@wireapp/core-crypto 1.0.0-rc.33 → 1.0.0-rc.34

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@wireapp/core-crypto",
3
- "version": "1.0.0-rc.33",
3
+ "version": "1.0.0-rc.34",
4
4
  "description": "CoreCrypto bindings for the Web",
5
5
  "type": "module",
6
6
  "module": "platforms/web/corecrypto.js",
@@ -1,5 +1,3 @@
1
- /* tslint:disable */
2
- /* eslint-disable */
3
1
  /**
4
2
  * see [core_crypto::prelude::DeviceStatus]
5
3
  */
@@ -94,6 +92,37 @@ export class NewAcmeOrder {
94
92
  readonly delegate: Uint8Array;
95
93
  }
96
94
  /**
95
+ */
96
+ export class ProposalBundle {
97
+ free(): void;
98
+ /**
99
+ * New CRL Distribution of members of this group
100
+ */
101
+ readonly crlNewDistributionPoints: (string)[] | undefined;
102
+ /**
103
+ * TLS-serialized MLS proposal that needs to be fanned out to other (existing) members of the conversation
104
+ */
105
+ readonly proposal: Uint8Array;
106
+ /**
107
+ * Unique identifier of a proposal. Use this in {@link CoreCrypto.clearPendingProposal} to roll back (delete) the proposal
108
+ */
109
+ readonly proposalRef: Uint8Array;
110
+ }
111
+ /**
112
+ * see [core_crypto::prelude::WelcomeBundle]
113
+ */
114
+ export class WelcomeBundle {
115
+ free(): void;
116
+ /**
117
+ * New CRL Distribution of members of this group
118
+ */
119
+ readonly crlNewDistributionPoints: (string)[] | undefined;
120
+ /**
121
+ * Identifier of the joined conversation
122
+ */
123
+ readonly id: Uint8Array;
124
+ }
125
+ /**
97
126
  * Represents the identity claims identifying a client
98
127
  * Those claims are verifiable by any member in the group
99
128
  */
@@ -291,6 +320,10 @@ export interface MemberAddedMessages {
291
320
  * @readonly
292
321
  */
293
322
  groupInfo: GroupInfoBundle;
323
+ /**
324
+ * New CRL distribution points that appeared by the introduction of a new credential
325
+ */
326
+ crlNewDistributionPoints?: string[];
294
327
  }
295
328
  /**
296
329
  * Data shape for a MLS generic commit + optional bundle (aka stapled commit & welcome)
@@ -387,6 +420,10 @@ export interface RotateBundle {
387
420
  * @readonly
388
421
  */
389
422
  keyPackageRefsToRemove: Uint8Array[];
423
+ /**
424
+ * New CRL distribution points that appeared by the introduction of a new credential
425
+ */
426
+ crlNewDistributionPoints?: string[];
390
427
  }
391
428
  /**
392
429
  * Params for CoreCrypto deferred initialization
@@ -451,6 +488,10 @@ export interface ConversationInitBundle {
451
488
  * @readonly
452
489
  */
453
490
  groupInfo: GroupInfoBundle;
491
+ /**
492
+ * New CRL distribution points that appeared by the introduction of a new credential
493
+ */
494
+ crlNewDistributionPoints?: string[];
454
495
  }
455
496
  /**
456
497
  * Supporting struct for CRL registration result
@@ -554,23 +595,6 @@ export interface BufferedDecryptedMessage {
554
595
  */
555
596
  crlNewDistributionPoints?: string[];
556
597
  }
557
- /**
558
- * Returned by all methods creating proposals. Contains a proposal message and an identifier to roll back the proposal
559
- */
560
- export interface ProposalBundle {
561
- /**
562
- * TLS-serialized MLS proposal that needs to be fanned out to other (existing) members of the conversation
563
- *
564
- * @readonly
565
- */
566
- proposal: Uint8Array;
567
- /**
568
- * Unique identifier of a proposal. Use this in {@link CoreCrypto.clearPendingProposal} to roll back (delete) the proposal
569
- *
570
- * @readonly
571
- */
572
- proposalRef: ProposalRef;
573
- }
574
598
  /**
575
599
  * MLS Proposal type
576
600
  */
@@ -875,7 +899,7 @@ export declare class CoreCrypto {
875
899
  * @param configuration - configuration of the MLS group
876
900
  * @returns The conversation ID of the newly joined group. You can use the same ID to decrypt/encrypt messages
877
901
  */
878
- processWelcomeMessage(welcomeMessage: Uint8Array, configuration?: CustomConfiguration): Promise<ConversationId>;
902
+ processWelcomeMessage(welcomeMessage: Uint8Array, configuration?: CustomConfiguration): Promise<WelcomeBundle>;
879
903
  /**
880
904
  * Get the client's public signature key. To upload to the DS for further backend side validation
881
905
  *
@@ -1202,38 +1226,38 @@ export declare class CoreCrypto {
1202
1226
  * @param clientId - client identifier e.g. `b7ac11a4-8f01-4527-af88-1c30885a7931:6add501bacd1d90e@example.com`
1203
1227
  * @param displayName - human-readable name displayed in the application e.g. `Smith, Alice M (QA)`
1204
1228
  * @param handle - user handle e.g. `alice.smith.qa@example.com`
1205
- * @param expiryDays - generated x509 certificate expiry
1229
+ * @param expirySec - generated x509 certificate expiry
1206
1230
  * @param ciphersuite - for generating signing key material
1207
1231
  * @param team - name of the Wire team a user belongs to
1208
1232
  * @returns The new {@link E2eiEnrollment} enrollment instance to use with {@link CoreCrypto.e2eiMlsInitOnly}
1209
1233
  */
1210
- e2eiNewEnrollment(clientId: string, displayName: string, handle: string, expiryDays: number, ciphersuite: Ciphersuite, team?: string): Promise<E2eiEnrollment>;
1234
+ e2eiNewEnrollment(clientId: string, displayName: string, handle: string, expirySec: number, ciphersuite: Ciphersuite, team?: string): Promise<E2eiEnrollment>;
1211
1235
  /**
1212
1236
  * Generates an E2EI enrollment instance for a "regular" client (with a Basic credential) willing to migrate to E2EI.
1213
1237
  * Once the enrollment is finished, use the instance in {@link CoreCrypto.e2eiRotateAll} to do the rotation.
1214
1238
  *
1215
1239
  * @param displayName - human-readable name displayed in the application e.g. `Smith, Alice M (QA)`
1216
1240
  * @param handle - user handle e.g. `alice.smith.qa@example.com`
1217
- * @param expiryDays - generated x509 certificate expiry
1241
+ * @param expirySec - generated x509 certificate expiry
1218
1242
  * @param ciphersuite - for generating signing key material
1219
1243
  * @param team - name of the Wire team a user belongs to
1220
1244
  * @returns The new {@link E2eiEnrollment} enrollment instance to use with {@link CoreCrypto.e2eiRotateAll}
1221
1245
  */
1222
- e2eiNewActivationEnrollment(displayName: string, handle: string, expiryDays: number, ciphersuite: Ciphersuite, team?: string): Promise<E2eiEnrollment>;
1246
+ e2eiNewActivationEnrollment(displayName: string, handle: string, expirySec: number, ciphersuite: Ciphersuite, team?: string): Promise<E2eiEnrollment>;
1223
1247
  /**
1224
1248
  * Generates an E2EI enrollment instance for a E2EI client (with a X509 certificate credential)
1225
1249
  * having to change/rotate their credential, either because the former one is expired or it
1226
1250
  * has been revoked. It lets you change the DisplayName or the handle
1227
1251
  * if you need to. Once the enrollment is finished, use the instance in {@link CoreCrypto.e2eiRotateAll} to do the rotation.
1228
1252
  *
1229
- * @param expiryDays - generated x509 certificate expiry
1253
+ * @param expirySec - generated x509 certificate expiry
1230
1254
  * @param ciphersuite - for generating signing key material
1231
1255
  * @param displayName - human-readable name displayed in the application e.g. `Smith, Alice M (QA)`
1232
1256
  * @param handle - user handle e.g. `alice.smith.qa@example.com`
1233
1257
  * @param team - name of the Wire team a user belongs to
1234
1258
  * @returns The new {@link E2eiEnrollment} enrollment instance to use with {@link CoreCrypto.e2eiRotateAll}
1235
1259
  */
1236
- e2eiNewRotateEnrollment(expiryDays: number, ciphersuite: Ciphersuite, displayName?: string, handle?: string, team?: string): Promise<E2eiEnrollment>;
1260
+ e2eiNewRotateEnrollment(expirySec: number, ciphersuite: Ciphersuite, displayName?: string, handle?: string, team?: string): Promise<E2eiEnrollment>;
1237
1261
  /**
1238
1262
  * Use this method to initialize end-to-end identity when a client signs up and the grace period is already expired ;
1239
1263
  * that means he cannot initialize with a Basic credential
@@ -232,7 +232,7 @@ var handleError = function(f, args) {
232
232
  wasm.__wbindgen_exn_store(addHeapObject(e));
233
233
  }
234
234
  };
235
- var __wbg_adapter_412 = function(arg0, arg1, arg2, arg3) {
235
+ var __wbg_adapter_417 = function(arg0, arg1, arg2, arg3) {
236
236
  wasm.wasm_bindgen__convert__closures__invoke2_mut__h639173e274a4a014(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
237
237
  };
238
238
  async function __wbg_load(module, imports) {
@@ -262,8 +262,12 @@ async function __wbg_load(module, imports) {
262
262
  var __wbg_get_imports = function() {
263
263
  const imports = {};
264
264
  imports.wbg = {};
265
- imports.wbg.__wbg_corecrypto_new = function(arg0) {
266
- const ret = CoreCrypto.__wrap(arg0);
265
+ imports.wbg.__wbindgen_number_new = function(arg0) {
266
+ const ret = arg0;
267
+ return addHeapObject(ret);
268
+ };
269
+ imports.wbg.__wbg_newacmeorder_new = function(arg0) {
270
+ const ret = NewAcmeOrder.__wrap(arg0);
267
271
  return addHeapObject(ret);
268
272
  };
269
273
  imports.wbg.__wbg_newacmeauthz_new = function(arg0) {
@@ -274,41 +278,41 @@ var __wbg_get_imports = function() {
274
278
  const ret = FfiWireE2EIdentity.__wrap(arg0);
275
279
  return addHeapObject(ret);
276
280
  };
277
- imports.wbg.__wbindgen_number_new = function(arg0) {
278
- const ret = arg0;
279
- return addHeapObject(ret);
281
+ imports.wbg.__wbindgen_object_drop_ref = function(arg0) {
282
+ takeObject(arg0);
280
283
  };
281
- imports.wbg.__wbg_acmedirectory_new = function(arg0) {
282
- const ret = AcmeDirectory.__wrap(arg0);
284
+ imports.wbg.__wbg_corecrypto_new = function(arg0) {
285
+ const ret = CoreCrypto.__wrap(arg0);
283
286
  return addHeapObject(ret);
284
287
  };
285
- imports.wbg.__wbg_commitbundle_new = function(arg0) {
286
- const ret = CommitBundle.__wrap(arg0);
288
+ imports.wbg.__wbg_proteusautoprekeybundle_new = function(arg0) {
289
+ const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
287
290
  return addHeapObject(ret);
288
291
  };
289
292
  imports.wbg.__wbg_proposalbundle_new = function(arg0) {
290
293
  const ret = ProposalBundle.__wrap(arg0);
291
294
  return addHeapObject(ret);
292
295
  };
293
- imports.wbg.__wbg_proteusautoprekeybundle_new = function(arg0) {
294
- const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
295
- return addHeapObject(ret);
296
- };
297
296
  imports.wbg.__wbg_buffereddecryptedmessage_new = function(arg0) {
298
297
  const ret = BufferedDecryptedMessage.__wrap(arg0);
299
298
  return addHeapObject(ret);
300
299
  };
301
- imports.wbg.__wbg_newacmeorder_new = function(arg0) {
302
- const ret = NewAcmeOrder.__wrap(arg0);
300
+ imports.wbg.__wbg_acmedirectory_new = function(arg0) {
301
+ const ret = AcmeDirectory.__wrap(arg0);
303
302
  return addHeapObject(ret);
304
303
  };
305
- imports.wbg.__wbindgen_object_drop_ref = function(arg0) {
306
- takeObject(arg0);
304
+ imports.wbg.__wbg_commitbundle_new = function(arg0) {
305
+ const ret = CommitBundle.__wrap(arg0);
306
+ return addHeapObject(ret);
307
307
  };
308
308
  imports.wbg.__wbindgen_object_clone_ref = function(arg0) {
309
309
  const ret = getObject(arg0);
310
310
  return addHeapObject(ret);
311
311
  };
312
+ imports.wbg.__wbindgen_bigint_from_u64 = function(arg0) {
313
+ const ret = BigInt.asUintN(64, arg0);
314
+ return addHeapObject(ret);
315
+ };
312
316
  imports.wbg.__wbindgen_string_new = function(arg0, arg1) {
313
317
  const ret = getStringFromWasm0(arg0, arg1);
314
318
  return addHeapObject(ret);
@@ -321,10 +325,6 @@ var __wbg_get_imports = function() {
321
325
  const ret = getObject(arg0) === null;
322
326
  return ret;
323
327
  };
324
- imports.wbg.__wbindgen_bigint_from_u64 = function(arg0) {
325
- const ret = BigInt.asUintN(64, arg0);
326
- return addHeapObject(ret);
327
- };
328
328
  imports.wbg.__wbindgen_string_get = function(arg0, arg1) {
329
329
  const obj = getObject(arg1);
330
330
  const ret = typeof obj === "string" ? obj : undefined;
@@ -886,7 +886,7 @@ var __wbg_get_imports = function() {
886
886
  const a = state0.a;
887
887
  state0.a = 0;
888
888
  try {
889
- return __wbg_adapter_412(a, state0.b, arg02, arg12);
889
+ return __wbg_adapter_417(a, state0.b, arg02, arg12);
890
890
  } finally {
891
891
  state0.a = a;
892
892
  }
@@ -966,12 +966,12 @@ var __wbg_get_imports = function() {
966
966
  const ret = wasm.memory;
967
967
  return addHeapObject(ret);
968
968
  };
969
- imports.wbg.__wbindgen_closure_wrapper2497 = function(arg0, arg1, arg2) {
969
+ imports.wbg.__wbindgen_closure_wrapper2502 = function(arg0, arg1, arg2) {
970
970
  const ret = makeMutClosure(arg0, arg1, 648, __wbg_adapter_54);
971
971
  return addHeapObject(ret);
972
972
  };
973
- imports.wbg.__wbindgen_closure_wrapper11427 = function(arg0, arg1, arg2) {
974
- const ret = makeMutClosure(arg0, arg1, 1583, __wbg_adapter_57);
973
+ imports.wbg.__wbindgen_closure_wrapper11505 = function(arg0, arg1, arg2) {
974
+ const ret = makeMutClosure(arg0, arg1, 1588, __wbg_adapter_57);
975
975
  return addHeapObject(ret);
976
976
  };
977
977
  return imports;
@@ -1033,13 +1033,11 @@ var cachedFloat64Memory0 = null;
1033
1033
  var cachedBigInt64Memory0 = null;
1034
1034
  var cachedUint32Memory0 = null;
1035
1035
  var cachedUint16Memory0 = null;
1036
- var DeviceStatus = Object.freeze({
1037
- Valid: 0,
1038
- "0": "Valid",
1039
- Expired: 1,
1040
- "1": "Expired",
1041
- Revoked: 2,
1042
- "2": "Revoked"
1036
+ var WirePolicy = Object.freeze({
1037
+ Plaintext: 1,
1038
+ "1": "Plaintext",
1039
+ Ciphertext: 2,
1040
+ "2": "Ciphertext"
1043
1041
  });
1044
1042
  var CredentialType = Object.freeze({
1045
1043
  Basic: 1,
@@ -1065,11 +1063,13 @@ var Ciphersuite = Object.freeze({
1065
1063
  MLS_128_X25519KYBER768DRAFT00_AES128GCM_SHA256_Ed25519: 61489,
1066
1064
  "61489": "MLS_128_X25519KYBER768DRAFT00_AES128GCM_SHA256_Ed25519"
1067
1065
  });
1068
- var WirePolicy = Object.freeze({
1069
- Plaintext: 1,
1070
- "1": "Plaintext",
1071
- Ciphertext: 2,
1072
- "2": "Ciphertext"
1066
+ var DeviceStatus = Object.freeze({
1067
+ Valid: 0,
1068
+ "0": "Valid",
1069
+ Expired: 1,
1070
+ "1": "Expired",
1071
+ Revoked: 2,
1072
+ "2": "Revoked"
1073
1073
  });
1074
1074
 
1075
1075
  class AcmeChallenge {
@@ -1268,9 +1268,21 @@ class BufferedDecryptedMessage {
1268
1268
  const ret = wasm.buffereddecryptedmessage_identity(this.__wbg_ptr);
1269
1269
  return ret === 0 ? undefined : WireIdentity.__wrap(ret);
1270
1270
  }
1271
- get crl_new_distribution_points() {
1272
- const ret = wasm.buffereddecryptedmessage_crl_new_distribution_points(this.__wbg_ptr);
1273
- return takeObject(ret);
1271
+ get crlNewDistributionPoints() {
1272
+ try {
1273
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
1274
+ wasm.__wbg_get_buffereddecryptedmessage_crlNewDistributionPoints(retptr, this.__wbg_ptr);
1275
+ var r0 = getInt32Memory0()[retptr / 4 + 0];
1276
+ var r1 = getInt32Memory0()[retptr / 4 + 1];
1277
+ let v1;
1278
+ if (r0 !== 0) {
1279
+ v1 = getArrayJsValueFromWasm0(r0, r1).slice();
1280
+ wasm.__wbindgen_free(r0, r1 * 4, 4);
1281
+ }
1282
+ return v1;
1283
+ } finally {
1284
+ wasm.__wbindgen_add_to_stack_pointer(16);
1285
+ }
1274
1286
  }
1275
1287
  }
1276
1288
 
@@ -1349,7 +1361,7 @@ class CoreCrypto {
1349
1361
  const ptr = this.__destroy_into_raw();
1350
1362
  wasm.__wbg_corecrypto_free(ptr);
1351
1363
  }
1352
- e2ei_new_enrollment(client_id, display_name, handle, team, expiry_days, ciphersuite) {
1364
+ e2ei_new_enrollment(client_id, display_name, handle, team, expiry_sec, ciphersuite) {
1353
1365
  const ptr0 = passStringToWasm0(client_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1354
1366
  const len0 = WASM_VECTOR_LEN;
1355
1367
  const ptr1 = passStringToWasm0(display_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
@@ -1358,27 +1370,27 @@ class CoreCrypto {
1358
1370
  const len2 = WASM_VECTOR_LEN;
1359
1371
  var ptr3 = isLikeNone(team) ? 0 : passStringToWasm0(team, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1360
1372
  var len3 = WASM_VECTOR_LEN;
1361
- const ret = wasm.corecrypto_e2ei_new_enrollment(this.__wbg_ptr, ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3, expiry_days, ciphersuite);
1373
+ const ret = wasm.corecrypto_e2ei_new_enrollment(this.__wbg_ptr, ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3, expiry_sec, ciphersuite);
1362
1374
  return takeObject(ret);
1363
1375
  }
1364
- e2ei_new_activation_enrollment(display_name, handle, team, expiry_days, ciphersuite) {
1376
+ e2ei_new_activation_enrollment(display_name, handle, team, expiry_sec, ciphersuite) {
1365
1377
  const ptr0 = passStringToWasm0(display_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1366
1378
  const len0 = WASM_VECTOR_LEN;
1367
1379
  const ptr1 = passStringToWasm0(handle, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1368
1380
  const len1 = WASM_VECTOR_LEN;
1369
1381
  var ptr2 = isLikeNone(team) ? 0 : passStringToWasm0(team, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1370
1382
  var len2 = WASM_VECTOR_LEN;
1371
- const ret = wasm.corecrypto_e2ei_new_activation_enrollment(this.__wbg_ptr, ptr0, len0, ptr1, len1, ptr2, len2, expiry_days, ciphersuite);
1383
+ const ret = wasm.corecrypto_e2ei_new_activation_enrollment(this.__wbg_ptr, ptr0, len0, ptr1, len1, ptr2, len2, expiry_sec, ciphersuite);
1372
1384
  return takeObject(ret);
1373
1385
  }
1374
- e2ei_new_rotate_enrollment(display_name, handle, team, expiry_days, ciphersuite) {
1386
+ e2ei_new_rotate_enrollment(display_name, handle, team, expiry_sec, ciphersuite) {
1375
1387
  var ptr0 = isLikeNone(display_name) ? 0 : passStringToWasm0(display_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1376
1388
  var len0 = WASM_VECTOR_LEN;
1377
1389
  var ptr1 = isLikeNone(handle) ? 0 : passStringToWasm0(handle, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1378
1390
  var len1 = WASM_VECTOR_LEN;
1379
1391
  var ptr2 = isLikeNone(team) ? 0 : passStringToWasm0(team, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
1380
1392
  var len2 = WASM_VECTOR_LEN;
1381
- const ret = wasm.corecrypto_e2ei_new_rotate_enrollment(this.__wbg_ptr, ptr0, len0, ptr1, len1, ptr2, len2, expiry_days, ciphersuite);
1393
+ const ret = wasm.corecrypto_e2ei_new_rotate_enrollment(this.__wbg_ptr, ptr0, len0, ptr1, len1, ptr2, len2, expiry_sec, ciphersuite);
1382
1394
  return takeObject(ret);
1383
1395
  }
1384
1396
  e2ei_register_acme_ca(trust_anchor_pem) {
@@ -2175,12 +2187,46 @@ class ProposalBundle {
2175
2187
  wasm.__wbg_proposalbundle_free(ptr);
2176
2188
  }
2177
2189
  get proposal() {
2178
- const ret = wasm.proposalbundle_proposal(this.__wbg_ptr);
2179
- return takeObject(ret);
2190
+ try {
2191
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2192
+ wasm.__wbg_get_acmechallenge_delegate(retptr, this.__wbg_ptr);
2193
+ var r0 = getInt32Memory0()[retptr / 4 + 0];
2194
+ var r1 = getInt32Memory0()[retptr / 4 + 1];
2195
+ var v1 = getArrayU8FromWasm0(r0, r1).slice();
2196
+ wasm.__wbindgen_free(r0, r1 * 1, 1);
2197
+ return v1;
2198
+ } finally {
2199
+ wasm.__wbindgen_add_to_stack_pointer(16);
2200
+ }
2180
2201
  }
2181
- get proposal_ref() {
2182
- const ret = wasm.proposalbundle_proposal_ref(this.__wbg_ptr);
2183
- return takeObject(ret);
2202
+ get proposalRef() {
2203
+ try {
2204
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2205
+ wasm.__wbg_get_proposalbundle_proposalRef(retptr, this.__wbg_ptr);
2206
+ var r0 = getInt32Memory0()[retptr / 4 + 0];
2207
+ var r1 = getInt32Memory0()[retptr / 4 + 1];
2208
+ var v1 = getArrayU8FromWasm0(r0, r1).slice();
2209
+ wasm.__wbindgen_free(r0, r1 * 1, 1);
2210
+ return v1;
2211
+ } finally {
2212
+ wasm.__wbindgen_add_to_stack_pointer(16);
2213
+ }
2214
+ }
2215
+ get crlNewDistributionPoints() {
2216
+ try {
2217
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2218
+ wasm.__wbg_get_proposalbundle_crlNewDistributionPoints(retptr, this.__wbg_ptr);
2219
+ var r0 = getInt32Memory0()[retptr / 4 + 0];
2220
+ var r1 = getInt32Memory0()[retptr / 4 + 1];
2221
+ let v1;
2222
+ if (r0 !== 0) {
2223
+ v1 = getArrayJsValueFromWasm0(r0, r1).slice();
2224
+ wasm.__wbindgen_free(r0, r1 * 4, 4);
2225
+ }
2226
+ return v1;
2227
+ } finally {
2228
+ wasm.__wbindgen_add_to_stack_pointer(16);
2229
+ }
2184
2230
  }
2185
2231
  }
2186
2232
 
@@ -2226,6 +2272,47 @@ class ProteusAutoPrekeyBundle {
2226
2272
  wasm.__wbg_set_proteusautoprekeybundle_pkb(this.__wbg_ptr, ptr0, len0);
2227
2273
  }
2228
2274
  }
2275
+ class WelcomeBundle {
2276
+ __destroy_into_raw() {
2277
+ const ptr = this.__wbg_ptr;
2278
+ this.__wbg_ptr = 0;
2279
+ return ptr;
2280
+ }
2281
+ free() {
2282
+ const ptr = this.__destroy_into_raw();
2283
+ wasm.__wbg_welcomebundle_free(ptr);
2284
+ }
2285
+ get id() {
2286
+ try {
2287
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2288
+ wasm.__wbg_get_acmechallenge_delegate(retptr, this.__wbg_ptr);
2289
+ var r0 = getInt32Memory0()[retptr / 4 + 0];
2290
+ var r1 = getInt32Memory0()[retptr / 4 + 1];
2291
+ var v1 = getArrayU8FromWasm0(r0, r1).slice();
2292
+ wasm.__wbindgen_free(r0, r1 * 1, 1);
2293
+ return v1;
2294
+ } finally {
2295
+ wasm.__wbindgen_add_to_stack_pointer(16);
2296
+ }
2297
+ }
2298
+ get crlNewDistributionPoints() {
2299
+ try {
2300
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2301
+ wasm.__wbg_get_welcomebundle_crlNewDistributionPoints(retptr, this.__wbg_ptr);
2302
+ var r0 = getInt32Memory0()[retptr / 4 + 0];
2303
+ var r1 = getInt32Memory0()[retptr / 4 + 1];
2304
+ let v1;
2305
+ if (r0 !== 0) {
2306
+ v1 = getArrayJsValueFromWasm0(r0, r1).slice();
2307
+ wasm.__wbindgen_free(r0, r1 * 4, 4);
2308
+ }
2309
+ return v1;
2310
+ } finally {
2311
+ wasm.__wbindgen_add_to_stack_pointer(16);
2312
+ }
2313
+ }
2314
+ }
2315
+
2229
2316
  class WireIdentity {
2230
2317
  static __wrap(ptr) {
2231
2318
  ptr = ptr >>> 0;
@@ -2542,7 +2629,7 @@ class CoreCrypto2 {
2542
2629
  }
2543
2630
  try {
2544
2631
  const ffiDecryptedMessage = await CoreCryptoError.asyncMapErr(this.#cc.decrypt_message(conversationId, payload));
2545
- const ffiCommitDelay = ffiDecryptedMessage.commit_delay;
2632
+ const ffiCommitDelay = ffiDecryptedMessage.commitDelay;
2546
2633
  let commitDelay = undefined;
2547
2634
  if (typeof ffiCommitDelay === "number" && ffiCommitDelay >= 0) {
2548
2635
  commitDelay = ffiCommitDelay * 1000;
@@ -2550,10 +2637,10 @@ class CoreCrypto2 {
2550
2637
  const ret = {
2551
2638
  message: ffiDecryptedMessage.message,
2552
2639
  proposals: ffiDecryptedMessage.proposals,
2553
- isActive: ffiDecryptedMessage.is_active,
2640
+ isActive: ffiDecryptedMessage.isActive,
2554
2641
  senderClientId: ffiDecryptedMessage.sender_client_id,
2555
2642
  commitDelay,
2556
- hasEpochChanged: ffiDecryptedMessage.has_epoch_changed,
2643
+ hasEpochChanged: ffiDecryptedMessage.hasEpochChanged,
2557
2644
  bufferedMessages: ffiDecryptedMessage.buffered_messages?.map((m) => {
2558
2645
  return {
2559
2646
  message: m.message,
@@ -2562,10 +2649,10 @@ class CoreCrypto2 {
2562
2649
  senderClientId: m.sender_client_id,
2563
2650
  commitDelay: m.commit_delay,
2564
2651
  hasEpochChanged: m.has_epoch_changed,
2565
- crlNewDistributionPoints: m.crl_new_distribution_points
2652
+ crlNewDistributionPoints: m.crlNewDistributionPoints
2566
2653
  };
2567
2654
  }),
2568
- crlNewDistributionPoints: ffiDecryptedMessage.crl_new_distribution_points
2655
+ crlNewDistributionPoints: ffiDecryptedMessage.crlNewDistributionPoints
2569
2656
  };
2570
2657
  return ret;
2571
2658
  } catch (e) {
@@ -2607,7 +2694,8 @@ class CoreCrypto2 {
2607
2694
  encryptionType: gi.encryption_type,
2608
2695
  ratchetTreeType: gi.ratchet_tree_type,
2609
2696
  payload: gi.payload
2610
- }
2697
+ },
2698
+ crlNewDistributionPoints: ffiRet.crlNewDistributionPoints
2611
2699
  };
2612
2700
  return ret;
2613
2701
  } catch (e) {
@@ -2714,7 +2802,8 @@ class CoreCrypto2 {
2714
2802
  encryptionType: gi.encryption_type,
2715
2803
  ratchetTreeType: gi.ratchet_tree_type,
2716
2804
  payload: gi.payload
2717
- }
2805
+ },
2806
+ crlNewDistributionPoints: ffiInitMessage.crlNewDistributionPoints
2718
2807
  };
2719
2808
  return ret;
2720
2809
  } catch (e) {
@@ -2813,16 +2902,16 @@ class CoreCrypto2 {
2813
2902
  async proteusLastErrorCode() {
2814
2903
  return await this.#cc.proteus_last_error_code();
2815
2904
  }
2816
- async e2eiNewEnrollment(clientId, displayName, handle, expiryDays, ciphersuite, team) {
2817
- const e2ei = await CoreCryptoError.asyncMapErr(this.#cc.e2ei_new_enrollment(clientId, displayName, handle, team, expiryDays, ciphersuite));
2905
+ async e2eiNewEnrollment(clientId, displayName, handle, expirySec, ciphersuite, team) {
2906
+ const e2ei = await CoreCryptoError.asyncMapErr(this.#cc.e2ei_new_enrollment(clientId, displayName, handle, team, expirySec, ciphersuite));
2818
2907
  return new E2eiEnrollment(e2ei);
2819
2908
  }
2820
- async e2eiNewActivationEnrollment(displayName, handle, expiryDays, ciphersuite, team) {
2821
- const e2ei = await CoreCryptoError.asyncMapErr(this.#cc.e2ei_new_activation_enrollment(displayName, handle, team, expiryDays, ciphersuite));
2909
+ async e2eiNewActivationEnrollment(displayName, handle, expirySec, ciphersuite, team) {
2910
+ const e2ei = await CoreCryptoError.asyncMapErr(this.#cc.e2ei_new_activation_enrollment(displayName, handle, team, expirySec, ciphersuite));
2822
2911
  return new E2eiEnrollment(e2ei);
2823
2912
  }
2824
- async e2eiNewRotateEnrollment(expiryDays, ciphersuite, displayName, handle, team) {
2825
- const e2ei = await CoreCryptoError.asyncMapErr(this.#cc.e2ei_new_rotate_enrollment(displayName, handle, team, expiryDays, ciphersuite));
2913
+ async e2eiNewRotateEnrollment(expirySec, ciphersuite, displayName, handle, team) {
2914
+ const e2ei = await CoreCryptoError.asyncMapErr(this.#cc.e2ei_new_rotate_enrollment(displayName, handle, team, expirySec, ciphersuite));
2826
2915
  return new E2eiEnrollment(e2ei);
2827
2916
  }
2828
2917
  async e2eiMlsInitOnly(enrollment, certificateChain, nbKeyPackage) {
@@ -2842,7 +2931,8 @@ class CoreCrypto2 {
2842
2931
  const ret = {
2843
2932
  commits: ffiRet.commits,
2844
2933
  newKeyPackages: ffiRet.new_key_packages,
2845
- keyPackageRefsToRemove: ffiRet.key_package_refs_to_remove
2934
+ keyPackageRefsToRemove: ffiRet.key_package_refs_to_remove,
2935
+ crlNewDistributionPoints: ffiRet.crlNewDistributionPoints
2846
2936
  };
2847
2937
  return ret;
2848
2938
  }
@@ -2948,8 +3038,10 @@ var E2eiConversationState;
2948
3038
  export {
2949
3039
  WirePolicy2 as WirePolicy,
2950
3040
  WireIdentity,
3041
+ WelcomeBundle,
2951
3042
  RatchetTreeType,
2952
3043
  ProposalType,
3044
+ ProposalBundle,
2953
3045
  NewAcmeOrder,
2954
3046
  NewAcmeAuthz,
2955
3047
  GroupInfoEncryptionType,