@wireapp/core-crypto 1.0.0-rc.38 → 1.0.0-rc.40

Sign up to get free protection for your applications and to get access to all the features.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@wireapp/core-crypto",
3
- "version": "1.0.0-rc.38",
3
+ "version": "1.0.0-rc.40",
4
4
  "description": "CoreCrypto bindings for the Web",
5
5
  "type": "module",
6
6
  "module": "platforms/web/corecrypto.js",
@@ -1,21 +1,4 @@
1
1
  /**
2
- * see [core_crypto::prelude::DeviceStatus]
3
- */
4
- export enum DeviceStatus {
5
- /**
6
- * All is fine
7
- */
8
- Valid = 0,
9
- /**
10
- * The Credential's certificate is expired
11
- */
12
- Expired = 1,
13
- /**
14
- * The Credential's certificate is revoked (not implemented yet)
15
- */
16
- Revoked = 2
17
- }
18
- /**
19
2
  * For creating a challenge.
20
3
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
21
4
  */
@@ -36,29 +19,6 @@ export class AcmeChallenge {
36
19
  readonly url: string;
37
20
  }
38
21
  /**
39
- * Holds URLs of all the standard ACME endpoint supported on an ACME server.
40
- * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.1.1
41
- */
42
- export class AcmeDirectory {
43
- free(): void;
44
- /**
45
- * URL for creating a new account.
46
- */
47
- readonly newAccount: string;
48
- /**
49
- * URL for fetching a new nonce. Use this only for creating a new account.
50
- */
51
- readonly newNonce: string;
52
- /**
53
- * URL for creating a new order.
54
- */
55
- readonly newOrder: string;
56
- /**
57
- * Revocation URL
58
- */
59
- readonly revokeCert: string;
60
- }
61
- /**
62
22
  * Result of an authorization creation.
63
23
  * @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5
64
24
  */
@@ -91,41 +51,6 @@ export class NewAcmeOrder {
91
51
  */
92
52
  readonly delegate: Uint8Array;
93
53
  }
94
- /**
95
- * Represents the identity claims identifying a client
96
- * Those claims are verifiable by any member in the group
97
- */
98
- export class WireIdentity {
99
- free(): void;
100
- /**
101
- * X509 certificate identifying this client in the MLS group ; PEM encoded
102
- */
103
- readonly certificate: string;
104
- /**
105
- * Unique client identifier e.g. `T4Coy4vdRzianwfOgXpn6A:6add501bacd1d90e@whitehouse.gov`
106
- */
107
- readonly clientId: string;
108
- /**
109
- * Name as displayed in the messaging application e.g. `John Fitzgerald Kennedy`
110
- */
111
- readonly displayName: string;
112
- /**
113
- * DNS domain for which this identity proof was generated e.g. `whitehouse.gov`
114
- */
115
- readonly domain: string;
116
- /**
117
- * user handle e.g. `john_wire`
118
- */
119
- readonly handle: string;
120
- /**
121
- * Status of the Credential at the moment T when this object is created
122
- */
123
- readonly status: DeviceStatus;
124
- /**
125
- * MLS thumbprint
126
- */
127
- readonly thumbprint: string;
128
- }
129
54
  /**
130
55
  * Error wrapper that takes care of extracting rich error details across the FFI (through JSON parsing)
131
56
  *
@@ -564,6 +489,88 @@ export interface BufferedDecryptedMessage {
564
489
  */
565
490
  crlNewDistributionPoints?: string[];
566
491
  }
492
+ /**
493
+ * Represents the identity claims identifying a client
494
+ * Those claims are verifiable by any member in the group
495
+ */
496
+ export interface WireIdentity {
497
+ /**
498
+ * Unique client identifier
499
+ */
500
+ clientId: string;
501
+ /**
502
+ * User handle e.g. `john_wire`
503
+ */
504
+ handle: string;
505
+ /**
506
+ * Name as displayed in the messaging application e.g. `John Fitzgerald Kennedy`
507
+ */
508
+ displayName: string;
509
+ /**
510
+ * DNS domain for which this identity proof was generated e.g. `whitehouse.gov`
511
+ */
512
+ domain: string;
513
+ /**
514
+ * X509 certificate identifying this client in the MLS group ; PEM encoded
515
+ */
516
+ certificate: string;
517
+ /**
518
+ * Status of the Credential at the moment T when this object is created
519
+ */
520
+ status: DeviceStatus;
521
+ /**
522
+ * MLS thumbprint
523
+ */
524
+ thumbprint: string;
525
+ /**
526
+ * X509 certificate serial number
527
+ */
528
+ serialNumber: string;
529
+ /**
530
+ * X509 certificate not before as Unix timestamp
531
+ */
532
+ notBefore: bigint;
533
+ /**
534
+ * X509 certificate not after as Unix timestamp
535
+ */
536
+ notAfter: bigint;
537
+ }
538
+ export interface AcmeDirectory {
539
+ /**
540
+ * URL for fetching a new nonce. Use this only for creating a new account.
541
+ */
542
+ newNonce: string;
543
+ /**
544
+ * URL for creating a new account.
545
+ */
546
+ newAccount: string;
547
+ /**
548
+ * URL for creating a new order.
549
+ */
550
+ newOrder: string;
551
+ /**
552
+ * Revocation URL
553
+ */
554
+ revokeCert: string;
555
+ }
556
+ /**
557
+ * Indicates the standalone status of a device Credential in a MLS group at a moment T.
558
+ * This does not represent the states where a device is not using MLS or is not using end-to-end identity
559
+ */
560
+ export declare enum DeviceStatus {
561
+ /**
562
+ * All is fine
563
+ */
564
+ Valid = 0,
565
+ /**
566
+ * The Credential's certificate is expired
567
+ */
568
+ Expired = 1,
569
+ /**
570
+ * The Credential's certificate is revoked
571
+ */
572
+ Revoked = 2
573
+ }
567
574
  /**
568
575
  * Returned by all methods creating proposals. Contains a proposal message and an identifier to roll back the proposal
569
576
  */
@@ -160,12 +160,12 @@ var makeMutClosure = function(arg0, arg1, dtor, f) {
160
160
  return real;
161
161
  };
162
162
  var __wbg_adapter_54 = function(arg0, arg1, arg2) {
163
- wasm.wasm_bindgen__convert__closures__invoke1_mut__h6214bffb5ea801ae(arg0, arg1, addHeapObject(arg2));
163
+ wasm.wasm_bindgen__convert__closures__invoke1_mut__h601e8bd711f8c2cf(arg0, arg1, addHeapObject(arg2));
164
164
  };
165
165
  var __wbg_adapter_57 = function(arg0, arg1, arg2) {
166
166
  try {
167
167
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
168
- wasm.wasm_bindgen__convert__closures__invoke1_mut__h989080a8cafb4923(retptr, arg0, arg1, addHeapObject(arg2));
168
+ wasm.wasm_bindgen__convert__closures__invoke1_mut__h853f0d8ce45de15b(retptr, arg0, arg1, addHeapObject(arg2));
169
169
  var r0 = getInt32Memory0()[retptr / 4 + 0];
170
170
  var r1 = getInt32Memory0()[retptr / 4 + 1];
171
171
  if (r1) {
@@ -235,8 +235,8 @@ var handleError = function(f, args) {
235
235
  wasm.__wbindgen_exn_store(addHeapObject(e));
236
236
  }
237
237
  };
238
- var __wbg_adapter_418 = function(arg0, arg1, arg2, arg3) {
239
- wasm.wasm_bindgen__convert__closures__invoke2_mut__h3ec715bfa3ffd58a(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
238
+ var __wbg_adapter_421 = function(arg0, arg1, arg2, arg3) {
239
+ wasm.wasm_bindgen__convert__closures__invoke2_mut__h6bedc2125abb8b9f(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
240
240
  };
241
241
  async function __wbg_load(module, imports) {
242
242
  if (typeof Response === "function" && module instanceof Response) {
@@ -265,47 +265,47 @@ async function __wbg_load(module, imports) {
265
265
  var __wbg_get_imports = function() {
266
266
  const imports = {};
267
267
  imports.wbg = {};
268
- imports.wbg.__wbindgen_number_new = function(arg0) {
269
- const ret = arg0;
268
+ imports.wbg.__wbg_commitbundle_new = function(arg0) {
269
+ const ret = CommitBundle.__wrap(arg0);
270
270
  return addHeapObject(ret);
271
271
  };
272
- imports.wbg.__wbg_newacmeorder_new = function(arg0) {
273
- const ret = NewAcmeOrder.__wrap(arg0);
272
+ imports.wbg.__wbindgen_number_new = function(arg0) {
273
+ const ret = arg0;
274
274
  return addHeapObject(ret);
275
275
  };
276
- imports.wbg.__wbg_buffereddecryptedmessage_new = function(arg0) {
277
- const ret = BufferedDecryptedMessage.__wrap(arg0);
276
+ imports.wbg.__wbg_ffiwiree2eidentity_new = function(arg0) {
277
+ const ret = FfiWireE2EIdentity.__wrap(arg0);
278
278
  return addHeapObject(ret);
279
279
  };
280
- imports.wbg.__wbg_acmedirectory_new = function(arg0) {
281
- const ret = AcmeDirectory.__wrap(arg0);
280
+ imports.wbg.__wbg_corecrypto_new = function(arg0) {
281
+ const ret = CoreCrypto.__wrap(arg0);
282
282
  return addHeapObject(ret);
283
283
  };
284
284
  imports.wbg.__wbg_newacmeauthz_new = function(arg0) {
285
285
  const ret = NewAcmeAuthz.__wrap(arg0);
286
286
  return addHeapObject(ret);
287
287
  };
288
- imports.wbg.__wbg_corecrypto_new = function(arg0) {
289
- const ret = CoreCrypto.__wrap(arg0);
288
+ imports.wbg.__wbg_acmedirectory_new = function(arg0) {
289
+ const ret = AcmeDirectory.__wrap(arg0);
290
290
  return addHeapObject(ret);
291
291
  };
292
292
  imports.wbg.__wbindgen_object_drop_ref = function(arg0) {
293
293
  takeObject(arg0);
294
294
  };
295
- imports.wbg.__wbg_proteusautoprekeybundle_new = function(arg0) {
296
- const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
295
+ imports.wbg.__wbg_newacmeorder_new = function(arg0) {
296
+ const ret = NewAcmeOrder.__wrap(arg0);
297
297
  return addHeapObject(ret);
298
298
  };
299
- imports.wbg.__wbg_commitbundle_new = function(arg0) {
300
- const ret = CommitBundle.__wrap(arg0);
299
+ imports.wbg.__wbg_proposalbundle_new = function(arg0) {
300
+ const ret = ProposalBundle.__wrap(arg0);
301
301
  return addHeapObject(ret);
302
302
  };
303
- imports.wbg.__wbg_ffiwiree2eidentity_new = function(arg0) {
304
- const ret = FfiWireE2EIdentity.__wrap(arg0);
303
+ imports.wbg.__wbg_proteusautoprekeybundle_new = function(arg0) {
304
+ const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
305
305
  return addHeapObject(ret);
306
306
  };
307
- imports.wbg.__wbg_proposalbundle_new = function(arg0) {
308
- const ret = ProposalBundle.__wrap(arg0);
307
+ imports.wbg.__wbg_buffereddecryptedmessage_new = function(arg0) {
308
+ const ret = BufferedDecryptedMessage.__wrap(arg0);
309
309
  return addHeapObject(ret);
310
310
  };
311
311
  imports.wbg.__wbindgen_object_clone_ref = function(arg0) {
@@ -316,6 +316,10 @@ var __wbg_get_imports = function() {
316
316
  const ret = getStringFromWasm0(arg0, arg1);
317
317
  return addHeapObject(ret);
318
318
  };
319
+ imports.wbg.__wbindgen_bigint_from_u64 = function(arg0) {
320
+ const ret = BigInt.asUintN(64, arg0);
321
+ return addHeapObject(ret);
322
+ };
319
323
  imports.wbg.__wbindgen_is_undefined = function(arg0) {
320
324
  const ret = getObject(arg0) === undefined;
321
325
  return ret;
@@ -324,10 +328,6 @@ var __wbg_get_imports = function() {
324
328
  const ret = getObject(arg0) === null;
325
329
  return ret;
326
330
  };
327
- imports.wbg.__wbindgen_bigint_from_u64 = function(arg0) {
328
- const ret = BigInt.asUintN(64, arg0);
329
- return addHeapObject(ret);
330
- };
331
331
  imports.wbg.__wbindgen_string_get = function(arg0, arg1) {
332
332
  const obj = getObject(arg1);
333
333
  const ret = typeof obj === "string" ? obj : undefined;
@@ -889,7 +889,7 @@ var __wbg_get_imports = function() {
889
889
  const a = state0.a;
890
890
  state0.a = 0;
891
891
  try {
892
- return __wbg_adapter_418(a, state0.b, arg02, arg12);
892
+ return __wbg_adapter_421(a, state0.b, arg02, arg12);
893
893
  } finally {
894
894
  state0.a = a;
895
895
  }
@@ -969,12 +969,12 @@ var __wbg_get_imports = function() {
969
969
  const ret = wasm.memory;
970
970
  return addHeapObject(ret);
971
971
  };
972
- imports.wbg.__wbindgen_closure_wrapper2574 = function(arg0, arg1, arg2) {
972
+ imports.wbg.__wbindgen_closure_wrapper2578 = function(arg0, arg1, arg2) {
973
973
  const ret = makeMutClosure(arg0, arg1, 652, __wbg_adapter_54);
974
974
  return addHeapObject(ret);
975
975
  };
976
- imports.wbg.__wbindgen_closure_wrapper13175 = function(arg0, arg1, arg2) {
977
- const ret = makeMutClosure(arg0, arg1, 2176, __wbg_adapter_57);
976
+ imports.wbg.__wbindgen_closure_wrapper13188 = function(arg0, arg1, arg2) {
977
+ const ret = makeMutClosure(arg0, arg1, 2185, __wbg_adapter_57);
978
978
  return addHeapObject(ret);
979
979
  };
980
980
  return imports;
@@ -1041,6 +1041,14 @@ var CLOSURE_DTORS = typeof FinalizationRegistry === "undefined" ? { register: ()
1041
1041
  });
1042
1042
  var cachedUint32Memory0 = null;
1043
1043
  var cachedUint16Memory0 = null;
1044
+ var DeviceStatus = Object.freeze({
1045
+ Valid: 0,
1046
+ "0": "Valid",
1047
+ Expired: 1,
1048
+ "1": "Expired",
1049
+ Revoked: 2,
1050
+ "2": "Revoked"
1051
+ });
1044
1052
  var CredentialType = Object.freeze({
1045
1053
  Basic: 1,
1046
1054
  "1": "Basic",
@@ -1065,14 +1073,6 @@ var Ciphersuite = Object.freeze({
1065
1073
  MLS_128_X25519KYBER768DRAFT00_AES128GCM_SHA256_Ed25519: 61489,
1066
1074
  "61489": "MLS_128_X25519KYBER768DRAFT00_AES128GCM_SHA256_Ed25519"
1067
1075
  });
1068
- var DeviceStatus = Object.freeze({
1069
- Valid: 0,
1070
- "0": "Valid",
1071
- Expired: 1,
1072
- "1": "Expired",
1073
- Revoked: 2,
1074
- "2": "Revoked"
1075
- });
1076
1076
  var WirePolicy = Object.freeze({
1077
1077
  Plaintext: 1,
1078
1078
  "1": "Plaintext",
@@ -1169,12 +1169,12 @@ class AcmeDirectory {
1169
1169
  const ptr = this.__destroy_into_raw();
1170
1170
  wasm.__wbg_acmedirectory_free(ptr);
1171
1171
  }
1172
- get newNonce() {
1172
+ get new_nonce() {
1173
1173
  let deferred1_0;
1174
1174
  let deferred1_1;
1175
1175
  try {
1176
1176
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
1177
- wasm.__wbg_get_acmedirectory_newNonce(retptr, this.__wbg_ptr);
1177
+ wasm.__wbg_get_acmedirectory_new_nonce(retptr, this.__wbg_ptr);
1178
1178
  var r0 = getInt32Memory0()[retptr / 4 + 0];
1179
1179
  var r1 = getInt32Memory0()[retptr / 4 + 1];
1180
1180
  deferred1_0 = r0;
@@ -1185,7 +1185,7 @@ class AcmeDirectory {
1185
1185
  wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);
1186
1186
  }
1187
1187
  }
1188
- get newAccount() {
1188
+ get new_account() {
1189
1189
  let deferred1_0;
1190
1190
  let deferred1_1;
1191
1191
  try {
@@ -1201,7 +1201,7 @@ class AcmeDirectory {
1201
1201
  wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);
1202
1202
  }
1203
1203
  }
1204
- get newOrder() {
1204
+ get new_order() {
1205
1205
  let deferred1_0;
1206
1206
  let deferred1_1;
1207
1207
  try {
@@ -1217,12 +1217,12 @@ class AcmeDirectory {
1217
1217
  wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);
1218
1218
  }
1219
1219
  }
1220
- get revokeCert() {
1220
+ get revoke_cert() {
1221
1221
  let deferred1_0;
1222
1222
  let deferred1_1;
1223
1223
  try {
1224
1224
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
1225
- wasm.__wbg_get_acmedirectory_revokeCert(retptr, this.__wbg_ptr);
1225
+ wasm.__wbg_get_acmedirectory_revoke_cert(retptr, this.__wbg_ptr);
1226
1226
  var r0 = getInt32Memory0()[retptr / 4 + 0];
1227
1227
  var r1 = getInt32Memory0()[retptr / 4 + 1];
1228
1228
  deferred1_0 = r0;
@@ -2163,7 +2163,7 @@ class NewAcmeAuthz {
2163
2163
  let deferred1_1;
2164
2164
  try {
2165
2165
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2166
- wasm.__wbg_get_acmedirectory_newNonce(retptr, this.__wbg_ptr);
2166
+ wasm.__wbg_get_acmedirectory_new_nonce(retptr, this.__wbg_ptr);
2167
2167
  var r0 = getInt32Memory0()[retptr / 4 + 0];
2168
2168
  var r1 = getInt32Memory0()[retptr / 4 + 1];
2169
2169
  deferred1_0 = r0;
@@ -2355,12 +2355,12 @@ class WireIdentity {
2355
2355
  const ptr = this.__destroy_into_raw();
2356
2356
  wasm.__wbg_wireidentity_free(ptr);
2357
2357
  }
2358
- get clientId() {
2358
+ get client_id() {
2359
2359
  let deferred1_0;
2360
2360
  let deferred1_1;
2361
2361
  try {
2362
2362
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2363
- wasm.__wbg_get_acmedirectory_newNonce(retptr, this.__wbg_ptr);
2363
+ wasm.__wbg_get_wireidentity_client_id(retptr, this.__wbg_ptr);
2364
2364
  var r0 = getInt32Memory0()[retptr / 4 + 0];
2365
2365
  var r1 = getInt32Memory0()[retptr / 4 + 1];
2366
2366
  deferred1_0 = r0;
@@ -2376,7 +2376,7 @@ class WireIdentity {
2376
2376
  let deferred1_1;
2377
2377
  try {
2378
2378
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2379
- wasm.__wbg_get_acmechallenge_url(retptr, this.__wbg_ptr);
2379
+ wasm.__wbg_get_wireidentity_handle(retptr, this.__wbg_ptr);
2380
2380
  var r0 = getInt32Memory0()[retptr / 4 + 0];
2381
2381
  var r1 = getInt32Memory0()[retptr / 4 + 1];
2382
2382
  deferred1_0 = r0;
@@ -2387,12 +2387,12 @@ class WireIdentity {
2387
2387
  wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);
2388
2388
  }
2389
2389
  }
2390
- get displayName() {
2390
+ get display_name() {
2391
2391
  let deferred1_0;
2392
2392
  let deferred1_1;
2393
2393
  try {
2394
2394
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2395
- wasm.__wbg_get_acmechallenge_target(retptr, this.__wbg_ptr);
2395
+ wasm.__wbg_get_wireidentity_display_name(retptr, this.__wbg_ptr);
2396
2396
  var r0 = getInt32Memory0()[retptr / 4 + 0];
2397
2397
  var r1 = getInt32Memory0()[retptr / 4 + 1];
2398
2398
  deferred1_0 = r0;
@@ -2408,7 +2408,7 @@ class WireIdentity {
2408
2408
  let deferred1_1;
2409
2409
  try {
2410
2410
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2411
- wasm.__wbg_get_acmedirectory_revokeCert(retptr, this.__wbg_ptr);
2411
+ wasm.__wbg_get_wireidentity_domain(retptr, this.__wbg_ptr);
2412
2412
  var r0 = getInt32Memory0()[retptr / 4 + 0];
2413
2413
  var r1 = getInt32Memory0()[retptr / 4 + 1];
2414
2414
  deferred1_0 = r0;
@@ -2455,6 +2455,30 @@ class WireIdentity {
2455
2455
  wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);
2456
2456
  }
2457
2457
  }
2458
+ get serial_number() {
2459
+ let deferred1_0;
2460
+ let deferred1_1;
2461
+ try {
2462
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2463
+ wasm.__wbg_get_wireidentity_serial_number(retptr, this.__wbg_ptr);
2464
+ var r0 = getInt32Memory0()[retptr / 4 + 0];
2465
+ var r1 = getInt32Memory0()[retptr / 4 + 1];
2466
+ deferred1_0 = r0;
2467
+ deferred1_1 = r1;
2468
+ return getStringFromWasm0(r0, r1);
2469
+ } finally {
2470
+ wasm.__wbindgen_add_to_stack_pointer(16);
2471
+ wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);
2472
+ }
2473
+ }
2474
+ get not_before() {
2475
+ const ret = wasm.__wbg_get_wireidentity_not_before(this.__wbg_ptr);
2476
+ return BigInt.asUintN(64, ret);
2477
+ }
2478
+ get not_after() {
2479
+ const ret = wasm.__wbg_get_wireidentity_not_after(this.__wbg_ptr);
2480
+ return BigInt.asUintN(64, ret);
2481
+ }
2458
2482
  }
2459
2483
  var core_crypto_ffi_default = __wbg_init;
2460
2484
 
@@ -2537,6 +2561,29 @@ var RatchetTreeType;
2537
2561
  RatchetTreeType2[RatchetTreeType2["Delta"] = 2] = "Delta";
2538
2562
  RatchetTreeType2[RatchetTreeType2["ByRef"] = 3] = "ByRef";
2539
2563
  })(RatchetTreeType || (RatchetTreeType = {}));
2564
+ var mapWireIdentity = (ffiIdentity) => {
2565
+ if (!ffiIdentity) {
2566
+ return;
2567
+ }
2568
+ return {
2569
+ clientId: ffiIdentity.client_id,
2570
+ handle: ffiIdentity.handle,
2571
+ displayName: ffiIdentity.display_name,
2572
+ domain: ffiIdentity.domain,
2573
+ certificate: ffiIdentity.certificate,
2574
+ status: ffiIdentity.status,
2575
+ thumbprint: ffiIdentity.thumbprint,
2576
+ serialNumber: ffiIdentity.serial_number,
2577
+ notBefore: ffiIdentity.not_before,
2578
+ notAfter: ffiIdentity.not_after
2579
+ };
2580
+ };
2581
+ var DeviceStatus2;
2582
+ (function(DeviceStatus3) {
2583
+ DeviceStatus3[DeviceStatus3["Valid"] = 0] = "Valid";
2584
+ DeviceStatus3[DeviceStatus3["Expired"] = 1] = "Expired";
2585
+ DeviceStatus3[DeviceStatus3["Revoked"] = 2] = "Revoked";
2586
+ })(DeviceStatus2 || (DeviceStatus2 = {}));
2540
2587
  var ProposalType;
2541
2588
  (function(ProposalType2) {
2542
2589
  ProposalType2[ProposalType2["Add"] = 0] = "Add";
@@ -2660,24 +2707,25 @@ class CoreCrypto2 {
2660
2707
  if (typeof ffiCommitDelay === "number" && ffiCommitDelay >= 0) {
2661
2708
  commitDelay = ffiCommitDelay * 1000;
2662
2709
  }
2710
+ const identity = mapWireIdentity(ffiDecryptedMessage.identity);
2663
2711
  const ret = {
2664
2712
  message: ffiDecryptedMessage.message,
2665
2713
  proposals: ffiDecryptedMessage.proposals,
2666
2714
  isActive: ffiDecryptedMessage.is_active,
2667
2715
  senderClientId: ffiDecryptedMessage.sender_client_id,
2668
2716
  commitDelay,
2717
+ identity,
2669
2718
  hasEpochChanged: ffiDecryptedMessage.has_epoch_changed,
2670
- bufferedMessages: ffiDecryptedMessage.buffered_messages?.map((m) => {
2671
- return {
2672
- message: m.message,
2673
- proposals: m.proposals,
2674
- isActive: m.is_active,
2675
- senderClientId: m.sender_client_id,
2676
- commitDelay: m.commit_delay,
2677
- hasEpochChanged: m.has_epoch_changed,
2678
- crlNewDistributionPoints: m.crl_new_distribution_points
2679
- };
2680
- }),
2719
+ bufferedMessages: ffiDecryptedMessage.buffered_messages?.map((m) => ({
2720
+ message: m.message,
2721
+ proposals: m.proposals,
2722
+ isActive: m.is_active,
2723
+ senderClientId: m.sender_client_id,
2724
+ commitDelay: m.commit_delay,
2725
+ identity: mapWireIdentity(m.identity),
2726
+ hasEpochChanged: m.has_epoch_changed,
2727
+ crlNewDistributionPoints: m.crl_new_distribution_points
2728
+ })),
2681
2729
  crlNewDistributionPoints: ffiDecryptedMessage.crl_new_distribution_points
2682
2730
  };
2683
2731
  return ret;
@@ -2985,10 +3033,19 @@ class CoreCrypto2 {
2985
3033
  return await CoreCryptoError.asyncMapErr(this.#cc.e2ei_is_enabled(ciphersuite));
2986
3034
  }
2987
3035
  async getDeviceIdentities(conversationId, deviceIds) {
2988
- return await CoreCryptoError.asyncMapErr(this.#cc.get_device_identities(conversationId, deviceIds));
3036
+ return (await CoreCryptoError.asyncMapErr(this.#cc.get_device_identities(conversationId, deviceIds))).map(mapWireIdentity);
2989
3037
  }
2990
3038
  async getUserIdentities(conversationId, userIds) {
2991
- return await CoreCryptoError.asyncMapErr(this.#cc.get_user_identities(conversationId, userIds));
3039
+ const map = await CoreCryptoError.asyncMapErr(this.#cc.get_user_identities(conversationId, userIds));
3040
+ const mapFixed = new Map;
3041
+ for (const [userId, identities] of map) {
3042
+ const mappedIdentities = identities.flatMap((identity) => {
3043
+ const mappedIdentity = mapWireIdentity(identity);
3044
+ return mappedIdentity ? [mappedIdentity] : [];
3045
+ });
3046
+ mapFixed.set(userId, mappedIdentities);
3047
+ }
3048
+ return mapFixed;
2992
3049
  }
2993
3050
  async getCredentialInUse(groupInfo, credentialType = CredentialType2.X509) {
2994
3051
  let state = await CoreCryptoError.asyncMapErr(this.#cc.get_credential_in_use(groupInfo, credentialType));
@@ -3012,7 +3069,13 @@ class E2eiEnrollment {
3012
3069
  return this.#enrollment;
3013
3070
  }
3014
3071
  async directoryResponse(directory) {
3015
- return await CoreCryptoError.asyncMapErr(this.#enrollment.directory_response(directory));
3072
+ const ffiRet = await CoreCryptoError.asyncMapErr(this.#enrollment.directory_response(directory));
3073
+ return {
3074
+ newNonce: ffiRet.new_nonce,
3075
+ newAccount: ffiRet.new_account,
3076
+ newOrder: ffiRet.new_order,
3077
+ revokeCert: ffiRet.revoke_cert
3078
+ };
3016
3079
  }
3017
3080
  async newAccountRequest(previousNonce) {
3018
3081
  return await CoreCryptoError.asyncMapErr(this.#enrollment.new_account_request(previousNonce));
@@ -3071,7 +3134,6 @@ var E2eiConversationState;
3071
3134
  })(E2eiConversationState || (E2eiConversationState = {}));
3072
3135
  export {
3073
3136
  WirePolicy2 as WirePolicy,
3074
- WireIdentity,
3075
3137
  RatchetTreeType,
3076
3138
  ProposalType,
3077
3139
  NewAcmeOrder,
@@ -3080,11 +3142,10 @@ export {
3080
3142
  ExternalProposalType,
3081
3143
  E2eiEnrollment,
3082
3144
  E2eiConversationState,
3083
- DeviceStatus,
3145
+ DeviceStatus2 as DeviceStatus,
3084
3146
  CredentialType2 as CredentialType,
3085
3147
  CoreCryptoError,
3086
3148
  CoreCrypto2 as CoreCrypto,
3087
3149
  Ciphersuite2 as Ciphersuite,
3088
- AcmeDirectory,
3089
3150
  AcmeChallenge
3090
3151
  };