@wireapp/core-crypto 1.0.0-rc.1 → 1.0.0-rc.10
Sign up to get free protection for your applications and to get access to all the features.
@@ -234,12 +234,12 @@ function makeMutClosure(arg0, arg1, dtor, f) {
|
|
234
234
|
return real;
|
235
235
|
}
|
236
236
|
function __wbg_adapter_52(arg0, arg1, arg2) {
|
237
|
-
wasm$1.
|
237
|
+
wasm$1.wasm_bindgen__convert__closures__invoke1_mut__hdb6540dbb26cf63b(arg0, arg1, addHeapObject(arg2));
|
238
238
|
}
|
239
239
|
function __wbg_adapter_55(arg0, arg1, arg2) {
|
240
240
|
try {
|
241
241
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
242
|
-
wasm$1.
|
242
|
+
wasm$1.wasm_bindgen__convert__closures__invoke1_mut__h3c15a82f614455aa(retptr, arg0, arg1, addHeapObject(arg2));
|
243
243
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
244
244
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
245
245
|
if (r1) {
|
@@ -313,8 +313,8 @@ function handleError(f, args) {
|
|
313
313
|
wasm$1.__wbindgen_exn_store(addHeapObject(e));
|
314
314
|
}
|
315
315
|
}
|
316
|
-
function
|
317
|
-
wasm$1.
|
316
|
+
function __wbg_adapter_312(arg0, arg1, arg2, arg3) {
|
317
|
+
wasm$1.wasm_bindgen__convert__closures__invoke2_mut__h5286c52f12e3fed2(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
|
318
318
|
}
|
319
319
|
/**
|
320
320
|
* see [core_crypto::prelude::MlsWirePolicy]
|
@@ -481,15 +481,18 @@ class AcmeDirectory {
|
|
481
481
|
* @param {string} new_nonce
|
482
482
|
* @param {string} new_account
|
483
483
|
* @param {string} new_order
|
484
|
+
* @param {string} revoke_cert
|
484
485
|
*/
|
485
|
-
constructor(new_nonce, new_account, new_order) {
|
486
|
+
constructor(new_nonce, new_account, new_order, revoke_cert) {
|
486
487
|
const ptr0 = passStringToWasm0(new_nonce, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
487
488
|
const len0 = WASM_VECTOR_LEN;
|
488
489
|
const ptr1 = passStringToWasm0(new_account, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
489
490
|
const len1 = WASM_VECTOR_LEN;
|
490
491
|
const ptr2 = passStringToWasm0(new_order, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
491
492
|
const len2 = WASM_VECTOR_LEN;
|
492
|
-
const
|
493
|
+
const ptr3 = passStringToWasm0(revoke_cert, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
494
|
+
const len3 = WASM_VECTOR_LEN;
|
495
|
+
const ret = wasm$1.acmedirectory_new(ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3);
|
493
496
|
return AcmeDirectory.__wrap(ret);
|
494
497
|
}
|
495
498
|
/**
|
@@ -552,6 +555,103 @@ class AcmeDirectory {
|
|
552
555
|
wasm$1.__wbindgen_free(deferred1_0, deferred1_1, 1);
|
553
556
|
}
|
554
557
|
}
|
558
|
+
/**
|
559
|
+
* @returns {string}
|
560
|
+
*/
|
561
|
+
get revokeCert() {
|
562
|
+
let deferred1_0;
|
563
|
+
let deferred1_1;
|
564
|
+
try {
|
565
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
566
|
+
wasm$1.acmedirectory_revokeCert(retptr, this.__wbg_ptr);
|
567
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
568
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
569
|
+
deferred1_0 = r0;
|
570
|
+
deferred1_1 = r1;
|
571
|
+
return getStringFromWasm0(r0, r1);
|
572
|
+
}
|
573
|
+
finally {
|
574
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
575
|
+
wasm$1.__wbindgen_free(deferred1_0, deferred1_1, 1);
|
576
|
+
}
|
577
|
+
}
|
578
|
+
}
|
579
|
+
/**
|
580
|
+
* to avoid recursion
|
581
|
+
*/
|
582
|
+
class BufferedDecryptedMessage {
|
583
|
+
static __wrap(ptr) {
|
584
|
+
ptr = ptr >>> 0;
|
585
|
+
const obj = Object.create(BufferedDecryptedMessage.prototype);
|
586
|
+
obj.__wbg_ptr = ptr;
|
587
|
+
return obj;
|
588
|
+
}
|
589
|
+
__destroy_into_raw() {
|
590
|
+
const ptr = this.__wbg_ptr;
|
591
|
+
this.__wbg_ptr = 0;
|
592
|
+
return ptr;
|
593
|
+
}
|
594
|
+
free() {
|
595
|
+
const ptr = this.__destroy_into_raw();
|
596
|
+
wasm$1.__wbg_buffereddecryptedmessage_free(ptr);
|
597
|
+
}
|
598
|
+
/**
|
599
|
+
* @returns {any}
|
600
|
+
*/
|
601
|
+
get message() {
|
602
|
+
const ret = wasm$1.buffereddecryptedmessage_message(this.__wbg_ptr);
|
603
|
+
return takeObject(ret);
|
604
|
+
}
|
605
|
+
/**
|
606
|
+
* @returns {Array<any>}
|
607
|
+
*/
|
608
|
+
get proposals() {
|
609
|
+
const ret = wasm$1.buffereddecryptedmessage_proposals(this.__wbg_ptr);
|
610
|
+
return takeObject(ret);
|
611
|
+
}
|
612
|
+
/**
|
613
|
+
* @returns {boolean}
|
614
|
+
*/
|
615
|
+
get is_active() {
|
616
|
+
const ret = wasm$1.buffereddecryptedmessage_is_active(this.__wbg_ptr);
|
617
|
+
return ret !== 0;
|
618
|
+
}
|
619
|
+
/**
|
620
|
+
* @returns {number | undefined}
|
621
|
+
*/
|
622
|
+
get commit_delay() {
|
623
|
+
try {
|
624
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
625
|
+
wasm$1.buffereddecryptedmessage_commit_delay(retptr, this.__wbg_ptr);
|
626
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
627
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
628
|
+
return r0 === 0 ? undefined : r1 >>> 0;
|
629
|
+
}
|
630
|
+
finally {
|
631
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
632
|
+
}
|
633
|
+
}
|
634
|
+
/**
|
635
|
+
* @returns {any}
|
636
|
+
*/
|
637
|
+
get sender_client_id() {
|
638
|
+
const ret = wasm$1.buffereddecryptedmessage_sender_client_id(this.__wbg_ptr);
|
639
|
+
return takeObject(ret);
|
640
|
+
}
|
641
|
+
/**
|
642
|
+
* @returns {boolean}
|
643
|
+
*/
|
644
|
+
get has_epoch_changed() {
|
645
|
+
const ret = wasm$1.buffereddecryptedmessage_has_epoch_changed(this.__wbg_ptr);
|
646
|
+
return ret !== 0;
|
647
|
+
}
|
648
|
+
/**
|
649
|
+
* @returns {WireIdentity | undefined}
|
650
|
+
*/
|
651
|
+
get identity() {
|
652
|
+
const ret = wasm$1.buffereddecryptedmessage_identity(this.__wbg_ptr);
|
653
|
+
return ret === 0 ? undefined : WireIdentity.__wrap(ret);
|
654
|
+
}
|
555
655
|
}
|
556
656
|
/**
|
557
657
|
*/
|
@@ -617,12 +717,25 @@ class ConversationConfiguration {
|
|
617
717
|
* @param {(Uint8Array)[] | undefined} external_senders
|
618
718
|
* @param {number | undefined} key_rotation_span
|
619
719
|
* @param {number | undefined} wire_policy
|
720
|
+
* @param {Array<any>} per_domain_trust_anchors
|
620
721
|
*/
|
621
|
-
constructor(ciphersuite, external_senders, key_rotation_span, wire_policy) {
|
622
|
-
|
623
|
-
|
624
|
-
|
625
|
-
|
722
|
+
constructor(ciphersuite, external_senders, key_rotation_span, wire_policy, per_domain_trust_anchors) {
|
723
|
+
try {
|
724
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
725
|
+
var ptr0 = isLikeNone(external_senders) ? 0 : passArrayJsValueToWasm0(external_senders, wasm$1.__wbindgen_malloc);
|
726
|
+
var len0 = WASM_VECTOR_LEN;
|
727
|
+
wasm$1.conversationconfiguration_new(retptr, isLikeNone(ciphersuite) ? 8 : ciphersuite, ptr0, len0, !isLikeNone(key_rotation_span), isLikeNone(key_rotation_span) ? 0 : key_rotation_span, isLikeNone(wire_policy) ? 3 : wire_policy, addHeapObject(per_domain_trust_anchors));
|
728
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
729
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
730
|
+
var r2 = getInt32Memory0()[retptr / 4 + 2];
|
731
|
+
if (r2) {
|
732
|
+
throw takeObject(r1);
|
733
|
+
}
|
734
|
+
return ConversationConfiguration.__wrap(r0);
|
735
|
+
}
|
736
|
+
finally {
|
737
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
738
|
+
}
|
626
739
|
}
|
627
740
|
}
|
628
741
|
/**
|
@@ -678,7 +791,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
678
791
|
wasm$1.__wbg_corecrypto_free(ptr);
|
679
792
|
}
|
680
793
|
/**
|
681
|
-
* Returns: [`WasmCryptoResult<
|
794
|
+
* Returns: [`WasmCryptoResult<E2eiEnrollment>`]
|
682
795
|
*
|
683
796
|
* see [core_crypto::mls::MlsCentral::e2ei_new_enrollment]
|
684
797
|
* @param {string} client_id
|
@@ -699,39 +812,45 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
699
812
|
return takeObject(ret);
|
700
813
|
}
|
701
814
|
/**
|
702
|
-
* Returns: [`WasmCryptoResult<
|
815
|
+
* Returns: [`WasmCryptoResult<E2eiEnrollment>`]
|
703
816
|
*
|
704
817
|
* see [core_crypto::mls::MlsCentral::e2ei_new_activation_enrollment]
|
818
|
+
* @param {string} client_id
|
705
819
|
* @param {string} display_name
|
706
820
|
* @param {string} handle
|
707
821
|
* @param {number} expiry_days
|
708
822
|
* @param {number} ciphersuite
|
709
823
|
* @returns {Promise<any>}
|
710
824
|
*/
|
711
|
-
e2ei_new_activation_enrollment(display_name, handle, expiry_days, ciphersuite) {
|
712
|
-
const ptr0 = passStringToWasm0(
|
825
|
+
e2ei_new_activation_enrollment(client_id, display_name, handle, expiry_days, ciphersuite) {
|
826
|
+
const ptr0 = passStringToWasm0(client_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
713
827
|
const len0 = WASM_VECTOR_LEN;
|
714
|
-
const ptr1 = passStringToWasm0(
|
828
|
+
const ptr1 = passStringToWasm0(display_name, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
715
829
|
const len1 = WASM_VECTOR_LEN;
|
716
|
-
const
|
830
|
+
const ptr2 = passStringToWasm0(handle, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
831
|
+
const len2 = WASM_VECTOR_LEN;
|
832
|
+
const ret = wasm$1.corecrypto_e2ei_new_activation_enrollment(this.__wbg_ptr, ptr0, len0, ptr1, len1, ptr2, len2, expiry_days, ciphersuite);
|
717
833
|
return takeObject(ret);
|
718
834
|
}
|
719
835
|
/**
|
720
|
-
* Returns: [`WasmCryptoResult<
|
836
|
+
* Returns: [`WasmCryptoResult<E2eiEnrollment>`]
|
721
837
|
*
|
722
838
|
* see [core_crypto::mls::MlsCentral::e2ei_new_rotate_enrollment]
|
839
|
+
* @param {string} client_id
|
723
840
|
* @param {string | undefined} display_name
|
724
841
|
* @param {string | undefined} handle
|
725
842
|
* @param {number} expiry_days
|
726
843
|
* @param {number} ciphersuite
|
727
844
|
* @returns {Promise<any>}
|
728
845
|
*/
|
729
|
-
e2ei_new_rotate_enrollment(display_name, handle, expiry_days, ciphersuite) {
|
730
|
-
|
731
|
-
|
732
|
-
var ptr1 = isLikeNone(
|
846
|
+
e2ei_new_rotate_enrollment(client_id, display_name, handle, expiry_days, ciphersuite) {
|
847
|
+
const ptr0 = passStringToWasm0(client_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
848
|
+
const len0 = WASM_VECTOR_LEN;
|
849
|
+
var ptr1 = isLikeNone(display_name) ? 0 : passStringToWasm0(display_name, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
733
850
|
var len1 = WASM_VECTOR_LEN;
|
734
|
-
|
851
|
+
var ptr2 = isLikeNone(handle) ? 0 : passStringToWasm0(handle, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
852
|
+
var len2 = WASM_VECTOR_LEN;
|
853
|
+
const ret = wasm$1.corecrypto_e2ei_new_rotate_enrollment(this.__wbg_ptr, ptr0, len0, ptr1, len1, ptr2, len2, expiry_days, ciphersuite);
|
735
854
|
return takeObject(ret);
|
736
855
|
}
|
737
856
|
/**
|
@@ -788,14 +907,41 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
788
907
|
/**
|
789
908
|
* Returns [`WasmCryptoResult<bool>`]
|
790
909
|
*
|
791
|
-
* see [core_crypto::mls::MlsCentral::
|
910
|
+
* see [core_crypto::mls::MlsCentral::e2ei_conversation_state]
|
911
|
+
* @param {Uint8Array} conversation_id
|
912
|
+
* @returns {Promise<any>}
|
913
|
+
*/
|
914
|
+
e2ei_conversation_state(conversation_id) {
|
915
|
+
const ptr0 = passArray8ToWasm0(conversation_id, wasm$1.__wbindgen_malloc);
|
916
|
+
const len0 = WASM_VECTOR_LEN;
|
917
|
+
const ret = wasm$1.corecrypto_e2ei_conversation_state(this.__wbg_ptr, ptr0, len0);
|
918
|
+
return takeObject(ret);
|
919
|
+
}
|
920
|
+
/**
|
921
|
+
* Returns [`WasmCryptoResult<bool>`]
|
922
|
+
*
|
923
|
+
* see [core_crypto::mls::MlsCentral::e2ei_is_enabled]
|
924
|
+
* @param {number} ciphersuite
|
925
|
+
* @returns {Promise<any>}
|
926
|
+
*/
|
927
|
+
e2ei_is_enabled(ciphersuite) {
|
928
|
+
const ret = wasm$1.corecrypto_e2ei_is_enabled(this.__wbg_ptr, ciphersuite);
|
929
|
+
return takeObject(ret);
|
930
|
+
}
|
931
|
+
/**
|
932
|
+
* Returns [`WasmCryptoResult<Vec<WireIdentity>>`]
|
933
|
+
*
|
934
|
+
* see [core_crypto::mls::MlsCentral::get_user_identities]
|
792
935
|
* @param {Uint8Array} conversation_id
|
936
|
+
* @param {(Uint8Array)[]} client_ids
|
793
937
|
* @returns {Promise<any>}
|
794
938
|
*/
|
795
|
-
|
939
|
+
get_user_identities(conversation_id, client_ids) {
|
796
940
|
const ptr0 = passArray8ToWasm0(conversation_id, wasm$1.__wbindgen_malloc);
|
797
941
|
const len0 = WASM_VECTOR_LEN;
|
798
|
-
const
|
942
|
+
const ptr1 = passArrayJsValueToWasm0(client_ids, wasm$1.__wbindgen_malloc);
|
943
|
+
const len1 = WASM_VECTOR_LEN;
|
944
|
+
const ret = wasm$1.corecrypto_get_user_identities(this.__wbg_ptr, ptr0, len0, ptr1, len1);
|
799
945
|
return takeObject(ret);
|
800
946
|
}
|
801
947
|
/**
|
@@ -1177,9 +1323,26 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1177
1323
|
return takeObject(ret);
|
1178
1324
|
}
|
1179
1325
|
/**
|
1326
|
+
* Returns: [`WasmCryptoResult<CommitBundle>`]
|
1327
|
+
*
|
1328
|
+
* see [core_crypto::mls::MlsCentral::update_trust_anchors_from_conversation]
|
1329
|
+
* @param {Uint8Array} conversation_id
|
1330
|
+
* @param {(string)[]} remove_domain_names
|
1331
|
+
* @param {Array<any>} add_trust_anchors
|
1332
|
+
* @returns {Promise<any>}
|
1333
|
+
*/
|
1334
|
+
update_trust_anchors_from_conversation(conversation_id, remove_domain_names, add_trust_anchors) {
|
1335
|
+
const ptr0 = passArray8ToWasm0(conversation_id, wasm$1.__wbindgen_malloc);
|
1336
|
+
const len0 = WASM_VECTOR_LEN;
|
1337
|
+
const ptr1 = passArrayJsValueToWasm0(remove_domain_names, wasm$1.__wbindgen_malloc);
|
1338
|
+
const len1 = WASM_VECTOR_LEN;
|
1339
|
+
const ret = wasm$1.corecrypto_update_trust_anchors_from_conversation(this.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(add_trust_anchors));
|
1340
|
+
return takeObject(ret);
|
1341
|
+
}
|
1342
|
+
/**
|
1180
1343
|
* Returns: [`WasmCryptoResult<js_sys::Uint8Array>`]
|
1181
1344
|
*
|
1182
|
-
* see [core_crypto::mls::MlsCentral::
|
1345
|
+
* see [core_crypto::mls::MlsCentral::new_add_proposal]
|
1183
1346
|
* @param {Uint8Array} conversation_id
|
1184
1347
|
* @param {Uint8Array} keypackage
|
1185
1348
|
* @returns {Promise<any>}
|
@@ -1195,7 +1358,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1195
1358
|
/**
|
1196
1359
|
* Returns: [`WasmCryptoResult<js_sys::Uint8Array>`]
|
1197
1360
|
*
|
1198
|
-
* see [core_crypto::mls::MlsCentral::
|
1361
|
+
* see [core_crypto::mls::MlsCentral::new_update_proposal]
|
1199
1362
|
* @param {Uint8Array} conversation_id
|
1200
1363
|
* @returns {Promise<any>}
|
1201
1364
|
*/
|
@@ -1208,7 +1371,7 @@ let CoreCrypto$1 = class CoreCrypto {
|
|
1208
1371
|
/**
|
1209
1372
|
* Returns: [`WasmCryptoResult<js_sys::Uint8Array>`]
|
1210
1373
|
*
|
1211
|
-
* see [core_crypto::mls::MlsCentral::
|
1374
|
+
* see [core_crypto::mls::MlsCentral::new_remove_proposal]
|
1212
1375
|
* @param {Uint8Array} conversation_id
|
1213
1376
|
* @param {Uint8Array} client_id
|
1214
1377
|
* @returns {Promise<any>}
|
@@ -1719,14 +1882,14 @@ class DecryptedMessage {
|
|
1719
1882
|
* @returns {any}
|
1720
1883
|
*/
|
1721
1884
|
get message() {
|
1722
|
-
const ret = wasm$1.
|
1885
|
+
const ret = wasm$1.buffereddecryptedmessage_message(this.__wbg_ptr);
|
1723
1886
|
return takeObject(ret);
|
1724
1887
|
}
|
1725
1888
|
/**
|
1726
1889
|
* @returns {Array<any>}
|
1727
1890
|
*/
|
1728
1891
|
get proposals() {
|
1729
|
-
const ret = wasm$1.
|
1892
|
+
const ret = wasm$1.buffereddecryptedmessage_proposals(this.__wbg_ptr);
|
1730
1893
|
return takeObject(ret);
|
1731
1894
|
}
|
1732
1895
|
/**
|
@@ -1742,7 +1905,7 @@ class DecryptedMessage {
|
|
1742
1905
|
get commit_delay() {
|
1743
1906
|
try {
|
1744
1907
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
1745
|
-
wasm$1.
|
1908
|
+
wasm$1.buffereddecryptedmessage_commit_delay(retptr, this.__wbg_ptr);
|
1746
1909
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
1747
1910
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
1748
1911
|
return r0 === 0 ? undefined : r1 >>> 0;
|
@@ -1755,7 +1918,7 @@ class DecryptedMessage {
|
|
1755
1918
|
* @returns {any}
|
1756
1919
|
*/
|
1757
1920
|
get sender_client_id() {
|
1758
|
-
const ret = wasm$1.
|
1921
|
+
const ret = wasm$1.buffereddecryptedmessage_sender_client_id(this.__wbg_ptr);
|
1759
1922
|
return takeObject(ret);
|
1760
1923
|
}
|
1761
1924
|
/**
|
@@ -1769,9 +1932,16 @@ class DecryptedMessage {
|
|
1769
1932
|
* @returns {WireIdentity | undefined}
|
1770
1933
|
*/
|
1771
1934
|
get identity() {
|
1772
|
-
const ret = wasm$1.
|
1935
|
+
const ret = wasm$1.buffereddecryptedmessage_identity(this.__wbg_ptr);
|
1773
1936
|
return ret === 0 ? undefined : WireIdentity.__wrap(ret);
|
1774
1937
|
}
|
1938
|
+
/**
|
1939
|
+
* @returns {Array<any> | undefined}
|
1940
|
+
*/
|
1941
|
+
get buffered_messages() {
|
1942
|
+
const ret = wasm$1.decryptedmessage_buffered_messages(this.__wbg_ptr);
|
1943
|
+
return takeObject(ret);
|
1944
|
+
}
|
1775
1945
|
}
|
1776
1946
|
/**
|
1777
1947
|
*/
|
@@ -2436,6 +2606,37 @@ class NewAcmeOrder {
|
|
2436
2606
|
}
|
2437
2607
|
/**
|
2438
2608
|
*/
|
2609
|
+
class PerDomainTrustAnchor {
|
2610
|
+
static __wrap(ptr) {
|
2611
|
+
ptr = ptr >>> 0;
|
2612
|
+
const obj = Object.create(PerDomainTrustAnchor.prototype);
|
2613
|
+
obj.__wbg_ptr = ptr;
|
2614
|
+
return obj;
|
2615
|
+
}
|
2616
|
+
__destroy_into_raw() {
|
2617
|
+
const ptr = this.__wbg_ptr;
|
2618
|
+
this.__wbg_ptr = 0;
|
2619
|
+
return ptr;
|
2620
|
+
}
|
2621
|
+
free() {
|
2622
|
+
const ptr = this.__destroy_into_raw();
|
2623
|
+
wasm$1.__wbg_perdomaintrustanchor_free(ptr);
|
2624
|
+
}
|
2625
|
+
/**
|
2626
|
+
* @param {string} domain_name
|
2627
|
+
* @param {string} intermediate_certificate_chain
|
2628
|
+
*/
|
2629
|
+
constructor(domain_name, intermediate_certificate_chain) {
|
2630
|
+
const ptr0 = passStringToWasm0(domain_name, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2631
|
+
const len0 = WASM_VECTOR_LEN;
|
2632
|
+
const ptr1 = passStringToWasm0(intermediate_certificate_chain, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2633
|
+
const len1 = WASM_VECTOR_LEN;
|
2634
|
+
const ret = wasm$1.perdomaintrustanchor_new(ptr0, len0, ptr1, len1);
|
2635
|
+
return PerDomainTrustAnchor.__wrap(ret);
|
2636
|
+
}
|
2637
|
+
}
|
2638
|
+
/**
|
2639
|
+
*/
|
2439
2640
|
class ProposalBundle {
|
2440
2641
|
static __wrap(ptr) {
|
2441
2642
|
ptr = ptr >>> 0;
|
@@ -2537,7 +2738,7 @@ class RotateBundle {
|
|
2537
2738
|
wasm$1.__wbg_rotatebundle_free(ptr);
|
2538
2739
|
}
|
2539
2740
|
/**
|
2540
|
-
* @returns {
|
2741
|
+
* @returns {Map<any, any>}
|
2541
2742
|
*/
|
2542
2743
|
get commits() {
|
2543
2744
|
const ret = wasm$1.rotatebundle_commits(this.__wbg_ptr);
|
@@ -2602,8 +2803,9 @@ class WireIdentity {
|
|
2602
2803
|
* @param {string} handle
|
2603
2804
|
* @param {string} display_name
|
2604
2805
|
* @param {string} domain
|
2806
|
+
* @param {string} certificate
|
2605
2807
|
*/
|
2606
|
-
constructor(client_id, handle, display_name, domain) {
|
2808
|
+
constructor(client_id, handle, display_name, domain, certificate) {
|
2607
2809
|
const ptr0 = passStringToWasm0(client_id, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2608
2810
|
const len0 = WASM_VECTOR_LEN;
|
2609
2811
|
const ptr1 = passStringToWasm0(handle, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
@@ -2612,7 +2814,9 @@ class WireIdentity {
|
|
2612
2814
|
const len2 = WASM_VECTOR_LEN;
|
2613
2815
|
const ptr3 = passStringToWasm0(domain, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2614
2816
|
const len3 = WASM_VECTOR_LEN;
|
2615
|
-
const
|
2817
|
+
const ptr4 = passStringToWasm0(certificate, wasm$1.__wbindgen_malloc, wasm$1.__wbindgen_realloc);
|
2818
|
+
const len4 = WASM_VECTOR_LEN;
|
2819
|
+
const ret = wasm$1.wireidentity_new(ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3, ptr4, len4);
|
2616
2820
|
return WireIdentity.__wrap(ret);
|
2617
2821
|
}
|
2618
2822
|
/**
|
@@ -2683,7 +2887,27 @@ class WireIdentity {
|
|
2683
2887
|
let deferred1_1;
|
2684
2888
|
try {
|
2685
2889
|
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2686
|
-
wasm$1.
|
2890
|
+
wasm$1.acmedirectory_revokeCert(retptr, this.__wbg_ptr);
|
2891
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2892
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2893
|
+
deferred1_0 = r0;
|
2894
|
+
deferred1_1 = r1;
|
2895
|
+
return getStringFromWasm0(r0, r1);
|
2896
|
+
}
|
2897
|
+
finally {
|
2898
|
+
wasm$1.__wbindgen_add_to_stack_pointer(16);
|
2899
|
+
wasm$1.__wbindgen_free(deferred1_0, deferred1_1, 1);
|
2900
|
+
}
|
2901
|
+
}
|
2902
|
+
/**
|
2903
|
+
* @returns {string}
|
2904
|
+
*/
|
2905
|
+
get certificate() {
|
2906
|
+
let deferred1_0;
|
2907
|
+
let deferred1_1;
|
2908
|
+
try {
|
2909
|
+
const retptr = wasm$1.__wbindgen_add_to_stack_pointer(-16);
|
2910
|
+
wasm$1.wireidentity_certificate(retptr, this.__wbg_ptr);
|
2687
2911
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
2688
2912
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
2689
2913
|
deferred1_0 = r0;
|
@@ -2731,14 +2955,14 @@ function __wbg_get_imports() {
|
|
2731
2955
|
const ret = getObject(arg0);
|
2732
2956
|
return addHeapObject(ret);
|
2733
2957
|
};
|
2958
|
+
imports.wbg.__wbindgen_object_drop_ref = function (arg0) {
|
2959
|
+
takeObject(arg0);
|
2960
|
+
};
|
2734
2961
|
imports.wbg.__wbindgen_is_object = function (arg0) {
|
2735
2962
|
const val = getObject(arg0);
|
2736
2963
|
const ret = typeof (val) === 'object' && val !== null;
|
2737
2964
|
return ret;
|
2738
2965
|
};
|
2739
|
-
imports.wbg.__wbindgen_object_drop_ref = function (arg0) {
|
2740
|
-
takeObject(arg0);
|
2741
|
-
};
|
2742
2966
|
imports.wbg.__wbg_getwithrefkey_5e6d9547403deab8 = function (arg0, arg1) {
|
2743
2967
|
const ret = getObject(arg0)[getObject(arg1)];
|
2744
2968
|
return addHeapObject(ret);
|
@@ -2797,6 +3021,10 @@ function __wbg_get_imports() {
|
|
2797
3021
|
return addHeapObject(ret);
|
2798
3022
|
}, arguments);
|
2799
3023
|
};
|
3024
|
+
imports.wbg.__wbg_proteusautoprekeybundle_new = function (arg0) {
|
3025
|
+
const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
|
3026
|
+
return addHeapObject(ret);
|
3027
|
+
};
|
2800
3028
|
imports.wbg.__wbg_new_8125e318e6245eed = function (arg0) {
|
2801
3029
|
const ret = new Uint8Array(getObject(arg0));
|
2802
3030
|
return addHeapObject(ret);
|
@@ -2809,53 +3037,52 @@ function __wbg_get_imports() {
|
|
2809
3037
|
const ret = getObject(arg0).push(getObject(arg1));
|
2810
3038
|
return ret;
|
2811
3039
|
};
|
2812
|
-
imports.wbg.
|
2813
|
-
|
2814
|
-
return addHeapObject(ret);
|
3040
|
+
imports.wbg.__wbg_set_502d29070ea18557 = function (arg0, arg1, arg2) {
|
3041
|
+
getObject(arg0)[arg1 >>> 0] = takeObject(arg2);
|
2815
3042
|
};
|
2816
|
-
imports.wbg.
|
2817
|
-
const ret =
|
3043
|
+
imports.wbg.__wbg_new_56693dbed0c32988 = function () {
|
3044
|
+
const ret = new Map();
|
2818
3045
|
return addHeapObject(ret);
|
2819
3046
|
};
|
2820
|
-
imports.wbg.
|
2821
|
-
const ret =
|
3047
|
+
imports.wbg.__wbg_set_bedc3d02d0f05eb0 = function (arg0, arg1, arg2) {
|
3048
|
+
const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
|
2822
3049
|
return addHeapObject(ret);
|
2823
3050
|
};
|
2824
|
-
imports.wbg.
|
2825
|
-
|
3051
|
+
imports.wbg.__wbindgen_number_new = function (arg0) {
|
3052
|
+
const ret = arg0;
|
3053
|
+
return addHeapObject(ret);
|
2826
3054
|
};
|
2827
3055
|
imports.wbg.__wbindgen_bigint_from_u64 = function (arg0) {
|
2828
3056
|
const ret = BigInt.asUintN(64, arg0);
|
2829
3057
|
return addHeapObject(ret);
|
2830
3058
|
};
|
2831
|
-
imports.wbg.
|
2832
|
-
const ret = arg0;
|
3059
|
+
imports.wbg.__wbg_ffiwiree2eidentity_new = function (arg0) {
|
3060
|
+
const ret = FfiWireE2EIdentity.__wrap(arg0);
|
2833
3061
|
return addHeapObject(ret);
|
2834
3062
|
};
|
2835
|
-
imports.wbg.
|
2836
|
-
const ret = new
|
3063
|
+
imports.wbg.__wbg_new_b51585de1b234aff = function () {
|
3064
|
+
const ret = new Object();
|
2837
3065
|
return addHeapObject(ret);
|
2838
3066
|
};
|
2839
|
-
imports.wbg.
|
2840
|
-
|
2841
|
-
return addHeapObject(ret);
|
3067
|
+
imports.wbg.__wbg_set_841ac57cff3d672b = function (arg0, arg1, arg2) {
|
3068
|
+
getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
|
2842
3069
|
};
|
2843
3070
|
imports.wbg.__wbg_new_d258248ed531ff54 = function (arg0, arg1) {
|
2844
3071
|
const ret = new Error(getStringFromWasm0(arg0, arg1));
|
2845
3072
|
return addHeapObject(ret);
|
2846
3073
|
};
|
2847
|
-
imports.wbg.__wbg_openCursor_555d508ba71b21cc = function () {
|
2848
|
-
return handleError(function (arg0, arg1) {
|
2849
|
-
const ret = getObject(arg0).openCursor(getObject(arg1));
|
2850
|
-
return addHeapObject(ret);
|
2851
|
-
}, arguments);
|
2852
|
-
};
|
2853
3074
|
imports.wbg.__wbg_openCursor_4d6f62b69b34be26 = function () {
|
2854
3075
|
return handleError(function (arg0) {
|
2855
3076
|
const ret = getObject(arg0).openCursor();
|
2856
3077
|
return addHeapObject(ret);
|
2857
3078
|
}, arguments);
|
2858
3079
|
};
|
3080
|
+
imports.wbg.__wbg_openCursor_555d508ba71b21cc = function () {
|
3081
|
+
return handleError(function (arg0, arg1) {
|
3082
|
+
const ret = getObject(arg0).openCursor(getObject(arg1));
|
3083
|
+
return addHeapObject(ret);
|
3084
|
+
}, arguments);
|
3085
|
+
};
|
2859
3086
|
imports.wbg.__wbg_setonsuccess_f518a37d8228a576 = function (arg0, arg1) {
|
2860
3087
|
getObject(arg0).onsuccess = getObject(arg1);
|
2861
3088
|
};
|
@@ -2912,9 +3139,6 @@ function __wbg_get_imports() {
|
|
2912
3139
|
const ret = CoreCrypto$1.__wrap(arg0);
|
2913
3140
|
return addHeapObject(ret);
|
2914
3141
|
};
|
2915
|
-
imports.wbg.__wbg_set_841ac57cff3d672b = function (arg0, arg1, arg2) {
|
2916
|
-
getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
|
2917
|
-
};
|
2918
3142
|
imports.wbg.__wbg_instanceof_Promise_0e98a5bf082e090f = function (arg0) {
|
2919
3143
|
let result;
|
2920
3144
|
try {
|
@@ -2966,7 +3190,7 @@ function __wbg_get_imports() {
|
|
2966
3190
|
const a = state0.a;
|
2967
3191
|
state0.a = 0;
|
2968
3192
|
try {
|
2969
|
-
return
|
3193
|
+
return __wbg_adapter_312(a, state0.b, arg0, arg1);
|
2970
3194
|
}
|
2971
3195
|
finally {
|
2972
3196
|
state0.a = a;
|
@@ -2979,6 +3203,10 @@ function __wbg_get_imports() {
|
|
2979
3203
|
state0.a = state0.b = 0;
|
2980
3204
|
}
|
2981
3205
|
};
|
3206
|
+
imports.wbg.__wbindgen_is_string = function (arg0) {
|
3207
|
+
const ret = typeof (getObject(arg0)) === 'string';
|
3208
|
+
return ret;
|
3209
|
+
};
|
2982
3210
|
imports.wbg.__wbg_reject_7bd6ac9617013c02 = function (arg0) {
|
2983
3211
|
const ret = Promise.reject(getObject(arg0));
|
2984
3212
|
return addHeapObject(ret);
|
@@ -2987,6 +3215,10 @@ function __wbg_get_imports() {
|
|
2987
3215
|
const ret = ProposalBundle.__wrap(arg0);
|
2988
3216
|
return addHeapObject(ret);
|
2989
3217
|
};
|
3218
|
+
imports.wbg.__wbg_buffereddecryptedmessage_new = function (arg0) {
|
3219
|
+
const ret = BufferedDecryptedMessage.__wrap(arg0);
|
3220
|
+
return addHeapObject(ret);
|
3221
|
+
};
|
2990
3222
|
imports.wbg.__wbg_commitbundle_new = function (arg0) {
|
2991
3223
|
const ret = CommitBundle.__wrap(arg0);
|
2992
3224
|
return addHeapObject(ret);
|
@@ -3056,11 +3288,9 @@ function __wbg_get_imports() {
|
|
3056
3288
|
return addHeapObject(ret);
|
3057
3289
|
}, arguments);
|
3058
3290
|
};
|
3059
|
-
imports.wbg.
|
3060
|
-
|
3061
|
-
|
3062
|
-
return addHeapObject(ret);
|
3063
|
-
}, arguments);
|
3291
|
+
imports.wbg.__wbg_now_9c5990bda04c7e53 = function () {
|
3292
|
+
const ret = Date.now();
|
3293
|
+
return ret;
|
3064
3294
|
};
|
3065
3295
|
imports.wbg.__wbg_put_d6937bc51f51a398 = function () {
|
3066
3296
|
return handleError(function (arg0, arg1) {
|
@@ -3068,6 +3298,12 @@ function __wbg_get_imports() {
|
|
3068
3298
|
return addHeapObject(ret);
|
3069
3299
|
}, arguments);
|
3070
3300
|
};
|
3301
|
+
imports.wbg.__wbg_put_fb32824d87feec5c = function () {
|
3302
|
+
return handleError(function (arg0, arg1, arg2) {
|
3303
|
+
const ret = getObject(arg0).put(getObject(arg1), getObject(arg2));
|
3304
|
+
return addHeapObject(ret);
|
3305
|
+
}, arguments);
|
3306
|
+
};
|
3071
3307
|
imports.wbg.__wbg_delete_ca1cfc48f1f7981c = function () {
|
3072
3308
|
return handleError(function (arg0, arg1) {
|
3073
3309
|
const ret = getObject(arg0).delete(getObject(arg1));
|
@@ -3098,10 +3334,6 @@ function __wbg_get_imports() {
|
|
3098
3334
|
return addHeapObject(ret);
|
3099
3335
|
}, arguments);
|
3100
3336
|
};
|
3101
|
-
imports.wbg.__wbg_now_9c5990bda04c7e53 = function () {
|
3102
|
-
const ret = Date.now();
|
3103
|
-
return ret;
|
3104
|
-
};
|
3105
3337
|
imports.wbg.__wbindgen_memory = function () {
|
3106
3338
|
const ret = wasm$1.memory;
|
3107
3339
|
return addHeapObject(ret);
|
@@ -3144,10 +3376,6 @@ function __wbg_get_imports() {
|
|
3144
3376
|
const ret = getObject(arg0).node;
|
3145
3377
|
return addHeapObject(ret);
|
3146
3378
|
};
|
3147
|
-
imports.wbg.__wbindgen_is_string = function (arg0) {
|
3148
|
-
const ret = typeof (getObject(arg0)) === 'string';
|
3149
|
-
return ret;
|
3150
|
-
};
|
3151
3379
|
imports.wbg.__wbg_require_8f08ceecec0f4fee = function () {
|
3152
3380
|
return handleError(function () {
|
3153
3381
|
const ret = module.require;
|
@@ -3415,12 +3643,12 @@ function __wbg_get_imports() {
|
|
3415
3643
|
return addHeapObject(ret);
|
3416
3644
|
}, arguments);
|
3417
3645
|
};
|
3418
|
-
imports.wbg.
|
3419
|
-
const ret = makeMutClosure(arg0, arg1,
|
3646
|
+
imports.wbg.__wbindgen_closure_wrapper1718 = function (arg0, arg1, arg2) {
|
3647
|
+
const ret = makeMutClosure(arg0, arg1, 149, __wbg_adapter_52);
|
3420
3648
|
return addHeapObject(ret);
|
3421
3649
|
};
|
3422
|
-
imports.wbg.
|
3423
|
-
const ret = makeMutClosure(arg0, arg1,
|
3650
|
+
imports.wbg.__wbindgen_closure_wrapper4849 = function (arg0, arg1, arg2) {
|
3651
|
+
const ret = makeMutClosure(arg0, arg1, 149, __wbg_adapter_55);
|
3424
3652
|
return addHeapObject(ret);
|
3425
3653
|
};
|
3426
3654
|
return imports;
|
@@ -3461,6 +3689,7 @@ var exports = /*#__PURE__*/Object.freeze({
|
|
3461
3689
|
__proto__: null,
|
3462
3690
|
AcmeChallenge: AcmeChallenge,
|
3463
3691
|
AcmeDirectory: AcmeDirectory,
|
3692
|
+
BufferedDecryptedMessage: BufferedDecryptedMessage,
|
3464
3693
|
Ciphersuite: Ciphersuite$1,
|
3465
3694
|
CommitBundle: CommitBundle,
|
3466
3695
|
ConversationConfiguration: ConversationConfiguration,
|
@@ -3476,6 +3705,7 @@ var exports = /*#__PURE__*/Object.freeze({
|
|
3476
3705
|
MemberAddedMessages: MemberAddedMessages,
|
3477
3706
|
NewAcmeAuthz: NewAcmeAuthz,
|
3478
3707
|
NewAcmeOrder: NewAcmeOrder,
|
3708
|
+
PerDomainTrustAnchor: PerDomainTrustAnchor,
|
3479
3709
|
ProposalBundle: ProposalBundle,
|
3480
3710
|
ProteusAutoPrekeyBundle: ProteusAutoPrekeyBundle,
|
3481
3711
|
RotateBundle: RotateBundle,
|
@@ -3485,26 +3715,35 @@ var exports = /*#__PURE__*/Object.freeze({
|
|
3485
3715
|
initSync: initSync
|
3486
3716
|
});
|
3487
3717
|
|
3488
|
-
|
3489
|
-
|
3718
|
+
const wasm_path = "assets/core_crypto_ffi-0cc267da.wasm";
|
3719
|
+
|
3720
|
+
|
3721
|
+
var wasm = async (opt = {}) => {
|
3722
|
+
let {importHook, serverPath, initializeHook} = opt;
|
3490
3723
|
|
3491
|
-
let
|
3724
|
+
let final_path = wasm_path;
|
3492
3725
|
|
3493
3726
|
if (serverPath != null) {
|
3494
|
-
|
3727
|
+
final_path = serverPath + /[^\/\\]*$/.exec(final_path)[0];
|
3495
3728
|
}
|
3496
3729
|
|
3497
3730
|
if (importHook != null) {
|
3498
|
-
|
3731
|
+
final_path = importHook(final_path);
|
3732
|
+
}
|
3733
|
+
|
3734
|
+
if (initializeHook != null) {
|
3735
|
+
await initializeHook(__wbg_init, final_path);
|
3736
|
+
|
3737
|
+
} else {
|
3738
|
+
await __wbg_init(final_path);
|
3499
3739
|
}
|
3500
3740
|
|
3501
|
-
await __wbg_init(path);
|
3502
3741
|
return exports;
|
3503
3742
|
};
|
3504
3743
|
|
3505
3744
|
// Wire
|
3506
3745
|
// Copyright (C) 2022 Wire Swiss GmbH
|
3507
|
-
var _a, _CoreCrypto_module, _CoreCrypto_cc, _CoreCrypto_assertModuleLoaded,
|
3746
|
+
var _a, _CoreCrypto_module, _CoreCrypto_cc, _CoreCrypto_assertModuleLoaded, _E2eiEnrollment_enrollment;
|
3508
3747
|
/**
|
3509
3748
|
* Error wrapper that takes care of extracting rich error details across the FFI (through JSON parsing)
|
3510
3749
|
*
|
@@ -3812,7 +4051,7 @@ class CoreCrypto {
|
|
3812
4051
|
/**
|
3813
4052
|
* Closes this {@link CoreCrypto} instance and deallocates all loaded resources
|
3814
4053
|
*
|
3815
|
-
* **CAUTION**: This {@link CoreCrypto} instance won't be
|
4054
|
+
* **CAUTION**: This {@link CoreCrypto} instance won't be usable after a call to this method, but there's no way to express this requirement in TypeScript, so you'll get errors instead!
|
3816
4055
|
*/
|
3817
4056
|
async close() {
|
3818
4057
|
await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").close());
|
@@ -3896,8 +4135,8 @@ class CoreCrypto {
|
|
3896
4135
|
*/
|
3897
4136
|
async createConversation(conversationId, creatorCredentialType, configuration = {}) {
|
3898
4137
|
try {
|
3899
|
-
const { ciphersuite, externalSenders, custom = {} } = configuration || {};
|
3900
|
-
const config = new (__classPrivateFieldGet(CoreCrypto, _a, "f", _CoreCrypto_module).ConversationConfiguration)(ciphersuite, externalSenders, custom?.keyRotationSpan);
|
4138
|
+
const { ciphersuite, externalSenders, custom = {}, perDomainTrustAnchors = [] } = configuration || {};
|
4139
|
+
const config = new (__classPrivateFieldGet(CoreCrypto, _a, "f", _CoreCrypto_module).ConversationConfiguration)(ciphersuite, externalSenders, custom?.keyRotationSpan, custom?.wirePolicy, perDomainTrustAnchors);
|
3901
4140
|
const ret = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").create_conversation(conversationId, creatorCredentialType, config));
|
3902
4141
|
return ret;
|
3903
4142
|
}
|
@@ -3906,7 +4145,12 @@ class CoreCrypto {
|
|
3906
4145
|
}
|
3907
4146
|
}
|
3908
4147
|
/**
|
3909
|
-
* Decrypts a message for a given conversation
|
4148
|
+
* Decrypts a message for a given conversation.
|
4149
|
+
*
|
4150
|
+
* Note: you should catch & ignore the following error reasons:
|
4151
|
+
* * "We already decrypted this message once"
|
4152
|
+
* * "You tried to join with an external commit but did not merge it yet. We will reapply this message for you when you merge your external commit"
|
4153
|
+
* * "Incoming message is for a future epoch. We will buffer it until the commit for that epoch arrives"
|
3910
4154
|
*
|
3911
4155
|
* @param conversationId - The ID of the conversation
|
3912
4156
|
* @param payload - The encrypted message buffer
|
@@ -3931,6 +4175,16 @@ class CoreCrypto {
|
|
3931
4175
|
senderClientId: ffiDecryptedMessage.sender_client_id,
|
3932
4176
|
commitDelay,
|
3933
4177
|
hasEpochChanged: ffiDecryptedMessage.has_epoch_changed,
|
4178
|
+
bufferedMessages: ffiDecryptedMessage.buffered_messages?.map(m => {
|
4179
|
+
return {
|
4180
|
+
message: m.message,
|
4181
|
+
proposals: m.proposals,
|
4182
|
+
isActive: m.is_active,
|
4183
|
+
senderClientId: m.sender_client_id,
|
4184
|
+
commitDelay: m.commit_delay,
|
4185
|
+
hasEpochChanged: m.has_epoch_changed,
|
4186
|
+
};
|
4187
|
+
}),
|
3934
4188
|
};
|
3935
4189
|
return ret;
|
3936
4190
|
}
|
@@ -3949,9 +4203,47 @@ class CoreCrypto {
|
|
3949
4203
|
async encryptMessage(conversationId, message) {
|
3950
4204
|
return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").encrypt_message(conversationId, message));
|
3951
4205
|
}
|
4206
|
+
/**
|
4207
|
+
* Updates the trust anchors for a conversation. This should be called when a federated event happens (new team added/removed).
|
4208
|
+
* Clients should add and/or remove trust anchors from the new backend to the conversation. The method will check
|
4209
|
+
* for duplicated domains and the validity of the certificate chain.
|
4210
|
+
*
|
4211
|
+
* **CAUTION**: {@link CoreCrypto.commitAccepted} **HAS TO** be called afterwards **ONLY IF** the Delivery Service responds
|
4212
|
+
* '200 OK' to the {@link CommitBundle} upload. It will "merge" the commit locally i.e. increment the local group
|
4213
|
+
* epoch, use new encryption secrets etc...
|
4214
|
+
*
|
4215
|
+
* @param conversationId - The ID of the conversation
|
4216
|
+
* @param removeDomainNames - Domains to remove from the trust anchors
|
4217
|
+
* @param addTrustAnchors - New trust anchors to add to the conversation
|
4218
|
+
*
|
4219
|
+
* @returns A {@link CommitBundle}
|
4220
|
+
*/
|
4221
|
+
async updateTrustAnchorsFromConversation(conversationId, removeDomainNames, addTrustAnchors) {
|
4222
|
+
try {
|
4223
|
+
const ffiRet = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").update_trust_anchors_from_conversation(conversationId, removeDomainNames, addTrustAnchors));
|
4224
|
+
const gi = ffiRet.group_info;
|
4225
|
+
const ret = {
|
4226
|
+
welcome: ffiRet.welcome,
|
4227
|
+
commit: ffiRet.commit,
|
4228
|
+
groupInfo: {
|
4229
|
+
encryptionType: gi.encryption_type,
|
4230
|
+
ratchetTreeType: gi.ratchet_tree_type,
|
4231
|
+
payload: gi.payload
|
4232
|
+
},
|
4233
|
+
};
|
4234
|
+
return ret;
|
4235
|
+
}
|
4236
|
+
catch (e) {
|
4237
|
+
throw CoreCryptoError.fromStdError(e);
|
4238
|
+
}
|
4239
|
+
}
|
3952
4240
|
/**
|
3953
4241
|
* Ingest a TLS-serialized MLS welcome message to join an existing MLS group
|
3954
4242
|
*
|
4243
|
+
* Important: you have to catch the error with this reason "Although this Welcome seems valid, the local KeyPackage
|
4244
|
+
* it references has already been deleted locally. Join this group with an external commit", ignore it and then try
|
4245
|
+
* to join this group with an external commit.
|
4246
|
+
*
|
3955
4247
|
* @param welcomeMessage - TLS-serialized MLS Welcome message
|
3956
4248
|
* @param configuration - configuration of the MLS group
|
3957
4249
|
* @returns The conversation ID of the newly joined group. You can use the same ID to decrypt/encrypt messages
|
@@ -3967,7 +4259,10 @@ class CoreCrypto {
|
|
3967
4259
|
}
|
3968
4260
|
}
|
3969
4261
|
/**
|
3970
|
-
*
|
4262
|
+
* Get the client's public signature key. To upload to the DS for further backend side validation
|
4263
|
+
*
|
4264
|
+
* @param ciphersuite - of the signature key to get
|
4265
|
+
* @returns the client's public signature key
|
3971
4266
|
*/
|
3972
4267
|
async clientPublicKey(ciphersuite) {
|
3973
4268
|
return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").client_public_key(ciphersuite));
|
@@ -4004,7 +4299,7 @@ class CoreCrypto {
|
|
4004
4299
|
/**
|
4005
4300
|
* Adds new clients to a conversation, assuming the current client has the right to add new clients to the conversation.
|
4006
4301
|
*
|
4007
|
-
* **CAUTION**: {@link CoreCrypto.commitAccepted} **HAS TO** be called
|
4302
|
+
* **CAUTION**: {@link CoreCrypto.commitAccepted} **HAS TO** be called afterward **ONLY IF** the Delivery Service responds
|
4008
4303
|
* '200 OK' to the {@link CommitBundle} upload. It will "merge" the commit locally i.e. increment the local group
|
4009
4304
|
* epoch, use new encryption secrets etc...
|
4010
4305
|
*
|
@@ -4038,7 +4333,7 @@ class CoreCrypto {
|
|
4038
4333
|
* Removes the provided clients from a conversation; Assuming those clients exist and the current client is allowed
|
4039
4334
|
* to do so, otherwise this operation does nothing.
|
4040
4335
|
*
|
4041
|
-
* **CAUTION**: {@link CoreCrypto.commitAccepted} **HAS TO** be called
|
4336
|
+
* **CAUTION**: {@link CoreCrypto.commitAccepted} **HAS TO** be called afterward **ONLY IF** the Delivery Service responds
|
4042
4337
|
* '200 OK' to the {@link CommitBundle} upload. It will "merge" the commit locally i.e. increment the local group
|
4043
4338
|
* epoch, use new encryption secrets etc...
|
4044
4339
|
*
|
@@ -4067,9 +4362,9 @@ class CoreCrypto {
|
|
4067
4362
|
}
|
4068
4363
|
}
|
4069
4364
|
/**
|
4070
|
-
* Creates an update commit which forces every client to update their
|
4365
|
+
* Creates an update commit which forces every client to update their LeafNode in the conversation
|
4071
4366
|
*
|
4072
|
-
* **CAUTION**: {@link CoreCrypto.commitAccepted} **HAS TO** be called
|
4367
|
+
* **CAUTION**: {@link CoreCrypto.commitAccepted} **HAS TO** be called afterward **ONLY IF** the Delivery Service responds
|
4073
4368
|
* '200 OK' to the {@link CommitBundle} upload. It will "merge" the commit locally i.e. increment the local group
|
4074
4369
|
* epoch, use new encryption secrets etc...
|
4075
4370
|
*
|
@@ -4157,6 +4452,9 @@ class CoreCrypto {
|
|
4157
4452
|
throw new Error("Invalid proposal type!");
|
4158
4453
|
}
|
4159
4454
|
}
|
4455
|
+
/**
|
4456
|
+
* Creates a new external Add proposal for self client to join a conversation.
|
4457
|
+
*/
|
4160
4458
|
async newExternalProposal(externalProposalType, args) {
|
4161
4459
|
switch (externalProposalType) {
|
4162
4460
|
case ExternalProposalType.Add: {
|
@@ -4210,6 +4508,7 @@ class CoreCrypto {
|
|
4210
4508
|
* and deletes the temporary one. This step makes the group operational and ready to encrypt/decrypt message
|
4211
4509
|
*
|
4212
4510
|
* @param conversationId - The ID of the conversation
|
4511
|
+
* @returns eventually decrypted buffered messages if any
|
4213
4512
|
*/
|
4214
4513
|
async mergePendingGroupFromExternalCommit(conversationId) {
|
4215
4514
|
return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").merge_pending_group_from_external_commit(conversationId));
|
@@ -4225,20 +4524,19 @@ class CoreCrypto {
|
|
4225
4524
|
return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").clear_pending_group_from_external_commit(conversationId));
|
4226
4525
|
}
|
4227
4526
|
/**
|
4228
|
-
* Allows to mark the latest commit produced as "accepted" and be able to safely merge it
|
4229
|
-
* into the local group state
|
4527
|
+
* Allows to mark the latest commit produced as "accepted" and be able to safely merge it into the local group state
|
4230
4528
|
*
|
4231
4529
|
* @param conversationId - The group's ID
|
4530
|
+
* @returns the messages from current epoch which had been buffered, if any
|
4232
4531
|
*/
|
4233
4532
|
async commitAccepted(conversationId) {
|
4234
4533
|
return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").commit_accepted(conversationId));
|
4235
4534
|
}
|
4236
4535
|
/**
|
4237
|
-
* Allows to remove a pending proposal (rollback). Use this when backend rejects the proposal you just sent e.g. if permissions
|
4238
|
-
* have changed meanwhile.
|
4536
|
+
* Allows to remove a pending proposal (rollback). Use this when backend rejects the proposal you just sent e.g. if permissions have changed meanwhile.
|
4239
4537
|
*
|
4240
4538
|
* **CAUTION**: only use this when you had an explicit response from the Delivery Service
|
4241
|
-
* e.g. 403 or 409. Do not use otherwise e.g. 5xx responses, timeout etc
|
4539
|
+
* e.g. 403 or 409. Do not use otherwise e.g. 5xx responses, timeout etc…
|
4242
4540
|
*
|
4243
4541
|
* @param conversationId - The group's ID
|
4244
4542
|
* @param proposalRef - A reference to the proposal to delete. You get one when using {@link CoreCrypto.newProposal}
|
@@ -4247,8 +4545,7 @@ class CoreCrypto {
|
|
4247
4545
|
return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").clear_pending_proposal(conversationId, proposalRef));
|
4248
4546
|
}
|
4249
4547
|
/**
|
4250
|
-
* Allows to remove a pending commit (rollback). Use this when backend rejects the commit you just sent e.g. if permissions
|
4251
|
-
* have changed meanwhile.
|
4548
|
+
* Allows to remove a pending commit (rollback). Use this when backend rejects the commit you just sent e.g. if permissions have changed meanwhile.
|
4252
4549
|
*
|
4253
4550
|
* **CAUTION**: only use this when you had an explicit response from the Delivery Service
|
4254
4551
|
* e.g. 403. Do not use otherwise e.g. 5xx responses, timeout etc..
|
@@ -4305,7 +4602,7 @@ class CoreCrypto {
|
|
4305
4602
|
return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").reseed_rng(seed));
|
4306
4603
|
}
|
4307
4604
|
/**
|
4308
|
-
*
|
4605
|
+
* Initializes the proteus client
|
4309
4606
|
*/
|
4310
4607
|
async proteusInit() {
|
4311
4608
|
return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").proteus_init());
|
@@ -4482,54 +4779,56 @@ class CoreCrypto {
|
|
4482
4779
|
* Creates an enrollment instance with private key material you can use in order to fetch
|
4483
4780
|
* a new x509 certificate from the acme server.
|
4484
4781
|
*
|
4485
|
-
* @param clientId client identifier with user b64Url encoded & clientId hex encoded e.g. `NDUyMGUyMmY2YjA3NGU3NjkyZjE1NjJjZTAwMmQ2NTQ:6add501bacd1d90e@example.com`
|
4486
|
-
* @param displayName human
|
4487
|
-
* @param handle user handle e.g. `alice.smith.qa@example.com`
|
4488
|
-
* @param expiryDays generated x509 certificate expiry
|
4782
|
+
* @param clientId - client identifier with user b64Url encoded & clientId hex encoded e.g. `NDUyMGUyMmY2YjA3NGU3NjkyZjE1NjJjZTAwMmQ2NTQ:6add501bacd1d90e@example.com`
|
4783
|
+
* @param displayName - human-readable name displayed in the application e.g. `Smith, Alice M (QA)`
|
4784
|
+
* @param handle - user handle e.g. `alice.smith.qa@example.com`
|
4785
|
+
* @param expiryDays - generated x509 certificate expiry
|
4489
4786
|
* @param ciphersuite - for generating signing key material
|
4490
|
-
* @returns The new {@link
|
4787
|
+
* @returns The new {@link E2eiEnrollment} enrollment instance to use with {@link CoreCrypto.e2eiMlsInitOnly}
|
4491
4788
|
*/
|
4492
4789
|
async e2eiNewEnrollment(clientId, displayName, handle, expiryDays, ciphersuite) {
|
4493
4790
|
const e2ei = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").e2ei_new_enrollment(clientId, displayName, handle, expiryDays, ciphersuite));
|
4494
|
-
return new
|
4791
|
+
return new E2eiEnrollment(e2ei);
|
4495
4792
|
}
|
4496
4793
|
/**
|
4497
4794
|
* Generates an E2EI enrollment instance for a "regular" client (with a Basic credential) willing to migrate to E2EI.
|
4498
|
-
* As a consequence, this method does not support changing the ClientId which should remain the same as the Basic one.
|
4499
4795
|
* Once the enrollment is finished, use the instance in {@link CoreCrypto.e2eiRotateAll} to do the rotation.
|
4500
4796
|
*
|
4501
|
-
* @param
|
4502
|
-
* @param
|
4503
|
-
* @param
|
4797
|
+
* @param clientId - client identifier with user b64Url encoded & clientId hex encoded e.g. `NDUyMGUyMmY2YjA3NGU3NjkyZjE1NjJjZTAwMmQ2NTQ:6add501bacd1d90e@example.com`
|
4798
|
+
* @param displayName - human-readable name displayed in the application e.g. `Smith, Alice M (QA)`
|
4799
|
+
* @param handle - user handle e.g. `alice.smith.qa@example.com`
|
4800
|
+
* @param expiryDays - generated x509 certificate expiry
|
4504
4801
|
* @param ciphersuite - for generating signing key material
|
4505
|
-
* @returns The new {@link
|
4802
|
+
* @returns The new {@link E2eiEnrollment} enrollment instance to use with {@link CoreCrypto.e2eiRotateAll}
|
4506
4803
|
*/
|
4507
|
-
async e2eiNewActivationEnrollment(displayName, handle, expiryDays, ciphersuite) {
|
4508
|
-
const e2ei = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").e2ei_new_activation_enrollment(displayName, handle, expiryDays, ciphersuite));
|
4509
|
-
return new
|
4804
|
+
async e2eiNewActivationEnrollment(clientId, displayName, handle, expiryDays, ciphersuite) {
|
4805
|
+
const e2ei = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").e2ei_new_activation_enrollment(clientId, displayName, handle, expiryDays, ciphersuite));
|
4806
|
+
return new E2eiEnrollment(e2ei);
|
4510
4807
|
}
|
4511
4808
|
/**
|
4512
4809
|
* Generates an E2EI enrollment instance for a E2EI client (with a X509 certificate credential)
|
4513
4810
|
* having to change/rotate their credential, either because the former one is expired or it
|
4514
|
-
* has been revoked.
|
4515
|
-
* should remain the same as the previous one. It lets you change the DisplayName or the handle
|
4811
|
+
* has been revoked. It lets you change the DisplayName or the handle
|
4516
4812
|
* if you need to. Once the enrollment is finished, use the instance in {@link CoreCrypto.e2eiRotateAll} to do the rotation.
|
4517
4813
|
*
|
4518
|
-
* @param
|
4814
|
+
* @param clientId - client identifier with user b64Url encoded & clientId hex encoded e.g. `NDUyMGUyMmY2YjA3NGU3NjkyZjE1NjJjZTAwMmQ2NTQ:6add501bacd1d90e@example.com`
|
4815
|
+
* @param expiryDays - generated x509 certificate expiry
|
4519
4816
|
* @param ciphersuite - for generating signing key material
|
4520
|
-
* @param displayName human
|
4521
|
-
* @param handle user handle e.g. `alice.smith.qa@example.com`
|
4522
|
-
* @returns The new {@link
|
4817
|
+
* @param displayName - human-readable name displayed in the application e.g. `Smith, Alice M (QA)`
|
4818
|
+
* @param handle - user handle e.g. `alice.smith.qa@example.com`
|
4819
|
+
* @returns The new {@link E2eiEnrollment} enrollment instance to use with {@link CoreCrypto.e2eiRotateAll}
|
4523
4820
|
*/
|
4524
|
-
async e2eiNewRotateEnrollment(expiryDays, ciphersuite, displayName, handle) {
|
4525
|
-
const e2ei = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").e2ei_new_rotate_enrollment(displayName, handle, expiryDays, ciphersuite));
|
4526
|
-
return new
|
4821
|
+
async e2eiNewRotateEnrollment(clientId, expiryDays, ciphersuite, displayName, handle) {
|
4822
|
+
const e2ei = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").e2ei_new_rotate_enrollment(clientId, displayName, handle, expiryDays, ciphersuite));
|
4823
|
+
return new E2eiEnrollment(e2ei);
|
4527
4824
|
}
|
4528
4825
|
/**
|
4529
|
-
* Use this method to initialize end-to-end identity when a client signs up and the grace period is already expired ;
|
4826
|
+
* Use this method to initialize end-to-end identity when a client signs up and the grace period is already expired ;
|
4827
|
+
* that means he cannot initialize with a Basic credential
|
4530
4828
|
*
|
4531
4829
|
* @param enrollment - the enrollment instance used to fetch the certificates
|
4532
4830
|
* @param certificateChain - the raw response from ACME server
|
4831
|
+
* @returns a MlsClient initialized with only a x509 credential
|
4533
4832
|
*/
|
4534
4833
|
async e2eiMlsInitOnly(enrollment, certificateChain) {
|
4535
4834
|
return await __classPrivateFieldGet(this, _CoreCrypto_cc, "f").e2ei_mls_init_only(enrollment.inner(), certificateChain);
|
@@ -4542,9 +4841,16 @@ class CoreCrypto {
|
|
4542
4841
|
* @param enrollment - the enrollment instance used to fetch the certificates
|
4543
4842
|
* @param certificateChain - the raw response from ACME server
|
4544
4843
|
* @param newKeyPackageCount - number of KeyPackages with new identity to generate
|
4844
|
+
* @returns a {@link RotateBundle} with commits to fan-out to other group members, KeyPackages to upload and old ones to delete
|
4545
4845
|
*/
|
4546
4846
|
async e2eiRotateAll(enrollment, certificateChain, newKeyPackageCount) {
|
4547
|
-
|
4847
|
+
const ffiRet = await __classPrivateFieldGet(this, _CoreCrypto_cc, "f").e2ei_rotate_all(enrollment.inner(), certificateChain, newKeyPackageCount);
|
4848
|
+
const ret = {
|
4849
|
+
commits: ffiRet.commits,
|
4850
|
+
newKeyPackages: ffiRet.new_key_packages,
|
4851
|
+
keyPackageRefsToRemove: ffiRet.key_package_refs_to_remove,
|
4852
|
+
};
|
4853
|
+
return ret;
|
4548
4854
|
}
|
4549
4855
|
/**
|
4550
4856
|
* Allows persisting an active enrollment (for example while redirecting the user during OAuth) in order to resume
|
@@ -4564,17 +4870,39 @@ class CoreCrypto {
|
|
4564
4870
|
*/
|
4565
4871
|
async e2eiEnrollmentStashPop(handle) {
|
4566
4872
|
const e2ei = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").e2ei_enrollment_stash_pop(handle));
|
4567
|
-
return new
|
4873
|
+
return new E2eiEnrollment(e2ei);
|
4568
4874
|
}
|
4569
4875
|
/**
|
4570
4876
|
* Indicates when to mark a conversation as degraded i.e. when not all its members have a X509.
|
4571
4877
|
* Credential generated by Wire's end-to-end identity enrollment
|
4572
4878
|
*
|
4573
4879
|
* @param conversationId The group's ID
|
4574
|
-
* @returns
|
4880
|
+
* @returns the conversation state given current members
|
4881
|
+
*/
|
4882
|
+
async e2eiConversationState(conversationId) {
|
4883
|
+
let state = await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").e2ei_conversation_state(conversationId));
|
4884
|
+
// @ts-ignore
|
4885
|
+
return E2eiConversationState[E2eiConversationState[state]];
|
4886
|
+
}
|
4887
|
+
/**
|
4888
|
+
* Returns true when end-to-end-identity is enabled for the given Ciphersuite
|
4889
|
+
*
|
4890
|
+
* @param ciphersuite of the credential to check
|
4891
|
+
* @returns true if end-to-end identity is enabled for the given ciphersuite
|
4892
|
+
*/
|
4893
|
+
async e2eiIsEnabled(ciphersuite) {
|
4894
|
+
return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").e2ei_is_enabled(ciphersuite));
|
4895
|
+
}
|
4896
|
+
/**
|
4897
|
+
* From a given conversation, get the identity of the members supplied. Identity is only present for members with a
|
4898
|
+
* Certificate Credential (after turning on end-to-end identity).
|
4899
|
+
*
|
4900
|
+
* @param conversationId - identifier of the conversation
|
4901
|
+
* @param clientIds - identifiers of the user
|
4902
|
+
* @returns identities or if no member has a x509 certificate, it will return an empty List
|
4575
4903
|
*/
|
4576
|
-
async
|
4577
|
-
return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").
|
4904
|
+
async getUserIdentities(conversationId, clientIds) {
|
4905
|
+
return await CoreCryptoError.asyncMapErr(__classPrivateFieldGet(this, _CoreCrypto_cc, "f").get_user_identities(conversationId, clientIds));
|
4578
4906
|
}
|
4579
4907
|
/**
|
4580
4908
|
* Returns the current version of {@link CoreCrypto}
|
@@ -4593,21 +4921,21 @@ _a = CoreCrypto, _CoreCrypto_cc = new WeakMap(), _CoreCrypto_assertModuleLoaded
|
|
4593
4921
|
};
|
4594
4922
|
/** @hidden */
|
4595
4923
|
_CoreCrypto_module = { value: void 0 };
|
4596
|
-
class
|
4924
|
+
class E2eiEnrollment {
|
4597
4925
|
/** @hidden */
|
4598
4926
|
constructor(e2ei) {
|
4599
4927
|
/** @hidden */
|
4600
|
-
|
4601
|
-
__classPrivateFieldSet(this,
|
4928
|
+
_E2eiEnrollment_enrollment.set(this, void 0);
|
4929
|
+
__classPrivateFieldSet(this, _E2eiEnrollment_enrollment, e2ei, "f");
|
4602
4930
|
}
|
4603
4931
|
free() {
|
4604
|
-
__classPrivateFieldGet(this,
|
4932
|
+
__classPrivateFieldGet(this, _E2eiEnrollment_enrollment, "f").free();
|
4605
4933
|
}
|
4606
4934
|
/**
|
4607
4935
|
* Should only be used internally
|
4608
4936
|
*/
|
4609
4937
|
inner() {
|
4610
|
-
return __classPrivateFieldGet(this,
|
4938
|
+
return __classPrivateFieldGet(this, _E2eiEnrollment_enrollment, "f");
|
4611
4939
|
}
|
4612
4940
|
/**
|
4613
4941
|
* Parses the response from `GET /acme/{provisioner-name}/directory`.
|
@@ -4619,7 +4947,7 @@ class WireE2eIdentity {
|
|
4619
4947
|
*/
|
4620
4948
|
directoryResponse(directory) {
|
4621
4949
|
try {
|
4622
|
-
return __classPrivateFieldGet(this,
|
4950
|
+
return __classPrivateFieldGet(this, _E2eiEnrollment_enrollment, "f").directory_response(directory);
|
4623
4951
|
}
|
4624
4952
|
catch (e) {
|
4625
4953
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4634,7 +4962,7 @@ class WireE2eIdentity {
|
|
4634
4962
|
*/
|
4635
4963
|
newAccountRequest(previousNonce) {
|
4636
4964
|
try {
|
4637
|
-
return __classPrivateFieldGet(this,
|
4965
|
+
return __classPrivateFieldGet(this, _E2eiEnrollment_enrollment, "f").new_account_request(previousNonce);
|
4638
4966
|
}
|
4639
4967
|
catch (e) {
|
4640
4968
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4647,7 +4975,7 @@ class WireE2eIdentity {
|
|
4647
4975
|
*/
|
4648
4976
|
newAccountResponse(account) {
|
4649
4977
|
try {
|
4650
|
-
return __classPrivateFieldGet(this,
|
4978
|
+
return __classPrivateFieldGet(this, _E2eiEnrollment_enrollment, "f").new_account_response(account);
|
4651
4979
|
}
|
4652
4980
|
catch (e) {
|
4653
4981
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4661,7 +4989,7 @@ class WireE2eIdentity {
|
|
4661
4989
|
*/
|
4662
4990
|
newOrderRequest(previousNonce) {
|
4663
4991
|
try {
|
4664
|
-
return __classPrivateFieldGet(this,
|
4992
|
+
return __classPrivateFieldGet(this, _E2eiEnrollment_enrollment, "f").new_order_request(previousNonce);
|
4665
4993
|
}
|
4666
4994
|
catch (e) {
|
4667
4995
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4675,7 +5003,7 @@ class WireE2eIdentity {
|
|
4675
5003
|
*/
|
4676
5004
|
newOrderResponse(order) {
|
4677
5005
|
try {
|
4678
|
-
return __classPrivateFieldGet(this,
|
5006
|
+
return __classPrivateFieldGet(this, _E2eiEnrollment_enrollment, "f").new_order_response(order);
|
4679
5007
|
}
|
4680
5008
|
catch (e) {
|
4681
5009
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4691,7 +5019,7 @@ class WireE2eIdentity {
|
|
4691
5019
|
*/
|
4692
5020
|
newAuthzRequest(url, previousNonce) {
|
4693
5021
|
try {
|
4694
|
-
return __classPrivateFieldGet(this,
|
5022
|
+
return __classPrivateFieldGet(this, _E2eiEnrollment_enrollment, "f").new_authz_request(url, previousNonce);
|
4695
5023
|
}
|
4696
5024
|
catch (e) {
|
4697
5025
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4705,7 +5033,7 @@ class WireE2eIdentity {
|
|
4705
5033
|
*/
|
4706
5034
|
newAuthzResponse(authz) {
|
4707
5035
|
try {
|
4708
|
-
return __classPrivateFieldGet(this,
|
5036
|
+
return __classPrivateFieldGet(this, _E2eiEnrollment_enrollment, "f").new_authz_response(authz);
|
4709
5037
|
}
|
4710
5038
|
catch (e) {
|
4711
5039
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4724,7 +5052,7 @@ class WireE2eIdentity {
|
|
4724
5052
|
*/
|
4725
5053
|
createDpopToken(expirySecs, backendNonce) {
|
4726
5054
|
try {
|
4727
|
-
return __classPrivateFieldGet(this,
|
5055
|
+
return __classPrivateFieldGet(this, _E2eiEnrollment_enrollment, "f").create_dpop_token(expirySecs, backendNonce);
|
4728
5056
|
}
|
4729
5057
|
catch (e) {
|
4730
5058
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4739,7 +5067,7 @@ class WireE2eIdentity {
|
|
4739
5067
|
*/
|
4740
5068
|
newDpopChallengeRequest(accessToken, previousNonce) {
|
4741
5069
|
try {
|
4742
|
-
return __classPrivateFieldGet(this,
|
5070
|
+
return __classPrivateFieldGet(this, _E2eiEnrollment_enrollment, "f").new_dpop_challenge_request(accessToken, previousNonce);
|
4743
5071
|
}
|
4744
5072
|
catch (e) {
|
4745
5073
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4754,7 +5082,7 @@ class WireE2eIdentity {
|
|
4754
5082
|
*/
|
4755
5083
|
newOidcChallengeRequest(idToken, previousNonce) {
|
4756
5084
|
try {
|
4757
|
-
return __classPrivateFieldGet(this,
|
5085
|
+
return __classPrivateFieldGet(this, _E2eiEnrollment_enrollment, "f").new_oidc_challenge_request(idToken, previousNonce);
|
4758
5086
|
}
|
4759
5087
|
catch (e) {
|
4760
5088
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4768,7 +5096,7 @@ class WireE2eIdentity {
|
|
4768
5096
|
*/
|
4769
5097
|
newChallengeResponse(challenge) {
|
4770
5098
|
try {
|
4771
|
-
return __classPrivateFieldGet(this,
|
5099
|
+
return __classPrivateFieldGet(this, _E2eiEnrollment_enrollment, "f").new_challenge_response(challenge);
|
4772
5100
|
}
|
4773
5101
|
catch (e) {
|
4774
5102
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4783,7 +5111,7 @@ class WireE2eIdentity {
|
|
4783
5111
|
*/
|
4784
5112
|
checkOrderRequest(orderUrl, previousNonce) {
|
4785
5113
|
try {
|
4786
|
-
return __classPrivateFieldGet(this,
|
5114
|
+
return __classPrivateFieldGet(this, _E2eiEnrollment_enrollment, "f").check_order_request(orderUrl, previousNonce);
|
4787
5115
|
}
|
4788
5116
|
catch (e) {
|
4789
5117
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4793,12 +5121,12 @@ class WireE2eIdentity {
|
|
4793
5121
|
* Parses the response from `POST /acme/{provisioner-name}/order/{order-id}`.
|
4794
5122
|
*
|
4795
5123
|
* @param order HTTP response body
|
4796
|
-
* @return
|
5124
|
+
* @return finalize url to use with {@link finalizeRequest}
|
4797
5125
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4
|
4798
5126
|
*/
|
4799
5127
|
checkOrderResponse(order) {
|
4800
5128
|
try {
|
4801
|
-
return __classPrivateFieldGet(this,
|
5129
|
+
return __classPrivateFieldGet(this, _E2eiEnrollment_enrollment, "f").check_order_response(order);
|
4802
5130
|
}
|
4803
5131
|
catch (e) {
|
4804
5132
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4812,7 +5140,7 @@ class WireE2eIdentity {
|
|
4812
5140
|
*/
|
4813
5141
|
finalizeRequest(previousNonce) {
|
4814
5142
|
try {
|
4815
|
-
return __classPrivateFieldGet(this,
|
5143
|
+
return __classPrivateFieldGet(this, _E2eiEnrollment_enrollment, "f").finalize_request(previousNonce);
|
4816
5144
|
}
|
4817
5145
|
catch (e) {
|
4818
5146
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4827,7 +5155,7 @@ class WireE2eIdentity {
|
|
4827
5155
|
*/
|
4828
5156
|
finalizeResponse(finalize) {
|
4829
5157
|
try {
|
4830
|
-
return __classPrivateFieldGet(this,
|
5158
|
+
return __classPrivateFieldGet(this, _E2eiEnrollment_enrollment, "f").finalize_response(finalize);
|
4831
5159
|
}
|
4832
5160
|
catch (e) {
|
4833
5161
|
throw CoreCryptoError.fromStdError(e);
|
@@ -4841,13 +5169,33 @@ class WireE2eIdentity {
|
|
4841
5169
|
*/
|
4842
5170
|
certificateRequest(previousNonce) {
|
4843
5171
|
try {
|
4844
|
-
return __classPrivateFieldGet(this,
|
5172
|
+
return __classPrivateFieldGet(this, _E2eiEnrollment_enrollment, "f").certificate_request(previousNonce);
|
4845
5173
|
}
|
4846
5174
|
catch (e) {
|
4847
5175
|
throw CoreCryptoError.fromStdError(e);
|
4848
5176
|
}
|
4849
5177
|
}
|
4850
5178
|
}
|
4851
|
-
|
5179
|
+
_E2eiEnrollment_enrollment = new WeakMap();
|
5180
|
+
/**
|
5181
|
+
* Indicates the state of a Conversation regarding end-to-end identity.
|
5182
|
+
* Note: this does not check pending state (pending commit, pending proposals) so it does not
|
5183
|
+
* consider members about to be added/removed
|
5184
|
+
*/
|
5185
|
+
var E2eiConversationState;
|
5186
|
+
(function (E2eiConversationState) {
|
5187
|
+
/**
|
5188
|
+
* All clients have a valid E2EI certificate
|
5189
|
+
*/
|
5190
|
+
E2eiConversationState[E2eiConversationState["Verified"] = 1] = "Verified";
|
5191
|
+
/**
|
5192
|
+
* Some clients are either still Basic or their certificate is expired
|
5193
|
+
*/
|
5194
|
+
E2eiConversationState[E2eiConversationState["Degraded"] = 2] = "Degraded";
|
5195
|
+
/**
|
5196
|
+
* All clients are still Basic. If all client have expired certificates, Degraded is returned.
|
5197
|
+
*/
|
5198
|
+
E2eiConversationState[E2eiConversationState["NotEnabled"] = 3] = "NotEnabled";
|
5199
|
+
})(E2eiConversationState || (E2eiConversationState = {}));
|
4852
5200
|
|
4853
|
-
export { Ciphersuite, CoreCrypto, CoreCryptoError, CredentialType, ExternalProposalType, GroupInfoEncryptionType, ProposalType, RatchetTreeType,
|
5201
|
+
export { Ciphersuite, CoreCrypto, CoreCryptoError, CredentialType, E2eiConversationState, E2eiEnrollment, ExternalProposalType, GroupInfoEncryptionType, ProposalType, RatchetTreeType, WirePolicy };
|