@inco/js 0.8.0-devnet-6 → 0.8.0-devnet-7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/advancedacl/session-key.d.ts +10 -9
- package/dist/cjs/advancedacl/session-key.js +7 -8
- package/dist/cjs/attestedcompute/attested-compute.d.ts +2 -2
- package/dist/cjs/attestedcompute/attested-compute.js +2 -2
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +3 -3
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +5 -5
- package/dist/cjs/encryption/encryption.d.ts +8 -10
- package/dist/cjs/encryption/encryption.js +2 -5
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +234 -7
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.js +86 -10
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +0 -6
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +2 -8
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +213 -0
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +36 -11
- package/dist/cjs/kms/quorumClient.d.ts +3 -2
- package/dist/cjs/kms/quorumClient.js +30 -27
- package/dist/cjs/lite/index.d.ts +1 -2
- package/dist/cjs/lite/index.js +5 -18
- package/dist/cjs/lite/lightning.d.ts +16 -16
- package/dist/cjs/lite/lightning.js +28 -39
- package/dist/cjs/lite/xwing.d.ts +5 -1
- package/dist/cjs/lite/xwing.js +10 -5
- package/dist/cjs/reencryption/types.d.ts +2 -2
- package/dist/esm/advancedacl/session-key.d.ts +10 -9
- package/dist/esm/advancedacl/session-key.js +7 -8
- package/dist/esm/attestedcompute/attested-compute.d.ts +2 -2
- package/dist/esm/attestedcompute/attested-compute.js +2 -2
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +3 -3
- package/dist/esm/attesteddecrypt/attested-decrypt.js +3 -3
- package/dist/esm/encryption/encryption.d.ts +8 -10
- package/dist/esm/encryption/encryption.js +2 -5
- package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +234 -7
- package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.js +85 -9
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +0 -6
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +2 -8
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +213 -0
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +35 -10
- package/dist/esm/kms/quorumClient.d.ts +3 -2
- package/dist/esm/kms/quorumClient.js +30 -27
- package/dist/esm/lite/index.d.ts +1 -2
- package/dist/esm/lite/index.js +2 -5
- package/dist/esm/lite/lightning.d.ts +16 -16
- package/dist/esm/lite/lightning.js +29 -40
- package/dist/esm/lite/xwing.d.ts +5 -1
- package/dist/esm/lite/xwing.js +9 -4
- package/dist/esm/reencryption/types.d.ts +2 -2
- package/dist/types/advancedacl/session-key.d.ts +10 -9
- package/dist/types/attestedcompute/attested-compute.d.ts +2 -2
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +3 -3
- package/dist/types/encryption/encryption.d.ts +8 -10
- package/dist/types/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +234 -7
- package/dist/types/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +0 -6
- package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +213 -0
- package/dist/types/kms/quorumClient.d.ts +3 -2
- package/dist/types/lite/index.d.ts +1 -2
- package/dist/types/lite/lightning.d.ts +16 -16
- package/dist/types/lite/xwing.d.ts +5 -1
- package/dist/types/reencryption/types.d.ts +2 -2
- package/package.json +3 -6
- package/dist/cjs/lite/ecies.d.ts +0 -26
- package/dist/cjs/lite/ecies.js +0 -146
- package/dist/esm/lite/ecies.d.ts +0 -26
- package/dist/esm/lite/ecies.js +0 -134
- package/dist/types/lite/ecies.d.ts +0 -26
|
@@ -1,9 +1,10 @@
|
|
|
1
1
|
import { type Account, type Address, type Chain, type Hex, PublicClient, type Transport, type WalletClient } from 'viem';
|
|
2
|
+
import type { PrivateKeyAccount } from 'viem/accounts';
|
|
2
3
|
import { DecryptionAttestation, EncryptedDecryptionAttestation } from '../attesteddecrypt/index.js';
|
|
3
4
|
import { SupportedChainId } from '../chain.js';
|
|
4
5
|
import { EncryptionScheme, SupportedFheType } from '../encryption/encryption.js';
|
|
5
6
|
import { HexString } from '../index.js';
|
|
6
|
-
import type {
|
|
7
|
+
import type { XwingKeypair } from '../lite/index.js';
|
|
7
8
|
import { BackoffConfig } from '../retry.js';
|
|
8
9
|
import type { AllowanceVoucher, AllowanceVoucherWithSig } from './types.js';
|
|
9
10
|
import { AttestedComputeOP } from '../attestedcompute/types.js';
|
|
@@ -33,7 +34,7 @@ export declare function grantSessionKeyCustomVerifier({ chainId, incoLiteAddress
|
|
|
33
34
|
export declare function updateActiveVouchersSessionNonce(incoLiteAddress: Address, sharerWalletClient: WalletClient<Transport, Chain, Account>): Promise<`0x${string}`>;
|
|
34
35
|
export interface SessionKeyAttestedComputeArgs {
|
|
35
36
|
chainId: SupportedChainId;
|
|
36
|
-
|
|
37
|
+
ephemeralAccount: PrivateKeyAccount;
|
|
37
38
|
kmsQuorumClient: KmsQuorumClient;
|
|
38
39
|
allowanceVoucherWithSig: AllowanceVoucherWithSig;
|
|
39
40
|
lhsHandle: HexString;
|
|
@@ -44,19 +45,19 @@ export interface SessionKeyAttestedComputeArgs {
|
|
|
44
45
|
ethClient?: PublicClient<Transport, Chain> | WalletClient<Transport, Chain, Account> | undefined;
|
|
45
46
|
executorAddress?: HexString | undefined;
|
|
46
47
|
reencryptPubKey?: Uint8Array | undefined;
|
|
47
|
-
reencryptKeypair?:
|
|
48
|
+
reencryptKeypair?: XwingKeypair | undefined;
|
|
48
49
|
}
|
|
49
|
-
export declare function sessionKeyAttestedCompute<T extends SupportedFheType>({ lhsHandle, op, rhsPlaintext, backoffConfig, chainId, kmsQuorumClient,
|
|
50
|
+
export declare function sessionKeyAttestedCompute<T extends SupportedFheType>({ lhsHandle, op, rhsPlaintext, backoffConfig, chainId, kmsQuorumClient, ephemeralAccount, allowanceVoucherWithSig, requesterArgData, ethClient, executorAddress, reencryptPubKey, reencryptKeypair, }: SessionKeyAttestedComputeArgs): Promise<DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>;
|
|
50
51
|
export interface SessionKeyAttestedDecryptArgs {
|
|
51
52
|
chainId: SupportedChainId;
|
|
52
|
-
|
|
53
|
+
ephemeralAccount: PrivateKeyAccount;
|
|
53
54
|
kmsQuorumClient: KmsQuorumClient;
|
|
54
55
|
allowanceVoucherWithSig: AllowanceVoucherWithSig;
|
|
55
56
|
handles: HexString[];
|
|
56
57
|
requesterArgData?: Hex | undefined;
|
|
57
58
|
backoffConfig?: Partial<BackoffConfig> | undefined;
|
|
58
59
|
reencryptPubKey?: Uint8Array | undefined;
|
|
59
|
-
reencryptKeypair?:
|
|
60
|
+
reencryptKeypair?: XwingKeypair | undefined;
|
|
60
61
|
ethClient?: PublicClient<Transport, Chain> | WalletClient<Transport, Chain, Account> | undefined;
|
|
61
62
|
executorAddress?: HexString | undefined;
|
|
62
63
|
}
|
|
@@ -69,7 +70,7 @@ export interface SessionKeyAttestedDecryptArgs {
|
|
|
69
70
|
* chainId,
|
|
70
71
|
* kmsConnectRpcEndpointOrClient: covalidatorUrl,
|
|
71
72
|
* allowanceVoucherWithSig: voucher,
|
|
72
|
-
*
|
|
73
|
+
* ephemeralAccount,
|
|
73
74
|
* handles,
|
|
74
75
|
* });
|
|
75
76
|
* console.log(attestations[0].plaintext.value);
|
|
@@ -81,7 +82,7 @@ export interface SessionKeyAttestedDecryptArgs {
|
|
|
81
82
|
* chainId,
|
|
82
83
|
* kmsConnectRpcEndpointOrClient: covalidatorUrl,
|
|
83
84
|
* allowanceVoucherWithSig: voucher,
|
|
84
|
-
*
|
|
85
|
+
* ephemeralAccount,
|
|
85
86
|
* handles,
|
|
86
87
|
* reencryptPubKey: recipientPubKey,
|
|
87
88
|
* });
|
|
@@ -90,4 +91,4 @@ export interface SessionKeyAttestedDecryptArgs {
|
|
|
90
91
|
* );
|
|
91
92
|
* ```
|
|
92
93
|
*/
|
|
93
|
-
export declare function sessionKeyAttestedDecrypt({ chainId, kmsQuorumClient, handles,
|
|
94
|
+
export declare function sessionKeyAttestedDecrypt({ chainId, kmsQuorumClient, handles, ephemeralAccount, allowanceVoucherWithSig, requesterArgData, backoffConfig, reencryptPubKey, reencryptKeypair, ethClient, executorAddress, }: SessionKeyAttestedDecryptArgs): Promise<Array<DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>>;
|
|
@@ -4,7 +4,7 @@ import { HexString } from '../binary.js';
|
|
|
4
4
|
import { SupportedChainId } from '../chain.js';
|
|
5
5
|
import type { EncryptionScheme, SupportedFheType } from '../encryption/encryption.js';
|
|
6
6
|
import { KmsQuorumClient } from '../kms/quorumClient.js';
|
|
7
|
-
import type {
|
|
7
|
+
import type { XwingKeypair } from '../lite/xwing.js';
|
|
8
8
|
import type { BackoffConfig } from '../retry.js';
|
|
9
9
|
import { AttestedComputeOP } from './types.js';
|
|
10
10
|
export declare const ATTESTED_COMPUTE_DOMAIN_NAME = "IncoAttestedCompute";
|
|
@@ -38,7 +38,7 @@ export declare function attestedCompute<T extends SupportedFheType>({ executorAd
|
|
|
38
38
|
kmsQuorumClient: KmsQuorumClient;
|
|
39
39
|
chainId: SupportedChainId;
|
|
40
40
|
reencryptPubKey: Uint8Array;
|
|
41
|
-
reencryptKeypair:
|
|
41
|
+
reencryptKeypair: XwingKeypair;
|
|
42
42
|
}): Promise<DecryptionAttestation<EncryptionScheme, T>>;
|
|
43
43
|
export declare function attestedCompute<T extends SupportedFheType>({ executorAddress, lhsHandle, op, rhsPlaintext, backoffConfig, walletClient, kmsQuorumClient, chainId, reencryptPubKey, }: {
|
|
44
44
|
executorAddress: HexString;
|
|
@@ -3,7 +3,7 @@ import { type HexString } from '../binary.js';
|
|
|
3
3
|
import { type SupportedChainId } from '../chain.js';
|
|
4
4
|
import { EncryptionScheme, type SupportedFheType } from '../encryption/encryption.js';
|
|
5
5
|
import { KmsQuorumClient } from '../kms/quorumClient.js';
|
|
6
|
-
import type {
|
|
6
|
+
import type { XwingKeypair } from '../lite/xwing.js';
|
|
7
7
|
import type { BackoffConfig } from '../retry.js';
|
|
8
8
|
import { type DecryptionAttestation, type EncryptedDecryptionAttestation } from './types.js';
|
|
9
9
|
export declare const ATTESTED_DECRYPT_DOMAIN_NAME = "IncoAttestedDecrypt";
|
|
@@ -49,7 +49,7 @@ export declare function attestedDecrypt({ handles, backoffConfig, walletClient,
|
|
|
49
49
|
walletClient: WalletClient<Transport, Chain, Account>;
|
|
50
50
|
chainId: SupportedChainId;
|
|
51
51
|
reencryptPubKey: Uint8Array;
|
|
52
|
-
reencryptKeypair:
|
|
52
|
+
reencryptKeypair: XwingKeypair;
|
|
53
53
|
kmsQuorumClient: KmsQuorumClient;
|
|
54
54
|
executorAddress: HexString;
|
|
55
55
|
}): Promise<Array<DecryptionAttestation<EncryptionScheme, SupportedFheType>>>;
|
|
@@ -90,7 +90,7 @@ export declare function attestedDecrypt({ handles, backoffConfig, walletClient,
|
|
|
90
90
|
executorAddress: HexString;
|
|
91
91
|
}): Promise<Array<DecryptionAttestation<EncryptionScheme, SupportedFheType>>>;
|
|
92
92
|
export declare function fetchEip712DomainVersion(executorAddress: HexString | undefined, defaultVersion: string, walletClient?: WalletClient<Transport, Chain, Account> | PublicClient<Transport, Chain>): Promise<string>;
|
|
93
|
-
export declare function decryptEncryptedAttestations(attestations: Array<DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>, reencryptKeypair:
|
|
93
|
+
export declare function decryptEncryptedAttestations(attestations: Array<DecryptionAttestation<EncryptionScheme, SupportedFheType> | EncryptedDecryptionAttestation<EncryptionScheme, SupportedFheType>>, reencryptKeypair: XwingKeypair): Promise<Array<DecryptionAttestation<EncryptionScheme, SupportedFheType>>>;
|
|
94
94
|
/**
|
|
95
95
|
* Validates a handle format.
|
|
96
96
|
* @param handle - The handle to validate
|
|
@@ -14,21 +14,19 @@ export type SupportedFheTypeName = typeof SupportedFheTypeName.Type;
|
|
|
14
14
|
export declare const SupportedFheType: Schema.SchemaClass<0 | 5 | 7 | 8, 0 | 5 | 7 | 8, never>;
|
|
15
15
|
export type SupportedFheType = typeof SupportedFheType.Type;
|
|
16
16
|
export declare const encryptionSchemes: {
|
|
17
|
-
readonly ecies: 1;
|
|
18
17
|
readonly xwing: 2;
|
|
19
18
|
};
|
|
20
19
|
export declare function getEncryptionSchemeName(scheme: number): string;
|
|
21
20
|
export type EncryptionSchemes = typeof encryptionSchemes;
|
|
22
|
-
export type EciesScheme = EncryptionSchemes['ecies'];
|
|
23
21
|
export type XwingScheme = EncryptionSchemes['xwing'];
|
|
24
|
-
export declare const EncryptionScheme: Schema.Literal<[
|
|
22
|
+
export declare const EncryptionScheme: Schema.Literal<[2]>;
|
|
25
23
|
export type EncryptionScheme = typeof EncryptionScheme.Type;
|
|
26
24
|
type DistType<P, S extends EncryptionScheme, T extends SupportedFheType> = P extends any ? P & {
|
|
27
25
|
scheme: S;
|
|
28
26
|
type: T;
|
|
29
27
|
} : never;
|
|
30
28
|
export declare const Ciphertext: Schema.Struct<{
|
|
31
|
-
scheme: Schema.Literal<[
|
|
29
|
+
scheme: Schema.Literal<[2]>;
|
|
32
30
|
type: Schema.SchemaClass<0 | 5 | 7 | 8, 0 | 5 | 7 | 8, never>;
|
|
33
31
|
value: Schema.TemplateLiteral<`0x${string}`>;
|
|
34
32
|
}>;
|
|
@@ -36,7 +34,7 @@ export type Ciphertext = typeof Ciphertext.Type;
|
|
|
36
34
|
export type CiphertextOf<S extends EncryptionScheme, T extends SupportedFheType> = DistType<Ciphertext, S, T>;
|
|
37
35
|
export declare const CiphertextWithContext: Schema.Struct<{
|
|
38
36
|
ciphertext: Schema.Struct<{
|
|
39
|
-
scheme: Schema.Literal<[
|
|
37
|
+
scheme: Schema.Literal<[2]>;
|
|
40
38
|
type: Schema.SchemaClass<0 | 5 | 7 | 8, 0 | 5 | 7 | 8, never>;
|
|
41
39
|
value: Schema.TemplateLiteral<`0x${string}`>;
|
|
42
40
|
}>;
|
|
@@ -54,7 +52,7 @@ export type CiphertextWithContextOf<S extends EncryptionScheme, T extends Suppor
|
|
|
54
52
|
};
|
|
55
53
|
export declare const EncryptResult: Schema.Struct<{
|
|
56
54
|
ciphertext: Schema.Struct<{
|
|
57
|
-
scheme: Schema.Literal<[
|
|
55
|
+
scheme: Schema.Literal<[2]>;
|
|
58
56
|
type: Schema.SchemaClass<0 | 5 | 7 | 8, 0 | 5 | 7 | 8, never>;
|
|
59
57
|
value: Schema.TemplateLiteral<`0x${string}`>;
|
|
60
58
|
}>;
|
|
@@ -73,11 +71,11 @@ export type EncryptResultOf<S extends EncryptionScheme, T extends SupportedFheTy
|
|
|
73
71
|
ciphertext: CiphertextOf<S, T>;
|
|
74
72
|
};
|
|
75
73
|
export declare const Plaintext: Schema.Union<[Schema.Struct<{
|
|
76
|
-
scheme: Schema.Literal<[
|
|
74
|
+
scheme: Schema.Literal<[2]>;
|
|
77
75
|
type: Schema.Literal<[5, 7, 8]>;
|
|
78
76
|
value: typeof Schema.BigInt;
|
|
79
77
|
}>, Schema.Struct<{
|
|
80
|
-
scheme: Schema.Literal<[
|
|
78
|
+
scheme: Schema.Literal<[2]>;
|
|
81
79
|
type: Schema.Literal<[0]>;
|
|
82
80
|
value: typeof Schema.Boolean;
|
|
83
81
|
}>]>;
|
|
@@ -85,11 +83,11 @@ export type Plaintext = typeof Plaintext.Type;
|
|
|
85
83
|
export type PlaintextOf<S extends EncryptionScheme, T extends SupportedFheType> = DistType<Plaintext, S, T>;
|
|
86
84
|
export declare const PlaintextWithContext: Schema.Struct<{
|
|
87
85
|
plaintext: Schema.Union<[Schema.Struct<{
|
|
88
|
-
scheme: Schema.Literal<[
|
|
86
|
+
scheme: Schema.Literal<[2]>;
|
|
89
87
|
type: Schema.Literal<[5, 7, 8]>;
|
|
90
88
|
value: typeof Schema.BigInt;
|
|
91
89
|
}>, Schema.Struct<{
|
|
92
|
-
scheme: Schema.Literal<[
|
|
90
|
+
scheme: Schema.Literal<[2]>;
|
|
93
91
|
type: Schema.Literal<[0]>;
|
|
94
92
|
value: typeof Schema.Boolean;
|
|
95
93
|
}>]>;
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import type { GenEnum, GenFile, GenMessage, GenService } from "@bufbuild/protobuf/codegenv2";
|
|
2
2
|
import type { CryptogramWithProof, InputCryptogram, StoredCryptogram } from "./types_pb";
|
|
3
|
-
import type { DecryptionAttestation } from "../../../kms/lite/v1/kms_service_pb";
|
|
3
|
+
import type { DecryptionAttestation, EListElement } from "../../../kms/lite/v1/kms_service_pb";
|
|
4
4
|
import type { ACLProof, SupportedScalarBinaryOp } from "../../../kms/lite/v1/types_pb";
|
|
5
5
|
import type { RATlsServer } from "../../../sealingfetcher/v1/sealingfetcher_pb";
|
|
6
6
|
import type { StartHeliosRequest } from "../../../helioswrapper/v1/helioswrapper_pb";
|
|
@@ -655,8 +655,8 @@ export type AttestedDecryptRequest = Message<"inco.covalidator.compute.v1.Attest
|
|
|
655
655
|
userAddress: string;
|
|
656
656
|
/**
|
|
657
657
|
* reencrypt_pub_key is the encoding of the user's public
|
|
658
|
-
* encryption key (
|
|
659
|
-
* It is encoded in its
|
|
658
|
+
* encryption key (X-Wing) used to reencrypt the result for.
|
|
659
|
+
* It is encoded in its 1216-byte format.
|
|
660
660
|
* If empty, the KMS will return plaintext decryption instead of reencryption.
|
|
661
661
|
*
|
|
662
662
|
* @generated from field: bytes reencrypt_pub_key = 2;
|
|
@@ -716,6 +716,82 @@ export type AttestedDecryptRequest = Message<"inco.covalidator.compute.v1.Attest
|
|
|
716
716
|
* Use `create(AttestedDecryptRequestSchema)` to create a new message.
|
|
717
717
|
*/
|
|
718
718
|
export declare const AttestedDecryptRequestSchema: GenMessage<AttestedDecryptRequest>;
|
|
719
|
+
/**
|
|
720
|
+
* EListAttestedDecryptRequest is the request type for the ComputeService/EListAttestedDecrypt RPC method.
|
|
721
|
+
*
|
|
722
|
+
* @generated from message inco.covalidator.compute.v1.EListAttestedDecryptRequest
|
|
723
|
+
*/
|
|
724
|
+
export type EListAttestedDecryptRequest = Message<"inco.covalidator.compute.v1.EListAttestedDecryptRequest"> & {
|
|
725
|
+
/**
|
|
726
|
+
* user_address is the Ethereum address of the user who requested the
|
|
727
|
+
* decryption, prefixed with 0x.
|
|
728
|
+
*
|
|
729
|
+
* @generated from field: string user_address = 1;
|
|
730
|
+
*/
|
|
731
|
+
userAddress: string;
|
|
732
|
+
/**
|
|
733
|
+
* reencrypt_pub_key is the encoding of the user's public
|
|
734
|
+
* encryption key (secp256k1) used to reencrypt the result for.
|
|
735
|
+
* It is encoded in its 33-byte compressed format.
|
|
736
|
+
* If empty, the KMS will return plaintext decryption instead of reencryption.
|
|
737
|
+
*
|
|
738
|
+
* @generated from field: bytes reencrypt_pub_key = 2;
|
|
739
|
+
*/
|
|
740
|
+
reencryptPubKey: Uint8Array;
|
|
741
|
+
/**
|
|
742
|
+
* eip712_signature is an EIP-712 signature of the following EIP-712 typed data by
|
|
743
|
+
* `user_address` (note that we only give a JSON representation for the sake of
|
|
744
|
+
* readability, but the actual signed data is defined in the EIP-712 spec) where:
|
|
745
|
+
* handles - list of 0x prefixed handles to decrypt
|
|
746
|
+
* publicKey - 0x prefixed reencrypt_pub_key (if any). "0x" otherwise if empty.
|
|
747
|
+
*
|
|
748
|
+
* ```json
|
|
749
|
+
* {
|
|
750
|
+
* "types": {
|
|
751
|
+
* "EIP712Domain": [
|
|
752
|
+
* { "name": "name", "type": "string" },
|
|
753
|
+
* { "name": "version", "type": "string" },
|
|
754
|
+
* { "name": "chainId", "type": "uint256" }
|
|
755
|
+
* ],
|
|
756
|
+
* "AttestedDecryptRequest": [
|
|
757
|
+
* { "name": "handles", "type": "bytes32[]" },
|
|
758
|
+
* { "name": "publicKey", "type": "bytes" },
|
|
759
|
+
* ]
|
|
760
|
+
* },
|
|
761
|
+
* "primaryType": "AttestedDecryptRequest",
|
|
762
|
+
* "domain": {
|
|
763
|
+
* "name": "IncoAttestedDecrypt",
|
|
764
|
+
* "version": "0.1.0",
|
|
765
|
+
* "chainId": "<host_chain_id>",
|
|
766
|
+
* },
|
|
767
|
+
* "message": {
|
|
768
|
+
* "handles": ["<handle1>", "<handle2>", ...],
|
|
769
|
+
* "publicKey": "0x<reencrypt_pub_key>"
|
|
770
|
+
* }
|
|
771
|
+
* }
|
|
772
|
+
* ```
|
|
773
|
+
*
|
|
774
|
+
* @generated from field: bytes eip712_signature = 3;
|
|
775
|
+
*/
|
|
776
|
+
eip712Signature: Uint8Array;
|
|
777
|
+
/**
|
|
778
|
+
* cryptogram_with_proof is the cryptogram for elist with proof to decrypt.
|
|
779
|
+
* Either the user_address or sharer must have ACL access to the elist cryptogram handle for the attested
|
|
780
|
+
* decryption to succeed.
|
|
781
|
+
*
|
|
782
|
+
* @generated from field: inco.covalidator.compute.v1.CryptogramWithProof cryptogram_with_proof = 4;
|
|
783
|
+
*/
|
|
784
|
+
cryptogramWithProof?: CryptogramWithProof;
|
|
785
|
+
/**
|
|
786
|
+
* @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 5;
|
|
787
|
+
*/
|
|
788
|
+
configureRequest?: ConfigureRequest;
|
|
789
|
+
};
|
|
790
|
+
/**
|
|
791
|
+
* Describes the message inco.covalidator.compute.v1.EListAttestedDecryptRequest.
|
|
792
|
+
* Use `create(EListAttestedDecryptRequestSchema)` to create a new message.
|
|
793
|
+
*/
|
|
794
|
+
export declare const EListAttestedDecryptRequestSchema: GenMessage<EListAttestedDecryptRequest>;
|
|
719
795
|
/**
|
|
720
796
|
* AttestedDecryptResponse is the response type for the ComputeService/AttestedDecrypt RPC method.
|
|
721
797
|
*
|
|
@@ -735,6 +811,30 @@ export type AttestedDecryptResponse = Message<"inco.covalidator.compute.v1.Attes
|
|
|
735
811
|
* Use `create(AttestedDecryptResponseSchema)` to create a new message.
|
|
736
812
|
*/
|
|
737
813
|
export declare const AttestedDecryptResponseSchema: GenMessage<AttestedDecryptResponse>;
|
|
814
|
+
/**
|
|
815
|
+
* EListAttestedDecryptResponse is the response type for the ComputeService/EListAttestedDecrypt RPC method.
|
|
816
|
+
*
|
|
817
|
+
* @generated from message inco.covalidator.compute.v1.EListAttestedDecryptResponse
|
|
818
|
+
*/
|
|
819
|
+
export type EListAttestedDecryptResponse = Message<"inco.covalidator.compute.v1.EListAttestedDecryptResponse"> & {
|
|
820
|
+
/**
|
|
821
|
+
* commitment_proof_attestation is the signed commitment proof of the decrypted elist values.
|
|
822
|
+
*
|
|
823
|
+
* @generated from field: inco.kms.lite.v1.DecryptionAttestation commitment_proof_attestation = 1;
|
|
824
|
+
*/
|
|
825
|
+
commitmentProofAttestation?: DecryptionAttestation;
|
|
826
|
+
/**
|
|
827
|
+
* values is the list of decrypted elist elements.
|
|
828
|
+
*
|
|
829
|
+
* @generated from field: repeated inco.kms.lite.v1.EListElement values = 2;
|
|
830
|
+
*/
|
|
831
|
+
values: EListElement[];
|
|
832
|
+
};
|
|
833
|
+
/**
|
|
834
|
+
* Describes the message inco.covalidator.compute.v1.EListAttestedDecryptResponse.
|
|
835
|
+
* Use `create(EListAttestedDecryptResponseSchema)` to create a new message.
|
|
836
|
+
*/
|
|
837
|
+
export declare const EListAttestedDecryptResponseSchema: GenMessage<EListAttestedDecryptResponse>;
|
|
738
838
|
/**
|
|
739
839
|
* AttestedRevealRequest is the request type for the ComputeService/AttestedReveal RPC method.
|
|
740
840
|
*
|
|
@@ -758,6 +858,29 @@ export type AttestedRevealRequest = Message<"inco.covalidator.compute.v1.Atteste
|
|
|
758
858
|
* Use `create(AttestedRevealRequestSchema)` to create a new message.
|
|
759
859
|
*/
|
|
760
860
|
export declare const AttestedRevealRequestSchema: GenMessage<AttestedRevealRequest>;
|
|
861
|
+
/**
|
|
862
|
+
* EListAttestedRevealRequest is the request type for the ComputeService/EListAttestedReveal RPC method.
|
|
863
|
+
*
|
|
864
|
+
* @generated from message inco.covalidator.compute.v1.EListAttestedRevealRequest
|
|
865
|
+
*/
|
|
866
|
+
export type EListAttestedRevealRequest = Message<"inco.covalidator.compute.v1.EListAttestedRevealRequest"> & {
|
|
867
|
+
/**
|
|
868
|
+
* cryptogram is the elist ciphertext to decrypt.
|
|
869
|
+
* The elist handle must have been revealed beforehand with the on-chain .reveal() call.
|
|
870
|
+
*
|
|
871
|
+
* @generated from field: inco.covalidator.compute.v1.StoredCryptogram cryptogram = 3;
|
|
872
|
+
*/
|
|
873
|
+
cryptogram?: StoredCryptogram;
|
|
874
|
+
/**
|
|
875
|
+
* @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 4;
|
|
876
|
+
*/
|
|
877
|
+
configureRequest?: ConfigureRequest;
|
|
878
|
+
};
|
|
879
|
+
/**
|
|
880
|
+
* Describes the message inco.covalidator.compute.v1.EListAttestedRevealRequest.
|
|
881
|
+
* Use `create(EListAttestedRevealRequestSchema)` to create a new message.
|
|
882
|
+
*/
|
|
883
|
+
export declare const EListAttestedRevealRequestSchema: GenMessage<EListAttestedRevealRequest>;
|
|
761
884
|
/**
|
|
762
885
|
* AttestedRevealResponse is the response type for the ComputeService/AttestedReveal RPC method.
|
|
763
886
|
*
|
|
@@ -777,6 +900,30 @@ export type AttestedRevealResponse = Message<"inco.covalidator.compute.v1.Attest
|
|
|
777
900
|
* Use `create(AttestedRevealResponseSchema)` to create a new message.
|
|
778
901
|
*/
|
|
779
902
|
export declare const AttestedRevealResponseSchema: GenMessage<AttestedRevealResponse>;
|
|
903
|
+
/**
|
|
904
|
+
* EListAttestedRevealResponse is the response type for the ComputeService/EListAttestedRevealResponse RPC method.
|
|
905
|
+
*
|
|
906
|
+
* @generated from message inco.covalidator.compute.v1.EListAttestedRevealResponse
|
|
907
|
+
*/
|
|
908
|
+
export type EListAttestedRevealResponse = Message<"inco.covalidator.compute.v1.EListAttestedRevealResponse"> & {
|
|
909
|
+
/**
|
|
910
|
+
* commitment_proof_attestation is the signed commitment proof of the decrypted elist values.
|
|
911
|
+
*
|
|
912
|
+
* @generated from field: inco.kms.lite.v1.DecryptionAttestation commitment_proof_attestation = 1;
|
|
913
|
+
*/
|
|
914
|
+
commitmentProofAttestation?: DecryptionAttestation;
|
|
915
|
+
/**
|
|
916
|
+
* values is the list of decrypted elist elements.
|
|
917
|
+
*
|
|
918
|
+
* @generated from field: repeated inco.kms.lite.v1.EListElement values = 2;
|
|
919
|
+
*/
|
|
920
|
+
values: EListElement[];
|
|
921
|
+
};
|
|
922
|
+
/**
|
|
923
|
+
* Describes the message inco.covalidator.compute.v1.EListAttestedRevealResponse.
|
|
924
|
+
* Use `create(EListAttestedRevealResponseSchema)` to create a new message.
|
|
925
|
+
*/
|
|
926
|
+
export declare const EListAttestedRevealResponseSchema: GenMessage<EListAttestedRevealResponse>;
|
|
780
927
|
/**
|
|
781
928
|
* AttestedComputeRequest is the request type for the ComputeService/AttestedDecrypt RPC method.
|
|
782
929
|
*
|
|
@@ -792,8 +939,8 @@ export type AttestedComputeRequest = Message<"inco.covalidator.compute.v1.Attest
|
|
|
792
939
|
userAddress: string;
|
|
793
940
|
/**
|
|
794
941
|
* reencrypt_pub_key is the encoding of the user's public
|
|
795
|
-
* encryption key (
|
|
796
|
-
* It is encoded in its
|
|
942
|
+
* encryption key (X-Wing) used to reencrypt the result for.
|
|
943
|
+
* It is encoded in its 1216-byte format.
|
|
797
944
|
* If empty, the KMS will return plaintext decryption instead of reencryption.
|
|
798
945
|
*
|
|
799
946
|
* @generated from field: bytes reencrypt_pub_key = 2;
|
|
@@ -1044,10 +1191,66 @@ export declare enum FheOperation {
|
|
|
1044
1191
|
* @generated from enum value: FHE_RAND_BOUNDED = 27;
|
|
1045
1192
|
*/
|
|
1046
1193
|
FHE_RAND_BOUNDED = 27,
|
|
1194
|
+
/**
|
|
1195
|
+
* Custom
|
|
1196
|
+
*
|
|
1197
|
+
* @generated from enum value: FHE_ALLOW = 40;
|
|
1198
|
+
*/
|
|
1199
|
+
FHE_ALLOW = 40,
|
|
1200
|
+
/**
|
|
1201
|
+
* @generated from enum value: FHE_REVEAL = 41;
|
|
1202
|
+
*/
|
|
1203
|
+
FHE_REVEAL = 41,
|
|
1047
1204
|
/**
|
|
1048
1205
|
* @generated from enum value: FHE_GET_CIPHERTEXT = 32;
|
|
1049
1206
|
*/
|
|
1050
|
-
FHE_GET_CIPHERTEXT = 32
|
|
1207
|
+
FHE_GET_CIPHERTEXT = 32,
|
|
1208
|
+
/**
|
|
1209
|
+
* Elist operations
|
|
1210
|
+
*
|
|
1211
|
+
* @generated from enum value: FHE_NEW_ELIST = 100;
|
|
1212
|
+
*/
|
|
1213
|
+
FHE_NEW_ELIST = 100,
|
|
1214
|
+
/**
|
|
1215
|
+
* @generated from enum value: FHE_ELIST_GET = 101;
|
|
1216
|
+
*/
|
|
1217
|
+
FHE_ELIST_GET = 101,
|
|
1218
|
+
/**
|
|
1219
|
+
* @generated from enum value: FHE_ELIST_GET_OR = 102;
|
|
1220
|
+
*/
|
|
1221
|
+
FHE_ELIST_GET_OR = 102,
|
|
1222
|
+
/**
|
|
1223
|
+
* @generated from enum value: FHE_ELIST_SET = 103;
|
|
1224
|
+
*/
|
|
1225
|
+
FHE_ELIST_SET = 103,
|
|
1226
|
+
/**
|
|
1227
|
+
* @generated from enum value: FHE_ELIST_INSERT = 104;
|
|
1228
|
+
*/
|
|
1229
|
+
FHE_ELIST_INSERT = 104,
|
|
1230
|
+
/**
|
|
1231
|
+
* @generated from enum value: FHE_ELIST_APPEND = 105;
|
|
1232
|
+
*/
|
|
1233
|
+
FHE_ELIST_APPEND = 105,
|
|
1234
|
+
/**
|
|
1235
|
+
* @generated from enum value: FHE_ELIST_CONCAT = 106;
|
|
1236
|
+
*/
|
|
1237
|
+
FHE_ELIST_CONCAT = 106,
|
|
1238
|
+
/**
|
|
1239
|
+
* @generated from enum value: FHE_ELIST_SLICE = 107;
|
|
1240
|
+
*/
|
|
1241
|
+
FHE_ELIST_SLICE = 107,
|
|
1242
|
+
/**
|
|
1243
|
+
* @generated from enum value: FHE_ELIST_RANGE = 108;
|
|
1244
|
+
*/
|
|
1245
|
+
FHE_ELIST_RANGE = 108,
|
|
1246
|
+
/**
|
|
1247
|
+
* @generated from enum value: FHE_ELIST_SHUFFLE = 109;
|
|
1248
|
+
*/
|
|
1249
|
+
FHE_ELIST_SHUFFLE = 109,
|
|
1250
|
+
/**
|
|
1251
|
+
* @generated from enum value: FHE_ELIST_REVERSE = 110;
|
|
1252
|
+
*/
|
|
1253
|
+
FHE_ELIST_REVERSE = 110
|
|
1051
1254
|
}
|
|
1052
1255
|
/**
|
|
1053
1256
|
* Describes the enum inco.covalidator.compute.v1.FheOperation.
|
|
@@ -1085,7 +1288,7 @@ export declare const ComputeService: GenService<{
|
|
|
1085
1288
|
*
|
|
1086
1289
|
* # IncoLite
|
|
1087
1290
|
*
|
|
1088
|
-
* In the IncoLite system, the input ciphertext is an
|
|
1291
|
+
* In the IncoLite system, the input ciphertext is an X-Wing ciphertext, and
|
|
1089
1292
|
* the compute ciphertexts are encrypted using the encryption codec passed
|
|
1090
1293
|
* into the plaintext compute client.
|
|
1091
1294
|
*
|
|
@@ -1284,4 +1487,28 @@ export declare const ComputeService: GenService<{
|
|
|
1284
1487
|
input: typeof AttestedRevealRequestSchema;
|
|
1285
1488
|
output: typeof AttestedRevealResponseSchema;
|
|
1286
1489
|
};
|
|
1490
|
+
/**
|
|
1491
|
+
* EListAttestedDecrypt decrypts a single elist ciphertext and provides an attestation
|
|
1492
|
+
* that the decryption was performed correctly.
|
|
1493
|
+
* Can optionally reencrypt the results of the decryption to a desired public key.
|
|
1494
|
+
*
|
|
1495
|
+
* @generated from rpc inco.covalidator.compute.v1.ComputeService.EListAttestedDecrypt
|
|
1496
|
+
*/
|
|
1497
|
+
eListAttestedDecrypt: {
|
|
1498
|
+
methodKind: "unary";
|
|
1499
|
+
input: typeof EListAttestedDecryptRequestSchema;
|
|
1500
|
+
output: typeof EListAttestedDecryptResponseSchema;
|
|
1501
|
+
};
|
|
1502
|
+
/**
|
|
1503
|
+
* EListAttestedReveal decrypts a single elist ciphertext and provides an attestation
|
|
1504
|
+
* that the decryption was performed correctly.
|
|
1505
|
+
* Doesn't require authentication if the handle is publicly revealed with the on-chain .reveal() call beforehand.
|
|
1506
|
+
*
|
|
1507
|
+
* @generated from rpc inco.covalidator.compute.v1.ComputeService.EListAttestedReveal
|
|
1508
|
+
*/
|
|
1509
|
+
eListAttestedReveal: {
|
|
1510
|
+
methodKind: "unary";
|
|
1511
|
+
input: typeof EListAttestedRevealRequestSchema;
|
|
1512
|
+
output: typeof EListAttestedRevealResponseSchema;
|
|
1513
|
+
};
|
|
1287
1514
|
}>;
|
|
@@ -221,12 +221,6 @@ export declare enum InputVersion {
|
|
|
221
221
|
* @generated from enum value: INPUT_VERSION_UNSPECIFIED = 0;
|
|
222
222
|
*/
|
|
223
223
|
UNSPECIFIED = 0,
|
|
224
|
-
/**
|
|
225
|
-
* INPUT_VERSION_ECIES is the InputPayload message encrypted using ECIES with the primary key version.
|
|
226
|
-
*
|
|
227
|
-
* @generated from enum value: INPUT_VERSION_ECIES = 1;
|
|
228
|
-
*/
|
|
229
|
-
ECIES = 1,
|
|
230
224
|
/**
|
|
231
225
|
* INPUT_VERSION_XWING is the InputPayload message encrypted using HPKE-XWING-CHACHA20POLY1305-SHA256 with the primary key version.
|
|
232
226
|
*
|