
+
* @generated from field: inco.kms.lite.v1.DecryptionAttestation commitment_proof_attestation = 1;
|
|
913
|
+
*/
|
|
914
|
+
commitmentProofAttestation?: DecryptionAttestation;
|
|
915
|
+
/**
|
|
916
|
+
* values is the list of decrypted elist elements.
|
|
917
|
+
*
|
|
918
|
+
* @generated from field: repeated inco.kms.lite.v1.EListElement values = 2;
|
|
919
|
+
*/
|
|
920
|
+
values: EListElement[];
|
|
921
|
+
};
|
|
922
|
+
/**
|
|
923
|
+
* Describes the message inco.covalidator.compute.v1.EListAttestedRevealResponse.
|
|
924
|
+
* Use `create(EListAttestedRevealResponseSchema)` to create a new message.
|
|
925
|
+
*/
|
|
926
|
+
export declare const EListAttestedRevealResponseSchema: GenMessage<EListAttestedRevealResponse>;
|
|
744
927
|
/**
|
|
745
928
|
* AttestedComputeRequest is the request type for the ComputeService/AttestedDecrypt RPC method.
|
|
746
929
|
*
|
|
@@ -756,8 +939,8 @@ export type AttestedComputeRequest = Message<"inco.covalidator.compute.v1.Attest
|
|
|
756
939
|
userAddress: string;
|
|
757
940
|
/**
|
|
758
941
|
* reencrypt_pub_key is the encoding of the user's public
|
|
759
|
-
* encryption key (
|
|
760
|
-
* It is encoded in its
|
|
942
|
+
* encryption key (X-Wing) used to reencrypt the result for.
|
|
943
|
+
* It is encoded in its 1216-byte format.
|
|
761
944
|
* If empty, the KMS will return plaintext decryption instead of reencryption.
|
|
762
945
|
*
|
|
763
946
|
* @generated from field: bytes reencrypt_pub_key = 2;
|
|
@@ -1008,10 +1191,66 @@ export declare enum FheOperation {
|
|
|
1008
1191
|
* @generated from enum value: FHE_RAND_BOUNDED = 27;
|
|
1009
1192
|
*/
|
|
1010
1193
|
FHE_RAND_BOUNDED = 27,
|
|
1194
|
+
/**
|
|
1195
|
+
* Custom
|
|
1196
|
+
*
|
|
1197
|
+
* @generated from enum value: FHE_ALLOW = 40;
|
|
1198
|
+
*/
|
|
1199
|
+
FHE_ALLOW = 40,
|
|
1200
|
+
/**
|
|
1201
|
+
* @generated from enum value: FHE_REVEAL = 41;
|
|
1202
|
+
*/
|
|
1203
|
+
FHE_REVEAL = 41,
|
|
1011
1204
|
/**
|
|
1012
1205
|
* @generated from enum value: FHE_GET_CIPHERTEXT = 32;
|
|
1013
1206
|
*/
|
|
1014
|
-
FHE_GET_CIPHERTEXT = 32
|
|
1207
|
+
FHE_GET_CIPHERTEXT = 32,
|
|
1208
|
+
/**
|
|
1209
|
+
* Elist operations
|
|
1210
|
+
*
|
|
1211
|
+
* @generated from enum value: FHE_NEW_ELIST = 100;
|
|
1212
|
+
*/
|
|
1213
|
+
FHE_NEW_ELIST = 100,
|
|
1214
|
+
/**
|
|
1215
|
+
* @generated from enum value: FHE_ELIST_GET = 101;
|
|
1216
|
+
*/
|
|
1217
|
+
FHE_ELIST_GET = 101,
|
|
1218
|
+
/**
|
|
1219
|
+
* @generated from enum value: FHE_ELIST_GET_OR = 102;
|
|
1220
|
+
*/
|
|
1221
|
+
FHE_ELIST_GET_OR = 102,
|
|
1222
|
+
/**
|
|
1223
|
+
* @generated from enum value: FHE_ELIST_SET = 103;
|
|
1224
|
+
*/
|
|
1225
|
+
FHE_ELIST_SET = 103,
|
|
1226
|
+
/**
|
|
1227
|
+
* @generated from enum value: FHE_ELIST_INSERT = 104;
|
|
1228
|
+
*/
|
|
1229
|
+
FHE_ELIST_INSERT = 104,
|
|
1230
|
+
/**
|
|
1231
|
+
* @generated from enum value: FHE_ELIST_APPEND = 105;
|
|
1232
|
+
*/
|
|
1233
|
+
FHE_ELIST_APPEND = 105,
|
|
1234
|
+
/**
|
|
1235
|
+
* @generated from enum value: FHE_ELIST_CONCAT = 106;
|
|
1236
|
+
*/
|
|
1237
|
+
FHE_ELIST_CONCAT = 106,
|
|
1238
|
+
/**
|
|
1239
|
+
* @generated from enum value: FHE_ELIST_SLICE = 107;
|
|
1240
|
+
*/
|
|
1241
|
+
FHE_ELIST_SLICE = 107,
|
|
1242
|
+
/**
|
|
1243
|
+
* @generated from enum value: FHE_ELIST_RANGE = 108;
|
|
1244
|
+
*/
|
|
1245
|
+
FHE_ELIST_RANGE = 108,
|
|
1246
|
+
/**
|
|
1247
|
+
* @generated from enum value: FHE_ELIST_SHUFFLE = 109;
|
|
1248
|
+
*/
|
|
1249
|
+
FHE_ELIST_SHUFFLE = 109,
|
|
1250
|
+
/**
|
|
1251
|
+
* @generated from enum value: FHE_ELIST_REVERSE = 110;
|
|
1252
|
+
*/
|
|
1253
|
+
FHE_ELIST_REVERSE = 110
|
|
1015
1254
|
}
|
|
1016
1255
|
/**
|
|
1017
1256
|
* Describes the enum inco.covalidator.compute.v1.FheOperation.
|
|
@@ -1049,7 +1288,7 @@ export declare const ComputeService: GenService<{
|
|
|
1049
1288
|
*
|
|
1050
1289
|
* # IncoLite
|
|
1051
1290
|
*
|
|
1052
|
-
* In the IncoLite system, the input ciphertext is an
|
|
1291
|
+
* In the IncoLite system, the input ciphertext is an X-Wing ciphertext, and
|
|
1053
1292
|
* the compute ciphertexts are encrypted using the encryption codec passed
|
|
1054
1293
|
* into the plaintext compute client.
|
|
1055
1294
|
*
|
|
@@ -1248,4 +1487,28 @@ export declare const ComputeService: GenService<{
|
|
|
1248
1487
|
input: typeof AttestedRevealRequestSchema;
|
|
1249
1488
|
output: typeof AttestedRevealResponseSchema;
|
|
1250
1489
|
};
|
|
1490
|
+
/**
|
|
1491
|
+
* EListAttestedDecrypt decrypts a single elist ciphertext and provides an attestation
|
|
1492
|
+
* that the decryption was performed correctly.
|
|
1493
|
+
* Can optionally reencrypt the results of the decryption to a desired public key.
|
|
1494
|
+
*
|
|
1495
|
+
* @generated from rpc inco.covalidator.compute.v1.ComputeService.EListAttestedDecrypt
|
|
1496
|
+
*/
|
|
1497
|
+
eListAttestedDecrypt: {
|
|
1498
|
+
methodKind: "unary";
|
|
1499
|
+
input: typeof EListAttestedDecryptRequestSchema;
|
|
1500
|
+
output: typeof EListAttestedDecryptResponseSchema;
|
|
1501
|
+
};
|
|
1502
|
+
/**
|
|
1503
|
+
* EListAttestedReveal decrypts a single elist ciphertext and provides an attestation
|
|
1504
|
+
* that the decryption was performed correctly.
|
|
1505
|
+
* Doesn't require authentication if the handle is publicly revealed with the on-chain .reveal() call beforehand.
|
|
1506
|
+
*
|
|
1507
|
+
* @generated from rpc inco.covalidator.compute.v1.ComputeService.EListAttestedReveal
|
|
1508
|
+
*/
|
|
1509
|
+
eListAttestedReveal: {
|
|
1510
|
+
methodKind: "unary";
|
|
1511
|
+
input: typeof EListAttestedRevealRequestSchema;
|
|
1512
|
+
output: typeof EListAttestedRevealResponseSchema;
|
|
1513
|
+
};
|
|
1251
1514
|
}>;
|