@wireapp/core-crypto 0.6.0-rc.6 → 0.6.0-rc.8
Sign up to get free protection for your applications and to get access to all the features.
package/package.json
CHANGED
Binary file
|
@@ -1,124 +1,3 @@
|
|
1
|
-
declare class FfiWireE2EIdentity {
|
2
|
-
free(): void;
|
3
|
-
/**
|
4
|
-
* See [core_crypto::e2e_identity::WireE2eIdentity::directory_response]
|
5
|
-
* @param {Uint8Array} directory
|
6
|
-
* @returns {any}
|
7
|
-
*/
|
8
|
-
directory_response(directory: Uint8Array): any;
|
9
|
-
/**
|
10
|
-
* See [core_crypto::e2e_identity::WireE2eIdentity::new_account_request]
|
11
|
-
* @param {any} directory
|
12
|
-
* @param {string} previous_nonce
|
13
|
-
* @returns {Uint8Array}
|
14
|
-
*/
|
15
|
-
new_account_request(directory: any, previous_nonce: string): Uint8Array;
|
16
|
-
/**
|
17
|
-
* See [core_crypto::e2e_identity::WireE2eIdentity::new_account_response]
|
18
|
-
* @param {Uint8Array} account
|
19
|
-
* @returns {Uint8Array}
|
20
|
-
*/
|
21
|
-
new_account_response(account: Uint8Array): Uint8Array;
|
22
|
-
/**
|
23
|
-
* See [core_crypto::e2e_identity::WireE2eIdentity::new_order_request]
|
24
|
-
* @param {string} handle
|
25
|
-
* @param {string} client_id
|
26
|
-
* @param {number} expiry_days
|
27
|
-
* @param {any} directory
|
28
|
-
* @param {Uint8Array} account
|
29
|
-
* @param {string} previous_nonce
|
30
|
-
* @returns {Uint8Array}
|
31
|
-
*/
|
32
|
-
new_order_request(handle: string, client_id: string, expiry_days: number, directory: any, account: Uint8Array, previous_nonce: string): Uint8Array;
|
33
|
-
/**
|
34
|
-
* See [core_crypto::e2e_identity::WireE2eIdentity::new_order_response]
|
35
|
-
* @param {Uint8Array} order
|
36
|
-
* @returns {any}
|
37
|
-
*/
|
38
|
-
new_order_response(order: Uint8Array): any;
|
39
|
-
/**
|
40
|
-
* See [core_crypto::e2e_identity::WireE2eIdentity::new_authz_request]
|
41
|
-
* @param {string} url
|
42
|
-
* @param {Uint8Array} account
|
43
|
-
* @param {string} previous_nonce
|
44
|
-
* @returns {Uint8Array}
|
45
|
-
*/
|
46
|
-
new_authz_request(url: string, account: Uint8Array, previous_nonce: string): Uint8Array;
|
47
|
-
/**
|
48
|
-
* See [core_crypto::e2e_identity::WireE2eIdentity::new_authz_response]
|
49
|
-
* @param {Uint8Array} authz
|
50
|
-
* @returns {any}
|
51
|
-
*/
|
52
|
-
new_authz_response(authz: Uint8Array): any;
|
53
|
-
/**
|
54
|
-
* See [core_crypto::e2e_identity::WireE2eIdentity::create_dpop_token]
|
55
|
-
* @param {string} access_token_url
|
56
|
-
* @param {string} user_id
|
57
|
-
* @param {bigint} client_id
|
58
|
-
* @param {string} domain
|
59
|
-
* @param {any} client_id_challenge
|
60
|
-
* @param {string} backend_nonce
|
61
|
-
* @param {number} expiry_days
|
62
|
-
* @returns {string}
|
63
|
-
*/
|
64
|
-
create_dpop_token(access_token_url: string, user_id: string, client_id: bigint, domain: string, client_id_challenge: any, backend_nonce: string, expiry_days: number): string;
|
65
|
-
/**
|
66
|
-
* See [core_crypto::e2e_identity::WireE2eIdentity::new_challenge_request]
|
67
|
-
* @param {any} handle_challenge
|
68
|
-
* @param {Uint8Array} account
|
69
|
-
* @param {string} previous_nonce
|
70
|
-
* @returns {Uint8Array}
|
71
|
-
*/
|
72
|
-
new_challenge_request(handle_challenge: any, account: Uint8Array, previous_nonce: string): Uint8Array;
|
73
|
-
/**
|
74
|
-
* See [core_crypto::e2e_identity::WireE2eIdentity::new_challenge_response]
|
75
|
-
* @param {Uint8Array} challenge
|
76
|
-
*/
|
77
|
-
new_challenge_response(challenge: Uint8Array): void;
|
78
|
-
/**
|
79
|
-
* See [core_crypto::e2e_identity::WireE2eIdentity::check_order_request]
|
80
|
-
* @param {string} order_url
|
81
|
-
* @param {Uint8Array} account
|
82
|
-
* @param {string} previous_nonce
|
83
|
-
* @returns {Uint8Array}
|
84
|
-
*/
|
85
|
-
check_order_request(order_url: string, account: Uint8Array, previous_nonce: string): Uint8Array;
|
86
|
-
/**
|
87
|
-
* See [core_crypto::e2e_identity::WireE2eIdentity::check_order_response]
|
88
|
-
* @param {Uint8Array} order
|
89
|
-
* @returns {Uint8Array}
|
90
|
-
*/
|
91
|
-
check_order_response(order: Uint8Array): Uint8Array;
|
92
|
-
/**
|
93
|
-
* See [core_crypto::e2e_identity::WireE2eIdentity::finalize_request]
|
94
|
-
* @param {(Uint8Array)[]} domains
|
95
|
-
* @param {Uint8Array} order
|
96
|
-
* @param {Uint8Array} account
|
97
|
-
* @param {string} previous_nonce
|
98
|
-
* @returns {Uint8Array}
|
99
|
-
*/
|
100
|
-
finalize_request(domains: (Uint8Array)[], order: Uint8Array, account: Uint8Array, previous_nonce: string): Uint8Array;
|
101
|
-
/**
|
102
|
-
* See [core_crypto::e2e_identity::WireE2eIdentity::finalize_response]
|
103
|
-
* @param {Uint8Array} finalize
|
104
|
-
* @returns {any}
|
105
|
-
*/
|
106
|
-
finalize_response(finalize: Uint8Array): any;
|
107
|
-
/**
|
108
|
-
* See [core_crypto::e2e_identity::WireE2eIdentity::certificate_request]
|
109
|
-
* @param {any} finalize
|
110
|
-
* @param {Uint8Array} account
|
111
|
-
* @param {string} previous_nonce
|
112
|
-
* @returns {Uint8Array}
|
113
|
-
*/
|
114
|
-
certificate_request(finalize: any, account: Uint8Array, previous_nonce: string): Uint8Array;
|
115
|
-
/**
|
116
|
-
* See [core_crypto::e2e_identity::WireE2eIdentity::certificate_response]
|
117
|
-
* @param {string} certificate_chain
|
118
|
-
* @returns {(Uint8Array)[]}
|
119
|
-
*/
|
120
|
-
certificate_response(certificate_chain: string): (Uint8Array)[];
|
121
|
-
}
|
122
1
|
/**
|
123
2
|
* Error wrapper that takes care of extracting rich error details across the FFI (through JSON parsing)
|
124
3
|
*
|
@@ -529,7 +408,7 @@ export interface CoreCryptoCallbacks {
|
|
529
408
|
* @param clientId - id of the client performing an operation requiring authorization
|
530
409
|
* @returns whether the user is authorized by the logic layer to perform the operation
|
531
410
|
*/
|
532
|
-
authorize: (conversationId: Uint8Array, clientId: Uint8Array) => boolean
|
411
|
+
authorize: (conversationId: Uint8Array, clientId: Uint8Array) => Promise<boolean>;
|
533
412
|
/**
|
534
413
|
* A mix between {@link authorize} and {@link clientIsExistingGroupUser}. We currently use this callback to verify
|
535
414
|
* external commits to join a group ; in such case, the client has to:
|
@@ -541,7 +420,7 @@ export interface CoreCryptoCallbacks {
|
|
541
420
|
* @param existingClients - all the clients currently within the MLS group
|
542
421
|
* @returns true if the external client is authorized to write to the conversation
|
543
422
|
*/
|
544
|
-
userAuthorize: (conversationId: Uint8Array, externalClientId: Uint8Array, existingClients: Uint8Array[]) => boolean
|
423
|
+
userAuthorize: (conversationId: Uint8Array, externalClientId: Uint8Array, existingClients: Uint8Array[]) => Promise<boolean>;
|
545
424
|
/**
|
546
425
|
* Callback to ensure that the given `clientId` belongs to one of the provided `existingClients`
|
547
426
|
* This basically allows to defer the client ID parsing logic to the caller - because CoreCrypto is oblivious to such things
|
@@ -550,7 +429,7 @@ export interface CoreCryptoCallbacks {
|
|
550
429
|
* @param clientId - id of a client
|
551
430
|
* @param existingClients - all the clients currently within the MLS group
|
552
431
|
*/
|
553
|
-
clientIsExistingGroupUser: (conversationId: Uint8Array, clientId: Uint8Array, existingClients: Uint8Array[]) => boolean
|
432
|
+
clientIsExistingGroupUser: (conversationId: Uint8Array, clientId: Uint8Array, existingClients: Uint8Array[]) => Promise<boolean>;
|
554
433
|
}
|
555
434
|
/**
|
556
435
|
* Wrapper for the WASM-compiled version of CoreCrypto
|
@@ -605,6 +484,22 @@ export declare class CoreCrypto {
|
|
605
484
|
* @param clientId - {@link CoreCryptoParams#clientId} but required
|
606
485
|
*/
|
607
486
|
mlsInit(clientId: ClientId): Promise<void>;
|
487
|
+
/**
|
488
|
+
* Generates a MLS KeyPair/CredentialBundle with a temporary, random client ID.
|
489
|
+
* This method is designed to be used in conjunction with {@link CoreCrypto.mlsInitWithClientID} and represents the first step in this process
|
490
|
+
*
|
491
|
+
* @returns This returns the TLS-serialized identity key (i.e. the signature keypair's public key)
|
492
|
+
*/
|
493
|
+
mlsGenerateKeypair(): Promise<Uint8Array>;
|
494
|
+
/**
|
495
|
+
* Updates the current temporary Client ID with the newly provided one. This is the second step in the externally-generated clients process
|
496
|
+
*
|
497
|
+
* Important: This is designed to be called after {@link CoreCrypto.mlsGenerateKeyPair}
|
498
|
+
*
|
499
|
+
* @param clientId - The newly-allocated client ID by the MLS Authentication Service
|
500
|
+
* @param signaturePublicKey - The public key you were given at the first step; This is for authentication purposes
|
501
|
+
*/
|
502
|
+
mlsInitWithClientId(clientId: ClientId, signaturePublicKey: Uint8Array): Promise<void>;
|
608
503
|
/** @hidden */
|
609
504
|
private constructor();
|
610
505
|
/**
|
@@ -624,7 +519,7 @@ export declare class CoreCrypto {
|
|
624
519
|
*
|
625
520
|
* @param callbacks - Any interface following the {@link CoreCryptoCallbacks} interface
|
626
521
|
*/
|
627
|
-
registerCallbacks(callbacks: CoreCryptoCallbacks): void
|
522
|
+
registerCallbacks(callbacks: CoreCryptoCallbacks, ctx?: any): Promise<void>;
|
628
523
|
/**
|
629
524
|
* Checks if the Client is member of a given conversation and if the MLS Group is loaded up
|
630
525
|
*
|
@@ -952,9 +847,19 @@ export declare class CoreCrypto {
|
|
952
847
|
/**
|
953
848
|
* Creates a new prekey with an automatically generated ID..
|
954
849
|
*
|
955
|
-
* @returns
|
850
|
+
* @returns A CBOR-serialized version of the PreKeyBundle corresponding to the newly generated and stored PreKey
|
956
851
|
*/
|
957
852
|
proteusNewPrekeyAuto(): Promise<Uint8Array>;
|
853
|
+
/**
|
854
|
+
* Proteus last resort prekey stuff
|
855
|
+
*
|
856
|
+
* @returns A CBOR-serialize version of the PreKeyBundle associated with the last resort PreKey (holding the last resort prekey id)
|
857
|
+
*/
|
858
|
+
proteusLastResortPrekey(): Promise<Uint8Array>;
|
859
|
+
/**
|
860
|
+
* @returns The last resort PreKey id
|
861
|
+
*/
|
862
|
+
static proteusLastResortPrekeyId(): number;
|
958
863
|
/**
|
959
864
|
* Proteus public key fingerprint
|
960
865
|
* It's basically the public key encoded as an hex string
|
@@ -997,12 +902,12 @@ export declare class CoreCrypto {
|
|
997
902
|
/**
|
998
903
|
* Creates an enrollment instance with private key material you can use in order to fetch
|
999
904
|
* a new x509 certificate from the acme server.
|
1000
|
-
* Make sure to call
|
905
|
+
* Make sure to call {@link WireE2eIdentity.free} to dispose this instance and its associated
|
1001
906
|
* keying material.
|
1002
907
|
*
|
1003
908
|
* @param ciphersuite - For generating signing key material. Only {@link Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519} is supported currently
|
1004
909
|
*/
|
1005
|
-
newAcmeEnrollment(): Promise<WireE2eIdentity>;
|
910
|
+
newAcmeEnrollment(ciphersuite?: Ciphersuite): Promise<WireE2eIdentity>;
|
1006
911
|
/**
|
1007
912
|
* Returns the current version of {@link CoreCrypto}
|
1008
913
|
*
|
@@ -1016,7 +921,8 @@ type AcmeOrder = Uint8Array;
|
|
1016
921
|
export declare class WireE2eIdentity {
|
1017
922
|
#private;
|
1018
923
|
/** @hidden */
|
1019
|
-
constructor(e2ei:
|
924
|
+
constructor(e2ei: unknown);
|
925
|
+
free(): void;
|
1020
926
|
/**
|
1021
927
|
* Parses the response from `GET /acme/{provisioner-name}/directory`.
|
1022
928
|
* Use this {@link AcmeDirectory} in the next step to fetch the first nonce from the acme server. Use
|
@@ -1133,13 +1039,13 @@ export declare class WireE2eIdentity {
|
|
1133
1039
|
/**
|
1134
1040
|
* Final step before fetching the certificate.
|
1135
1041
|
*
|
1136
|
-
* @param domains you want to generate a certificate for e.g. `["wire.com"]`
|
1137
|
-
* @param order you got from {@link checkOrderResponse}
|
1138
|
-
* @param account you found after {@link newAccountResponse}
|
1139
|
-
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/order/{order-id}`
|
1042
|
+
* @param domains - domains you want to generate a certificate for e.g. `["wire.com"]`
|
1043
|
+
* @param order - order you got from {@link checkOrderResponse}
|
1044
|
+
* @param account - account you found after {@link newAccountResponse}
|
1045
|
+
* @param previousNonce - `replay-nonce` response header from `POST /acme/{provisioner-name}/order/{order-id}`
|
1140
1046
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
1141
1047
|
*/
|
1142
|
-
finalizeRequest(domains:
|
1048
|
+
finalizeRequest(domains: string[], order: AcmeOrder, account: AcmeAccount, previousNonce: string): JsonRawData;
|
1143
1049
|
/**
|
1144
1050
|
* Parses the response from `POST /acme/{provisioner-name}/order/{order-id}/finalize`.
|
1145
1051
|
*
|
@@ -228,7 +228,7 @@ function makeMutClosure(arg0, arg1, dtor, f) {
|
|
228
228
|
function __wbg_adapter_52(arg0, arg1, arg2) {
|
229
229
|
try {
|
230
230
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
231
|
-
wasm$1.
|
231
|
+
wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h0b669391a1ca469a(retptr, arg0, arg1, addHeapObject(arg2));
|
232
232
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
233
233
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
234
234
|
if (r1) {
|
@@ -240,7 +240,7 @@ function __wbg_adapter_52(arg0, arg1, arg2) {
|
|
240
240
|
}
|
241
241
|
}
|
242
242
|
function __wbg_adapter_55(arg0, arg1, arg2) {
|
243
|
-
wasm$1.
|
243
|
+
wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__ha3d8e2730fb8635e(arg0, arg1, addHeapObject(arg2));
|
244
244
|
}
|
245
245
|
function _assertClass(instance, klass) {
|
246
246
|
if (!(instance instanceof klass)) {
|
@@ -279,23 +279,6 @@ function getArrayJsValueFromWasm0(ptr, len) {
|
|
279
279
|
}
|
280
280
|
return result;
|
281
281
|
}
|
282
|
-
/**
|
283
|
-
* Returns the current version of CoreCrypto
|
284
|
-
* @returns {string}
|
285
|
-
*/
|
286
|
-
function version() {
|
287
|
-
try {
|
288
|
-
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
289
|
-
wasm$1.version(retptr);
|
290
|
-
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
291
|
-
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
292
|
-
return getStringFromWasm0(r0, r1);
|
293
|
-
}
|
294
|
-
finally {
|
295
|
-
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
296
|
-
wasm$1.__wbindgen_free(r0, r1);
|
297
|
-
}
|
298
|
-
}
|
299
282
|
function handleError(f, args) {
|
300
283
|
try {
|
301
284
|
return f.apply(this, args);
|
@@ -307,8 +290,8 @@ function handleError(f, args) {
|
|
307
290
|
function getArrayU8FromWasm0(ptr, len) {
|
308
291
|
return getUint8Memory0().subarray(ptr / 1, ptr / 1 + len);
|
309
292
|
}
|
310
|
-
function
|
311
|
-
wasm$1.
|
293
|
+
function __wbg_adapter_271(arg0, arg1, arg2, arg3) {
|
294
|
+
wasm$1.wasm_bindgen__convert__closures__invoke2_mut__h191981cd1d6b08cc(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
|
312
295
|
}
|
313
296
|
/**
|
314
297
|
* see [core_crypto::prelude::MlsWirePolicy]
|
@@ -659,6 +642,23 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
659
642
|
wasm$1.__wbg_corecrypto_free(ptr);
|
660
643
|
}
|
661
644
|
/**
|
645
|
+
* Returns the current version of CoreCrypto
|
646
|
+
* @returns {string}
|
647
|
+
*/
|
648
|
+
static version() {
|
649
|
+
try {
|
650
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
651
|
+
wasm$1.corecrypto_version(retptr);
|
652
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
653
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
654
|
+
return getStringFromWasm0(r0, r1);
|
655
|
+
}
|
656
|
+
finally {
|
657
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
658
|
+
wasm$1.__wbindgen_free(r0, r1);
|
659
|
+
}
|
660
|
+
}
|
661
|
+
/**
|
662
662
|
* see [core_crypto::MlsCentral::try_new]
|
663
663
|
* @param {string} path
|
664
664
|
* @param {string} key
|
@@ -707,6 +707,32 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
707
707
|
return takeObject(ret);
|
708
708
|
}
|
709
709
|
/**
|
710
|
+
* Returns [`WasmCryptoResult<Vec<u8>>`]
|
711
|
+
*
|
712
|
+
* See [core_crypto::MlsCentral::mls_generate_keypair]
|
713
|
+
* @returns {Promise<any>}
|
714
|
+
*/
|
715
|
+
mls_generate_keypair() {
|
716
|
+
const ret = wasm$1.corecrypto_mls_generate_keypair(this.ptr);
|
717
|
+
return takeObject(ret);
|
718
|
+
}
|
719
|
+
/**
|
720
|
+
* Returns [`WasmCryptoResult<()>`]
|
721
|
+
*
|
722
|
+
* See [core_crypto::MlsCentral::mls_init_with_client_id]
|
723
|
+
* @param {Uint8Array} client_id
|
724
|
+
* @param {Uint8Array} signature_public_key
|
725
|
+
* @returns {Promise<any>}
|
726
|
+
*/
|
727
|
+
mls_init_with_client_id(client_id, signature_public_key) {
|
728
|
+
const ptr0 = passArray8ToWasm0(client_id, wasm$1.__wbindgen_malloc);
|
729
|
+
const len0 = WASM_VECTOR_LEN;
|
730
|
+
const ptr1 = passArray8ToWasm0(signature_public_key, wasm$1.__wbindgen_malloc);
|
731
|
+
const len1 = WASM_VECTOR_LEN;
|
732
|
+
const ret = wasm$1.corecrypto_mls_init_with_client_id(this.ptr, ptr0, len0, ptr1, len1);
|
733
|
+
return takeObject(ret);
|
734
|
+
}
|
735
|
+
/**
|
710
736
|
* Returns: [`WasmCryptoResult<()>`]
|
711
737
|
*
|
712
738
|
* see [core_crypto::MlsCentral::close]
|
@@ -1227,7 +1253,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1227
1253
|
* see [core_crypto::proteus::ProteusCentral::encrypt]
|
1228
1254
|
* @param {string} session_id
|
1229
1255
|
* @param {Uint8Array} plaintext
|
1230
|
-
* @returns {Promise<
|
1256
|
+
* @returns {Promise<Promise<any>>}
|
1231
1257
|
*/
|
1232
1258
|
proteus_encrypt(session_id, plaintext) {
|
1233
1259
|
const ptr0 = passStringToWasm0(session_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
@@ -1243,7 +1269,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1243
1269
|
* see [core_crypto::proteus::ProteusCentral::encrypt_batched]
|
1244
1270
|
* @param {(string)[]} sessions
|
1245
1271
|
* @param {Uint8Array} plaintext
|
1246
|
-
* @returns {Promise<
|
1272
|
+
* @returns {Promise<any>}
|
1247
1273
|
*/
|
1248
1274
|
proteus_encrypt_batched(sessions, plaintext) {
|
1249
1275
|
const ptr0 = passArrayJsValueToWasm0(sessions, wasm$1.__wbindgen_malloc);
|
@@ -1258,7 +1284,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1258
1284
|
*
|
1259
1285
|
* see [core_crypto::proteus::ProteusCentral::new_prekey]
|
1260
1286
|
* @param {number} prekey_id
|
1261
|
-
* @returns {Promise<
|
1287
|
+
* @returns {Promise<Promise<any>>}
|
1262
1288
|
*/
|
1263
1289
|
proteus_new_prekey(prekey_id) {
|
1264
1290
|
const ret = wasm$1.corecrypto_proteus_new_prekey(this.ptr, prekey_id);
|
@@ -1268,13 +1294,45 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1268
1294
|
* Returns: [`WasmCryptoResult<Uint8Array>`]
|
1269
1295
|
*
|
1270
1296
|
* see [core_crypto::proteus::ProteusCentral::new_prekey]
|
1271
|
-
* @returns {Promise<
|
1297
|
+
* @returns {Promise<Promise<any>>}
|
1272
1298
|
*/
|
1273
1299
|
proteus_new_prekey_auto() {
|
1274
1300
|
const ret = wasm$1.corecrypto_proteus_new_prekey_auto(this.ptr);
|
1275
1301
|
return takeObject(ret);
|
1276
1302
|
}
|
1277
1303
|
/**
|
1304
|
+
* Returns [`WasmCryptoResult<Uint8Array>`]
|
1305
|
+
*
|
1306
|
+
* see [core_crypto::proteus::ProteusCentral::last_resort_prekey]
|
1307
|
+
* @returns {Promise<any>}
|
1308
|
+
*/
|
1309
|
+
proteus_last_resort_prekey() {
|
1310
|
+
const ret = wasm$1.corecrypto_proteus_last_resort_prekey(this.ptr);
|
1311
|
+
return takeObject(ret);
|
1312
|
+
}
|
1313
|
+
/**
|
1314
|
+
* Returns: [`WasmCryptoResult<u16>`]
|
1315
|
+
*
|
1316
|
+
* see [core_crypto::proteus::ProteusCentral::last_resort_prekey_id]
|
1317
|
+
* @returns {number}
|
1318
|
+
*/
|
1319
|
+
static proteus_last_resort_prekey_id() {
|
1320
|
+
try {
|
1321
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1322
|
+
wasm$1.corecrypto_proteus_last_resort_prekey_id(retptr);
|
1323
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1324
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1325
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
1326
|
+
if (r2) {
|
1327
|
+
throw takeObject(r1);
|
1328
|
+
}
|
1329
|
+
return r0;
|
1330
|
+
}
|
1331
|
+
finally {
|
1332
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
1333
|
+
}
|
1334
|
+
}
|
1335
|
+
/**
|
1278
1336
|
* Returns: [`WasmCryptoResult<String>`]
|
1279
1337
|
*
|
1280
1338
|
* see [core_crypto::proteus::ProteusCentral::fingerprint]
|
@@ -1421,9 +1479,10 @@ class CoreCryptoWasmCallbacks {
|
|
1421
1479
|
* @param {Function} authorize
|
1422
1480
|
* @param {Function} user_authorize
|
1423
1481
|
* @param {Function} client_is_existing_group_user
|
1482
|
+
* @param {any} ctx
|
1424
1483
|
*/
|
1425
|
-
constructor(authorize, user_authorize, client_is_existing_group_user) {
|
1426
|
-
const ret = wasm$1.corecryptowasmcallbacks_new(addHeapObject(authorize), addHeapObject(user_authorize), addHeapObject(client_is_existing_group_user));
|
1484
|
+
constructor(authorize, user_authorize, client_is_existing_group_user, ctx) {
|
1485
|
+
const ret = wasm$1.corecryptowasmcallbacks_new(addHeapObject(authorize), addHeapObject(user_authorize), addHeapObject(client_is_existing_group_user), addHeapObject(ctx));
|
1427
1486
|
return CoreCryptoWasmCallbacks.__wrap(ret);
|
1428
1487
|
}
|
1429
1488
|
}
|
@@ -1838,7 +1897,7 @@ class FfiWireE2EIdentity {
|
|
1838
1897
|
}
|
1839
1898
|
/**
|
1840
1899
|
* See [core_crypto::e2e_identity::WireE2eIdentity::finalize_request]
|
1841
|
-
* @param {(
|
1900
|
+
* @param {(string)[]} domains
|
1842
1901
|
* @param {Uint8Array} order
|
1843
1902
|
* @param {Uint8Array} account
|
1844
1903
|
* @param {string} previous_nonce
|
@@ -2244,9 +2303,27 @@ async function load(module, imports) {
|
|
2244
2303
|
function getImports() {
|
2245
2304
|
const imports = {};
|
2246
2305
|
imports.wbg = {};
|
2306
|
+
imports.wbg.__wbg_new_f9876326328f45ed = function () {
|
2307
|
+
const ret = new Object();
|
2308
|
+
return addHeapObject(ret);
|
2309
|
+
};
|
2310
|
+
imports.wbg.__wbg_new_b525de17f44a8943 = function () {
|
2311
|
+
const ret = new Array();
|
2312
|
+
return addHeapObject(ret);
|
2313
|
+
};
|
2314
|
+
imports.wbg.__wbg_set_17224bc548dd1d7b = function (arg0, arg1, arg2) {
|
2315
|
+
getObject(arg0)[arg1 >>> 0] = takeObject(arg2);
|
2316
|
+
};
|
2317
|
+
imports.wbg.__wbg_set_20cbc34131e76824 = function (arg0, arg1, arg2) {
|
2318
|
+
getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
|
2319
|
+
};
|
2247
2320
|
imports.wbg.__wbindgen_object_drop_ref = function (arg0) {
|
2248
2321
|
takeObject(arg0);
|
2249
2322
|
};
|
2323
|
+
imports.wbg.__wbindgen_number_new = function (arg0) {
|
2324
|
+
const ret = arg0;
|
2325
|
+
return addHeapObject(ret);
|
2326
|
+
};
|
2250
2327
|
imports.wbg.__wbindgen_object_clone_ref = function (arg0) {
|
2251
2328
|
const ret = getObject(arg0);
|
2252
2329
|
return addHeapObject(ret);
|
@@ -2296,20 +2373,20 @@ function getImports() {
|
|
2296
2373
|
const ret = getObject(arg0).length;
|
2297
2374
|
return ret;
|
2298
2375
|
};
|
2299
|
-
imports.wbg.__wbg_new_537b7341ce90bb31 = function (arg0) {
|
2300
|
-
const ret = new Uint8Array(getObject(arg0));
|
2301
|
-
return addHeapObject(ret);
|
2302
|
-
};
|
2303
2376
|
imports.wbg.__wbg_call_9495de66fdbe016b = function () {
|
2304
2377
|
return handleError(function (arg0, arg1, arg2) {
|
2305
2378
|
const ret = getObject(arg0).call(getObject(arg1), getObject(arg2));
|
2306
2379
|
return addHeapObject(ret);
|
2307
2380
|
}, arguments);
|
2308
2381
|
};
|
2309
|
-
imports.wbg.
|
2310
|
-
const ret = new
|
2382
|
+
imports.wbg.__wbg_new_537b7341ce90bb31 = function (arg0) {
|
2383
|
+
const ret = new Uint8Array(getObject(arg0));
|
2311
2384
|
return addHeapObject(ret);
|
2312
2385
|
};
|
2386
|
+
imports.wbg.__wbg_push_49c286f04dd3bf59 = function (arg0, arg1) {
|
2387
|
+
const ret = getObject(arg0).push(getObject(arg1));
|
2388
|
+
return ret;
|
2389
|
+
};
|
2313
2390
|
imports.wbg.__wbg_new_f841cc6f2098f4b5 = function () {
|
2314
2391
|
const ret = new Map();
|
2315
2392
|
return addHeapObject(ret);
|
@@ -2322,28 +2399,6 @@ function getImports() {
|
|
2322
2399
|
const ret = BigInt.asUintN(64, arg0);
|
2323
2400
|
return addHeapObject(ret);
|
2324
2401
|
};
|
2325
|
-
imports.wbg.__wbg_ffiwiree2eidentity_new = function (arg0) {
|
2326
|
-
const ret = FfiWireE2EIdentity.__wrap(arg0);
|
2327
|
-
return addHeapObject(ret);
|
2328
|
-
};
|
2329
|
-
imports.wbg.__wbg_new_b525de17f44a8943 = function () {
|
2330
|
-
const ret = new Array();
|
2331
|
-
return addHeapObject(ret);
|
2332
|
-
};
|
2333
|
-
imports.wbg.__wbg_set_17224bc548dd1d7b = function (arg0, arg1, arg2) {
|
2334
|
-
getObject(arg0)[arg1 >>> 0] = takeObject(arg2);
|
2335
|
-
};
|
2336
|
-
imports.wbg.__wbg_set_20cbc34131e76824 = function (arg0, arg1, arg2) {
|
2337
|
-
getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
|
2338
|
-
};
|
2339
|
-
imports.wbg.__wbindgen_number_new = function (arg0) {
|
2340
|
-
const ret = arg0;
|
2341
|
-
return addHeapObject(ret);
|
2342
|
-
};
|
2343
|
-
imports.wbg.__wbg_push_49c286f04dd3bf59 = function (arg0, arg1) {
|
2344
|
-
const ret = getObject(arg0).push(getObject(arg1));
|
2345
|
-
return ret;
|
2346
|
-
};
|
2347
2402
|
imports.wbg.__wbg_new_9d3a9ce4282a18a8 = function (arg0, arg1) {
|
2348
2403
|
try {
|
2349
2404
|
var state0 = { a: arg0, b: arg1 };
|
@@ -2351,7 +2406,7 @@ function getImports() {
|
|
2351
2406
|
const a = state0.a;
|
2352
2407
|
state0.a = 0;
|
2353
2408
|
try {
|
2354
|
-
return
|
2409
|
+
return __wbg_adapter_271(a, state0.b, arg0, arg1);
|
2355
2410
|
}
|
2356
2411
|
finally {
|
2357
2412
|
state0.a = a;
|
@@ -2364,6 +2419,10 @@ function getImports() {
|
|
2364
2419
|
state0.a = state0.b = 0;
|
2365
2420
|
}
|
2366
2421
|
};
|
2422
|
+
imports.wbg.__wbg_ffiwiree2eidentity_new = function (arg0) {
|
2423
|
+
const ret = FfiWireE2EIdentity.__wrap(arg0);
|
2424
|
+
return addHeapObject(ret);
|
2425
|
+
};
|
2367
2426
|
imports.wbg.__wbg_setonsuccess_925a7718d3f62bc1 = function (arg0, arg1) {
|
2368
2427
|
getObject(arg0).onsuccess = getObject(arg1);
|
2369
2428
|
};
|
@@ -2448,6 +2507,10 @@ function getImports() {
|
|
2448
2507
|
return addHeapObject(ret);
|
2449
2508
|
}, arguments);
|
2450
2509
|
};
|
2510
|
+
imports.wbg.__wbg_length_ea0846e494e3b16e = function (arg0) {
|
2511
|
+
const ret = getObject(arg0).length;
|
2512
|
+
return ret;
|
2513
|
+
};
|
2451
2514
|
imports.wbg.__wbg_reject_57029f54148d79c3 = function (arg0) {
|
2452
2515
|
const ret = Promise.reject(getObject(arg0));
|
2453
2516
|
return addHeapObject(ret);
|
@@ -2638,6 +2701,10 @@ function getImports() {
|
|
2638
2701
|
const ret = new Uint8Array(arg0 >>> 0);
|
2639
2702
|
return addHeapObject(ret);
|
2640
2703
|
};
|
2704
|
+
imports.wbg.__wbg_charCodeAt_d78a90aced59e02f = function (arg0, arg1) {
|
2705
|
+
const ret = getObject(arg0).charCodeAt(arg1 >>> 0);
|
2706
|
+
return ret;
|
2707
|
+
};
|
2641
2708
|
imports.wbg.__wbg_next_88560ec06a094dea = function () {
|
2642
2709
|
return handleError(function (arg0) {
|
2643
2710
|
const ret = getObject(arg0).next();
|
@@ -2719,6 +2786,12 @@ function getImports() {
|
|
2719
2786
|
const ret = getObject(arg0).target;
|
2720
2787
|
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
2721
2788
|
};
|
2789
|
+
imports.wbg.__wbg_error_f64b8d41ed4d2fdc = function () {
|
2790
|
+
return handleError(function (arg0) {
|
2791
|
+
const ret = getObject(arg0).error;
|
2792
|
+
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
2793
|
+
}, arguments);
|
2794
|
+
};
|
2722
2795
|
imports.wbg.__wbg_result_3a1fef332bc47038 = function () {
|
2723
2796
|
return handleError(function (arg0) {
|
2724
2797
|
const ret = getObject(arg0).result;
|
@@ -2759,12 +2832,6 @@ function getImports() {
|
|
2759
2832
|
getObject(arg0).deleteObjectStore(getStringFromWasm0(arg1, arg2));
|
2760
2833
|
}, arguments);
|
2761
2834
|
};
|
2762
|
-
imports.wbg.__wbg_error_f64b8d41ed4d2fdc = function () {
|
2763
|
-
return handleError(function (arg0) {
|
2764
|
-
const ret = getObject(arg0).error;
|
2765
|
-
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
2766
|
-
}, arguments);
|
2767
|
-
};
|
2768
2835
|
imports.wbg.__wbindgen_is_falsy = function (arg0) {
|
2769
2836
|
const ret = !getObject(arg0);
|
2770
2837
|
return ret;
|
@@ -2880,6 +2947,10 @@ function getImports() {
|
|
2880
2947
|
const ret = getObject(arg0).then(getObject(arg1));
|
2881
2948
|
return addHeapObject(ret);
|
2882
2949
|
};
|
2950
|
+
imports.wbg.__wbg_then_f753623316e2873a = function (arg0, arg1, arg2) {
|
2951
|
+
const ret = getObject(arg0).then(getObject(arg1), getObject(arg2));
|
2952
|
+
return addHeapObject(ret);
|
2953
|
+
};
|
2883
2954
|
imports.wbg.__wbg_resolve_fd40f858d9db1a04 = function (arg0) {
|
2884
2955
|
const ret = Promise.resolve(getObject(arg0));
|
2885
2956
|
return addHeapObject(ret);
|
@@ -2944,12 +3015,12 @@ function getImports() {
|
|
2944
3015
|
return addHeapObject(ret);
|
2945
3016
|
}, arguments);
|
2946
3017
|
};
|
2947
|
-
imports.wbg.
|
2948
|
-
const ret = makeMutClosure(arg0, arg1,
|
3018
|
+
imports.wbg.__wbindgen_closure_wrapper4402 = function (arg0, arg1, arg2) {
|
3019
|
+
const ret = makeMutClosure(arg0, arg1, 145, __wbg_adapter_52);
|
2949
3020
|
return addHeapObject(ret);
|
2950
3021
|
};
|
2951
|
-
imports.wbg.
|
2952
|
-
const ret = makeMutClosure(arg0, arg1,
|
3022
|
+
imports.wbg.__wbindgen_closure_wrapper4858 = function (arg0, arg1, arg2) {
|
3023
|
+
const ret = makeMutClosure(arg0, arg1, 145, __wbg_adapter_55);
|
2953
3024
|
return addHeapObject(ret);
|
2954
3025
|
};
|
2955
3026
|
return imports;
|
@@ -3003,14 +3074,13 @@ var exports = /*#__PURE__*/Object.freeze({
|
|
3003
3074
|
PublicGroupStateBundle: PublicGroupStateBundle,
|
3004
3075
|
WirePolicy: WirePolicy$1,
|
3005
3076
|
default: init,
|
3006
|
-
initSync: initSync
|
3007
|
-
version: version
|
3077
|
+
initSync: initSync
|
3008
3078
|
});
|
3009
3079
|
|
3010
3080
|
var wasm = async (opt = {}) => {
|
3011
3081
|
let {importHook, serverPath} = opt;
|
3012
3082
|
|
3013
|
-
let path = "assets/core_crypto_ffi-
|
3083
|
+
let path = "assets/core_crypto_ffi-d7dac5b2.wasm";
|
3014
3084
|
|
3015
3085
|
if (serverPath != null) {
|
3016
3086
|
path = serverPath + /[^\/\\]*$/.exec(path)[0];
|
@@ -3026,7 +3096,7 @@ var wasm = async (opt = {}) => {
|
|
3026
3096
|
|
3027
3097
|
// Wire
|
3028
3098
|
// Copyright (C) 2022 Wire Swiss GmbH
|
3029
|
-
var _a, _CoreCrypto_module, _CoreCrypto_cc, _WireE2eIdentity_e2ei;
|
3099
|
+
var _a, _CoreCrypto_module, _CoreCrypto_cc, _CoreCrypto_assertModuleLoaded, _WireE2eIdentity_e2ei;
|
3030
3100
|
/**
|
3031
3101
|
* Error wrapper that takes care of extracting rich error details across the FFI (through JSON parsing)
|
3032
3102
|
*
|
@@ -3046,7 +3116,7 @@ class CoreCryptoError extends Error {
|
|
3046
3116
|
this.proteusErrorCode = richError.proteusErrorCode;
|
3047
3117
|
}
|
3048
3118
|
static fallback(msg, ...params) {
|
3049
|
-
console.warn(
|
3119
|
+
console.warn(`Cannot build CoreCryptoError, falling back to standard Error! ctx: ${msg}`);
|
3050
3120
|
// @ts-ignore
|
3051
3121
|
return new Error(msg, ...params);
|
3052
3122
|
}
|
@@ -3269,6 +3339,26 @@ class CoreCrypto {
|
|
3269
3339
|
async mlsInit(clientId) {
|
3270
3340
|
return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").mls_init(clientId));
|
3271
3341
|
}
|
3342
|
+
/**
|
3343
|
+
* Generates a MLS KeyPair/CredentialBundle with a temporary, random client ID.
|
3344
|
+
* This method is designed to be used in conjunction with {@link CoreCrypto.mlsInitWithClientID} and represents the first step in this process
|
3345
|
+
*
|
3346
|
+
* @returns This returns the TLS-serialized identity key (i.e. the signature keypair's public key)
|
3347
|
+
*/
|
3348
|
+
async mlsGenerateKeypair() {
|
3349
|
+
return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").mls_generate_keypair());
|
3350
|
+
}
|
3351
|
+
/**
|
3352
|
+
* Updates the current temporary Client ID with the newly provided one. This is the second step in the externally-generated clients process
|
3353
|
+
*
|
3354
|
+
* Important: This is designed to be called after {@link CoreCrypto.mlsGenerateKeyPair}
|
3355
|
+
*
|
3356
|
+
* @param clientId - The newly-allocated client ID by the MLS Authentication Service
|
3357
|
+
* @param signaturePublicKey - The public key you were given at the first step; This is for authentication purposes
|
3358
|
+
*/
|
3359
|
+
async mlsInitWithClientId(clientId, signaturePublicKey) {
|
3360
|
+
return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").mls_init_with_client_id(clientId, signaturePublicKey));
|
3361
|
+
}
|
3272
3362
|
/** @hidden */
|
3273
3363
|
constructor(cc) {
|
3274
3364
|
/** @hidden */
|
@@ -3296,10 +3386,10 @@ class CoreCrypto {
|
|
3296
3386
|
*
|
3297
3387
|
* @param callbacks - Any interface following the {@link CoreCryptoCallbacks} interface
|
3298
3388
|
*/
|
3299
|
-
registerCallbacks(callbacks) {
|
3389
|
+
async registerCallbacks(callbacks, ctx = null) {
|
3300
3390
|
try {
|
3301
|
-
const wasmCallbacks = new (__classPrivateFieldGet(CoreCrypto, _a, "f", _CoreCrypto_module).CoreCryptoWasmCallbacks)(callbacks.authorize, callbacks.userAuthorize, callbacks.clientIsExistingGroupUser);
|
3302
|
-
__classPrivateFieldGet(this, _CoreCrypto_cc, "f").set_callbacks(wasmCallbacks);
|
3391
|
+
const wasmCallbacks = new (__classPrivateFieldGet(CoreCrypto, _a, "f", _CoreCrypto_module).CoreCryptoWasmCallbacks)(callbacks.authorize, callbacks.userAuthorize, callbacks.clientIsExistingGroupUser, ctx);
|
3392
|
+
await __classPrivateFieldGet(this, _CoreCrypto_cc, "f").set_callbacks(wasmCallbacks);
|
3303
3393
|
}
|
3304
3394
|
catch (e) {
|
3305
3395
|
throw CoreCryptoError.fromStdError(e);
|
@@ -3377,6 +3467,9 @@ class CoreCrypto {
|
|
3377
3467
|
* @returns a {@link DecryptedMessage}. Note that {@link DecryptedMessage#message} is `undefined` when the encrypted payload contains a system message such a proposal or commit
|
3378
3468
|
*/
|
3379
3469
|
async decryptMessage(conversationId, payload) {
|
3470
|
+
if (!payload?.length) {
|
3471
|
+
throw new Error("decryptMessage payload is empty or null");
|
3472
|
+
}
|
3380
3473
|
try {
|
3381
3474
|
const ffiDecryptedMessage = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").decrypt_message(conversationId, payload));
|
3382
3475
|
const commitDelay = ffiDecryptedMessage.commit_delay ?
|
@@ -3857,11 +3950,26 @@ class CoreCrypto {
|
|
3857
3950
|
/**
|
3858
3951
|
* Creates a new prekey with an automatically generated ID..
|
3859
3952
|
*
|
3860
|
-
* @returns
|
3953
|
+
* @returns A CBOR-serialized version of the PreKeyBundle corresponding to the newly generated and stored PreKey
|
3861
3954
|
*/
|
3862
3955
|
async proteusNewPrekeyAuto() {
|
3863
3956
|
return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").proteus_new_prekey_auto());
|
3864
3957
|
}
|
3958
|
+
/**
|
3959
|
+
* Proteus last resort prekey stuff
|
3960
|
+
*
|
3961
|
+
* @returns A CBOR-serialize version of the PreKeyBundle associated with the last resort PreKey (holding the last resort prekey id)
|
3962
|
+
*/
|
3963
|
+
async proteusLastResortPrekey() {
|
3964
|
+
return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").proteus_last_resort_prekey());
|
3965
|
+
}
|
3966
|
+
/**
|
3967
|
+
* @returns The last resort PreKey id
|
3968
|
+
*/
|
3969
|
+
static proteusLastResortPrekeyId() {
|
3970
|
+
__classPrivateFieldGet(this, _a, "m", _CoreCrypto_assertModuleLoaded).call(this);
|
3971
|
+
return __classPrivateFieldGet(this, _a, "f", _CoreCrypto_module).CoreCrypto.proteus_last_resort_prekey_id();
|
3972
|
+
}
|
3865
3973
|
/**
|
3866
3974
|
* Proteus public key fingerprint
|
3867
3975
|
* It's basically the public key encoded as an hex string
|
@@ -3921,13 +4029,16 @@ class CoreCrypto {
|
|
3921
4029
|
/**
|
3922
4030
|
* Creates an enrollment instance with private key material you can use in order to fetch
|
3923
4031
|
* a new x509 certificate from the acme server.
|
3924
|
-
* Make sure to call
|
4032
|
+
* Make sure to call {@link WireE2eIdentity.free} to dispose this instance and its associated
|
3925
4033
|
* keying material.
|
3926
4034
|
*
|
3927
4035
|
* @param ciphersuite - For generating signing key material. Only {@link Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519} is supported currently
|
3928
4036
|
*/
|
3929
|
-
async newAcmeEnrollment() {
|
3930
|
-
|
4037
|
+
async newAcmeEnrollment(ciphersuite = Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519) {
|
4038
|
+
if (ciphersuite !== Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519) {
|
4039
|
+
throw new Error("This ACME ciphersuite isn't supported. Only `Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519` is as of now");
|
4040
|
+
}
|
4041
|
+
const e2ei = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").new_acme_enrollment(ciphersuite));
|
3931
4042
|
return new WireE2eIdentity(e2ei);
|
3932
4043
|
}
|
3933
4044
|
/**
|
@@ -3936,13 +4047,15 @@ class CoreCrypto {
|
|
3936
4047
|
* @returns The `core-crypto-ffi` version as defined in its `Cargo.toml` file
|
3937
4048
|
*/
|
3938
4049
|
static version() {
|
3939
|
-
|
3940
|
-
|
3941
|
-
}
|
3942
|
-
return __classPrivateFieldGet(this, _a, "f", _CoreCrypto_module).version();
|
4050
|
+
__classPrivateFieldGet(this, _a, "m", _CoreCrypto_assertModuleLoaded).call(this);
|
4051
|
+
return __classPrivateFieldGet(this, _a, "f", _CoreCrypto_module).CoreCrypto.version();
|
3943
4052
|
}
|
3944
4053
|
}
|
3945
|
-
_a = CoreCrypto, _CoreCrypto_cc = new WeakMap()
|
4054
|
+
_a = CoreCrypto, _CoreCrypto_cc = new WeakMap(), _CoreCrypto_assertModuleLoaded = function _CoreCrypto_assertModuleLoaded() {
|
4055
|
+
if (!__classPrivateFieldGet(this, _a, "f", _CoreCrypto_module)) {
|
4056
|
+
throw new Error("Internal module hasn't been initialized. Please use `await CoreCrypto.init(params)` or `await CoreCrypto.deferredInit(params)` !");
|
4057
|
+
}
|
4058
|
+
};
|
3946
4059
|
/** @hidden */
|
3947
4060
|
_CoreCrypto_module = { value: void 0 };
|
3948
4061
|
class WireE2eIdentity {
|
@@ -3952,6 +4065,9 @@ class WireE2eIdentity {
|
|
3952
4065
|
_WireE2eIdentity_e2ei.set(this, void 0);
|
3953
4066
|
__classPrivateFieldSet(this, _WireE2eIdentity_e2ei, e2ei, "f");
|
3954
4067
|
}
|
4068
|
+
free() {
|
4069
|
+
__classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").free();
|
4070
|
+
}
|
3955
4071
|
/**
|
3956
4072
|
* Parses the response from `GET /acme/{provisioner-name}/directory`.
|
3957
4073
|
* Use this {@link AcmeDirectory} in the next step to fetch the first nonce from the acme server. Use
|
@@ -4152,10 +4268,10 @@ class WireE2eIdentity {
|
|
4152
4268
|
/**
|
4153
4269
|
* Final step before fetching the certificate.
|
4154
4270
|
*
|
4155
|
-
* @param domains you want to generate a certificate for e.g. `["wire.com"]`
|
4156
|
-
* @param order you got from {@link checkOrderResponse}
|
4157
|
-
* @param account you found after {@link newAccountResponse}
|
4158
|
-
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/order/{order-id}`
|
4271
|
+
* @param domains - domains you want to generate a certificate for e.g. `["wire.com"]`
|
4272
|
+
* @param order - order you got from {@link checkOrderResponse}
|
4273
|
+
* @param account - account you found after {@link newAccountResponse}
|
4274
|
+
* @param previousNonce - `replay-nonce` response header from `POST /acme/{provisioner-name}/order/{order-id}`
|
4159
4275
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
4160
4276
|
*/
|
4161
4277
|
finalizeRequest(domains, order, account, previousNonce) {
|
Binary file
|