@wireapp/core-crypto 0.7.0-rc.3 → 0.7.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -226,12 +226,12 @@ function makeMutClosure(arg0, arg1, dtor, f) {
226
226
  return real;
227
227
  }
228
228
  function __wbg_adapter_52(arg0, arg1, arg2) {
229
- wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h52d25f5c9b3d3ff2(arg0, arg1, addHeapObject(arg2));
229
+ wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h4f5b84878d1a1cd6(arg0, arg1, addHeapObject(arg2));
230
230
  }
231
231
  function __wbg_adapter_55(arg0, arg1, arg2) {
232
232
  try {
233
233
  const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
234
- wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__hf21a7c6a12593e32(retptr, arg0, arg1, addHeapObject(arg2));
234
+ wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h035196cd566a20a2(retptr, arg0, arg1, addHeapObject(arg2));
235
235
  var r0 = getInt32Memory0()[retptr / 4 + 0];
236
236
  var r1 = getInt32Memory0()[retptr / 4 + 1];
237
237
  if (r1) {
@@ -270,15 +270,6 @@ function passArray8ToWasm0(arg, malloc) {
270
270
  WASM_VECTOR_LEN = arg.length;
271
271
  return ptr;
272
272
  }
273
- function getArrayJsValueFromWasm0(ptr, len) {
274
- const mem = getUint32Memory0();
275
- const slice = mem.subarray(ptr / 4, ptr / 4 + len);
276
- const result = [];
277
- for (let i = 0; i < slice.length; i++) {
278
- result.push(takeObject(slice[i]));
279
- }
280
- return result;
281
- }
282
273
  function getArrayU8FromWasm0(ptr, len) {
283
274
  return getUint8Memory0().subarray(ptr / 1, ptr / 1 + len);
284
275
  }
@@ -290,8 +281,8 @@ function handleError(f, args) {
290
281
  wasm$1.__wbindgen_exn_store(addHeapObject(e));
291
282
  }
292
283
  }
293
- function __wbg_adapter_282(arg0, arg1, arg2, arg3) {
294
- wasm$1.wasm_bindgen__convert__closures__invoke2_mut__h48b463a50f27b62f(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
284
+ function __wbg_adapter_285(arg0, arg1, arg2, arg3) {
285
+ wasm$1.wasm_bindgen__convert__closures__invoke2_mut__h77a2ddbf015f399a(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
295
286
  }
296
287
  /**
297
288
  * see [core_crypto::prelude::MlsWirePolicy]
@@ -427,10 +418,10 @@ class AcmeDirectory {
427
418
  /**
428
419
  * @returns {string}
429
420
  */
430
- get new_nonce() {
421
+ get newNonce() {
431
422
  try {
432
423
  const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
433
- wasm$1.acmedirectory_new_nonce(retptr, this.ptr);
424
+ wasm$1.acmedirectory_newNonce(retptr, this.ptr);
434
425
  var r0 = getInt32Memory0()[retptr / 4 + 0];
435
426
  var r1 = getInt32Memory0()[retptr / 4 + 1];
436
427
  return getStringFromWasm0(r0, r1);
@@ -443,7 +434,7 @@ class AcmeDirectory {
443
434
  /**
444
435
  * @returns {string}
445
436
  */
446
- get new_account() {
437
+ get newAccount() {
447
438
  try {
448
439
  const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
449
440
  wasm$1.acmechallenge_url(retptr, this.ptr);
@@ -459,62 +450,10 @@ class AcmeDirectory {
459
450
  /**
460
451
  * @returns {string}
461
452
  */
462
- get new_order() {
453
+ get newOrder() {
463
454
  try {
464
455
  const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
465
- wasm$1.acmedirectory_new_order(retptr, this.ptr);
466
- var r0 = getInt32Memory0()[retptr / 4 + 0];
467
- var r1 = getInt32Memory0()[retptr / 4 + 1];
468
- return getStringFromWasm0(r0, r1);
469
- }
470
- finally {
471
- wasm$1.__wbindgen_add_to_stack_pointer(16);
472
- wasm$1.__wbindgen_free(r0, r1);
473
- }
474
- }
475
- }
476
- /**
477
- * See [core_crypto::e2e_identity::types::E2eiAcmeFinalize]
478
- */
479
- class AcmeFinalize {
480
- static __wrap(ptr) {
481
- const obj = Object.create(AcmeFinalize.prototype);
482
- obj.ptr = ptr;
483
- return obj;
484
- }
485
- __destroy_into_raw() {
486
- const ptr = this.ptr;
487
- this.ptr = 0;
488
- return ptr;
489
- }
490
- free() {
491
- const ptr = this.__destroy_into_raw();
492
- wasm$1.__wbg_acmefinalize_free(ptr);
493
- }
494
- /**
495
- * @param {Uint8Array} delegate
496
- * @param {string} certificate_url
497
- */
498
- constructor(delegate, certificate_url) {
499
- const ptr0 = passStringToWasm0(certificate_url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
500
- const len0 = WASM_VECTOR_LEN;
501
- const ret = wasm$1.acmechallenge_new(addHeapObject(delegate), ptr0, len0);
502
- return AcmeFinalize.__wrap(ret);
503
- }
504
- /**
505
- * @returns {Uint8Array}
506
- */
507
- get delegate() {
508
- const ret = wasm$1.acmechallenge_delegate(this.ptr);
509
- return takeObject(ret);
510
- }
511
- /**
512
- * @returns {string}
513
- */
514
- get certificate_url() {
515
- try {
516
- const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
517
- wasm$1.acmechallenge_url(retptr, this.ptr);
456
+ wasm$1.acmedirectory_newOrder(retptr, this.ptr);
518
457
  var r0 = getInt32Memory0()[retptr / 4 + 0];
519
458
  var r1 = getInt32Memory0()[retptr / 4 + 1];
520
459
  return getStringFromWasm0(r0, r1);
@@ -734,11 +673,11 @@ let CoreCrypto$1 = class CoreCrypto {
734
673
  }
735
674
  /**
736
675
  * Returns the Arc strong ref count
737
- * @returns {number}
676
+ * @returns {boolean}
738
677
  */
739
- strong_ref_count() {
740
- const ret = wasm$1.corecrypto_strong_ref_count(this.ptr);
741
- return ret >>> 0;
678
+ has_outstanding_refs() {
679
+ const ret = wasm$1.corecrypto_has_outstanding_refs(this.ptr);
680
+ return ret !== 0;
742
681
  }
743
682
  /**
744
683
  * Returns: [`WasmCryptoResult<()>`]
@@ -1472,12 +1411,38 @@ let CoreCrypto$1 = class CoreCrypto {
1472
1411
  return takeObject(ret);
1473
1412
  }
1474
1413
  /**
1414
+ * Returns: [`WasmCryptoResult<WireE2eIdentity>`]
1415
+ *
1475
1416
  * see [core_crypto::mls::MlsCentral::new_acme_enrollment]
1417
+ * @param {string} client_id
1418
+ * @param {string} display_name
1419
+ * @param {string} handle
1420
+ * @param {number} expiry_days
1476
1421
  * @param {number} ciphersuite
1477
- * @returns {Promise<FfiWireE2EIdentity>}
1422
+ * @returns {Promise<any>}
1423
+ */
1424
+ new_acme_enrollment(client_id, display_name, handle, expiry_days, ciphersuite) {
1425
+ const ptr0 = passStringToWasm0(client_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1426
+ const len0 = WASM_VECTOR_LEN;
1427
+ const ptr1 = passStringToWasm0(display_name, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1428
+ const len1 = WASM_VECTOR_LEN;
1429
+ const ptr2 = passStringToWasm0(handle, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1430
+ const len2 = WASM_VECTOR_LEN;
1431
+ const ret = wasm$1.corecrypto_new_acme_enrollment(this.ptr, ptr0, len0, ptr1, len1, ptr2, len2, expiry_days, ciphersuite);
1432
+ return takeObject(ret);
1433
+ }
1434
+ /**
1435
+ * see [core_crypto::mls::MlsCentral::e2ei_mls_init]
1436
+ * @param {FfiWireE2EIdentity} e2ei
1437
+ * @param {string} certificate_chain
1438
+ * @returns {Promise<any>}
1478
1439
  */
1479
- new_acme_enrollment(ciphersuite) {
1480
- const ret = wasm$1.corecrypto_new_acme_enrollment(this.ptr, ciphersuite);
1440
+ e2ei_mls_init(e2ei, certificate_chain) {
1441
+ _assertClass(e2ei, FfiWireE2EIdentity);
1442
+ var ptr0 = e2ei.__destroy_into_raw();
1443
+ const ptr1 = passStringToWasm0(certificate_chain, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1444
+ const len1 = WASM_VECTOR_LEN;
1445
+ const ret = wasm$1.corecrypto_e2ei_mls_init(this.ptr, ptr0, ptr1, len1);
1481
1446
  return takeObject(ret);
1482
1447
  }
1483
1448
  };
@@ -1600,6 +1565,13 @@ class DecryptedMessage {
1600
1565
  const ret = wasm$1.decryptedmessage_has_epoch_changed(this.ptr);
1601
1566
  return ret !== 0;
1602
1567
  }
1568
+ /**
1569
+ * @returns {WireIdentity | undefined}
1570
+ */
1571
+ get identity() {
1572
+ const ret = wasm$1.decryptedmessage_identity(this.ptr);
1573
+ return ret === 0 ? undefined : WireIdentity.__wrap(ret);
1574
+ }
1603
1575
  }
1604
1576
  /**
1605
1577
  */
@@ -1621,7 +1593,7 @@ class FfiWireE2EIdentity {
1621
1593
  /**
1622
1594
  * See [core_crypto::e2e_identity::WireE2eIdentity::directory_response]
1623
1595
  * @param {Uint8Array} directory
1624
- * @returns {any}
1596
+ * @returns {AcmeDirectory}
1625
1597
  */
1626
1598
  directory_response(directory) {
1627
1599
  try {
@@ -1635,7 +1607,7 @@ class FfiWireE2EIdentity {
1635
1607
  if (r2) {
1636
1608
  throw takeObject(r1);
1637
1609
  }
1638
- return takeObject(r0);
1610
+ return AcmeDirectory.__wrap(r0);
1639
1611
  }
1640
1612
  finally {
1641
1613
  wasm$1.__wbindgen_add_to_stack_pointer(16);
@@ -1643,16 +1615,15 @@ class FfiWireE2EIdentity {
1643
1615
  }
1644
1616
  /**
1645
1617
  * See [core_crypto::e2e_identity::WireE2eIdentity::new_account_request]
1646
- * @param {any} directory
1647
1618
  * @param {string} previous_nonce
1648
1619
  * @returns {Uint8Array}
1649
1620
  */
1650
- new_account_request(directory, previous_nonce) {
1621
+ new_account_request(previous_nonce) {
1651
1622
  try {
1652
1623
  const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
1653
1624
  const ptr0 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1654
1625
  const len0 = WASM_VECTOR_LEN;
1655
- wasm$1.ffiwiree2eidentity_new_account_request(retptr, this.ptr, addHeapObject(directory), ptr0, len0);
1626
+ wasm$1.ffiwiree2eidentity_new_account_request(retptr, this.ptr, ptr0, len0);
1656
1627
  var r0 = getInt32Memory0()[retptr / 4 + 0];
1657
1628
  var r1 = getInt32Memory0()[retptr / 4 + 1];
1658
1629
  var r2 = getInt32Memory0()[retptr / 4 + 2];
@@ -1668,7 +1639,7 @@ class FfiWireE2EIdentity {
1668
1639
  /**
1669
1640
  * See [core_crypto::e2e_identity::WireE2eIdentity::new_account_response]
1670
1641
  * @param {Uint8Array} account
1671
- * @returns {Uint8Array}
1642
+ * @returns {any}
1672
1643
  */
1673
1644
  new_account_response(account) {
1674
1645
  try {
@@ -1688,27 +1659,15 @@ class FfiWireE2EIdentity {
1688
1659
  }
1689
1660
  /**
1690
1661
  * See [core_crypto::e2e_identity::WireE2eIdentity::new_order_request]
1691
- * @param {string} display_name
1692
- * @param {string} client_id
1693
- * @param {string} handle
1694
- * @param {number} expiry_days
1695
- * @param {any} directory
1696
- * @param {Uint8Array} account
1697
1662
  * @param {string} previous_nonce
1698
1663
  * @returns {Uint8Array}
1699
1664
  */
1700
- new_order_request(display_name, client_id, handle, expiry_days, directory, account, previous_nonce) {
1665
+ new_order_request(previous_nonce) {
1701
1666
  try {
1702
1667
  const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
1703
- const ptr0 = passStringToWasm0(display_name, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1668
+ const ptr0 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1704
1669
  const len0 = WASM_VECTOR_LEN;
1705
- const ptr1 = passStringToWasm0(client_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1706
- const len1 = WASM_VECTOR_LEN;
1707
- const ptr2 = passStringToWasm0(handle, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1708
- const len2 = WASM_VECTOR_LEN;
1709
- const ptr3 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1710
- const len3 = WASM_VECTOR_LEN;
1711
- wasm$1.ffiwiree2eidentity_new_order_request(retptr, this.ptr, ptr0, len0, ptr1, len1, ptr2, len2, expiry_days, addHeapObject(directory), addHeapObject(account), ptr3, len3);
1670
+ wasm$1.ffiwiree2eidentity_new_order_request(retptr, this.ptr, ptr0, len0);
1712
1671
  var r0 = getInt32Memory0()[retptr / 4 + 0];
1713
1672
  var r1 = getInt32Memory0()[retptr / 4 + 1];
1714
1673
  var r2 = getInt32Memory0()[retptr / 4 + 2];
@@ -1724,7 +1683,7 @@ class FfiWireE2EIdentity {
1724
1683
  /**
1725
1684
  * See [core_crypto::e2e_identity::WireE2eIdentity::new_order_response]
1726
1685
  * @param {Uint8Array} order
1727
- * @returns {any}
1686
+ * @returns {NewAcmeOrder}
1728
1687
  */
1729
1688
  new_order_response(order) {
1730
1689
  try {
@@ -1736,7 +1695,7 @@ class FfiWireE2EIdentity {
1736
1695
  if (r2) {
1737
1696
  throw takeObject(r1);
1738
1697
  }
1739
- return takeObject(r0);
1698
+ return NewAcmeOrder.__wrap(r0);
1740
1699
  }
1741
1700
  finally {
1742
1701
  wasm$1.__wbindgen_add_to_stack_pointer(16);
@@ -1745,18 +1704,17 @@ class FfiWireE2EIdentity {
1745
1704
  /**
1746
1705
  * See [core_crypto::e2e_identity::WireE2eIdentity::new_authz_request]
1747
1706
  * @param {string} url
1748
- * @param {Uint8Array} account
1749
1707
  * @param {string} previous_nonce
1750
1708
  * @returns {Uint8Array}
1751
1709
  */
1752
- new_authz_request(url, account, previous_nonce) {
1710
+ new_authz_request(url, previous_nonce) {
1753
1711
  try {
1754
1712
  const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
1755
1713
  const ptr0 = passStringToWasm0(url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1756
1714
  const len0 = WASM_VECTOR_LEN;
1757
1715
  const ptr1 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1758
1716
  const len1 = WASM_VECTOR_LEN;
1759
- wasm$1.ffiwiree2eidentity_new_authz_request(retptr, this.ptr, ptr0, len0, addHeapObject(account), ptr1, len1);
1717
+ wasm$1.ffiwiree2eidentity_new_authz_request(retptr, this.ptr, ptr0, len0, ptr1, len1);
1760
1718
  var r0 = getInt32Memory0()[retptr / 4 + 0];
1761
1719
  var r1 = getInt32Memory0()[retptr / 4 + 1];
1762
1720
  var r2 = getInt32Memory0()[retptr / 4 + 2];
@@ -1772,7 +1730,7 @@ class FfiWireE2EIdentity {
1772
1730
  /**
1773
1731
  * See [core_crypto::e2e_identity::WireE2eIdentity::new_authz_response]
1774
1732
  * @param {Uint8Array} authz
1775
- * @returns {any}
1733
+ * @returns {NewAcmeAuthz}
1776
1734
  */
1777
1735
  new_authz_response(authz) {
1778
1736
  try {
@@ -1784,7 +1742,7 @@ class FfiWireE2EIdentity {
1784
1742
  if (r2) {
1785
1743
  throw takeObject(r1);
1786
1744
  }
1787
- return takeObject(r0);
1745
+ return NewAcmeAuthz.__wrap(r0);
1788
1746
  }
1789
1747
  finally {
1790
1748
  wasm$1.__wbindgen_add_to_stack_pointer(16);
@@ -1793,56 +1751,43 @@ class FfiWireE2EIdentity {
1793
1751
  /**
1794
1752
  * See [core_crypto::e2e_identity::WireE2eIdentity::create_dpop_token]
1795
1753
  * @param {string} access_token_url
1796
- * @param {string} client_id
1797
- * @param {any} dpop_challenge
1798
1754
  * @param {string} backend_nonce
1799
- * @param {number} expiry_days
1800
- * @returns {string}
1755
+ * @returns {Uint8Array}
1801
1756
  */
1802
- create_dpop_token(access_token_url, client_id, dpop_challenge, backend_nonce, expiry_days) {
1757
+ create_dpop_token(access_token_url, backend_nonce) {
1803
1758
  try {
1804
1759
  const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
1805
1760
  const ptr0 = passStringToWasm0(access_token_url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1806
1761
  const len0 = WASM_VECTOR_LEN;
1807
- const ptr1 = passStringToWasm0(client_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1762
+ const ptr1 = passStringToWasm0(backend_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1808
1763
  const len1 = WASM_VECTOR_LEN;
1809
- const ptr2 = passStringToWasm0(backend_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1810
- const len2 = WASM_VECTOR_LEN;
1811
- wasm$1.ffiwiree2eidentity_create_dpop_token(retptr, this.ptr, ptr0, len0, ptr1, len1, addHeapObject(dpop_challenge), ptr2, len2, expiry_days);
1764
+ wasm$1.ffiwiree2eidentity_create_dpop_token(retptr, this.ptr, ptr0, len0, ptr1, len1);
1812
1765
  var r0 = getInt32Memory0()[retptr / 4 + 0];
1813
1766
  var r1 = getInt32Memory0()[retptr / 4 + 1];
1814
1767
  var r2 = getInt32Memory0()[retptr / 4 + 2];
1815
- var r3 = getInt32Memory0()[retptr / 4 + 3];
1816
- var ptr3 = r0;
1817
- var len3 = r1;
1818
- if (r3) {
1819
- ptr3 = 0;
1820
- len3 = 0;
1821
- throw takeObject(r2);
1768
+ if (r2) {
1769
+ throw takeObject(r1);
1822
1770
  }
1823
- return getStringFromWasm0(ptr3, len3);
1771
+ return takeObject(r0);
1824
1772
  }
1825
1773
  finally {
1826
1774
  wasm$1.__wbindgen_add_to_stack_pointer(16);
1827
- wasm$1.__wbindgen_free(ptr3, len3);
1828
1775
  }
1829
1776
  }
1830
1777
  /**
1831
1778
  * See [core_crypto::e2e_identity::WireE2eIdentity::new_dpop_challenge_request]
1832
1779
  * @param {string} access_token
1833
- * @param {any} dpop_challenge
1834
- * @param {Uint8Array} account
1835
1780
  * @param {string} previous_nonce
1836
1781
  * @returns {Uint8Array}
1837
1782
  */
1838
- new_dpop_challenge_request(access_token, dpop_challenge, account, previous_nonce) {
1783
+ new_dpop_challenge_request(access_token, previous_nonce) {
1839
1784
  try {
1840
1785
  const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
1841
1786
  const ptr0 = passStringToWasm0(access_token, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1842
1787
  const len0 = WASM_VECTOR_LEN;
1843
1788
  const ptr1 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1844
1789
  const len1 = WASM_VECTOR_LEN;
1845
- wasm$1.ffiwiree2eidentity_new_dpop_challenge_request(retptr, this.ptr, ptr0, len0, addHeapObject(dpop_challenge), addHeapObject(account), ptr1, len1);
1790
+ wasm$1.ffiwiree2eidentity_new_dpop_challenge_request(retptr, this.ptr, ptr0, len0, ptr1, len1);
1846
1791
  var r0 = getInt32Memory0()[retptr / 4 + 0];
1847
1792
  var r1 = getInt32Memory0()[retptr / 4 + 1];
1848
1793
  var r2 = getInt32Memory0()[retptr / 4 + 2];
@@ -1858,19 +1803,17 @@ class FfiWireE2EIdentity {
1858
1803
  /**
1859
1804
  * See [core_crypto::e2e_identity::WireE2eIdentity::new_oidc_challenge_request]
1860
1805
  * @param {string} id_token
1861
- * @param {any} oidc_challenge
1862
- * @param {Uint8Array} account
1863
1806
  * @param {string} previous_nonce
1864
1807
  * @returns {Uint8Array}
1865
1808
  */
1866
- new_oidc_challenge_request(id_token, oidc_challenge, account, previous_nonce) {
1809
+ new_oidc_challenge_request(id_token, previous_nonce) {
1867
1810
  try {
1868
1811
  const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
1869
1812
  const ptr0 = passStringToWasm0(id_token, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1870
1813
  const len0 = WASM_VECTOR_LEN;
1871
1814
  const ptr1 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1872
1815
  const len1 = WASM_VECTOR_LEN;
1873
- wasm$1.ffiwiree2eidentity_new_oidc_challenge_request(retptr, this.ptr, ptr0, len0, addHeapObject(oidc_challenge), addHeapObject(account), ptr1, len1);
1816
+ wasm$1.ffiwiree2eidentity_new_oidc_challenge_request(retptr, this.ptr, ptr0, len0, ptr1, len1);
1874
1817
  var r0 = getInt32Memory0()[retptr / 4 + 0];
1875
1818
  var r1 = getInt32Memory0()[retptr / 4 + 1];
1876
1819
  var r2 = getInt32Memory0()[retptr / 4 + 2];
@@ -1886,6 +1829,7 @@ class FfiWireE2EIdentity {
1886
1829
  /**
1887
1830
  * See [core_crypto::e2e_identity::WireE2eIdentity::new_challenge_response]
1888
1831
  * @param {Uint8Array} challenge
1832
+ * @returns {any}
1889
1833
  */
1890
1834
  new_challenge_response(challenge) {
1891
1835
  try {
@@ -1893,9 +1837,11 @@ class FfiWireE2EIdentity {
1893
1837
  wasm$1.ffiwiree2eidentity_new_challenge_response(retptr, this.ptr, addHeapObject(challenge));
1894
1838
  var r0 = getInt32Memory0()[retptr / 4 + 0];
1895
1839
  var r1 = getInt32Memory0()[retptr / 4 + 1];
1896
- if (r1) {
1897
- throw takeObject(r0);
1840
+ var r2 = getInt32Memory0()[retptr / 4 + 2];
1841
+ if (r2) {
1842
+ throw takeObject(r1);
1898
1843
  }
1844
+ return takeObject(r0);
1899
1845
  }
1900
1846
  finally {
1901
1847
  wasm$1.__wbindgen_add_to_stack_pointer(16);
@@ -1904,18 +1850,17 @@ class FfiWireE2EIdentity {
1904
1850
  /**
1905
1851
  * See [core_crypto::e2e_identity::WireE2eIdentity::check_order_request]
1906
1852
  * @param {string} order_url
1907
- * @param {Uint8Array} account
1908
1853
  * @param {string} previous_nonce
1909
1854
  * @returns {Uint8Array}
1910
1855
  */
1911
- check_order_request(order_url, account, previous_nonce) {
1856
+ check_order_request(order_url, previous_nonce) {
1912
1857
  try {
1913
1858
  const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
1914
1859
  const ptr0 = passStringToWasm0(order_url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1915
1860
  const len0 = WASM_VECTOR_LEN;
1916
1861
  const ptr1 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1917
1862
  const len1 = WASM_VECTOR_LEN;
1918
- wasm$1.ffiwiree2eidentity_check_order_request(retptr, this.ptr, ptr0, len0, addHeapObject(account), ptr1, len1);
1863
+ wasm$1.ffiwiree2eidentity_check_order_request(retptr, this.ptr, ptr0, len0, ptr1, len1);
1919
1864
  var r0 = getInt32Memory0()[retptr / 4 + 0];
1920
1865
  var r1 = getInt32Memory0()[retptr / 4 + 1];
1921
1866
  var r2 = getInt32Memory0()[retptr / 4 + 2];
@@ -1931,7 +1876,7 @@ class FfiWireE2EIdentity {
1931
1876
  /**
1932
1877
  * See [core_crypto::e2e_identity::WireE2eIdentity::check_order_response]
1933
1878
  * @param {Uint8Array} order
1934
- * @returns {Uint8Array}
1879
+ * @returns {any}
1935
1880
  */
1936
1881
  check_order_response(order) {
1937
1882
  try {
@@ -1951,17 +1896,15 @@ class FfiWireE2EIdentity {
1951
1896
  }
1952
1897
  /**
1953
1898
  * See [core_crypto::e2e_identity::WireE2eIdentity::finalize_request]
1954
- * @param {Uint8Array} order
1955
- * @param {Uint8Array} account
1956
1899
  * @param {string} previous_nonce
1957
1900
  * @returns {Uint8Array}
1958
1901
  */
1959
- finalize_request(order, account, previous_nonce) {
1902
+ finalize_request(previous_nonce) {
1960
1903
  try {
1961
1904
  const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
1962
1905
  const ptr0 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
1963
1906
  const len0 = WASM_VECTOR_LEN;
1964
- wasm$1.ffiwiree2eidentity_finalize_request(retptr, this.ptr, addHeapObject(order), addHeapObject(account), ptr0, len0);
1907
+ wasm$1.ffiwiree2eidentity_finalize_request(retptr, this.ptr, ptr0, len0);
1965
1908
  var r0 = getInt32Memory0()[retptr / 4 + 0];
1966
1909
  var r1 = getInt32Memory0()[retptr / 4 + 1];
1967
1910
  var r2 = getInt32Memory0()[retptr / 4 + 2];
@@ -1997,17 +1940,15 @@ class FfiWireE2EIdentity {
1997
1940
  }
1998
1941
  /**
1999
1942
  * See [core_crypto::e2e_identity::WireE2eIdentity::certificate_request]
2000
- * @param {any} finalize
2001
- * @param {Uint8Array} account
2002
1943
  * @param {string} previous_nonce
2003
1944
  * @returns {Uint8Array}
2004
1945
  */
2005
- certificate_request(finalize, account, previous_nonce) {
1946
+ certificate_request(previous_nonce) {
2006
1947
  try {
2007
1948
  const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
2008
1949
  const ptr0 = passStringToWasm0(previous_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
2009
1950
  const len0 = WASM_VECTOR_LEN;
2010
- wasm$1.ffiwiree2eidentity_certificate_request(retptr, this.ptr, addHeapObject(finalize), addHeapObject(account), ptr0, len0);
1951
+ wasm$1.ffiwiree2eidentity_certificate_request(retptr, this.ptr, ptr0, len0);
2011
1952
  var r0 = getInt32Memory0()[retptr / 4 + 0];
2012
1953
  var r1 = getInt32Memory0()[retptr / 4 + 1];
2013
1954
  var r2 = getInt32Memory0()[retptr / 4 + 2];
@@ -2020,32 +1961,6 @@ class FfiWireE2EIdentity {
2020
1961
  wasm$1.__wbindgen_add_to_stack_pointer(16);
2021
1962
  }
2022
1963
  }
2023
- /**
2024
- * See [core_crypto::e2e_identity::WireE2eIdentity::certificate_response]
2025
- * @param {string} certificate_chain
2026
- * @returns {(Uint8Array)[]}
2027
- */
2028
- certificate_response(certificate_chain) {
2029
- try {
2030
- const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
2031
- const ptr0 = passStringToWasm0(certificate_chain, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
2032
- const len0 = WASM_VECTOR_LEN;
2033
- wasm$1.ffiwiree2eidentity_certificate_response(retptr, this.ptr, ptr0, len0);
2034
- var r0 = getInt32Memory0()[retptr / 4 + 0];
2035
- var r1 = getInt32Memory0()[retptr / 4 + 1];
2036
- var r2 = getInt32Memory0()[retptr / 4 + 2];
2037
- var r3 = getInt32Memory0()[retptr / 4 + 3];
2038
- if (r3) {
2039
- throw takeObject(r2);
2040
- }
2041
- var v1 = getArrayJsValueFromWasm0(r0, r1).slice();
2042
- wasm$1.__wbindgen_free(r0, r1 * 4);
2043
- return v1;
2044
- }
2045
- finally {
2046
- wasm$1.__wbindgen_add_to_stack_pointer(16);
2047
- }
2048
- }
2049
1964
  }
2050
1965
  /**
2051
1966
  * see [core_crypto::prelude::ConversationMember]
@@ -2077,7 +1992,7 @@ class Invitee {
2077
1992
  * @returns {Uint8Array}
2078
1993
  */
2079
1994
  get id() {
2080
- const ret = wasm$1.invitee_id(this.ptr);
1995
+ const ret = wasm$1.acmechallenge_delegate(this.ptr);
2081
1996
  return takeObject(ret);
2082
1997
  }
2083
1998
  /**
@@ -2197,15 +2112,15 @@ class NewAcmeAuthz {
2197
2112
  /**
2198
2113
  * @returns {AcmeChallenge | undefined}
2199
2114
  */
2200
- get wire_dpop_challenge() {
2201
- const ret = wasm$1.newacmeauthz_wire_dpop_challenge(this.ptr);
2115
+ get wireDpopChallenge() {
2116
+ const ret = wasm$1.newacmeauthz_wireDpopChallenge(this.ptr);
2202
2117
  return ret === 0 ? undefined : AcmeChallenge.__wrap(ret);
2203
2118
  }
2204
2119
  /**
2205
2120
  * @returns {AcmeChallenge | undefined}
2206
2121
  */
2207
- get wire_oidc_challenge() {
2208
- const ret = wasm$1.newacmeauthz_wire_oidc_challenge(this.ptr);
2122
+ get wireOidcChallenge() {
2123
+ const ret = wasm$1.newacmeauthz_wireOidcChallenge(this.ptr);
2209
2124
  return ret === 0 ? undefined : AcmeChallenge.__wrap(ret);
2210
2125
  }
2211
2126
  }
@@ -2273,7 +2188,7 @@ class ProposalBundle {
2273
2188
  * @returns {Uint8Array}
2274
2189
  */
2275
2190
  get proposal() {
2276
- const ret = wasm$1.invitee_id(this.ptr);
2191
+ const ret = wasm$1.acmechallenge_delegate(this.ptr);
2277
2192
  return takeObject(ret);
2278
2193
  }
2279
2194
  /**
@@ -2375,10 +2290,111 @@ class PublicGroupStateBundle {
2375
2290
  * @returns {Uint8Array}
2376
2291
  */
2377
2292
  get payload() {
2378
- const ret = wasm$1.invitee_id(this.ptr);
2293
+ const ret = wasm$1.acmechallenge_delegate(this.ptr);
2379
2294
  return takeObject(ret);
2380
2295
  }
2381
2296
  }
2297
+ /**
2298
+ * see [core_crypto::prelude::WireIdentity]
2299
+ */
2300
+ class WireIdentity {
2301
+ static __wrap(ptr) {
2302
+ const obj = Object.create(WireIdentity.prototype);
2303
+ obj.ptr = ptr;
2304
+ return obj;
2305
+ }
2306
+ __destroy_into_raw() {
2307
+ const ptr = this.ptr;
2308
+ this.ptr = 0;
2309
+ return ptr;
2310
+ }
2311
+ free() {
2312
+ const ptr = this.__destroy_into_raw();
2313
+ wasm$1.__wbg_wireidentity_free(ptr);
2314
+ }
2315
+ /**
2316
+ * @param {string} client_id
2317
+ * @param {string} handle
2318
+ * @param {string} display_name
2319
+ * @param {string} domain
2320
+ */
2321
+ constructor(client_id, handle, display_name, domain) {
2322
+ const ptr0 = passStringToWasm0(client_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
2323
+ const len0 = WASM_VECTOR_LEN;
2324
+ const ptr1 = passStringToWasm0(handle, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
2325
+ const len1 = WASM_VECTOR_LEN;
2326
+ const ptr2 = passStringToWasm0(display_name, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
2327
+ const len2 = WASM_VECTOR_LEN;
2328
+ const ptr3 = passStringToWasm0(domain, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
2329
+ const len3 = WASM_VECTOR_LEN;
2330
+ const ret = wasm$1.wireidentity_new(ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3);
2331
+ return WireIdentity.__wrap(ret);
2332
+ }
2333
+ /**
2334
+ * @returns {string}
2335
+ */
2336
+ get client_id() {
2337
+ try {
2338
+ const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
2339
+ wasm$1.acmedirectory_newNonce(retptr, this.ptr);
2340
+ var r0 = getInt32Memory0()[retptr / 4 + 0];
2341
+ var r1 = getInt32Memory0()[retptr / 4 + 1];
2342
+ return getStringFromWasm0(r0, r1);
2343
+ }
2344
+ finally {
2345
+ wasm$1.__wbindgen_add_to_stack_pointer(16);
2346
+ wasm$1.__wbindgen_free(r0, r1);
2347
+ }
2348
+ }
2349
+ /**
2350
+ * @returns {string}
2351
+ */
2352
+ get handle() {
2353
+ try {
2354
+ const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
2355
+ wasm$1.acmechallenge_url(retptr, this.ptr);
2356
+ var r0 = getInt32Memory0()[retptr / 4 + 0];
2357
+ var r1 = getInt32Memory0()[retptr / 4 + 1];
2358
+ return getStringFromWasm0(r0, r1);
2359
+ }
2360
+ finally {
2361
+ wasm$1.__wbindgen_add_to_stack_pointer(16);
2362
+ wasm$1.__wbindgen_free(r0, r1);
2363
+ }
2364
+ }
2365
+ /**
2366
+ * @returns {string}
2367
+ */
2368
+ get display_name() {
2369
+ try {
2370
+ const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
2371
+ wasm$1.acmedirectory_newOrder(retptr, this.ptr);
2372
+ var r0 = getInt32Memory0()[retptr / 4 + 0];
2373
+ var r1 = getInt32Memory0()[retptr / 4 + 1];
2374
+ return getStringFromWasm0(r0, r1);
2375
+ }
2376
+ finally {
2377
+ wasm$1.__wbindgen_add_to_stack_pointer(16);
2378
+ wasm$1.__wbindgen_free(r0, r1);
2379
+ }
2380
+ }
2381
+ /**
2382
+ * @returns {string}
2383
+ */
2384
+ get domain() {
2385
+ try {
2386
+ const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
2387
+ wasm$1.wireidentity_domain(retptr, this.ptr);
2388
+ var r0 = getInt32Memory0()[retptr / 4 + 0];
2389
+ var r1 = getInt32Memory0()[retptr / 4 + 1];
2390
+ return getStringFromWasm0(r0, r1);
2391
+ }
2392
+ finally {
2393
+ wasm$1.__wbindgen_add_to_stack_pointer(16);
2394
+ wasm$1.__wbindgen_free(r0, r1);
2395
+ }
2396
+ }
2397
+ }
2382
2398
  async function load(module, imports) {
2383
2399
  if (typeof Response === 'function' && module instanceof Response) {
2384
2400
  if (typeof WebAssembly.instantiateStreaming === 'function') {
@@ -2414,14 +2430,14 @@ function getImports() {
2414
2430
  const ret = getObject(arg0);
2415
2431
  return addHeapObject(ret);
2416
2432
  };
2433
+ imports.wbg.__wbindgen_object_drop_ref = function (arg0) {
2434
+ takeObject(arg0);
2435
+ };
2417
2436
  imports.wbg.__wbindgen_is_object = function (arg0) {
2418
2437
  const val = getObject(arg0);
2419
2438
  const ret = typeof (val) === 'object' && val !== null;
2420
2439
  return ret;
2421
2440
  };
2422
- imports.wbg.__wbindgen_object_drop_ref = function (arg0) {
2423
- takeObject(arg0);
2424
- };
2425
2441
  imports.wbg.__wbg_getwithrefkey_5e6d9547403deab8 = function (arg0, arg1) {
2426
2442
  const ret = getObject(arg0)[getObject(arg1)];
2427
2443
  return addHeapObject(ret);
@@ -2462,18 +2478,18 @@ function getImports() {
2462
2478
  const ret = getObject(arg0).length;
2463
2479
  return ret;
2464
2480
  };
2481
+ imports.wbg.__wbindgen_number_new = function (arg0) {
2482
+ const ret = arg0;
2483
+ return addHeapObject(ret);
2484
+ };
2465
2485
  imports.wbg.__wbg_call_9495de66fdbe016b = function () {
2466
2486
  return handleError(function (arg0, arg1, arg2) {
2467
2487
  const ret = getObject(arg0).call(getObject(arg1), getObject(arg2));
2468
2488
  return addHeapObject(ret);
2469
2489
  }, arguments);
2470
2490
  };
2471
- imports.wbg.__wbg_new_537b7341ce90bb31 = function (arg0) {
2472
- const ret = new Uint8Array(getObject(arg0));
2473
- return addHeapObject(ret);
2474
- };
2475
- imports.wbg.__wbindgen_bigint_from_u64 = function (arg0) {
2476
- const ret = BigInt.asUintN(64, arg0);
2491
+ imports.wbg.__wbg_new_f9876326328f45ed = function () {
2492
+ const ret = new Object();
2477
2493
  return addHeapObject(ret);
2478
2494
  };
2479
2495
  imports.wbg.__wbg_new_9d3a9ce4282a18a8 = function (arg0, arg1) {
@@ -2483,7 +2499,7 @@ function getImports() {
2483
2499
  const a = state0.a;
2484
2500
  state0.a = 0;
2485
2501
  try {
2486
- return __wbg_adapter_282(a, state0.b, arg0, arg1);
2502
+ return __wbg_adapter_285(a, state0.b, arg0, arg1);
2487
2503
  }
2488
2504
  finally {
2489
2505
  state0.a = a;
@@ -2496,8 +2512,8 @@ function getImports() {
2496
2512
  state0.a = state0.b = 0;
2497
2513
  }
2498
2514
  };
2499
- imports.wbg.__wbindgen_number_new = function (arg0) {
2500
- const ret = arg0;
2515
+ imports.wbg.__wbg_new_537b7341ce90bb31 = function (arg0) {
2516
+ const ret = new Uint8Array(getObject(arg0));
2501
2517
  return addHeapObject(ret);
2502
2518
  };
2503
2519
  imports.wbg.__wbg_new_b525de17f44a8943 = function () {
@@ -2516,36 +2532,20 @@ function getImports() {
2516
2532
  const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
2517
2533
  return addHeapObject(ret);
2518
2534
  };
2519
- imports.wbg.__wbg_proteusautoprekeybundle_new = function (arg0) {
2520
- const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
2521
- return addHeapObject(ret);
2522
- };
2523
- imports.wbg.__wbg_new_f9876326328f45ed = function () {
2524
- const ret = new Object();
2535
+ imports.wbg.__wbindgen_bigint_from_u64 = function (arg0) {
2536
+ const ret = BigInt.asUintN(64, arg0);
2525
2537
  return addHeapObject(ret);
2526
2538
  };
2527
2539
  imports.wbg.__wbg_ffiwiree2eidentity_new = function (arg0) {
2528
2540
  const ret = FfiWireE2EIdentity.__wrap(arg0);
2529
2541
  return addHeapObject(ret);
2530
2542
  };
2531
- imports.wbg.__wbg_setonsuccess_925a7718d3f62bc1 = function (arg0, arg1) {
2532
- getObject(arg0).onsuccess = getObject(arg1);
2533
- };
2534
- imports.wbg.__wbg_isArray_39d28997bf6b96b4 = function (arg0) {
2535
- const ret = Array.isArray(getObject(arg0));
2536
- return ret;
2537
- };
2538
- imports.wbg.__wbg_get_27fe3dac1c4d0224 = function (arg0, arg1) {
2539
- const ret = getObject(arg0)[arg1 >>> 0];
2540
- return addHeapObject(ret);
2541
- };
2542
- imports.wbg.__wbg_new0_25059e40b1c02766 = function () {
2543
- const ret = new Date();
2543
+ imports.wbg.__wbg_proteusautoprekeybundle_new = function (arg0) {
2544
+ const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
2544
2545
  return addHeapObject(ret);
2545
2546
  };
2546
- imports.wbg.__wbg_getTime_7c59072d1651a3cf = function (arg0) {
2547
- const ret = getObject(arg0).getTime();
2548
- return ret;
2547
+ imports.wbg.__wbg_setonsuccess_925a7718d3f62bc1 = function (arg0, arg1) {
2548
+ getObject(arg0).onsuccess = getObject(arg1);
2549
2549
  };
2550
2550
  imports.wbg.__wbindgen_jsval_loose_eq = function (arg0, arg1) {
2551
2551
  const ret = getObject(arg0) == getObject(arg1);
@@ -2588,10 +2588,18 @@ function getImports() {
2588
2588
  const ret = new Error(getStringFromWasm0(arg0, arg1));
2589
2589
  return addHeapObject(ret);
2590
2590
  };
2591
+ imports.wbg.__wbg_isArray_39d28997bf6b96b4 = function (arg0) {
2592
+ const ret = Array.isArray(getObject(arg0));
2593
+ return ret;
2594
+ };
2591
2595
  imports.wbg.__wbg_iterator_55f114446221aa5a = function () {
2592
2596
  const ret = Symbol.iterator;
2593
2597
  return addHeapObject(ret);
2594
2598
  };
2599
+ imports.wbg.__wbg_get_27fe3dac1c4d0224 = function (arg0, arg1) {
2600
+ const ret = getObject(arg0)[arg1 >>> 0];
2601
+ return addHeapObject(ret);
2602
+ };
2595
2603
  imports.wbg.__wbg_corecrypto_new = function (arg0) {
2596
2604
  const ret = CoreCrypto$1.__wrap(arg0);
2597
2605
  return addHeapObject(ret);
@@ -2599,9 +2607,6 @@ function getImports() {
2599
2607
  imports.wbg.__wbg_set_841ac57cff3d672b = function (arg0, arg1, arg2) {
2600
2608
  getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
2601
2609
  };
2602
- imports.wbg.__wbg_set_17224bc548dd1d7b = function (arg0, arg1, arg2) {
2603
- getObject(arg0)[arg1 >>> 0] = takeObject(arg2);
2604
- };
2605
2610
  imports.wbg.__wbg_new_15d3966e9981a196 = function (arg0, arg1) {
2606
2611
  const ret = new Error(getStringFromWasm0(arg0, arg1));
2607
2612
  return addHeapObject(ret);
@@ -2624,13 +2629,6 @@ function getImports() {
2624
2629
  imports.wbg.__wbg_warn_e57696dbb3977030 = function (arg0) {
2625
2630
  console.warn(getObject(arg0));
2626
2631
  };
2627
- imports.wbg.__wbg_String_88810dfeb4021902 = function (arg0, arg1) {
2628
- const ret = String(getObject(arg1));
2629
- const ptr0 = passStringToWasm0(ret, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
2630
- const len0 = WASM_VECTOR_LEN;
2631
- getInt32Memory0()[arg0 / 4 + 1] = len0;
2632
- getInt32Memory0()[arg0 / 4 + 0] = ptr0;
2633
- };
2634
2632
  imports.wbg.__wbg_call_96878afb7a8201ca = function () {
2635
2633
  return handleError(function (arg0, arg1, arg2, arg3) {
2636
2634
  const ret = getObject(arg0).call(getObject(arg1), getObject(arg2), getObject(arg3));
@@ -2661,6 +2659,9 @@ function getImports() {
2661
2659
  const ret = Promise.reject(getObject(arg0));
2662
2660
  return addHeapObject(ret);
2663
2661
  };
2662
+ imports.wbg.__wbg_set_17224bc548dd1d7b = function (arg0, arg1, arg2) {
2663
+ getObject(arg0)[arg1 >>> 0] = takeObject(arg2);
2664
+ };
2664
2665
  imports.wbg.__wbg_proposalbundle_new = function (arg0) {
2665
2666
  const ret = ProposalBundle.__wrap(arg0);
2666
2667
  return addHeapObject(ret);
@@ -2699,10 +2700,6 @@ function getImports() {
2699
2700
  imports.wbg.__wbg_setonerror_7cbe775a0abc7a8e = function (arg0, arg1) {
2700
2701
  getObject(arg0).onerror = getObject(arg1);
2701
2702
  };
2702
- imports.wbg.__wbg_getwithrefkey_15c62c2b8546208d = function (arg0, arg1) {
2703
- const ret = getObject(arg0)[getObject(arg1)];
2704
- return addHeapObject(ret);
2705
- };
2706
2703
  imports.wbg.__wbg_name_31ef05f12c1d72c6 = function (arg0, arg1) {
2707
2704
  const ret = getObject(arg1).name;
2708
2705
  const ptr0 = passStringToWasm0(ret, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
@@ -2728,9 +2725,6 @@ function getImports() {
2728
2725
  const ret = false;
2729
2726
  return ret;
2730
2727
  };
2731
- imports.wbg.__wbg_set_20cbc34131e76824 = function (arg0, arg1, arg2) {
2732
- getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
2733
- };
2734
2728
  imports.wbg.__wbg_close_98f3a5ab91060b8b = function (arg0) {
2735
2729
  getObject(arg0).close();
2736
2730
  };
@@ -2794,37 +2788,45 @@ function getImports() {
2794
2788
  return addHeapObject(ret);
2795
2789
  }, arguments);
2796
2790
  };
2797
- imports.wbg.__wbg_randomFillSync_6894564c2c334c42 = function () {
2798
- return handleError(function (arg0, arg1, arg2) {
2799
- getObject(arg0).randomFillSync(getArrayU8FromWasm0(arg1, arg2));
2791
+ imports.wbg.__wbindgen_memory = function () {
2792
+ const ret = wasm$1.memory;
2793
+ return addHeapObject(ret);
2794
+ };
2795
+ imports.wbg.__wbg_buffer_cf65c07de34b9a08 = function (arg0) {
2796
+ const ret = getObject(arg0).buffer;
2797
+ return addHeapObject(ret);
2798
+ };
2799
+ imports.wbg.__wbg_newwithbyteoffsetandlength_9fb2f11355ecadf5 = function (arg0, arg1, arg2) {
2800
+ const ret = new Uint8Array(getObject(arg0), arg1 >>> 0, arg2 >>> 0);
2801
+ return addHeapObject(ret);
2802
+ };
2803
+ imports.wbg.__wbg_randomFillSync_e950366c42764a07 = function () {
2804
+ return handleError(function (arg0, arg1) {
2805
+ getObject(arg0).randomFillSync(takeObject(arg1));
2800
2806
  }, arguments);
2801
2807
  };
2802
2808
  imports.wbg.__wbg_subarray_7526649b91a252a6 = function (arg0, arg1, arg2) {
2803
2809
  const ret = getObject(arg0).subarray(arg1 >>> 0, arg2 >>> 0);
2804
2810
  return addHeapObject(ret);
2805
2811
  };
2806
- imports.wbg.__wbg_getRandomValues_805f1c3d65988a5a = function () {
2812
+ imports.wbg.__wbg_getRandomValues_3774744e221a22ad = function () {
2807
2813
  return handleError(function (arg0, arg1) {
2808
2814
  getObject(arg0).getRandomValues(getObject(arg1));
2809
2815
  }, arguments);
2810
2816
  };
2811
- imports.wbg.__wbg_length_27a2afe8ab42b09f = function (arg0) {
2812
- const ret = getObject(arg0).length;
2813
- return ret;
2814
- };
2815
- imports.wbg.__wbg_crypto_e1d53a1d73fb10b8 = function (arg0) {
2817
+ imports.wbg.__wbg_crypto_70a96de3b6b73dac = function (arg0) {
2816
2818
  const ret = getObject(arg0).crypto;
2817
2819
  return addHeapObject(ret);
2818
2820
  };
2819
- imports.wbg.__wbg_process_038c26bf42b093f8 = function (arg0) {
2821
+ imports.wbg.__wbg_process_dd1577445152112e = function (arg0) {
2820
2822
  const ret = getObject(arg0).process;
2821
2823
  return addHeapObject(ret);
2822
2824
  };
2823
- imports.wbg.__wbg_versions_ab37218d2f0b24a8 = function (arg0) {
2825
+ imports.wbg.__wbg_versions_58036bec3add9e6f = function (arg0) {
2824
2826
  const ret = getObject(arg0).versions;
2825
2827
  return addHeapObject(ret);
2826
2828
  };
2827
- imports.wbg.__wbg_node_080f4b19d15bc1fe = function (arg0) {
2829
+ imports.wbg.__wbg_node_6a9d28205ed5b0d8 = function (arg0) {
2828
2830
  const ret = getObject(arg0).node;
2829
2831
  return addHeapObject(ret);
2830
2832
  };
@@ -2832,7 +2834,7 @@ function getImports() {
2832
2834
  const ret = typeof (getObject(arg0)) === 'string';
2833
2835
  return ret;
2834
2836
  };
2835
- imports.wbg.__wbg_require_78a3dcfbdba9cbce = function () {
2837
+ imports.wbg.__wbg_require_f05d779769764e82 = function () {
2836
2838
  return handleError(function () {
2837
2839
  const ret = module.require;
2838
2840
  return addHeapObject(ret);
@@ -2842,7 +2844,7 @@ function getImports() {
2842
2844
  const ret = typeof (getObject(arg0)) === 'function';
2843
2845
  return ret;
2844
2846
  };
2845
- imports.wbg.__wbg_msCrypto_6e7d3e1f92610cbb = function (arg0) {
2847
+ imports.wbg.__wbg_msCrypto_adbc770ec9eca9c7 = function (arg0) {
2846
2848
  const ret = getObject(arg0).msCrypto;
2847
2849
  return addHeapObject(ret);
2848
2850
  };
@@ -2908,21 +2910,13 @@ function getImports() {
2908
2910
  return ret;
2909
2911
  }, arguments);
2910
2912
  };
2911
- imports.wbg.__wbindgen_memory = function () {
2912
- const ret = wasm$1.memory;
2913
- return addHeapObject(ret);
2914
- };
2915
- imports.wbg.__wbg_buffer_cf65c07de34b9a08 = function (arg0) {
2916
- const ret = getObject(arg0).buffer;
2917
- return addHeapObject(ret);
2918
- };
2919
- imports.wbg.__wbg_newwithbyteoffsetandlength_9fb2f11355ecadf5 = function (arg0, arg1, arg2) {
2920
- const ret = new Uint8Array(getObject(arg0), arg1 >>> 0, arg2 >>> 0);
2921
- return addHeapObject(ret);
2922
- };
2923
2913
  imports.wbg.__wbg_set_17499e8aa4003ebd = function (arg0, arg1, arg2) {
2924
2914
  getObject(arg0).set(getObject(arg1), arg2 >>> 0);
2925
2915
  };
2916
+ imports.wbg.__wbg_length_27a2afe8ab42b09f = function (arg0) {
2917
+ const ret = getObject(arg0).length;
2918
+ return ret;
2919
+ };
2926
2920
  imports.wbg.__wbg_now_931686b195a14f9d = function () {
2927
2921
  const ret = Date.now();
2928
2922
  return ret;
@@ -3048,13 +3042,21 @@ function getImports() {
3048
3042
  const ret = Object.entries(getObject(arg0));
3049
3043
  return addHeapObject(ret);
3050
3044
  };
3051
- imports.wbg.__wbg_String_91fba7ded13ba54c = function (arg0, arg1) {
3045
+ imports.wbg.__wbg_String_88810dfeb4021902 = function (arg0, arg1) {
3052
3046
  const ret = String(getObject(arg1));
3053
3047
  const ptr0 = passStringToWasm0(ret, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
3054
3048
  const len0 = WASM_VECTOR_LEN;
3055
3049
  getInt32Memory0()[arg0 / 4 + 1] = len0;
3056
3050
  getInt32Memory0()[arg0 / 4 + 0] = ptr0;
3057
3051
  };
3052
+ imports.wbg.__wbg_new0_25059e40b1c02766 = function () {
3053
+ const ret = new Date();
3054
+ return addHeapObject(ret);
3055
+ };
3056
+ imports.wbg.__wbg_getTime_7c59072d1651a3cf = function (arg0) {
3057
+ const ret = getObject(arg0).getTime();
3058
+ return ret;
3059
+ };
3058
3060
  imports.wbg.__wbindgen_debug_string = function (arg0, arg1) {
3059
3061
  const ret = debugString(getObject(arg1));
3060
3062
  const ptr0 = passStringToWasm0(ret, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
@@ -3133,12 +3135,12 @@ function getImports() {
3133
3135
  return addHeapObject(ret);
3134
3136
  }, arguments);
3135
3137
  };
3136
- imports.wbg.__wbindgen_closure_wrapper1553 = function (arg0, arg1, arg2) {
3137
- const ret = makeMutClosure(arg0, arg1, 165, __wbg_adapter_52);
3138
+ imports.wbg.__wbindgen_closure_wrapper1541 = function (arg0, arg1, arg2) {
3139
+ const ret = makeMutClosure(arg0, arg1, 155, __wbg_adapter_52);
3138
3140
  return addHeapObject(ret);
3139
3141
  };
3140
- imports.wbg.__wbindgen_closure_wrapper4705 = function (arg0, arg1, arg2) {
3141
- const ret = makeMutClosure(arg0, arg1, 165, __wbg_adapter_55);
3142
+ imports.wbg.__wbindgen_closure_wrapper4565 = function (arg0, arg1, arg2) {
3143
+ const ret = makeMutClosure(arg0, arg1, 155, __wbg_adapter_55);
3142
3144
  return addHeapObject(ret);
3143
3145
  };
3144
3146
  return imports;
@@ -3174,7 +3176,6 @@ var exports = /*#__PURE__*/Object.freeze({
3174
3176
  __proto__: null,
3175
3177
  AcmeChallenge: AcmeChallenge,
3176
3178
  AcmeDirectory: AcmeDirectory,
3177
- AcmeFinalize: AcmeFinalize,
3178
3179
  Ciphersuite: Ciphersuite$1,
3179
3180
  CommitBundle: CommitBundle,
3180
3181
  ConversationConfiguration: ConversationConfiguration,
@@ -3191,6 +3192,7 @@ var exports = /*#__PURE__*/Object.freeze({
3191
3192
  ProposalBundle: ProposalBundle,
3192
3193
  ProteusAutoPrekeyBundle: ProteusAutoPrekeyBundle,
3193
3194
  PublicGroupStateBundle: PublicGroupStateBundle,
3195
+ WireIdentity: WireIdentity,
3194
3196
  WirePolicy: WirePolicy$1,
3195
3197
  default: init,
3196
3198
  initSync: initSync
@@ -3199,7 +3201,7 @@ var exports = /*#__PURE__*/Object.freeze({
3199
3201
  var wasm = async (opt = {}) => {
3200
3202
  let {importHook, serverPath} = opt;
3201
3203
 
3202
- let path = "assets/core_crypto_ffi-834f6094.wasm";
3204
+ let path = "assets/core_crypto_ffi-a6e9489a.wasm";
3203
3205
 
3204
3206
  if (serverPath != null) {
3205
3207
  path = serverPath + /[^\/\\]*$/.exec(path)[0];
@@ -3485,13 +3487,13 @@ class CoreCrypto {
3485
3487
  __classPrivateFieldSet(this, _CoreCrypto_cc, cc, "f");
3486
3488
  }
3487
3489
  /**
3488
- * If this returns > 1 you **cannot** call {@link CoreCrypto.wipe} or {@link CoreCrypto.close} as they will produce an error because of the
3490
+ * If this returns `true` you **cannot** call {@link CoreCrypto.wipe} or {@link CoreCrypto.close} as they will produce an error because of the
3489
3491
  * outstanding references that were detected.
3490
3492
  *
3491
3493
  * @returns the count of strong refs for this CoreCrypto instance
3492
3494
  */
3493
- strongRefCount() {
3494
- return __classPrivateFieldGet(this, _CoreCrypto_cc, "f").strong_ref_count();
3495
+ isLocked() {
3496
+ return __classPrivateFieldGet(this, _CoreCrypto_cc, "f").has_outstanding_refs();
3495
3497
  }
3496
3498
  /**
3497
3499
  * Wipes the {@link CoreCrypto} backing storage (i.e. {@link https://developer.mozilla.org/en-US/docs/Web/API/IndexedDB_API | IndexedDB} database)
@@ -4169,19 +4171,30 @@ class CoreCrypto {
4169
4171
  /**
4170
4172
  * Creates an enrollment instance with private key material you can use in order to fetch
4171
4173
  * a new x509 certificate from the acme server.
4172
- * Make sure to call {@link WireE2eIdentity.free} to dispose this instance and its associated
4173
- * keying material.
4174
4174
  *
4175
+ * @param clientId client identifier with user b64Url encoded & clientId hex encoded e.g. `NDUyMGUyMmY2YjA3NGU3NjkyZjE1NjJjZTAwMmQ2NTQ:6add501bacd1d90e@example.com`
4176
+ * @param displayName human readable name displayed in the application e.g. `Smith, Alice M (QA)`
4177
+ * @param handle user handle e.g. `alice.smith.qa@example.com`
4178
+ * @param expiryDays generated x509 certificate expiry
4175
4179
  * @param ciphersuite - For generating signing key material. Only {@link Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519} is supported currently
4176
4180
  * @returns The new {@link WireE2eIdentity} object
4177
4181
  */
4178
- async newAcmeEnrollment(ciphersuite = Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519) {
4182
+ async newAcmeEnrollment(clientId, displayName, handle, expiryDays, ciphersuite = Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519) {
4179
4183
  if (ciphersuite !== Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519) {
4180
4184
  throw new Error("This ACME ciphersuite isn't supported. Only `Ciphersuite.MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519` is as of now");
4181
4185
  }
4182
- const e2ei = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").new_acme_enrollment(ciphersuite));
4186
+ const e2ei = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").new_acme_enrollment(clientId, displayName, handle, expiryDays, ciphersuite));
4183
4187
  return new WireE2eIdentity(e2ei);
4184
4188
  }
4189
+ /**
4190
+ * Parses the ACME server response from the endpoint fetching x509 certificates and uses it to initialize the MLS client with a certificate
4191
+ *
4192
+ * @param e2ei - the enrollment instance used to fetch the certificates
4193
+ * @param certificateChain - the raw response from ACME server
4194
+ */
4195
+ async e2eiMlsInit(e2ei, certificateChain) {
4196
+ return await __classPrivateFieldGet(this, _CoreCrypto_cc, "f").e2ei_mls_init(e2ei.inner(), certificateChain);
4197
+ }
4185
4198
  /**
4186
4199
  * Returns the current version of {@link CoreCrypto}
4187
4200
  *
@@ -4209,6 +4222,12 @@ class WireE2eIdentity {
4209
4222
  free() {
4210
4223
  __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").free();
4211
4224
  }
4225
+ /**
4226
+ * Should only be used internally
4227
+ */
4228
+ inner() {
4229
+ return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f");
4230
+ }
4212
4231
  /**
4213
4232
  * Parses the response from `GET /acme/{provisioner-name}/directory`.
4214
4233
  * Use this {@link AcmeDirectory} in the next step to fetch the first nonce from the acme server. Use
@@ -4229,13 +4248,12 @@ class WireE2eIdentity {
4229
4248
  * For creating a new acme account. This returns a signed JWS-alike request body to send to
4230
4249
  * `POST /acme/{provisioner-name}/new-account`.
4231
4250
  *
4232
- * @param directory you got from {@link directoryResponse}
4233
4251
  * @param previousNonce you got from calling `HEAD {@link AcmeDirectory.newNonce}`
4234
4252
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.3
4235
4253
  */
4236
- newAccountRequest(directory, previousNonce) {
4254
+ newAccountRequest(previousNonce) {
4237
4255
  try {
4238
- return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_account_request(directory, previousNonce);
4256
+ return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_account_request(previousNonce);
4239
4257
  }
4240
4258
  catch (e) {
4241
4259
  throw CoreCryptoError.fromStdError(e);
@@ -4257,18 +4275,12 @@ class WireE2eIdentity {
4257
4275
  /**
4258
4276
  * Creates a new acme order for the handle (userId + display name) and the clientId.
4259
4277
  *
4260
- * @param displayName human readable name displayed in the application e.g. `Smith, Alice M (QA)`
4261
- * @param clientId client identifier with user b64Url encoded & clientId hex encoded e.g. `NDUyMGUyMmY2YjA3NGU3NjkyZjE1NjJjZTAwMmQ2NTQ:6add501bacd1d90e@example.com`
4262
- * @param handle user handle e.g. `alice.smith.qa@example.com`
4263
- * @param expiryDays generated x509 certificate expiry
4264
- * @param directory you got from {@link directoryResponse}
4265
- * @param account you got from {@link newAccountResponse}
4266
4278
  * @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/new-account`
4267
4279
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
4268
4280
  */
4269
- newOrderRequest(displayName, clientId, handle, expiryDays, directory, account, previousNonce) {
4281
+ newOrderRequest(previousNonce) {
4270
4282
  try {
4271
- return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_order_request(displayName, clientId, handle, expiryDays, directory, account, previousNonce);
4283
+ return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_order_request(previousNonce);
4272
4284
  }
4273
4285
  catch (e) {
4274
4286
  throw CoreCryptoError.fromStdError(e);
@@ -4292,14 +4304,13 @@ class WireE2eIdentity {
4292
4304
  * Creates a new authorization request.
4293
4305
  *
4294
4306
  * @param url one of the URL in new order's authorizations (use {@link NewAcmeOrder.authorizations} from {@link newOrderResponse})
4295
- * @param account you got from {@link newAccountResponse}
4296
4307
  * @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/new-order` (or from the
4297
4308
  * previous to this method if you are creating the second authorization)
4298
4309
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5
4299
4310
  */
4300
- newAuthzRequest(url, account, previousNonce) {
4311
+ newAuthzRequest(url, previousNonce) {
4301
4312
  try {
4302
- return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_authz_request(url, account, previousNonce);
4313
+ return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_authz_request(url, previousNonce);
4303
4314
  }
4304
4315
  catch (e) {
4305
4316
  throw CoreCryptoError.fromStdError(e);
@@ -4328,14 +4339,11 @@ class WireE2eIdentity {
4328
4339
  * {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token} on wire-server.
4329
4340
  *
4330
4341
  * @param accessTokenUrl backend endpoint where this token will be sent. Should be this one {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token}
4331
- * @param clientId client identifier with user b64Url encoded & clientId hex encoded e.g. `NDUyMGUyMmY2YjA3NGU3NjkyZjE1NjJjZTAwMmQ2NTQ:6add501bacd1d90e@example.com`
4332
- * @param dpopChallenge you found after {@link newAuthzResponse}
4333
4342
  * @param backendNonce you get by calling `GET /clients/token/nonce` on wire-server as defined here {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/get_clients__client__nonce}
4334
- * @param expiryDays token expiry in days
4335
4343
  */
4336
- createDpopToken(accessTokenUrl, clientId, dpopChallenge, backendNonce, expiryDays) {
4344
+ createDpopToken(accessTokenUrl, backendNonce) {
4337
4345
  try {
4338
- return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").create_dpop_token(accessTokenUrl, clientId, dpopChallenge, backendNonce, expiryDays);
4346
+ return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").create_dpop_token(accessTokenUrl, backendNonce);
4339
4347
  }
4340
4348
  catch (e) {
4341
4349
  throw CoreCryptoError.fromStdError(e);
@@ -4345,14 +4353,12 @@ class WireE2eIdentity {
4345
4353
  * Creates a new challenge request for Wire Dpop challenge.
4346
4354
  *
4347
4355
  * @param accessToken returned by wire-server from https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token
4348
- * @param dpopChallenge you found after {@link newAuthzResponse}
4349
- * @param account you found after {@link newAccountResponse}
4350
4356
  * @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
4351
4357
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
4352
4358
  */
4353
- newDpopChallengeRequest(accessToken, dpopChallenge, account, previousNonce) {
4359
+ newDpopChallengeRequest(accessToken, previousNonce) {
4354
4360
  try {
4355
- return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_dpop_challenge_request(accessToken, dpopChallenge, account, previousNonce);
4361
+ return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_dpop_challenge_request(accessToken, previousNonce);
4356
4362
  }
4357
4363
  catch (e) {
4358
4364
  throw CoreCryptoError.fromStdError(e);
@@ -4362,14 +4368,12 @@ class WireE2eIdentity {
4362
4368
  * Creates a new challenge request for Wire Oidc challenge.
4363
4369
  *
4364
4370
  * @param idToken you get back from Identity Provider
4365
- * @param oidcChallenge you found after {@link newAuthzResponse}
4366
- * @param account you found after {@link newAccountResponse}
4367
4371
  * @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
4368
4372
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
4369
4373
  */
4370
- newOidcChallengeRequest(idToken, oidcChallenge, account, previousNonce) {
4374
+ newOidcChallengeRequest(idToken, previousNonce) {
4371
4375
  try {
4372
- return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_oidc_challenge_request(idToken, oidcChallenge, account, previousNonce);
4376
+ return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").new_oidc_challenge_request(idToken, previousNonce);
4373
4377
  }
4374
4378
  catch (e) {
4375
4379
  throw CoreCryptoError.fromStdError(e);
@@ -4397,9 +4401,9 @@ class WireE2eIdentity {
4397
4401
  * @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/challenge/{challenge-id}`
4398
4402
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
4399
4403
  */
4400
- checkOrderRequest(orderUrl, account, previousNonce) {
4404
+ checkOrderRequest(orderUrl, previousNonce) {
4401
4405
  try {
4402
- return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").check_order_request(orderUrl, account, previousNonce);
4406
+ return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").check_order_request(orderUrl, previousNonce);
4403
4407
  }
4404
4408
  catch (e) {
4405
4409
  throw CoreCryptoError.fromStdError(e);
@@ -4423,13 +4427,12 @@ class WireE2eIdentity {
4423
4427
  * Final step before fetching the certificate.
4424
4428
  *
4425
4429
  * @param order - order you got from {@link checkOrderResponse}
4426
- * @param account - account you found after {@link newAccountResponse}
4427
4430
  * @param previousNonce - `replay-nonce` response header from `POST /acme/{provisioner-name}/order/{order-id}`
4428
4431
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
4429
4432
  */
4430
- finalizeRequest(order, account, previousNonce) {
4433
+ finalizeRequest(previousNonce) {
4431
4434
  try {
4432
- return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").finalize_request(order, account, previousNonce);
4435
+ return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").finalize_request(previousNonce);
4433
4436
  }
4434
4437
  catch (e) {
4435
4438
  throw CoreCryptoError.fromStdError(e);
@@ -4452,28 +4455,12 @@ class WireE2eIdentity {
4452
4455
  /**
4453
4456
  * Creates a request for finally fetching the x509 certificate.
4454
4457
  *
4455
- * @param finalize you got from {@link finalizeResponse}
4456
- * @param account you got from {@link newAccountResponse}
4457
4458
  * @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/order/{order-id}/finalize`
4458
4459
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4.2
4459
4460
  */
4460
- certificateRequest(finalize, account, previousNonce) {
4461
- try {
4462
- return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").certificate_request(finalize, account, previousNonce);
4463
- }
4464
- catch (e) {
4465
- throw CoreCryptoError.fromStdError(e);
4466
- }
4467
- }
4468
- /**
4469
- * Parses the response from `POST /acme/{provisioner-name}/certificate/{certificate-id}`.
4470
- *
4471
- * @param certificateChain HTTP string response body
4472
- * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4.2
4473
- */
4474
- certificateResponse(certificateChain) {
4461
+ certificateRequest(previousNonce) {
4475
4462
  try {
4476
- return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").certificate_response(certificateChain);
4463
+ return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").certificate_request(previousNonce);
4477
4464
  }
4478
4465
  catch (e) {
4479
4466
  throw CoreCryptoError.fromStdError(e);