@wireapp/core-crypto 0.6.3 → 0.7.0-rc.2
Sign up to get free protection for your applications and to get access to all the features.
package/package.json
CHANGED
Binary file
|
@@ -108,6 +108,23 @@ export type ClientId = Uint8Array;
|
|
108
108
|
* Alias for proposal reference. It is a byte array of size 16.
|
109
109
|
*/
|
110
110
|
export type ProposalRef = Uint8Array;
|
111
|
+
/**
|
112
|
+
* Data shape for proteusNewPrekeyAuto() call returns.
|
113
|
+
*/
|
114
|
+
export interface ProteusAutoPrekeyBundle {
|
115
|
+
/**
|
116
|
+
* Proteus PreKey id
|
117
|
+
*
|
118
|
+
* @readonly
|
119
|
+
*/
|
120
|
+
id: number;
|
121
|
+
/**
|
122
|
+
* CBOR-serialized Proteus PreKeyBundle
|
123
|
+
*
|
124
|
+
* @readonly
|
125
|
+
*/
|
126
|
+
pkb: Uint8Array;
|
127
|
+
}
|
111
128
|
/**
|
112
129
|
* Data shape for the returned MLS commit & welcome message tuple upon adding clients to a conversation
|
113
130
|
*/
|
@@ -429,7 +446,7 @@ export interface CoreCryptoCallbacks {
|
|
429
446
|
* @param clientId - id of a client
|
430
447
|
* @param existingClients - all the clients currently within the MLS group
|
431
448
|
*/
|
432
|
-
clientIsExistingGroupUser: (conversationId: Uint8Array, clientId: Uint8Array, existingClients: Uint8Array[]) => Promise<boolean>;
|
449
|
+
clientIsExistingGroupUser: (conversationId: Uint8Array, clientId: Uint8Array, existingClients: Uint8Array[], parent_conversation_clients?: Uint8Array[]) => Promise<boolean>;
|
433
450
|
}
|
434
451
|
/**
|
435
452
|
* Wrapper for the WASM-compiled version of CoreCrypto
|
@@ -502,6 +519,13 @@ export declare class CoreCrypto {
|
|
502
519
|
mlsInitWithClientId(clientId: ClientId, signaturePublicKey: Uint8Array): Promise<void>;
|
503
520
|
/** @hidden */
|
504
521
|
private constructor();
|
522
|
+
/**
|
523
|
+
* If this returns > 1 you **cannot** call {@link CoreCrypto.wipe} or {@link CoreCrypto.close} as they will produce an error because of the
|
524
|
+
* outstanding references that were detected.
|
525
|
+
*
|
526
|
+
* @returns the count of strong refs for this CoreCrypto instance
|
527
|
+
*/
|
528
|
+
strongRefCount(): number;
|
505
529
|
/**
|
506
530
|
* Wipes the {@link CoreCrypto} backing storage (i.e. {@link https://developer.mozilla.org/en-US/docs/Web/API/IndexedDB_API | IndexedDB} database)
|
507
531
|
*
|
@@ -537,6 +561,14 @@ export declare class CoreCrypto {
|
|
537
561
|
* ```
|
538
562
|
*/
|
539
563
|
conversationExists(conversationId: ConversationId): Promise<boolean>;
|
564
|
+
/**
|
565
|
+
* Marks a conversation as child of another one
|
566
|
+
* This will mostly affect the behavior of the callbacks (the parentConversationClients parameter will be filled)
|
567
|
+
*
|
568
|
+
* @param childId - conversation identifier of the child conversation
|
569
|
+
* @param parentId - conversation identifier of the parent conversation
|
570
|
+
*/
|
571
|
+
markConversationAsChildOf(childId: ConversationId, parentId: ConversationId): Promise<void>;
|
540
572
|
/**
|
541
573
|
* Returns the current epoch of a conversation
|
542
574
|
*
|
@@ -847,9 +879,9 @@ export declare class CoreCrypto {
|
|
847
879
|
/**
|
848
880
|
* Creates a new prekey with an automatically generated ID..
|
849
881
|
*
|
850
|
-
* @returns A CBOR-serialized version of the PreKeyBundle corresponding to the newly generated and stored PreKey
|
882
|
+
* @returns A CBOR-serialized version of the PreKeyBundle corresponding to the newly generated and stored PreKey accompanied by its ID
|
851
883
|
*/
|
852
|
-
proteusNewPrekeyAuto(): Promise<
|
884
|
+
proteusNewPrekeyAuto(): Promise<ProteusAutoPrekeyBundle>;
|
853
885
|
/**
|
854
886
|
* Proteus last resort prekey stuff
|
855
887
|
*
|
@@ -906,6 +938,7 @@ export declare class CoreCrypto {
|
|
906
938
|
* keying material.
|
907
939
|
*
|
908
940
|
* @param ciphersuite - For generating signing key material. Only {@link Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519} is supported currently
|
941
|
+
* @returns The new {@link WireE2eIdentity} object
|
909
942
|
*/
|
910
943
|
newAcmeEnrollment(ciphersuite?: Ciphersuite): Promise<WireE2eIdentity>;
|
911
944
|
/**
|
@@ -951,16 +984,15 @@ export declare class WireE2eIdentity {
|
|
951
984
|
* Creates a new acme order for the handle (userId + display name) and the clientId.
|
952
985
|
*
|
953
986
|
* @param displayName human readable name displayed in the application e.g. `Smith, Alice M (QA)`
|
954
|
-
* @param
|
955
|
-
* @param
|
956
|
-
* @param handle user handle e.g. `impp:wireapp=alice.smith.qa@example.com`
|
987
|
+
* @param clientId client identifier with user b64Url encoded & clientId hex encoded e.g. `NDUyMGUyMmY2YjA3NGU3NjkyZjE1NjJjZTAwMmQ2NTQ:6add501bacd1d90e@example.com`
|
988
|
+
* @param handle user handle e.g. `alice.smith.qa@example.com`
|
957
989
|
* @param expiryDays generated x509 certificate expiry
|
958
990
|
* @param directory you got from {@link directoryResponse}
|
959
991
|
* @param account you got from {@link newAccountResponse}
|
960
992
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/new-account`
|
961
993
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
962
994
|
*/
|
963
|
-
newOrderRequest(displayName: string,
|
995
|
+
newOrderRequest(displayName: string, clientId: string, handle: string, expiryDays: number, directory: AcmeDirectory, account: AcmeAccount, previousNonce: string): JsonRawData;
|
964
996
|
/**
|
965
997
|
* Parses the response from `POST /acme/{provisioner-name}/new-order`.
|
966
998
|
*
|
@@ -981,10 +1013,6 @@ export declare class WireE2eIdentity {
|
|
981
1013
|
/**
|
982
1014
|
* Parses the response from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
983
1015
|
*
|
984
|
-
* You then have to map the challenge from this authorization object. The `client_id_challenge`
|
985
|
-
* will be the one with the `client_id_host` (you supplied to {@link newOrderRequest}) identifier,
|
986
|
-
* the other will be your `handle_challenge`.
|
987
|
-
*
|
988
1016
|
* @param authz HTTP response body
|
989
1017
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5
|
990
1018
|
*/
|
@@ -998,14 +1026,12 @@ export declare class WireE2eIdentity {
|
|
998
1026
|
* {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token} on wire-server.
|
999
1027
|
*
|
1000
1028
|
* @param accessTokenUrl backend endpoint where this token will be sent. Should be this one {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token}
|
1001
|
-
* @param
|
1002
|
-
* @param
|
1003
|
-
* @param domain owning backend domain e.g. `wire.com`
|
1004
|
-
* @param clientIdChallenge you found after {@link newAuthzResponse}
|
1029
|
+
* @param clientId client identifier with user b64Url encoded & clientId hex encoded e.g. `NDUyMGUyMmY2YjA3NGU3NjkyZjE1NjJjZTAwMmQ2NTQ:6add501bacd1d90e@example.com`
|
1030
|
+
* @param dpopChallenge you found after {@link newAuthzResponse}
|
1005
1031
|
* @param backendNonce you get by calling `GET /clients/token/nonce` on wire-server as defined here {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/get_clients__client__nonce}
|
1006
1032
|
* @param expiryDays token expiry in days
|
1007
1033
|
*/
|
1008
|
-
createDpopToken(accessTokenUrl: string,
|
1034
|
+
createDpopToken(accessTokenUrl: string, clientId: string, dpopChallenge: AcmeChallenge, backendNonce: string, expiryDays: number): string;
|
1009
1035
|
/**
|
1010
1036
|
* Creates a new challenge request for Wire Dpop challenge.
|
1011
1037
|
*
|
@@ -1140,7 +1166,7 @@ export interface NewAcmeAuthz {
|
|
1140
1166
|
*
|
1141
1167
|
* @readonly
|
1142
1168
|
*/
|
1143
|
-
|
1169
|
+
wireDpopChallenge: AcmeChallenge | null;
|
1144
1170
|
/**
|
1145
1171
|
* Challenge for the userId and displayName
|
1146
1172
|
*
|
@@ -226,12 +226,12 @@ function makeMutClosure(arg0, arg1, dtor, f) {
|
|
226
226
|
return real;
|
227
227
|
}
|
228
228
|
function __wbg_adapter_52(arg0, arg1, arg2) {
|
229
|
-
wasm$1.
|
229
|
+
wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h52d25f5c9b3d3ff2(arg0, arg1, addHeapObject(arg2));
|
230
230
|
}
|
231
231
|
function __wbg_adapter_55(arg0, arg1, arg2) {
|
232
232
|
try {
|
233
233
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
234
|
-
wasm$1.
|
234
|
+
wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__hf21a7c6a12593e32(retptr, arg0, arg1, addHeapObject(arg2));
|
235
235
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
236
236
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
237
237
|
if (r1) {
|
@@ -279,6 +279,9 @@ function getArrayJsValueFromWasm0(ptr, len) {
|
|
279
279
|
}
|
280
280
|
return result;
|
281
281
|
}
|
282
|
+
function getArrayU8FromWasm0(ptr, len) {
|
283
|
+
return getUint8Memory0().subarray(ptr / 1, ptr / 1 + len);
|
284
|
+
}
|
282
285
|
function handleError(f, args) {
|
283
286
|
try {
|
284
287
|
return f.apply(this, args);
|
@@ -287,11 +290,8 @@ function handleError(f, args) {
|
|
287
290
|
wasm$1.__wbindgen_exn_store(addHeapObject(e));
|
288
291
|
}
|
289
292
|
}
|
290
|
-
function
|
291
|
-
|
292
|
-
}
|
293
|
-
function __wbg_adapter_270(arg0, arg1, arg2, arg3) {
|
294
|
-
wasm$1.wasm_bindgen__convert__closures__invoke2_mut__h642728bf8a354f9a(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
|
293
|
+
function __wbg_adapter_282(arg0, arg1, arg2, arg3) {
|
294
|
+
wasm$1.wasm_bindgen__convert__closures__invoke2_mut__h48b463a50f27b62f(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
|
295
295
|
}
|
296
296
|
/**
|
297
297
|
* see [core_crypto::prelude::MlsWirePolicy]
|
@@ -659,7 +659,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
659
659
|
}
|
660
660
|
}
|
661
661
|
/**
|
662
|
-
* see [core_crypto::MlsCentral::try_new]
|
662
|
+
* see [core_crypto::mls::MlsCentral::try_new]
|
663
663
|
* @param {string} path
|
664
664
|
* @param {string} key
|
665
665
|
* @param {Uint8Array} client_id
|
@@ -679,7 +679,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
679
679
|
return takeObject(ret);
|
680
680
|
}
|
681
681
|
/**
|
682
|
-
* see [core_crypto::MlsCentral::try_new]
|
682
|
+
* see [core_crypto::mls::MlsCentral::try_new]
|
683
683
|
* @param {string} path
|
684
684
|
* @param {string} key
|
685
685
|
* @param {Uint8Array | undefined} entropy_seed
|
@@ -696,7 +696,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
696
696
|
return takeObject(ret);
|
697
697
|
}
|
698
698
|
/**
|
699
|
-
* see [core_crypto::MlsCentral::mls_init]
|
699
|
+
* see [core_crypto::mls::MlsCentral::mls_init]
|
700
700
|
* @param {Uint8Array} client_id
|
701
701
|
* @returns {Promise<Promise<any>>}
|
702
702
|
*/
|
@@ -709,7 +709,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
709
709
|
/**
|
710
710
|
* Returns [`WasmCryptoResult<Vec<u8>>`]
|
711
711
|
*
|
712
|
-
* See [core_crypto::MlsCentral::mls_generate_keypair]
|
712
|
+
* See [core_crypto::mls::MlsCentral::mls_generate_keypair]
|
713
713
|
* @returns {Promise<any>}
|
714
714
|
*/
|
715
715
|
mls_generate_keypair() {
|
@@ -719,7 +719,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
719
719
|
/**
|
720
720
|
* Returns [`WasmCryptoResult<()>`]
|
721
721
|
*
|
722
|
-
* See [core_crypto::MlsCentral::mls_init_with_client_id]
|
722
|
+
* See [core_crypto::mls::MlsCentral::mls_init_with_client_id]
|
723
723
|
* @param {Uint8Array} client_id
|
724
724
|
* @param {Uint8Array} signature_public_key
|
725
725
|
* @returns {Promise<any>}
|
@@ -733,9 +733,17 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
733
733
|
return takeObject(ret);
|
734
734
|
}
|
735
735
|
/**
|
736
|
+
* Returns the Arc strong ref count
|
737
|
+
* @returns {number}
|
738
|
+
*/
|
739
|
+
strong_ref_count() {
|
740
|
+
const ret = wasm$1.corecrypto_strong_ref_count(this.ptr);
|
741
|
+
return ret >>> 0;
|
742
|
+
}
|
743
|
+
/**
|
736
744
|
* Returns: [`WasmCryptoResult<()>`]
|
737
745
|
*
|
738
|
-
* see [core_crypto::MlsCentral::close]
|
746
|
+
* see [core_crypto::mls::MlsCentral::close]
|
739
747
|
* @returns {Promise<any>}
|
740
748
|
*/
|
741
749
|
close() {
|
@@ -746,7 +754,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
746
754
|
/**
|
747
755
|
* Returns: [`WasmCryptoResult<()>`]
|
748
756
|
*
|
749
|
-
* see [core_crypto::MlsCentral::wipe]
|
757
|
+
* see [core_crypto::mls::MlsCentral::wipe]
|
750
758
|
* @returns {Promise<any>}
|
751
759
|
*/
|
752
760
|
wipe() {
|
@@ -757,7 +765,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
757
765
|
/**
|
758
766
|
* Returns: [`WasmCryptoResult<()>`]
|
759
767
|
*
|
760
|
-
* see [core_crypto::MlsCentral::callbacks]
|
768
|
+
* see [core_crypto::mls::MlsCentral::callbacks]
|
761
769
|
* @param {CoreCryptoWasmCallbacks} callbacks
|
762
770
|
* @returns {Promise<any>}
|
763
771
|
*/
|
@@ -770,7 +778,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
770
778
|
/**
|
771
779
|
* Returns:: [`WasmCryptoResult<js_sys::Uint8Array>`]
|
772
780
|
*
|
773
|
-
* see [core_crypto::MlsCentral::client_public_key]
|
781
|
+
* see [core_crypto::mls::MlsCentral::client_public_key]
|
774
782
|
* @returns {Promise<any>}
|
775
783
|
*/
|
776
784
|
client_public_key() {
|
@@ -780,7 +788,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
780
788
|
/**
|
781
789
|
* Returns: [`WasmCryptoResult<js_sys::Array<js_sys::Uint8Array>>`]
|
782
790
|
*
|
783
|
-
* see [core_crypto::MlsCentral::client_keypackages]
|
791
|
+
* see [core_crypto::mls::MlsCentral::client_keypackages]
|
784
792
|
* @param {number} amount_requested
|
785
793
|
* @returns {Promise<any>}
|
786
794
|
*/
|
@@ -791,7 +799,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
791
799
|
/**
|
792
800
|
* Returns: [`WasmCryptoResult<usize>`]
|
793
801
|
*
|
794
|
-
* see [core_crypto::MlsCentral::client_valid_keypackages_count]
|
802
|
+
* see [core_crypto::mls::MlsCentral::client_valid_keypackages_count]
|
795
803
|
* @returns {Promise<any>}
|
796
804
|
*/
|
797
805
|
client_valid_keypackages_count() {
|
@@ -801,7 +809,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
801
809
|
/**
|
802
810
|
* Returns: [`WasmCryptoResult<()>`]
|
803
811
|
*
|
804
|
-
* see [core_crypto::MlsCentral::new_conversation]
|
812
|
+
* see [core_crypto::mls::MlsCentral::new_conversation]
|
805
813
|
* @param {Uint8Array} conversation_id
|
806
814
|
* @param {ConversationConfiguration} config
|
807
815
|
* @returns {Promise<any>}
|
@@ -817,7 +825,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
817
825
|
/**
|
818
826
|
* Returns [`WasmCryptoResult<u64>`]
|
819
827
|
*
|
820
|
-
* see [core_crypto::MlsCentral::conversation_epoch]
|
828
|
+
* see [core_crypto::mls::MlsCentral::conversation_epoch]
|
821
829
|
* @param {Uint8Array} conversation_id
|
822
830
|
* @returns {Promise<any>}
|
823
831
|
*/
|
@@ -830,7 +838,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
830
838
|
/**
|
831
839
|
* Returns: [`bool`]
|
832
840
|
*
|
833
|
-
* see [core_crypto::MlsCentral::conversation_exists]
|
841
|
+
* see [core_crypto::mls::MlsCentral::conversation_exists]
|
834
842
|
* @param {Uint8Array} conversation_id
|
835
843
|
* @returns {Promise<any>}
|
836
844
|
*/
|
@@ -843,7 +851,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
843
851
|
/**
|
844
852
|
* Returns: [`WasmCryptoResult<Uint8Array>`]
|
845
853
|
*
|
846
|
-
* see [core_crypto::MlsCentral::process_raw_welcome_message]
|
854
|
+
* see [core_crypto::mls::MlsCentral::process_raw_welcome_message]
|
847
855
|
* @param {Uint8Array} welcome_message
|
848
856
|
* @param {CustomConfiguration} custom_configuration
|
849
857
|
* @returns {Promise<any>}
|
@@ -859,7 +867,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
859
867
|
/**
|
860
868
|
* Returns: [`WasmCryptoResult<Option<MemberAddedMessages>>`]
|
861
869
|
*
|
862
|
-
* see [core_crypto::MlsCentral::add_members_to_conversation]
|
870
|
+
* see [core_crypto::mls::MlsCentral::add_members_to_conversation]
|
863
871
|
* @param {Uint8Array} conversation_id
|
864
872
|
* @param {any[]} clients
|
865
873
|
* @returns {Promise<any>}
|
@@ -875,7 +883,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
875
883
|
/**
|
876
884
|
* Returns: [`WasmCryptoResult<Option<js_sys::Uint8Array>>`]
|
877
885
|
*
|
878
|
-
* see [core_crypto::MlsCentral::remove_members_from_conversation]
|
886
|
+
* see [core_crypto::mls::MlsCentral::remove_members_from_conversation]
|
879
887
|
* @param {Uint8Array} conversation_id
|
880
888
|
* @param {(Uint8Array)[]} clients
|
881
889
|
* @returns {Promise<any>}
|
@@ -889,9 +897,25 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
889
897
|
return takeObject(ret);
|
890
898
|
}
|
891
899
|
/**
|
900
|
+
* Returns: [`WasmCryptoResult<()>`]
|
901
|
+
*
|
902
|
+
* see [core_crypto::mls::MlsCentral::mark_conversation_as_child_of]
|
903
|
+
* @param {Uint8Array} child_id
|
904
|
+
* @param {Uint8Array} parent_id
|
905
|
+
* @returns {Promise<any>}
|
906
|
+
*/
|
907
|
+
mark_conversation_as_child_of(child_id, parent_id) {
|
908
|
+
const ptr0 = passArray8ToWasm0(child_id, wasm$1.__wbindgen_malloc);
|
909
|
+
const len0 = WASM_VECTOR_LEN;
|
910
|
+
const ptr1 = passArray8ToWasm0(parent_id, wasm$1.__wbindgen_malloc);
|
911
|
+
const len1 = WASM_VECTOR_LEN;
|
912
|
+
const ret = wasm$1.corecrypto_mark_conversation_as_child_of(this.ptr, ptr0, len0, ptr1, len1);
|
913
|
+
return takeObject(ret);
|
914
|
+
}
|
915
|
+
/**
|
892
916
|
* Returns: [`WasmCryptoResult<CommitBundle>`]
|
893
917
|
*
|
894
|
-
* see [core_crypto::MlsCentral::update_keying_material]
|
918
|
+
* see [core_crypto::mls::MlsCentral::update_keying_material]
|
895
919
|
* @param {Uint8Array} conversation_id
|
896
920
|
* @returns {Promise<any>}
|
897
921
|
*/
|
@@ -902,7 +926,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
902
926
|
return takeObject(ret);
|
903
927
|
}
|
904
928
|
/**
|
905
|
-
* see [core_crypto::MlsCentral::commit_pending_proposals]
|
929
|
+
* see [core_crypto::mls::MlsCentral::commit_pending_proposals]
|
906
930
|
* @param {Uint8Array} conversation_id
|
907
931
|
* @returns {Promise<any>}
|
908
932
|
*/
|
@@ -915,7 +939,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
915
939
|
/**
|
916
940
|
* Returns: [`WasmCryptoResult<()>`]
|
917
941
|
*
|
918
|
-
* see [core_crypto::MlsCentral::wipe_conversation]
|
942
|
+
* see [core_crypto::mls::MlsCentral::wipe_conversation]
|
919
943
|
* @param {Uint8Array} conversation_id
|
920
944
|
* @returns {Promise<any>}
|
921
945
|
*/
|
@@ -928,7 +952,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
928
952
|
/**
|
929
953
|
* Returns: [`WasmCryptoResult<DecryptedMessage>`]
|
930
954
|
*
|
931
|
-
* see [core_crypto::MlsCentral::decrypt_message]
|
955
|
+
* see [core_crypto::mls::MlsCentral::decrypt_message]
|
932
956
|
* @param {Uint8Array} conversation_id
|
933
957
|
* @param {Uint8Array} payload
|
934
958
|
* @returns {Promise<any>}
|
@@ -944,7 +968,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
944
968
|
/**
|
945
969
|
* Returns: [`WasmCryptoResult<Uint8Array>`]
|
946
970
|
*
|
947
|
-
* see [core_crypto::MlsCentral::encrypt_message]
|
971
|
+
* see [core_crypto::mls::MlsCentral::encrypt_message]
|
948
972
|
* @param {Uint8Array} conversation_id
|
949
973
|
* @param {Uint8Array} message
|
950
974
|
* @returns {Promise<any>}
|
@@ -960,7 +984,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
960
984
|
/**
|
961
985
|
* Returns: [`WasmCryptoResult<js_sys::Uint8Array>`]
|
962
986
|
*
|
963
|
-
* see [core_crypto::MlsCentral::new_proposal]
|
987
|
+
* see [core_crypto::mls::MlsCentral::new_proposal]
|
964
988
|
* @param {Uint8Array} conversation_id
|
965
989
|
* @param {Uint8Array} keypackage
|
966
990
|
* @returns {Promise<any>}
|
@@ -976,7 +1000,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
976
1000
|
/**
|
977
1001
|
* Returns: [`WasmCryptoResult<js_sys::Uint8Array>`]
|
978
1002
|
*
|
979
|
-
* see [core_crypto::MlsCentral::new_proposal]
|
1003
|
+
* see [core_crypto::mls::MlsCentral::new_proposal]
|
980
1004
|
* @param {Uint8Array} conversation_id
|
981
1005
|
* @returns {Promise<any>}
|
982
1006
|
*/
|
@@ -989,7 +1013,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
989
1013
|
/**
|
990
1014
|
* Returns: [`WasmCryptoResult<js_sys::Uint8Array>`]
|
991
1015
|
*
|
992
|
-
* see [core_crypto::MlsCentral::new_proposal]
|
1016
|
+
* see [core_crypto::mls::MlsCentral::new_proposal]
|
993
1017
|
* @param {Uint8Array} conversation_id
|
994
1018
|
* @param {Uint8Array} client_id
|
995
1019
|
* @returns {Promise<any>}
|
@@ -1005,7 +1029,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1005
1029
|
/**
|
1006
1030
|
* Returns: [`WasmCryptoResult<js_sys::Uint8Array>`]
|
1007
1031
|
*
|
1008
|
-
* see [core_crypto::MlsCentral::new_external_add_proposal]
|
1032
|
+
* see [core_crypto::mls::MlsCentral::new_external_add_proposal]
|
1009
1033
|
* @param {Uint8Array} conversation_id
|
1010
1034
|
* @param {number} epoch
|
1011
1035
|
* @returns {Promise<any>}
|
@@ -1019,7 +1043,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1019
1043
|
/**
|
1020
1044
|
* Returns: [`WasmCryptoResult<js_sys::Uint8Array>`]
|
1021
1045
|
*
|
1022
|
-
* see [core_crypto::MlsCentral::new_external_remove_proposal]
|
1046
|
+
* see [core_crypto::mls::MlsCentral::new_external_remove_proposal]
|
1023
1047
|
* @param {Uint8Array} conversation_id
|
1024
1048
|
* @param {number} epoch
|
1025
1049
|
* @param {Uint8Array} keypackage_ref
|
@@ -1036,7 +1060,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1036
1060
|
/**
|
1037
1061
|
* Returns: [`WasmCryptoResult<js_sys::Uint8Array>`]
|
1038
1062
|
*
|
1039
|
-
* see [core_crypto::MlsCentral::export_public_group_state]
|
1063
|
+
* see [core_crypto::mls::MlsCentral::export_public_group_state]
|
1040
1064
|
* @param {Uint8Array} conversation_id
|
1041
1065
|
* @returns {Promise<any>}
|
1042
1066
|
*/
|
@@ -1049,7 +1073,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1049
1073
|
/**
|
1050
1074
|
* Returns: [`WasmCryptoResult<ConversationInitBundle>`]
|
1051
1075
|
*
|
1052
|
-
* see [core_crypto::MlsCentral::join_by_external_commit]
|
1076
|
+
* see [core_crypto::mls::MlsCentral::join_by_external_commit]
|
1053
1077
|
* @param {Uint8Array} public_group_state
|
1054
1078
|
* @param {CustomConfiguration} custom_configuration
|
1055
1079
|
* @returns {Promise<any>}
|
@@ -1065,7 +1089,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1065
1089
|
/**
|
1066
1090
|
* Returns: [`WasmCryptoResult<()>`]
|
1067
1091
|
*
|
1068
|
-
* see [core_crypto::MlsCentral::merge_pending_group_from_external_commit]
|
1092
|
+
* see [core_crypto::mls::MlsCentral::merge_pending_group_from_external_commit]
|
1069
1093
|
* @param {Uint8Array} conversation_id
|
1070
1094
|
* @returns {Promise<any>}
|
1071
1095
|
*/
|
@@ -1078,7 +1102,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1078
1102
|
/**
|
1079
1103
|
* Returns: [`WasmCryptoResult<()>`]
|
1080
1104
|
*
|
1081
|
-
* see [core_crypto::MlsCentral::clear_pending_group_from_external_commit]
|
1105
|
+
* see [core_crypto::mls::MlsCentral::clear_pending_group_from_external_commit]
|
1082
1106
|
* @param {Uint8Array} conversation_id
|
1083
1107
|
* @returns {Promise<any>}
|
1084
1108
|
*/
|
@@ -1089,7 +1113,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1089
1113
|
return takeObject(ret);
|
1090
1114
|
}
|
1091
1115
|
/**
|
1092
|
-
* see [core_crypto::MlsCentral::commit_accepted]
|
1116
|
+
* see [core_crypto::mls::MlsCentral::commit_accepted]
|
1093
1117
|
* @param {Uint8Array} conversation_id
|
1094
1118
|
* @returns {Promise<any>}
|
1095
1119
|
*/
|
@@ -1100,7 +1124,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1100
1124
|
return takeObject(ret);
|
1101
1125
|
}
|
1102
1126
|
/**
|
1103
|
-
* see [core_crypto::MlsCentral::clear_pending_proposal]
|
1127
|
+
* see [core_crypto::mls::MlsCentral::clear_pending_proposal]
|
1104
1128
|
* @param {Uint8Array} conversation_id
|
1105
1129
|
* @param {Uint8Array} proposal_ref
|
1106
1130
|
* @returns {Promise<any>}
|
@@ -1114,7 +1138,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1114
1138
|
return takeObject(ret);
|
1115
1139
|
}
|
1116
1140
|
/**
|
1117
|
-
* see [core_crypto::MlsCentral::clear_pending_commit]
|
1141
|
+
* see [core_crypto::mls::MlsCentral::clear_pending_commit]
|
1118
1142
|
* @param {Uint8Array} conversation_id
|
1119
1143
|
* @returns {Promise<any>}
|
1120
1144
|
*/
|
@@ -1127,7 +1151,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1127
1151
|
/**
|
1128
1152
|
* Returns: [`WasmCryptoResult<js_sys::Uint8Array>`]
|
1129
1153
|
*
|
1130
|
-
* see [core_crypto::MlsCentral::random_bytes]
|
1154
|
+
* see [core_crypto::mls::MlsCentral::random_bytes]
|
1131
1155
|
* @param {number} len
|
1132
1156
|
* @returns {Promise<any>}
|
1133
1157
|
*/
|
@@ -1291,7 +1315,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1291
1315
|
return takeObject(ret);
|
1292
1316
|
}
|
1293
1317
|
/**
|
1294
|
-
* Returns: [`WasmCryptoResult<
|
1318
|
+
* Returns: [`WasmCryptoResult<ProteusAutoPrekeyBundle>`]
|
1295
1319
|
*
|
1296
1320
|
* see [core_crypto::proteus::ProteusCentral::new_prekey]
|
1297
1321
|
* @returns {Promise<Promise<any>>}
|
@@ -1423,7 +1447,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1423
1447
|
/**
|
1424
1448
|
* Returns: [`WasmCryptoResult<Vec<u8>>`]
|
1425
1449
|
*
|
1426
|
-
* see [core_crypto::MlsCentral::export_secret_key]
|
1450
|
+
* see [core_crypto::mls::MlsCentral::export_secret_key]
|
1427
1451
|
* @param {Uint8Array} conversation_id
|
1428
1452
|
* @param {number} key_length
|
1429
1453
|
* @returns {Promise<any>}
|
@@ -1437,7 +1461,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1437
1461
|
/**
|
1438
1462
|
* Returns: [`WasmCryptoResult<Box<[js_sys::Uint8Array]>`]
|
1439
1463
|
*
|
1440
|
-
* see [core_crypto::MlsCentral::get_client_ids]
|
1464
|
+
* see [core_crypto::mls::MlsCentral::get_client_ids]
|
1441
1465
|
* @param {Uint8Array} conversation_id
|
1442
1466
|
* @returns {Promise<any>}
|
1443
1467
|
*/
|
@@ -1448,7 +1472,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1448
1472
|
return takeObject(ret);
|
1449
1473
|
}
|
1450
1474
|
/**
|
1451
|
-
* see [core_crypto::MlsCentral::new_acme_enrollment]
|
1475
|
+
* see [core_crypto::mls::MlsCentral::new_acme_enrollment]
|
1452
1476
|
* @param {number} ciphersuite
|
1453
1477
|
* @returns {Promise<FfiWireE2EIdentity>}
|
1454
1478
|
*/
|
@@ -1665,7 +1689,6 @@ class FfiWireE2EIdentity {
|
|
1665
1689
|
/**
|
1666
1690
|
* See [core_crypto::e2e_identity::WireE2eIdentity::new_order_request]
|
1667
1691
|
* @param {string} display_name
|
1668
|
-
* @param {string} domain
|
1669
1692
|
* @param {string} client_id
|
1670
1693
|
* @param {string} handle
|
1671
1694
|
* @param {number} expiry_days
|
@@ -1674,20 +1697,18 @@ class FfiWireE2EIdentity {
|
|
1674
1697
|
* @param {string} previous_nonce
|
1675
1698
|
* @returns {Uint8Array}
|
1676
1699
|
*/
|
1677
|
-
new_order_request(display_name,
|
1700
|
+
new_order_request(display_name, client_id, handle, expiry_days, directory, account, previous_nonce) {
|
1678
1701
|
try {
|
1679
1702
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1680
1703
|
const ptr0 = passStringToWasm0(display_name, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1681
1704
|
const len0 = WASM_VECTOR_LEN;
|
1682
|
-
const ptr1 = passStringToWasm0(
|
1705
|
+
const ptr1 = passStringToWasm0(client_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1683
1706
|
const len1 = WASM_VECTOR_LEN;
|
1684
|
-
const ptr2 = passStringToWasm0(
|
1707
|
+
const ptr2 = passStringToWasm0(handle, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1685
1708
|
const len2 = WASM_VECTOR_LEN;
|
1686
|
-
const ptr3 = passStringToWasm0(
|
1709
|
+
const ptr3 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1687
1710
|
const len3 = WASM_VECTOR_LEN;
|
1688
|
-
|
1689
|
-
const len4 = WASM_VECTOR_LEN;
|
1690
|
-
wasm$1.ffiwiree2eidentity_new_order_request(retptr, this.ptr, ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3, expiry_days, addHeapObject(directory), addHeapObject(account), ptr4, len4);
|
1711
|
+
wasm$1.ffiwiree2eidentity_new_order_request(retptr, this.ptr, ptr0, len0, ptr1, len1, ptr2, len2, expiry_days, addHeapObject(directory), addHeapObject(account), ptr3, len3);
|
1691
1712
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1692
1713
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1693
1714
|
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
@@ -1772,42 +1793,38 @@ class FfiWireE2EIdentity {
|
|
1772
1793
|
/**
|
1773
1794
|
* See [core_crypto::e2e_identity::WireE2eIdentity::create_dpop_token]
|
1774
1795
|
* @param {string} access_token_url
|
1775
|
-
* @param {string}
|
1776
|
-
* @param {
|
1777
|
-
* @param {string} domain
|
1778
|
-
* @param {any} client_id_challenge
|
1796
|
+
* @param {string} client_id
|
1797
|
+
* @param {any} dpop_challenge
|
1779
1798
|
* @param {string} backend_nonce
|
1780
1799
|
* @param {number} expiry_days
|
1781
1800
|
* @returns {string}
|
1782
1801
|
*/
|
1783
|
-
create_dpop_token(access_token_url,
|
1802
|
+
create_dpop_token(access_token_url, client_id, dpop_challenge, backend_nonce, expiry_days) {
|
1784
1803
|
try {
|
1785
1804
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1786
1805
|
const ptr0 = passStringToWasm0(access_token_url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1787
1806
|
const len0 = WASM_VECTOR_LEN;
|
1788
|
-
const ptr1 = passStringToWasm0(
|
1807
|
+
const ptr1 = passStringToWasm0(client_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1789
1808
|
const len1 = WASM_VECTOR_LEN;
|
1790
|
-
const ptr2 = passStringToWasm0(
|
1809
|
+
const ptr2 = passStringToWasm0(backend_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1791
1810
|
const len2 = WASM_VECTOR_LEN;
|
1792
|
-
|
1793
|
-
const len3 = WASM_VECTOR_LEN;
|
1794
|
-
wasm$1.ffiwiree2eidentity_create_dpop_token(retptr, this.ptr, ptr0, len0, ptr1, len1, client_id, ptr2, len2, addHeapObject(client_id_challenge), ptr3, len3, expiry_days);
|
1811
|
+
wasm$1.ffiwiree2eidentity_create_dpop_token(retptr, this.ptr, ptr0, len0, ptr1, len1, addHeapObject(dpop_challenge), ptr2, len2, expiry_days);
|
1795
1812
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1796
1813
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1797
1814
|
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
1798
1815
|
var r3 = getInt32Memory0()[retptr / 4 + 3];
|
1799
|
-
var
|
1800
|
-
var
|
1816
|
+
var ptr3 = r0;
|
1817
|
+
var len3 = r1;
|
1801
1818
|
if (r3) {
|
1802
|
-
|
1803
|
-
|
1819
|
+
ptr3 = 0;
|
1820
|
+
len3 = 0;
|
1804
1821
|
throw takeObject(r2);
|
1805
1822
|
}
|
1806
|
-
return getStringFromWasm0(
|
1823
|
+
return getStringFromWasm0(ptr3, len3);
|
1807
1824
|
}
|
1808
1825
|
finally {
|
1809
1826
|
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
1810
|
-
wasm$1.__wbindgen_free(
|
1827
|
+
wasm$1.__wbindgen_free(ptr3, len3);
|
1811
1828
|
}
|
1812
1829
|
}
|
1813
1830
|
/**
|
@@ -2269,6 +2286,62 @@ class ProposalBundle {
|
|
2269
2286
|
}
|
2270
2287
|
/**
|
2271
2288
|
*/
|
2289
|
+
class ProteusAutoPrekeyBundle {
|
2290
|
+
static __wrap(ptr) {
|
2291
|
+
const obj = Object.create(ProteusAutoPrekeyBundle.prototype);
|
2292
|
+
obj.ptr = ptr;
|
2293
|
+
return obj;
|
2294
|
+
}
|
2295
|
+
__destroy_into_raw() {
|
2296
|
+
const ptr = this.ptr;
|
2297
|
+
this.ptr = 0;
|
2298
|
+
return ptr;
|
2299
|
+
}
|
2300
|
+
free() {
|
2301
|
+
const ptr = this.__destroy_into_raw();
|
2302
|
+
wasm$1.__wbg_proteusautoprekeybundle_free(ptr);
|
2303
|
+
}
|
2304
|
+
/**
|
2305
|
+
* @returns {number}
|
2306
|
+
*/
|
2307
|
+
get id() {
|
2308
|
+
const ret = wasm$1.__wbg_get_proteusautoprekeybundle_id(this.ptr);
|
2309
|
+
return ret;
|
2310
|
+
}
|
2311
|
+
/**
|
2312
|
+
* @param {number} arg0
|
2313
|
+
*/
|
2314
|
+
set id(arg0) {
|
2315
|
+
wasm$1.__wbg_set_proteusautoprekeybundle_id(this.ptr, arg0);
|
2316
|
+
}
|
2317
|
+
/**
|
2318
|
+
* @returns {Uint8Array}
|
2319
|
+
*/
|
2320
|
+
get pkb() {
|
2321
|
+
try {
|
2322
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2323
|
+
wasm$1.__wbg_get_proteusautoprekeybundle_pkb(retptr, this.ptr);
|
2324
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2325
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2326
|
+
var v0 = getArrayU8FromWasm0(r0, r1).slice();
|
2327
|
+
wasm$1.__wbindgen_free(r0, r1 * 1);
|
2328
|
+
return v0;
|
2329
|
+
}
|
2330
|
+
finally {
|
2331
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2332
|
+
}
|
2333
|
+
}
|
2334
|
+
/**
|
2335
|
+
* @param {Uint8Array} arg0
|
2336
|
+
*/
|
2337
|
+
set pkb(arg0) {
|
2338
|
+
const ptr0 = passArray8ToWasm0(arg0, wasm$1.__wbindgen_malloc);
|
2339
|
+
const len0 = WASM_VECTOR_LEN;
|
2340
|
+
wasm$1.__wbg_set_proteusautoprekeybundle_pkb(this.ptr, ptr0, len0);
|
2341
|
+
}
|
2342
|
+
}
|
2343
|
+
/**
|
2344
|
+
*/
|
2272
2345
|
class PublicGroupStateBundle {
|
2273
2346
|
static __wrap(ptr) {
|
2274
2347
|
const obj = Object.create(PublicGroupStateBundle.prototype);
|
@@ -2337,27 +2410,9 @@ async function load(module, imports) {
|
|
2337
2410
|
function getImports() {
|
2338
2411
|
const imports = {};
|
2339
2412
|
imports.wbg = {};
|
2340
|
-
imports.wbg.__wbg_new_f9876326328f45ed = function () {
|
2341
|
-
const ret = new Object();
|
2342
|
-
return addHeapObject(ret);
|
2343
|
-
};
|
2344
|
-
imports.wbg.__wbg_new_b525de17f44a8943 = function () {
|
2345
|
-
const ret = new Array();
|
2346
|
-
return addHeapObject(ret);
|
2347
|
-
};
|
2348
|
-
imports.wbg.__wbg_set_17224bc548dd1d7b = function (arg0, arg1, arg2) {
|
2349
|
-
getObject(arg0)[arg1 >>> 0] = takeObject(arg2);
|
2350
|
-
};
|
2351
|
-
imports.wbg.__wbg_set_20cbc34131e76824 = function (arg0, arg1, arg2) {
|
2352
|
-
getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
|
2353
|
-
};
|
2354
2413
|
imports.wbg.__wbindgen_object_drop_ref = function (arg0) {
|
2355
2414
|
takeObject(arg0);
|
2356
2415
|
};
|
2357
|
-
imports.wbg.__wbindgen_number_new = function (arg0) {
|
2358
|
-
const ret = arg0;
|
2359
|
-
return addHeapObject(ret);
|
2360
|
-
};
|
2361
2416
|
imports.wbg.__wbindgen_object_clone_ref = function (arg0) {
|
2362
2417
|
const ret = getObject(arg0);
|
2363
2418
|
return addHeapObject(ret);
|
@@ -2367,7 +2422,7 @@ function getImports() {
|
|
2367
2422
|
const ret = typeof (val) === 'object' && val !== null;
|
2368
2423
|
return ret;
|
2369
2424
|
};
|
2370
|
-
imports.wbg.
|
2425
|
+
imports.wbg.__wbg_getwithrefkey_5e6d9547403deab8 = function (arg0, arg1) {
|
2371
2426
|
const ret = getObject(arg0)[getObject(arg1)];
|
2372
2427
|
return addHeapObject(ret);
|
2373
2428
|
};
|
@@ -2413,18 +2468,18 @@ function getImports() {
|
|
2413
2468
|
return addHeapObject(ret);
|
2414
2469
|
}, arguments);
|
2415
2470
|
};
|
2471
|
+
imports.wbg.__wbindgen_number_new = function (arg0) {
|
2472
|
+
const ret = arg0;
|
2473
|
+
return addHeapObject(ret);
|
2474
|
+
};
|
2416
2475
|
imports.wbg.__wbg_new_537b7341ce90bb31 = function (arg0) {
|
2417
2476
|
const ret = new Uint8Array(getObject(arg0));
|
2418
2477
|
return addHeapObject(ret);
|
2419
2478
|
};
|
2420
|
-
imports.wbg.
|
2421
|
-
const ret =
|
2479
|
+
imports.wbg.__wbg_proteusautoprekeybundle_new = function (arg0) {
|
2480
|
+
const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
|
2422
2481
|
return addHeapObject(ret);
|
2423
2482
|
};
|
2424
|
-
imports.wbg.__wbg_push_49c286f04dd3bf59 = function (arg0, arg1) {
|
2425
|
-
const ret = getObject(arg0).push(getObject(arg1));
|
2426
|
-
return ret;
|
2427
|
-
};
|
2428
2483
|
imports.wbg.__wbg_new_9d3a9ce4282a18a8 = function (arg0, arg1) {
|
2429
2484
|
try {
|
2430
2485
|
var state0 = { a: arg0, b: arg1 };
|
@@ -2432,7 +2487,7 @@ function getImports() {
|
|
2432
2487
|
const a = state0.a;
|
2433
2488
|
state0.a = 0;
|
2434
2489
|
try {
|
2435
|
-
return
|
2490
|
+
return __wbg_adapter_282(a, state0.b, arg0, arg1);
|
2436
2491
|
}
|
2437
2492
|
finally {
|
2438
2493
|
state0.a = a;
|
@@ -2445,10 +2500,26 @@ function getImports() {
|
|
2445
2500
|
state0.a = state0.b = 0;
|
2446
2501
|
}
|
2447
2502
|
};
|
2503
|
+
imports.wbg.__wbg_new_f9876326328f45ed = function () {
|
2504
|
+
const ret = new Object();
|
2505
|
+
return addHeapObject(ret);
|
2506
|
+
};
|
2507
|
+
imports.wbg.__wbg_new_b525de17f44a8943 = function () {
|
2508
|
+
const ret = new Array();
|
2509
|
+
return addHeapObject(ret);
|
2510
|
+
};
|
2511
|
+
imports.wbg.__wbg_push_49c286f04dd3bf59 = function (arg0, arg1) {
|
2512
|
+
const ret = getObject(arg0).push(getObject(arg1));
|
2513
|
+
return ret;
|
2514
|
+
};
|
2448
2515
|
imports.wbg.__wbindgen_bigint_from_u64 = function (arg0) {
|
2449
2516
|
const ret = BigInt.asUintN(64, arg0);
|
2450
2517
|
return addHeapObject(ret);
|
2451
2518
|
};
|
2519
|
+
imports.wbg.__wbg_ffiwiree2eidentity_new = function (arg0) {
|
2520
|
+
const ret = FfiWireE2EIdentity.__wrap(arg0);
|
2521
|
+
return addHeapObject(ret);
|
2522
|
+
};
|
2452
2523
|
imports.wbg.__wbg_new_f841cc6f2098f4b5 = function () {
|
2453
2524
|
const ret = new Map();
|
2454
2525
|
return addHeapObject(ret);
|
@@ -2460,6 +2531,14 @@ function getImports() {
|
|
2460
2531
|
imports.wbg.__wbg_setonsuccess_925a7718d3f62bc1 = function (arg0, arg1) {
|
2461
2532
|
getObject(arg0).onsuccess = getObject(arg1);
|
2462
2533
|
};
|
2534
|
+
imports.wbg.__wbg_isArray_39d28997bf6b96b4 = function (arg0) {
|
2535
|
+
const ret = Array.isArray(getObject(arg0));
|
2536
|
+
return ret;
|
2537
|
+
};
|
2538
|
+
imports.wbg.__wbg_get_27fe3dac1c4d0224 = function (arg0, arg1) {
|
2539
|
+
const ret = getObject(arg0)[arg1 >>> 0];
|
2540
|
+
return addHeapObject(ret);
|
2541
|
+
};
|
2463
2542
|
imports.wbg.__wbg_new0_25059e40b1c02766 = function () {
|
2464
2543
|
const ret = new Date();
|
2465
2544
|
return addHeapObject(ret);
|
@@ -2509,22 +2588,20 @@ function getImports() {
|
|
2509
2588
|
const ret = new Error(getStringFromWasm0(arg0, arg1));
|
2510
2589
|
return addHeapObject(ret);
|
2511
2590
|
};
|
2512
|
-
imports.wbg.__wbg_isArray_39d28997bf6b96b4 = function (arg0) {
|
2513
|
-
const ret = Array.isArray(getObject(arg0));
|
2514
|
-
return ret;
|
2515
|
-
};
|
2516
2591
|
imports.wbg.__wbg_iterator_55f114446221aa5a = function () {
|
2517
2592
|
const ret = Symbol.iterator;
|
2518
2593
|
return addHeapObject(ret);
|
2519
2594
|
};
|
2520
|
-
imports.wbg.__wbg_get_27fe3dac1c4d0224 = function (arg0, arg1) {
|
2521
|
-
const ret = getObject(arg0)[arg1 >>> 0];
|
2522
|
-
return addHeapObject(ret);
|
2523
|
-
};
|
2524
2595
|
imports.wbg.__wbg_corecrypto_new = function (arg0) {
|
2525
2596
|
const ret = CoreCrypto$1.__wrap(arg0);
|
2526
2597
|
return addHeapObject(ret);
|
2527
2598
|
};
|
2599
|
+
imports.wbg.__wbg_set_17224bc548dd1d7b = function (arg0, arg1, arg2) {
|
2600
|
+
getObject(arg0)[arg1 >>> 0] = takeObject(arg2);
|
2601
|
+
};
|
2602
|
+
imports.wbg.__wbg_set_841ac57cff3d672b = function (arg0, arg1, arg2) {
|
2603
|
+
getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
|
2604
|
+
};
|
2528
2605
|
imports.wbg.__wbg_new_15d3966e9981a196 = function (arg0, arg1) {
|
2529
2606
|
const ret = new Error(getStringFromWasm0(arg0, arg1));
|
2530
2607
|
return addHeapObject(ret);
|
@@ -2547,13 +2624,36 @@ function getImports() {
|
|
2547
2624
|
imports.wbg.__wbg_warn_e57696dbb3977030 = function (arg0) {
|
2548
2625
|
console.warn(getObject(arg0));
|
2549
2626
|
};
|
2627
|
+
imports.wbg.__wbg_String_88810dfeb4021902 = function (arg0, arg1) {
|
2628
|
+
const ret = String(getObject(arg1));
|
2629
|
+
const ptr0 = passStringToWasm0(ret, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2630
|
+
const len0 = WASM_VECTOR_LEN;
|
2631
|
+
getInt32Memory0()[arg0 / 4 + 1] = len0;
|
2632
|
+
getInt32Memory0()[arg0 / 4 + 0] = ptr0;
|
2633
|
+
};
|
2550
2634
|
imports.wbg.__wbg_call_96878afb7a8201ca = function () {
|
2551
2635
|
return handleError(function (arg0, arg1, arg2, arg3) {
|
2552
2636
|
const ret = getObject(arg0).call(getObject(arg1), getObject(arg2), getObject(arg3));
|
2553
2637
|
return addHeapObject(ret);
|
2554
2638
|
}, arguments);
|
2555
2639
|
};
|
2556
|
-
imports.wbg.
|
2640
|
+
imports.wbg.__wbg_call_99043a1e2a9e5916 = function () {
|
2641
|
+
return handleError(function (arg0, arg1, arg2, arg3, arg4) {
|
2642
|
+
const ret = getObject(arg0).call(getObject(arg1), getObject(arg2), getObject(arg3), getObject(arg4));
|
2643
|
+
return addHeapObject(ret);
|
2644
|
+
}, arguments);
|
2645
|
+
};
|
2646
|
+
imports.wbg.__wbg_of_4065463fbe892f00 = function (arg0, arg1, arg2, arg3) {
|
2647
|
+
const ret = Array.of(getObject(arg0), getObject(arg1), getObject(arg2), getObject(arg3));
|
2648
|
+
return addHeapObject(ret);
|
2649
|
+
};
|
2650
|
+
imports.wbg.__wbg_apply_aedce30790c00792 = function () {
|
2651
|
+
return handleError(function (arg0, arg1, arg2) {
|
2652
|
+
const ret = getObject(arg0).apply(getObject(arg1), getObject(arg2));
|
2653
|
+
return addHeapObject(ret);
|
2654
|
+
}, arguments);
|
2655
|
+
};
|
2656
|
+
imports.wbg.__wbg_now_e2bd027927d3eced = function () {
|
2557
2657
|
const ret = performance.now();
|
2558
2658
|
return ret;
|
2559
2659
|
};
|
@@ -2565,7 +2665,7 @@ function getImports() {
|
|
2565
2665
|
const ret = ProposalBundle.__wrap(arg0);
|
2566
2666
|
return addHeapObject(ret);
|
2567
2667
|
};
|
2568
|
-
imports.wbg.
|
2668
|
+
imports.wbg.__wbg_now_2e07eedfb4ac9dbe = function () {
|
2569
2669
|
const ret = Date.now();
|
2570
2670
|
return ret;
|
2571
2671
|
};
|
@@ -2599,6 +2699,10 @@ function getImports() {
|
|
2599
2699
|
imports.wbg.__wbg_setonerror_7cbe775a0abc7a8e = function (arg0, arg1) {
|
2600
2700
|
getObject(arg0).onerror = getObject(arg1);
|
2601
2701
|
};
|
2702
|
+
imports.wbg.__wbg_getwithrefkey_15c62c2b8546208d = function (arg0, arg1) {
|
2703
|
+
const ret = getObject(arg0)[getObject(arg1)];
|
2704
|
+
return addHeapObject(ret);
|
2705
|
+
};
|
2602
2706
|
imports.wbg.__wbg_name_31ef05f12c1d72c6 = function (arg0, arg1) {
|
2603
2707
|
const ret = getObject(arg1).name;
|
2604
2708
|
const ptr0 = passStringToWasm0(ret, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
@@ -2624,6 +2728,9 @@ function getImports() {
|
|
2624
2728
|
const ret = false;
|
2625
2729
|
return ret;
|
2626
2730
|
};
|
2731
|
+
imports.wbg.__wbg_set_20cbc34131e76824 = function (arg0, arg1, arg2) {
|
2732
|
+
getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
|
2733
|
+
};
|
2627
2734
|
imports.wbg.__wbg_close_98f3a5ab91060b8b = function (arg0) {
|
2628
2735
|
getObject(arg0).close();
|
2629
2736
|
};
|
@@ -2795,12 +2902,6 @@ function getImports() {
|
|
2795
2902
|
const ret = new Function(getStringFromWasm0(arg0, arg1));
|
2796
2903
|
return addHeapObject(ret);
|
2797
2904
|
};
|
2798
|
-
imports.wbg.__wbg_call_99043a1e2a9e5916 = function () {
|
2799
|
-
return handleError(function (arg0, arg1, arg2, arg3, arg4) {
|
2800
|
-
const ret = getObject(arg0).call(getObject(arg1), getObject(arg2), getObject(arg3), getObject(arg4));
|
2801
|
-
return addHeapObject(ret);
|
2802
|
-
}, arguments);
|
2803
|
-
};
|
2804
2905
|
imports.wbg.__wbg_set_6aa458a4ebdb65cb = function () {
|
2805
2906
|
return handleError(function (arg0, arg1, arg2) {
|
2806
2907
|
const ret = Reflect.set(getObject(arg0), getObject(arg1), getObject(arg2));
|
@@ -3032,12 +3133,12 @@ function getImports() {
|
|
3032
3133
|
return addHeapObject(ret);
|
3033
3134
|
}, arguments);
|
3034
3135
|
};
|
3035
|
-
imports.wbg.
|
3036
|
-
const ret = makeMutClosure(arg0, arg1,
|
3136
|
+
imports.wbg.__wbindgen_closure_wrapper1546 = function (arg0, arg1, arg2) {
|
3137
|
+
const ret = makeMutClosure(arg0, arg1, 165, __wbg_adapter_52);
|
3037
3138
|
return addHeapObject(ret);
|
3038
3139
|
};
|
3039
|
-
imports.wbg.
|
3040
|
-
const ret = makeMutClosure(arg0, arg1,
|
3140
|
+
imports.wbg.__wbindgen_closure_wrapper4706 = function (arg0, arg1, arg2) {
|
3141
|
+
const ret = makeMutClosure(arg0, arg1, 165, __wbg_adapter_55);
|
3041
3142
|
return addHeapObject(ret);
|
3042
3143
|
};
|
3043
3144
|
return imports;
|
@@ -3088,6 +3189,7 @@ var exports = /*#__PURE__*/Object.freeze({
|
|
3088
3189
|
NewAcmeAuthz: NewAcmeAuthz,
|
3089
3190
|
NewAcmeOrder: NewAcmeOrder,
|
3090
3191
|
ProposalBundle: ProposalBundle,
|
3192
|
+
ProteusAutoPrekeyBundle: ProteusAutoPrekeyBundle,
|
3091
3193
|
PublicGroupStateBundle: PublicGroupStateBundle,
|
3092
3194
|
WirePolicy: WirePolicy$1,
|
3093
3195
|
default: init,
|
@@ -3097,7 +3199,7 @@ var exports = /*#__PURE__*/Object.freeze({
|
|
3097
3199
|
var wasm = async (opt = {}) => {
|
3098
3200
|
let {importHook, serverPath} = opt;
|
3099
3201
|
|
3100
|
-
let path = "assets/core_crypto_ffi-
|
3202
|
+
let path = "assets/core_crypto_ffi-09d69604.wasm";
|
3101
3203
|
|
3102
3204
|
if (serverPath != null) {
|
3103
3205
|
path = serverPath + /[^\/\\]*$/.exec(path)[0];
|
@@ -3382,6 +3484,15 @@ class CoreCrypto {
|
|
3382
3484
|
_CoreCrypto_cc.set(this, void 0);
|
3383
3485
|
__classPrivateFieldSet(this, _CoreCrypto_cc, cc, "f");
|
3384
3486
|
}
|
3487
|
+
/**
|
3488
|
+
* If this returns > 1 you **cannot** call {@link CoreCrypto.wipe} or {@link CoreCrypto.close} as they will produce an error because of the
|
3489
|
+
* outstanding references that were detected.
|
3490
|
+
*
|
3491
|
+
* @returns the count of strong refs for this CoreCrypto instance
|
3492
|
+
*/
|
3493
|
+
strongRefCount() {
|
3494
|
+
return __classPrivateFieldGet(this, _CoreCrypto_cc, "f").strong_ref_count();
|
3495
|
+
}
|
3385
3496
|
/**
|
3386
3497
|
* Wipes the {@link CoreCrypto} backing storage (i.e. {@link https://developer.mozilla.org/en-US/docs/Web/API/IndexedDB_API | IndexedDB} database)
|
3387
3498
|
*
|
@@ -3431,6 +3542,16 @@ class CoreCrypto {
|
|
3431
3542
|
async conversationExists(conversationId) {
|
3432
3543
|
return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").conversation_exists(conversationId));
|
3433
3544
|
}
|
3545
|
+
/**
|
3546
|
+
* Marks a conversation as child of another one
|
3547
|
+
* This will mostly affect the behavior of the callbacks (the parentConversationClients parameter will be filled)
|
3548
|
+
*
|
3549
|
+
* @param childId - conversation identifier of the child conversation
|
3550
|
+
* @param parentId - conversation identifier of the parent conversation
|
3551
|
+
*/
|
3552
|
+
async markConversationAsChildOf(childId, parentId) {
|
3553
|
+
return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").mark_conversation_as_child_of(childId, parentId));
|
3554
|
+
}
|
3434
3555
|
/**
|
3435
3556
|
* Returns the current epoch of a conversation
|
3436
3557
|
*
|
@@ -3969,7 +4090,7 @@ class CoreCrypto {
|
|
3969
4090
|
/**
|
3970
4091
|
* Creates a new prekey with an automatically generated ID..
|
3971
4092
|
*
|
3972
|
-
* @returns A CBOR-serialized version of the PreKeyBundle corresponding to the newly generated and stored PreKey
|
4093
|
+
* @returns A CBOR-serialized version of the PreKeyBundle corresponding to the newly generated and stored PreKey accompanied by its ID
|
3973
4094
|
*/
|
3974
4095
|
async proteusNewPrekeyAuto() {
|
3975
4096
|
return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").proteus_new_prekey_auto());
|
@@ -4052,6 +4173,7 @@ class CoreCrypto {
|
|
4052
4173
|
* keying material.
|
4053
4174
|
*
|
4054
4175
|
* @param ciphersuite - For generating signing key material. Only {@link Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519} is supported currently
|
4176
|
+
* @returns The new {@link WireE2eIdentity} object
|
4055
4177
|
*/
|
4056
4178
|
async newAcmeEnrollment(ciphersuite = Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519) {
|
4057
4179
|
if (ciphersuite !== Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519) {
|
@@ -4136,18 +4258,17 @@ class WireE2eIdentity {
|
|
4136
4258
|
* Creates a new acme order for the handle (userId + display name) and the clientId.
|
4137
4259
|
*
|
4138
4260
|
* @param displayName human readable name displayed in the application e.g. `Smith, Alice M (QA)`
|
4139
|
-
* @param
|
4140
|
-
* @param
|
4141
|
-
* @param handle user handle e.g. `impp:wireapp=alice.smith.qa@example.com`
|
4261
|
+
* @param clientId client identifier with user b64Url encoded & clientId hex encoded e.g. `NDUyMGUyMmY2YjA3NGU3NjkyZjE1NjJjZTAwMmQ2NTQ:6add501bacd1d90e@example.com`
|
4262
|
+
* @param handle user handle e.g. `alice.smith.qa@example.com`
|
4142
4263
|
* @param expiryDays generated x509 certificate expiry
|
4143
4264
|
* @param directory you got from {@link directoryResponse}
|
4144
4265
|
* @param account you got from {@link newAccountResponse}
|
4145
4266
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/new-account`
|
4146
4267
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
4147
4268
|
*/
|
4148
|
-
newOrderRequest(displayName,
|
4269
|
+
newOrderRequest(displayName, clientId, handle, expiryDays, directory, account, previousNonce) {
|
4149
4270
|
try {
|
4150
|
-
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_order_request(displayName,
|
4271
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_order_request(displayName, clientId, handle, expiryDays, directory, account, previousNonce);
|
4151
4272
|
}
|
4152
4273
|
catch (e) {
|
4153
4274
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4187,10 +4308,6 @@ class WireE2eIdentity {
|
|
4187
4308
|
/**
|
4188
4309
|
* Parses the response from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
4189
4310
|
*
|
4190
|
-
* You then have to map the challenge from this authorization object. The `client_id_challenge`
|
4191
|
-
* will be the one with the `client_id_host` (you supplied to {@link newOrderRequest}) identifier,
|
4192
|
-
* the other will be your `handle_challenge`.
|
4193
|
-
*
|
4194
4311
|
* @param authz HTTP response body
|
4195
4312
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5
|
4196
4313
|
*/
|
@@ -4211,16 +4328,14 @@ class WireE2eIdentity {
|
|
4211
4328
|
* {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token} on wire-server.
|
4212
4329
|
*
|
4213
4330
|
* @param accessTokenUrl backend endpoint where this token will be sent. Should be this one {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token}
|
4214
|
-
* @param
|
4215
|
-
* @param
|
4216
|
-
* @param domain owning backend domain e.g. `wire.com`
|
4217
|
-
* @param clientIdChallenge you found after {@link newAuthzResponse}
|
4331
|
+
* @param clientId client identifier with user b64Url encoded & clientId hex encoded e.g. `NDUyMGUyMmY2YjA3NGU3NjkyZjE1NjJjZTAwMmQ2NTQ:6add501bacd1d90e@example.com`
|
4332
|
+
* @param dpopChallenge you found after {@link newAuthzResponse}
|
4218
4333
|
* @param backendNonce you get by calling `GET /clients/token/nonce` on wire-server as defined here {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/get_clients__client__nonce}
|
4219
4334
|
* @param expiryDays token expiry in days
|
4220
4335
|
*/
|
4221
|
-
createDpopToken(accessTokenUrl,
|
4336
|
+
createDpopToken(accessTokenUrl, clientId, dpopChallenge, backendNonce, expiryDays) {
|
4222
4337
|
try {
|
4223
|
-
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").create_dpop_token(accessTokenUrl,
|
4338
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").create_dpop_token(accessTokenUrl, clientId, dpopChallenge, backendNonce, expiryDays);
|
4224
4339
|
}
|
4225
4340
|
catch (e) {
|
4226
4341
|
throw CoreCryptoError.fromStdError(e);
|
Binary file
|