@wireapp/core-crypto 0.11.0 → 1.0.0-pre.1

Sign up to get free protection for your applications and to get access to all the features.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@wireapp/core-crypto",
3
- "version": "0.11.0",
3
+ "version": "1.0.0-pre.1",
4
4
  "description": "CoreCrypto bindings for the Web",
5
5
  "type": "module",
6
6
  "module": "platforms/web/corecrypto.js",
@@ -152,11 +152,11 @@ export interface MemberAddedMessages {
152
152
  */
153
153
  welcome: Uint8Array;
154
154
  /**
155
- * MLS PublicGroupState (GroupInfo in draft-15) which is required for joining a group by external commit
155
+ * MLS GroupInfo which is required for joining a group by external commit
156
156
  *
157
157
  * @readonly
158
158
  */
159
- publicGroupState: PublicGroupStateBundle;
159
+ groupInfo: GroupInfoBundle;
160
160
  }
161
161
  /**
162
162
  * Data shape for a MLS generic commit + optional bundle (aka stapled commit & welcome)
@@ -175,35 +175,35 @@ export interface CommitBundle {
175
175
  */
176
176
  welcome?: Uint8Array;
177
177
  /**
178
- * MLS PublicGroupState (GroupInfo in draft-15) which is required for joining a group by external commit
178
+ * MLS GroupInfo which is required for joining a group by external commit
179
179
  *
180
180
  * @readonly
181
181
  */
182
- publicGroupState: PublicGroupStateBundle;
182
+ groupInfo: GroupInfoBundle;
183
183
  }
184
184
  /**
185
- * Wraps a PublicGroupState in order to efficiently upload it to the Delivery Service.
185
+ * Wraps a GroupInfo in order to efficiently upload it to the Delivery Service.
186
186
  * This is not part of MLS protocol but parts might be standardized at some point.
187
187
  */
188
- export interface PublicGroupStateBundle {
188
+ export interface GroupInfoBundle {
189
189
  /**
190
- * see {@link PublicGroupStateEncryptionType}
190
+ * see {@link GroupInfoEncryptionType}
191
191
  */
192
- encryptionType: PublicGroupStateEncryptionType;
192
+ encryptionType: GroupInfoEncryptionType;
193
193
  /**
194
194
  * see {@link RatchetTreeType}
195
195
  */
196
196
  ratchetTreeType: RatchetTreeType;
197
197
  /**
198
- * TLS-serialized PublicGroupState
198
+ * TLS-serialized GroupInfo
199
199
  */
200
200
  payload: Uint8Array;
201
201
  }
202
202
  /**
203
- * Informs whether the PublicGroupState is confidential
204
- * see [core_crypto::mls::conversation::public_group_state::PublicGroupStateEncryptionType]
203
+ * Informs whether the GroupInfo is confidential
204
+ * see [core_crypto::mls::conversation::group_info::GroupInfoEncryptionType]
205
205
  */
206
- export declare enum PublicGroupStateEncryptionType {
206
+ export declare enum GroupInfoEncryptionType {
207
207
  /**
208
208
  * Unencrypted
209
209
  */
@@ -215,11 +215,11 @@ export declare enum PublicGroupStateEncryptionType {
215
215
  }
216
216
  /**
217
217
  * Represents different ways of carrying the Ratchet Tree with some optimizations to save some space
218
- * see [core_crypto::mls::conversation::public_group_state::RatchetTreeType]
218
+ * see [core_crypto::mls::conversation::group_info::RatchetTreeType]
219
219
  */
220
220
  export declare enum RatchetTreeType {
221
221
  /**
222
- * Complete PublicGroupState
222
+ * Complete GroupInfo
223
223
  */
224
224
  Full = 1,
225
225
  /**
@@ -302,7 +302,7 @@ export interface ConversationInitBundle {
302
302
  *
303
303
  * @readonly
304
304
  */
305
- publicGroupState: PublicGroupStateBundle;
305
+ groupInfo: GroupInfoBundle;
306
306
  }
307
307
  /**
308
308
  * This is a wrapper for all the possible outcomes you can get after decrypting a message
@@ -431,11 +431,7 @@ export declare enum ExternalProposalType {
431
431
  /**
432
432
  * This allows to propose the addition of other clients to the MLS group/conversation
433
433
  */
434
- Add = 0,
435
- /**
436
- * This allows to propose the removal of clients from the MLS group/conversation
437
- */
438
- Remove = 1
434
+ Add = 0
439
435
  }
440
436
  export interface ExternalProposalArgs {
441
437
  /**
@@ -448,12 +444,6 @@ export interface ExternalProposalArgs {
448
444
  */
449
445
  epoch: number;
450
446
  }
451
- export interface ExternalRemoveProposalArgs extends ExternalProposalArgs {
452
- /**
453
- * KeyPackageRef of the client that needs to be removed in the proposal
454
- */
455
- keyPackageRef: Uint8Array;
456
- }
457
447
  export interface ExternalAddProposalArgs extends ExternalProposalArgs {
458
448
  /**
459
449
  * {@link Ciphersuite} to propose to join the MLS group with.
@@ -759,16 +749,16 @@ export declare class CoreCrypto {
759
749
  * @returns A {@link ProposalBundle} containing the Proposal and its reference in order to roll it back if necessary
760
750
  */
761
751
  newProposal(proposalType: ProposalType, args: ProposalArgs | AddProposalArgs | RemoveProposalArgs): Promise<ProposalBundle>;
762
- newExternalProposal(externalProposalType: ExternalProposalType, args: ExternalAddProposalArgs | ExternalRemoveProposalArgs): Promise<Uint8Array>;
752
+ newExternalProposal(externalProposalType: ExternalProposalType, args: ExternalAddProposalArgs): Promise<Uint8Array>;
763
753
  /**
764
- * Exports public group state for use in external commits
754
+ * Exports GroupInfo for use in external commits
765
755
  *
766
756
  * @param conversationId - MLS Conversation ID
767
- * @returns TLS-serialized MLS public group state
757
+ * @returns TLS-serialized MLS GroupInfo
768
758
  */
769
- exportGroupState(conversationId: ConversationId): Promise<Uint8Array>;
759
+ exportGroupInfo(conversationId: ConversationId): Promise<Uint8Array>;
770
760
  /**
771
- * Allows to create an external commit to "apply" to join a group through its public group state.
761
+ * Allows to create an external commit to "apply" to join a group through its GroupInfo.
772
762
  *
773
763
  * If the Delivery Service accepts the external commit, you have to {@link CoreCrypto.mergePendingGroupFromExternalCommit}
774
764
  * in order to get back a functional MLS group. On the opposite, if it rejects it, you can either retry by just
@@ -777,14 +767,14 @@ export declare class CoreCrypto {
777
767
  * {@link CoreCrypto.clearPendingGroupFromExternalCommit} in order not to bloat the user's storage but nothing
778
768
  * bad can happen if you forget to except some storage space wasted.
779
769
  *
780
- * @param publicGroupState - a TLS encoded PublicGroupState fetched from the Delivery Service
770
+ * @param groupInfo - a TLS encoded GroupInfo fetched from the Delivery Service
781
771
  * @param credentialType - kind of Credential to use for joining this group. If {@link CredentialType.Basic} is
782
772
  * chosen and no Credential has been created yet for it, a new one will be generated.
783
773
  * @param configuration - configuration of the MLS group
784
774
  * When {@link CredentialType.X509} is chosen, it fails when no Credential has been created for the given {@link Ciphersuite}.
785
775
  * @returns see {@link ConversationInitBundle}
786
776
  */
787
- joinByExternalCommit(publicGroupState: Uint8Array, credentialType: CredentialType, configuration?: CustomConfiguration): Promise<ConversationInitBundle>;
777
+ joinByExternalCommit(groupInfo: Uint8Array, credentialType: CredentialType, configuration?: CustomConfiguration): Promise<ConversationInitBundle>;
788
778
  /**
789
779
  * This merges the commit generated by {@link CoreCrypto.joinByExternalCommit}, persists the group permanently
790
780
  * and deletes the temporary one. This step makes the group operational and ready to encrypt/decrypt message
@@ -1144,7 +1134,6 @@ export declare class WireE2eIdentity {
1144
1134
  * Verifies that the previous challenge has been completed.
1145
1135
  *
1146
1136
  * @param orderUrl `location` header from http response you got from {@link newOrderResponse}
1147
- * @param account you found after {@link newAccountResponse}
1148
1137
  * @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/challenge/{challenge-id}`
1149
1138
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
1150
1139
  */
@@ -1160,7 +1149,6 @@ export declare class WireE2eIdentity {
1160
1149
  /**
1161
1150
  * Final step before fetching the certificate.
1162
1151
  *
1163
- * @param order - order you got from {@link checkOrderResponse}
1164
1152
  * @param previousNonce - `replay-nonce` response header from `POST /acme/{provisioner-name}/order/{order-id}`
1165
1153
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
1166
1154
  */
@@ -35,14 +35,6 @@ const heap = new Array(128).fill(undefined);
35
35
  heap.push(undefined, null, true, false);
36
36
  function getObject(idx) { return heap[idx]; }
37
37
  let heap_next = heap.length;
38
- function addHeapObject(obj) {
39
- if (heap_next === heap.length)
40
- heap.push(heap.length + 1);
41
- const idx = heap_next;
42
- heap_next = heap[idx];
43
- heap[idx] = obj;
44
- return idx;
45
- }
46
38
  function dropObject(idx) {
47
39
  if (idx < 132)
48
40
  return;
@@ -54,6 +46,14 @@ function takeObject(idx) {
54
46
  dropObject(idx);
55
47
  return ret;
56
48
  }
49
+ function addHeapObject(obj) {
50
+ if (heap_next === heap.length)
51
+ heap.push(heap.length + 1);
52
+ const idx = heap_next;
53
+ heap_next = heap[idx];
54
+ heap[idx] = obj;
55
+ return idx;
56
+ }
57
57
  const cachedTextDecoder = (typeof TextDecoder !== 'undefined' ? new TextDecoder('utf-8', { ignoreBOM: true, fatal: true }) : { decode: () => { throw Error('TextDecoder not available'); } });
58
58
  if (typeof TextDecoder !== 'undefined') {
59
59
  cachedTextDecoder.decode();
@@ -230,12 +230,12 @@ function makeMutClosure(arg0, arg1, dtor, f) {
230
230
  return real;
231
231
  }
232
232
  function __wbg_adapter_52(arg0, arg1, arg2) {
233
- wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h2c0be6d28c8e9135(arg0, arg1, addHeapObject(arg2));
233
+ wasm$1.wasm_bindgen__convert__closures__invoke1_mut__h66a7206f8c7c0090(arg0, arg1, addHeapObject(arg2));
234
234
  }
235
235
  function __wbg_adapter_55(arg0, arg1, arg2) {
236
236
  try {
237
237
  const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
238
- wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__hce3b8b280b7641eb(retptr, arg0, arg1, addHeapObject(arg2));
238
+ wasm$1.wasm_bindgen__convert__closures__invoke1_mut__hfd1454cbb6b3bfdc(retptr, arg0, arg1, addHeapObject(arg2));
239
239
  var r0 = getInt32Memory0()[retptr / 4 + 0];
240
240
  var r1 = getInt32Memory0()[retptr / 4 + 1];
241
241
  if (r1) {
@@ -299,8 +299,8 @@ function handleError(f, args) {
299
299
  wasm$1.__wbindgen_exn_store(addHeapObject(e));
300
300
  }
301
301
  }
302
- function __wbg_adapter_289(arg0, arg1, arg2, arg3) {
303
- wasm$1.wasm_bindgen__convert__closures__invoke2_mut__h120d2893b5400e83(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
302
+ function __wbg_adapter_288(arg0, arg1, arg2, arg3) {
303
+ wasm$1.wasm_bindgen__convert__closures__invoke2_mut__h6061d6c1e1d69fb6(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
304
304
  }
305
305
  /**
306
306
  * see [core_crypto::prelude::MlsWirePolicy]
@@ -563,11 +563,11 @@ class CommitBundle {
563
563
  return takeObject(ret);
564
564
  }
565
565
  /**
566
- * @returns {PublicGroupStateBundle}
566
+ * @returns {GroupInfoBundle}
567
567
  */
568
- get public_group_state() {
569
- const ret = wasm$1.commitbundle_public_group_state(this.__wbg_ptr);
570
- return PublicGroupStateBundle.__wrap(ret);
568
+ get group_info() {
569
+ const ret = wasm$1.commitbundle_group_info(this.__wbg_ptr);
570
+ return GroupInfoBundle.__wrap(ret);
571
571
  }
572
572
  }
573
573
  /**
@@ -629,11 +629,11 @@ class ConversationInitBundle {
629
629
  return takeObject(ret);
630
630
  }
631
631
  /**
632
- * @returns {PublicGroupStateBundle}
632
+ * @returns {GroupInfoBundle}
633
633
  */
634
- get public_group_state() {
635
- const ret = wasm$1.commitbundle_public_group_state(this.__wbg_ptr);
636
- return PublicGroupStateBundle.__wrap(ret);
634
+ get group_info() {
635
+ const ret = wasm$1.commitbundle_group_info(this.__wbg_ptr);
636
+ return GroupInfoBundle.__wrap(ret);
637
637
  }
638
638
  }
639
639
  /**
@@ -1151,44 +1151,27 @@ let CoreCrypto$1 = class CoreCrypto {
1151
1151
  /**
1152
1152
  * Returns: [`WasmCryptoResult<js_sys::Uint8Array>`]
1153
1153
  *
1154
- * see [core_crypto::mls::MlsCentral::new_external_remove_proposal]
1155
- * @param {Uint8Array} conversation_id
1156
- * @param {number} epoch
1157
- * @param {Uint8Array} keypackage_ref
1158
- * @returns {Promise<any>}
1159
- */
1160
- new_external_remove_proposal(conversation_id, epoch, keypackage_ref) {
1161
- const ptr0 = passArray8ToWasm0(conversation_id, wasm$1.__wbindgen_malloc);
1162
- const len0 = WASM_VECTOR_LEN;
1163
- const ptr1 = passArray8ToWasm0(keypackage_ref, wasm$1.__wbindgen_malloc);
1164
- const len1 = WASM_VECTOR_LEN;
1165
- const ret = wasm$1.corecrypto_new_external_remove_proposal(this.__wbg_ptr, ptr0, len0, epoch, ptr1, len1);
1166
- return takeObject(ret);
1167
- }
1168
- /**
1169
- * Returns: [`WasmCryptoResult<js_sys::Uint8Array>`]
1170
- *
1171
- * see [core_crypto::mls::MlsCentral::export_public_group_state]
1154
+ * see [core_crypto::mls::MlsCentral::export_group_info]
1172
1155
  * @param {Uint8Array} conversation_id
1173
1156
  * @returns {Promise<any>}
1174
1157
  */
1175
- export_group_state(conversation_id) {
1158
+ export_group_info(conversation_id) {
1176
1159
  const ptr0 = passArray8ToWasm0(conversation_id, wasm$1.__wbindgen_malloc);
1177
1160
  const len0 = WASM_VECTOR_LEN;
1178
- const ret = wasm$1.corecrypto_export_group_state(this.__wbg_ptr, ptr0, len0);
1161
+ const ret = wasm$1.corecrypto_export_group_info(this.__wbg_ptr, ptr0, len0);
1179
1162
  return takeObject(ret);
1180
1163
  }
1181
1164
  /**
1182
1165
  * Returns: [`WasmCryptoResult<ConversationInitBundle>`]
1183
1166
  *
1184
1167
  * see [core_crypto::mls::MlsCentral::join_by_external_commit]
1185
- * @param {Uint8Array} public_group_state
1168
+ * @param {Uint8Array} group_info
1186
1169
  * @param {CustomConfiguration} custom_configuration
1187
1170
  * @param {number} credential_type
1188
1171
  * @returns {Promise<any>}
1189
1172
  */
1190
- join_by_external_commit(public_group_state, custom_configuration, credential_type) {
1191
- const ptr0 = passArray8ToWasm0(public_group_state, wasm$1.__wbindgen_malloc);
1173
+ join_by_external_commit(group_info, custom_configuration, credential_type) {
1174
+ const ptr0 = passArray8ToWasm0(group_info, wasm$1.__wbindgen_malloc);
1192
1175
  const len0 = WASM_VECTOR_LEN;
1193
1176
  _assertClass(custom_configuration, CustomConfiguration);
1194
1177
  var ptr1 = custom_configuration.__destroy_into_raw();
@@ -2123,6 +2106,46 @@ class FfiWireE2EIdentity {
2123
2106
  }
2124
2107
  }
2125
2108
  /**
2109
+ */
2110
+ class GroupInfoBundle {
2111
+ static __wrap(ptr) {
2112
+ ptr = ptr >>> 0;
2113
+ const obj = Object.create(GroupInfoBundle.prototype);
2114
+ obj.__wbg_ptr = ptr;
2115
+ return obj;
2116
+ }
2117
+ __destroy_into_raw() {
2118
+ const ptr = this.__wbg_ptr;
2119
+ this.__wbg_ptr = 0;
2120
+ return ptr;
2121
+ }
2122
+ free() {
2123
+ const ptr = this.__destroy_into_raw();
2124
+ wasm$1.__wbg_groupinfobundle_free(ptr);
2125
+ }
2126
+ /**
2127
+ * @returns {number}
2128
+ */
2129
+ get encryption_type() {
2130
+ const ret = wasm$1.groupinfobundle_encryption_type(this.__wbg_ptr);
2131
+ return ret;
2132
+ }
2133
+ /**
2134
+ * @returns {number}
2135
+ */
2136
+ get ratchet_tree_type() {
2137
+ const ret = wasm$1.groupinfobundle_ratchet_tree_type(this.__wbg_ptr);
2138
+ return ret;
2139
+ }
2140
+ /**
2141
+ * @returns {Uint8Array}
2142
+ */
2143
+ get payload() {
2144
+ const ret = wasm$1.acmechallenge_delegate(this.__wbg_ptr);
2145
+ return takeObject(ret);
2146
+ }
2147
+ }
2148
+ /**
2126
2149
  * see [core_crypto::prelude::ConversationMember]
2127
2150
  */
2128
2151
  class Invitee {
@@ -2186,11 +2209,11 @@ class MemberAddedMessages {
2186
2209
  /**
2187
2210
  * @param {Uint8Array} welcome
2188
2211
  * @param {Uint8Array} commit
2189
- * @param {PublicGroupStateBundle} public_group_state
2212
+ * @param {GroupInfoBundle} group_info
2190
2213
  */
2191
- constructor(welcome, commit, public_group_state) {
2192
- _assertClass(public_group_state, PublicGroupStateBundle);
2193
- var ptr0 = public_group_state.__destroy_into_raw();
2214
+ constructor(welcome, commit, group_info) {
2215
+ _assertClass(group_info, GroupInfoBundle);
2216
+ var ptr0 = group_info.__destroy_into_raw();
2194
2217
  const ret = wasm$1.memberaddedmessages_new(addHeapObject(welcome), addHeapObject(commit), ptr0);
2195
2218
  return MemberAddedMessages.__wrap(ret);
2196
2219
  }
@@ -2209,11 +2232,11 @@ class MemberAddedMessages {
2209
2232
  return takeObject(ret);
2210
2233
  }
2211
2234
  /**
2212
- * @returns {PublicGroupStateBundle}
2235
+ * @returns {GroupInfoBundle}
2213
2236
  */
2214
- get public_group_state() {
2215
- const ret = wasm$1.commitbundle_public_group_state(this.__wbg_ptr);
2216
- return PublicGroupStateBundle.__wrap(ret);
2237
+ get group_info() {
2238
+ const ret = wasm$1.commitbundle_group_info(this.__wbg_ptr);
2239
+ return GroupInfoBundle.__wrap(ret);
2217
2240
  }
2218
2241
  }
2219
2242
  /**
@@ -2426,46 +2449,6 @@ class ProteusAutoPrekeyBundle {
2426
2449
  }
2427
2450
  }
2428
2451
  /**
2429
- */
2430
- class PublicGroupStateBundle {
2431
- static __wrap(ptr) {
2432
- ptr = ptr >>> 0;
2433
- const obj = Object.create(PublicGroupStateBundle.prototype);
2434
- obj.__wbg_ptr = ptr;
2435
- return obj;
2436
- }
2437
- __destroy_into_raw() {
2438
- const ptr = this.__wbg_ptr;
2439
- this.__wbg_ptr = 0;
2440
- return ptr;
2441
- }
2442
- free() {
2443
- const ptr = this.__destroy_into_raw();
2444
- wasm$1.__wbg_publicgroupstatebundle_free(ptr);
2445
- }
2446
- /**
2447
- * @returns {number}
2448
- */
2449
- get encryption_type() {
2450
- const ret = wasm$1.publicgroupstatebundle_encryption_type(this.__wbg_ptr);
2451
- return ret;
2452
- }
2453
- /**
2454
- * @returns {number}
2455
- */
2456
- get ratchet_tree_type() {
2457
- const ret = wasm$1.publicgroupstatebundle_ratchet_tree_type(this.__wbg_ptr);
2458
- return ret;
2459
- }
2460
- /**
2461
- * @returns {Uint8Array}
2462
- */
2463
- get payload() {
2464
- const ret = wasm$1.acmechallenge_delegate(this.__wbg_ptr);
2465
- return takeObject(ret);
2466
- }
2467
- }
2468
- /**
2469
2452
  * see [core_crypto::prelude::WireIdentity]
2470
2453
  */
2471
2454
  class WireIdentity {
@@ -2614,6 +2597,9 @@ async function __wbg_load(module, imports) {
2614
2597
  function __wbg_get_imports() {
2615
2598
  const imports = {};
2616
2599
  imports.wbg = {};
2600
+ imports.wbg.__wbindgen_object_drop_ref = function (arg0) {
2601
+ takeObject(arg0);
2602
+ };
2617
2603
  imports.wbg.__wbindgen_object_clone_ref = function (arg0) {
2618
2604
  const ret = getObject(arg0);
2619
2605
  return addHeapObject(ret);
@@ -2623,9 +2609,6 @@ function __wbg_get_imports() {
2623
2609
  const ret = typeof (val) === 'object' && val !== null;
2624
2610
  return ret;
2625
2611
  };
2626
- imports.wbg.__wbindgen_object_drop_ref = function (arg0) {
2627
- takeObject(arg0);
2628
- };
2629
2612
  imports.wbg.__wbg_getwithrefkey_5e6d9547403deab8 = function (arg0, arg1) {
2630
2613
  const ret = getObject(arg0)[getObject(arg1)];
2631
2614
  return addHeapObject(ret);
@@ -2638,6 +2621,12 @@ function __wbg_get_imports() {
2638
2621
  const ret = getObject(arg0) in getObject(arg1);
2639
2622
  return ret;
2640
2623
  };
2624
+ imports.wbg.__wbg_objectStore_6eb812526333c917 = function () {
2625
+ return handleError(function (arg0, arg1, arg2) {
2626
+ const ret = getObject(arg0).objectStore(getStringFromWasm0(arg1, arg2));
2627
+ return addHeapObject(ret);
2628
+ }, arguments);
2629
+ };
2641
2630
  imports.wbg.__wbg_objectStoreNames_432a9424fbdfefda = function (arg0) {
2642
2631
  const ret = getObject(arg0).objectStoreNames;
2643
2632
  return addHeapObject(ret);
@@ -2650,6 +2639,12 @@ function __wbg_get_imports() {
2650
2639
  const ret = getStringFromWasm0(arg0, arg1);
2651
2640
  return addHeapObject(ret);
2652
2641
  };
2642
+ imports.wbg.__wbg_get_a9b507527c0f6958 = function () {
2643
+ return handleError(function (arg0, arg1) {
2644
+ const ret = getObject(arg0).get(getObject(arg1));
2645
+ return addHeapObject(ret);
2646
+ }, arguments);
2647
+ };
2653
2648
  imports.wbg.__wbindgen_is_null = function (arg0) {
2654
2649
  const ret = getObject(arg0) === null;
2655
2650
  return ret;
@@ -2672,8 +2667,8 @@ function __wbg_get_imports() {
2672
2667
  return addHeapObject(ret);
2673
2668
  }, arguments);
2674
2669
  };
2675
- imports.wbg.__wbindgen_number_new = function (arg0) {
2676
- const ret = arg0;
2670
+ imports.wbg.__wbindgen_bigint_from_u64 = function (arg0) {
2671
+ const ret = BigInt.asUintN(64, arg0);
2677
2672
  return addHeapObject(ret);
2678
2673
  };
2679
2674
  imports.wbg.__wbg_new_2b55e405e4af4986 = function (arg0, arg1) {
@@ -2683,7 +2678,7 @@ function __wbg_get_imports() {
2683
2678
  const a = state0.a;
2684
2679
  state0.a = 0;
2685
2680
  try {
2686
- return __wbg_adapter_289(a, state0.b, arg0, arg1);
2681
+ return __wbg_adapter_288(a, state0.b, arg0, arg1);
2687
2682
  }
2688
2683
  finally {
2689
2684
  state0.a = a;
@@ -2700,6 +2695,10 @@ function __wbg_get_imports() {
2700
2695
  const ret = new Uint8Array(getObject(arg0));
2701
2696
  return addHeapObject(ret);
2702
2697
  };
2698
+ imports.wbg.__wbg_proteusautoprekeybundle_new = function (arg0) {
2699
+ const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
2700
+ return addHeapObject(ret);
2701
+ };
2703
2702
  imports.wbg.__wbg_new_0394642eae39db16 = function () {
2704
2703
  const ret = new Array();
2705
2704
  return addHeapObject(ret);
@@ -2708,33 +2707,47 @@ function __wbg_get_imports() {
2708
2707
  const ret = getObject(arg0).push(getObject(arg1));
2709
2708
  return ret;
2710
2709
  };
2711
- imports.wbg.__wbg_new_0f2b71ca2f2a6029 = function () {
2712
- const ret = new Map();
2710
+ imports.wbg.__wbg_new_2b6fea4ea03b1b95 = function () {
2711
+ const ret = new Object();
2713
2712
  return addHeapObject(ret);
2714
2713
  };
2715
- imports.wbg.__wbg_set_da7be7bf0e037b14 = function (arg0, arg1, arg2) {
2716
- const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
2714
+ imports.wbg.__wbg_ffiwiree2eidentity_new = function (arg0) {
2715
+ const ret = FfiWireE2EIdentity.__wrap(arg0);
2717
2716
  return addHeapObject(ret);
2718
2717
  };
2719
- imports.wbg.__wbindgen_bigint_from_u64 = function (arg0) {
2720
- const ret = BigInt.asUintN(64, arg0);
2718
+ imports.wbg.__wbg_set_b4da98d504ac6091 = function (arg0, arg1, arg2) {
2719
+ getObject(arg0)[arg1 >>> 0] = takeObject(arg2);
2720
+ };
2721
+ imports.wbg.__wbg_set_841ac57cff3d672b = function (arg0, arg1, arg2) {
2722
+ getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
2723
+ };
2724
+ imports.wbg.__wbindgen_number_new = function (arg0) {
2725
+ const ret = arg0;
2721
2726
  return addHeapObject(ret);
2722
2727
  };
2723
- imports.wbg.__wbg_new_2b6fea4ea03b1b95 = function () {
2724
- const ret = new Object();
2728
+ imports.wbg.__wbg_new_0f2b71ca2f2a6029 = function () {
2729
+ const ret = new Map();
2725
2730
  return addHeapObject(ret);
2726
2731
  };
2727
- imports.wbg.__wbg_proteusautoprekeybundle_new = function (arg0) {
2728
- const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
2732
+ imports.wbg.__wbg_set_da7be7bf0e037b14 = function (arg0, arg1, arg2) {
2733
+ const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
2729
2734
  return addHeapObject(ret);
2730
2735
  };
2731
2736
  imports.wbg.__wbg_new_87297f22973157c8 = function (arg0, arg1) {
2732
2737
  const ret = new Error(getStringFromWasm0(arg0, arg1));
2733
2738
  return addHeapObject(ret);
2734
2739
  };
2735
- imports.wbg.__wbg_ffiwiree2eidentity_new = function (arg0) {
2736
- const ret = FfiWireE2EIdentity.__wrap(arg0);
2737
- return addHeapObject(ret);
2740
+ imports.wbg.__wbg_openCursor_63250aa904924858 = function () {
2741
+ return handleError(function (arg0, arg1) {
2742
+ const ret = getObject(arg0).openCursor(getObject(arg1));
2743
+ return addHeapObject(ret);
2744
+ }, arguments);
2745
+ };
2746
+ imports.wbg.__wbg_openCursor_2da32f6b7767a8f6 = function () {
2747
+ return handleError(function (arg0) {
2748
+ const ret = getObject(arg0).openCursor();
2749
+ return addHeapObject(ret);
2750
+ }, arguments);
2738
2751
  };
2739
2752
  imports.wbg.__wbg_setonsuccess_d668ac71ae816a35 = function (arg0, arg1) {
2740
2753
  getObject(arg0).onsuccess = getObject(arg1);
@@ -2796,9 +2809,6 @@ function __wbg_get_imports() {
2796
2809
  const ret = CoreCrypto$1.__wrap(arg0);
2797
2810
  return addHeapObject(ret);
2798
2811
  };
2799
- imports.wbg.__wbg_set_841ac57cff3d672b = function (arg0, arg1, arg2) {
2800
- getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
2801
- };
2802
2812
  imports.wbg.__wbg_instanceof_Promise_4b9b76dc9c35f96e = function (arg0) {
2803
2813
  let result;
2804
2814
  try {
@@ -2847,9 +2857,6 @@ function __wbg_get_imports() {
2847
2857
  const ret = Promise.reject(getObject(arg0));
2848
2858
  return addHeapObject(ret);
2849
2859
  };
2850
- imports.wbg.__wbg_set_b4da98d504ac6091 = function (arg0, arg1, arg2) {
2851
- getObject(arg0)[arg1 >>> 0] = takeObject(arg2);
2852
- };
2853
2860
  imports.wbg.__wbg_proposalbundle_new = function (arg0) {
2854
2861
  const ret = ProposalBundle.__wrap(arg0);
2855
2862
  return addHeapObject(ret);
@@ -2951,12 +2958,6 @@ function __wbg_get_imports() {
2951
2958
  return addHeapObject(ret);
2952
2959
  }, arguments);
2953
2960
  };
2954
- imports.wbg.__wbg_openCursor_9f2ba6afb4885925 = function () {
2955
- return handleError(function (arg0, arg1) {
2956
- const ret = getObject(arg0).openCursor(getObject(arg1));
2957
- return addHeapObject(ret);
2958
- }, arguments);
2959
- };
2960
2961
  imports.wbg.__wbindgen_memory = function () {
2961
2962
  const ret = wasm$1.memory;
2962
2963
  return addHeapObject(ret);
@@ -2969,7 +2970,7 @@ function __wbg_get_imports() {
2969
2970
  const ret = new Uint8Array(getObject(arg0), arg1 >>> 0, arg2 >>> 0);
2970
2971
  return addHeapObject(ret);
2971
2972
  };
2972
- imports.wbg.__wbg_randomFillSync_e950366c42764a07 = function () {
2973
+ imports.wbg.__wbg_randomFillSync_dc1e9a60c158336d = function () {
2973
2974
  return handleError(function (arg0, arg1) {
2974
2975
  getObject(arg0).randomFillSync(takeObject(arg1));
2975
2976
  }, arguments);
@@ -2978,24 +2979,24 @@ function __wbg_get_imports() {
2978
2979
  const ret = getObject(arg0).subarray(arg1 >>> 0, arg2 >>> 0);
2979
2980
  return addHeapObject(ret);
2980
2981
  };
2981
- imports.wbg.__wbg_getRandomValues_3774744e221a22ad = function () {
2982
+ imports.wbg.__wbg_getRandomValues_37fa2ca9e4e07fab = function () {
2982
2983
  return handleError(function (arg0, arg1) {
2983
2984
  getObject(arg0).getRandomValues(getObject(arg1));
2984
2985
  }, arguments);
2985
2986
  };
2986
- imports.wbg.__wbg_crypto_70a96de3b6b73dac = function (arg0) {
2987
+ imports.wbg.__wbg_crypto_c48a774b022d20ac = function (arg0) {
2987
2988
  const ret = getObject(arg0).crypto;
2988
2989
  return addHeapObject(ret);
2989
2990
  };
2990
- imports.wbg.__wbg_process_dd1577445152112e = function (arg0) {
2991
+ imports.wbg.__wbg_process_298734cf255a885d = function (arg0) {
2991
2992
  const ret = getObject(arg0).process;
2992
2993
  return addHeapObject(ret);
2993
2994
  };
2994
- imports.wbg.__wbg_versions_58036bec3add9e6f = function (arg0) {
2995
+ imports.wbg.__wbg_versions_e2e78e134e3e5d01 = function (arg0) {
2995
2996
  const ret = getObject(arg0).versions;
2996
2997
  return addHeapObject(ret);
2997
2998
  };
2998
- imports.wbg.__wbg_node_6a9d28205ed5b0d8 = function (arg0) {
2999
+ imports.wbg.__wbg_node_1cd7a5d853dbea79 = function (arg0) {
2999
3000
  const ret = getObject(arg0).node;
3000
3001
  return addHeapObject(ret);
3001
3002
  };
@@ -3003,7 +3004,7 @@ function __wbg_get_imports() {
3003
3004
  const ret = typeof (getObject(arg0)) === 'string';
3004
3005
  return ret;
3005
3006
  };
3006
- imports.wbg.__wbg_require_f05d779769764e82 = function () {
3007
+ imports.wbg.__wbg_require_8f08ceecec0f4fee = function () {
3007
3008
  return handleError(function () {
3008
3009
  const ret = module.require;
3009
3010
  return addHeapObject(ret);
@@ -3013,7 +3014,7 @@ function __wbg_get_imports() {
3013
3014
  const ret = typeof (getObject(arg0)) === 'function';
3014
3015
  return ret;
3015
3016
  };
3016
- imports.wbg.__wbg_msCrypto_adbc770ec9eca9c7 = function (arg0) {
3017
+ imports.wbg.__wbg_msCrypto_bcb970640f50a1e8 = function (arg0) {
3017
3018
  const ret = getObject(arg0).msCrypto;
3018
3019
  return addHeapObject(ret);
3019
3020
  };
@@ -3094,12 +3095,6 @@ function __wbg_get_imports() {
3094
3095
  const ret = getObject(arg0).target;
3095
3096
  return isLikeNone(ret) ? 0 : addHeapObject(ret);
3096
3097
  };
3097
- imports.wbg.__wbg_error_a16f2288166003c0 = function () {
3098
- return handleError(function (arg0) {
3099
- const ret = getObject(arg0).error;
3100
- return isLikeNone(ret) ? 0 : addHeapObject(ret);
3101
- }, arguments);
3102
- };
3103
3098
  imports.wbg.__wbg_result_fcdf1e20f03fa375 = function () {
3104
3099
  return handleError(function (arg0) {
3105
3100
  const ret = getObject(arg0).result;
@@ -3140,6 +3135,12 @@ function __wbg_get_imports() {
3140
3135
  getObject(arg0).deleteObjectStore(getStringFromWasm0(arg1, arg2));
3141
3136
  }, arguments);
3142
3137
  };
3138
+ imports.wbg.__wbg_error_a16f2288166003c0 = function () {
3139
+ return handleError(function (arg0) {
3140
+ const ret = getObject(arg0).error;
3141
+ return isLikeNone(ret) ? 0 : addHeapObject(ret);
3142
+ }, arguments);
3143
+ };
3143
3144
  imports.wbg.__wbindgen_is_falsy = function (arg0) {
3144
3145
  const ret = !getObject(arg0);
3145
3146
  return ret;
@@ -3262,54 +3263,18 @@ function __wbg_get_imports() {
3262
3263
  return addHeapObject(ret);
3263
3264
  }, arguments);
3264
3265
  };
3265
- imports.wbg.__wbg_openCursor_5d4f2d7a9e60117c = function () {
3266
- return handleError(function (arg0) {
3267
- const ret = getObject(arg0).openCursor();
3268
- return addHeapObject(ret);
3269
- }, arguments);
3270
- };
3271
- imports.wbg.__wbg_openCursor_88c75b521e6a6818 = function () {
3272
- return handleError(function (arg0, arg1, arg2) {
3273
- const ret = getObject(arg0).openCursor(getObject(arg1), takeObject(arg2));
3274
- return addHeapObject(ret);
3275
- }, arguments);
3276
- };
3277
- imports.wbg.__wbg_get_a9b507527c0f6958 = function () {
3278
- return handleError(function (arg0, arg1) {
3279
- const ret = getObject(arg0).get(getObject(arg1));
3280
- return addHeapObject(ret);
3281
- }, arguments);
3282
- };
3283
- imports.wbg.__wbg_openCursor_2da32f6b7767a8f6 = function () {
3284
- return handleError(function (arg0) {
3285
- const ret = getObject(arg0).openCursor();
3286
- return addHeapObject(ret);
3287
- }, arguments);
3288
- };
3289
- imports.wbg.__wbg_openCursor_63250aa904924858 = function () {
3290
- return handleError(function (arg0, arg1) {
3291
- const ret = getObject(arg0).openCursor(getObject(arg1));
3292
- return addHeapObject(ret);
3293
- }, arguments);
3294
- };
3295
3266
  imports.wbg.__wbg_openCursor_4a2cac5b1c5cf36b = function () {
3296
3267
  return handleError(function (arg0, arg1, arg2) {
3297
3268
  const ret = getObject(arg0).openCursor(getObject(arg1), takeObject(arg2));
3298
3269
  return addHeapObject(ret);
3299
3270
  }, arguments);
3300
3271
  };
3301
- imports.wbg.__wbg_objectStore_6eb812526333c917 = function () {
3302
- return handleError(function (arg0, arg1, arg2) {
3303
- const ret = getObject(arg0).objectStore(getStringFromWasm0(arg1, arg2));
3304
- return addHeapObject(ret);
3305
- }, arguments);
3306
- };
3307
- imports.wbg.__wbindgen_closure_wrapper1651 = function (arg0, arg1, arg2) {
3308
- const ret = makeMutClosure(arg0, arg1, 160, __wbg_adapter_52);
3272
+ imports.wbg.__wbindgen_closure_wrapper1899 = function (arg0, arg1, arg2) {
3273
+ const ret = makeMutClosure(arg0, arg1, 158, __wbg_adapter_52);
3309
3274
  return addHeapObject(ret);
3310
3275
  };
3311
- imports.wbg.__wbindgen_closure_wrapper4775 = function (arg0, arg1, arg2) {
3312
- const ret = makeMutClosure(arg0, arg1, 160, __wbg_adapter_55);
3276
+ imports.wbg.__wbindgen_closure_wrapper4477 = function (arg0, arg1, arg2) {
3277
+ const ret = makeMutClosure(arg0, arg1, 158, __wbg_adapter_55);
3313
3278
  return addHeapObject(ret);
3314
3279
  };
3315
3280
  return imports;
@@ -3360,13 +3325,13 @@ var exports = /*#__PURE__*/Object.freeze({
3360
3325
  CustomConfiguration: CustomConfiguration,
3361
3326
  DecryptedMessage: DecryptedMessage,
3362
3327
  FfiWireE2EIdentity: FfiWireE2EIdentity,
3328
+ GroupInfoBundle: GroupInfoBundle,
3363
3329
  Invitee: Invitee,
3364
3330
  MemberAddedMessages: MemberAddedMessages,
3365
3331
  NewAcmeAuthz: NewAcmeAuthz,
3366
3332
  NewAcmeOrder: NewAcmeOrder,
3367
3333
  ProposalBundle: ProposalBundle,
3368
3334
  ProteusAutoPrekeyBundle: ProteusAutoPrekeyBundle,
3369
- PublicGroupStateBundle: PublicGroupStateBundle,
3370
3335
  WireIdentity: WireIdentity,
3371
3336
  WirePolicy: WirePolicy$1,
3372
3337
  default: __wbg_init,
@@ -3376,7 +3341,7 @@ var exports = /*#__PURE__*/Object.freeze({
3376
3341
  var wasm = async (opt = {}) => {
3377
3342
  let {importHook, serverPath} = opt;
3378
3343
 
3379
- let path = "assets/core_crypto_ffi-7b1dbee8.wasm";
3344
+ let path = "assets/core_crypto_ffi-8052e3ff.wasm";
3380
3345
 
3381
3346
  if (serverPath != null) {
3382
3347
  path = serverPath + /[^\/\\]*$/.exec(path)[0];
@@ -3511,28 +3476,28 @@ var WirePolicy;
3511
3476
  WirePolicy[WirePolicy["Ciphertext"] = 2] = "Ciphertext";
3512
3477
  })(WirePolicy || (WirePolicy = {}));
3513
3478
  /**
3514
- * Informs whether the PublicGroupState is confidential
3515
- * see [core_crypto::mls::conversation::public_group_state::PublicGroupStateEncryptionType]
3479
+ * Informs whether the GroupInfo is confidential
3480
+ * see [core_crypto::mls::conversation::group_info::GroupInfoEncryptionType]
3516
3481
  */
3517
- var PublicGroupStateEncryptionType;
3518
- (function (PublicGroupStateEncryptionType) {
3482
+ var GroupInfoEncryptionType;
3483
+ (function (GroupInfoEncryptionType) {
3519
3484
  /**
3520
3485
  * Unencrypted
3521
3486
  */
3522
- PublicGroupStateEncryptionType[PublicGroupStateEncryptionType["Plaintext"] = 1] = "Plaintext";
3487
+ GroupInfoEncryptionType[GroupInfoEncryptionType["Plaintext"] = 1] = "Plaintext";
3523
3488
  /**
3524
3489
  * Encrypted in a JWE (not yet implemented)
3525
3490
  */
3526
- PublicGroupStateEncryptionType[PublicGroupStateEncryptionType["JweEncrypted"] = 2] = "JweEncrypted";
3527
- })(PublicGroupStateEncryptionType || (PublicGroupStateEncryptionType = {}));
3491
+ GroupInfoEncryptionType[GroupInfoEncryptionType["JweEncrypted"] = 2] = "JweEncrypted";
3492
+ })(GroupInfoEncryptionType || (GroupInfoEncryptionType = {}));
3528
3493
  /**
3529
3494
  * Represents different ways of carrying the Ratchet Tree with some optimizations to save some space
3530
- * see [core_crypto::mls::conversation::public_group_state::RatchetTreeType]
3495
+ * see [core_crypto::mls::conversation::group_info::RatchetTreeType]
3531
3496
  */
3532
3497
  var RatchetTreeType;
3533
3498
  (function (RatchetTreeType) {
3534
3499
  /**
3535
- * Complete PublicGroupState
3500
+ * Complete GroupInfo
3536
3501
  */
3537
3502
  RatchetTreeType[RatchetTreeType["Full"] = 1] = "Full";
3538
3503
  /**
@@ -3571,10 +3536,6 @@ var ExternalProposalType;
3571
3536
  * This allows to propose the addition of other clients to the MLS group/conversation
3572
3537
  */
3573
3538
  ExternalProposalType[ExternalProposalType["Add"] = 0] = "Add";
3574
- /**
3575
- * This allows to propose the removal of clients from the MLS group/conversation
3576
- */
3577
- ExternalProposalType[ExternalProposalType["Remove"] = 1] = "Remove";
3578
3539
  })(ExternalProposalType || (ExternalProposalType = {}));
3579
3540
  /**
3580
3541
  * Wrapper for the WASM-compiled version of CoreCrypto
@@ -3895,14 +3856,14 @@ class CoreCrypto {
3895
3856
  const ffiClients = clients.map((invitee) => new (__classPrivateFieldGet(CoreCrypto, _a, "f", _CoreCrypto_module).Invitee)(invitee.id, invitee.kp));
3896
3857
  const ffiRet = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").add_clients_to_conversation(conversationId, ffiClients));
3897
3858
  ffiClients.forEach(c => c.free());
3898
- const pgs = ffiRet.public_group_state;
3859
+ const gi = ffiRet.group_info;
3899
3860
  const ret = {
3900
3861
  welcome: ffiRet.welcome,
3901
3862
  commit: ffiRet.commit,
3902
- publicGroupState: {
3903
- encryptionType: pgs.encryption_type,
3904
- ratchetTreeType: pgs.ratchet_tree_type,
3905
- payload: pgs.payload
3863
+ groupInfo: {
3864
+ encryptionType: gi.encryption_type,
3865
+ ratchetTreeType: gi.ratchet_tree_type,
3866
+ payload: gi.payload
3906
3867
  },
3907
3868
  };
3908
3869
  return ret;
@@ -3927,14 +3888,14 @@ class CoreCrypto {
3927
3888
  async removeClientsFromConversation(conversationId, clientIds) {
3928
3889
  try {
3929
3890
  const ffiRet = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").remove_clients_from_conversation(conversationId, clientIds));
3930
- const pgs = ffiRet.public_group_state;
3891
+ const gi = ffiRet.group_info;
3931
3892
  const ret = {
3932
3893
  welcome: ffiRet.welcome,
3933
3894
  commit: ffiRet.commit,
3934
- publicGroupState: {
3935
- encryptionType: pgs.encryption_type,
3936
- ratchetTreeType: pgs.ratchet_tree_type,
3937
- payload: pgs.payload
3895
+ groupInfo: {
3896
+ encryptionType: gi.encryption_type,
3897
+ ratchetTreeType: gi.ratchet_tree_type,
3898
+ payload: gi.payload
3938
3899
  },
3939
3900
  };
3940
3901
  return ret;
@@ -3957,14 +3918,14 @@ class CoreCrypto {
3957
3918
  async updateKeyingMaterial(conversationId) {
3958
3919
  try {
3959
3920
  const ffiRet = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").update_keying_material(conversationId));
3960
- const pgs = ffiRet.public_group_state;
3921
+ const gi = ffiRet.group_info;
3961
3922
  const ret = {
3962
3923
  welcome: ffiRet.welcome,
3963
3924
  commit: ffiRet.commit,
3964
- publicGroupState: {
3965
- encryptionType: pgs.encryption_type,
3966
- ratchetTreeType: pgs.ratchet_tree_type,
3967
- payload: pgs.payload
3925
+ groupInfo: {
3926
+ encryptionType: gi.encryption_type,
3927
+ ratchetTreeType: gi.ratchet_tree_type,
3928
+ payload: gi.payload
3968
3929
  },
3969
3930
  };
3970
3931
  return ret;
@@ -3990,14 +3951,14 @@ class CoreCrypto {
3990
3951
  if (!ffiCommitBundle) {
3991
3952
  return undefined;
3992
3953
  }
3993
- const pgs = ffiCommitBundle.public_group_state;
3954
+ const gi = ffiCommitBundle.group_info;
3994
3955
  return {
3995
3956
  welcome: ffiCommitBundle.welcome,
3996
3957
  commit: ffiCommitBundle.commit,
3997
- publicGroupState: {
3998
- encryptionType: pgs.encryption_type,
3999
- ratchetTreeType: pgs.ratchet_tree_type,
4000
- payload: pgs.payload
3958
+ groupInfo: {
3959
+ encryptionType: gi.encryption_type,
3960
+ ratchetTreeType: gi.ratchet_tree_type,
3961
+ payload: gi.payload
4001
3962
  },
4002
3963
  };
4003
3964
  }
@@ -4040,27 +4001,21 @@ class CoreCrypto {
4040
4001
  let addArgs = args;
4041
4002
  return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").new_external_add_proposal(args.conversationId, args.epoch, addArgs.ciphersuite, addArgs.credentialType));
4042
4003
  }
4043
- case ExternalProposalType.Remove: {
4044
- if (!args.keyPackageRef) {
4045
- throw new Error("keyPackageRef is not contained in the external proposal arguments");
4046
- }
4047
- return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").new_external_remove_proposal(args.conversationId, args.epoch, args.keyPackageRef));
4048
- }
4049
4004
  default:
4050
4005
  throw new Error("Invalid external proposal type!");
4051
4006
  }
4052
4007
  }
4053
4008
  /**
4054
- * Exports public group state for use in external commits
4009
+ * Exports GroupInfo for use in external commits
4055
4010
  *
4056
4011
  * @param conversationId - MLS Conversation ID
4057
- * @returns TLS-serialized MLS public group state
4012
+ * @returns TLS-serialized MLS GroupInfo
4058
4013
  */
4059
- async exportGroupState(conversationId) {
4060
- return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").export_group_state(conversationId));
4014
+ async exportGroupInfo(conversationId) {
4015
+ return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").export_group_info(conversationId));
4061
4016
  }
4062
4017
  /**
4063
- * Allows to create an external commit to "apply" to join a group through its public group state.
4018
+ * Allows to create an external commit to "apply" to join a group through its GroupInfo.
4064
4019
  *
4065
4020
  * If the Delivery Service accepts the external commit, you have to {@link CoreCrypto.mergePendingGroupFromExternalCommit}
4066
4021
  * in order to get back a functional MLS group. On the opposite, if it rejects it, you can either retry by just
@@ -4069,26 +4024,26 @@ class CoreCrypto {
4069
4024
  * {@link CoreCrypto.clearPendingGroupFromExternalCommit} in order not to bloat the user's storage but nothing
4070
4025
  * bad can happen if you forget to except some storage space wasted.
4071
4026
  *
4072
- * @param publicGroupState - a TLS encoded PublicGroupState fetched from the Delivery Service
4027
+ * @param groupInfo - a TLS encoded GroupInfo fetched from the Delivery Service
4073
4028
  * @param credentialType - kind of Credential to use for joining this group. If {@link CredentialType.Basic} is
4074
4029
  * chosen and no Credential has been created yet for it, a new one will be generated.
4075
4030
  * @param configuration - configuration of the MLS group
4076
4031
  * When {@link CredentialType.X509} is chosen, it fails when no Credential has been created for the given {@link Ciphersuite}.
4077
4032
  * @returns see {@link ConversationInitBundle}
4078
4033
  */
4079
- async joinByExternalCommit(publicGroupState, credentialType, configuration = {}) {
4034
+ async joinByExternalCommit(groupInfo, credentialType, configuration = {}) {
4080
4035
  try {
4081
4036
  const { keyRotationSpan, wirePolicy } = configuration || {};
4082
4037
  const config = new (__classPrivateFieldGet(CoreCrypto, _a, "f", _CoreCrypto_module).CustomConfiguration)(keyRotationSpan, wirePolicy);
4083
- const ffiInitMessage = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").join_by_external_commit(publicGroupState, config, credentialType));
4084
- const pgs = ffiInitMessage.public_group_state;
4038
+ const ffiInitMessage = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").join_by_external_commit(groupInfo, config, credentialType));
4039
+ const gi = ffiInitMessage.group_info;
4085
4040
  const ret = {
4086
4041
  conversationId: ffiInitMessage.conversation_id,
4087
4042
  commit: ffiInitMessage.commit,
4088
- publicGroupState: {
4089
- encryptionType: pgs.encryption_type,
4090
- ratchetTreeType: pgs.ratchet_tree_type,
4091
- payload: pgs.payload
4043
+ groupInfo: {
4044
+ encryptionType: gi.encryption_type,
4045
+ ratchetTreeType: gi.ratchet_tree_type,
4046
+ payload: gi.payload
4092
4047
  },
4093
4048
  };
4094
4049
  return ret;
@@ -4626,7 +4581,6 @@ class WireE2eIdentity {
4626
4581
  * Verifies that the previous challenge has been completed.
4627
4582
  *
4628
4583
  * @param orderUrl `location` header from http response you got from {@link newOrderResponse}
4629
- * @param account you found after {@link newAccountResponse}
4630
4584
  * @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/challenge/{challenge-id}`
4631
4585
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
4632
4586
  */
@@ -4656,7 +4610,6 @@ class WireE2eIdentity {
4656
4610
  /**
4657
4611
  * Final step before fetching the certificate.
4658
4612
  *
4659
- * @param order - order you got from {@link checkOrderResponse}
4660
4613
  * @param previousNonce - `replay-nonce` response header from `POST /acme/{provisioner-name}/order/{order-id}`
4661
4614
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
4662
4615
  */
@@ -4700,4 +4653,4 @@ class WireE2eIdentity {
4700
4653
  }
4701
4654
  _WireE2eIdentity_e2ei = new WeakMap();
4702
4655
 
4703
- export { Ciphersuite, CoreCrypto, CoreCryptoError, CredentialType, ExternalProposalType, ProposalType, PublicGroupStateEncryptionType, RatchetTreeType, WireE2eIdentity, WirePolicy };
4656
+ export { Ciphersuite, CoreCrypto, CoreCryptoError, CredentialType, ExternalProposalType, GroupInfoEncryptionType, ProposalType, RatchetTreeType, WireE2eIdentity, WirePolicy };