@wireapp/core-crypto 1.0.0-rc.31 → 1.0.0-rc.33
Sign up to get free protection for your applications and to get access to all the features.
package/package.json
CHANGED
Binary file
|
@@ -1,3 +1,5 @@
|
|
1
|
+
/* tslint:disable */
|
2
|
+
/* eslint-disable */
|
1
3
|
/**
|
2
4
|
* see [core_crypto::prelude::DeviceStatus]
|
3
5
|
*/
|
@@ -510,6 +512,10 @@ export interface DecryptedMessage {
|
|
510
512
|
* because the DS did not fan them out in order.
|
511
513
|
*/
|
512
514
|
bufferedMessages?: BufferedDecryptedMessage[];
|
515
|
+
/**
|
516
|
+
* New CRL distribution points that appeared by the introduction of a new credential
|
517
|
+
*/
|
518
|
+
crlNewDistributionPoints?: string[];
|
513
519
|
}
|
514
520
|
/**
|
515
521
|
* Almost same as {@link DecryptedMessage} but avoids recursion
|
@@ -543,6 +549,10 @@ export interface BufferedDecryptedMessage {
|
|
543
549
|
* see {@link DecryptedMessage.identity}
|
544
550
|
*/
|
545
551
|
identity?: WireIdentity;
|
552
|
+
/**
|
553
|
+
* see {@link DecryptedMessage.crlNewDistributionPoints}
|
554
|
+
*/
|
555
|
+
crlNewDistributionPoints?: string[];
|
546
556
|
}
|
547
557
|
/**
|
548
558
|
* Returned by all methods creating proposals. Contains a proposal message and an identifier to roll back the proposal
|
@@ -1434,11 +1444,10 @@ export declare class E2eiEnrollment {
|
|
1434
1444
|
* Creates a new challenge request for Wire Oidc challenge.
|
1435
1445
|
*
|
1436
1446
|
* @param idToken you get back from Identity Provider
|
1437
|
-
* @param refreshToken you get back from Identity Provider to renew the access token
|
1438
1447
|
* @param previousNonce `replay-nonce` response header from `POST /acme/{provisioner-name}/authz/{authz-id}`
|
1439
1448
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
1440
1449
|
*/
|
1441
|
-
newOidcChallengeRequest(idToken: string,
|
1450
|
+
newOidcChallengeRequest(idToken: string, previousNonce: string): Promise<JsonRawData>;
|
1442
1451
|
/**
|
1443
1452
|
* Parses the response from `POST /acme/{provisioner-name}/challenge/{challenge-id}` for the OIDC challenge.
|
1444
1453
|
*
|
@@ -1446,7 +1455,7 @@ export declare class E2eiEnrollment {
|
|
1446
1455
|
* @param challenge HTTP response body
|
1447
1456
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
1448
1457
|
*/
|
1449
|
-
newOidcChallengeResponse(
|
1458
|
+
newOidcChallengeResponse(challenge: JsonRawData): Promise<void>;
|
1450
1459
|
/**
|
1451
1460
|
* Verifies that the previous challenge has been completed.
|
1452
1461
|
*
|
@@ -1485,12 +1494,6 @@ export declare class E2eiEnrollment {
|
|
1485
1494
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.4.2
|
1486
1495
|
*/
|
1487
1496
|
certificateRequest(previousNonce: string): Promise<JsonRawData>;
|
1488
|
-
/**
|
1489
|
-
* Lets clients retrieve the OIDC refresh token to try to renew the user's authorization.
|
1490
|
-
* If it's expired, the user needs to reauthenticate and they will update the refresh token
|
1491
|
-
* in {@link newOidcChallengeRequest}
|
1492
|
-
*/
|
1493
|
-
getRefreshToken(): Promise<String>;
|
1494
1497
|
}
|
1495
1498
|
/**
|
1496
1499
|
* Indicates the state of a Conversation regarding end-to-end identity.
|
@@ -1,4 +1,12 @@
|
|
1
1
|
// bindings/js/wasm/core-crypto-ffi.js
|
2
|
+
var addHeapObject = function(obj) {
|
3
|
+
if (heap_next === heap.length)
|
4
|
+
heap.push(heap.length + 1);
|
5
|
+
const idx = heap_next;
|
6
|
+
heap_next = heap[idx];
|
7
|
+
heap[idx] = obj;
|
8
|
+
return idx;
|
9
|
+
};
|
2
10
|
var getObject = function(idx) {
|
3
11
|
return heap[idx];
|
4
12
|
};
|
@@ -13,14 +21,6 @@ var takeObject = function(idx) {
|
|
13
21
|
dropObject(idx);
|
14
22
|
return ret;
|
15
23
|
};
|
16
|
-
var addHeapObject = function(obj) {
|
17
|
-
if (heap_next === heap.length)
|
18
|
-
heap.push(heap.length + 1);
|
19
|
-
const idx = heap_next;
|
20
|
-
heap_next = heap[idx];
|
21
|
-
heap[idx] = obj;
|
22
|
-
return idx;
|
23
|
-
};
|
24
24
|
var getUint8Memory0 = function() {
|
25
25
|
if (cachedUint8Memory0 === null || cachedUint8Memory0.byteLength === 0) {
|
26
26
|
cachedUint8Memory0 = new Uint8Array(wasm.memory.buffer);
|
@@ -232,7 +232,7 @@ var handleError = function(f, args) {
|
|
232
232
|
wasm.__wbindgen_exn_store(addHeapObject(e));
|
233
233
|
}
|
234
234
|
};
|
235
|
-
var
|
235
|
+
var __wbg_adapter_412 = function(arg0, arg1, arg2, arg3) {
|
236
236
|
wasm.wasm_bindgen__convert__closures__invoke2_mut__h639173e274a4a014(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
|
237
237
|
};
|
238
238
|
async function __wbg_load(module, imports) {
|
@@ -262,48 +262,48 @@ async function __wbg_load(module, imports) {
|
|
262
262
|
var __wbg_get_imports = function() {
|
263
263
|
const imports = {};
|
264
264
|
imports.wbg = {};
|
265
|
+
imports.wbg.__wbg_corecrypto_new = function(arg0) {
|
266
|
+
const ret = CoreCrypto.__wrap(arg0);
|
267
|
+
return addHeapObject(ret);
|
268
|
+
};
|
269
|
+
imports.wbg.__wbg_newacmeauthz_new = function(arg0) {
|
270
|
+
const ret = NewAcmeAuthz.__wrap(arg0);
|
271
|
+
return addHeapObject(ret);
|
272
|
+
};
|
265
273
|
imports.wbg.__wbg_ffiwiree2eidentity_new = function(arg0) {
|
266
274
|
const ret = FfiWireE2EIdentity.__wrap(arg0);
|
267
275
|
return addHeapObject(ret);
|
268
276
|
};
|
269
|
-
imports.wbg.__wbindgen_object_drop_ref = function(arg0) {
|
270
|
-
takeObject(arg0);
|
271
|
-
};
|
272
277
|
imports.wbg.__wbindgen_number_new = function(arg0) {
|
273
278
|
const ret = arg0;
|
274
279
|
return addHeapObject(ret);
|
275
280
|
};
|
276
|
-
imports.wbg.
|
277
|
-
const ret =
|
281
|
+
imports.wbg.__wbg_acmedirectory_new = function(arg0) {
|
282
|
+
const ret = AcmeDirectory.__wrap(arg0);
|
278
283
|
return addHeapObject(ret);
|
279
284
|
};
|
280
|
-
imports.wbg.
|
281
|
-
const ret =
|
285
|
+
imports.wbg.__wbg_commitbundle_new = function(arg0) {
|
286
|
+
const ret = CommitBundle.__wrap(arg0);
|
282
287
|
return addHeapObject(ret);
|
283
288
|
};
|
284
289
|
imports.wbg.__wbg_proposalbundle_new = function(arg0) {
|
285
290
|
const ret = ProposalBundle.__wrap(arg0);
|
286
291
|
return addHeapObject(ret);
|
287
292
|
};
|
288
|
-
imports.wbg.
|
289
|
-
const ret =
|
290
|
-
return addHeapObject(ret);
|
291
|
-
};
|
292
|
-
imports.wbg.__wbg_acmedirectory_new = function(arg0) {
|
293
|
-
const ret = AcmeDirectory.__wrap(arg0);
|
293
|
+
imports.wbg.__wbg_proteusautoprekeybundle_new = function(arg0) {
|
294
|
+
const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
|
294
295
|
return addHeapObject(ret);
|
295
296
|
};
|
296
|
-
imports.wbg.
|
297
|
-
const ret =
|
297
|
+
imports.wbg.__wbg_buffereddecryptedmessage_new = function(arg0) {
|
298
|
+
const ret = BufferedDecryptedMessage.__wrap(arg0);
|
298
299
|
return addHeapObject(ret);
|
299
300
|
};
|
300
|
-
imports.wbg.
|
301
|
-
const ret =
|
301
|
+
imports.wbg.__wbg_newacmeorder_new = function(arg0) {
|
302
|
+
const ret = NewAcmeOrder.__wrap(arg0);
|
302
303
|
return addHeapObject(ret);
|
303
304
|
};
|
304
|
-
imports.wbg.
|
305
|
-
|
306
|
-
return addHeapObject(ret);
|
305
|
+
imports.wbg.__wbindgen_object_drop_ref = function(arg0) {
|
306
|
+
takeObject(arg0);
|
307
307
|
};
|
308
308
|
imports.wbg.__wbindgen_object_clone_ref = function(arg0) {
|
309
309
|
const ret = getObject(arg0);
|
@@ -886,7 +886,7 @@ var __wbg_get_imports = function() {
|
|
886
886
|
const a = state0.a;
|
887
887
|
state0.a = 0;
|
888
888
|
try {
|
889
|
-
return
|
889
|
+
return __wbg_adapter_412(a, state0.b, arg02, arg12);
|
890
890
|
} finally {
|
891
891
|
state0.a = a;
|
892
892
|
}
|
@@ -966,12 +966,12 @@ var __wbg_get_imports = function() {
|
|
966
966
|
const ret = wasm.memory;
|
967
967
|
return addHeapObject(ret);
|
968
968
|
};
|
969
|
-
imports.wbg.
|
970
|
-
const ret = makeMutClosure(arg0, arg1,
|
969
|
+
imports.wbg.__wbindgen_closure_wrapper2497 = function(arg0, arg1, arg2) {
|
970
|
+
const ret = makeMutClosure(arg0, arg1, 648, __wbg_adapter_54);
|
971
971
|
return addHeapObject(ret);
|
972
972
|
};
|
973
|
-
imports.wbg.
|
974
|
-
const ret = makeMutClosure(arg0, arg1,
|
973
|
+
imports.wbg.__wbindgen_closure_wrapper11427 = function(arg0, arg1, arg2) {
|
974
|
+
const ret = makeMutClosure(arg0, arg1, 1583, __wbg_adapter_57);
|
975
975
|
return addHeapObject(ret);
|
976
976
|
};
|
977
977
|
return imports;
|
@@ -1033,6 +1033,14 @@ var cachedFloat64Memory0 = null;
|
|
1033
1033
|
var cachedBigInt64Memory0 = null;
|
1034
1034
|
var cachedUint32Memory0 = null;
|
1035
1035
|
var cachedUint16Memory0 = null;
|
1036
|
+
var DeviceStatus = Object.freeze({
|
1037
|
+
Valid: 0,
|
1038
|
+
"0": "Valid",
|
1039
|
+
Expired: 1,
|
1040
|
+
"1": "Expired",
|
1041
|
+
Revoked: 2,
|
1042
|
+
"2": "Revoked"
|
1043
|
+
});
|
1036
1044
|
var CredentialType = Object.freeze({
|
1037
1045
|
Basic: 1,
|
1038
1046
|
"1": "Basic",
|
@@ -1063,14 +1071,6 @@ var WirePolicy = Object.freeze({
|
|
1063
1071
|
Ciphertext: 2,
|
1064
1072
|
"2": "Ciphertext"
|
1065
1073
|
});
|
1066
|
-
var DeviceStatus = Object.freeze({
|
1067
|
-
Valid: 0,
|
1068
|
-
"0": "Valid",
|
1069
|
-
Expired: 1,
|
1070
|
-
"1": "Expired",
|
1071
|
-
Revoked: 2,
|
1072
|
-
"2": "Revoked"
|
1073
|
-
});
|
1074
1074
|
|
1075
1075
|
class AcmeChallenge {
|
1076
1076
|
static __wrap(ptr) {
|
@@ -1268,6 +1268,10 @@ class BufferedDecryptedMessage {
|
|
1268
1268
|
const ret = wasm.buffereddecryptedmessage_identity(this.__wbg_ptr);
|
1269
1269
|
return ret === 0 ? undefined : WireIdentity.__wrap(ret);
|
1270
1270
|
}
|
1271
|
+
get crl_new_distribution_points() {
|
1272
|
+
const ret = wasm.buffereddecryptedmessage_crl_new_distribution_points(this.__wbg_ptr);
|
1273
|
+
return takeObject(ret);
|
1274
|
+
}
|
1271
1275
|
}
|
1272
1276
|
|
1273
1277
|
class CommitBundle {
|
@@ -1985,19 +1989,16 @@ class FfiWireE2EIdentity {
|
|
1985
1989
|
const ret = wasm.ffiwiree2eidentity_new_dpop_challenge_response(this.__wbg_ptr, addHeapObject(challenge));
|
1986
1990
|
return takeObject(ret);
|
1987
1991
|
}
|
1988
|
-
new_oidc_challenge_request(id_token,
|
1992
|
+
new_oidc_challenge_request(id_token, previous_nonce) {
|
1989
1993
|
const ptr0 = passStringToWasm0(id_token, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
1990
1994
|
const len0 = WASM_VECTOR_LEN;
|
1991
|
-
const ptr1 = passStringToWasm0(
|
1995
|
+
const ptr1 = passStringToWasm0(previous_nonce, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
1992
1996
|
const len1 = WASM_VECTOR_LEN;
|
1993
|
-
const
|
1994
|
-
const len2 = WASM_VECTOR_LEN;
|
1995
|
-
const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_request(this.__wbg_ptr, ptr0, len0, ptr1, len1, ptr2, len2);
|
1997
|
+
const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_request(this.__wbg_ptr, ptr0, len0, ptr1, len1);
|
1996
1998
|
return takeObject(ret);
|
1997
1999
|
}
|
1998
|
-
new_oidc_challenge_response(
|
1999
|
-
|
2000
|
-
const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_response(this.__wbg_ptr, cc.__wbg_ptr, addHeapObject(challenge));
|
2000
|
+
new_oidc_challenge_response(challenge) {
|
2001
|
+
const ret = wasm.ffiwiree2eidentity_new_oidc_challenge_response(this.__wbg_ptr, addHeapObject(challenge));
|
2001
2002
|
return takeObject(ret);
|
2002
2003
|
}
|
2003
2004
|
check_order_request(order_url, previous_nonce) {
|
@@ -2028,10 +2029,6 @@ class FfiWireE2EIdentity {
|
|
2028
2029
|
const ret = wasm.ffiwiree2eidentity_certificate_request(this.__wbg_ptr, ptr0, len0);
|
2029
2030
|
return takeObject(ret);
|
2030
2031
|
}
|
2031
|
-
get_refresh_token() {
|
2032
|
-
const ret = wasm.ffiwiree2eidentity_get_refresh_token(this.__wbg_ptr);
|
2033
|
-
return takeObject(ret);
|
2034
|
-
}
|
2035
2032
|
}
|
2036
2033
|
|
2037
2034
|
class GroupInfoBundle {
|
@@ -2564,9 +2561,11 @@ class CoreCrypto2 {
|
|
2564
2561
|
isActive: m.is_active,
|
2565
2562
|
senderClientId: m.sender_client_id,
|
2566
2563
|
commitDelay: m.commit_delay,
|
2567
|
-
hasEpochChanged: m.has_epoch_changed
|
2564
|
+
hasEpochChanged: m.has_epoch_changed,
|
2565
|
+
crlNewDistributionPoints: m.crl_new_distribution_points
|
2568
2566
|
};
|
2569
|
-
})
|
2567
|
+
}),
|
2568
|
+
crlNewDistributionPoints: ffiDecryptedMessage.crl_new_distribution_points
|
2570
2569
|
};
|
2571
2570
|
return ret;
|
2572
2571
|
} catch (e) {
|
@@ -2918,11 +2917,11 @@ class E2eiEnrollment {
|
|
2918
2917
|
async newDpopChallengeResponse(challenge) {
|
2919
2918
|
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_dpop_challenge_response(challenge));
|
2920
2919
|
}
|
2921
|
-
async newOidcChallengeRequest(idToken,
|
2922
|
-
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_request(idToken,
|
2920
|
+
async newOidcChallengeRequest(idToken, previousNonce) {
|
2921
|
+
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_request(idToken, previousNonce));
|
2923
2922
|
}
|
2924
|
-
async newOidcChallengeResponse(
|
2925
|
-
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_response(
|
2923
|
+
async newOidcChallengeResponse(challenge) {
|
2924
|
+
return await CoreCryptoError.asyncMapErr(this.#enrollment.new_oidc_challenge_response(challenge));
|
2926
2925
|
}
|
2927
2926
|
async checkOrderRequest(orderUrl, previousNonce) {
|
2928
2927
|
return await CoreCryptoError.asyncMapErr(this.#enrollment.check_order_request(orderUrl, previousNonce));
|
@@ -2939,9 +2938,6 @@ class E2eiEnrollment {
|
|
2939
2938
|
async certificateRequest(previousNonce) {
|
2940
2939
|
return await CoreCryptoError.asyncMapErr(this.#enrollment.certificate_request(previousNonce));
|
2941
2940
|
}
|
2942
|
-
async getRefreshToken() {
|
2943
|
-
return await CoreCryptoError.asyncMapErr(this.#enrollment.get_refresh_token());
|
2944
|
-
}
|
2945
2941
|
}
|
2946
2942
|
var E2eiConversationState;
|
2947
2943
|
(function(E2eiConversationState2) {
|