@inco/js 0.8.0-devnet-6 → 0.8.0-devnet-8
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/advancedacl/session-key.d.ts +10 -9
- package/dist/cjs/advancedacl/session-key.js +7 -8
- package/dist/cjs/attestedcompute/attested-compute.d.ts +2 -2
- package/dist/cjs/attestedcompute/attested-compute.js +2 -2
- package/dist/cjs/attesteddecrypt/attested-decrypt.d.ts +3 -3
- package/dist/cjs/attesteddecrypt/attested-decrypt.js +5 -5
- package/dist/cjs/encryption/encryption.d.ts +8 -10
- package/dist/cjs/encryption/encryption.js +2 -5
- package/dist/cjs/generated/abis/lightning-preview.d.ts +56 -0
- package/dist/cjs/generated/abis/lightning-preview.js +51 -1
- package/dist/cjs/generated/abis/lightning.d.ts +74 -4
- package/dist/cjs/generated/abis/lightning.js +65 -3
- package/dist/cjs/generated/abis/verifier.d.ts +6 -20
- package/dist/cjs/generated/abis/verifier.js +6 -21
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +234 -7
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/server_pb.js +86 -10
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +0 -6
- package/dist/cjs/generated/es/inco/covalidator/compute/v1/types_pb.js +2 -8
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +213 -0
- package/dist/cjs/generated/es/inco/kms/lite/v1/kms_service_pb.js +36 -11
- package/dist/cjs/handle.js +3 -3
- package/dist/cjs/kms/quorumClient.d.ts +3 -2
- package/dist/cjs/kms/quorumClient.js +30 -27
- package/dist/cjs/lite/index.d.ts +1 -2
- package/dist/cjs/lite/index.js +5 -18
- package/dist/cjs/lite/lightning.d.ts +16 -16
- package/dist/cjs/lite/lightning.js +28 -39
- package/dist/cjs/lite/xwing.d.ts +5 -1
- package/dist/cjs/lite/xwing.js +10 -5
- package/dist/cjs/reencryption/types.d.ts +2 -2
- package/dist/esm/advancedacl/session-key.d.ts +10 -9
- package/dist/esm/advancedacl/session-key.js +7 -8
- package/dist/esm/attestedcompute/attested-compute.d.ts +2 -2
- package/dist/esm/attestedcompute/attested-compute.js +2 -2
- package/dist/esm/attesteddecrypt/attested-decrypt.d.ts +3 -3
- package/dist/esm/attesteddecrypt/attested-decrypt.js +3 -3
- package/dist/esm/encryption/encryption.d.ts +8 -10
- package/dist/esm/encryption/encryption.js +2 -5
- package/dist/esm/generated/abis/lightning-preview.d.ts +56 -0
- package/dist/esm/generated/abis/lightning-preview.js +51 -1
- package/dist/esm/generated/abis/lightning.d.ts +74 -4
- package/dist/esm/generated/abis/lightning.js +65 -3
- package/dist/esm/generated/abis/verifier.d.ts +6 -20
- package/dist/esm/generated/abis/verifier.js +6 -21
- package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +234 -7
- package/dist/esm/generated/es/inco/covalidator/compute/v1/server_pb.js +85 -9
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +0 -6
- package/dist/esm/generated/es/inco/covalidator/compute/v1/types_pb.js +2 -8
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +213 -0
- package/dist/esm/generated/es/inco/kms/lite/v1/kms_service_pb.js +35 -10
- package/dist/esm/handle.js +3 -3
- package/dist/esm/kms/quorumClient.d.ts +3 -2
- package/dist/esm/kms/quorumClient.js +30 -27
- package/dist/esm/lite/index.d.ts +1 -2
- package/dist/esm/lite/index.js +2 -5
- package/dist/esm/lite/lightning.d.ts +16 -16
- package/dist/esm/lite/lightning.js +29 -40
- package/dist/esm/lite/xwing.d.ts +5 -1
- package/dist/esm/lite/xwing.js +9 -4
- package/dist/esm/reencryption/types.d.ts +2 -2
- package/dist/types/advancedacl/session-key.d.ts +10 -9
- package/dist/types/attestedcompute/attested-compute.d.ts +2 -2
- package/dist/types/attesteddecrypt/attested-decrypt.d.ts +3 -3
- package/dist/types/encryption/encryption.d.ts +8 -10
- package/dist/types/generated/abis/lightning-preview.d.ts +56 -0
- package/dist/types/generated/abis/lightning.d.ts +74 -4
- package/dist/types/generated/abis/verifier.d.ts +6 -20
- package/dist/types/generated/es/inco/covalidator/compute/v1/server_pb.d.ts +234 -7
- package/dist/types/generated/es/inco/covalidator/compute/v1/types_pb.d.ts +0 -6
- package/dist/types/generated/es/inco/kms/lite/v1/kms_service_pb.d.ts +213 -0
- package/dist/types/kms/quorumClient.d.ts +3 -2
- package/dist/types/lite/index.d.ts +1 -2
- package/dist/types/lite/lightning.d.ts +16 -16
- package/dist/types/lite/xwing.d.ts +5 -1
- package/dist/types/reencryption/types.d.ts +2 -2
- package/package.json +3 -6
- package/dist/cjs/lite/ecies.d.ts +0 -26
- package/dist/cjs/lite/ecies.js +0 -146
- package/dist/esm/lite/ecies.d.ts +0 -26
- package/dist/esm/lite/ecies.js +0 -134
- package/dist/types/lite/ecies.d.ts +0 -26
|
@@ -224,6 +224,16 @@ export declare const advancedAccessControlAbi: readonly [{
|
|
|
224
224
|
readonly name: "SharerNotAllowedForHandle";
|
|
225
225
|
}];
|
|
226
226
|
export declare const iIncoLightningPreviewAbi: readonly [{
|
|
227
|
+
readonly type: "function";
|
|
228
|
+
readonly inputs: readonly [{
|
|
229
|
+
readonly name: "version";
|
|
230
|
+
readonly internalType: "uint16";
|
|
231
|
+
readonly type: "uint16";
|
|
232
|
+
}];
|
|
233
|
+
readonly name: "addAcceptedVersion";
|
|
234
|
+
readonly outputs: readonly [];
|
|
235
|
+
readonly stateMutability: "nonpayable";
|
|
236
|
+
}, {
|
|
227
237
|
readonly type: "function";
|
|
228
238
|
readonly inputs: readonly [{
|
|
229
239
|
readonly name: "handle";
|
|
@@ -1277,6 +1287,16 @@ export declare const iIncoLightningPreviewAbi: readonly [{
|
|
|
1277
1287
|
readonly type: "bool";
|
|
1278
1288
|
}];
|
|
1279
1289
|
readonly stateMutability: "view";
|
|
1290
|
+
}, {
|
|
1291
|
+
readonly type: "function";
|
|
1292
|
+
readonly inputs: readonly [{
|
|
1293
|
+
readonly name: "version";
|
|
1294
|
+
readonly internalType: "uint16";
|
|
1295
|
+
readonly type: "uint16";
|
|
1296
|
+
}];
|
|
1297
|
+
readonly name: "removeAcceptedVersion";
|
|
1298
|
+
readonly outputs: readonly [];
|
|
1299
|
+
readonly stateMutability: "nonpayable";
|
|
1280
1300
|
}, {
|
|
1281
1301
|
readonly type: "function";
|
|
1282
1302
|
readonly inputs: readonly [];
|
|
@@ -1293,6 +1313,42 @@ export declare const iIncoLightningPreviewAbi: readonly [{
|
|
|
1293
1313
|
readonly name: "withdrawFees";
|
|
1294
1314
|
readonly outputs: readonly [];
|
|
1295
1315
|
readonly stateMutability: "nonpayable";
|
|
1316
|
+
}, {
|
|
1317
|
+
readonly type: "event";
|
|
1318
|
+
readonly anonymous: false;
|
|
1319
|
+
readonly inputs: readonly [{
|
|
1320
|
+
readonly name: "version";
|
|
1321
|
+
readonly internalType: "uint16";
|
|
1322
|
+
readonly type: "uint16";
|
|
1323
|
+
readonly indexed: false;
|
|
1324
|
+
}];
|
|
1325
|
+
readonly name: "VersionAccepted";
|
|
1326
|
+
}, {
|
|
1327
|
+
readonly type: "event";
|
|
1328
|
+
readonly anonymous: false;
|
|
1329
|
+
readonly inputs: readonly [{
|
|
1330
|
+
readonly name: "version";
|
|
1331
|
+
readonly internalType: "uint16";
|
|
1332
|
+
readonly type: "uint16";
|
|
1333
|
+
readonly indexed: false;
|
|
1334
|
+
}];
|
|
1335
|
+
readonly name: "VersionRemoved";
|
|
1336
|
+
}, {
|
|
1337
|
+
readonly type: "error";
|
|
1338
|
+
readonly inputs: readonly [{
|
|
1339
|
+
readonly name: "length";
|
|
1340
|
+
readonly internalType: "uint256";
|
|
1341
|
+
readonly type: "uint256";
|
|
1342
|
+
}];
|
|
1343
|
+
readonly name: "InputLengthTooShort";
|
|
1344
|
+
}, {
|
|
1345
|
+
readonly type: "error";
|
|
1346
|
+
readonly inputs: readonly [{
|
|
1347
|
+
readonly name: "version";
|
|
1348
|
+
readonly internalType: "uint16";
|
|
1349
|
+
readonly type: "uint16";
|
|
1350
|
+
}];
|
|
1351
|
+
readonly name: "InvalidInputVersion";
|
|
1296
1352
|
}];
|
|
1297
1353
|
export declare const voucherEip712CheckerAbi: readonly [{
|
|
1298
1354
|
readonly type: "function";
|
|
@@ -23,6 +23,16 @@ export declare const incoLightningAbi: readonly [{
|
|
|
23
23
|
readonly type: "string";
|
|
24
24
|
}];
|
|
25
25
|
readonly stateMutability: "view";
|
|
26
|
+
}, {
|
|
27
|
+
readonly type: "function";
|
|
28
|
+
readonly inputs: readonly [{
|
|
29
|
+
readonly name: "version";
|
|
30
|
+
readonly internalType: "uint16";
|
|
31
|
+
readonly type: "uint16";
|
|
32
|
+
}];
|
|
33
|
+
readonly name: "addAcceptedVersion";
|
|
34
|
+
readonly outputs: readonly [];
|
|
35
|
+
readonly stateMutability: "nonpayable";
|
|
26
36
|
}, {
|
|
27
37
|
readonly type: "function";
|
|
28
38
|
readonly inputs: readonly [{
|
|
@@ -741,6 +751,20 @@ export declare const incoLightningAbi: readonly [{
|
|
|
741
751
|
readonly name: "initialize";
|
|
742
752
|
readonly outputs: readonly [];
|
|
743
753
|
readonly stateMutability: "nonpayable";
|
|
754
|
+
}, {
|
|
755
|
+
readonly type: "function";
|
|
756
|
+
readonly inputs: readonly [{
|
|
757
|
+
readonly name: "version";
|
|
758
|
+
readonly internalType: "uint16";
|
|
759
|
+
readonly type: "uint16";
|
|
760
|
+
}];
|
|
761
|
+
readonly name: "isAcceptedVersion";
|
|
762
|
+
readonly outputs: readonly [{
|
|
763
|
+
readonly name: "";
|
|
764
|
+
readonly internalType: "bool";
|
|
765
|
+
readonly type: "bool";
|
|
766
|
+
}];
|
|
767
|
+
readonly stateMutability: "view";
|
|
744
768
|
}, {
|
|
745
769
|
readonly type: "function";
|
|
746
770
|
readonly inputs: readonly [{
|
|
@@ -895,6 +919,16 @@ export declare const incoLightningAbi: readonly [{
|
|
|
895
919
|
readonly type: "bytes32";
|
|
896
920
|
}];
|
|
897
921
|
readonly stateMutability: "view";
|
|
922
|
+
}, {
|
|
923
|
+
readonly type: "function";
|
|
924
|
+
readonly inputs: readonly [{
|
|
925
|
+
readonly name: "version";
|
|
926
|
+
readonly internalType: "uint16";
|
|
927
|
+
readonly type: "uint16";
|
|
928
|
+
}];
|
|
929
|
+
readonly name: "removeAcceptedVersion";
|
|
930
|
+
readonly outputs: readonly [];
|
|
931
|
+
readonly stateMutability: "nonpayable";
|
|
898
932
|
}, {
|
|
899
933
|
readonly type: "function";
|
|
900
934
|
readonly inputs: readonly [];
|
|
@@ -1631,8 +1665,8 @@ export declare const incoLightningAbi: readonly [{
|
|
|
1631
1665
|
readonly indexed: true;
|
|
1632
1666
|
}, {
|
|
1633
1667
|
readonly name: "version";
|
|
1634
|
-
readonly internalType: "
|
|
1635
|
-
readonly type: "
|
|
1668
|
+
readonly internalType: "uint16";
|
|
1669
|
+
readonly type: "uint16";
|
|
1636
1670
|
readonly indexed: false;
|
|
1637
1671
|
}, {
|
|
1638
1672
|
readonly name: "ciphertext";
|
|
@@ -1711,6 +1745,26 @@ export declare const incoLightningAbi: readonly [{
|
|
|
1711
1745
|
readonly indexed: true;
|
|
1712
1746
|
}];
|
|
1713
1747
|
readonly name: "Upgraded";
|
|
1748
|
+
}, {
|
|
1749
|
+
readonly type: "event";
|
|
1750
|
+
readonly anonymous: false;
|
|
1751
|
+
readonly inputs: readonly [{
|
|
1752
|
+
readonly name: "version";
|
|
1753
|
+
readonly internalType: "uint16";
|
|
1754
|
+
readonly type: "uint16";
|
|
1755
|
+
readonly indexed: false;
|
|
1756
|
+
}];
|
|
1757
|
+
readonly name: "VersionAccepted";
|
|
1758
|
+
}, {
|
|
1759
|
+
readonly type: "event";
|
|
1760
|
+
readonly anonymous: false;
|
|
1761
|
+
readonly inputs: readonly [{
|
|
1762
|
+
readonly name: "version";
|
|
1763
|
+
readonly internalType: "uint16";
|
|
1764
|
+
readonly type: "uint16";
|
|
1765
|
+
readonly indexed: false;
|
|
1766
|
+
}];
|
|
1767
|
+
readonly name: "VersionRemoved";
|
|
1714
1768
|
}, {
|
|
1715
1769
|
readonly type: "error";
|
|
1716
1770
|
readonly inputs: readonly [{
|
|
@@ -1759,8 +1813,8 @@ export declare const incoLightningAbi: readonly [{
|
|
|
1759
1813
|
readonly type: "address";
|
|
1760
1814
|
}, {
|
|
1761
1815
|
readonly name: "version";
|
|
1762
|
-
readonly internalType: "
|
|
1763
|
-
readonly type: "
|
|
1816
|
+
readonly internalType: "uint16";
|
|
1817
|
+
readonly type: "uint16";
|
|
1764
1818
|
}];
|
|
1765
1819
|
readonly name: "ExternalHandleDoesNotMatchComputedHandle";
|
|
1766
1820
|
}, {
|
|
@@ -1783,10 +1837,26 @@ export declare const incoLightningAbi: readonly [{
|
|
|
1783
1837
|
readonly type: "bytes32";
|
|
1784
1838
|
}];
|
|
1785
1839
|
readonly name: "HandleAlreadyExists";
|
|
1840
|
+
}, {
|
|
1841
|
+
readonly type: "error";
|
|
1842
|
+
readonly inputs: readonly [{
|
|
1843
|
+
readonly name: "length";
|
|
1844
|
+
readonly internalType: "uint256";
|
|
1845
|
+
readonly type: "uint256";
|
|
1846
|
+
}];
|
|
1847
|
+
readonly name: "InputLengthTooShort";
|
|
1786
1848
|
}, {
|
|
1787
1849
|
readonly type: "error";
|
|
1788
1850
|
readonly inputs: readonly [];
|
|
1789
1851
|
readonly name: "InvalidInitialization";
|
|
1852
|
+
}, {
|
|
1853
|
+
readonly type: "error";
|
|
1854
|
+
readonly inputs: readonly [{
|
|
1855
|
+
readonly name: "version";
|
|
1856
|
+
readonly internalType: "uint16";
|
|
1857
|
+
readonly type: "uint16";
|
|
1858
|
+
}];
|
|
1859
|
+
readonly name: "InvalidInputVersion";
|
|
1790
1860
|
}, {
|
|
1791
1861
|
readonly type: "error";
|
|
1792
1862
|
readonly inputs: readonly [];
|
|
@@ -641,16 +641,6 @@ export declare const incoVerifierAbi: readonly [{
|
|
|
641
641
|
readonly type: "address";
|
|
642
642
|
}];
|
|
643
643
|
readonly stateMutability: "view";
|
|
644
|
-
}, {
|
|
645
|
-
readonly type: "function";
|
|
646
|
-
readonly inputs: readonly [{
|
|
647
|
-
readonly name: "mrAggregated";
|
|
648
|
-
readonly internalType: "bytes32";
|
|
649
|
-
readonly type: "bytes32";
|
|
650
|
-
}];
|
|
651
|
-
readonly name: "removeApprovedTeeVersion";
|
|
652
|
-
readonly outputs: readonly [];
|
|
653
|
-
readonly stateMutability: "nonpayable";
|
|
654
644
|
}, {
|
|
655
645
|
readonly type: "function";
|
|
656
646
|
readonly inputs: readonly [{
|
|
@@ -667,6 +657,12 @@ export declare const incoVerifierAbi: readonly [{
|
|
|
667
657
|
readonly name: "renounceOwnership";
|
|
668
658
|
readonly outputs: readonly [];
|
|
669
659
|
readonly stateMutability: "nonpayable";
|
|
660
|
+
}, {
|
|
661
|
+
readonly type: "function";
|
|
662
|
+
readonly inputs: readonly [];
|
|
663
|
+
readonly name: "reset";
|
|
664
|
+
readonly outputs: readonly [];
|
|
665
|
+
readonly stateMutability: "nonpayable";
|
|
670
666
|
}, {
|
|
671
667
|
readonly type: "function";
|
|
672
668
|
readonly inputs: readonly [{
|
|
@@ -950,16 +946,6 @@ export declare const incoVerifierAbi: readonly [{
|
|
|
950
946
|
readonly indexed: true;
|
|
951
947
|
}];
|
|
952
948
|
readonly name: "SignerHasUpdatedTDX";
|
|
953
|
-
}, {
|
|
954
|
-
readonly type: "event";
|
|
955
|
-
readonly anonymous: false;
|
|
956
|
-
readonly inputs: readonly [{
|
|
957
|
-
readonly name: "mrAggregated";
|
|
958
|
-
readonly internalType: "bytes32";
|
|
959
|
-
readonly type: "bytes32";
|
|
960
|
-
readonly indexed: true;
|
|
961
|
-
}];
|
|
962
|
-
readonly name: "TEEVersionRemoved";
|
|
963
949
|
}, {
|
|
964
950
|
readonly type: "event";
|
|
965
951
|
readonly anonymous: false;
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import type { GenEnum, GenFile, GenMessage, GenService } from "@bufbuild/protobuf/codegenv2";
|
|
2
2
|
import type { CryptogramWithProof, InputCryptogram, StoredCryptogram } from "./types_pb";
|
|
3
|
-
import type { DecryptionAttestation } from "../../../kms/lite/v1/kms_service_pb";
|
|
3
|
+
import type { DecryptionAttestation, EListElement } from "../../../kms/lite/v1/kms_service_pb";
|
|
4
4
|
import type { ACLProof, SupportedScalarBinaryOp } from "../../../kms/lite/v1/types_pb";
|
|
5
5
|
import type { RATlsServer } from "../../../sealingfetcher/v1/sealingfetcher_pb";
|
|
6
6
|
import type { StartHeliosRequest } from "../../../helioswrapper/v1/helioswrapper_pb";
|
|
@@ -655,8 +655,8 @@ export type AttestedDecryptRequest = Message<"inco.covalidator.compute.v1.Attest
|
|
|
655
655
|
userAddress: string;
|
|
656
656
|
/**
|
|
657
657
|
* reencrypt_pub_key is the encoding of the user's public
|
|
658
|
-
* encryption key (
|
|
659
|
-
* It is encoded in its
|
|
658
|
+
* encryption key (X-Wing) used to reencrypt the result for.
|
|
659
|
+
* It is encoded in its 1216-byte format.
|
|
660
660
|
* If empty, the KMS will return plaintext decryption instead of reencryption.
|
|
661
661
|
*
|
|
662
662
|
* @generated from field: bytes reencrypt_pub_key = 2;
|
|
@@ -716,6 +716,82 @@ export type AttestedDecryptRequest = Message<"inco.covalidator.compute.v1.Attest
|
|
|
716
716
|
* Use `create(AttestedDecryptRequestSchema)` to create a new message.
|
|
717
717
|
*/
|
|
718
718
|
export declare const AttestedDecryptRequestSchema: GenMessage<AttestedDecryptRequest>;
|
|
719
|
+
/**
|
|
720
|
+
* EListAttestedDecryptRequest is the request type for the ComputeService/EListAttestedDecrypt RPC method.
|
|
721
|
+
*
|
|
722
|
+
* @generated from message inco.covalidator.compute.v1.EListAttestedDecryptRequest
|
|
723
|
+
*/
|
|
724
|
+
export type EListAttestedDecryptRequest = Message<"inco.covalidator.compute.v1.EListAttestedDecryptRequest"> & {
|
|
725
|
+
/**
|
|
726
|
+
* user_address is the Ethereum address of the user who requested the
|
|
727
|
+
* decryption, prefixed with 0x.
|
|
728
|
+
*
|
|
729
|
+
* @generated from field: string user_address = 1;
|
|
730
|
+
*/
|
|
731
|
+
userAddress: string;
|
|
732
|
+
/**
|
|
733
|
+
* reencrypt_pub_key is the encoding of the user's public
|
|
734
|
+
* encryption key (secp256k1) used to reencrypt the result for.
|
|
735
|
+
* It is encoded in its 33-byte compressed format.
|
|
736
|
+
* If empty, the KMS will return plaintext decryption instead of reencryption.
|
|
737
|
+
*
|
|
738
|
+
* @generated from field: bytes reencrypt_pub_key = 2;
|
|
739
|
+
*/
|
|
740
|
+
reencryptPubKey: Uint8Array;
|
|
741
|
+
/**
|
|
742
|
+
* eip712_signature is an EIP-712 signature of the following EIP-712 typed data by
|
|
743
|
+
* `user_address` (note that we only give a JSON representation for the sake of
|
|
744
|
+
* readability, but the actual signed data is defined in the EIP-712 spec) where:
|
|
745
|
+
* handles - list of 0x prefixed handles to decrypt
|
|
746
|
+
* publicKey - 0x prefixed reencrypt_pub_key (if any). "0x" otherwise if empty.
|
|
747
|
+
*
|
|
748
|
+
* ```json
|
|
749
|
+
* {
|
|
750
|
+
* "types": {
|
|
751
|
+
* "EIP712Domain": [
|
|
752
|
+
* { "name": "name", "type": "string" },
|
|
753
|
+
* { "name": "version", "type": "string" },
|
|
754
|
+
* { "name": "chainId", "type": "uint256" }
|
|
755
|
+
* ],
|
|
756
|
+
* "AttestedDecryptRequest": [
|
|
757
|
+
* { "name": "handles", "type": "bytes32[]" },
|
|
758
|
+
* { "name": "publicKey", "type": "bytes" },
|
|
759
|
+
* ]
|
|
760
|
+
* },
|
|
761
|
+
* "primaryType": "AttestedDecryptRequest",
|
|
762
|
+
* "domain": {
|
|
763
|
+
* "name": "IncoAttestedDecrypt",
|
|
764
|
+
* "version": "0.1.0",
|
|
765
|
+
* "chainId": "<host_chain_id>",
|
|
766
|
+
* },
|
|
767
|
+
* "message": {
|
|
768
|
+
* "handles": ["<handle1>", "<handle2>", ...],
|
|
769
|
+
* "publicKey": "0x<reencrypt_pub_key>"
|
|
770
|
+
* }
|
|
771
|
+
* }
|
|
772
|
+
* ```
|
|
773
|
+
*
|
|
774
|
+
* @generated from field: bytes eip712_signature = 3;
|
|
775
|
+
*/
|
|
776
|
+
eip712Signature: Uint8Array;
|
|
777
|
+
/**
|
|
778
|
+
* cryptogram_with_proof is the cryptogram for elist with proof to decrypt.
|
|
779
|
+
* Either the user_address or sharer must have ACL access to the elist cryptogram handle for the attested
|
|
780
|
+
* decryption to succeed.
|
|
781
|
+
*
|
|
782
|
+
* @generated from field: inco.covalidator.compute.v1.CryptogramWithProof cryptogram_with_proof = 4;
|
|
783
|
+
*/
|
|
784
|
+
cryptogramWithProof?: CryptogramWithProof;
|
|
785
|
+
/**
|
|
786
|
+
* @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 5;
|
|
787
|
+
*/
|
|
788
|
+
configureRequest?: ConfigureRequest;
|
|
789
|
+
};
|
|
790
|
+
/**
|
|
791
|
+
* Describes the message inco.covalidator.compute.v1.EListAttestedDecryptRequest.
|
|
792
|
+
* Use `create(EListAttestedDecryptRequestSchema)` to create a new message.
|
|
793
|
+
*/
|
|
794
|
+
export declare const EListAttestedDecryptRequestSchema: GenMessage<EListAttestedDecryptRequest>;
|
|
719
795
|
/**
|
|
720
796
|
* AttestedDecryptResponse is the response type for the ComputeService/AttestedDecrypt RPC method.
|
|
721
797
|
*
|
|
@@ -735,6 +811,30 @@ export type AttestedDecryptResponse = Message<"inco.covalidator.compute.v1.Attes
|
|
|
735
811
|
* Use `create(AttestedDecryptResponseSchema)` to create a new message.
|
|
736
812
|
*/
|
|
737
813
|
export declare const AttestedDecryptResponseSchema: GenMessage<AttestedDecryptResponse>;
|
|
814
|
+
/**
|
|
815
|
+
* EListAttestedDecryptResponse is the response type for the ComputeService/EListAttestedDecrypt RPC method.
|
|
816
|
+
*
|
|
817
|
+
* @generated from message inco.covalidator.compute.v1.EListAttestedDecryptResponse
|
|
818
|
+
*/
|
|
819
|
+
export type EListAttestedDecryptResponse = Message<"inco.covalidator.compute.v1.EListAttestedDecryptResponse"> & {
|
|
820
|
+
/**
|
|
821
|
+
* commitment_proof_attestation is the signed commitment proof of the decrypted elist values.
|
|
822
|
+
*
|
|
823
|
+
* @generated from field: inco.kms.lite.v1.DecryptionAttestation commitment_proof_attestation = 1;
|
|
824
|
+
*/
|
|
825
|
+
commitmentProofAttestation?: DecryptionAttestation;
|
|
826
|
+
/**
|
|
827
|
+
* values is the list of decrypted elist elements.
|
|
828
|
+
*
|
|
829
|
+
* @generated from field: repeated inco.kms.lite.v1.EListElement values = 2;
|
|
830
|
+
*/
|
|
831
|
+
values: EListElement[];
|
|
832
|
+
};
|
|
833
|
+
/**
|
|
834
|
+
* Describes the message inco.covalidator.compute.v1.EListAttestedDecryptResponse.
|
|
835
|
+
* Use `create(EListAttestedDecryptResponseSchema)` to create a new message.
|
|
836
|
+
*/
|
|
837
|
+
export declare const EListAttestedDecryptResponseSchema: GenMessage<EListAttestedDecryptResponse>;
|
|
738
838
|
/**
|
|
739
839
|
* AttestedRevealRequest is the request type for the ComputeService/AttestedReveal RPC method.
|
|
740
840
|
*
|
|
@@ -758,6 +858,29 @@ export type AttestedRevealRequest = Message<"inco.covalidator.compute.v1.Atteste
|
|
|
758
858
|
* Use `create(AttestedRevealRequestSchema)` to create a new message.
|
|
759
859
|
*/
|
|
760
860
|
export declare const AttestedRevealRequestSchema: GenMessage<AttestedRevealRequest>;
|
|
861
|
+
/**
|
|
862
|
+
* EListAttestedRevealRequest is the request type for the ComputeService/EListAttestedReveal RPC method.
|
|
863
|
+
*
|
|
864
|
+
* @generated from message inco.covalidator.compute.v1.EListAttestedRevealRequest
|
|
865
|
+
*/
|
|
866
|
+
export type EListAttestedRevealRequest = Message<"inco.covalidator.compute.v1.EListAttestedRevealRequest"> & {
|
|
867
|
+
/**
|
|
868
|
+
* cryptogram is the elist ciphertext to decrypt.
|
|
869
|
+
* The elist handle must have been revealed beforehand with the on-chain .reveal() call.
|
|
870
|
+
*
|
|
871
|
+
* @generated from field: inco.covalidator.compute.v1.StoredCryptogram cryptogram = 3;
|
|
872
|
+
*/
|
|
873
|
+
cryptogram?: StoredCryptogram;
|
|
874
|
+
/**
|
|
875
|
+
* @generated from field: optional inco.covalidator.compute.v1.ConfigureRequest configure_request = 4;
|
|
876
|
+
*/
|
|
877
|
+
configureRequest?: ConfigureRequest;
|
|
878
|
+
};
|
|
879
|
+
/**
|
|
880
|
+
* Describes the message inco.covalidator.compute.v1.EListAttestedRevealRequest.
|
|
881
|
+
* Use `create(EListAttestedRevealRequestSchema)` to create a new message.
|
|
882
|
+
*/
|
|
883
|
+
export declare const EListAttestedRevealRequestSchema: GenMessage<EListAttestedRevealRequest>;
|
|
761
884
|
/**
|
|
762
885
|
* AttestedRevealResponse is the response type for the ComputeService/AttestedReveal RPC method.
|
|
763
886
|
*
|
|
@@ -777,6 +900,30 @@ export type AttestedRevealResponse = Message<"inco.covalidator.compute.v1.Attest
|
|
|
777
900
|
* Use `create(AttestedRevealResponseSchema)` to create a new message.
|
|
778
901
|
*/
|
|
779
902
|
export declare const AttestedRevealResponseSchema: GenMessage<AttestedRevealResponse>;
|
|
903
|
+
/**
|
|
904
|
+
* EListAttestedRevealResponse is the response type for the ComputeService/EListAttestedRevealResponse RPC method.
|
|
905
|
+
*
|
|
906
|
+
* @generated from message inco.covalidator.compute.v1.EListAttestedRevealResponse
|
|
907
|
+
*/
|
|
908
|
+
export type EListAttestedRevealResponse = Message<"inco.covalidator.compute.v1.EListAttestedRevealResponse"> & {
|
|
909
|
+
/**
|
|
910
|
+
* commitment_proof_attestation is the signed commitment proof of the decrypted elist values.
|
|
911
|
+
*
|
|
912
|
+
* @generated from field: inco.kms.lite.v1.DecryptionAttestation commitment_proof_attestation = 1;
|
|
913
|
+
*/
|
|
914
|
+
commitmentProofAttestation?: DecryptionAttestation;
|
|
915
|
+
/**
|
|
916
|
+
* values is the list of decrypted elist elements.
|
|
917
|
+
*
|
|
918
|
+
* @generated from field: repeated inco.kms.lite.v1.EListElement values = 2;
|
|
919
|
+
*/
|
|
920
|
+
values: EListElement[];
|
|
921
|
+
};
|
|
922
|
+
/**
|
|
923
|
+
* Describes the message inco.covalidator.compute.v1.EListAttestedRevealResponse.
|
|
924
|
+
* Use `create(EListAttestedRevealResponseSchema)` to create a new message.
|
|
925
|
+
*/
|
|
926
|
+
export declare const EListAttestedRevealResponseSchema: GenMessage<EListAttestedRevealResponse>;
|
|
780
927
|
/**
|
|
781
928
|
* AttestedComputeRequest is the request type for the ComputeService/AttestedDecrypt RPC method.
|
|
782
929
|
*
|
|
@@ -792,8 +939,8 @@ export type AttestedComputeRequest = Message<"inco.covalidator.compute.v1.Attest
|
|
|
792
939
|
userAddress: string;
|
|
793
940
|
/**
|
|
794
941
|
* reencrypt_pub_key is the encoding of the user's public
|
|
795
|
-
* encryption key (
|
|
796
|
-
* It is encoded in its
|
|
942
|
+
* encryption key (X-Wing) used to reencrypt the result for.
|
|
943
|
+
* It is encoded in its 1216-byte format.
|
|
797
944
|
* If empty, the KMS will return plaintext decryption instead of reencryption.
|
|
798
945
|
*
|
|
799
946
|
* @generated from field: bytes reencrypt_pub_key = 2;
|
|
@@ -1044,10 +1191,66 @@ export declare enum FheOperation {
|
|
|
1044
1191
|
* @generated from enum value: FHE_RAND_BOUNDED = 27;
|
|
1045
1192
|
*/
|
|
1046
1193
|
FHE_RAND_BOUNDED = 27,
|
|
1194
|
+
/**
|
|
1195
|
+
* Custom
|
|
1196
|
+
*
|
|
1197
|
+
* @generated from enum value: FHE_ALLOW = 40;
|
|
1198
|
+
*/
|
|
1199
|
+
FHE_ALLOW = 40,
|
|
1200
|
+
/**
|
|
1201
|
+
* @generated from enum value: FHE_REVEAL = 41;
|
|
1202
|
+
*/
|
|
1203
|
+
FHE_REVEAL = 41,
|
|
1047
1204
|
/**
|
|
1048
1205
|
* @generated from enum value: FHE_GET_CIPHERTEXT = 32;
|
|
1049
1206
|
*/
|
|
1050
|
-
FHE_GET_CIPHERTEXT = 32
|
|
1207
|
+
FHE_GET_CIPHERTEXT = 32,
|
|
1208
|
+
/**
|
|
1209
|
+
* Elist operations
|
|
1210
|
+
*
|
|
1211
|
+
* @generated from enum value: FHE_NEW_ELIST = 100;
|
|
1212
|
+
*/
|
|
1213
|
+
FHE_NEW_ELIST = 100,
|
|
1214
|
+
/**
|
|
1215
|
+
* @generated from enum value: FHE_ELIST_GET = 101;
|
|
1216
|
+
*/
|
|
1217
|
+
FHE_ELIST_GET = 101,
|
|
1218
|
+
/**
|
|
1219
|
+
* @generated from enum value: FHE_ELIST_GET_OR = 102;
|
|
1220
|
+
*/
|
|
1221
|
+
FHE_ELIST_GET_OR = 102,
|
|
1222
|
+
/**
|
|
1223
|
+
* @generated from enum value: FHE_ELIST_SET = 103;
|
|
1224
|
+
*/
|
|
1225
|
+
FHE_ELIST_SET = 103,
|
|
1226
|
+
/**
|
|
1227
|
+
* @generated from enum value: FHE_ELIST_INSERT = 104;
|
|
1228
|
+
*/
|
|
1229
|
+
FHE_ELIST_INSERT = 104,
|
|
1230
|
+
/**
|
|
1231
|
+
* @generated from enum value: FHE_ELIST_APPEND = 105;
|
|
1232
|
+
*/
|
|
1233
|
+
FHE_ELIST_APPEND = 105,
|
|
1234
|
+
/**
|
|
1235
|
+
* @generated from enum value: FHE_ELIST_CONCAT = 106;
|
|
1236
|
+
*/
|
|
1237
|
+
FHE_ELIST_CONCAT = 106,
|
|
1238
|
+
/**
|
|
1239
|
+
* @generated from enum value: FHE_ELIST_SLICE = 107;
|
|
1240
|
+
*/
|
|
1241
|
+
FHE_ELIST_SLICE = 107,
|
|
1242
|
+
/**
|
|
1243
|
+
* @generated from enum value: FHE_ELIST_RANGE = 108;
|
|
1244
|
+
*/
|
|
1245
|
+
FHE_ELIST_RANGE = 108,
|
|
1246
|
+
/**
|
|
1247
|
+
* @generated from enum value: FHE_ELIST_SHUFFLE = 109;
|
|
1248
|
+
*/
|
|
1249
|
+
FHE_ELIST_SHUFFLE = 109,
|
|
1250
|
+
/**
|
|
1251
|
+
* @generated from enum value: FHE_ELIST_REVERSE = 110;
|
|
1252
|
+
*/
|
|
1253
|
+
FHE_ELIST_REVERSE = 110
|
|
1051
1254
|
}
|
|
1052
1255
|
/**
|
|
1053
1256
|
* Describes the enum inco.covalidator.compute.v1.FheOperation.
|
|
@@ -1085,7 +1288,7 @@ export declare const ComputeService: GenService<{
|
|
|
1085
1288
|
*
|
|
1086
1289
|
* # IncoLite
|
|
1087
1290
|
*
|
|
1088
|
-
* In the IncoLite system, the input ciphertext is an
|
|
1291
|
+
* In the IncoLite system, the input ciphertext is an X-Wing ciphertext, and
|
|
1089
1292
|
* the compute ciphertexts are encrypted using the encryption codec passed
|
|
1090
1293
|
* into the plaintext compute client.
|
|
1091
1294
|
*
|
|
@@ -1284,4 +1487,28 @@ export declare const ComputeService: GenService<{
|
|
|
1284
1487
|
input: typeof AttestedRevealRequestSchema;
|
|
1285
1488
|
output: typeof AttestedRevealResponseSchema;
|
|
1286
1489
|
};
|
|
1490
|
+
/**
|
|
1491
|
+
* EListAttestedDecrypt decrypts a single elist ciphertext and provides an attestation
|
|
1492
|
+
* that the decryption was performed correctly.
|
|
1493
|
+
* Can optionally reencrypt the results of the decryption to a desired public key.
|
|
1494
|
+
*
|
|
1495
|
+
* @generated from rpc inco.covalidator.compute.v1.ComputeService.EListAttestedDecrypt
|
|
1496
|
+
*/
|
|
1497
|
+
eListAttestedDecrypt: {
|
|
1498
|
+
methodKind: "unary";
|
|
1499
|
+
input: typeof EListAttestedDecryptRequestSchema;
|
|
1500
|
+
output: typeof EListAttestedDecryptResponseSchema;
|
|
1501
|
+
};
|
|
1502
|
+
/**
|
|
1503
|
+
* EListAttestedReveal decrypts a single elist ciphertext and provides an attestation
|
|
1504
|
+
* that the decryption was performed correctly.
|
|
1505
|
+
* Doesn't require authentication if the handle is publicly revealed with the on-chain .reveal() call beforehand.
|
|
1506
|
+
*
|
|
1507
|
+
* @generated from rpc inco.covalidator.compute.v1.ComputeService.EListAttestedReveal
|
|
1508
|
+
*/
|
|
1509
|
+
eListAttestedReveal: {
|
|
1510
|
+
methodKind: "unary";
|
|
1511
|
+
input: typeof EListAttestedRevealRequestSchema;
|
|
1512
|
+
output: typeof EListAttestedRevealResponseSchema;
|
|
1513
|
+
};
|
|
1287
1514
|
}>;
|
|
@@ -221,12 +221,6 @@ export declare enum InputVersion {
|
|
|
221
221
|
* @generated from enum value: INPUT_VERSION_UNSPECIFIED = 0;
|
|
222
222
|
*/
|
|
223
223
|
UNSPECIFIED = 0,
|
|
224
|
-
/**
|
|
225
|
-
* INPUT_VERSION_ECIES is the InputPayload message encrypted using ECIES with the primary key version.
|
|
226
|
-
*
|
|
227
|
-
* @generated from enum value: INPUT_VERSION_ECIES = 1;
|
|
228
|
-
*/
|
|
229
|
-
ECIES = 1,
|
|
230
224
|
/**
|
|
231
225
|
* INPUT_VERSION_XWING is the InputPayload message encrypted using HPKE-XWING-CHACHA20POLY1305-SHA256 with the primary key version.
|
|
232
226
|
*
|