@wireapp/core-crypto 0.7.0 → 0.8.1
Sign up to get free protection for your applications and to get access to all the features.
package/package.json
CHANGED
@@ -1,10 +1,10 @@
|
|
1
1
|
{
|
2
2
|
"name": "@wireapp/core-crypto",
|
3
|
-
"version": "0.
|
3
|
+
"version": "0.8.1",
|
4
4
|
"description": "CoreCrypto bindings for the Web",
|
5
5
|
"type": "module",
|
6
6
|
"module": "platforms/web/corecrypto.js",
|
7
|
-
"types": "platforms/web/corecrypto.d.
|
7
|
+
"types": "platforms/web/corecrypto.d.ts",
|
8
8
|
"scripts": {
|
9
9
|
"prepare": "npm run build",
|
10
10
|
"build": "npm run clean && rollup -c crypto-ffi/bindings/js/rollup.config.js",
|
Binary file
|
@@ -1056,9 +1056,10 @@ export declare class WireE2eIdentity {
|
|
1056
1056
|
* {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token} on wire-server.
|
1057
1057
|
*
|
1058
1058
|
* @param accessTokenUrl backend endpoint where this token will be sent. Should be this one {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token}
|
1059
|
+
* @param expirySecs of the client Dpop JWT. This should be equal to the grace period set in Team Management
|
1059
1060
|
* @param backendNonce you get by calling `GET /clients/token/nonce` on wire-server as defined here {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/get_clients__client__nonce}
|
1060
1061
|
*/
|
1061
|
-
createDpopToken(accessTokenUrl: string, backendNonce: string): Uint8Array;
|
1062
|
+
createDpopToken(accessTokenUrl: string, expirySecs: number, backendNonce: string): Uint8Array;
|
1062
1063
|
/**
|
1063
1064
|
* Creates a new challenge request for Wire Dpop challenge.
|
1064
1065
|
*
|
@@ -226,12 +226,12 @@ function makeMutClosure(arg0, arg1, dtor, f) {
|
|
226
226
|
return real;
|
227
227
|
}
|
228
228
|
function __wbg_adapter_52(arg0, arg1, arg2) {
|
229
|
-
wasm$1.
|
229
|
+
wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h56c36d723a01191f(arg0, arg1, addHeapObject(arg2));
|
230
230
|
}
|
231
231
|
function __wbg_adapter_55(arg0, arg1, arg2) {
|
232
232
|
try {
|
233
233
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
234
|
-
wasm$1.
|
234
|
+
wasm$1._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__hdcf886fad5e08d14(retptr, arg0, arg1, addHeapObject(arg2));
|
235
235
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
236
236
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
237
237
|
if (r1) {
|
@@ -282,7 +282,7 @@ function handleError(f, args) {
|
|
282
282
|
}
|
283
283
|
}
|
284
284
|
function __wbg_adapter_285(arg0, arg1, arg2, arg3) {
|
285
|
-
wasm$1.
|
285
|
+
wasm$1.wasm_bindgen__convert__closures__invoke2_mut__h1ca1c588492035e5(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
|
286
286
|
}
|
287
287
|
/**
|
288
288
|
* see [core_crypto::prelude::MlsWirePolicy]
|
@@ -581,6 +581,41 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
581
581
|
wasm$1.__wbg_corecrypto_free(ptr);
|
582
582
|
}
|
583
583
|
/**
|
584
|
+
* Returns: [`WasmCryptoResult<WireE2eIdentity>`]
|
585
|
+
*
|
586
|
+
* see [core_crypto::mls::MlsCentral::new_acme_enrollment]
|
587
|
+
* @param {string} client_id
|
588
|
+
* @param {string} display_name
|
589
|
+
* @param {string} handle
|
590
|
+
* @param {number} expiry_days
|
591
|
+
* @param {number} ciphersuite
|
592
|
+
* @returns {Promise<any>}
|
593
|
+
*/
|
594
|
+
new_acme_enrollment(client_id, display_name, handle, expiry_days, ciphersuite) {
|
595
|
+
const ptr0 = passStringToWasm0(client_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
596
|
+
const len0 = WASM_VECTOR_LEN;
|
597
|
+
const ptr1 = passStringToWasm0(display_name, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
598
|
+
const len1 = WASM_VECTOR_LEN;
|
599
|
+
const ptr2 = passStringToWasm0(handle, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
600
|
+
const len2 = WASM_VECTOR_LEN;
|
601
|
+
const ret = wasm$1.corecrypto_new_acme_enrollment(this.ptr, ptr0, len0, ptr1, len1, ptr2, len2, expiry_days, ciphersuite);
|
602
|
+
return takeObject(ret);
|
603
|
+
}
|
604
|
+
/**
|
605
|
+
* see [core_crypto::mls::MlsCentral::e2ei_mls_init]
|
606
|
+
* @param {FfiWireE2EIdentity} e2ei
|
607
|
+
* @param {string} certificate_chain
|
608
|
+
* @returns {Promise<any>}
|
609
|
+
*/
|
610
|
+
e2ei_mls_init(e2ei, certificate_chain) {
|
611
|
+
_assertClass(e2ei, FfiWireE2EIdentity);
|
612
|
+
var ptr0 = e2ei.__destroy_into_raw();
|
613
|
+
const ptr1 = passStringToWasm0(certificate_chain, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
614
|
+
const len1 = WASM_VECTOR_LEN;
|
615
|
+
const ret = wasm$1.corecrypto_e2ei_mls_init(this.ptr, ptr0, ptr1, len1);
|
616
|
+
return takeObject(ret);
|
617
|
+
}
|
618
|
+
/**
|
584
619
|
* Returns the current version of CoreCrypto
|
585
620
|
* @returns {string}
|
586
621
|
*/
|
@@ -1410,41 +1445,6 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1410
1445
|
const ret = wasm$1.corecrypto_get_client_ids(this.ptr, ptr0, len0);
|
1411
1446
|
return takeObject(ret);
|
1412
1447
|
}
|
1413
|
-
/**
|
1414
|
-
* Returns: [`WasmCryptoResult<WireE2eIdentity>`]
|
1415
|
-
*
|
1416
|
-
* see [core_crypto::mls::MlsCentral::new_acme_enrollment]
|
1417
|
-
* @param {string} client_id
|
1418
|
-
* @param {string} display_name
|
1419
|
-
* @param {string} handle
|
1420
|
-
* @param {number} expiry_days
|
1421
|
-
* @param {number} ciphersuite
|
1422
|
-
* @returns {Promise<any>}
|
1423
|
-
*/
|
1424
|
-
new_acme_enrollment(client_id, display_name, handle, expiry_days, ciphersuite) {
|
1425
|
-
const ptr0 = passStringToWasm0(client_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1426
|
-
const len0 = WASM_VECTOR_LEN;
|
1427
|
-
const ptr1 = passStringToWasm0(display_name, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1428
|
-
const len1 = WASM_VECTOR_LEN;
|
1429
|
-
const ptr2 = passStringToWasm0(handle, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1430
|
-
const len2 = WASM_VECTOR_LEN;
|
1431
|
-
const ret = wasm$1.corecrypto_new_acme_enrollment(this.ptr, ptr0, len0, ptr1, len1, ptr2, len2, expiry_days, ciphersuite);
|
1432
|
-
return takeObject(ret);
|
1433
|
-
}
|
1434
|
-
/**
|
1435
|
-
* see [core_crypto::mls::MlsCentral::e2ei_mls_init]
|
1436
|
-
* @param {FfiWireE2EIdentity} e2ei
|
1437
|
-
* @param {string} certificate_chain
|
1438
|
-
* @returns {Promise<any>}
|
1439
|
-
*/
|
1440
|
-
e2ei_mls_init(e2ei, certificate_chain) {
|
1441
|
-
_assertClass(e2ei, FfiWireE2EIdentity);
|
1442
|
-
var ptr0 = e2ei.__destroy_into_raw();
|
1443
|
-
const ptr1 = passStringToWasm0(certificate_chain, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1444
|
-
const len1 = WASM_VECTOR_LEN;
|
1445
|
-
const ret = wasm$1.corecrypto_e2ei_mls_init(this.ptr, ptr0, ptr1, len1);
|
1446
|
-
return takeObject(ret);
|
1447
|
-
}
|
1448
1448
|
};
|
1449
1449
|
/**
|
1450
1450
|
* see [core_crypto::prelude::CoreCryptoCallbacks]
|
@@ -1751,17 +1751,18 @@ class FfiWireE2EIdentity {
|
|
1751
1751
|
/**
|
1752
1752
|
* See [core_crypto::e2e_identity::WireE2eIdentity::create_dpop_token]
|
1753
1753
|
* @param {string} access_token_url
|
1754
|
+
* @param {number} expiry_secs
|
1754
1755
|
* @param {string} backend_nonce
|
1755
1756
|
* @returns {Uint8Array}
|
1756
1757
|
*/
|
1757
|
-
create_dpop_token(access_token_url, backend_nonce) {
|
1758
|
+
create_dpop_token(access_token_url, expiry_secs, backend_nonce) {
|
1758
1759
|
try {
|
1759
1760
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1760
1761
|
const ptr0 = passStringToWasm0(access_token_url, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1761
1762
|
const len0 = WASM_VECTOR_LEN;
|
1762
1763
|
const ptr1 = passStringToWasm0(backend_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
1763
1764
|
const len1 = WASM_VECTOR_LEN;
|
1764
|
-
wasm$1.ffiwiree2eidentity_create_dpop_token(retptr, this.ptr, ptr0, len0, ptr1, len1);
|
1765
|
+
wasm$1.ffiwiree2eidentity_create_dpop_token(retptr, this.ptr, ptr0, len0, expiry_secs, ptr1, len1);
|
1765
1766
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1766
1767
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1767
1768
|
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
@@ -2430,14 +2431,14 @@ function getImports() {
|
|
2430
2431
|
const ret = getObject(arg0);
|
2431
2432
|
return addHeapObject(ret);
|
2432
2433
|
};
|
2433
|
-
imports.wbg.__wbindgen_object_drop_ref = function (arg0) {
|
2434
|
-
takeObject(arg0);
|
2435
|
-
};
|
2436
2434
|
imports.wbg.__wbindgen_is_object = function (arg0) {
|
2437
2435
|
const val = getObject(arg0);
|
2438
2436
|
const ret = typeof (val) === 'object' && val !== null;
|
2439
2437
|
return ret;
|
2440
2438
|
};
|
2439
|
+
imports.wbg.__wbindgen_object_drop_ref = function (arg0) {
|
2440
|
+
takeObject(arg0);
|
2441
|
+
};
|
2441
2442
|
imports.wbg.__wbg_getwithrefkey_5e6d9547403deab8 = function (arg0, arg1) {
|
2442
2443
|
const ret = getObject(arg0)[getObject(arg1)];
|
2443
2444
|
return addHeapObject(ret);
|
@@ -2478,18 +2479,26 @@ function getImports() {
|
|
2478
2479
|
const ret = getObject(arg0).length;
|
2479
2480
|
return ret;
|
2480
2481
|
};
|
2481
|
-
imports.wbg.__wbindgen_number_new = function (arg0) {
|
2482
|
-
const ret = arg0;
|
2483
|
-
return addHeapObject(ret);
|
2484
|
-
};
|
2485
2482
|
imports.wbg.__wbg_call_9495de66fdbe016b = function () {
|
2486
2483
|
return handleError(function (arg0, arg1, arg2) {
|
2487
2484
|
const ret = getObject(arg0).call(getObject(arg1), getObject(arg2));
|
2488
2485
|
return addHeapObject(ret);
|
2489
2486
|
}, arguments);
|
2490
2487
|
};
|
2491
|
-
imports.wbg.
|
2492
|
-
const ret = new
|
2488
|
+
imports.wbg.__wbg_new_537b7341ce90bb31 = function (arg0) {
|
2489
|
+
const ret = new Uint8Array(getObject(arg0));
|
2490
|
+
return addHeapObject(ret);
|
2491
|
+
};
|
2492
|
+
imports.wbg.__wbindgen_bigint_from_u64 = function (arg0) {
|
2493
|
+
const ret = BigInt.asUintN(64, arg0);
|
2494
|
+
return addHeapObject(ret);
|
2495
|
+
};
|
2496
|
+
imports.wbg.__wbg_new_f841cc6f2098f4b5 = function () {
|
2497
|
+
const ret = new Map();
|
2498
|
+
return addHeapObject(ret);
|
2499
|
+
};
|
2500
|
+
imports.wbg.__wbg_set_388c4c6422704173 = function (arg0, arg1, arg2) {
|
2501
|
+
const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
|
2493
2502
|
return addHeapObject(ret);
|
2494
2503
|
};
|
2495
2504
|
imports.wbg.__wbg_new_9d3a9ce4282a18a8 = function (arg0, arg1) {
|
@@ -2512,8 +2521,12 @@ function getImports() {
|
|
2512
2521
|
state0.a = state0.b = 0;
|
2513
2522
|
}
|
2514
2523
|
};
|
2515
|
-
imports.wbg.
|
2516
|
-
const ret =
|
2524
|
+
imports.wbg.__wbg_proteusautoprekeybundle_new = function (arg0) {
|
2525
|
+
const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
|
2526
|
+
return addHeapObject(ret);
|
2527
|
+
};
|
2528
|
+
imports.wbg.__wbindgen_number_new = function (arg0) {
|
2529
|
+
const ret = arg0;
|
2517
2530
|
return addHeapObject(ret);
|
2518
2531
|
};
|
2519
2532
|
imports.wbg.__wbg_new_b525de17f44a8943 = function () {
|
@@ -2524,24 +2537,12 @@ function getImports() {
|
|
2524
2537
|
const ret = getObject(arg0).push(getObject(arg1));
|
2525
2538
|
return ret;
|
2526
2539
|
};
|
2527
|
-
imports.wbg.__wbg_new_f841cc6f2098f4b5 = function () {
|
2528
|
-
const ret = new Map();
|
2529
|
-
return addHeapObject(ret);
|
2530
|
-
};
|
2531
|
-
imports.wbg.__wbg_set_388c4c6422704173 = function (arg0, arg1, arg2) {
|
2532
|
-
const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
|
2533
|
-
return addHeapObject(ret);
|
2534
|
-
};
|
2535
|
-
imports.wbg.__wbindgen_bigint_from_u64 = function (arg0) {
|
2536
|
-
const ret = BigInt.asUintN(64, arg0);
|
2537
|
-
return addHeapObject(ret);
|
2538
|
-
};
|
2539
2540
|
imports.wbg.__wbg_ffiwiree2eidentity_new = function (arg0) {
|
2540
2541
|
const ret = FfiWireE2EIdentity.__wrap(arg0);
|
2541
2542
|
return addHeapObject(ret);
|
2542
2543
|
};
|
2543
|
-
imports.wbg.
|
2544
|
-
const ret =
|
2544
|
+
imports.wbg.__wbg_new_f9876326328f45ed = function () {
|
2545
|
+
const ret = new Object();
|
2545
2546
|
return addHeapObject(ret);
|
2546
2547
|
};
|
2547
2548
|
imports.wbg.__wbg_setonsuccess_925a7718d3f62bc1 = function (arg0, arg1) {
|
@@ -3135,12 +3136,12 @@ function getImports() {
|
|
3135
3136
|
return addHeapObject(ret);
|
3136
3137
|
}, arguments);
|
3137
3138
|
};
|
3138
|
-
imports.wbg.
|
3139
|
-
const ret = makeMutClosure(arg0, arg1,
|
3139
|
+
imports.wbg.__wbindgen_closure_wrapper1540 = function (arg0, arg1, arg2) {
|
3140
|
+
const ret = makeMutClosure(arg0, arg1, 158, __wbg_adapter_52);
|
3140
3141
|
return addHeapObject(ret);
|
3141
3142
|
};
|
3142
|
-
imports.wbg.
|
3143
|
-
const ret = makeMutClosure(arg0, arg1,
|
3143
|
+
imports.wbg.__wbindgen_closure_wrapper4618 = function (arg0, arg1, arg2) {
|
3144
|
+
const ret = makeMutClosure(arg0, arg1, 158, __wbg_adapter_55);
|
3144
3145
|
return addHeapObject(ret);
|
3145
3146
|
};
|
3146
3147
|
return imports;
|
@@ -3201,7 +3202,7 @@ var exports = /*#__PURE__*/Object.freeze({
|
|
3201
3202
|
var wasm = async (opt = {}) => {
|
3202
3203
|
let {importHook, serverPath} = opt;
|
3203
3204
|
|
3204
|
-
let path = "assets/core_crypto_ffi-
|
3205
|
+
let path = "assets/core_crypto_ffi-db9a9765.wasm";
|
3205
3206
|
|
3206
3207
|
if (serverPath != null) {
|
3207
3208
|
path = serverPath + /[^\/\\]*$/.exec(path)[0];
|
@@ -4339,11 +4340,12 @@ class WireE2eIdentity {
|
|
4339
4340
|
* {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token} on wire-server.
|
4340
4341
|
*
|
4341
4342
|
* @param accessTokenUrl backend endpoint where this token will be sent. Should be this one {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/post_clients__cid__access_token}
|
4343
|
+
* @param expirySecs of the client Dpop JWT. This should be equal to the grace period set in Team Management
|
4342
4344
|
* @param backendNonce you get by calling `GET /clients/token/nonce` on wire-server as defined here {@link https://staging-nginz-https.zinfra.io/api/swagger-ui/#/default/get_clients__client__nonce}
|
4343
4345
|
*/
|
4344
|
-
createDpopToken(accessTokenUrl, backendNonce) {
|
4346
|
+
createDpopToken(accessTokenUrl, expirySecs, backendNonce) {
|
4345
4347
|
try {
|
4346
|
-
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").create_dpop_token(accessTokenUrl, backendNonce);
|
4348
|
+
return __classPrivateFieldGet(this, _WireE2eIdentity_e2ei, "f").create_dpop_token(accessTokenUrl, expirySecs, backendNonce);
|
4347
4349
|
}
|
4348
4350
|
catch (e) {
|
4349
4351
|
throw CoreCryptoError.fromStdError(e);
|
Binary file
|