@wireapp/core-crypto 0.6.0-rc.3 → 0.6.0-rc.4
Sign up to get free protection for your applications and to get access to all the features.
@@ -252,7 +252,7 @@ function makeMutClosure(arg0, arg1, dtor, f) {
|
|
252
252
|
function __wbg_adapter_52(arg0, arg1, arg2) {
|
253
253
|
try {
|
254
254
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
255
|
-
wasm$1.
|
255
|
+
wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h577395c5a39b7036(retptr, arg0, arg1, addHeapObject(arg2));
|
256
256
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
257
257
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
258
258
|
if (r1) {
|
@@ -264,31 +264,7 @@ function __wbg_adapter_52(arg0, arg1, arg2) {
|
|
264
264
|
}
|
265
265
|
|
266
266
|
function __wbg_adapter_55(arg0, arg1, arg2) {
|
267
|
-
wasm$1.
|
268
|
-
}
|
269
|
-
|
270
|
-
/**
|
271
|
-
* Returns the current version of CoreCrypto
|
272
|
-
* @returns {string}
|
273
|
-
*/
|
274
|
-
function version() {
|
275
|
-
try {
|
276
|
-
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
277
|
-
wasm$1.version(retptr);
|
278
|
-
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
279
|
-
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
280
|
-
return getStringFromWasm0(r0, r1);
|
281
|
-
} finally {
|
282
|
-
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
283
|
-
wasm$1.__wbindgen_free(r0, r1);
|
284
|
-
}
|
285
|
-
}
|
286
|
-
|
287
|
-
function passArray8ToWasm0(arg, malloc) {
|
288
|
-
const ptr = malloc(arg.length * 1);
|
289
|
-
getUint8Memory0().set(arg, ptr / 1);
|
290
|
-
WASM_VECTOR_LEN = arg.length;
|
291
|
-
return ptr;
|
267
|
+
wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h6fecff61d3f85de1(arg0, arg1, addHeapObject(arg2));
|
292
268
|
}
|
293
269
|
|
294
270
|
function _assertClass(instance, klass) {
|
@@ -317,6 +293,39 @@ function passArrayJsValueToWasm0(array, malloc) {
|
|
317
293
|
return ptr;
|
318
294
|
}
|
319
295
|
|
296
|
+
function passArray8ToWasm0(arg, malloc) {
|
297
|
+
const ptr = malloc(arg.length * 1);
|
298
|
+
getUint8Memory0().set(arg, ptr / 1);
|
299
|
+
WASM_VECTOR_LEN = arg.length;
|
300
|
+
return ptr;
|
301
|
+
}
|
302
|
+
|
303
|
+
function getArrayJsValueFromWasm0(ptr, len) {
|
304
|
+
const mem = getUint32Memory0();
|
305
|
+
const slice = mem.subarray(ptr / 4, ptr / 4 + len);
|
306
|
+
const result = [];
|
307
|
+
for (let i = 0; i < slice.length; i++) {
|
308
|
+
result.push(takeObject(slice[i]));
|
309
|
+
}
|
310
|
+
return result;
|
311
|
+
}
|
312
|
+
/**
|
313
|
+
* Returns the current version of CoreCrypto
|
314
|
+
* @returns {string}
|
315
|
+
*/
|
316
|
+
function version() {
|
317
|
+
try {
|
318
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
319
|
+
wasm$1.version(retptr);
|
320
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
321
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
322
|
+
return getStringFromWasm0(r0, r1);
|
323
|
+
} finally {
|
324
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
325
|
+
wasm$1.__wbindgen_free(r0, r1);
|
326
|
+
}
|
327
|
+
}
|
328
|
+
|
320
329
|
function handleError(f, args) {
|
321
330
|
try {
|
322
331
|
return f.apply(this, args);
|
@@ -328,8 +337,8 @@ function handleError(f, args) {
|
|
328
337
|
function getArrayU8FromWasm0(ptr, len) {
|
329
338
|
return getUint8Memory0().subarray(ptr / 1, ptr / 1 + len);
|
330
339
|
}
|
331
|
-
function
|
332
|
-
wasm$1.
|
340
|
+
function __wbg_adapter_260(arg0, arg1, arg2, arg3) {
|
341
|
+
wasm$1.wasm_bindgen__convert__closures__invoke2_mut__ha446eb95921e2107(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
|
333
342
|
}
|
334
343
|
|
335
344
|
/**
|
@@ -377,6 +386,202 @@ MLS_256_DHKEMX448_CHACHA20POLY1305_SHA512_Ed448:6,"6":"MLS_256_DHKEMX448_CHACHA2
|
|
377
386
|
*/
|
378
387
|
MLS_256_DHKEMP384_AES256GCM_SHA384_P384:7,"7":"MLS_256_DHKEMP384_AES256GCM_SHA384_P384", });
|
379
388
|
/**
|
389
|
+
* See [core_crypto::e2e_identity::types::E2eiAcmeChallenge]
|
390
|
+
*/
|
391
|
+
class AcmeChallenge {
|
392
|
+
|
393
|
+
static __wrap(ptr) {
|
394
|
+
const obj = Object.create(AcmeChallenge.prototype);
|
395
|
+
obj.ptr = ptr;
|
396
|
+
|
397
|
+
return obj;
|
398
|
+
}
|
399
|
+
|
400
|
+
__destroy_into_raw() {
|
401
|
+
const ptr = this.ptr;
|
402
|
+
this.ptr = 0;
|
403
|
+
|
404
|
+
return ptr;
|
405
|
+
}
|
406
|
+
|
407
|
+
free() {
|
408
|
+
const ptr = this.__destroy_into_raw();
|
409
|
+
wasm$1.__wbg_acmechallenge_free(ptr);
|
410
|
+
}
|
411
|
+
/**
|
412
|
+
* @param {Uint8Array} delegate
|
413
|
+
* @param {string} url
|
414
|
+
*/
|
415
|
+
constructor(delegate, url) {
|
416
|
+
const ptr0 = passStringToWasm0(url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
417
|
+
const len0 = WASM_VECTOR_LEN;
|
418
|
+
const ret = wasm$1.acmechallenge_new(addHeapObject(delegate), ptr0, len0);
|
419
|
+
return AcmeChallenge.__wrap(ret);
|
420
|
+
}
|
421
|
+
/**
|
422
|
+
* @returns {Uint8Array}
|
423
|
+
*/
|
424
|
+
get delegate() {
|
425
|
+
const ret = wasm$1.acmechallenge_delegate(this.ptr);
|
426
|
+
return takeObject(ret);
|
427
|
+
}
|
428
|
+
/**
|
429
|
+
* @returns {string}
|
430
|
+
*/
|
431
|
+
get url() {
|
432
|
+
try {
|
433
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
434
|
+
wasm$1.acmechallenge_url(retptr, this.ptr);
|
435
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
436
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
437
|
+
return getStringFromWasm0(r0, r1);
|
438
|
+
} finally {
|
439
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
440
|
+
wasm$1.__wbindgen_free(r0, r1);
|
441
|
+
}
|
442
|
+
}
|
443
|
+
}
|
444
|
+
/**
|
445
|
+
* See [core_crypto::e2e_identity::types::E2eiAcmeDirectory]
|
446
|
+
*/
|
447
|
+
class AcmeDirectory {
|
448
|
+
|
449
|
+
static __wrap(ptr) {
|
450
|
+
const obj = Object.create(AcmeDirectory.prototype);
|
451
|
+
obj.ptr = ptr;
|
452
|
+
|
453
|
+
return obj;
|
454
|
+
}
|
455
|
+
|
456
|
+
__destroy_into_raw() {
|
457
|
+
const ptr = this.ptr;
|
458
|
+
this.ptr = 0;
|
459
|
+
|
460
|
+
return ptr;
|
461
|
+
}
|
462
|
+
|
463
|
+
free() {
|
464
|
+
const ptr = this.__destroy_into_raw();
|
465
|
+
wasm$1.__wbg_acmedirectory_free(ptr);
|
466
|
+
}
|
467
|
+
/**
|
468
|
+
* @param {string} new_nonce
|
469
|
+
* @param {string} new_account
|
470
|
+
* @param {string} new_order
|
471
|
+
*/
|
472
|
+
constructor(new_nonce, new_account, new_order) {
|
473
|
+
const ptr0 = passStringToWasm0(new_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
474
|
+
const len0 = WASM_VECTOR_LEN;
|
475
|
+
const ptr1 = passStringToWasm0(new_account, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
476
|
+
const len1 = WASM_VECTOR_LEN;
|
477
|
+
const ptr2 = passStringToWasm0(new_order, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
478
|
+
const len2 = WASM_VECTOR_LEN;
|
479
|
+
const ret = wasm$1.acmedirectory_new(ptr0, len0, ptr1, len1, ptr2, len2);
|
480
|
+
return AcmeDirectory.__wrap(ret);
|
481
|
+
}
|
482
|
+
/**
|
483
|
+
* @returns {string}
|
484
|
+
*/
|
485
|
+
get new_nonce() {
|
486
|
+
try {
|
487
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
488
|
+
wasm$1.acmedirectory_new_nonce(retptr, this.ptr);
|
489
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
490
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
491
|
+
return getStringFromWasm0(r0, r1);
|
492
|
+
} finally {
|
493
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
494
|
+
wasm$1.__wbindgen_free(r0, r1);
|
495
|
+
}
|
496
|
+
}
|
497
|
+
/**
|
498
|
+
* @returns {string}
|
499
|
+
*/
|
500
|
+
get new_account() {
|
501
|
+
try {
|
502
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
503
|
+
wasm$1.acmechallenge_url(retptr, this.ptr);
|
504
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
505
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
506
|
+
return getStringFromWasm0(r0, r1);
|
507
|
+
} finally {
|
508
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
509
|
+
wasm$1.__wbindgen_free(r0, r1);
|
510
|
+
}
|
511
|
+
}
|
512
|
+
/**
|
513
|
+
* @returns {string}
|
514
|
+
*/
|
515
|
+
get new_order() {
|
516
|
+
try {
|
517
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
518
|
+
wasm$1.acmedirectory_new_order(retptr, this.ptr);
|
519
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
520
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
521
|
+
return getStringFromWasm0(r0, r1);
|
522
|
+
} finally {
|
523
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
524
|
+
wasm$1.__wbindgen_free(r0, r1);
|
525
|
+
}
|
526
|
+
}
|
527
|
+
}
|
528
|
+
/**
|
529
|
+
* See [core_crypto::e2e_identity::types::E2eiAcmeFinalize]
|
530
|
+
*/
|
531
|
+
class AcmeFinalize {
|
532
|
+
|
533
|
+
static __wrap(ptr) {
|
534
|
+
const obj = Object.create(AcmeFinalize.prototype);
|
535
|
+
obj.ptr = ptr;
|
536
|
+
|
537
|
+
return obj;
|
538
|
+
}
|
539
|
+
|
540
|
+
__destroy_into_raw() {
|
541
|
+
const ptr = this.ptr;
|
542
|
+
this.ptr = 0;
|
543
|
+
|
544
|
+
return ptr;
|
545
|
+
}
|
546
|
+
|
547
|
+
free() {
|
548
|
+
const ptr = this.__destroy_into_raw();
|
549
|
+
wasm$1.__wbg_acmefinalize_free(ptr);
|
550
|
+
}
|
551
|
+
/**
|
552
|
+
* @param {Uint8Array} delegate
|
553
|
+
* @param {string} certificate_url
|
554
|
+
*/
|
555
|
+
constructor(delegate, certificate_url) {
|
556
|
+
const ptr0 = passStringToWasm0(certificate_url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
557
|
+
const len0 = WASM_VECTOR_LEN;
|
558
|
+
const ret = wasm$1.acmechallenge_new(addHeapObject(delegate), ptr0, len0);
|
559
|
+
return AcmeFinalize.__wrap(ret);
|
560
|
+
}
|
561
|
+
/**
|
562
|
+
* @returns {Uint8Array}
|
563
|
+
*/
|
564
|
+
get delegate() {
|
565
|
+
const ret = wasm$1.acmechallenge_delegate(this.ptr);
|
566
|
+
return takeObject(ret);
|
567
|
+
}
|
568
|
+
/**
|
569
|
+
* @returns {string}
|
570
|
+
*/
|
571
|
+
get certificate_url() {
|
572
|
+
try {
|
573
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
574
|
+
wasm$1.acmechallenge_url(retptr, this.ptr);
|
575
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
576
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
577
|
+
return getStringFromWasm0(r0, r1);
|
578
|
+
} finally {
|
579
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
580
|
+
wasm$1.__wbindgen_free(r0, r1);
|
581
|
+
}
|
582
|
+
}
|
583
|
+
}
|
584
|
+
/**
|
380
585
|
*/
|
381
586
|
class CommitBundle {
|
382
587
|
|
@@ -1233,6 +1438,15 @@ class CoreCrypto$1 {
|
|
1233
1438
|
const ret = wasm$1.corecrypto_get_client_ids(this.ptr, ptr0, len0);
|
1234
1439
|
return takeObject(ret);
|
1235
1440
|
}
|
1441
|
+
/**
|
1442
|
+
* see [core_crypto::MlsCentral::new_acme_enrollment]
|
1443
|
+
* @param {number} ciphersuite
|
1444
|
+
* @returns {Promise<WireE2eIdentity>}
|
1445
|
+
*/
|
1446
|
+
new_acme_enrollment(ciphersuite) {
|
1447
|
+
const ret = wasm$1.corecrypto_new_acme_enrollment(this.ptr, ciphersuite);
|
1448
|
+
return takeObject(ret);
|
1449
|
+
}
|
1236
1450
|
}
|
1237
1451
|
/**
|
1238
1452
|
* see [core_crypto::prelude::CoreCryptoCallbacks]
|
@@ -1469,6 +1683,130 @@ class MemberAddedMessages {
|
|
1469
1683
|
}
|
1470
1684
|
}
|
1471
1685
|
/**
|
1686
|
+
* See [core_crypto::e2e_identity::types::E2eiNewAcmeAuthz]
|
1687
|
+
*/
|
1688
|
+
class NewAcmeAuthz {
|
1689
|
+
|
1690
|
+
static __wrap(ptr) {
|
1691
|
+
const obj = Object.create(NewAcmeAuthz.prototype);
|
1692
|
+
obj.ptr = ptr;
|
1693
|
+
|
1694
|
+
return obj;
|
1695
|
+
}
|
1696
|
+
|
1697
|
+
__destroy_into_raw() {
|
1698
|
+
const ptr = this.ptr;
|
1699
|
+
this.ptr = 0;
|
1700
|
+
|
1701
|
+
return ptr;
|
1702
|
+
}
|
1703
|
+
|
1704
|
+
free() {
|
1705
|
+
const ptr = this.__destroy_into_raw();
|
1706
|
+
wasm$1.__wbg_newacmeauthz_free(ptr);
|
1707
|
+
}
|
1708
|
+
/**
|
1709
|
+
* @param {string} identifier
|
1710
|
+
* @param {AcmeChallenge | undefined} wire_http_challenge
|
1711
|
+
* @param {AcmeChallenge | undefined} wire_oidc_challenge
|
1712
|
+
*/
|
1713
|
+
constructor(identifier, wire_http_challenge, wire_oidc_challenge) {
|
1714
|
+
const ptr0 = passStringToWasm0(identifier, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1715
|
+
const len0 = WASM_VECTOR_LEN;
|
1716
|
+
let ptr1 = 0;
|
1717
|
+
if (!isLikeNone(wire_http_challenge)) {
|
1718
|
+
_assertClass(wire_http_challenge, AcmeChallenge);
|
1719
|
+
ptr1 = wire_http_challenge.ptr;
|
1720
|
+
wire_http_challenge.ptr = 0;
|
1721
|
+
}
|
1722
|
+
let ptr2 = 0;
|
1723
|
+
if (!isLikeNone(wire_oidc_challenge)) {
|
1724
|
+
_assertClass(wire_oidc_challenge, AcmeChallenge);
|
1725
|
+
ptr2 = wire_oidc_challenge.ptr;
|
1726
|
+
wire_oidc_challenge.ptr = 0;
|
1727
|
+
}
|
1728
|
+
const ret = wasm$1.newacmeauthz_new(ptr0, len0, ptr1, ptr2);
|
1729
|
+
return NewAcmeAuthz.__wrap(ret);
|
1730
|
+
}
|
1731
|
+
/**
|
1732
|
+
* @returns {string}
|
1733
|
+
*/
|
1734
|
+
get identifier() {
|
1735
|
+
try {
|
1736
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1737
|
+
wasm$1.acmedirectory_new_nonce(retptr, this.ptr);
|
1738
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1739
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1740
|
+
return getStringFromWasm0(r0, r1);
|
1741
|
+
} finally {
|
1742
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
1743
|
+
wasm$1.__wbindgen_free(r0, r1);
|
1744
|
+
}
|
1745
|
+
}
|
1746
|
+
/**
|
1747
|
+
* @returns {AcmeChallenge | undefined}
|
1748
|
+
*/
|
1749
|
+
get wire_http_challenge() {
|
1750
|
+
const ret = wasm$1.newacmeauthz_wire_http_challenge(this.ptr);
|
1751
|
+
return ret === 0 ? undefined : AcmeChallenge.__wrap(ret);
|
1752
|
+
}
|
1753
|
+
/**
|
1754
|
+
* @returns {AcmeChallenge | undefined}
|
1755
|
+
*/
|
1756
|
+
get wire_oidc_challenge() {
|
1757
|
+
const ret = wasm$1.newacmeauthz_wire_oidc_challenge(this.ptr);
|
1758
|
+
return ret === 0 ? undefined : AcmeChallenge.__wrap(ret);
|
1759
|
+
}
|
1760
|
+
}
|
1761
|
+
/**
|
1762
|
+
* See [core_crypto::e2e_identity::types::E2eiNewAcmeOrder]
|
1763
|
+
*/
|
1764
|
+
class NewAcmeOrder {
|
1765
|
+
|
1766
|
+
static __wrap(ptr) {
|
1767
|
+
const obj = Object.create(NewAcmeOrder.prototype);
|
1768
|
+
obj.ptr = ptr;
|
1769
|
+
|
1770
|
+
return obj;
|
1771
|
+
}
|
1772
|
+
|
1773
|
+
__destroy_into_raw() {
|
1774
|
+
const ptr = this.ptr;
|
1775
|
+
this.ptr = 0;
|
1776
|
+
|
1777
|
+
return ptr;
|
1778
|
+
}
|
1779
|
+
|
1780
|
+
free() {
|
1781
|
+
const ptr = this.__destroy_into_raw();
|
1782
|
+
wasm$1.__wbg_newacmeorder_free(ptr);
|
1783
|
+
}
|
1784
|
+
/**
|
1785
|
+
* @param {Uint8Array} delegate
|
1786
|
+
* @param {(Uint8Array)[]} authorizations
|
1787
|
+
*/
|
1788
|
+
constructor(delegate, authorizations) {
|
1789
|
+
const ptr0 = passArrayJsValueToWasm0(authorizations, wasm$1.__wbindgen_malloc);
|
1790
|
+
const len0 = WASM_VECTOR_LEN;
|
1791
|
+
const ret = wasm$1.newacmeorder_new(addHeapObject(delegate), ptr0, len0);
|
1792
|
+
return NewAcmeOrder.__wrap(ret);
|
1793
|
+
}
|
1794
|
+
/**
|
1795
|
+
* @returns {Uint8Array}
|
1796
|
+
*/
|
1797
|
+
get delegate() {
|
1798
|
+
const ret = wasm$1.acmechallenge_delegate(this.ptr);
|
1799
|
+
return takeObject(ret);
|
1800
|
+
}
|
1801
|
+
/**
|
1802
|
+
* @returns {Array<any>}
|
1803
|
+
*/
|
1804
|
+
get authorizations() {
|
1805
|
+
const ret = wasm$1.newacmeorder_authorizations(this.ptr);
|
1806
|
+
return takeObject(ret);
|
1807
|
+
}
|
1808
|
+
}
|
1809
|
+
/**
|
1472
1810
|
*/
|
1473
1811
|
class ProposalBundle {
|
1474
1812
|
|
@@ -1493,60 +1831,467 @@ class ProposalBundle {
|
|
1493
1831
|
/**
|
1494
1832
|
* @returns {Uint8Array}
|
1495
1833
|
*/
|
1496
|
-
get proposal() {
|
1497
|
-
const ret = wasm$1.commitbundle_commit(this.ptr);
|
1498
|
-
return takeObject(ret);
|
1834
|
+
get proposal() {
|
1835
|
+
const ret = wasm$1.commitbundle_commit(this.ptr);
|
1836
|
+
return takeObject(ret);
|
1837
|
+
}
|
1838
|
+
/**
|
1839
|
+
* @returns {Uint8Array}
|
1840
|
+
*/
|
1841
|
+
get proposal_ref() {
|
1842
|
+
const ret = wasm$1.conversationinitbundle_commit(this.ptr);
|
1843
|
+
return takeObject(ret);
|
1844
|
+
}
|
1845
|
+
}
|
1846
|
+
/**
|
1847
|
+
*/
|
1848
|
+
class PublicGroupStateBundle {
|
1849
|
+
|
1850
|
+
static __wrap(ptr) {
|
1851
|
+
const obj = Object.create(PublicGroupStateBundle.prototype);
|
1852
|
+
obj.ptr = ptr;
|
1853
|
+
|
1854
|
+
return obj;
|
1855
|
+
}
|
1856
|
+
|
1857
|
+
__destroy_into_raw() {
|
1858
|
+
const ptr = this.ptr;
|
1859
|
+
this.ptr = 0;
|
1860
|
+
|
1861
|
+
return ptr;
|
1862
|
+
}
|
1863
|
+
|
1864
|
+
free() {
|
1865
|
+
const ptr = this.__destroy_into_raw();
|
1866
|
+
wasm$1.__wbg_publicgroupstatebundle_free(ptr);
|
1867
|
+
}
|
1868
|
+
/**
|
1869
|
+
* @returns {number}
|
1870
|
+
*/
|
1871
|
+
get encryption_type() {
|
1872
|
+
const ret = wasm$1.publicgroupstatebundle_encryption_type(this.ptr);
|
1873
|
+
return ret;
|
1874
|
+
}
|
1875
|
+
/**
|
1876
|
+
* @returns {number}
|
1877
|
+
*/
|
1878
|
+
get ratchet_tree_type() {
|
1879
|
+
const ret = wasm$1.publicgroupstatebundle_ratchet_tree_type(this.ptr);
|
1880
|
+
return ret;
|
1881
|
+
}
|
1882
|
+
/**
|
1883
|
+
* @returns {Uint8Array}
|
1884
|
+
*/
|
1885
|
+
get payload() {
|
1886
|
+
const ret = wasm$1.commitbundle_commit(this.ptr);
|
1887
|
+
return takeObject(ret);
|
1888
|
+
}
|
1889
|
+
}
|
1890
|
+
/**
|
1891
|
+
*/
|
1892
|
+
class WireE2eIdentity$1 {
|
1893
|
+
|
1894
|
+
static __wrap(ptr) {
|
1895
|
+
const obj = Object.create(WireE2eIdentity$1.prototype);
|
1896
|
+
obj.ptr = ptr;
|
1897
|
+
|
1898
|
+
return obj;
|
1899
|
+
}
|
1900
|
+
|
1901
|
+
__destroy_into_raw() {
|
1902
|
+
const ptr = this.ptr;
|
1903
|
+
this.ptr = 0;
|
1904
|
+
|
1905
|
+
return ptr;
|
1906
|
+
}
|
1907
|
+
|
1908
|
+
free() {
|
1909
|
+
const ptr = this.__destroy_into_raw();
|
1910
|
+
wasm$1.__wbg_wiree2eidentity_free(ptr);
|
1911
|
+
}
|
1912
|
+
/**
|
1913
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::directory_response]
|
1914
|
+
* @param {Uint8Array} directory
|
1915
|
+
* @returns {any}
|
1916
|
+
*/
|
1917
|
+
directory_response(directory) {
|
1918
|
+
try {
|
1919
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1920
|
+
const ptr0 = passArray8ToWasm0(directory, wasm$1.__wbindgen_malloc);
|
1921
|
+
const len0 = WASM_VECTOR_LEN;
|
1922
|
+
wasm$1.wiree2eidentity_directory_response(retptr, this.ptr, ptr0, len0);
|
1923
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1924
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1925
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
1926
|
+
if (r2) {
|
1927
|
+
throw takeObject(r1);
|
1928
|
+
}
|
1929
|
+
return takeObject(r0);
|
1930
|
+
} finally {
|
1931
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
1932
|
+
}
|
1933
|
+
}
|
1934
|
+
/**
|
1935
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_account_request]
|
1936
|
+
* @param {any} directory
|
1937
|
+
* @param {string} previous_nonce
|
1938
|
+
* @returns {Uint8Array}
|
1939
|
+
*/
|
1940
|
+
new_account_request(directory, previous_nonce) {
|
1941
|
+
try {
|
1942
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1943
|
+
const ptr0 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1944
|
+
const len0 = WASM_VECTOR_LEN;
|
1945
|
+
wasm$1.wiree2eidentity_new_account_request(retptr, this.ptr, addHeapObject(directory), ptr0, len0);
|
1946
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1947
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1948
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
1949
|
+
if (r2) {
|
1950
|
+
throw takeObject(r1);
|
1951
|
+
}
|
1952
|
+
return takeObject(r0);
|
1953
|
+
} finally {
|
1954
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
1955
|
+
}
|
1956
|
+
}
|
1957
|
+
/**
|
1958
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_account_response]
|
1959
|
+
* @param {Uint8Array} account
|
1960
|
+
* @returns {Uint8Array}
|
1961
|
+
*/
|
1962
|
+
new_account_response(account) {
|
1963
|
+
try {
|
1964
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1965
|
+
wasm$1.wiree2eidentity_new_account_response(retptr, this.ptr, addHeapObject(account));
|
1966
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1967
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1968
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
1969
|
+
if (r2) {
|
1970
|
+
throw takeObject(r1);
|
1971
|
+
}
|
1972
|
+
return takeObject(r0);
|
1973
|
+
} finally {
|
1974
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
1975
|
+
}
|
1976
|
+
}
|
1977
|
+
/**
|
1978
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_order_request]
|
1979
|
+
* @param {string} handle
|
1980
|
+
* @param {string} client_id
|
1981
|
+
* @param {number} expiry_days
|
1982
|
+
* @param {any} directory
|
1983
|
+
* @param {Uint8Array} account
|
1984
|
+
* @param {string} previous_nonce
|
1985
|
+
* @returns {Uint8Array}
|
1986
|
+
*/
|
1987
|
+
new_order_request(handle, client_id, expiry_days, directory, account, previous_nonce) {
|
1988
|
+
try {
|
1989
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1990
|
+
const ptr0 = passStringToWasm0(handle, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1991
|
+
const len0 = WASM_VECTOR_LEN;
|
1992
|
+
const ptr1 = passStringToWasm0(client_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1993
|
+
const len1 = WASM_VECTOR_LEN;
|
1994
|
+
const ptr2 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1995
|
+
const len2 = WASM_VECTOR_LEN;
|
1996
|
+
wasm$1.wiree2eidentity_new_order_request(retptr, this.ptr, ptr0, len0, ptr1, len1, expiry_days, addHeapObject(directory), addHeapObject(account), ptr2, len2);
|
1997
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1998
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1999
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2000
|
+
if (r2) {
|
2001
|
+
throw takeObject(r1);
|
2002
|
+
}
|
2003
|
+
return takeObject(r0);
|
2004
|
+
} finally {
|
2005
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2006
|
+
}
|
2007
|
+
}
|
2008
|
+
/**
|
2009
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_order_response]
|
2010
|
+
* @param {Uint8Array} order
|
2011
|
+
* @returns {any}
|
2012
|
+
*/
|
2013
|
+
new_order_response(order) {
|
2014
|
+
try {
|
2015
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2016
|
+
wasm$1.wiree2eidentity_new_order_response(retptr, this.ptr, addHeapObject(order));
|
2017
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2018
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2019
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2020
|
+
if (r2) {
|
2021
|
+
throw takeObject(r1);
|
2022
|
+
}
|
2023
|
+
return takeObject(r0);
|
2024
|
+
} finally {
|
2025
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2026
|
+
}
|
2027
|
+
}
|
2028
|
+
/**
|
2029
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_authz_request]
|
2030
|
+
* @param {string} url
|
2031
|
+
* @param {Uint8Array} account
|
2032
|
+
* @param {string} previous_nonce
|
2033
|
+
* @returns {Uint8Array}
|
2034
|
+
*/
|
2035
|
+
new_authz_request(url, account, previous_nonce) {
|
2036
|
+
try {
|
2037
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2038
|
+
const ptr0 = passStringToWasm0(url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2039
|
+
const len0 = WASM_VECTOR_LEN;
|
2040
|
+
const ptr1 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2041
|
+
const len1 = WASM_VECTOR_LEN;
|
2042
|
+
wasm$1.wiree2eidentity_new_authz_request(retptr, this.ptr, ptr0, len0, addHeapObject(account), ptr1, len1);
|
2043
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2044
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2045
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2046
|
+
if (r2) {
|
2047
|
+
throw takeObject(r1);
|
2048
|
+
}
|
2049
|
+
return takeObject(r0);
|
2050
|
+
} finally {
|
2051
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2052
|
+
}
|
2053
|
+
}
|
2054
|
+
/**
|
2055
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_authz_response]
|
2056
|
+
* @param {Uint8Array} authz
|
2057
|
+
* @returns {any}
|
2058
|
+
*/
|
2059
|
+
new_authz_response(authz) {
|
2060
|
+
try {
|
2061
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2062
|
+
wasm$1.wiree2eidentity_new_authz_response(retptr, this.ptr, addHeapObject(authz));
|
2063
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2064
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2065
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2066
|
+
if (r2) {
|
2067
|
+
throw takeObject(r1);
|
2068
|
+
}
|
2069
|
+
return takeObject(r0);
|
2070
|
+
} finally {
|
2071
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2072
|
+
}
|
2073
|
+
}
|
2074
|
+
/**
|
2075
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::create_dpop_token]
|
2076
|
+
* @param {string} access_token_url
|
2077
|
+
* @param {string} user_id
|
2078
|
+
* @param {bigint} client_id
|
2079
|
+
* @param {string} domain
|
2080
|
+
* @param {any} client_id_challenge
|
2081
|
+
* @param {string} backend_nonce
|
2082
|
+
* @param {number} expiry_days
|
2083
|
+
* @returns {string}
|
2084
|
+
*/
|
2085
|
+
create_dpop_token(access_token_url, user_id, client_id, domain, client_id_challenge, backend_nonce, expiry_days) {
|
2086
|
+
try {
|
2087
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2088
|
+
const ptr0 = passStringToWasm0(access_token_url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2089
|
+
const len0 = WASM_VECTOR_LEN;
|
2090
|
+
const ptr1 = passStringToWasm0(user_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2091
|
+
const len1 = WASM_VECTOR_LEN;
|
2092
|
+
const ptr2 = passStringToWasm0(domain, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2093
|
+
const len2 = WASM_VECTOR_LEN;
|
2094
|
+
const ptr3 = passStringToWasm0(backend_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2095
|
+
const len3 = WASM_VECTOR_LEN;
|
2096
|
+
wasm$1.wiree2eidentity_create_dpop_token(retptr, this.ptr, ptr0, len0, ptr1, len1, client_id, ptr2, len2, addHeapObject(client_id_challenge), ptr3, len3, expiry_days);
|
2097
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2098
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2099
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2100
|
+
var r3 = getInt32Memory0()[retptr / 4 + 3];
|
2101
|
+
var ptr4 = r0;
|
2102
|
+
var len4 = r1;
|
2103
|
+
if (r3) {
|
2104
|
+
ptr4 = 0; len4 = 0;
|
2105
|
+
throw takeObject(r2);
|
2106
|
+
}
|
2107
|
+
return getStringFromWasm0(ptr4, len4);
|
2108
|
+
} finally {
|
2109
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2110
|
+
wasm$1.__wbindgen_free(ptr4, len4);
|
2111
|
+
}
|
2112
|
+
}
|
2113
|
+
/**
|
2114
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_challenge_request]
|
2115
|
+
* @param {any} handle_challenge
|
2116
|
+
* @param {Uint8Array} account
|
2117
|
+
* @param {string} previous_nonce
|
2118
|
+
* @returns {Uint8Array}
|
2119
|
+
*/
|
2120
|
+
new_challenge_request(handle_challenge, account, previous_nonce) {
|
2121
|
+
try {
|
2122
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2123
|
+
const ptr0 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2124
|
+
const len0 = WASM_VECTOR_LEN;
|
2125
|
+
wasm$1.wiree2eidentity_new_challenge_request(retptr, this.ptr, addHeapObject(handle_challenge), addHeapObject(account), ptr0, len0);
|
2126
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2127
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2128
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2129
|
+
if (r2) {
|
2130
|
+
throw takeObject(r1);
|
2131
|
+
}
|
2132
|
+
return takeObject(r0);
|
2133
|
+
} finally {
|
2134
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2135
|
+
}
|
2136
|
+
}
|
2137
|
+
/**
|
2138
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_challenge_response]
|
2139
|
+
* @param {Uint8Array} challenge
|
2140
|
+
*/
|
2141
|
+
new_challenge_response(challenge) {
|
2142
|
+
try {
|
2143
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2144
|
+
wasm$1.wiree2eidentity_new_challenge_response(retptr, this.ptr, addHeapObject(challenge));
|
2145
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2146
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2147
|
+
if (r1) {
|
2148
|
+
throw takeObject(r0);
|
2149
|
+
}
|
2150
|
+
} finally {
|
2151
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2152
|
+
}
|
2153
|
+
}
|
2154
|
+
/**
|
2155
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::check_order_request]
|
2156
|
+
* @param {string} order_url
|
2157
|
+
* @param {Uint8Array} account
|
2158
|
+
* @param {string} previous_nonce
|
2159
|
+
* @returns {Uint8Array}
|
2160
|
+
*/
|
2161
|
+
check_order_request(order_url, account, previous_nonce) {
|
2162
|
+
try {
|
2163
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2164
|
+
const ptr0 = passStringToWasm0(order_url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2165
|
+
const len0 = WASM_VECTOR_LEN;
|
2166
|
+
const ptr1 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2167
|
+
const len1 = WASM_VECTOR_LEN;
|
2168
|
+
wasm$1.wiree2eidentity_check_order_request(retptr, this.ptr, ptr0, len0, addHeapObject(account), ptr1, len1);
|
2169
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2170
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2171
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2172
|
+
if (r2) {
|
2173
|
+
throw takeObject(r1);
|
2174
|
+
}
|
2175
|
+
return takeObject(r0);
|
2176
|
+
} finally {
|
2177
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2178
|
+
}
|
2179
|
+
}
|
2180
|
+
/**
|
2181
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::check_order_response]
|
2182
|
+
* @param {Uint8Array} order
|
2183
|
+
* @returns {Uint8Array}
|
2184
|
+
*/
|
2185
|
+
check_order_response(order) {
|
2186
|
+
try {
|
2187
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2188
|
+
wasm$1.wiree2eidentity_check_order_response(retptr, this.ptr, addHeapObject(order));
|
2189
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2190
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2191
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2192
|
+
if (r2) {
|
2193
|
+
throw takeObject(r1);
|
2194
|
+
}
|
2195
|
+
return takeObject(r0);
|
2196
|
+
} finally {
|
2197
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2198
|
+
}
|
1499
2199
|
}
|
1500
2200
|
/**
|
2201
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::finalize_request]
|
2202
|
+
* @param {(Uint8Array)[]} domains
|
2203
|
+
* @param {Uint8Array} order
|
2204
|
+
* @param {Uint8Array} account
|
2205
|
+
* @param {string} previous_nonce
|
1501
2206
|
* @returns {Uint8Array}
|
1502
2207
|
*/
|
1503
|
-
|
1504
|
-
|
1505
|
-
|
1506
|
-
|
1507
|
-
|
1508
|
-
|
1509
|
-
|
1510
|
-
|
1511
|
-
|
1512
|
-
|
1513
|
-
|
1514
|
-
|
1515
|
-
|
1516
|
-
|
1517
|
-
|
1518
|
-
|
1519
|
-
|
1520
|
-
|
1521
|
-
this.ptr = 0;
|
1522
|
-
|
1523
|
-
return ptr;
|
1524
|
-
}
|
1525
|
-
|
1526
|
-
free() {
|
1527
|
-
const ptr = this.__destroy_into_raw();
|
1528
|
-
wasm$1.__wbg_publicgroupstatebundle_free(ptr);
|
2208
|
+
finalize_request(domains, order, account, previous_nonce) {
|
2209
|
+
try {
|
2210
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2211
|
+
const ptr0 = passArrayJsValueToWasm0(domains, wasm$1.__wbindgen_malloc);
|
2212
|
+
const len0 = WASM_VECTOR_LEN;
|
2213
|
+
const ptr1 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2214
|
+
const len1 = WASM_VECTOR_LEN;
|
2215
|
+
wasm$1.wiree2eidentity_finalize_request(retptr, this.ptr, ptr0, len0, addHeapObject(order), addHeapObject(account), ptr1, len1);
|
2216
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2217
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2218
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2219
|
+
if (r2) {
|
2220
|
+
throw takeObject(r1);
|
2221
|
+
}
|
2222
|
+
return takeObject(r0);
|
2223
|
+
} finally {
|
2224
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2225
|
+
}
|
1529
2226
|
}
|
1530
2227
|
/**
|
1531
|
-
*
|
2228
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::finalize_response]
|
2229
|
+
* @param {Uint8Array} finalize
|
2230
|
+
* @returns {any}
|
1532
2231
|
*/
|
1533
|
-
|
1534
|
-
|
1535
|
-
|
2232
|
+
finalize_response(finalize) {
|
2233
|
+
try {
|
2234
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2235
|
+
wasm$1.wiree2eidentity_finalize_response(retptr, this.ptr, addHeapObject(finalize));
|
2236
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2237
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2238
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2239
|
+
if (r2) {
|
2240
|
+
throw takeObject(r1);
|
2241
|
+
}
|
2242
|
+
return takeObject(r0);
|
2243
|
+
} finally {
|
2244
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2245
|
+
}
|
1536
2246
|
}
|
1537
2247
|
/**
|
1538
|
-
*
|
2248
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::certificate_request]
|
2249
|
+
* @param {any} finalize
|
2250
|
+
* @param {Uint8Array} account
|
2251
|
+
* @param {string} previous_nonce
|
2252
|
+
* @returns {Uint8Array}
|
1539
2253
|
*/
|
1540
|
-
|
1541
|
-
|
1542
|
-
|
2254
|
+
certificate_request(finalize, account, previous_nonce) {
|
2255
|
+
try {
|
2256
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2257
|
+
const ptr0 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2258
|
+
const len0 = WASM_VECTOR_LEN;
|
2259
|
+
wasm$1.wiree2eidentity_certificate_request(retptr, this.ptr, addHeapObject(finalize), addHeapObject(account), ptr0, len0);
|
2260
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2261
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2262
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2263
|
+
if (r2) {
|
2264
|
+
throw takeObject(r1);
|
2265
|
+
}
|
2266
|
+
return takeObject(r0);
|
2267
|
+
} finally {
|
2268
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2269
|
+
}
|
1543
2270
|
}
|
1544
2271
|
/**
|
1545
|
-
*
|
2272
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::certificate_response]
|
2273
|
+
* @param {string} certificate_chain
|
2274
|
+
* @returns {(Uint8Array)[]}
|
1546
2275
|
*/
|
1547
|
-
|
1548
|
-
|
1549
|
-
|
2276
|
+
certificate_response(certificate_chain) {
|
2277
|
+
try {
|
2278
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2279
|
+
const ptr0 = passStringToWasm0(certificate_chain, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2280
|
+
const len0 = WASM_VECTOR_LEN;
|
2281
|
+
wasm$1.wiree2eidentity_certificate_response(retptr, this.ptr, ptr0, len0);
|
2282
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2283
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2284
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2285
|
+
var r3 = getInt32Memory0()[retptr / 4 + 3];
|
2286
|
+
if (r3) {
|
2287
|
+
throw takeObject(r2);
|
2288
|
+
}
|
2289
|
+
var v1 = getArrayJsValueFromWasm0(r0, r1).slice();
|
2290
|
+
wasm$1.__wbindgen_free(r0, r1 * 4);
|
2291
|
+
return v1;
|
2292
|
+
} finally {
|
2293
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2294
|
+
}
|
1550
2295
|
}
|
1551
2296
|
}
|
1552
2297
|
|
@@ -1701,6 +2446,10 @@ function getImports() {
|
|
1701
2446
|
const ret = CoreCrypto$1.__wrap(arg0);
|
1702
2447
|
return addHeapObject(ret);
|
1703
2448
|
};
|
2449
|
+
imports.wbg.__wbg_new_0b9bfdd97583284e = function() {
|
2450
|
+
const ret = new Object();
|
2451
|
+
return addHeapObject(ret);
|
2452
|
+
};
|
1704
2453
|
imports.wbg.__wbg_set_20cbc34131e76824 = function(arg0, arg1, arg2) {
|
1705
2454
|
getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
|
1706
2455
|
};
|
@@ -1708,8 +2457,8 @@ function getImports() {
|
|
1708
2457
|
const ret = arg0;
|
1709
2458
|
return addHeapObject(ret);
|
1710
2459
|
};
|
1711
|
-
imports.wbg.
|
1712
|
-
const ret =
|
2460
|
+
imports.wbg.__wbg_wiree2eidentity_new = function(arg0) {
|
2461
|
+
const ret = WireE2eIdentity$1.__wrap(arg0);
|
1713
2462
|
return addHeapObject(ret);
|
1714
2463
|
};
|
1715
2464
|
imports.wbg.__wbg_call_168da88779e35f61 = function() { return handleError(function (arg0, arg1, arg2) {
|
@@ -1727,7 +2476,7 @@ function getImports() {
|
|
1727
2476
|
const a = state0.a;
|
1728
2477
|
state0.a = 0;
|
1729
2478
|
try {
|
1730
|
-
return
|
2479
|
+
return __wbg_adapter_260(a, state0.b, arg0, arg1);
|
1731
2480
|
} finally {
|
1732
2481
|
state0.a = a;
|
1733
2482
|
}
|
@@ -1742,9 +2491,6 @@ function getImports() {
|
|
1742
2491
|
const ret = new Array();
|
1743
2492
|
return addHeapObject(ret);
|
1744
2493
|
};
|
1745
|
-
imports.wbg.__wbg_set_a68214f35c417fa9 = function(arg0, arg1, arg2) {
|
1746
|
-
getObject(arg0)[arg1 >>> 0] = takeObject(arg2);
|
1747
|
-
};
|
1748
2494
|
imports.wbg.__wbg_push_740e4b286702d964 = function(arg0, arg1) {
|
1749
2495
|
const ret = getObject(arg0).push(getObject(arg1));
|
1750
2496
|
return ret;
|
@@ -1757,6 +2503,9 @@ function getImports() {
|
|
1757
2503
|
const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
|
1758
2504
|
return addHeapObject(ret);
|
1759
2505
|
};
|
2506
|
+
imports.wbg.__wbg_set_a68214f35c417fa9 = function(arg0, arg1, arg2) {
|
2507
|
+
getObject(arg0)[arg1 >>> 0] = takeObject(arg2);
|
2508
|
+
};
|
1760
2509
|
imports.wbg.__wbg_call_3999bee59e9f7719 = function() { return handleError(function (arg0, arg1, arg2, arg3) {
|
1761
2510
|
const ret = getObject(arg0).call(getObject(arg1), getObject(arg2), getObject(arg3));
|
1762
2511
|
return addHeapObject(ret);
|
@@ -1773,6 +2522,14 @@ function getImports() {
|
|
1773
2522
|
const ret = ProposalBundle.__wrap(arg0);
|
1774
2523
|
return addHeapObject(ret);
|
1775
2524
|
};
|
2525
|
+
imports.wbg.__wbg_now_4d4a1d65c7a8c0ba = function() {
|
2526
|
+
const ret = Date.now();
|
2527
|
+
return ret;
|
2528
|
+
};
|
2529
|
+
imports.wbg.__wbg_now_78244d2ced74c026 = function() {
|
2530
|
+
const ret = performance.now();
|
2531
|
+
return ret;
|
2532
|
+
};
|
1776
2533
|
imports.wbg.__wbg_new_abda76e883ba8a5f = function() {
|
1777
2534
|
const ret = new Error();
|
1778
2535
|
return addHeapObject(ret);
|
@@ -1824,25 +2581,22 @@ function getImports() {
|
|
1824
2581
|
const ret = false;
|
1825
2582
|
return ret;
|
1826
2583
|
};
|
1827
|
-
imports.wbg.
|
1828
|
-
const ret = getObject(arg0).
|
2584
|
+
imports.wbg.__wbg_openCursor_e036069f0e326708 = function() { return handleError(function (arg0, arg1) {
|
2585
|
+
const ret = getObject(arg0).openCursor(getObject(arg1));
|
1829
2586
|
return addHeapObject(ret);
|
1830
2587
|
}, arguments) };
|
1831
|
-
imports.wbg.
|
1832
|
-
const ret = getObject(arg0).
|
2588
|
+
imports.wbg.__wbg_openCursor_f055654a98eeab7f = function() { return handleError(function (arg0) {
|
2589
|
+
const ret = getObject(arg0).openCursor();
|
1833
2590
|
return addHeapObject(ret);
|
1834
2591
|
}, arguments) };
|
1835
|
-
imports.wbg.__wbg_setonupgradeneeded_17d0b9530f1e0cac = function(arg0, arg1) {
|
1836
|
-
getObject(arg0).onupgradeneeded = getObject(arg1);
|
1837
|
-
};
|
1838
2592
|
imports.wbg.__wbg_setonsuccess_5f71593bc51653a3 = function(arg0, arg1) {
|
1839
2593
|
getObject(arg0).onsuccess = getObject(arg1);
|
1840
2594
|
};
|
1841
2595
|
imports.wbg.__wbg_setonerror_d5771cc5bf9ea74c = function(arg0, arg1) {
|
1842
2596
|
getObject(arg0).onerror = getObject(arg1);
|
1843
2597
|
};
|
1844
|
-
imports.wbg.
|
1845
|
-
const ret = getObject(arg0).
|
2598
|
+
imports.wbg.__wbg_get_6285bf458a1ee758 = function() { return handleError(function (arg0, arg1) {
|
2599
|
+
const ret = getObject(arg0).get(getObject(arg1));
|
1846
2600
|
return addHeapObject(ret);
|
1847
2601
|
}, arguments) };
|
1848
2602
|
imports.wbg.__wbg_count_b0e88953a0ea909c = function() { return handleError(function (arg0) {
|
@@ -1853,8 +2607,8 @@ function getImports() {
|
|
1853
2607
|
const ret = getObject(arg0).count(getObject(arg1));
|
1854
2608
|
return addHeapObject(ret);
|
1855
2609
|
}, arguments) };
|
1856
|
-
imports.wbg.
|
1857
|
-
const ret = getObject(arg0).
|
2610
|
+
imports.wbg.__wbg_delete_8abedd1043b4105d = function() { return handleError(function (arg0, arg1) {
|
2611
|
+
const ret = getObject(arg0).delete(getObject(arg1));
|
1858
2612
|
return addHeapObject(ret);
|
1859
2613
|
}, arguments) };
|
1860
2614
|
imports.wbg.__wbg_put_84e7fc93eee27b28 = function() { return handleError(function (arg0, arg1, arg2) {
|
@@ -1865,14 +2619,17 @@ function getImports() {
|
|
1865
2619
|
const ret = getObject(arg0).put(getObject(arg1));
|
1866
2620
|
return addHeapObject(ret);
|
1867
2621
|
}, arguments) };
|
1868
|
-
imports.wbg.
|
1869
|
-
const ret = getObject(arg0).
|
2622
|
+
imports.wbg.__wbg_open_a31c3fe1fdc244eb = function() { return handleError(function (arg0, arg1, arg2) {
|
2623
|
+
const ret = getObject(arg0).open(getStringFromWasm0(arg1, arg2));
|
1870
2624
|
return addHeapObject(ret);
|
1871
2625
|
}, arguments) };
|
1872
|
-
imports.wbg.
|
1873
|
-
const ret = getObject(arg0).
|
2626
|
+
imports.wbg.__wbg_open_c5d5fb2df44b9d10 = function() { return handleError(function (arg0, arg1, arg2, arg3) {
|
2627
|
+
const ret = getObject(arg0).open(getStringFromWasm0(arg1, arg2), arg3 >>> 0);
|
1874
2628
|
return addHeapObject(ret);
|
1875
2629
|
}, arguments) };
|
2630
|
+
imports.wbg.__wbg_setonupgradeneeded_17d0b9530f1e0cac = function(arg0, arg1) {
|
2631
|
+
getObject(arg0).onupgradeneeded = getObject(arg1);
|
2632
|
+
};
|
1876
2633
|
imports.wbg.__wbg_index_86861edf1478f49c = function() { return handleError(function (arg0, arg1, arg2) {
|
1877
2634
|
const ret = getObject(arg0).index(getStringFromWasm0(arg1, arg2));
|
1878
2635
|
return addHeapObject(ret);
|
@@ -2021,10 +2778,6 @@ function getImports() {
|
|
2021
2778
|
const ret = getObject(arg0).result;
|
2022
2779
|
return addHeapObject(ret);
|
2023
2780
|
}, arguments) };
|
2024
|
-
imports.wbg.__wbg_error_aacf5ac191e54ed0 = function() { return handleError(function (arg0) {
|
2025
|
-
const ret = getObject(arg0).error;
|
2026
|
-
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
2027
|
-
}, arguments) };
|
2028
2781
|
imports.wbg.__wbg_contains_6cf516181cd86571 = function(arg0, arg1, arg2) {
|
2029
2782
|
const ret = getObject(arg0).contains(getStringFromWasm0(arg1, arg2));
|
2030
2783
|
return ret;
|
@@ -2051,6 +2804,10 @@ function getImports() {
|
|
2051
2804
|
imports.wbg.__wbg_deleteObjectStore_1b698c5fd1bc077d = function() { return handleError(function (arg0, arg1, arg2) {
|
2052
2805
|
getObject(arg0).deleteObjectStore(getStringFromWasm0(arg1, arg2));
|
2053
2806
|
}, arguments) };
|
2807
|
+
imports.wbg.__wbg_error_aacf5ac191e54ed0 = function() { return handleError(function (arg0) {
|
2808
|
+
const ret = getObject(arg0).error;
|
2809
|
+
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
2810
|
+
}, arguments) };
|
2054
2811
|
imports.wbg.__wbindgen_is_falsy = function(arg0) {
|
2055
2812
|
const ret = !getObject(arg0);
|
2056
2813
|
return ret;
|
@@ -2076,6 +2833,24 @@ function getImports() {
|
|
2076
2833
|
const ret = getObject(arg0).toString();
|
2077
2834
|
return addHeapObject(ret);
|
2078
2835
|
};
|
2836
|
+
imports.wbg.__wbg_instanceof_Window_acc97ff9f5d2c7b4 = function(arg0) {
|
2837
|
+
let result;
|
2838
|
+
try {
|
2839
|
+
result = getObject(arg0) instanceof Window;
|
2840
|
+
} catch {
|
2841
|
+
result = false;
|
2842
|
+
}
|
2843
|
+
const ret = result;
|
2844
|
+
return ret;
|
2845
|
+
};
|
2846
|
+
imports.wbg.__wbg_crypto_9f07beb1e97bfa1b = function() { return handleError(function (arg0) {
|
2847
|
+
const ret = getObject(arg0).crypto;
|
2848
|
+
return addHeapObject(ret);
|
2849
|
+
}, arguments) };
|
2850
|
+
imports.wbg.__wbg_getRandomValues_f134f772d240c51f = function() { return handleError(function (arg0, arg1, arg2) {
|
2851
|
+
const ret = getObject(arg0).getRandomValues(getArrayU8FromWasm0(arg1, arg2));
|
2852
|
+
return addHeapObject(ret);
|
2853
|
+
}, arguments) };
|
2079
2854
|
imports.wbg.__wbg_instanceof_Uint8Array_971eeda69eb75003 = function(arg0) {
|
2080
2855
|
let result;
|
2081
2856
|
try {
|
@@ -2151,12 +2926,12 @@ function getImports() {
|
|
2151
2926
|
const ret = getObject(arg0).objectStore(getStringFromWasm0(arg1, arg2));
|
2152
2927
|
return addHeapObject(ret);
|
2153
2928
|
}, arguments) };
|
2154
|
-
imports.wbg.
|
2155
|
-
const ret = makeMutClosure(arg0, arg1,
|
2929
|
+
imports.wbg.__wbindgen_closure_wrapper2639 = function(arg0, arg1, arg2) {
|
2930
|
+
const ret = makeMutClosure(arg0, arg1, 142, __wbg_adapter_52);
|
2156
2931
|
return addHeapObject(ret);
|
2157
2932
|
};
|
2158
|
-
imports.wbg.
|
2159
|
-
const ret = makeMutClosure(arg0, arg1,
|
2933
|
+
imports.wbg.__wbindgen_closure_wrapper4541 = function(arg0, arg1, arg2) {
|
2934
|
+
const ret = makeMutClosure(arg0, arg1, 142, __wbg_adapter_55);
|
2160
2935
|
return addHeapObject(ret);
|
2161
2936
|
};
|
2162
2937
|
|
@@ -2189,9 +2964,7 @@ function initSync(module) {
|
|
2189
2964
|
}
|
2190
2965
|
|
2191
2966
|
async function init(input) {
|
2192
|
-
|
2193
|
-
input = new URL('index_bg.wasm', import.meta.url);
|
2194
|
-
}
|
2967
|
+
|
2195
2968
|
const imports = getImports();
|
2196
2969
|
|
2197
2970
|
if (typeof input === 'string' || (typeof Request === 'function' && input instanceof Request) || (typeof URL === 'function' && input instanceof URL)) {
|
@@ -2208,6 +2981,9 @@ var exports = /*#__PURE__*/Object.freeze({
|
|
2208
2981
|
version: version,
|
2209
2982
|
WirePolicy: WirePolicy$1,
|
2210
2983
|
Ciphersuite: Ciphersuite$1,
|
2984
|
+
AcmeChallenge: AcmeChallenge,
|
2985
|
+
AcmeDirectory: AcmeDirectory,
|
2986
|
+
AcmeFinalize: AcmeFinalize,
|
2211
2987
|
CommitBundle: CommitBundle,
|
2212
2988
|
ConversationConfiguration: ConversationConfiguration,
|
2213
2989
|
ConversationInitBundle: ConversationInitBundle,
|
@@ -2217,8 +2993,11 @@ var exports = /*#__PURE__*/Object.freeze({
|
|
2217
2993
|
DecryptedMessage: DecryptedMessage,
|
2218
2994
|
Invitee: Invitee,
|
2219
2995
|
MemberAddedMessages: MemberAddedMessages,
|
2996
|
+
NewAcmeAuthz: NewAcmeAuthz,
|
2997
|
+
NewAcmeOrder: NewAcmeOrder,
|
2220
2998
|
ProposalBundle: ProposalBundle,
|
2221
2999
|
PublicGroupStateBundle: PublicGroupStateBundle,
|
3000
|
+
WireE2eIdentity: WireE2eIdentity$1,
|
2222
3001
|
initSync: initSync,
|
2223
3002
|
'default': init
|
2224
3003
|
});
|
@@ -2226,7 +3005,7 @@ var exports = /*#__PURE__*/Object.freeze({
|
|
2226
3005
|
var wasm = async (opt = {}) => {
|
2227
3006
|
let {importHook, serverPath} = opt;
|
2228
3007
|
|
2229
|
-
let path = "assets/core_crypto_ffi-
|
3008
|
+
let path = "assets/core_crypto_ffi-7a5675cc.wasm";
|
2230
3009
|
|
2231
3010
|
if (serverPath != null) {
|
2232
3011
|
path = serverPath + /[^\/\\]*$/.exec(path)[0];
|
@@ -2242,39 +3021,39 @@ var wasm = async (opt = {}) => {
|
|
2242
3021
|
|
2243
3022
|
// Wire
|
2244
3023
|
// Copyright (C) 2022 Wire Swiss GmbH
|
2245
|
-
var _a, _CoreCrypto_module, _CoreCrypto_cc;
|
3024
|
+
var _a, _CoreCrypto_module, _CoreCrypto_cc, _b, _WireE2eIdentity_module, _WireE2eIdentity_e2ei;
|
2246
3025
|
/**
|
2247
|
-
* see [core_crypto::prelude::CiphersuiteName]
|
2248
|
-
*/
|
3026
|
+
* see [core_crypto::prelude::CiphersuiteName]
|
3027
|
+
*/
|
2249
3028
|
var Ciphersuite;
|
2250
3029
|
(function (Ciphersuite) {
|
2251
3030
|
/**
|
2252
|
-
|
2253
|
-
|
3031
|
+
* DH KEM x25519 | AES-GCM 128 | SHA2-256 | Ed25519
|
3032
|
+
*/
|
2254
3033
|
Ciphersuite[Ciphersuite["MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519"] = 1] = "MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519";
|
2255
3034
|
/**
|
2256
|
-
|
2257
|
-
|
3035
|
+
* DH KEM P256 | AES-GCM 128 | SHA2-256 | EcDSA P256
|
3036
|
+
*/
|
2258
3037
|
Ciphersuite[Ciphersuite["MLS_128_DHKEMP256_AES128GCM_SHA256_P256"] = 2] = "MLS_128_DHKEMP256_AES128GCM_SHA256_P256";
|
2259
3038
|
/**
|
2260
|
-
|
2261
|
-
|
3039
|
+
* DH KEM x25519 | Chacha20Poly1305 | SHA2-256 | Ed25519
|
3040
|
+
*/
|
2262
3041
|
Ciphersuite[Ciphersuite["MLS_128_DHKEMX25519_CHACHA20POLY1305_SHA256_Ed25519"] = 3] = "MLS_128_DHKEMX25519_CHACHA20POLY1305_SHA256_Ed25519";
|
2263
3042
|
/**
|
2264
|
-
|
2265
|
-
|
3043
|
+
* DH KEM x448 | AES-GCM 256 | SHA2-512 | Ed448
|
3044
|
+
*/
|
2266
3045
|
Ciphersuite[Ciphersuite["MLS_256_DHKEMX448_AES256GCM_SHA512_Ed448"] = 4] = "MLS_256_DHKEMX448_AES256GCM_SHA512_Ed448";
|
2267
3046
|
/**
|
2268
|
-
|
2269
|
-
|
3047
|
+
* DH KEM P521 | AES-GCM 256 | SHA2-512 | EcDSA P521
|
3048
|
+
*/
|
2270
3049
|
Ciphersuite[Ciphersuite["MLS_256_DHKEMP521_AES256GCM_SHA512_P521"] = 5] = "MLS_256_DHKEMP521_AES256GCM_SHA512_P521";
|
2271
3050
|
/**
|
2272
|
-
|
2273
|
-
|
3051
|
+
* DH KEM x448 | Chacha20Poly1305 | SHA2-512 | Ed448
|
3052
|
+
*/
|
2274
3053
|
Ciphersuite[Ciphersuite["MLS_256_DHKEMX448_CHACHA20POLY1305_SHA512_Ed448"] = 6] = "MLS_256_DHKEMX448_CHACHA20POLY1305_SHA512_Ed448";
|
2275
3054
|
/**
|
2276
|
-
|
2277
|
-
|
3055
|
+
* DH KEM P384 | AES-GCM 256 | SHA2-384 | EcDSA P384
|
3056
|
+
*/
|
2278
3057
|
Ciphersuite[Ciphersuite["MLS_256_DHKEMP384_AES256GCM_SHA384_P384"] = 7] = "MLS_256_DHKEMP384_AES256GCM_SHA384_P384";
|
2279
3058
|
})(Ciphersuite || (Ciphersuite = {}));
|
2280
3059
|
/**
|
@@ -2820,7 +3599,7 @@ class CoreCrypto {
|
|
2820
3599
|
* **CAUTION**: only use this when you had an explicit response from the Delivery Service
|
2821
3600
|
* e.g. 403. Do not use otherwise e.g. 5xx responses, timeout etc..
|
2822
3601
|
* **DO NOT** use when Delivery Service responds 409, pending state will be renewed
|
2823
|
-
* in {@link CoreCrypto.
|
3602
|
+
* in {@link CoreCrypto.decryptMessage}
|
2824
3603
|
*
|
2825
3604
|
* @param conversationId - The group's ID
|
2826
3605
|
*/
|
@@ -3006,7 +3785,7 @@ class CoreCrypto {
|
|
3006
3785
|
*
|
3007
3786
|
* @param prekey - the prekey bundle to get the fingerprint from
|
3008
3787
|
* @returns Hex-encoded public key string
|
3009
|
-
|
3788
|
+
**/
|
3010
3789
|
static proteusFingerprintPrekeybundle(prekey) {
|
3011
3790
|
return __classPrivateFieldGet(this, _a, "f", _CoreCrypto_module).CoreCrypto.proteus_fingerprint_prekeybundle(prekey);
|
3012
3791
|
}
|
@@ -3018,6 +3797,18 @@ class CoreCrypto {
|
|
3018
3797
|
async proteusCryptoboxMigrate(storeName) {
|
3019
3798
|
return await __classPrivateFieldGet(this, _CoreCrypto_cc, "f").proteus_cryptobox_migrate(storeName);
|
3020
3799
|
}
|
3800
|
+
/**
|
3801
|
+
* Creates an enrollment instance with private key material you can use in order to fetch
|
3802
|
+
* a new x509 certificate from the acme server.
|
3803
|
+
* Make sure to call [WireE2eIdentity::free] (not yet available) to dispose this instance and its associated
|
3804
|
+
* keying material.
|
3805
|
+
*
|
3806
|
+
* @param ciphersuite - For generating signing key material. Only {@link Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519} is supported currently
|
3807
|
+
*/
|
3808
|
+
async newAcmeEnrollment() {
|
3809
|
+
const e2ei = await __classPrivateFieldGet(this, _CoreCrypto_cc, "f").new_acme_enrollment(Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519);
|
3810
|
+
return new WireE2eIdentity(e2ei, __classPrivateFieldGet(CoreCrypto, _a, "f", _CoreCrypto_module));
|
3811
|
+
}
|
3021
3812
|
/**
|
3022
3813
|
* Returns the current version of {@link CoreCrypto}
|
3023
3814
|
*
|
@@ -3033,5 +3824,197 @@ class CoreCrypto {
|
|
3033
3824
|
_a = CoreCrypto, _CoreCrypto_cc = new WeakMap();
|
3034
3825
|
/** @hidden */
|
3035
3826
|
_CoreCrypto_module = { value: void 0 };
|
3827
|
+
class WireE2eIdentity {
|
3828
|
+
/** @hidden */
|
3829
|
+
constructor(e2ei, module) {
|
3830
|
+
/** @hidden */
|
3831
|
+
_WireE2eIdentity_e2ei.set(this, void 0);
|
3832
|
+
__classPrivateFieldSet(this, _WireE2eIdentity_e2ei, e2ei, "f");
|
3833
|
+
if (!__classPrivateFieldGet(WireE2eIdentity, _b, "f", _WireE2eIdentity_module)) {
|
3834
|
+
__classPrivateFieldSet(WireE2eIdentity, _b, module, "f", _WireE2eIdentity_module);
|
3835
|
+
}
|
3836
|
+
}
|
3837
|
+
/**
|
3838
|
+
* Parses the response from `GET /acme/{provisioner-name}/directory`.
|
3839
|
+
* Use this {@link AcmeDirectory} in the next step to fetch the first nonce from the acme server. Use
|
3840
|
+
* {@link AcmeDirectory.newNonce}.
|
3841
|
+
*
|
3842
|
+
* @param directory HTTP response body
|
3843
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.1.1
|
3844
|
+
*/
|
3845
|
+
directoryResponse(directory) {
|
3846
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").directory_response(directory);
|
3847
|
+
}
|
3848
|
+
/**
|
3849
|
+
* For creating a new acme account. This returns a signed JWS-alike request body to send to
|
3850
|
+
* `POST /acme/{provisioner-name}/new-account`.
|
3851
|
+
*
|
3852
|
+
* @param directory you got from {@link directoryResponse}
|
3853
|
+
* @param previousNonce you got from calling `HEAD {@link AcmeDirectory.newNonce}`
|
3854
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.3
|
3855
|
+
*/
|
3856
|
+
newAccountRequest(directory, previousNonce) {
|
3857
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_account_request(directory, previousNonce);
|
3858
|
+
}
|
3859
|
+
/**
|
3860
|
+
* Parses the response from `POST /acme/{provisioner-name}/new-account`.
|
3861
|
+
* @param account HTTP response body
|
3862
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.3
|
3863
|
+
*/
|
3864
|
+
newAccountResponse(account) {
|
3865
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_account_response(account);
|
3866
|
+
}
|
3867
|
+
/**
|
3868
|
+
* Creates a new acme order for the handle (userId + display name) and the clientId.
|
3869
|
+
*
|
3870
|
+
* @param handle domain of the authorization server e.g. `idp.example.org`
|
3871
|
+
* @param clientId domain of the wire-server e.g. `wire.example.org`
|
3872
|
+
* @param expiryDays generated x509 certificate expiry
|
3873
|
+
* @param directory you got from {@link directoryResponse}
|
3874
|
+
* @param account you got from {@link newAccountResponse}
|
3875
|
+
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/new-account`
|
3876
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
3877
|
+
*/
|
3878
|
+
newOrderRequest(handle, clientId, expiryDays, directory, account, previousNonce) {
|
3879
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_order_request(handle, clientId, expiryDays, directory, account, previousNonce);
|
3880
|
+
}
|
3881
|
+
/**
|
3882
|
+
* Parses the response from `POST /acme/{provisioner-name}/new-order`.
|
3883
|
+
*
|
3884
|
+
* @param order HTTP response body
|
3885
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
3886
|
+
*/
|
3887
|
+
newOrderResponse(order) {
|
3888
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_order_response(order);
|
3889
|
+
}
|
3890
|
+
/**
|
3891
|
+
* Creates a new authorization request.
|
3892
|
+
*
|
3893
|
+
* @param url one of the URL in new order's authorizations (use {@link NewAcmeOrder.authorizations} from {@link newOrderResponse})
|
3894
|
+
* @param account you got from {@link newAccountResponse}
|
3895
|
+
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/new-order` (or from the
|
3896
|
+
* previous to this method if you are creating the second authorization)
|
3897
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5
|
3898
|
+
*/
|
3899
|
+
newAuthzRequest(url, account, previousNonce) {
|
3900
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_authz_request(url, account, previousNonce);
|
3901
|
+
}
|
3902
|
+
/**
|
3903
|
+
* Parses the response from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
3904
|
+
*
|
3905
|
+
* You then have to map the challenge from this authorization object. The `client_id_challenge`
|
3906
|
+
* will be the one with the `client_id_host` (you supplied to {@link newOrderRequest}) identifier,
|
3907
|
+
* the other will be your `handle_challenge`.
|
3908
|
+
*
|
3909
|
+
* @param authz HTTP response body
|
3910
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5
|
3911
|
+
*/
|
3912
|
+
newAuthzResponse(authz) {
|
3913
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_authz_response(authz);
|
3914
|
+
}
|
3915
|
+
/**
|
3916
|
+
* Generates a new client Dpop JWT token. It demonstrates proof of possession of the nonces
|
3917
|
+
* (from wire-server & acme server) and will be verified by the acme server when verifying the
|
3918
|
+
* challenge (in order to deliver a certificate).
|
3919
|
+
*
|
3920
|
+
* Then send it to `POST /clients/{id}/access-token`
|
3921
|
+
* {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token} on wire-server.
|
3922
|
+
*
|
3923
|
+
* @param accessTokenUrl backend endpoint where this token will be sent. Should be this one {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token}
|
3924
|
+
* @param userId an UUIDv4 uniquely identifying the user
|
3925
|
+
* @param clientId client identifier
|
3926
|
+
* @param domain owning backend domain e.g. `wire.com`
|
3927
|
+
* @param clientIdChallenge you found after {@link newAuthzResponse}
|
3928
|
+
* @param backendNonce you get by calling `GET /clients/token/nonce` on wire-server as defined here {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/get_clients__client__nonce}
|
3929
|
+
* @param expiryDays token expiry in days
|
3930
|
+
*/
|
3931
|
+
createDpopToken(accessTokenUrl, userId, clientId, domain, clientIdChallenge, backendNonce, expiryDays) {
|
3932
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").create_dpop_token(accessTokenUrl, userId, clientId, domain, clientIdChallenge, backendNonce, expiryDays);
|
3933
|
+
}
|
3934
|
+
/**
|
3935
|
+
* Creates a new challenge request.
|
3936
|
+
*
|
3937
|
+
* @param handleChallenge you found after {@link newAuthzResponse}
|
3938
|
+
* @param account you found after {@link newAccountResponse}
|
3939
|
+
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
3940
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
3941
|
+
*/
|
3942
|
+
newChallengeRequest(handleChallenge, account, previousNonce) {
|
3943
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_challenge_request(handleChallenge, account, previousNonce);
|
3944
|
+
}
|
3945
|
+
/**
|
3946
|
+
* Parses the response from `POST /acme/{provisioner-name}/challenge/{challenge-id}`.
|
3947
|
+
*
|
3948
|
+
* @param challenge HTTP response body
|
3949
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
3950
|
+
*/
|
3951
|
+
newChallengeResponse(challenge) {
|
3952
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_challenge_response(challenge);
|
3953
|
+
}
|
3954
|
+
/**
|
3955
|
+
* Verifies that the previous challenge has been completed.
|
3956
|
+
*
|
3957
|
+
* @param orderUrl `location` header from http response you got from {@link newOrderResponse}
|
3958
|
+
* @param account you found after {@link newAccountResponse}
|
3959
|
+
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/challenge/{challenge-id}`
|
3960
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
3961
|
+
*/
|
3962
|
+
checkOrderRequest(orderUrl, account, previousNonce) {
|
3963
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").check_order_request(orderUrl, account, previousNonce);
|
3964
|
+
}
|
3965
|
+
/**
|
3966
|
+
* Parses the response from `POST /acme/{provisioner-name}/order/{order-id}`.
|
3967
|
+
*
|
3968
|
+
* @param order HTTP response body
|
3969
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
3970
|
+
*/
|
3971
|
+
checkOrderResponse(order) {
|
3972
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").check_order_response(order);
|
3973
|
+
}
|
3974
|
+
/**
|
3975
|
+
* Final step before fetching the certificate.
|
3976
|
+
*
|
3977
|
+
* @param domains you want to generate a certificate for e.g. `["wire.com"]`
|
3978
|
+
* @param order you got from {@link checkOrderResponse}
|
3979
|
+
* @param account you found after {@link newAccountResponse}
|
3980
|
+
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/order/{order-id}`
|
3981
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
3982
|
+
*/
|
3983
|
+
finalizeRequest(domains, order, account, previousNonce) {
|
3984
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").finalize_request(domains, order, account, previousNonce);
|
3985
|
+
}
|
3986
|
+
/**
|
3987
|
+
* Parses the response from `POST /acme/{provisioner-name}/order/{order-id}/finalize`.
|
3988
|
+
*
|
3989
|
+
* @param finalize HTTP response body
|
3990
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
3991
|
+
*/
|
3992
|
+
finalizeResponse(finalize) {
|
3993
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").finalize_response(finalize);
|
3994
|
+
}
|
3995
|
+
/**
|
3996
|
+
* Creates a request for finally fetching the x509 certificate.
|
3997
|
+
*
|
3998
|
+
* @param finalize you got from {@link finalizeResponse}
|
3999
|
+
* @param account you got from {@link newAccountResponse}
|
4000
|
+
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/order/{order-id}/finalize`
|
4001
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4.2
|
4002
|
+
*/
|
4003
|
+
certificateRequest(finalize, account, previousNonce) {
|
4004
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").certificate_request(finalize, account, previousNonce);
|
4005
|
+
}
|
4006
|
+
/**
|
4007
|
+
* Parses the response from `POST /acme/{provisioner-name}/certificate/{certificate-id}`.
|
4008
|
+
*
|
4009
|
+
* @param certificateChain HTTP string response body
|
4010
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4.2
|
4011
|
+
*/
|
4012
|
+
certificateResponse(certificateChain) {
|
4013
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").certificate_response(certificateChain);
|
4014
|
+
}
|
4015
|
+
}
|
4016
|
+
_b = WireE2eIdentity, _WireE2eIdentity_e2ei = new WeakMap();
|
4017
|
+
/** @hidden */
|
4018
|
+
_WireE2eIdentity_module = { value: void 0 };
|
3036
4019
|
|
3037
|
-
export { Ciphersuite, CoreCrypto, ExternalProposalType, ProposalType, PublicGroupStateEncryptionType, RatchetTreeType, WirePolicy };
|
4020
|
+
export { Ciphersuite, CoreCrypto, ExternalProposalType, ProposalType, PublicGroupStateEncryptionType, RatchetTreeType, WireE2eIdentity, WirePolicy };
|