@wireapp/core-crypto 0.6.0-rc.3 → 0.6.0-rc.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -252,7 +252,7 @@ function makeMutClosure(arg0, arg1, dtor, f) {
|
|
252
252
|
function __wbg_adapter_52(arg0, arg1, arg2) {
|
253
253
|
try {
|
254
254
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
255
|
-
wasm$1.
|
255
|
+
wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h577395c5a39b7036(retptr, arg0, arg1, addHeapObject(arg2));
|
256
256
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
257
257
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
258
258
|
if (r1) {
|
@@ -264,31 +264,7 @@ function __wbg_adapter_52(arg0, arg1, arg2) {
|
|
264
264
|
}
|
265
265
|
|
266
266
|
function __wbg_adapter_55(arg0, arg1, arg2) {
|
267
|
-
wasm$1.
|
268
|
-
}
|
269
|
-
|
270
|
-
/**
|
271
|
-
* Returns the current version of CoreCrypto
|
272
|
-
* @returns {string}
|
273
|
-
*/
|
274
|
-
function version() {
|
275
|
-
try {
|
276
|
-
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
277
|
-
wasm$1.version(retptr);
|
278
|
-
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
279
|
-
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
280
|
-
return getStringFromWasm0(r0, r1);
|
281
|
-
} finally {
|
282
|
-
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
283
|
-
wasm$1.__wbindgen_free(r0, r1);
|
284
|
-
}
|
285
|
-
}
|
286
|
-
|
287
|
-
function passArray8ToWasm0(arg, malloc) {
|
288
|
-
const ptr = malloc(arg.length * 1);
|
289
|
-
getUint8Memory0().set(arg, ptr / 1);
|
290
|
-
WASM_VECTOR_LEN = arg.length;
|
291
|
-
return ptr;
|
267
|
+
wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h6fecff61d3f85de1(arg0, arg1, addHeapObject(arg2));
|
292
268
|
}
|
293
269
|
|
294
270
|
function _assertClass(instance, klass) {
|
@@ -317,6 +293,39 @@ function passArrayJsValueToWasm0(array, malloc) {
|
|
317
293
|
return ptr;
|
318
294
|
}
|
319
295
|
|
296
|
+
function passArray8ToWasm0(arg, malloc) {
|
297
|
+
const ptr = malloc(arg.length * 1);
|
298
|
+
getUint8Memory0().set(arg, ptr / 1);
|
299
|
+
WASM_VECTOR_LEN = arg.length;
|
300
|
+
return ptr;
|
301
|
+
}
|
302
|
+
|
303
|
+
function getArrayJsValueFromWasm0(ptr, len) {
|
304
|
+
const mem = getUint32Memory0();
|
305
|
+
const slice = mem.subarray(ptr / 4, ptr / 4 + len);
|
306
|
+
const result = [];
|
307
|
+
for (let i = 0; i < slice.length; i++) {
|
308
|
+
result.push(takeObject(slice[i]));
|
309
|
+
}
|
310
|
+
return result;
|
311
|
+
}
|
312
|
+
/**
|
313
|
+
* Returns the current version of CoreCrypto
|
314
|
+
* @returns {string}
|
315
|
+
*/
|
316
|
+
function version() {
|
317
|
+
try {
|
318
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
319
|
+
wasm$1.version(retptr);
|
320
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
321
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
322
|
+
return getStringFromWasm0(r0, r1);
|
323
|
+
} finally {
|
324
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
325
|
+
wasm$1.__wbindgen_free(r0, r1);
|
326
|
+
}
|
327
|
+
}
|
328
|
+
|
320
329
|
function handleError(f, args) {
|
321
330
|
try {
|
322
331
|
return f.apply(this, args);
|
@@ -328,8 +337,8 @@ function handleError(f, args) {
|
|
328
337
|
function getArrayU8FromWasm0(ptr, len) {
|
329
338
|
return getUint8Memory0().subarray(ptr / 1, ptr / 1 + len);
|
330
339
|
}
|
331
|
-
function
|
332
|
-
wasm$1.
|
340
|
+
function __wbg_adapter_260(arg0, arg1, arg2, arg3) {
|
341
|
+
wasm$1.wasm_bindgen__convert__closures__invoke2_mut__ha446eb95921e2107(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
|
333
342
|
}
|
334
343
|
|
335
344
|
/**
|
@@ -377,6 +386,202 @@ MLS_256_DHKEMX448_CHACHA20POLY1305_SHA512_Ed448:6,"6":"MLS_256_DHKEMX448_CHACHA2
|
|
377
386
|
*/
|
378
387
|
MLS_256_DHKEMP384_AES256GCM_SHA384_P384:7,"7":"MLS_256_DHKEMP384_AES256GCM_SHA384_P384", });
|
379
388
|
/**
|
389
|
+
* See [core_crypto::e2e_identity::types::E2eiAcmeChallenge]
|
390
|
+
*/
|
391
|
+
class AcmeChallenge {
|
392
|
+
|
393
|
+
static __wrap(ptr) {
|
394
|
+
const obj = Object.create(AcmeChallenge.prototype);
|
395
|
+
obj.ptr = ptr;
|
396
|
+
|
397
|
+
return obj;
|
398
|
+
}
|
399
|
+
|
400
|
+
__destroy_into_raw() {
|
401
|
+
const ptr = this.ptr;
|
402
|
+
this.ptr = 0;
|
403
|
+
|
404
|
+
return ptr;
|
405
|
+
}
|
406
|
+
|
407
|
+
free() {
|
408
|
+
const ptr = this.__destroy_into_raw();
|
409
|
+
wasm$1.__wbg_acmechallenge_free(ptr);
|
410
|
+
}
|
411
|
+
/**
|
412
|
+
* @param {Uint8Array} delegate
|
413
|
+
* @param {string} url
|
414
|
+
*/
|
415
|
+
constructor(delegate, url) {
|
416
|
+
const ptr0 = passStringToWasm0(url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
417
|
+
const len0 = WASM_VECTOR_LEN;
|
418
|
+
const ret = wasm$1.acmechallenge_new(addHeapObject(delegate), ptr0, len0);
|
419
|
+
return AcmeChallenge.__wrap(ret);
|
420
|
+
}
|
421
|
+
/**
|
422
|
+
* @returns {Uint8Array}
|
423
|
+
*/
|
424
|
+
get delegate() {
|
425
|
+
const ret = wasm$1.acmechallenge_delegate(this.ptr);
|
426
|
+
return takeObject(ret);
|
427
|
+
}
|
428
|
+
/**
|
429
|
+
* @returns {string}
|
430
|
+
*/
|
431
|
+
get url() {
|
432
|
+
try {
|
433
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
434
|
+
wasm$1.acmechallenge_url(retptr, this.ptr);
|
435
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
436
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
437
|
+
return getStringFromWasm0(r0, r1);
|
438
|
+
} finally {
|
439
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
440
|
+
wasm$1.__wbindgen_free(r0, r1);
|
441
|
+
}
|
442
|
+
}
|
443
|
+
}
|
444
|
+
/**
|
445
|
+
* See [core_crypto::e2e_identity::types::E2eiAcmeDirectory]
|
446
|
+
*/
|
447
|
+
class AcmeDirectory {
|
448
|
+
|
449
|
+
static __wrap(ptr) {
|
450
|
+
const obj = Object.create(AcmeDirectory.prototype);
|
451
|
+
obj.ptr = ptr;
|
452
|
+
|
453
|
+
return obj;
|
454
|
+
}
|
455
|
+
|
456
|
+
__destroy_into_raw() {
|
457
|
+
const ptr = this.ptr;
|
458
|
+
this.ptr = 0;
|
459
|
+
|
460
|
+
return ptr;
|
461
|
+
}
|
462
|
+
|
463
|
+
free() {
|
464
|
+
const ptr = this.__destroy_into_raw();
|
465
|
+
wasm$1.__wbg_acmedirectory_free(ptr);
|
466
|
+
}
|
467
|
+
/**
|
468
|
+
* @param {string} new_nonce
|
469
|
+
* @param {string} new_account
|
470
|
+
* @param {string} new_order
|
471
|
+
*/
|
472
|
+
constructor(new_nonce, new_account, new_order) {
|
473
|
+
const ptr0 = passStringToWasm0(new_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
474
|
+
const len0 = WASM_VECTOR_LEN;
|
475
|
+
const ptr1 = passStringToWasm0(new_account, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
476
|
+
const len1 = WASM_VECTOR_LEN;
|
477
|
+
const ptr2 = passStringToWasm0(new_order, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
478
|
+
const len2 = WASM_VECTOR_LEN;
|
479
|
+
const ret = wasm$1.acmedirectory_new(ptr0, len0, ptr1, len1, ptr2, len2);
|
480
|
+
return AcmeDirectory.__wrap(ret);
|
481
|
+
}
|
482
|
+
/**
|
483
|
+
* @returns {string}
|
484
|
+
*/
|
485
|
+
get new_nonce() {
|
486
|
+
try {
|
487
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
488
|
+
wasm$1.acmedirectory_new_nonce(retptr, this.ptr);
|
489
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
490
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
491
|
+
return getStringFromWasm0(r0, r1);
|
492
|
+
} finally {
|
493
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
494
|
+
wasm$1.__wbindgen_free(r0, r1);
|
495
|
+
}
|
496
|
+
}
|
497
|
+
/**
|
498
|
+
* @returns {string}
|
499
|
+
*/
|
500
|
+
get new_account() {
|
501
|
+
try {
|
502
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
503
|
+
wasm$1.acmechallenge_url(retptr, this.ptr);
|
504
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
505
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
506
|
+
return getStringFromWasm0(r0, r1);
|
507
|
+
} finally {
|
508
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
509
|
+
wasm$1.__wbindgen_free(r0, r1);
|
510
|
+
}
|
511
|
+
}
|
512
|
+
/**
|
513
|
+
* @returns {string}
|
514
|
+
*/
|
515
|
+
get new_order() {
|
516
|
+
try {
|
517
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
518
|
+
wasm$1.acmedirectory_new_order(retptr, this.ptr);
|
519
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
520
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
521
|
+
return getStringFromWasm0(r0, r1);
|
522
|
+
} finally {
|
523
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
524
|
+
wasm$1.__wbindgen_free(r0, r1);
|
525
|
+
}
|
526
|
+
}
|
527
|
+
}
|
528
|
+
/**
|
529
|
+
* See [core_crypto::e2e_identity::types::E2eiAcmeFinalize]
|
530
|
+
*/
|
531
|
+
class AcmeFinalize {
|
532
|
+
|
533
|
+
static __wrap(ptr) {
|
534
|
+
const obj = Object.create(AcmeFinalize.prototype);
|
535
|
+
obj.ptr = ptr;
|
536
|
+
|
537
|
+
return obj;
|
538
|
+
}
|
539
|
+
|
540
|
+
__destroy_into_raw() {
|
541
|
+
const ptr = this.ptr;
|
542
|
+
this.ptr = 0;
|
543
|
+
|
544
|
+
return ptr;
|
545
|
+
}
|
546
|
+
|
547
|
+
free() {
|
548
|
+
const ptr = this.__destroy_into_raw();
|
549
|
+
wasm$1.__wbg_acmefinalize_free(ptr);
|
550
|
+
}
|
551
|
+
/**
|
552
|
+
* @param {Uint8Array} delegate
|
553
|
+
* @param {string} certificate_url
|
554
|
+
*/
|
555
|
+
constructor(delegate, certificate_url) {
|
556
|
+
const ptr0 = passStringToWasm0(certificate_url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
557
|
+
const len0 = WASM_VECTOR_LEN;
|
558
|
+
const ret = wasm$1.acmechallenge_new(addHeapObject(delegate), ptr0, len0);
|
559
|
+
return AcmeFinalize.__wrap(ret);
|
560
|
+
}
|
561
|
+
/**
|
562
|
+
* @returns {Uint8Array}
|
563
|
+
*/
|
564
|
+
get delegate() {
|
565
|
+
const ret = wasm$1.acmechallenge_delegate(this.ptr);
|
566
|
+
return takeObject(ret);
|
567
|
+
}
|
568
|
+
/**
|
569
|
+
* @returns {string}
|
570
|
+
*/
|
571
|
+
get certificate_url() {
|
572
|
+
try {
|
573
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
574
|
+
wasm$1.acmechallenge_url(retptr, this.ptr);
|
575
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
576
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
577
|
+
return getStringFromWasm0(r0, r1);
|
578
|
+
} finally {
|
579
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
580
|
+
wasm$1.__wbindgen_free(r0, r1);
|
581
|
+
}
|
582
|
+
}
|
583
|
+
}
|
584
|
+
/**
|
380
585
|
*/
|
381
586
|
class CommitBundle {
|
382
587
|
|
@@ -1233,6 +1438,15 @@ class CoreCrypto$1 {
|
|
1233
1438
|
const ret = wasm$1.corecrypto_get_client_ids(this.ptr, ptr0, len0);
|
1234
1439
|
return takeObject(ret);
|
1235
1440
|
}
|
1441
|
+
/**
|
1442
|
+
* see [core_crypto::MlsCentral::new_acme_enrollment]
|
1443
|
+
* @param {number} ciphersuite
|
1444
|
+
* @returns {Promise<WireE2eIdentity>}
|
1445
|
+
*/
|
1446
|
+
new_acme_enrollment(ciphersuite) {
|
1447
|
+
const ret = wasm$1.corecrypto_new_acme_enrollment(this.ptr, ciphersuite);
|
1448
|
+
return takeObject(ret);
|
1449
|
+
}
|
1236
1450
|
}
|
1237
1451
|
/**
|
1238
1452
|
* see [core_crypto::prelude::CoreCryptoCallbacks]
|
@@ -1469,6 +1683,130 @@ class MemberAddedMessages {
|
|
1469
1683
|
}
|
1470
1684
|
}
|
1471
1685
|
/**
|
1686
|
+
* See [core_crypto::e2e_identity::types::E2eiNewAcmeAuthz]
|
1687
|
+
*/
|
1688
|
+
class NewAcmeAuthz {
|
1689
|
+
|
1690
|
+
static __wrap(ptr) {
|
1691
|
+
const obj = Object.create(NewAcmeAuthz.prototype);
|
1692
|
+
obj.ptr = ptr;
|
1693
|
+
|
1694
|
+
return obj;
|
1695
|
+
}
|
1696
|
+
|
1697
|
+
__destroy_into_raw() {
|
1698
|
+
const ptr = this.ptr;
|
1699
|
+
this.ptr = 0;
|
1700
|
+
|
1701
|
+
return ptr;
|
1702
|
+
}
|
1703
|
+
|
1704
|
+
free() {
|
1705
|
+
const ptr = this.__destroy_into_raw();
|
1706
|
+
wasm$1.__wbg_newacmeauthz_free(ptr);
|
1707
|
+
}
|
1708
|
+
/**
|
1709
|
+
* @param {string} identifier
|
1710
|
+
* @param {AcmeChallenge | undefined} wire_http_challenge
|
1711
|
+
* @param {AcmeChallenge | undefined} wire_oidc_challenge
|
1712
|
+
*/
|
1713
|
+
constructor(identifier, wire_http_challenge, wire_oidc_challenge) {
|
1714
|
+
const ptr0 = passStringToWasm0(identifier, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1715
|
+
const len0 = WASM_VECTOR_LEN;
|
1716
|
+
let ptr1 = 0;
|
1717
|
+
if (!isLikeNone(wire_http_challenge)) {
|
1718
|
+
_assertClass(wire_http_challenge, AcmeChallenge);
|
1719
|
+
ptr1 = wire_http_challenge.ptr;
|
1720
|
+
wire_http_challenge.ptr = 0;
|
1721
|
+
}
|
1722
|
+
let ptr2 = 0;
|
1723
|
+
if (!isLikeNone(wire_oidc_challenge)) {
|
1724
|
+
_assertClass(wire_oidc_challenge, AcmeChallenge);
|
1725
|
+
ptr2 = wire_oidc_challenge.ptr;
|
1726
|
+
wire_oidc_challenge.ptr = 0;
|
1727
|
+
}
|
1728
|
+
const ret = wasm$1.newacmeauthz_new(ptr0, len0, ptr1, ptr2);
|
1729
|
+
return NewAcmeAuthz.__wrap(ret);
|
1730
|
+
}
|
1731
|
+
/**
|
1732
|
+
* @returns {string}
|
1733
|
+
*/
|
1734
|
+
get identifier() {
|
1735
|
+
try {
|
1736
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1737
|
+
wasm$1.acmedirectory_new_nonce(retptr, this.ptr);
|
1738
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1739
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1740
|
+
return getStringFromWasm0(r0, r1);
|
1741
|
+
} finally {
|
1742
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
1743
|
+
wasm$1.__wbindgen_free(r0, r1);
|
1744
|
+
}
|
1745
|
+
}
|
1746
|
+
/**
|
1747
|
+
* @returns {AcmeChallenge | undefined}
|
1748
|
+
*/
|
1749
|
+
get wire_http_challenge() {
|
1750
|
+
const ret = wasm$1.newacmeauthz_wire_http_challenge(this.ptr);
|
1751
|
+
return ret === 0 ? undefined : AcmeChallenge.__wrap(ret);
|
1752
|
+
}
|
1753
|
+
/**
|
1754
|
+
* @returns {AcmeChallenge | undefined}
|
1755
|
+
*/
|
1756
|
+
get wire_oidc_challenge() {
|
1757
|
+
const ret = wasm$1.newacmeauthz_wire_oidc_challenge(this.ptr);
|
1758
|
+
return ret === 0 ? undefined : AcmeChallenge.__wrap(ret);
|
1759
|
+
}
|
1760
|
+
}
|
1761
|
+
/**
|
1762
|
+
* See [core_crypto::e2e_identity::types::E2eiNewAcmeOrder]
|
1763
|
+
*/
|
1764
|
+
class NewAcmeOrder {
|
1765
|
+
|
1766
|
+
static __wrap(ptr) {
|
1767
|
+
const obj = Object.create(NewAcmeOrder.prototype);
|
1768
|
+
obj.ptr = ptr;
|
1769
|
+
|
1770
|
+
return obj;
|
1771
|
+
}
|
1772
|
+
|
1773
|
+
__destroy_into_raw() {
|
1774
|
+
const ptr = this.ptr;
|
1775
|
+
this.ptr = 0;
|
1776
|
+
|
1777
|
+
return ptr;
|
1778
|
+
}
|
1779
|
+
|
1780
|
+
free() {
|
1781
|
+
const ptr = this.__destroy_into_raw();
|
1782
|
+
wasm$1.__wbg_newacmeorder_free(ptr);
|
1783
|
+
}
|
1784
|
+
/**
|
1785
|
+
* @param {Uint8Array} delegate
|
1786
|
+
* @param {(Uint8Array)[]} authorizations
|
1787
|
+
*/
|
1788
|
+
constructor(delegate, authorizations) {
|
1789
|
+
const ptr0 = passArrayJsValueToWasm0(authorizations, wasm$1.__wbindgen_malloc);
|
1790
|
+
const len0 = WASM_VECTOR_LEN;
|
1791
|
+
const ret = wasm$1.newacmeorder_new(addHeapObject(delegate), ptr0, len0);
|
1792
|
+
return NewAcmeOrder.__wrap(ret);
|
1793
|
+
}
|
1794
|
+
/**
|
1795
|
+
* @returns {Uint8Array}
|
1796
|
+
*/
|
1797
|
+
get delegate() {
|
1798
|
+
const ret = wasm$1.acmechallenge_delegate(this.ptr);
|
1799
|
+
return takeObject(ret);
|
1800
|
+
}
|
1801
|
+
/**
|
1802
|
+
* @returns {Array<any>}
|
1803
|
+
*/
|
1804
|
+
get authorizations() {
|
1805
|
+
const ret = wasm$1.newacmeorder_authorizations(this.ptr);
|
1806
|
+
return takeObject(ret);
|
1807
|
+
}
|
1808
|
+
}
|
1809
|
+
/**
|
1472
1810
|
*/
|
1473
1811
|
class ProposalBundle {
|
1474
1812
|
|
@@ -1493,60 +1831,467 @@ class ProposalBundle {
|
|
1493
1831
|
/**
|
1494
1832
|
* @returns {Uint8Array}
|
1495
1833
|
*/
|
1496
|
-
get proposal() {
|
1497
|
-
const ret = wasm$1.commitbundle_commit(this.ptr);
|
1498
|
-
return takeObject(ret);
|
1834
|
+
get proposal() {
|
1835
|
+
const ret = wasm$1.commitbundle_commit(this.ptr);
|
1836
|
+
return takeObject(ret);
|
1837
|
+
}
|
1838
|
+
/**
|
1839
|
+
* @returns {Uint8Array}
|
1840
|
+
*/
|
1841
|
+
get proposal_ref() {
|
1842
|
+
const ret = wasm$1.conversationinitbundle_commit(this.ptr);
|
1843
|
+
return takeObject(ret);
|
1844
|
+
}
|
1845
|
+
}
|
1846
|
+
/**
|
1847
|
+
*/
|
1848
|
+
class PublicGroupStateBundle {
|
1849
|
+
|
1850
|
+
static __wrap(ptr) {
|
1851
|
+
const obj = Object.create(PublicGroupStateBundle.prototype);
|
1852
|
+
obj.ptr = ptr;
|
1853
|
+
|
1854
|
+
return obj;
|
1855
|
+
}
|
1856
|
+
|
1857
|
+
__destroy_into_raw() {
|
1858
|
+
const ptr = this.ptr;
|
1859
|
+
this.ptr = 0;
|
1860
|
+
|
1861
|
+
return ptr;
|
1862
|
+
}
|
1863
|
+
|
1864
|
+
free() {
|
1865
|
+
const ptr = this.__destroy_into_raw();
|
1866
|
+
wasm$1.__wbg_publicgroupstatebundle_free(ptr);
|
1867
|
+
}
|
1868
|
+
/**
|
1869
|
+
* @returns {number}
|
1870
|
+
*/
|
1871
|
+
get encryption_type() {
|
1872
|
+
const ret = wasm$1.publicgroupstatebundle_encryption_type(this.ptr);
|
1873
|
+
return ret;
|
1874
|
+
}
|
1875
|
+
/**
|
1876
|
+
* @returns {number}
|
1877
|
+
*/
|
1878
|
+
get ratchet_tree_type() {
|
1879
|
+
const ret = wasm$1.publicgroupstatebundle_ratchet_tree_type(this.ptr);
|
1880
|
+
return ret;
|
1881
|
+
}
|
1882
|
+
/**
|
1883
|
+
* @returns {Uint8Array}
|
1884
|
+
*/
|
1885
|
+
get payload() {
|
1886
|
+
const ret = wasm$1.commitbundle_commit(this.ptr);
|
1887
|
+
return takeObject(ret);
|
1888
|
+
}
|
1889
|
+
}
|
1890
|
+
/**
|
1891
|
+
*/
|
1892
|
+
class WireE2eIdentity$1 {
|
1893
|
+
|
1894
|
+
static __wrap(ptr) {
|
1895
|
+
const obj = Object.create(WireE2eIdentity$1.prototype);
|
1896
|
+
obj.ptr = ptr;
|
1897
|
+
|
1898
|
+
return obj;
|
1899
|
+
}
|
1900
|
+
|
1901
|
+
__destroy_into_raw() {
|
1902
|
+
const ptr = this.ptr;
|
1903
|
+
this.ptr = 0;
|
1904
|
+
|
1905
|
+
return ptr;
|
1906
|
+
}
|
1907
|
+
|
1908
|
+
free() {
|
1909
|
+
const ptr = this.__destroy_into_raw();
|
1910
|
+
wasm$1.__wbg_wiree2eidentity_free(ptr);
|
1911
|
+
}
|
1912
|
+
/**
|
1913
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::directory_response]
|
1914
|
+
* @param {Uint8Array} directory
|
1915
|
+
* @returns {any}
|
1916
|
+
*/
|
1917
|
+
directory_response(directory) {
|
1918
|
+
try {
|
1919
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1920
|
+
const ptr0 = passArray8ToWasm0(directory, wasm$1.__wbindgen_malloc);
|
1921
|
+
const len0 = WASM_VECTOR_LEN;
|
1922
|
+
wasm$1.wiree2eidentity_directory_response(retptr, this.ptr, ptr0, len0);
|
1923
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1924
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1925
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
1926
|
+
if (r2) {
|
1927
|
+
throw takeObject(r1);
|
1928
|
+
}
|
1929
|
+
return takeObject(r0);
|
1930
|
+
} finally {
|
1931
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
1932
|
+
}
|
1933
|
+
}
|
1934
|
+
/**
|
1935
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_account_request]
|
1936
|
+
* @param {any} directory
|
1937
|
+
* @param {string} previous_nonce
|
1938
|
+
* @returns {Uint8Array}
|
1939
|
+
*/
|
1940
|
+
new_account_request(directory, previous_nonce) {
|
1941
|
+
try {
|
1942
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1943
|
+
const ptr0 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1944
|
+
const len0 = WASM_VECTOR_LEN;
|
1945
|
+
wasm$1.wiree2eidentity_new_account_request(retptr, this.ptr, addHeapObject(directory), ptr0, len0);
|
1946
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1947
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1948
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
1949
|
+
if (r2) {
|
1950
|
+
throw takeObject(r1);
|
1951
|
+
}
|
1952
|
+
return takeObject(r0);
|
1953
|
+
} finally {
|
1954
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
1955
|
+
}
|
1956
|
+
}
|
1957
|
+
/**
|
1958
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_account_response]
|
1959
|
+
* @param {Uint8Array} account
|
1960
|
+
* @returns {Uint8Array}
|
1961
|
+
*/
|
1962
|
+
new_account_response(account) {
|
1963
|
+
try {
|
1964
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1965
|
+
wasm$1.wiree2eidentity_new_account_response(retptr, this.ptr, addHeapObject(account));
|
1966
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1967
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1968
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
1969
|
+
if (r2) {
|
1970
|
+
throw takeObject(r1);
|
1971
|
+
}
|
1972
|
+
return takeObject(r0);
|
1973
|
+
} finally {
|
1974
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
1975
|
+
}
|
1976
|
+
}
|
1977
|
+
/**
|
1978
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_order_request]
|
1979
|
+
* @param {string} handle
|
1980
|
+
* @param {string} client_id
|
1981
|
+
* @param {number} expiry_days
|
1982
|
+
* @param {any} directory
|
1983
|
+
* @param {Uint8Array} account
|
1984
|
+
* @param {string} previous_nonce
|
1985
|
+
* @returns {Uint8Array}
|
1986
|
+
*/
|
1987
|
+
new_order_request(handle, client_id, expiry_days, directory, account, previous_nonce) {
|
1988
|
+
try {
|
1989
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1990
|
+
const ptr0 = passStringToWasm0(handle, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1991
|
+
const len0 = WASM_VECTOR_LEN;
|
1992
|
+
const ptr1 = passStringToWasm0(client_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1993
|
+
const len1 = WASM_VECTOR_LEN;
|
1994
|
+
const ptr2 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1995
|
+
const len2 = WASM_VECTOR_LEN;
|
1996
|
+
wasm$1.wiree2eidentity_new_order_request(retptr, this.ptr, ptr0, len0, ptr1, len1, expiry_days, addHeapObject(directory), addHeapObject(account), ptr2, len2);
|
1997
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1998
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1999
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2000
|
+
if (r2) {
|
2001
|
+
throw takeObject(r1);
|
2002
|
+
}
|
2003
|
+
return takeObject(r0);
|
2004
|
+
} finally {
|
2005
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2006
|
+
}
|
2007
|
+
}
|
2008
|
+
/**
|
2009
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_order_response]
|
2010
|
+
* @param {Uint8Array} order
|
2011
|
+
* @returns {any}
|
2012
|
+
*/
|
2013
|
+
new_order_response(order) {
|
2014
|
+
try {
|
2015
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2016
|
+
wasm$1.wiree2eidentity_new_order_response(retptr, this.ptr, addHeapObject(order));
|
2017
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2018
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2019
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2020
|
+
if (r2) {
|
2021
|
+
throw takeObject(r1);
|
2022
|
+
}
|
2023
|
+
return takeObject(r0);
|
2024
|
+
} finally {
|
2025
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2026
|
+
}
|
2027
|
+
}
|
2028
|
+
/**
|
2029
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_authz_request]
|
2030
|
+
* @param {string} url
|
2031
|
+
* @param {Uint8Array} account
|
2032
|
+
* @param {string} previous_nonce
|
2033
|
+
* @returns {Uint8Array}
|
2034
|
+
*/
|
2035
|
+
new_authz_request(url, account, previous_nonce) {
|
2036
|
+
try {
|
2037
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2038
|
+
const ptr0 = passStringToWasm0(url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2039
|
+
const len0 = WASM_VECTOR_LEN;
|
2040
|
+
const ptr1 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2041
|
+
const len1 = WASM_VECTOR_LEN;
|
2042
|
+
wasm$1.wiree2eidentity_new_authz_request(retptr, this.ptr, ptr0, len0, addHeapObject(account), ptr1, len1);
|
2043
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2044
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2045
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2046
|
+
if (r2) {
|
2047
|
+
throw takeObject(r1);
|
2048
|
+
}
|
2049
|
+
return takeObject(r0);
|
2050
|
+
} finally {
|
2051
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2052
|
+
}
|
2053
|
+
}
|
2054
|
+
/**
|
2055
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_authz_response]
|
2056
|
+
* @param {Uint8Array} authz
|
2057
|
+
* @returns {any}
|
2058
|
+
*/
|
2059
|
+
new_authz_response(authz) {
|
2060
|
+
try {
|
2061
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2062
|
+
wasm$1.wiree2eidentity_new_authz_response(retptr, this.ptr, addHeapObject(authz));
|
2063
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2064
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2065
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2066
|
+
if (r2) {
|
2067
|
+
throw takeObject(r1);
|
2068
|
+
}
|
2069
|
+
return takeObject(r0);
|
2070
|
+
} finally {
|
2071
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2072
|
+
}
|
2073
|
+
}
|
2074
|
+
/**
|
2075
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::create_dpop_token]
|
2076
|
+
* @param {string} access_token_url
|
2077
|
+
* @param {string} user_id
|
2078
|
+
* @param {bigint} client_id
|
2079
|
+
* @param {string} domain
|
2080
|
+
* @param {any} client_id_challenge
|
2081
|
+
* @param {string} backend_nonce
|
2082
|
+
* @param {number} expiry_days
|
2083
|
+
* @returns {string}
|
2084
|
+
*/
|
2085
|
+
create_dpop_token(access_token_url, user_id, client_id, domain, client_id_challenge, backend_nonce, expiry_days) {
|
2086
|
+
try {
|
2087
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2088
|
+
const ptr0 = passStringToWasm0(access_token_url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2089
|
+
const len0 = WASM_VECTOR_LEN;
|
2090
|
+
const ptr1 = passStringToWasm0(user_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2091
|
+
const len1 = WASM_VECTOR_LEN;
|
2092
|
+
const ptr2 = passStringToWasm0(domain, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2093
|
+
const len2 = WASM_VECTOR_LEN;
|
2094
|
+
const ptr3 = passStringToWasm0(backend_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2095
|
+
const len3 = WASM_VECTOR_LEN;
|
2096
|
+
wasm$1.wiree2eidentity_create_dpop_token(retptr, this.ptr, ptr0, len0, ptr1, len1, client_id, ptr2, len2, addHeapObject(client_id_challenge), ptr3, len3, expiry_days);
|
2097
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2098
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2099
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2100
|
+
var r3 = getInt32Memory0()[retptr / 4 + 3];
|
2101
|
+
var ptr4 = r0;
|
2102
|
+
var len4 = r1;
|
2103
|
+
if (r3) {
|
2104
|
+
ptr4 = 0; len4 = 0;
|
2105
|
+
throw takeObject(r2);
|
2106
|
+
}
|
2107
|
+
return getStringFromWasm0(ptr4, len4);
|
2108
|
+
} finally {
|
2109
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2110
|
+
wasm$1.__wbindgen_free(ptr4, len4);
|
2111
|
+
}
|
2112
|
+
}
|
2113
|
+
/**
|
2114
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_challenge_request]
|
2115
|
+
* @param {any} handle_challenge
|
2116
|
+
* @param {Uint8Array} account
|
2117
|
+
* @param {string} previous_nonce
|
2118
|
+
* @returns {Uint8Array}
|
2119
|
+
*/
|
2120
|
+
new_challenge_request(handle_challenge, account, previous_nonce) {
|
2121
|
+
try {
|
2122
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2123
|
+
const ptr0 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2124
|
+
const len0 = WASM_VECTOR_LEN;
|
2125
|
+
wasm$1.wiree2eidentity_new_challenge_request(retptr, this.ptr, addHeapObject(handle_challenge), addHeapObject(account), ptr0, len0);
|
2126
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2127
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2128
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2129
|
+
if (r2) {
|
2130
|
+
throw takeObject(r1);
|
2131
|
+
}
|
2132
|
+
return takeObject(r0);
|
2133
|
+
} finally {
|
2134
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2135
|
+
}
|
2136
|
+
}
|
2137
|
+
/**
|
2138
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::new_challenge_response]
|
2139
|
+
* @param {Uint8Array} challenge
|
2140
|
+
*/
|
2141
|
+
new_challenge_response(challenge) {
|
2142
|
+
try {
|
2143
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2144
|
+
wasm$1.wiree2eidentity_new_challenge_response(retptr, this.ptr, addHeapObject(challenge));
|
2145
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2146
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2147
|
+
if (r1) {
|
2148
|
+
throw takeObject(r0);
|
2149
|
+
}
|
2150
|
+
} finally {
|
2151
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2152
|
+
}
|
2153
|
+
}
|
2154
|
+
/**
|
2155
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::check_order_request]
|
2156
|
+
* @param {string} order_url
|
2157
|
+
* @param {Uint8Array} account
|
2158
|
+
* @param {string} previous_nonce
|
2159
|
+
* @returns {Uint8Array}
|
2160
|
+
*/
|
2161
|
+
check_order_request(order_url, account, previous_nonce) {
|
2162
|
+
try {
|
2163
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2164
|
+
const ptr0 = passStringToWasm0(order_url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2165
|
+
const len0 = WASM_VECTOR_LEN;
|
2166
|
+
const ptr1 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2167
|
+
const len1 = WASM_VECTOR_LEN;
|
2168
|
+
wasm$1.wiree2eidentity_check_order_request(retptr, this.ptr, ptr0, len0, addHeapObject(account), ptr1, len1);
|
2169
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2170
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2171
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2172
|
+
if (r2) {
|
2173
|
+
throw takeObject(r1);
|
2174
|
+
}
|
2175
|
+
return takeObject(r0);
|
2176
|
+
} finally {
|
2177
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2178
|
+
}
|
2179
|
+
}
|
2180
|
+
/**
|
2181
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::check_order_response]
|
2182
|
+
* @param {Uint8Array} order
|
2183
|
+
* @returns {Uint8Array}
|
2184
|
+
*/
|
2185
|
+
check_order_response(order) {
|
2186
|
+
try {
|
2187
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2188
|
+
wasm$1.wiree2eidentity_check_order_response(retptr, this.ptr, addHeapObject(order));
|
2189
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2190
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2191
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2192
|
+
if (r2) {
|
2193
|
+
throw takeObject(r1);
|
2194
|
+
}
|
2195
|
+
return takeObject(r0);
|
2196
|
+
} finally {
|
2197
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2198
|
+
}
|
1499
2199
|
}
|
1500
2200
|
/**
|
2201
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::finalize_request]
|
2202
|
+
* @param {(Uint8Array)[]} domains
|
2203
|
+
* @param {Uint8Array} order
|
2204
|
+
* @param {Uint8Array} account
|
2205
|
+
* @param {string} previous_nonce
|
1501
2206
|
* @returns {Uint8Array}
|
1502
2207
|
*/
|
1503
|
-
|
1504
|
-
|
1505
|
-
|
1506
|
-
|
1507
|
-
|
1508
|
-
|
1509
|
-
|
1510
|
-
|
1511
|
-
|
1512
|
-
|
1513
|
-
|
1514
|
-
|
1515
|
-
|
1516
|
-
|
1517
|
-
|
1518
|
-
|
1519
|
-
|
1520
|
-
|
1521
|
-
this.ptr = 0;
|
1522
|
-
|
1523
|
-
return ptr;
|
1524
|
-
}
|
1525
|
-
|
1526
|
-
free() {
|
1527
|
-
const ptr = this.__destroy_into_raw();
|
1528
|
-
wasm$1.__wbg_publicgroupstatebundle_free(ptr);
|
2208
|
+
finalize_request(domains, order, account, previous_nonce) {
|
2209
|
+
try {
|
2210
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2211
|
+
const ptr0 = passArrayJsValueToWasm0(domains, wasm$1.__wbindgen_malloc);
|
2212
|
+
const len0 = WASM_VECTOR_LEN;
|
2213
|
+
const ptr1 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2214
|
+
const len1 = WASM_VECTOR_LEN;
|
2215
|
+
wasm$1.wiree2eidentity_finalize_request(retptr, this.ptr, ptr0, len0, addHeapObject(order), addHeapObject(account), ptr1, len1);
|
2216
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2217
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2218
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2219
|
+
if (r2) {
|
2220
|
+
throw takeObject(r1);
|
2221
|
+
}
|
2222
|
+
return takeObject(r0);
|
2223
|
+
} finally {
|
2224
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2225
|
+
}
|
1529
2226
|
}
|
1530
2227
|
/**
|
1531
|
-
*
|
2228
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::finalize_response]
|
2229
|
+
* @param {Uint8Array} finalize
|
2230
|
+
* @returns {any}
|
1532
2231
|
*/
|
1533
|
-
|
1534
|
-
|
1535
|
-
|
2232
|
+
finalize_response(finalize) {
|
2233
|
+
try {
|
2234
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2235
|
+
wasm$1.wiree2eidentity_finalize_response(retptr, this.ptr, addHeapObject(finalize));
|
2236
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2237
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2238
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2239
|
+
if (r2) {
|
2240
|
+
throw takeObject(r1);
|
2241
|
+
}
|
2242
|
+
return takeObject(r0);
|
2243
|
+
} finally {
|
2244
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2245
|
+
}
|
1536
2246
|
}
|
1537
2247
|
/**
|
1538
|
-
*
|
2248
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::certificate_request]
|
2249
|
+
* @param {any} finalize
|
2250
|
+
* @param {Uint8Array} account
|
2251
|
+
* @param {string} previous_nonce
|
2252
|
+
* @returns {Uint8Array}
|
1539
2253
|
*/
|
1540
|
-
|
1541
|
-
|
1542
|
-
|
2254
|
+
certificate_request(finalize, account, previous_nonce) {
|
2255
|
+
try {
|
2256
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2257
|
+
const ptr0 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2258
|
+
const len0 = WASM_VECTOR_LEN;
|
2259
|
+
wasm$1.wiree2eidentity_certificate_request(retptr, this.ptr, addHeapObject(finalize), addHeapObject(account), ptr0, len0);
|
2260
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2261
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2262
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2263
|
+
if (r2) {
|
2264
|
+
throw takeObject(r1);
|
2265
|
+
}
|
2266
|
+
return takeObject(r0);
|
2267
|
+
} finally {
|
2268
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2269
|
+
}
|
1543
2270
|
}
|
1544
2271
|
/**
|
1545
|
-
*
|
2272
|
+
* See [core_crypto::e2e_identity::WireE2eIdentity::certificate_response]
|
2273
|
+
* @param {string} certificate_chain
|
2274
|
+
* @returns {(Uint8Array)[]}
|
1546
2275
|
*/
|
1547
|
-
|
1548
|
-
|
1549
|
-
|
2276
|
+
certificate_response(certificate_chain) {
|
2277
|
+
try {
|
2278
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2279
|
+
const ptr0 = passStringToWasm0(certificate_chain, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2280
|
+
const len0 = WASM_VECTOR_LEN;
|
2281
|
+
wasm$1.wiree2eidentity_certificate_response(retptr, this.ptr, ptr0, len0);
|
2282
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2283
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2284
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2285
|
+
var r3 = getInt32Memory0()[retptr / 4 + 3];
|
2286
|
+
if (r3) {
|
2287
|
+
throw takeObject(r2);
|
2288
|
+
}
|
2289
|
+
var v1 = getArrayJsValueFromWasm0(r0, r1).slice();
|
2290
|
+
wasm$1.__wbindgen_free(r0, r1 * 4);
|
2291
|
+
return v1;
|
2292
|
+
} finally {
|
2293
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2294
|
+
}
|
1550
2295
|
}
|
1551
2296
|
}
|
1552
2297
|
|
@@ -1701,6 +2446,10 @@ function getImports() {
|
|
1701
2446
|
const ret = CoreCrypto$1.__wrap(arg0);
|
1702
2447
|
return addHeapObject(ret);
|
1703
2448
|
};
|
2449
|
+
imports.wbg.__wbg_new_0b9bfdd97583284e = function() {
|
2450
|
+
const ret = new Object();
|
2451
|
+
return addHeapObject(ret);
|
2452
|
+
};
|
1704
2453
|
imports.wbg.__wbg_set_20cbc34131e76824 = function(arg0, arg1, arg2) {
|
1705
2454
|
getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
|
1706
2455
|
};
|
@@ -1708,8 +2457,8 @@ function getImports() {
|
|
1708
2457
|
const ret = arg0;
|
1709
2458
|
return addHeapObject(ret);
|
1710
2459
|
};
|
1711
|
-
imports.wbg.
|
1712
|
-
const ret =
|
2460
|
+
imports.wbg.__wbg_wiree2eidentity_new = function(arg0) {
|
2461
|
+
const ret = WireE2eIdentity$1.__wrap(arg0);
|
1713
2462
|
return addHeapObject(ret);
|
1714
2463
|
};
|
1715
2464
|
imports.wbg.__wbg_call_168da88779e35f61 = function() { return handleError(function (arg0, arg1, arg2) {
|
@@ -1727,7 +2476,7 @@ function getImports() {
|
|
1727
2476
|
const a = state0.a;
|
1728
2477
|
state0.a = 0;
|
1729
2478
|
try {
|
1730
|
-
return
|
2479
|
+
return __wbg_adapter_260(a, state0.b, arg0, arg1);
|
1731
2480
|
} finally {
|
1732
2481
|
state0.a = a;
|
1733
2482
|
}
|
@@ -1742,9 +2491,6 @@ function getImports() {
|
|
1742
2491
|
const ret = new Array();
|
1743
2492
|
return addHeapObject(ret);
|
1744
2493
|
};
|
1745
|
-
imports.wbg.__wbg_set_a68214f35c417fa9 = function(arg0, arg1, arg2) {
|
1746
|
-
getObject(arg0)[arg1 >>> 0] = takeObject(arg2);
|
1747
|
-
};
|
1748
2494
|
imports.wbg.__wbg_push_740e4b286702d964 = function(arg0, arg1) {
|
1749
2495
|
const ret = getObject(arg0).push(getObject(arg1));
|
1750
2496
|
return ret;
|
@@ -1757,6 +2503,9 @@ function getImports() {
|
|
1757
2503
|
const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
|
1758
2504
|
return addHeapObject(ret);
|
1759
2505
|
};
|
2506
|
+
imports.wbg.__wbg_set_a68214f35c417fa9 = function(arg0, arg1, arg2) {
|
2507
|
+
getObject(arg0)[arg1 >>> 0] = takeObject(arg2);
|
2508
|
+
};
|
1760
2509
|
imports.wbg.__wbg_call_3999bee59e9f7719 = function() { return handleError(function (arg0, arg1, arg2, arg3) {
|
1761
2510
|
const ret = getObject(arg0).call(getObject(arg1), getObject(arg2), getObject(arg3));
|
1762
2511
|
return addHeapObject(ret);
|
@@ -1773,6 +2522,14 @@ function getImports() {
|
|
1773
2522
|
const ret = ProposalBundle.__wrap(arg0);
|
1774
2523
|
return addHeapObject(ret);
|
1775
2524
|
};
|
2525
|
+
imports.wbg.__wbg_now_4d4a1d65c7a8c0ba = function() {
|
2526
|
+
const ret = Date.now();
|
2527
|
+
return ret;
|
2528
|
+
};
|
2529
|
+
imports.wbg.__wbg_now_78244d2ced74c026 = function() {
|
2530
|
+
const ret = performance.now();
|
2531
|
+
return ret;
|
2532
|
+
};
|
1776
2533
|
imports.wbg.__wbg_new_abda76e883ba8a5f = function() {
|
1777
2534
|
const ret = new Error();
|
1778
2535
|
return addHeapObject(ret);
|
@@ -1824,25 +2581,22 @@ function getImports() {
|
|
1824
2581
|
const ret = false;
|
1825
2582
|
return ret;
|
1826
2583
|
};
|
1827
|
-
imports.wbg.
|
1828
|
-
const ret = getObject(arg0).
|
2584
|
+
imports.wbg.__wbg_openCursor_e036069f0e326708 = function() { return handleError(function (arg0, arg1) {
|
2585
|
+
const ret = getObject(arg0).openCursor(getObject(arg1));
|
1829
2586
|
return addHeapObject(ret);
|
1830
2587
|
}, arguments) };
|
1831
|
-
imports.wbg.
|
1832
|
-
const ret = getObject(arg0).
|
2588
|
+
imports.wbg.__wbg_openCursor_f055654a98eeab7f = function() { return handleError(function (arg0) {
|
2589
|
+
const ret = getObject(arg0).openCursor();
|
1833
2590
|
return addHeapObject(ret);
|
1834
2591
|
}, arguments) };
|
1835
|
-
imports.wbg.__wbg_setonupgradeneeded_17d0b9530f1e0cac = function(arg0, arg1) {
|
1836
|
-
getObject(arg0).onupgradeneeded = getObject(arg1);
|
1837
|
-
};
|
1838
2592
|
imports.wbg.__wbg_setonsuccess_5f71593bc51653a3 = function(arg0, arg1) {
|
1839
2593
|
getObject(arg0).onsuccess = getObject(arg1);
|
1840
2594
|
};
|
1841
2595
|
imports.wbg.__wbg_setonerror_d5771cc5bf9ea74c = function(arg0, arg1) {
|
1842
2596
|
getObject(arg0).onerror = getObject(arg1);
|
1843
2597
|
};
|
1844
|
-
imports.wbg.
|
1845
|
-
const ret = getObject(arg0).
|
2598
|
+
imports.wbg.__wbg_get_6285bf458a1ee758 = function() { return handleError(function (arg0, arg1) {
|
2599
|
+
const ret = getObject(arg0).get(getObject(arg1));
|
1846
2600
|
return addHeapObject(ret);
|
1847
2601
|
}, arguments) };
|
1848
2602
|
imports.wbg.__wbg_count_b0e88953a0ea909c = function() { return handleError(function (arg0) {
|
@@ -1853,8 +2607,8 @@ function getImports() {
|
|
1853
2607
|
const ret = getObject(arg0).count(getObject(arg1));
|
1854
2608
|
return addHeapObject(ret);
|
1855
2609
|
}, arguments) };
|
1856
|
-
imports.wbg.
|
1857
|
-
const ret = getObject(arg0).
|
2610
|
+
imports.wbg.__wbg_delete_8abedd1043b4105d = function() { return handleError(function (arg0, arg1) {
|
2611
|
+
const ret = getObject(arg0).delete(getObject(arg1));
|
1858
2612
|
return addHeapObject(ret);
|
1859
2613
|
}, arguments) };
|
1860
2614
|
imports.wbg.__wbg_put_84e7fc93eee27b28 = function() { return handleError(function (arg0, arg1, arg2) {
|
@@ -1865,14 +2619,17 @@ function getImports() {
|
|
1865
2619
|
const ret = getObject(arg0).put(getObject(arg1));
|
1866
2620
|
return addHeapObject(ret);
|
1867
2621
|
}, arguments) };
|
1868
|
-
imports.wbg.
|
1869
|
-
const ret = getObject(arg0).
|
2622
|
+
imports.wbg.__wbg_open_a31c3fe1fdc244eb = function() { return handleError(function (arg0, arg1, arg2) {
|
2623
|
+
const ret = getObject(arg0).open(getStringFromWasm0(arg1, arg2));
|
1870
2624
|
return addHeapObject(ret);
|
1871
2625
|
}, arguments) };
|
1872
|
-
imports.wbg.
|
1873
|
-
const ret = getObject(arg0).
|
2626
|
+
imports.wbg.__wbg_open_c5d5fb2df44b9d10 = function() { return handleError(function (arg0, arg1, arg2, arg3) {
|
2627
|
+
const ret = getObject(arg0).open(getStringFromWasm0(arg1, arg2), arg3 >>> 0);
|
1874
2628
|
return addHeapObject(ret);
|
1875
2629
|
}, arguments) };
|
2630
|
+
imports.wbg.__wbg_setonupgradeneeded_17d0b9530f1e0cac = function(arg0, arg1) {
|
2631
|
+
getObject(arg0).onupgradeneeded = getObject(arg1);
|
2632
|
+
};
|
1876
2633
|
imports.wbg.__wbg_index_86861edf1478f49c = function() { return handleError(function (arg0, arg1, arg2) {
|
1877
2634
|
const ret = getObject(arg0).index(getStringFromWasm0(arg1, arg2));
|
1878
2635
|
return addHeapObject(ret);
|
@@ -2021,10 +2778,6 @@ function getImports() {
|
|
2021
2778
|
const ret = getObject(arg0).result;
|
2022
2779
|
return addHeapObject(ret);
|
2023
2780
|
}, arguments) };
|
2024
|
-
imports.wbg.__wbg_error_aacf5ac191e54ed0 = function() { return handleError(function (arg0) {
|
2025
|
-
const ret = getObject(arg0).error;
|
2026
|
-
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
2027
|
-
}, arguments) };
|
2028
2781
|
imports.wbg.__wbg_contains_6cf516181cd86571 = function(arg0, arg1, arg2) {
|
2029
2782
|
const ret = getObject(arg0).contains(getStringFromWasm0(arg1, arg2));
|
2030
2783
|
return ret;
|
@@ -2051,6 +2804,10 @@ function getImports() {
|
|
2051
2804
|
imports.wbg.__wbg_deleteObjectStore_1b698c5fd1bc077d = function() { return handleError(function (arg0, arg1, arg2) {
|
2052
2805
|
getObject(arg0).deleteObjectStore(getStringFromWasm0(arg1, arg2));
|
2053
2806
|
}, arguments) };
|
2807
|
+
imports.wbg.__wbg_error_aacf5ac191e54ed0 = function() { return handleError(function (arg0) {
|
2808
|
+
const ret = getObject(arg0).error;
|
2809
|
+
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
2810
|
+
}, arguments) };
|
2054
2811
|
imports.wbg.__wbindgen_is_falsy = function(arg0) {
|
2055
2812
|
const ret = !getObject(arg0);
|
2056
2813
|
return ret;
|
@@ -2076,6 +2833,24 @@ function getImports() {
|
|
2076
2833
|
const ret = getObject(arg0).toString();
|
2077
2834
|
return addHeapObject(ret);
|
2078
2835
|
};
|
2836
|
+
imports.wbg.__wbg_instanceof_Window_acc97ff9f5d2c7b4 = function(arg0) {
|
2837
|
+
let result;
|
2838
|
+
try {
|
2839
|
+
result = getObject(arg0) instanceof Window;
|
2840
|
+
} catch {
|
2841
|
+
result = false;
|
2842
|
+
}
|
2843
|
+
const ret = result;
|
2844
|
+
return ret;
|
2845
|
+
};
|
2846
|
+
imports.wbg.__wbg_crypto_9f07beb1e97bfa1b = function() { return handleError(function (arg0) {
|
2847
|
+
const ret = getObject(arg0).crypto;
|
2848
|
+
return addHeapObject(ret);
|
2849
|
+
}, arguments) };
|
2850
|
+
imports.wbg.__wbg_getRandomValues_f134f772d240c51f = function() { return handleError(function (arg0, arg1, arg2) {
|
2851
|
+
const ret = getObject(arg0).getRandomValues(getArrayU8FromWasm0(arg1, arg2));
|
2852
|
+
return addHeapObject(ret);
|
2853
|
+
}, arguments) };
|
2079
2854
|
imports.wbg.__wbg_instanceof_Uint8Array_971eeda69eb75003 = function(arg0) {
|
2080
2855
|
let result;
|
2081
2856
|
try {
|
@@ -2151,12 +2926,12 @@ function getImports() {
|
|
2151
2926
|
const ret = getObject(arg0).objectStore(getStringFromWasm0(arg1, arg2));
|
2152
2927
|
return addHeapObject(ret);
|
2153
2928
|
}, arguments) };
|
2154
|
-
imports.wbg.
|
2155
|
-
const ret = makeMutClosure(arg0, arg1,
|
2929
|
+
imports.wbg.__wbindgen_closure_wrapper2639 = function(arg0, arg1, arg2) {
|
2930
|
+
const ret = makeMutClosure(arg0, arg1, 142, __wbg_adapter_52);
|
2156
2931
|
return addHeapObject(ret);
|
2157
2932
|
};
|
2158
|
-
imports.wbg.
|
2159
|
-
const ret = makeMutClosure(arg0, arg1,
|
2933
|
+
imports.wbg.__wbindgen_closure_wrapper4541 = function(arg0, arg1, arg2) {
|
2934
|
+
const ret = makeMutClosure(arg0, arg1, 142, __wbg_adapter_55);
|
2160
2935
|
return addHeapObject(ret);
|
2161
2936
|
};
|
2162
2937
|
|
@@ -2189,9 +2964,7 @@ function initSync(module) {
|
|
2189
2964
|
}
|
2190
2965
|
|
2191
2966
|
async function init(input) {
|
2192
|
-
|
2193
|
-
input = new URL('index_bg.wasm', import.meta.url);
|
2194
|
-
}
|
2967
|
+
|
2195
2968
|
const imports = getImports();
|
2196
2969
|
|
2197
2970
|
if (typeof input === 'string' || (typeof Request === 'function' && input instanceof Request) || (typeof URL === 'function' && input instanceof URL)) {
|
@@ -2208,6 +2981,9 @@ var exports = /*#__PURE__*/Object.freeze({
|
|
2208
2981
|
version: version,
|
2209
2982
|
WirePolicy: WirePolicy$1,
|
2210
2983
|
Ciphersuite: Ciphersuite$1,
|
2984
|
+
AcmeChallenge: AcmeChallenge,
|
2985
|
+
AcmeDirectory: AcmeDirectory,
|
2986
|
+
AcmeFinalize: AcmeFinalize,
|
2211
2987
|
CommitBundle: CommitBundle,
|
2212
2988
|
ConversationConfiguration: ConversationConfiguration,
|
2213
2989
|
ConversationInitBundle: ConversationInitBundle,
|
@@ -2217,8 +2993,11 @@ var exports = /*#__PURE__*/Object.freeze({
|
|
2217
2993
|
DecryptedMessage: DecryptedMessage,
|
2218
2994
|
Invitee: Invitee,
|
2219
2995
|
MemberAddedMessages: MemberAddedMessages,
|
2996
|
+
NewAcmeAuthz: NewAcmeAuthz,
|
2997
|
+
NewAcmeOrder: NewAcmeOrder,
|
2220
2998
|
ProposalBundle: ProposalBundle,
|
2221
2999
|
PublicGroupStateBundle: PublicGroupStateBundle,
|
3000
|
+
WireE2eIdentity: WireE2eIdentity$1,
|
2222
3001
|
initSync: initSync,
|
2223
3002
|
'default': init
|
2224
3003
|
});
|
@@ -2226,7 +3005,7 @@ var exports = /*#__PURE__*/Object.freeze({
|
|
2226
3005
|
var wasm = async (opt = {}) => {
|
2227
3006
|
let {importHook, serverPath} = opt;
|
2228
3007
|
|
2229
|
-
let path = "assets/core_crypto_ffi-
|
3008
|
+
let path = "assets/core_crypto_ffi-7a5675cc.wasm";
|
2230
3009
|
|
2231
3010
|
if (serverPath != null) {
|
2232
3011
|
path = serverPath + /[^\/\\]*$/.exec(path)[0];
|
@@ -2242,39 +3021,39 @@ var wasm = async (opt = {}) => {
|
|
2242
3021
|
|
2243
3022
|
// Wire
|
2244
3023
|
// Copyright (C) 2022 Wire Swiss GmbH
|
2245
|
-
var _a, _CoreCrypto_module, _CoreCrypto_cc;
|
3024
|
+
var _a, _CoreCrypto_module, _CoreCrypto_cc, _b, _WireE2eIdentity_module, _WireE2eIdentity_e2ei;
|
2246
3025
|
/**
|
2247
|
-
* see [core_crypto::prelude::CiphersuiteName]
|
2248
|
-
*/
|
3026
|
+
* see [core_crypto::prelude::CiphersuiteName]
|
3027
|
+
*/
|
2249
3028
|
var Ciphersuite;
|
2250
3029
|
(function (Ciphersuite) {
|
2251
3030
|
/**
|
2252
|
-
|
2253
|
-
|
3031
|
+
* DH KEM x25519 | AES-GCM 128 | SHA2-256 | Ed25519
|
3032
|
+
*/
|
2254
3033
|
Ciphersuite[Ciphersuite["MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519"] = 1] = "MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519";
|
2255
3034
|
/**
|
2256
|
-
|
2257
|
-
|
3035
|
+
* DH KEM P256 | AES-GCM 128 | SHA2-256 | EcDSA P256
|
3036
|
+
*/
|
2258
3037
|
Ciphersuite[Ciphersuite["MLS_128_DHKEMP256_AES128GCM_SHA256_P256"] = 2] = "MLS_128_DHKEMP256_AES128GCM_SHA256_P256";
|
2259
3038
|
/**
|
2260
|
-
|
2261
|
-
|
3039
|
+
* DH KEM x25519 | Chacha20Poly1305 | SHA2-256 | Ed25519
|
3040
|
+
*/
|
2262
3041
|
Ciphersuite[Ciphersuite["MLS_128_DHKEMX25519_CHACHA20POLY1305_SHA256_Ed25519"] = 3] = "MLS_128_DHKEMX25519_CHACHA20POLY1305_SHA256_Ed25519";
|
2263
3042
|
/**
|
2264
|
-
|
2265
|
-
|
3043
|
+
* DH KEM x448 | AES-GCM 256 | SHA2-512 | Ed448
|
3044
|
+
*/
|
2266
3045
|
Ciphersuite[Ciphersuite["MLS_256_DHKEMX448_AES256GCM_SHA512_Ed448"] = 4] = "MLS_256_DHKEMX448_AES256GCM_SHA512_Ed448";
|
2267
3046
|
/**
|
2268
|
-
|
2269
|
-
|
3047
|
+
* DH KEM P521 | AES-GCM 256 | SHA2-512 | EcDSA P521
|
3048
|
+
*/
|
2270
3049
|
Ciphersuite[Ciphersuite["MLS_256_DHKEMP521_AES256GCM_SHA512_P521"] = 5] = "MLS_256_DHKEMP521_AES256GCM_SHA512_P521";
|
2271
3050
|
/**
|
2272
|
-
|
2273
|
-
|
3051
|
+
* DH KEM x448 | Chacha20Poly1305 | SHA2-512 | Ed448
|
3052
|
+
*/
|
2274
3053
|
Ciphersuite[Ciphersuite["MLS_256_DHKEMX448_CHACHA20POLY1305_SHA512_Ed448"] = 6] = "MLS_256_DHKEMX448_CHACHA20POLY1305_SHA512_Ed448";
|
2275
3054
|
/**
|
2276
|
-
|
2277
|
-
|
3055
|
+
* DH KEM P384 | AES-GCM 256 | SHA2-384 | EcDSA P384
|
3056
|
+
*/
|
2278
3057
|
Ciphersuite[Ciphersuite["MLS_256_DHKEMP384_AES256GCM_SHA384_P384"] = 7] = "MLS_256_DHKEMP384_AES256GCM_SHA384_P384";
|
2279
3058
|
})(Ciphersuite || (Ciphersuite = {}));
|
2280
3059
|
/**
|
@@ -2820,7 +3599,7 @@ class CoreCrypto {
|
|
2820
3599
|
* **CAUTION**: only use this when you had an explicit response from the Delivery Service
|
2821
3600
|
* e.g. 403. Do not use otherwise e.g. 5xx responses, timeout etc..
|
2822
3601
|
* **DO NOT** use when Delivery Service responds 409, pending state will be renewed
|
2823
|
-
* in {@link CoreCrypto.
|
3602
|
+
* in {@link CoreCrypto.decryptMessage}
|
2824
3603
|
*
|
2825
3604
|
* @param conversationId - The group's ID
|
2826
3605
|
*/
|
@@ -3006,7 +3785,7 @@ class CoreCrypto {
|
|
3006
3785
|
*
|
3007
3786
|
* @param prekey - the prekey bundle to get the fingerprint from
|
3008
3787
|
* @returns Hex-encoded public key string
|
3009
|
-
|
3788
|
+
**/
|
3010
3789
|
static proteusFingerprintPrekeybundle(prekey) {
|
3011
3790
|
return __classPrivateFieldGet(this, _a, "f", _CoreCrypto_module).CoreCrypto.proteus_fingerprint_prekeybundle(prekey);
|
3012
3791
|
}
|
@@ -3018,6 +3797,18 @@ class CoreCrypto {
|
|
3018
3797
|
async proteusCryptoboxMigrate(storeName) {
|
3019
3798
|
return await __classPrivateFieldGet(this, _CoreCrypto_cc, "f").proteus_cryptobox_migrate(storeName);
|
3020
3799
|
}
|
3800
|
+
/**
|
3801
|
+
* Creates an enrollment instance with private key material you can use in order to fetch
|
3802
|
+
* a new x509 certificate from the acme server.
|
3803
|
+
* Make sure to call [WireE2eIdentity::free] (not yet available) to dispose this instance and its associated
|
3804
|
+
* keying material.
|
3805
|
+
*
|
3806
|
+
* @param ciphersuite - For generating signing key material. Only {@link Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519} is supported currently
|
3807
|
+
*/
|
3808
|
+
async newAcmeEnrollment() {
|
3809
|
+
const e2ei = await __classPrivateFieldGet(this, _CoreCrypto_cc, "f").new_acme_enrollment(Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519);
|
3810
|
+
return new WireE2eIdentity(e2ei, __classPrivateFieldGet(CoreCrypto, _a, "f", _CoreCrypto_module));
|
3811
|
+
}
|
3021
3812
|
/**
|
3022
3813
|
* Returns the current version of {@link CoreCrypto}
|
3023
3814
|
*
|
@@ -3033,5 +3824,197 @@ class CoreCrypto {
|
|
3033
3824
|
_a = CoreCrypto, _CoreCrypto_cc = new WeakMap();
|
3034
3825
|
/** @hidden */
|
3035
3826
|
_CoreCrypto_module = { value: void 0 };
|
3827
|
+
class WireE2eIdentity {
|
3828
|
+
/** @hidden */
|
3829
|
+
constructor(e2ei, module) {
|
3830
|
+
/** @hidden */
|
3831
|
+
_WireE2eIdentity_e2ei.set(this, void 0);
|
3832
|
+
__classPrivateFieldSet(this, _WireE2eIdentity_e2ei, e2ei, "f");
|
3833
|
+
if (!__classPrivateFieldGet(WireE2eIdentity, _b, "f", _WireE2eIdentity_module)) {
|
3834
|
+
__classPrivateFieldSet(WireE2eIdentity, _b, module, "f", _WireE2eIdentity_module);
|
3835
|
+
}
|
3836
|
+
}
|
3837
|
+
/**
|
3838
|
+
* Parses the response from `GET /acme/{provisioner-name}/directory`.
|
3839
|
+
* Use this {@link AcmeDirectory} in the next step to fetch the first nonce from the acme server. Use
|
3840
|
+
* {@link AcmeDirectory.newNonce}.
|
3841
|
+
*
|
3842
|
+
* @param directory HTTP response body
|
3843
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.1.1
|
3844
|
+
*/
|
3845
|
+
directoryResponse(directory) {
|
3846
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").directory_response(directory);
|
3847
|
+
}
|
3848
|
+
/**
|
3849
|
+
* For creating a new acme account. This returns a signed JWS-alike request body to send to
|
3850
|
+
* `POST /acme/{provisioner-name}/new-account`.
|
3851
|
+
*
|
3852
|
+
* @param directory you got from {@link directoryResponse}
|
3853
|
+
* @param previousNonce you got from calling `HEAD {@link AcmeDirectory.newNonce}`
|
3854
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.3
|
3855
|
+
*/
|
3856
|
+
newAccountRequest(directory, previousNonce) {
|
3857
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_account_request(directory, previousNonce);
|
3858
|
+
}
|
3859
|
+
/**
|
3860
|
+
* Parses the response from `POST /acme/{provisioner-name}/new-account`.
|
3861
|
+
* @param account HTTP response body
|
3862
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.3
|
3863
|
+
*/
|
3864
|
+
newAccountResponse(account) {
|
3865
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_account_response(account);
|
3866
|
+
}
|
3867
|
+
/**
|
3868
|
+
* Creates a new acme order for the handle (userId + display name) and the clientId.
|
3869
|
+
*
|
3870
|
+
* @param handle domain of the authorization server e.g. `idp.example.org`
|
3871
|
+
* @param clientId domain of the wire-server e.g. `wire.example.org`
|
3872
|
+
* @param expiryDays generated x509 certificate expiry
|
3873
|
+
* @param directory you got from {@link directoryResponse}
|
3874
|
+
* @param account you got from {@link newAccountResponse}
|
3875
|
+
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/new-account`
|
3876
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
3877
|
+
*/
|
3878
|
+
newOrderRequest(handle, clientId, expiryDays, directory, account, previousNonce) {
|
3879
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_order_request(handle, clientId, expiryDays, directory, account, previousNonce);
|
3880
|
+
}
|
3881
|
+
/**
|
3882
|
+
* Parses the response from `POST /acme/{provisioner-name}/new-order`.
|
3883
|
+
*
|
3884
|
+
* @param order HTTP response body
|
3885
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
3886
|
+
*/
|
3887
|
+
newOrderResponse(order) {
|
3888
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_order_response(order);
|
3889
|
+
}
|
3890
|
+
/**
|
3891
|
+
* Creates a new authorization request.
|
3892
|
+
*
|
3893
|
+
* @param url one of the URL in new order's authorizations (use {@link NewAcmeOrder.authorizations} from {@link newOrderResponse})
|
3894
|
+
* @param account you got from {@link newAccountResponse}
|
3895
|
+
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/new-order` (or from the
|
3896
|
+
* previous to this method if you are creating the second authorization)
|
3897
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5
|
3898
|
+
*/
|
3899
|
+
newAuthzRequest(url, account, previousNonce) {
|
3900
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_authz_request(url, account, previousNonce);
|
3901
|
+
}
|
3902
|
+
/**
|
3903
|
+
* Parses the response from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
3904
|
+
*
|
3905
|
+
* You then have to map the challenge from this authorization object. The `client_id_challenge`
|
3906
|
+
* will be the one with the `client_id_host` (you supplied to {@link newOrderRequest}) identifier,
|
3907
|
+
* the other will be your `handle_challenge`.
|
3908
|
+
*
|
3909
|
+
* @param authz HTTP response body
|
3910
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5
|
3911
|
+
*/
|
3912
|
+
newAuthzResponse(authz) {
|
3913
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_authz_response(authz);
|
3914
|
+
}
|
3915
|
+
/**
|
3916
|
+
* Generates a new client Dpop JWT token. It demonstrates proof of possession of the nonces
|
3917
|
+
* (from wire-server & acme server) and will be verified by the acme server when verifying the
|
3918
|
+
* challenge (in order to deliver a certificate).
|
3919
|
+
*
|
3920
|
+
* Then send it to `POST /clients/{id}/access-token`
|
3921
|
+
* {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token} on wire-server.
|
3922
|
+
*
|
3923
|
+
* @param accessTokenUrl backend endpoint where this token will be sent. Should be this one {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token}
|
3924
|
+
* @param userId an UUIDv4 uniquely identifying the user
|
3925
|
+
* @param clientId client identifier
|
3926
|
+
* @param domain owning backend domain e.g. `wire.com`
|
3927
|
+
* @param clientIdChallenge you found after {@link newAuthzResponse}
|
3928
|
+
* @param backendNonce you get by calling `GET /clients/token/nonce` on wire-server as defined here {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/get_clients__client__nonce}
|
3929
|
+
* @param expiryDays token expiry in days
|
3930
|
+
*/
|
3931
|
+
createDpopToken(accessTokenUrl, userId, clientId, domain, clientIdChallenge, backendNonce, expiryDays) {
|
3932
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").create_dpop_token(accessTokenUrl, userId, clientId, domain, clientIdChallenge, backendNonce, expiryDays);
|
3933
|
+
}
|
3934
|
+
/**
|
3935
|
+
* Creates a new challenge request.
|
3936
|
+
*
|
3937
|
+
* @param handleChallenge you found after {@link newAuthzResponse}
|
3938
|
+
* @param account you found after {@link newAccountResponse}
|
3939
|
+
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
3940
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
3941
|
+
*/
|
3942
|
+
newChallengeRequest(handleChallenge, account, previousNonce) {
|
3943
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_challenge_request(handleChallenge, account, previousNonce);
|
3944
|
+
}
|
3945
|
+
/**
|
3946
|
+
* Parses the response from `POST /acme/{provisioner-name}/challenge/{challenge-id}`.
|
3947
|
+
*
|
3948
|
+
* @param challenge HTTP response body
|
3949
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
3950
|
+
*/
|
3951
|
+
newChallengeResponse(challenge) {
|
3952
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_challenge_response(challenge);
|
3953
|
+
}
|
3954
|
+
/**
|
3955
|
+
* Verifies that the previous challenge has been completed.
|
3956
|
+
*
|
3957
|
+
* @param orderUrl `location` header from http response you got from {@link newOrderResponse}
|
3958
|
+
* @param account you found after {@link newAccountResponse}
|
3959
|
+
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/challenge/{challenge-id}`
|
3960
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
3961
|
+
*/
|
3962
|
+
checkOrderRequest(orderUrl, account, previousNonce) {
|
3963
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").check_order_request(orderUrl, account, previousNonce);
|
3964
|
+
}
|
3965
|
+
/**
|
3966
|
+
* Parses the response from `POST /acme/{provisioner-name}/order/{order-id}`.
|
3967
|
+
*
|
3968
|
+
* @param order HTTP response body
|
3969
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
3970
|
+
*/
|
3971
|
+
checkOrderResponse(order) {
|
3972
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").check_order_response(order);
|
3973
|
+
}
|
3974
|
+
/**
|
3975
|
+
* Final step before fetching the certificate.
|
3976
|
+
*
|
3977
|
+
* @param domains you want to generate a certificate for e.g. `["wire.com"]`
|
3978
|
+
* @param order you got from {@link checkOrderResponse}
|
3979
|
+
* @param account you found after {@link newAccountResponse}
|
3980
|
+
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/order/{order-id}`
|
3981
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
3982
|
+
*/
|
3983
|
+
finalizeRequest(domains, order, account, previousNonce) {
|
3984
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").finalize_request(domains, order, account, previousNonce);
|
3985
|
+
}
|
3986
|
+
/**
|
3987
|
+
* Parses the response from `POST /acme/{provisioner-name}/order/{order-id}/finalize`.
|
3988
|
+
*
|
3989
|
+
* @param finalize HTTP response body
|
3990
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
3991
|
+
*/
|
3992
|
+
finalizeResponse(finalize) {
|
3993
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").finalize_response(finalize);
|
3994
|
+
}
|
3995
|
+
/**
|
3996
|
+
* Creates a request for finally fetching the x509 certificate.
|
3997
|
+
*
|
3998
|
+
* @param finalize you got from {@link finalizeResponse}
|
3999
|
+
* @param account you got from {@link newAccountResponse}
|
4000
|
+
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/order/{order-id}/finalize`
|
4001
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4.2
|
4002
|
+
*/
|
4003
|
+
certificateRequest(finalize, account, previousNonce) {
|
4004
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").certificate_request(finalize, account, previousNonce);
|
4005
|
+
}
|
4006
|
+
/**
|
4007
|
+
* Parses the response from `POST /acme/{provisioner-name}/certificate/{certificate-id}`.
|
4008
|
+
*
|
4009
|
+
* @param certificateChain HTTP string response body
|
4010
|
+
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4.2
|
4011
|
+
*/
|
4012
|
+
certificateResponse(certificateChain) {
|
4013
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").certificate_response(certificateChain);
|
4014
|
+
}
|
4015
|
+
}
|
4016
|
+
_b = WireE2eIdentity, _WireE2eIdentity_e2ei = new WeakMap();
|
4017
|
+
/** @hidden */
|
4018
|
+
_WireE2eIdentity_module = { value: void 0 };
|
3036
4019
|
|
3037
|
-
export { Ciphersuite, CoreCrypto, ExternalProposalType, ProposalType, PublicGroupStateEncryptionType, RatchetTreeType, WirePolicy };
|
4020
|
+
export { Ciphersuite, CoreCrypto, ExternalProposalType, ProposalType, PublicGroupStateEncryptionType, RatchetTreeType, WireE2eIdentity, WirePolicy };
|