@wireapp/core-crypto 0.7.0-rc.3 → 0.7.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -226,12 +226,12 @@ function makeMutClosure(arg0, arg1, dtor, f) {
|
|
226
226
|
return real;
|
227
227
|
}
|
228
228
|
function __wbg_adapter_52(arg0, arg1, arg2) {
|
229
|
-
wasm$1.
|
229
|
+
wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h4f5b84878d1a1cd6(arg0, arg1, addHeapObject(arg2));
|
230
230
|
}
|
231
231
|
function __wbg_adapter_55(arg0, arg1, arg2) {
|
232
232
|
try {
|
233
233
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
234
|
-
wasm$1.
|
234
|
+
wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h035196cd566a20a2(retptr, arg0, arg1, addHeapObject(arg2));
|
235
235
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
236
236
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
237
237
|
if (r1) {
|
@@ -270,15 +270,6 @@ function passArray8ToWasm0(arg, malloc) {
|
|
270
270
|
WASM_VECTOR_LEN = arg.length;
|
271
271
|
return ptr;
|
272
272
|
}
|
273
|
-
function getArrayJsValueFromWasm0(ptr, len) {
|
274
|
-
const mem = getUint32Memory0();
|
275
|
-
const slice = mem.subarray(ptr / 4, ptr / 4 + len);
|
276
|
-
const result = [];
|
277
|
-
for (let i = 0; i < slice.length; i++) {
|
278
|
-
result.push(takeObject(slice[i]));
|
279
|
-
}
|
280
|
-
return result;
|
281
|
-
}
|
282
273
|
function getArrayU8FromWasm0(ptr, len) {
|
283
274
|
return getUint8Memory0().subarray(ptr / 1, ptr / 1 + len);
|
284
275
|
}
|
@@ -290,8 +281,8 @@ function handleError(f, args) {
|
|
290
281
|
wasm$1.__wbindgen_exn_store(addHeapObject(e));
|
291
282
|
}
|
292
283
|
}
|
293
|
-
function
|
294
|
-
wasm$1.
|
284
|
+
function __wbg_adapter_285(arg0, arg1, arg2, arg3) {
|
285
|
+
wasm$1.wasm_bindgen__convert__closures__invoke2_mut__h77a2ddbf015f399a(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
|
295
286
|
}
|
296
287
|
/**
|
297
288
|
* see [core_crypto::prelude::MlsWirePolicy]
|
@@ -427,10 +418,10 @@ class AcmeDirectory {
|
|
427
418
|
/**
|
428
419
|
* @returns {string}
|
429
420
|
*/
|
430
|
-
get
|
421
|
+
get newNonce() {
|
431
422
|
try {
|
432
423
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
433
|
-
wasm$1.
|
424
|
+
wasm$1.acmedirectory_newNonce(retptr, this.ptr);
|
434
425
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
435
426
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
436
427
|
return getStringFromWasm0(r0, r1);
|
@@ -443,7 +434,7 @@ class AcmeDirectory {
|
|
443
434
|
/**
|
444
435
|
* @returns {string}
|
445
436
|
*/
|
446
|
-
get
|
437
|
+
get newAccount() {
|
447
438
|
try {
|
448
439
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
449
440
|
wasm$1.acmechallenge_url(retptr, this.ptr);
|
@@ -459,62 +450,10 @@ class AcmeDirectory {
|
|
459
450
|
/**
|
460
451
|
* @returns {string}
|
461
452
|
*/
|
462
|
-
get
|
453
|
+
get newOrder() {
|
463
454
|
try {
|
464
455
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
465
|
-
wasm$1.
|
466
|
-
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
467
|
-
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
468
|
-
return getStringFromWasm0(r0, r1);
|
469
|
-
}
|
470
|
-
finally {
|
471
|
-
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
472
|
-
wasm$1.__wbindgen_free(r0, r1);
|
473
|
-
}
|
474
|
-
}
|
475
|
-
}
|
476
|
-
/**
|
477
|
-
* See [core_crypto::e2e_identity::types::E2eiAcmeFinalize]
|
478
|
-
*/
|
479
|
-
class AcmeFinalize {
|
480
|
-
static __wrap(ptr) {
|
481
|
-
const obj = Object.create(AcmeFinalize.prototype);
|
482
|
-
obj.ptr = ptr;
|
483
|
-
return obj;
|
484
|
-
}
|
485
|
-
__destroy_into_raw() {
|
486
|
-
const ptr = this.ptr;
|
487
|
-
this.ptr = 0;
|
488
|
-
return ptr;
|
489
|
-
}
|
490
|
-
free() {
|
491
|
-
const ptr = this.__destroy_into_raw();
|
492
|
-
wasm$1.__wbg_acmefinalize_free(ptr);
|
493
|
-
}
|
494
|
-
/**
|
495
|
-
* @param {Uint8Array} delegate
|
496
|
-
* @param {string} certificate_url
|
497
|
-
*/
|
498
|
-
constructor(delegate, certificate_url) {
|
499
|
-
const ptr0 = passStringToWasm0(certificate_url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
500
|
-
const len0 = WASM_VECTOR_LEN;
|
501
|
-
const ret = wasm$1.acmechallenge_new(addHeapObject(delegate), ptr0, len0);
|
502
|
-
return AcmeFinalize.__wrap(ret);
|
503
|
-
}
|
504
|
-
/**
|
505
|
-
* @returns {Uint8Array}
|
506
|
-
*/
|
507
|
-
get delegate() {
|
508
|
-
const ret = wasm$1.acmechallenge_delegate(this.ptr);
|
509
|
-
return takeObject(ret);
|
510
|
-
}
|
511
|
-
/**
|
512
|
-
* @returns {string}
|
513
|
-
*/
|
514
|
-
get certificate_url() {
|
515
|
-
try {
|
516
|
-
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
517
|
-
wasm$1.acmechallenge_url(retptr, this.ptr);
|
456
|
+
wasm$1.acmedirectory_newOrder(retptr, this.ptr);
|
518
457
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
519
458
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
520
459
|
return getStringFromWasm0(r0, r1);
|
@@ -734,11 +673,11 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
734
673
|
}
|
735
674
|
/**
|
736
675
|
* Returns the Arc strong ref count
|
737
|
-
* @returns {
|
676
|
+
* @returns {boolean}
|
738
677
|
*/
|
739
|
-
|
740
|
-
const ret = wasm$1.
|
741
|
-
return ret
|
678
|
+
has_outstanding_refs() {
|
679
|
+
const ret = wasm$1.corecrypto_has_outstanding_refs(this.ptr);
|
680
|
+
return ret !== 0;
|
742
681
|
}
|
743
682
|
/**
|
744
683
|
* Returns: [`WasmCryptoResult<()>`]
|
@@ -1472,12 +1411,38 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1472
1411
|
return takeObject(ret);
|
1473
1412
|
}
|
1474
1413
|
/**
|
1414
|
+
* Returns: [`WasmCryptoResult<WireE2eIdentity>`]
|
1415
|
+
*
|
1475
1416
|
* see [core_crypto::mls::MlsCentral::new_acme_enrollment]
|
1417
|
+
* @param {string} client_id
|
1418
|
+
* @param {string} display_name
|
1419
|
+
* @param {string} handle
|
1420
|
+
* @param {number} expiry_days
|
1476
1421
|
* @param {number} ciphersuite
|
1477
|
-
* @returns {Promise<
|
1422
|
+
* @returns {Promise<any>}
|
1423
|
+
*/
|
1424
|
+
new_acme_enrollment(client_id, display_name, handle, expiry_days, ciphersuite) {
|
1425
|
+
const ptr0 = passStringToWasm0(client_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1426
|
+
const len0 = WASM_VECTOR_LEN;
|
1427
|
+
const ptr1 = passStringToWasm0(display_name, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1428
|
+
const len1 = WASM_VECTOR_LEN;
|
1429
|
+
const ptr2 = passStringToWasm0(handle, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1430
|
+
const len2 = WASM_VECTOR_LEN;
|
1431
|
+
const ret = wasm$1.corecrypto_new_acme_enrollment(this.ptr, ptr0, len0, ptr1, len1, ptr2, len2, expiry_days, ciphersuite);
|
1432
|
+
return takeObject(ret);
|
1433
|
+
}
|
1434
|
+
/**
|
1435
|
+
* see [core_crypto::mls::MlsCentral::e2ei_mls_init]
|
1436
|
+
* @param {FfiWireE2EIdentity} e2ei
|
1437
|
+
* @param {string} certificate_chain
|
1438
|
+
* @returns {Promise<any>}
|
1478
1439
|
*/
|
1479
|
-
|
1480
|
-
|
1440
|
+
e2ei_mls_init(e2ei, certificate_chain) {
|
1441
|
+
_assertClass(e2ei, FfiWireE2EIdentity);
|
1442
|
+
var ptr0 = e2ei.__destroy_into_raw();
|
1443
|
+
const ptr1 = passStringToWasm0(certificate_chain, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1444
|
+
const len1 = WASM_VECTOR_LEN;
|
1445
|
+
const ret = wasm$1.corecrypto_e2ei_mls_init(this.ptr, ptr0, ptr1, len1);
|
1481
1446
|
return takeObject(ret);
|
1482
1447
|
}
|
1483
1448
|
};
|
@@ -1600,6 +1565,13 @@ class DecryptedMessage {
|
|
1600
1565
|
const ret = wasm$1.decryptedmessage_has_epoch_changed(this.ptr);
|
1601
1566
|
return ret !== 0;
|
1602
1567
|
}
|
1568
|
+
/**
|
1569
|
+
* @returns {WireIdentity | undefined}
|
1570
|
+
*/
|
1571
|
+
get identity() {
|
1572
|
+
const ret = wasm$1.decryptedmessage_identity(this.ptr);
|
1573
|
+
return ret === 0 ? undefined : WireIdentity.__wrap(ret);
|
1574
|
+
}
|
1603
1575
|
}
|
1604
1576
|
/**
|
1605
1577
|
*/
|
@@ -1621,7 +1593,7 @@ class FfiWireE2EIdentity {
|
|
1621
1593
|
/**
|
1622
1594
|
* See [core_crypto::e2e_identity::WireE2eIdentity::directory_response]
|
1623
1595
|
* @param {Uint8Array} directory
|
1624
|
-
* @returns {
|
1596
|
+
* @returns {AcmeDirectory}
|
1625
1597
|
*/
|
1626
1598
|
directory_response(directory) {
|
1627
1599
|
try {
|
@@ -1635,7 +1607,7 @@ class FfiWireE2EIdentity {
|
|
1635
1607
|
if (r2) {
|
1636
1608
|
throw takeObject(r1);
|
1637
1609
|
}
|
1638
|
-
return
|
1610
|
+
return AcmeDirectory.__wrap(r0);
|
1639
1611
|
}
|
1640
1612
|
finally {
|
1641
1613
|
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
@@ -1643,16 +1615,15 @@ class FfiWireE2EIdentity {
|
|
1643
1615
|
}
|
1644
1616
|
/**
|
1645
1617
|
* See [core_crypto::e2e_identity::WireE2eIdentity::new_account_request]
|
1646
|
-
* @param {any} directory
|
1647
1618
|
* @param {string} previous_nonce
|
1648
1619
|
* @returns {Uint8Array}
|
1649
1620
|
*/
|
1650
|
-
new_account_request(
|
1621
|
+
new_account_request(previous_nonce) {
|
1651
1622
|
try {
|
1652
1623
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1653
1624
|
const ptr0 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1654
1625
|
const len0 = WASM_VECTOR_LEN;
|
1655
|
-
wasm$1.ffiwiree2eidentity_new_account_request(retptr, this.ptr,
|
1626
|
+
wasm$1.ffiwiree2eidentity_new_account_request(retptr, this.ptr, ptr0, len0);
|
1656
1627
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1657
1628
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1658
1629
|
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
@@ -1668,7 +1639,7 @@ class FfiWireE2EIdentity {
|
|
1668
1639
|
/**
|
1669
1640
|
* See [core_crypto::e2e_identity::WireE2eIdentity::new_account_response]
|
1670
1641
|
* @param {Uint8Array} account
|
1671
|
-
* @returns {
|
1642
|
+
* @returns {any}
|
1672
1643
|
*/
|
1673
1644
|
new_account_response(account) {
|
1674
1645
|
try {
|
@@ -1688,27 +1659,15 @@ class FfiWireE2EIdentity {
|
|
1688
1659
|
}
|
1689
1660
|
/**
|
1690
1661
|
* See [core_crypto::e2e_identity::WireE2eIdentity::new_order_request]
|
1691
|
-
* @param {string} display_name
|
1692
|
-
* @param {string} client_id
|
1693
|
-
* @param {string} handle
|
1694
|
-
* @param {number} expiry_days
|
1695
|
-
* @param {any} directory
|
1696
|
-
* @param {Uint8Array} account
|
1697
1662
|
* @param {string} previous_nonce
|
1698
1663
|
* @returns {Uint8Array}
|
1699
1664
|
*/
|
1700
|
-
new_order_request(
|
1665
|
+
new_order_request(previous_nonce) {
|
1701
1666
|
try {
|
1702
1667
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1703
|
-
const ptr0 = passStringToWasm0(
|
1668
|
+
const ptr0 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1704
1669
|
const len0 = WASM_VECTOR_LEN;
|
1705
|
-
|
1706
|
-
const len1 = WASM_VECTOR_LEN;
|
1707
|
-
const ptr2 = passStringToWasm0(handle, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1708
|
-
const len2 = WASM_VECTOR_LEN;
|
1709
|
-
const ptr3 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1710
|
-
const len3 = WASM_VECTOR_LEN;
|
1711
|
-
wasm$1.ffiwiree2eidentity_new_order_request(retptr, this.ptr, ptr0, len0, ptr1, len1, ptr2, len2, expiry_days, addHeapObject(directory), addHeapObject(account), ptr3, len3);
|
1670
|
+
wasm$1.ffiwiree2eidentity_new_order_request(retptr, this.ptr, ptr0, len0);
|
1712
1671
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1713
1672
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1714
1673
|
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
@@ -1724,7 +1683,7 @@ class FfiWireE2EIdentity {
|
|
1724
1683
|
/**
|
1725
1684
|
* See [core_crypto::e2e_identity::WireE2eIdentity::new_order_response]
|
1726
1685
|
* @param {Uint8Array} order
|
1727
|
-
* @returns {
|
1686
|
+
* @returns {NewAcmeOrder}
|
1728
1687
|
*/
|
1729
1688
|
new_order_response(order) {
|
1730
1689
|
try {
|
@@ -1736,7 +1695,7 @@ class FfiWireE2EIdentity {
|
|
1736
1695
|
if (r2) {
|
1737
1696
|
throw takeObject(r1);
|
1738
1697
|
}
|
1739
|
-
return
|
1698
|
+
return NewAcmeOrder.__wrap(r0);
|
1740
1699
|
}
|
1741
1700
|
finally {
|
1742
1701
|
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
@@ -1745,18 +1704,17 @@ class FfiWireE2EIdentity {
|
|
1745
1704
|
/**
|
1746
1705
|
* See [core_crypto::e2e_identity::WireE2eIdentity::new_authz_request]
|
1747
1706
|
* @param {string} url
|
1748
|
-
* @param {Uint8Array} account
|
1749
1707
|
* @param {string} previous_nonce
|
1750
1708
|
* @returns {Uint8Array}
|
1751
1709
|
*/
|
1752
|
-
new_authz_request(url,
|
1710
|
+
new_authz_request(url, previous_nonce) {
|
1753
1711
|
try {
|
1754
1712
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1755
1713
|
const ptr0 = passStringToWasm0(url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1756
1714
|
const len0 = WASM_VECTOR_LEN;
|
1757
1715
|
const ptr1 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1758
1716
|
const len1 = WASM_VECTOR_LEN;
|
1759
|
-
wasm$1.ffiwiree2eidentity_new_authz_request(retptr, this.ptr, ptr0, len0,
|
1717
|
+
wasm$1.ffiwiree2eidentity_new_authz_request(retptr, this.ptr, ptr0, len0, ptr1, len1);
|
1760
1718
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1761
1719
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1762
1720
|
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
@@ -1772,7 +1730,7 @@ class FfiWireE2EIdentity {
|
|
1772
1730
|
/**
|
1773
1731
|
* See [core_crypto::e2e_identity::WireE2eIdentity::new_authz_response]
|
1774
1732
|
* @param {Uint8Array} authz
|
1775
|
-
* @returns {
|
1733
|
+
* @returns {NewAcmeAuthz}
|
1776
1734
|
*/
|
1777
1735
|
new_authz_response(authz) {
|
1778
1736
|
try {
|
@@ -1784,7 +1742,7 @@ class FfiWireE2EIdentity {
|
|
1784
1742
|
if (r2) {
|
1785
1743
|
throw takeObject(r1);
|
1786
1744
|
}
|
1787
|
-
return
|
1745
|
+
return NewAcmeAuthz.__wrap(r0);
|
1788
1746
|
}
|
1789
1747
|
finally {
|
1790
1748
|
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
@@ -1793,56 +1751,43 @@ class FfiWireE2EIdentity {
|
|
1793
1751
|
/**
|
1794
1752
|
* See [core_crypto::e2e_identity::WireE2eIdentity::create_dpop_token]
|
1795
1753
|
* @param {string} access_token_url
|
1796
|
-
* @param {string} client_id
|
1797
|
-
* @param {any} dpop_challenge
|
1798
1754
|
* @param {string} backend_nonce
|
1799
|
-
* @
|
1800
|
-
* @returns {string}
|
1755
|
+
* @returns {Uint8Array}
|
1801
1756
|
*/
|
1802
|
-
create_dpop_token(access_token_url,
|
1757
|
+
create_dpop_token(access_token_url, backend_nonce) {
|
1803
1758
|
try {
|
1804
1759
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1805
1760
|
const ptr0 = passStringToWasm0(access_token_url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1806
1761
|
const len0 = WASM_VECTOR_LEN;
|
1807
|
-
const ptr1 = passStringToWasm0(
|
1762
|
+
const ptr1 = passStringToWasm0(backend_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1808
1763
|
const len1 = WASM_VECTOR_LEN;
|
1809
|
-
|
1810
|
-
const len2 = WASM_VECTOR_LEN;
|
1811
|
-
wasm$1.ffiwiree2eidentity_create_dpop_token(retptr, this.ptr, ptr0, len0, ptr1, len1, addHeapObject(dpop_challenge), ptr2, len2, expiry_days);
|
1764
|
+
wasm$1.ffiwiree2eidentity_create_dpop_token(retptr, this.ptr, ptr0, len0, ptr1, len1);
|
1812
1765
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1813
1766
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1814
1767
|
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
1815
|
-
|
1816
|
-
|
1817
|
-
var len3 = r1;
|
1818
|
-
if (r3) {
|
1819
|
-
ptr3 = 0;
|
1820
|
-
len3 = 0;
|
1821
|
-
throw takeObject(r2);
|
1768
|
+
if (r2) {
|
1769
|
+
throw takeObject(r1);
|
1822
1770
|
}
|
1823
|
-
return
|
1771
|
+
return takeObject(r0);
|
1824
1772
|
}
|
1825
1773
|
finally {
|
1826
1774
|
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
1827
|
-
wasm$1.__wbindgen_free(ptr3, len3);
|
1828
1775
|
}
|
1829
1776
|
}
|
1830
1777
|
/**
|
1831
1778
|
* See [core_crypto::e2e_identity::WireE2eIdentity::new_dpop_challenge_request]
|
1832
1779
|
* @param {string} access_token
|
1833
|
-
* @param {any} dpop_challenge
|
1834
|
-
* @param {Uint8Array} account
|
1835
1780
|
* @param {string} previous_nonce
|
1836
1781
|
* @returns {Uint8Array}
|
1837
1782
|
*/
|
1838
|
-
new_dpop_challenge_request(access_token,
|
1783
|
+
new_dpop_challenge_request(access_token, previous_nonce) {
|
1839
1784
|
try {
|
1840
1785
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1841
1786
|
const ptr0 = passStringToWasm0(access_token, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1842
1787
|
const len0 = WASM_VECTOR_LEN;
|
1843
1788
|
const ptr1 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1844
1789
|
const len1 = WASM_VECTOR_LEN;
|
1845
|
-
wasm$1.ffiwiree2eidentity_new_dpop_challenge_request(retptr, this.ptr, ptr0, len0,
|
1790
|
+
wasm$1.ffiwiree2eidentity_new_dpop_challenge_request(retptr, this.ptr, ptr0, len0, ptr1, len1);
|
1846
1791
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1847
1792
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1848
1793
|
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
@@ -1858,19 +1803,17 @@ class FfiWireE2EIdentity {
|
|
1858
1803
|
/**
|
1859
1804
|
* See [core_crypto::e2e_identity::WireE2eIdentity::new_oidc_challenge_request]
|
1860
1805
|
* @param {string} id_token
|
1861
|
-
* @param {any} oidc_challenge
|
1862
|
-
* @param {Uint8Array} account
|
1863
1806
|
* @param {string} previous_nonce
|
1864
1807
|
* @returns {Uint8Array}
|
1865
1808
|
*/
|
1866
|
-
new_oidc_challenge_request(id_token,
|
1809
|
+
new_oidc_challenge_request(id_token, previous_nonce) {
|
1867
1810
|
try {
|
1868
1811
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1869
1812
|
const ptr0 = passStringToWasm0(id_token, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1870
1813
|
const len0 = WASM_VECTOR_LEN;
|
1871
1814
|
const ptr1 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1872
1815
|
const len1 = WASM_VECTOR_LEN;
|
1873
|
-
wasm$1.ffiwiree2eidentity_new_oidc_challenge_request(retptr, this.ptr, ptr0, len0,
|
1816
|
+
wasm$1.ffiwiree2eidentity_new_oidc_challenge_request(retptr, this.ptr, ptr0, len0, ptr1, len1);
|
1874
1817
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1875
1818
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1876
1819
|
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
@@ -1886,6 +1829,7 @@ class FfiWireE2EIdentity {
|
|
1886
1829
|
/**
|
1887
1830
|
* See [core_crypto::e2e_identity::WireE2eIdentity::new_challenge_response]
|
1888
1831
|
* @param {Uint8Array} challenge
|
1832
|
+
* @returns {any}
|
1889
1833
|
*/
|
1890
1834
|
new_challenge_response(challenge) {
|
1891
1835
|
try {
|
@@ -1893,9 +1837,11 @@ class FfiWireE2EIdentity {
|
|
1893
1837
|
wasm$1.ffiwiree2eidentity_new_challenge_response(retptr, this.ptr, addHeapObject(challenge));
|
1894
1838
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1895
1839
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1896
|
-
|
1897
|
-
|
1840
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
1841
|
+
if (r2) {
|
1842
|
+
throw takeObject(r1);
|
1898
1843
|
}
|
1844
|
+
return takeObject(r0);
|
1899
1845
|
}
|
1900
1846
|
finally {
|
1901
1847
|
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
@@ -1904,18 +1850,17 @@ class FfiWireE2EIdentity {
|
|
1904
1850
|
/**
|
1905
1851
|
* See [core_crypto::e2e_identity::WireE2eIdentity::check_order_request]
|
1906
1852
|
* @param {string} order_url
|
1907
|
-
* @param {Uint8Array} account
|
1908
1853
|
* @param {string} previous_nonce
|
1909
1854
|
* @returns {Uint8Array}
|
1910
1855
|
*/
|
1911
|
-
check_order_request(order_url,
|
1856
|
+
check_order_request(order_url, previous_nonce) {
|
1912
1857
|
try {
|
1913
1858
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1914
1859
|
const ptr0 = passStringToWasm0(order_url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1915
1860
|
const len0 = WASM_VECTOR_LEN;
|
1916
1861
|
const ptr1 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1917
1862
|
const len1 = WASM_VECTOR_LEN;
|
1918
|
-
wasm$1.ffiwiree2eidentity_check_order_request(retptr, this.ptr, ptr0, len0,
|
1863
|
+
wasm$1.ffiwiree2eidentity_check_order_request(retptr, this.ptr, ptr0, len0, ptr1, len1);
|
1919
1864
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1920
1865
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1921
1866
|
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
@@ -1931,7 +1876,7 @@ class FfiWireE2EIdentity {
|
|
1931
1876
|
/**
|
1932
1877
|
* See [core_crypto::e2e_identity::WireE2eIdentity::check_order_response]
|
1933
1878
|
* @param {Uint8Array} order
|
1934
|
-
* @returns {
|
1879
|
+
* @returns {any}
|
1935
1880
|
*/
|
1936
1881
|
check_order_response(order) {
|
1937
1882
|
try {
|
@@ -1951,17 +1896,15 @@ class FfiWireE2EIdentity {
|
|
1951
1896
|
}
|
1952
1897
|
/**
|
1953
1898
|
* See [core_crypto::e2e_identity::WireE2eIdentity::finalize_request]
|
1954
|
-
* @param {Uint8Array} order
|
1955
|
-
* @param {Uint8Array} account
|
1956
1899
|
* @param {string} previous_nonce
|
1957
1900
|
* @returns {Uint8Array}
|
1958
1901
|
*/
|
1959
|
-
finalize_request(
|
1902
|
+
finalize_request(previous_nonce) {
|
1960
1903
|
try {
|
1961
1904
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1962
1905
|
const ptr0 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1963
1906
|
const len0 = WASM_VECTOR_LEN;
|
1964
|
-
wasm$1.ffiwiree2eidentity_finalize_request(retptr, this.ptr,
|
1907
|
+
wasm$1.ffiwiree2eidentity_finalize_request(retptr, this.ptr, ptr0, len0);
|
1965
1908
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1966
1909
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1967
1910
|
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
@@ -1997,17 +1940,15 @@ class FfiWireE2EIdentity {
|
|
1997
1940
|
}
|
1998
1941
|
/**
|
1999
1942
|
* See [core_crypto::e2e_identity::WireE2eIdentity::certificate_request]
|
2000
|
-
* @param {any} finalize
|
2001
|
-
* @param {Uint8Array} account
|
2002
1943
|
* @param {string} previous_nonce
|
2003
1944
|
* @returns {Uint8Array}
|
2004
1945
|
*/
|
2005
|
-
certificate_request(
|
1946
|
+
certificate_request(previous_nonce) {
|
2006
1947
|
try {
|
2007
1948
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2008
1949
|
const ptr0 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2009
1950
|
const len0 = WASM_VECTOR_LEN;
|
2010
|
-
wasm$1.ffiwiree2eidentity_certificate_request(retptr, this.ptr,
|
1951
|
+
wasm$1.ffiwiree2eidentity_certificate_request(retptr, this.ptr, ptr0, len0);
|
2011
1952
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2012
1953
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2013
1954
|
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
@@ -2020,32 +1961,6 @@ class FfiWireE2EIdentity {
|
|
2020
1961
|
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2021
1962
|
}
|
2022
1963
|
}
|
2023
|
-
/**
|
2024
|
-
* See [core_crypto::e2e_identity::WireE2eIdentity::certificate_response]
|
2025
|
-
* @param {string} certificate_chain
|
2026
|
-
* @returns {(Uint8Array)[]}
|
2027
|
-
*/
|
2028
|
-
certificate_response(certificate_chain) {
|
2029
|
-
try {
|
2030
|
-
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2031
|
-
const ptr0 = passStringToWasm0(certificate_chain, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2032
|
-
const len0 = WASM_VECTOR_LEN;
|
2033
|
-
wasm$1.ffiwiree2eidentity_certificate_response(retptr, this.ptr, ptr0, len0);
|
2034
|
-
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2035
|
-
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2036
|
-
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
2037
|
-
var r3 = getInt32Memory0()[retptr / 4 + 3];
|
2038
|
-
if (r3) {
|
2039
|
-
throw takeObject(r2);
|
2040
|
-
}
|
2041
|
-
var v1 = getArrayJsValueFromWasm0(r0, r1).slice();
|
2042
|
-
wasm$1.__wbindgen_free(r0, r1 * 4);
|
2043
|
-
return v1;
|
2044
|
-
}
|
2045
|
-
finally {
|
2046
|
-
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2047
|
-
}
|
2048
|
-
}
|
2049
1964
|
}
|
2050
1965
|
/**
|
2051
1966
|
* see [core_crypto::prelude::ConversationMember]
|
@@ -2077,7 +1992,7 @@ class Invitee {
|
|
2077
1992
|
* @returns {Uint8Array}
|
2078
1993
|
*/
|
2079
1994
|
get id() {
|
2080
|
-
const ret = wasm$1.
|
1995
|
+
const ret = wasm$1.acmechallenge_delegate(this.ptr);
|
2081
1996
|
return takeObject(ret);
|
2082
1997
|
}
|
2083
1998
|
/**
|
@@ -2197,15 +2112,15 @@ class NewAcmeAuthz {
|
|
2197
2112
|
/**
|
2198
2113
|
* @returns {AcmeChallenge | undefined}
|
2199
2114
|
*/
|
2200
|
-
get
|
2201
|
-
const ret = wasm$1.
|
2115
|
+
get wireDpopChallenge() {
|
2116
|
+
const ret = wasm$1.newacmeauthz_wireDpopChallenge(this.ptr);
|
2202
2117
|
return ret === 0 ? undefined : AcmeChallenge.__wrap(ret);
|
2203
2118
|
}
|
2204
2119
|
/**
|
2205
2120
|
* @returns {AcmeChallenge | undefined}
|
2206
2121
|
*/
|
2207
|
-
get
|
2208
|
-
const ret = wasm$1.
|
2122
|
+
get wireOidcChallenge() {
|
2123
|
+
const ret = wasm$1.newacmeauthz_wireOidcChallenge(this.ptr);
|
2209
2124
|
return ret === 0 ? undefined : AcmeChallenge.__wrap(ret);
|
2210
2125
|
}
|
2211
2126
|
}
|
@@ -2273,7 +2188,7 @@ class ProposalBundle {
|
|
2273
2188
|
* @returns {Uint8Array}
|
2274
2189
|
*/
|
2275
2190
|
get proposal() {
|
2276
|
-
const ret = wasm$1.
|
2191
|
+
const ret = wasm$1.acmechallenge_delegate(this.ptr);
|
2277
2192
|
return takeObject(ret);
|
2278
2193
|
}
|
2279
2194
|
/**
|
@@ -2375,10 +2290,111 @@ class PublicGroupStateBundle {
|
|
2375
2290
|
* @returns {Uint8Array}
|
2376
2291
|
*/
|
2377
2292
|
get payload() {
|
2378
|
-
const ret = wasm$1.
|
2293
|
+
const ret = wasm$1.acmechallenge_delegate(this.ptr);
|
2379
2294
|
return takeObject(ret);
|
2380
2295
|
}
|
2381
2296
|
}
|
2297
|
+
/**
|
2298
|
+
* see [core_crypto::prelude::WireIdentity]
|
2299
|
+
*/
|
2300
|
+
class WireIdentity {
|
2301
|
+
static __wrap(ptr) {
|
2302
|
+
const obj = Object.create(WireIdentity.prototype);
|
2303
|
+
obj.ptr = ptr;
|
2304
|
+
return obj;
|
2305
|
+
}
|
2306
|
+
__destroy_into_raw() {
|
2307
|
+
const ptr = this.ptr;
|
2308
|
+
this.ptr = 0;
|
2309
|
+
return ptr;
|
2310
|
+
}
|
2311
|
+
free() {
|
2312
|
+
const ptr = this.__destroy_into_raw();
|
2313
|
+
wasm$1.__wbg_wireidentity_free(ptr);
|
2314
|
+
}
|
2315
|
+
/**
|
2316
|
+
* @param {string} client_id
|
2317
|
+
* @param {string} handle
|
2318
|
+
* @param {string} display_name
|
2319
|
+
* @param {string} domain
|
2320
|
+
*/
|
2321
|
+
constructor(client_id, handle, display_name, domain) {
|
2322
|
+
const ptr0 = passStringToWasm0(client_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2323
|
+
const len0 = WASM_VECTOR_LEN;
|
2324
|
+
const ptr1 = passStringToWasm0(handle, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2325
|
+
const len1 = WASM_VECTOR_LEN;
|
2326
|
+
const ptr2 = passStringToWasm0(display_name, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2327
|
+
const len2 = WASM_VECTOR_LEN;
|
2328
|
+
const ptr3 = passStringToWasm0(domain, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2329
|
+
const len3 = WASM_VECTOR_LEN;
|
2330
|
+
const ret = wasm$1.wireidentity_new(ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3);
|
2331
|
+
return WireIdentity.__wrap(ret);
|
2332
|
+
}
|
2333
|
+
/**
|
2334
|
+
* @returns {string}
|
2335
|
+
*/
|
2336
|
+
get client_id() {
|
2337
|
+
try {
|
2338
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2339
|
+
wasm$1.acmedirectory_newNonce(retptr, this.ptr);
|
2340
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2341
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2342
|
+
return getStringFromWasm0(r0, r1);
|
2343
|
+
}
|
2344
|
+
finally {
|
2345
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2346
|
+
wasm$1.__wbindgen_free(r0, r1);
|
2347
|
+
}
|
2348
|
+
}
|
2349
|
+
/**
|
2350
|
+
* @returns {string}
|
2351
|
+
*/
|
2352
|
+
get handle() {
|
2353
|
+
try {
|
2354
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2355
|
+
wasm$1.acmechallenge_url(retptr, this.ptr);
|
2356
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2357
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2358
|
+
return getStringFromWasm0(r0, r1);
|
2359
|
+
}
|
2360
|
+
finally {
|
2361
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2362
|
+
wasm$1.__wbindgen_free(r0, r1);
|
2363
|
+
}
|
2364
|
+
}
|
2365
|
+
/**
|
2366
|
+
* @returns {string}
|
2367
|
+
*/
|
2368
|
+
get display_name() {
|
2369
|
+
try {
|
2370
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2371
|
+
wasm$1.acmedirectory_newOrder(retptr, this.ptr);
|
2372
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2373
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2374
|
+
return getStringFromWasm0(r0, r1);
|
2375
|
+
}
|
2376
|
+
finally {
|
2377
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2378
|
+
wasm$1.__wbindgen_free(r0, r1);
|
2379
|
+
}
|
2380
|
+
}
|
2381
|
+
/**
|
2382
|
+
* @returns {string}
|
2383
|
+
*/
|
2384
|
+
get domain() {
|
2385
|
+
try {
|
2386
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2387
|
+
wasm$1.wireidentity_domain(retptr, this.ptr);
|
2388
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2389
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2390
|
+
return getStringFromWasm0(r0, r1);
|
2391
|
+
}
|
2392
|
+
finally {
|
2393
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2394
|
+
wasm$1.__wbindgen_free(r0, r1);
|
2395
|
+
}
|
2396
|
+
}
|
2397
|
+
}
|
2382
2398
|
async function load(module, imports) {
|
2383
2399
|
if (typeof Response === 'function' && module instanceof Response) {
|
2384
2400
|
if (typeof WebAssembly.instantiateStreaming === 'function') {
|
@@ -2414,14 +2430,14 @@ function getImports() {
|
|
2414
2430
|
const ret = getObject(arg0);
|
2415
2431
|
return addHeapObject(ret);
|
2416
2432
|
};
|
2433
|
+
imports.wbg.__wbindgen_object_drop_ref = function (arg0) {
|
2434
|
+
takeObject(arg0);
|
2435
|
+
};
|
2417
2436
|
imports.wbg.__wbindgen_is_object = function (arg0) {
|
2418
2437
|
const val = getObject(arg0);
|
2419
2438
|
const ret = typeof (val) === 'object' && val !== null;
|
2420
2439
|
return ret;
|
2421
2440
|
};
|
2422
|
-
imports.wbg.__wbindgen_object_drop_ref = function (arg0) {
|
2423
|
-
takeObject(arg0);
|
2424
|
-
};
|
2425
2441
|
imports.wbg.__wbg_getwithrefkey_5e6d9547403deab8 = function (arg0, arg1) {
|
2426
2442
|
const ret = getObject(arg0)[getObject(arg1)];
|
2427
2443
|
return addHeapObject(ret);
|
@@ -2462,18 +2478,18 @@ function getImports() {
|
|
2462
2478
|
const ret = getObject(arg0).length;
|
2463
2479
|
return ret;
|
2464
2480
|
};
|
2481
|
+
imports.wbg.__wbindgen_number_new = function (arg0) {
|
2482
|
+
const ret = arg0;
|
2483
|
+
return addHeapObject(ret);
|
2484
|
+
};
|
2465
2485
|
imports.wbg.__wbg_call_9495de66fdbe016b = function () {
|
2466
2486
|
return handleError(function (arg0, arg1, arg2) {
|
2467
2487
|
const ret = getObject(arg0).call(getObject(arg1), getObject(arg2));
|
2468
2488
|
return addHeapObject(ret);
|
2469
2489
|
}, arguments);
|
2470
2490
|
};
|
2471
|
-
imports.wbg.
|
2472
|
-
const ret = new
|
2473
|
-
return addHeapObject(ret);
|
2474
|
-
};
|
2475
|
-
imports.wbg.__wbindgen_bigint_from_u64 = function (arg0) {
|
2476
|
-
const ret = BigInt.asUintN(64, arg0);
|
2491
|
+
imports.wbg.__wbg_new_f9876326328f45ed = function () {
|
2492
|
+
const ret = new Object();
|
2477
2493
|
return addHeapObject(ret);
|
2478
2494
|
};
|
2479
2495
|
imports.wbg.__wbg_new_9d3a9ce4282a18a8 = function (arg0, arg1) {
|
@@ -2483,7 +2499,7 @@ function getImports() {
|
|
2483
2499
|
const a = state0.a;
|
2484
2500
|
state0.a = 0;
|
2485
2501
|
try {
|
2486
|
-
return
|
2502
|
+
return __wbg_adapter_285(a, state0.b, arg0, arg1);
|
2487
2503
|
}
|
2488
2504
|
finally {
|
2489
2505
|
state0.a = a;
|
@@ -2496,8 +2512,8 @@ function getImports() {
|
|
2496
2512
|
state0.a = state0.b = 0;
|
2497
2513
|
}
|
2498
2514
|
};
|
2499
|
-
imports.wbg.
|
2500
|
-
const ret = arg0;
|
2515
|
+
imports.wbg.__wbg_new_537b7341ce90bb31 = function (arg0) {
|
2516
|
+
const ret = new Uint8Array(getObject(arg0));
|
2501
2517
|
return addHeapObject(ret);
|
2502
2518
|
};
|
2503
2519
|
imports.wbg.__wbg_new_b525de17f44a8943 = function () {
|
@@ -2516,36 +2532,20 @@ function getImports() {
|
|
2516
2532
|
const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
|
2517
2533
|
return addHeapObject(ret);
|
2518
2534
|
};
|
2519
|
-
imports.wbg.
|
2520
|
-
const ret =
|
2521
|
-
return addHeapObject(ret);
|
2522
|
-
};
|
2523
|
-
imports.wbg.__wbg_new_f9876326328f45ed = function () {
|
2524
|
-
const ret = new Object();
|
2535
|
+
imports.wbg.__wbindgen_bigint_from_u64 = function (arg0) {
|
2536
|
+
const ret = BigInt.asUintN(64, arg0);
|
2525
2537
|
return addHeapObject(ret);
|
2526
2538
|
};
|
2527
2539
|
imports.wbg.__wbg_ffiwiree2eidentity_new = function (arg0) {
|
2528
2540
|
const ret = FfiWireE2EIdentity.__wrap(arg0);
|
2529
2541
|
return addHeapObject(ret);
|
2530
2542
|
};
|
2531
|
-
imports.wbg.
|
2532
|
-
|
2533
|
-
};
|
2534
|
-
imports.wbg.__wbg_isArray_39d28997bf6b96b4 = function (arg0) {
|
2535
|
-
const ret = Array.isArray(getObject(arg0));
|
2536
|
-
return ret;
|
2537
|
-
};
|
2538
|
-
imports.wbg.__wbg_get_27fe3dac1c4d0224 = function (arg0, arg1) {
|
2539
|
-
const ret = getObject(arg0)[arg1 >>> 0];
|
2540
|
-
return addHeapObject(ret);
|
2541
|
-
};
|
2542
|
-
imports.wbg.__wbg_new0_25059e40b1c02766 = function () {
|
2543
|
-
const ret = new Date();
|
2543
|
+
imports.wbg.__wbg_proteusautoprekeybundle_new = function (arg0) {
|
2544
|
+
const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
|
2544
2545
|
return addHeapObject(ret);
|
2545
2546
|
};
|
2546
|
-
imports.wbg.
|
2547
|
-
|
2548
|
-
return ret;
|
2547
|
+
imports.wbg.__wbg_setonsuccess_925a7718d3f62bc1 = function (arg0, arg1) {
|
2548
|
+
getObject(arg0).onsuccess = getObject(arg1);
|
2549
2549
|
};
|
2550
2550
|
imports.wbg.__wbindgen_jsval_loose_eq = function (arg0, arg1) {
|
2551
2551
|
const ret = getObject(arg0) == getObject(arg1);
|
@@ -2588,10 +2588,18 @@ function getImports() {
|
|
2588
2588
|
const ret = new Error(getStringFromWasm0(arg0, arg1));
|
2589
2589
|
return addHeapObject(ret);
|
2590
2590
|
};
|
2591
|
+
imports.wbg.__wbg_isArray_39d28997bf6b96b4 = function (arg0) {
|
2592
|
+
const ret = Array.isArray(getObject(arg0));
|
2593
|
+
return ret;
|
2594
|
+
};
|
2591
2595
|
imports.wbg.__wbg_iterator_55f114446221aa5a = function () {
|
2592
2596
|
const ret = Symbol.iterator;
|
2593
2597
|
return addHeapObject(ret);
|
2594
2598
|
};
|
2599
|
+
imports.wbg.__wbg_get_27fe3dac1c4d0224 = function (arg0, arg1) {
|
2600
|
+
const ret = getObject(arg0)[arg1 >>> 0];
|
2601
|
+
return addHeapObject(ret);
|
2602
|
+
};
|
2595
2603
|
imports.wbg.__wbg_corecrypto_new = function (arg0) {
|
2596
2604
|
const ret = CoreCrypto$1.__wrap(arg0);
|
2597
2605
|
return addHeapObject(ret);
|
@@ -2599,9 +2607,6 @@ function getImports() {
|
|
2599
2607
|
imports.wbg.__wbg_set_841ac57cff3d672b = function (arg0, arg1, arg2) {
|
2600
2608
|
getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
|
2601
2609
|
};
|
2602
|
-
imports.wbg.__wbg_set_17224bc548dd1d7b = function (arg0, arg1, arg2) {
|
2603
|
-
getObject(arg0)[arg1 >>> 0] = takeObject(arg2);
|
2604
|
-
};
|
2605
2610
|
imports.wbg.__wbg_new_15d3966e9981a196 = function (arg0, arg1) {
|
2606
2611
|
const ret = new Error(getStringFromWasm0(arg0, arg1));
|
2607
2612
|
return addHeapObject(ret);
|
@@ -2624,13 +2629,6 @@ function getImports() {
|
|
2624
2629
|
imports.wbg.__wbg_warn_e57696dbb3977030 = function (arg0) {
|
2625
2630
|
console.warn(getObject(arg0));
|
2626
2631
|
};
|
2627
|
-
imports.wbg.__wbg_String_88810dfeb4021902 = function (arg0, arg1) {
|
2628
|
-
const ret = String(getObject(arg1));
|
2629
|
-
const ptr0 = passStringToWasm0(ret, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2630
|
-
const len0 = WASM_VECTOR_LEN;
|
2631
|
-
getInt32Memory0()[arg0 / 4 + 1] = len0;
|
2632
|
-
getInt32Memory0()[arg0 / 4 + 0] = ptr0;
|
2633
|
-
};
|
2634
2632
|
imports.wbg.__wbg_call_96878afb7a8201ca = function () {
|
2635
2633
|
return handleError(function (arg0, arg1, arg2, arg3) {
|
2636
2634
|
const ret = getObject(arg0).call(getObject(arg1), getObject(arg2), getObject(arg3));
|
@@ -2661,6 +2659,9 @@ function getImports() {
|
|
2661
2659
|
const ret = Promise.reject(getObject(arg0));
|
2662
2660
|
return addHeapObject(ret);
|
2663
2661
|
};
|
2662
|
+
imports.wbg.__wbg_set_17224bc548dd1d7b = function (arg0, arg1, arg2) {
|
2663
|
+
getObject(arg0)[arg1 >>> 0] = takeObject(arg2);
|
2664
|
+
};
|
2664
2665
|
imports.wbg.__wbg_proposalbundle_new = function (arg0) {
|
2665
2666
|
const ret = ProposalBundle.__wrap(arg0);
|
2666
2667
|
return addHeapObject(ret);
|
@@ -2699,10 +2700,6 @@ function getImports() {
|
|
2699
2700
|
imports.wbg.__wbg_setonerror_7cbe775a0abc7a8e = function (arg0, arg1) {
|
2700
2701
|
getObject(arg0).onerror = getObject(arg1);
|
2701
2702
|
};
|
2702
|
-
imports.wbg.__wbg_getwithrefkey_15c62c2b8546208d = function (arg0, arg1) {
|
2703
|
-
const ret = getObject(arg0)[getObject(arg1)];
|
2704
|
-
return addHeapObject(ret);
|
2705
|
-
};
|
2706
2703
|
imports.wbg.__wbg_name_31ef05f12c1d72c6 = function (arg0, arg1) {
|
2707
2704
|
const ret = getObject(arg1).name;
|
2708
2705
|
const ptr0 = passStringToWasm0(ret, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
@@ -2728,9 +2725,6 @@ function getImports() {
|
|
2728
2725
|
const ret = false;
|
2729
2726
|
return ret;
|
2730
2727
|
};
|
2731
|
-
imports.wbg.__wbg_set_20cbc34131e76824 = function (arg0, arg1, arg2) {
|
2732
|
-
getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
|
2733
|
-
};
|
2734
2728
|
imports.wbg.__wbg_close_98f3a5ab91060b8b = function (arg0) {
|
2735
2729
|
getObject(arg0).close();
|
2736
2730
|
};
|
@@ -2794,37 +2788,45 @@ function getImports() {
|
|
2794
2788
|
return addHeapObject(ret);
|
2795
2789
|
}, arguments);
|
2796
2790
|
};
|
2797
|
-
imports.wbg.
|
2798
|
-
|
2799
|
-
|
2791
|
+
imports.wbg.__wbindgen_memory = function () {
|
2792
|
+
const ret = wasm$1.memory;
|
2793
|
+
return addHeapObject(ret);
|
2794
|
+
};
|
2795
|
+
imports.wbg.__wbg_buffer_cf65c07de34b9a08 = function (arg0) {
|
2796
|
+
const ret = getObject(arg0).buffer;
|
2797
|
+
return addHeapObject(ret);
|
2798
|
+
};
|
2799
|
+
imports.wbg.__wbg_newwithbyteoffsetandlength_9fb2f11355ecadf5 = function (arg0, arg1, arg2) {
|
2800
|
+
const ret = new Uint8Array(getObject(arg0), arg1 >>> 0, arg2 >>> 0);
|
2801
|
+
return addHeapObject(ret);
|
2802
|
+
};
|
2803
|
+
imports.wbg.__wbg_randomFillSync_e950366c42764a07 = function () {
|
2804
|
+
return handleError(function (arg0, arg1) {
|
2805
|
+
getObject(arg0).randomFillSync(takeObject(arg1));
|
2800
2806
|
}, arguments);
|
2801
2807
|
};
|
2802
2808
|
imports.wbg.__wbg_subarray_7526649b91a252a6 = function (arg0, arg1, arg2) {
|
2803
2809
|
const ret = getObject(arg0).subarray(arg1 >>> 0, arg2 >>> 0);
|
2804
2810
|
return addHeapObject(ret);
|
2805
2811
|
};
|
2806
|
-
imports.wbg.
|
2812
|
+
imports.wbg.__wbg_getRandomValues_3774744e221a22ad = function () {
|
2807
2813
|
return handleError(function (arg0, arg1) {
|
2808
2814
|
getObject(arg0).getRandomValues(getObject(arg1));
|
2809
2815
|
}, arguments);
|
2810
2816
|
};
|
2811
|
-
imports.wbg.
|
2812
|
-
const ret = getObject(arg0).length;
|
2813
|
-
return ret;
|
2814
|
-
};
|
2815
|
-
imports.wbg.__wbg_crypto_e1d53a1d73fb10b8 = function (arg0) {
|
2817
|
+
imports.wbg.__wbg_crypto_70a96de3b6b73dac = function (arg0) {
|
2816
2818
|
const ret = getObject(arg0).crypto;
|
2817
2819
|
return addHeapObject(ret);
|
2818
2820
|
};
|
2819
|
-
imports.wbg.
|
2821
|
+
imports.wbg.__wbg_process_dd1577445152112e = function (arg0) {
|
2820
2822
|
const ret = getObject(arg0).process;
|
2821
2823
|
return addHeapObject(ret);
|
2822
2824
|
};
|
2823
|
-
imports.wbg.
|
2825
|
+
imports.wbg.__wbg_versions_58036bec3add9e6f = function (arg0) {
|
2824
2826
|
const ret = getObject(arg0).versions;
|
2825
2827
|
return addHeapObject(ret);
|
2826
2828
|
};
|
2827
|
-
imports.wbg.
|
2829
|
+
imports.wbg.__wbg_node_6a9d28205ed5b0d8 = function (arg0) {
|
2828
2830
|
const ret = getObject(arg0).node;
|
2829
2831
|
return addHeapObject(ret);
|
2830
2832
|
};
|
@@ -2832,7 +2834,7 @@ function getImports() {
|
|
2832
2834
|
const ret = typeof (getObject(arg0)) === 'string';
|
2833
2835
|
return ret;
|
2834
2836
|
};
|
2835
|
-
imports.wbg.
|
2837
|
+
imports.wbg.__wbg_require_f05d779769764e82 = function () {
|
2836
2838
|
return handleError(function () {
|
2837
2839
|
const ret = module.require;
|
2838
2840
|
return addHeapObject(ret);
|
@@ -2842,7 +2844,7 @@ function getImports() {
|
|
2842
2844
|
const ret = typeof (getObject(arg0)) === 'function';
|
2843
2845
|
return ret;
|
2844
2846
|
};
|
2845
|
-
imports.wbg.
|
2847
|
+
imports.wbg.__wbg_msCrypto_adbc770ec9eca9c7 = function (arg0) {
|
2846
2848
|
const ret = getObject(arg0).msCrypto;
|
2847
2849
|
return addHeapObject(ret);
|
2848
2850
|
};
|
@@ -2908,21 +2910,13 @@ function getImports() {
|
|
2908
2910
|
return ret;
|
2909
2911
|
}, arguments);
|
2910
2912
|
};
|
2911
|
-
imports.wbg.__wbindgen_memory = function () {
|
2912
|
-
const ret = wasm$1.memory;
|
2913
|
-
return addHeapObject(ret);
|
2914
|
-
};
|
2915
|
-
imports.wbg.__wbg_buffer_cf65c07de34b9a08 = function (arg0) {
|
2916
|
-
const ret = getObject(arg0).buffer;
|
2917
|
-
return addHeapObject(ret);
|
2918
|
-
};
|
2919
|
-
imports.wbg.__wbg_newwithbyteoffsetandlength_9fb2f11355ecadf5 = function (arg0, arg1, arg2) {
|
2920
|
-
const ret = new Uint8Array(getObject(arg0), arg1 >>> 0, arg2 >>> 0);
|
2921
|
-
return addHeapObject(ret);
|
2922
|
-
};
|
2923
2913
|
imports.wbg.__wbg_set_17499e8aa4003ebd = function (arg0, arg1, arg2) {
|
2924
2914
|
getObject(arg0).set(getObject(arg1), arg2 >>> 0);
|
2925
2915
|
};
|
2916
|
+
imports.wbg.__wbg_length_27a2afe8ab42b09f = function (arg0) {
|
2917
|
+
const ret = getObject(arg0).length;
|
2918
|
+
return ret;
|
2919
|
+
};
|
2926
2920
|
imports.wbg.__wbg_now_931686b195a14f9d = function () {
|
2927
2921
|
const ret = Date.now();
|
2928
2922
|
return ret;
|
@@ -3048,13 +3042,21 @@ function getImports() {
|
|
3048
3042
|
const ret = Object.entries(getObject(arg0));
|
3049
3043
|
return addHeapObject(ret);
|
3050
3044
|
};
|
3051
|
-
imports.wbg.
|
3045
|
+
imports.wbg.__wbg_String_88810dfeb4021902 = function (arg0, arg1) {
|
3052
3046
|
const ret = String(getObject(arg1));
|
3053
3047
|
const ptr0 = passStringToWasm0(ret, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
3054
3048
|
const len0 = WASM_VECTOR_LEN;
|
3055
3049
|
getInt32Memory0()[arg0 / 4 + 1] = len0;
|
3056
3050
|
getInt32Memory0()[arg0 / 4 + 0] = ptr0;
|
3057
3051
|
};
|
3052
|
+
imports.wbg.__wbg_new0_25059e40b1c02766 = function () {
|
3053
|
+
const ret = new Date();
|
3054
|
+
return addHeapObject(ret);
|
3055
|
+
};
|
3056
|
+
imports.wbg.__wbg_getTime_7c59072d1651a3cf = function (arg0) {
|
3057
|
+
const ret = getObject(arg0).getTime();
|
3058
|
+
return ret;
|
3059
|
+
};
|
3058
3060
|
imports.wbg.__wbindgen_debug_string = function (arg0, arg1) {
|
3059
3061
|
const ret = debugString(getObject(arg1));
|
3060
3062
|
const ptr0 = passStringToWasm0(ret, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
@@ -3133,12 +3135,12 @@ function getImports() {
|
|
3133
3135
|
return addHeapObject(ret);
|
3134
3136
|
}, arguments);
|
3135
3137
|
};
|
3136
|
-
imports.wbg.
|
3137
|
-
const ret = makeMutClosure(arg0, arg1,
|
3138
|
+
imports.wbg.__wbindgen_closure_wrapper1541 = function (arg0, arg1, arg2) {
|
3139
|
+
const ret = makeMutClosure(arg0, arg1, 155, __wbg_adapter_52);
|
3138
3140
|
return addHeapObject(ret);
|
3139
3141
|
};
|
3140
|
-
imports.wbg.
|
3141
|
-
const ret = makeMutClosure(arg0, arg1,
|
3142
|
+
imports.wbg.__wbindgen_closure_wrapper4565 = function (arg0, arg1, arg2) {
|
3143
|
+
const ret = makeMutClosure(arg0, arg1, 155, __wbg_adapter_55);
|
3142
3144
|
return addHeapObject(ret);
|
3143
3145
|
};
|
3144
3146
|
return imports;
|
@@ -3174,7 +3176,6 @@ var exports = /*#__PURE__*/Object.freeze({
|
|
3174
3176
|
__proto__: null,
|
3175
3177
|
AcmeChallenge: AcmeChallenge,
|
3176
3178
|
AcmeDirectory: AcmeDirectory,
|
3177
|
-
AcmeFinalize: AcmeFinalize,
|
3178
3179
|
Ciphersuite: Ciphersuite$1,
|
3179
3180
|
CommitBundle: CommitBundle,
|
3180
3181
|
ConversationConfiguration: ConversationConfiguration,
|
@@ -3191,6 +3192,7 @@ var exports = /*#__PURE__*/Object.freeze({
|
|
3191
3192
|
ProposalBundle: ProposalBundle,
|
3192
3193
|
ProteusAutoPrekeyBundle: ProteusAutoPrekeyBundle,
|
3193
3194
|
PublicGroupStateBundle: PublicGroupStateBundle,
|
3195
|
+
WireIdentity: WireIdentity,
|
3194
3196
|
WirePolicy: WirePolicy$1,
|
3195
3197
|
default: init,
|
3196
3198
|
initSync: initSync
|
@@ -3199,7 +3201,7 @@ var exports = /*#__PURE__*/Object.freeze({
|
|
3199
3201
|
var wasm = async (opt = {}) => {
|
3200
3202
|
let {importHook, serverPath} = opt;
|
3201
3203
|
|
3202
|
-
let path = "assets/core_crypto_ffi-
|
3204
|
+
let path = "assets/core_crypto_ffi-a6e9489a.wasm";
|
3203
3205
|
|
3204
3206
|
if (serverPath != null) {
|
3205
3207
|
path = serverPath + /[^\/\\]*$/.exec(path)[0];
|
@@ -3485,13 +3487,13 @@ class CoreCrypto {
|
|
3485
3487
|
__classPrivateFieldSet(this, _CoreCrypto_cc, cc, "f");
|
3486
3488
|
}
|
3487
3489
|
/**
|
3488
|
-
* If this returns
|
3490
|
+
* If this returns `true` you **cannot** call {@link CoreCrypto.wipe} or {@link CoreCrypto.close} as they will produce an error because of the
|
3489
3491
|
* outstanding references that were detected.
|
3490
3492
|
*
|
3491
3493
|
* @returns the count of strong refs for this CoreCrypto instance
|
3492
3494
|
*/
|
3493
|
-
|
3494
|
-
return __classPrivateFieldGet(this, _CoreCrypto_cc, "f").
|
3495
|
+
isLocked() {
|
3496
|
+
return __classPrivateFieldGet(this, _CoreCrypto_cc, "f").has_outstanding_refs();
|
3495
3497
|
}
|
3496
3498
|
/**
|
3497
3499
|
* Wipes the {@link CoreCrypto} backing storage (i.e. {@link https://developer.mozilla.org/en-US/docs/Web/API/IndexedDB_API | IndexedDB} database)
|
@@ -4169,19 +4171,30 @@ class CoreCrypto {
|
|
4169
4171
|
/**
|
4170
4172
|
* Creates an enrollment instance with private key material you can use in order to fetch
|
4171
4173
|
* a new x509 certificate from the acme server.
|
4172
|
-
* Make sure to call {@link WireE2eIdentity.free} to dispose this instance and its associated
|
4173
|
-
* keying material.
|
4174
4174
|
*
|
4175
|
+
* @param clientId client identifier with user b64Url encoded & clientId hex encoded e.g. `NDUyMGUyMmY2YjA3NGU3NjkyZjE1NjJjZTAwMmQ2NTQ:6add501bacd1d90e@example.com`
|
4176
|
+
* @param displayName human readable name displayed in the application e.g. `Smith, Alice M (QA)`
|
4177
|
+
* @param handle user handle e.g. `alice.smith.qa@example.com`
|
4178
|
+
* @param expiryDays generated x509 certificate expiry
|
4175
4179
|
* @param ciphersuite - For generating signing key material. Only {@link Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519} is supported currently
|
4176
4180
|
* @returns The new {@link WireE2eIdentity} object
|
4177
4181
|
*/
|
4178
|
-
async newAcmeEnrollment(ciphersuite = Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519) {
|
4182
|
+
async newAcmeEnrollment(clientId, displayName, handle, expiryDays, ciphersuite = Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519) {
|
4179
4183
|
if (ciphersuite !== Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519) {
|
4180
4184
|
throw new Error("This ACME ciphersuite isn't supported. Only `Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519` is as of now");
|
4181
4185
|
}
|
4182
|
-
const e2ei = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").new_acme_enrollment(ciphersuite));
|
4186
|
+
const e2ei = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").new_acme_enrollment(clientId, displayName, handle, expiryDays, ciphersuite));
|
4183
4187
|
return new WireE2eIdentity(e2ei);
|
4184
4188
|
}
|
4189
|
+
/**
|
4190
|
+
* Parses the ACME server response from the endpoint fetching x509 certificates and uses it to initialize the MLS client with a certificate
|
4191
|
+
*
|
4192
|
+
* @param e2ei - the enrollment instance used to fetch the certificates
|
4193
|
+
* @param certificateChain - the raw response from ACME server
|
4194
|
+
*/
|
4195
|
+
async e2eiMlsInit(e2ei, certificateChain) {
|
4196
|
+
return await __classPrivateFieldGet(this, _CoreCrypto_cc, "f").e2ei_mls_init(e2ei.inner(), certificateChain);
|
4197
|
+
}
|
4185
4198
|
/**
|
4186
4199
|
* Returns the current version of {@link CoreCrypto}
|
4187
4200
|
*
|
@@ -4209,6 +4222,12 @@ class WireE2eIdentity {
|
|
4209
4222
|
free() {
|
4210
4223
|
__classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").free();
|
4211
4224
|
}
|
4225
|
+
/**
|
4226
|
+
* Should only be used internally
|
4227
|
+
*/
|
4228
|
+
inner() {
|
4229
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f");
|
4230
|
+
}
|
4212
4231
|
/**
|
4213
4232
|
* Parses the response from `GET /acme/{provisioner-name}/directory`.
|
4214
4233
|
* Use this {@link AcmeDirectory} in the next step to fetch the first nonce from the acme server. Use
|
@@ -4229,13 +4248,12 @@ class WireE2eIdentity {
|
|
4229
4248
|
* For creating a new acme account. This returns a signed JWS-alike request body to send to
|
4230
4249
|
* `POST /acme/{provisioner-name}/new-account`.
|
4231
4250
|
*
|
4232
|
-
* @param directory you got from {@link directoryResponse}
|
4233
4251
|
* @param previousNonce you got from calling `HEAD {@link AcmeDirectory.newNonce}`
|
4234
4252
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.3
|
4235
4253
|
*/
|
4236
|
-
newAccountRequest(
|
4254
|
+
newAccountRequest(previousNonce) {
|
4237
4255
|
try {
|
4238
|
-
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_account_request(
|
4256
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_account_request(previousNonce);
|
4239
4257
|
}
|
4240
4258
|
catch (e) {
|
4241
4259
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4257,18 +4275,12 @@ class WireE2eIdentity {
|
|
4257
4275
|
/**
|
4258
4276
|
* Creates a new acme order for the handle (userId + display name) and the clientId.
|
4259
4277
|
*
|
4260
|
-
* @param displayName human readable name displayed in the application e.g. `Smith, Alice M (QA)`
|
4261
|
-
* @param clientId client identifier with user b64Url encoded & clientId hex encoded e.g. `NDUyMGUyMmY2YjA3NGU3NjkyZjE1NjJjZTAwMmQ2NTQ:6add501bacd1d90e@example.com`
|
4262
|
-
* @param handle user handle e.g. `alice.smith.qa@example.com`
|
4263
|
-
* @param expiryDays generated x509 certificate expiry
|
4264
|
-
* @param directory you got from {@link directoryResponse}
|
4265
|
-
* @param account you got from {@link newAccountResponse}
|
4266
4278
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/new-account`
|
4267
4279
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
4268
4280
|
*/
|
4269
|
-
newOrderRequest(
|
4281
|
+
newOrderRequest(previousNonce) {
|
4270
4282
|
try {
|
4271
|
-
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_order_request(
|
4283
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_order_request(previousNonce);
|
4272
4284
|
}
|
4273
4285
|
catch (e) {
|
4274
4286
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4292,14 +4304,13 @@ class WireE2eIdentity {
|
|
4292
4304
|
* Creates a new authorization request.
|
4293
4305
|
*
|
4294
4306
|
* @param url one of the URL in new order's authorizations (use {@link NewAcmeOrder.authorizations} from {@link newOrderResponse})
|
4295
|
-
* @param account you got from {@link newAccountResponse}
|
4296
4307
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/new-order` (or from the
|
4297
4308
|
* previous to this method if you are creating the second authorization)
|
4298
4309
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5
|
4299
4310
|
*/
|
4300
|
-
newAuthzRequest(url,
|
4311
|
+
newAuthzRequest(url, previousNonce) {
|
4301
4312
|
try {
|
4302
|
-
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_authz_request(url,
|
4313
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_authz_request(url, previousNonce);
|
4303
4314
|
}
|
4304
4315
|
catch (e) {
|
4305
4316
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4328,14 +4339,11 @@ class WireE2eIdentity {
|
|
4328
4339
|
* {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token} on wire-server.
|
4329
4340
|
*
|
4330
4341
|
* @param accessTokenUrl backend endpoint where this token will be sent. Should be this one {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token}
|
4331
|
-
* @param clientId client identifier with user b64Url encoded & clientId hex encoded e.g. `NDUyMGUyMmY2YjA3NGU3NjkyZjE1NjJjZTAwMmQ2NTQ:6add501bacd1d90e@example.com`
|
4332
|
-
* @param dpopChallenge you found after {@link newAuthzResponse}
|
4333
4342
|
* @param backendNonce you get by calling `GET /clients/token/nonce` on wire-server as defined here {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/get_clients__client__nonce}
|
4334
|
-
* @param expiryDays token expiry in days
|
4335
4343
|
*/
|
4336
|
-
createDpopToken(accessTokenUrl,
|
4344
|
+
createDpopToken(accessTokenUrl, backendNonce) {
|
4337
4345
|
try {
|
4338
|
-
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").create_dpop_token(accessTokenUrl,
|
4346
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").create_dpop_token(accessTokenUrl, backendNonce);
|
4339
4347
|
}
|
4340
4348
|
catch (e) {
|
4341
4349
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4345,14 +4353,12 @@ class WireE2eIdentity {
|
|
4345
4353
|
* Creates a new challenge request for Wire Dpop challenge.
|
4346
4354
|
*
|
4347
4355
|
* @param accessToken returned by wire-server from https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token
|
4348
|
-
* @param dpopChallenge you found after {@link newAuthzResponse}
|
4349
|
-
* @param account you found after {@link newAccountResponse}
|
4350
4356
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
4351
4357
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
4352
4358
|
*/
|
4353
|
-
newDpopChallengeRequest(accessToken,
|
4359
|
+
newDpopChallengeRequest(accessToken, previousNonce) {
|
4354
4360
|
try {
|
4355
|
-
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_dpop_challenge_request(accessToken,
|
4361
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_dpop_challenge_request(accessToken, previousNonce);
|
4356
4362
|
}
|
4357
4363
|
catch (e) {
|
4358
4364
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4362,14 +4368,12 @@ class WireE2eIdentity {
|
|
4362
4368
|
* Creates a new challenge request for Wire Oidc challenge.
|
4363
4369
|
*
|
4364
4370
|
* @param idToken you get back from Identity Provider
|
4365
|
-
* @param oidcChallenge you found after {@link newAuthzResponse}
|
4366
|
-
* @param account you found after {@link newAccountResponse}
|
4367
4371
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
4368
4372
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
4369
4373
|
*/
|
4370
|
-
newOidcChallengeRequest(idToken,
|
4374
|
+
newOidcChallengeRequest(idToken, previousNonce) {
|
4371
4375
|
try {
|
4372
|
-
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_oidc_challenge_request(idToken,
|
4376
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_oidc_challenge_request(idToken, previousNonce);
|
4373
4377
|
}
|
4374
4378
|
catch (e) {
|
4375
4379
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4397,9 +4401,9 @@ class WireE2eIdentity {
|
|
4397
4401
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/challenge/{challenge-id}`
|
4398
4402
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
4399
4403
|
*/
|
4400
|
-
checkOrderRequest(orderUrl,
|
4404
|
+
checkOrderRequest(orderUrl, previousNonce) {
|
4401
4405
|
try {
|
4402
|
-
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").check_order_request(orderUrl,
|
4406
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").check_order_request(orderUrl, previousNonce);
|
4403
4407
|
}
|
4404
4408
|
catch (e) {
|
4405
4409
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4423,13 +4427,12 @@ class WireE2eIdentity {
|
|
4423
4427
|
* Final step before fetching the certificate.
|
4424
4428
|
*
|
4425
4429
|
* @param order - order you got from {@link checkOrderResponse}
|
4426
|
-
* @param account - account you found after {@link newAccountResponse}
|
4427
4430
|
* @param previousNonce - `replay-nonce` response header from `POST /acme/{provisioner-name}/order/{order-id}`
|
4428
4431
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
4429
4432
|
*/
|
4430
|
-
finalizeRequest(
|
4433
|
+
finalizeRequest(previousNonce) {
|
4431
4434
|
try {
|
4432
|
-
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").finalize_request(
|
4435
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").finalize_request(previousNonce);
|
4433
4436
|
}
|
4434
4437
|
catch (e) {
|
4435
4438
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4452,28 +4455,12 @@ class WireE2eIdentity {
|
|
4452
4455
|
/**
|
4453
4456
|
* Creates a request for finally fetching the x509 certificate.
|
4454
4457
|
*
|
4455
|
-
* @param finalize you got from {@link finalizeResponse}
|
4456
|
-
* @param account you got from {@link newAccountResponse}
|
4457
4458
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/order/{order-id}/finalize`
|
4458
4459
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4.2
|
4459
4460
|
*/
|
4460
|
-
certificateRequest(
|
4461
|
-
try {
|
4462
|
-
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").certificate_request(finalize, account, previousNonce);
|
4463
|
-
}
|
4464
|
-
catch (e) {
|
4465
|
-
throw CoreCryptoError.fromStdError(e);
|
4466
|
-
}
|
4467
|
-
}
|
4468
|
-
/**
|
4469
|
-
* Parses the response from `POST /acme/{provisioner-name}/certificate/{certificate-id}`.
|
4470
|
-
*
|
4471
|
-
* @param certificateChain HTTP string response body
|
4472
|
-
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4.2
|
4473
|
-
*/
|
4474
|
-
certificateResponse(certificateChain) {
|
4461
|
+
certificateRequest(previousNonce) {
|
4475
4462
|
try {
|
4476
|
-
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").
|
4463
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").certificate_request(previousNonce);
|
4477
4464
|
}
|
4478
4465
|
catch (e) {
|
4479
4466
|
throw CoreCryptoError.fromStdError(e);
|