@wireapp/core-crypto 1.0.0-rc.50 → 1.0.0-rc.52
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json
CHANGED
|
Binary file
|
|
@@ -19,6 +19,24 @@ export class AcmeChallenge {
|
|
|
19
19
|
readonly url: string;
|
|
20
20
|
}
|
|
21
21
|
/**
|
|
22
|
+
* Dump of the PKI environemnt as PEM
|
|
23
|
+
*/
|
|
24
|
+
export class E2eiDumpedPkiEnv {
|
|
25
|
+
free(): void;
|
|
26
|
+
/**
|
|
27
|
+
* CRLs registered in the PKI env
|
|
28
|
+
*/
|
|
29
|
+
readonly crls: (string)[];
|
|
30
|
+
/**
|
|
31
|
+
* Intermediate CAs that are loaded
|
|
32
|
+
*/
|
|
33
|
+
readonly intermediates: (string)[];
|
|
34
|
+
/**
|
|
35
|
+
* Root CA in use (i.e. Trust Anchor)
|
|
36
|
+
*/
|
|
37
|
+
readonly root_ca: string;
|
|
38
|
+
}
|
|
39
|
+
/**
|
|
22
40
|
* Result of an authorization creation.
|
|
23
41
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5
|
|
24
42
|
*/
|
|
@@ -561,15 +579,15 @@ export declare enum DeviceStatus {
|
|
|
561
579
|
/**
|
|
562
580
|
* All is fine
|
|
563
581
|
*/
|
|
564
|
-
Valid =
|
|
582
|
+
Valid = 1,
|
|
565
583
|
/**
|
|
566
584
|
* The Credential's certificate is expired
|
|
567
585
|
*/
|
|
568
|
-
Expired =
|
|
586
|
+
Expired = 2,
|
|
569
587
|
/**
|
|
570
588
|
* The Credential's certificate is revoked
|
|
571
589
|
*/
|
|
572
|
-
Revoked =
|
|
590
|
+
Revoked = 3
|
|
573
591
|
}
|
|
574
592
|
/**
|
|
575
593
|
* Returned by all methods creating proposals. Contains a proposal message and an identifier to roll back the proposal
|
|
@@ -1292,34 +1310,44 @@ export declare class CoreCrypto {
|
|
|
1292
1310
|
*/
|
|
1293
1311
|
e2eiMlsInitOnly(enrollment: E2eiEnrollment, certificateChain: string, nbKeyPackage?: number): Promise<string[] | undefined>;
|
|
1294
1312
|
/**
|
|
1295
|
-
|
|
1296
|
-
|
|
1297
|
-
|
|
1298
|
-
|
|
1299
|
-
|
|
1300
|
-
|
|
1301
|
-
|
|
1313
|
+
* Dumps the PKI environment as PEM
|
|
1314
|
+
*
|
|
1315
|
+
* @returns a struct with different fields representing the PKI environment as PEM strings
|
|
1316
|
+
*/
|
|
1317
|
+
e2eiDumpPKIEnv(): Promise<E2eiDumpedPkiEnv | undefined>;
|
|
1318
|
+
/**
|
|
1319
|
+
* @returns whether the E2EI PKI environment is setup (i.e. Root CA, Intermediates, CRLs)
|
|
1320
|
+
*/
|
|
1321
|
+
e2eiIsPKIEnvSetup(): Promise<boolean>;
|
|
1322
|
+
/**
|
|
1323
|
+
* Registers a Root Trust Anchor CA for the use in E2EI processing.
|
|
1324
|
+
*
|
|
1325
|
+
* Please note that without a Root Trust Anchor, all validations *will* fail;
|
|
1326
|
+
* So this is the first step to perform after initializing your E2EI client
|
|
1327
|
+
*
|
|
1328
|
+
* @param trustAnchorPEM - PEM certificate to anchor as a Trust Root
|
|
1329
|
+
*/
|
|
1302
1330
|
e2eiRegisterAcmeCA(trustAnchorPEM: string): Promise<void>;
|
|
1303
1331
|
/**
|
|
1304
|
-
|
|
1305
|
-
|
|
1306
|
-
|
|
1307
|
-
|
|
1308
|
-
|
|
1309
|
-
|
|
1310
|
-
|
|
1332
|
+
* Registers an Intermediate CA for the use in E2EI processing.
|
|
1333
|
+
*
|
|
1334
|
+
* Please note that a Root Trust Anchor CA is needed to validate Intermediate CAs;
|
|
1335
|
+
* You **need** to have a Root CA registered before calling this
|
|
1336
|
+
*
|
|
1337
|
+
* @param certPEM - PEM certificate to register as an Intermediate CA
|
|
1338
|
+
*/
|
|
1311
1339
|
e2eiRegisterIntermediateCA(certPEM: string): Promise<string[] | undefined>;
|
|
1312
1340
|
/**
|
|
1313
|
-
|
|
1314
|
-
|
|
1315
|
-
|
|
1316
|
-
|
|
1317
|
-
|
|
1318
|
-
|
|
1319
|
-
|
|
1320
|
-
|
|
1321
|
-
|
|
1322
|
-
|
|
1341
|
+
* Registers a CRL for the use in E2EI processing.
|
|
1342
|
+
*
|
|
1343
|
+
* Please note that a Root Trust Anchor CA is needed to validate CRLs;
|
|
1344
|
+
* You **need** to have a Root CA registered before calling this
|
|
1345
|
+
*
|
|
1346
|
+
* @param crlDP - CRL Distribution Point; Basically the URL you fetched it from
|
|
1347
|
+
* @param crlDER - DER representation of the CRL
|
|
1348
|
+
*
|
|
1349
|
+
* @returns a {@link CRLRegistration} with the dirty state of the new CRL (see struct) and its expiration timestamp
|
|
1350
|
+
*/
|
|
1323
1351
|
e2eiRegisterCRL(crlDP: string, crlDER: Uint8Array): Promise<CRLRegistration>;
|
|
1324
1352
|
/**
|
|
1325
1353
|
* Creates a commit in all local conversations for changing the credential. Requires first
|
|
@@ -160,12 +160,12 @@ var makeMutClosure = function(arg0, arg1, dtor, f) {
|
|
|
160
160
|
return real;
|
|
161
161
|
};
|
|
162
162
|
var __wbg_adapter_54 = function(arg0, arg1, arg2) {
|
|
163
|
-
wasm.
|
|
163
|
+
wasm.wasm_bindgen__convert__closures__invoke1_mut__h6ec936e7e658dfc2(arg0, arg1, addHeapObject(arg2));
|
|
164
164
|
};
|
|
165
165
|
var __wbg_adapter_57 = function(arg0, arg1, arg2) {
|
|
166
166
|
try {
|
|
167
167
|
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
168
|
-
wasm.
|
|
168
|
+
wasm.wasm_bindgen__convert__closures__invoke1_mut__h679c32bb4cb8181f(retptr, arg0, arg1, addHeapObject(arg2));
|
|
169
169
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
|
170
170
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
|
171
171
|
if (r1) {
|
|
@@ -235,8 +235,8 @@ var handleError = function(f, args) {
|
|
|
235
235
|
wasm.__wbindgen_exn_store(addHeapObject(e));
|
|
236
236
|
}
|
|
237
237
|
};
|
|
238
|
-
var
|
|
239
|
-
wasm.
|
|
238
|
+
var __wbg_adapter_428 = function(arg0, arg1, arg2, arg3) {
|
|
239
|
+
wasm.wasm_bindgen__convert__closures__invoke2_mut__h85cdc5a82a90a895(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
|
|
240
240
|
};
|
|
241
241
|
async function __wbg_load(module, imports) {
|
|
242
242
|
if (typeof Response === "function" && module instanceof Response) {
|
|
@@ -265,13 +265,12 @@ async function __wbg_load(module, imports) {
|
|
|
265
265
|
var __wbg_get_imports = function() {
|
|
266
266
|
const imports = {};
|
|
267
267
|
imports.wbg = {};
|
|
268
|
-
imports.wbg.
|
|
269
|
-
const ret =
|
|
268
|
+
imports.wbg.__wbindgen_number_new = function(arg0) {
|
|
269
|
+
const ret = arg0;
|
|
270
270
|
return addHeapObject(ret);
|
|
271
271
|
};
|
|
272
|
-
imports.wbg.
|
|
273
|
-
|
|
274
|
-
return addHeapObject(ret);
|
|
272
|
+
imports.wbg.__wbindgen_object_drop_ref = function(arg0) {
|
|
273
|
+
takeObject(arg0);
|
|
275
274
|
};
|
|
276
275
|
imports.wbg.__wbg_newacmeorder_new = function(arg0) {
|
|
277
276
|
const ret = NewAcmeOrder.__wrap(arg0);
|
|
@@ -281,31 +280,32 @@ var __wbg_get_imports = function() {
|
|
|
281
280
|
const ret = BufferedDecryptedMessage.__wrap(arg0);
|
|
282
281
|
return addHeapObject(ret);
|
|
283
282
|
};
|
|
284
|
-
imports.wbg.
|
|
285
|
-
const ret =
|
|
283
|
+
imports.wbg.__wbg_proposalbundle_new = function(arg0) {
|
|
284
|
+
const ret = ProposalBundle.__wrap(arg0);
|
|
286
285
|
return addHeapObject(ret);
|
|
287
286
|
};
|
|
288
|
-
imports.wbg.
|
|
289
|
-
const ret =
|
|
287
|
+
imports.wbg.__wbg_corecrypto_new = function(arg0) {
|
|
288
|
+
const ret = CoreCrypto.__wrap(arg0);
|
|
290
289
|
return addHeapObject(ret);
|
|
291
290
|
};
|
|
292
|
-
imports.wbg.
|
|
293
|
-
const ret = arg0;
|
|
291
|
+
imports.wbg.__wbg_ffiwiree2eidentity_new = function(arg0) {
|
|
292
|
+
const ret = FfiWireE2EIdentity.__wrap(arg0);
|
|
294
293
|
return addHeapObject(ret);
|
|
295
294
|
};
|
|
296
|
-
imports.wbg.
|
|
297
|
-
|
|
295
|
+
imports.wbg.__wbg_acmedirectory_new = function(arg0) {
|
|
296
|
+
const ret = AcmeDirectory.__wrap(arg0);
|
|
297
|
+
return addHeapObject(ret);
|
|
298
298
|
};
|
|
299
299
|
imports.wbg.__wbg_proteusautoprekeybundle_new = function(arg0) {
|
|
300
300
|
const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
|
|
301
301
|
return addHeapObject(ret);
|
|
302
302
|
};
|
|
303
|
-
imports.wbg.
|
|
304
|
-
const ret =
|
|
303
|
+
imports.wbg.__wbg_commitbundle_new = function(arg0) {
|
|
304
|
+
const ret = CommitBundle.__wrap(arg0);
|
|
305
305
|
return addHeapObject(ret);
|
|
306
306
|
};
|
|
307
|
-
imports.wbg.
|
|
308
|
-
const ret =
|
|
307
|
+
imports.wbg.__wbg_newacmeauthz_new = function(arg0) {
|
|
308
|
+
const ret = NewAcmeAuthz.__wrap(arg0);
|
|
309
309
|
return addHeapObject(ret);
|
|
310
310
|
};
|
|
311
311
|
imports.wbg.__wbindgen_object_clone_ref = function(arg0) {
|
|
@@ -899,7 +899,7 @@ var __wbg_get_imports = function() {
|
|
|
899
899
|
const a = state0.a;
|
|
900
900
|
state0.a = 0;
|
|
901
901
|
try {
|
|
902
|
-
return
|
|
902
|
+
return __wbg_adapter_428(a, state0.b, arg02, arg12);
|
|
903
903
|
} finally {
|
|
904
904
|
state0.a = a;
|
|
905
905
|
}
|
|
@@ -979,12 +979,12 @@ var __wbg_get_imports = function() {
|
|
|
979
979
|
const ret = wasm.memory;
|
|
980
980
|
return addHeapObject(ret);
|
|
981
981
|
};
|
|
982
|
-
imports.wbg.
|
|
983
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
982
|
+
imports.wbg.__wbindgen_closure_wrapper2666 = function(arg0, arg1, arg2) {
|
|
983
|
+
const ret = makeMutClosure(arg0, arg1, 667, __wbg_adapter_54);
|
|
984
984
|
return addHeapObject(ret);
|
|
985
985
|
};
|
|
986
|
-
imports.wbg.
|
|
987
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
986
|
+
imports.wbg.__wbindgen_closure_wrapper13336 = function(arg0, arg1, arg2) {
|
|
987
|
+
const ret = makeMutClosure(arg0, arg1, 2201, __wbg_adapter_57);
|
|
988
988
|
return addHeapObject(ret);
|
|
989
989
|
};
|
|
990
990
|
return imports;
|
|
@@ -1051,6 +1051,20 @@ var CLOSURE_DTORS = typeof FinalizationRegistry === "undefined" ? { register: ()
|
|
|
1051
1051
|
});
|
|
1052
1052
|
var cachedUint32Memory0 = null;
|
|
1053
1053
|
var cachedUint16Memory0 = null;
|
|
1054
|
+
var DeviceStatus = Object.freeze({
|
|
1055
|
+
Valid: 1,
|
|
1056
|
+
"1": "Valid",
|
|
1057
|
+
Expired: 2,
|
|
1058
|
+
"2": "Expired",
|
|
1059
|
+
Revoked: 3,
|
|
1060
|
+
"3": "Revoked"
|
|
1061
|
+
});
|
|
1062
|
+
var WirePolicy = Object.freeze({
|
|
1063
|
+
Plaintext: 1,
|
|
1064
|
+
"1": "Plaintext",
|
|
1065
|
+
Ciphertext: 2,
|
|
1066
|
+
"2": "Ciphertext"
|
|
1067
|
+
});
|
|
1054
1068
|
var Ciphersuite = Object.freeze({
|
|
1055
1069
|
MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519: 1,
|
|
1056
1070
|
"1": "MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519",
|
|
@@ -1069,20 +1083,6 @@ var Ciphersuite = Object.freeze({
|
|
|
1069
1083
|
MLS_128_X25519KYBER768DRAFT00_AES128GCM_SHA256_Ed25519: 61489,
|
|
1070
1084
|
"61489": "MLS_128_X25519KYBER768DRAFT00_AES128GCM_SHA256_Ed25519"
|
|
1071
1085
|
});
|
|
1072
|
-
var WirePolicy = Object.freeze({
|
|
1073
|
-
Plaintext: 1,
|
|
1074
|
-
"1": "Plaintext",
|
|
1075
|
-
Ciphertext: 2,
|
|
1076
|
-
"2": "Ciphertext"
|
|
1077
|
-
});
|
|
1078
|
-
var DeviceStatus = Object.freeze({
|
|
1079
|
-
Valid: 0,
|
|
1080
|
-
"0": "Valid",
|
|
1081
|
-
Expired: 1,
|
|
1082
|
-
"1": "Expired",
|
|
1083
|
-
Revoked: 2,
|
|
1084
|
-
"2": "Revoked"
|
|
1085
|
-
});
|
|
1086
1086
|
var CredentialType = Object.freeze({
|
|
1087
1087
|
Basic: 1,
|
|
1088
1088
|
"1": "Basic",
|
|
@@ -1432,6 +1432,14 @@ class CoreCrypto {
|
|
|
1432
1432
|
const ret = wasm.corecrypto_e2ei_new_rotate_enrollment(this.__wbg_ptr, ptr0, len0, ptr1, len1, ptr2, len2, expiry_sec, ciphersuite);
|
|
1433
1433
|
return takeObject(ret);
|
|
1434
1434
|
}
|
|
1435
|
+
e2ei_dump_pki_env() {
|
|
1436
|
+
const ret = wasm.corecrypto_e2ei_dump_pki_env(this.__wbg_ptr);
|
|
1437
|
+
return takeObject(ret);
|
|
1438
|
+
}
|
|
1439
|
+
e2ei_is_pki_env_setup() {
|
|
1440
|
+
const ret = wasm.corecrypto_e2ei_is_pki_env_setup(this.__wbg_ptr);
|
|
1441
|
+
return takeObject(ret);
|
|
1442
|
+
}
|
|
1435
1443
|
e2ei_register_acme_ca(trust_anchor_pem) {
|
|
1436
1444
|
const ptr0 = passStringToWasm0(trust_anchor_pem, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
|
1437
1445
|
const len0 = WASM_VECTOR_LEN;
|
|
@@ -1989,6 +1997,64 @@ class CustomConfiguration {
|
|
|
1989
1997
|
var DecryptedMessageFinalization = typeof FinalizationRegistry === "undefined" ? { register: () => {
|
|
1990
1998
|
}, unregister: () => {
|
|
1991
1999
|
} } : new FinalizationRegistry((ptr) => wasm.__wbg_decryptedmessage_free(ptr >>> 0));
|
|
2000
|
+
var E2eiDumpedPkiEnvFinalization = typeof FinalizationRegistry === "undefined" ? { register: () => {
|
|
2001
|
+
}, unregister: () => {
|
|
2002
|
+
} } : new FinalizationRegistry((ptr) => wasm.__wbg_e2eidumpedpkienv_free(ptr >>> 0));
|
|
2003
|
+
|
|
2004
|
+
class E2eiDumpedPkiEnv {
|
|
2005
|
+
__destroy_into_raw() {
|
|
2006
|
+
const ptr = this.__wbg_ptr;
|
|
2007
|
+
this.__wbg_ptr = 0;
|
|
2008
|
+
E2eiDumpedPkiEnvFinalization.unregister(this);
|
|
2009
|
+
return ptr;
|
|
2010
|
+
}
|
|
2011
|
+
free() {
|
|
2012
|
+
const ptr = this.__destroy_into_raw();
|
|
2013
|
+
wasm.__wbg_e2eidumpedpkienv_free(ptr);
|
|
2014
|
+
}
|
|
2015
|
+
get root_ca() {
|
|
2016
|
+
let deferred1_0;
|
|
2017
|
+
let deferred1_1;
|
|
2018
|
+
try {
|
|
2019
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2020
|
+
wasm.__wbg_get_acmedirectory_new_nonce(retptr, this.__wbg_ptr);
|
|
2021
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
|
2022
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
|
2023
|
+
deferred1_0 = r0;
|
|
2024
|
+
deferred1_1 = r1;
|
|
2025
|
+
return getStringFromWasm0(r0, r1);
|
|
2026
|
+
} finally {
|
|
2027
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2028
|
+
wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);
|
|
2029
|
+
}
|
|
2030
|
+
}
|
|
2031
|
+
get intermediates() {
|
|
2032
|
+
try {
|
|
2033
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2034
|
+
wasm.__wbg_get_e2eidumpedpkienv_intermediates(retptr, this.__wbg_ptr);
|
|
2035
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
|
2036
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
|
2037
|
+
var v1 = getArrayJsValueFromWasm0(r0, r1).slice();
|
|
2038
|
+
wasm.__wbindgen_free(r0, r1 * 4, 4);
|
|
2039
|
+
return v1;
|
|
2040
|
+
} finally {
|
|
2041
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2042
|
+
}
|
|
2043
|
+
}
|
|
2044
|
+
get crls() {
|
|
2045
|
+
try {
|
|
2046
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2047
|
+
wasm.__wbg_get_e2eidumpedpkienv_crls(retptr, this.__wbg_ptr);
|
|
2048
|
+
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
|
2049
|
+
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
|
2050
|
+
var v1 = getArrayJsValueFromWasm0(r0, r1).slice();
|
|
2051
|
+
wasm.__wbindgen_free(r0, r1 * 4, 4);
|
|
2052
|
+
return v1;
|
|
2053
|
+
} finally {
|
|
2054
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2055
|
+
}
|
|
2056
|
+
}
|
|
2057
|
+
}
|
|
1992
2058
|
var FfiWireE2EIdentityFinalization = typeof FinalizationRegistry === "undefined" ? { register: () => {
|
|
1993
2059
|
}, unregister: () => {
|
|
1994
2060
|
} } : new FinalizationRegistry((ptr) => wasm.__wbg_ffiwiree2eidentity_free(ptr >>> 0));
|
|
@@ -2370,7 +2436,7 @@ class WireIdentity {
|
|
|
2370
2436
|
let deferred1_1;
|
|
2371
2437
|
try {
|
|
2372
2438
|
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2373
|
-
wasm.
|
|
2439
|
+
wasm.wireidentity_client_id(retptr, this.__wbg_ptr);
|
|
2374
2440
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
|
2375
2441
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
|
2376
2442
|
deferred1_0 = r0;
|
|
@@ -2386,7 +2452,7 @@ class WireIdentity {
|
|
|
2386
2452
|
let deferred1_1;
|
|
2387
2453
|
try {
|
|
2388
2454
|
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2389
|
-
wasm.
|
|
2455
|
+
wasm.wireidentity_handle(retptr, this.__wbg_ptr);
|
|
2390
2456
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
|
2391
2457
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
|
2392
2458
|
deferred1_0 = r0;
|
|
@@ -2402,7 +2468,7 @@ class WireIdentity {
|
|
|
2402
2468
|
let deferred1_1;
|
|
2403
2469
|
try {
|
|
2404
2470
|
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2405
|
-
wasm.
|
|
2471
|
+
wasm.wireidentity_display_name(retptr, this.__wbg_ptr);
|
|
2406
2472
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
|
2407
2473
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
|
2408
2474
|
deferred1_0 = r0;
|
|
@@ -2418,7 +2484,7 @@ class WireIdentity {
|
|
|
2418
2484
|
let deferred1_1;
|
|
2419
2485
|
try {
|
|
2420
2486
|
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2421
|
-
wasm.
|
|
2487
|
+
wasm.wireidentity_domain(retptr, this.__wbg_ptr);
|
|
2422
2488
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
|
2423
2489
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
|
2424
2490
|
deferred1_0 = r0;
|
|
@@ -2434,7 +2500,7 @@ class WireIdentity {
|
|
|
2434
2500
|
let deferred1_1;
|
|
2435
2501
|
try {
|
|
2436
2502
|
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2437
|
-
wasm.
|
|
2503
|
+
wasm.wireidentity_certificate(retptr, this.__wbg_ptr);
|
|
2438
2504
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
|
2439
2505
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
|
2440
2506
|
deferred1_0 = r0;
|
|
@@ -2446,7 +2512,7 @@ class WireIdentity {
|
|
|
2446
2512
|
}
|
|
2447
2513
|
}
|
|
2448
2514
|
get status() {
|
|
2449
|
-
const ret = wasm.
|
|
2515
|
+
const ret = wasm.wireidentity_status(this.__wbg_ptr);
|
|
2450
2516
|
return ret;
|
|
2451
2517
|
}
|
|
2452
2518
|
get thumbprint() {
|
|
@@ -2454,7 +2520,7 @@ class WireIdentity {
|
|
|
2454
2520
|
let deferred1_1;
|
|
2455
2521
|
try {
|
|
2456
2522
|
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2457
|
-
wasm.
|
|
2523
|
+
wasm.wireidentity_thumbprint(retptr, this.__wbg_ptr);
|
|
2458
2524
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
|
2459
2525
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
|
2460
2526
|
deferred1_0 = r0;
|
|
@@ -2470,7 +2536,7 @@ class WireIdentity {
|
|
|
2470
2536
|
let deferred1_1;
|
|
2471
2537
|
try {
|
|
2472
2538
|
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2473
|
-
wasm.
|
|
2539
|
+
wasm.wireidentity_serial_number(retptr, this.__wbg_ptr);
|
|
2474
2540
|
var r0 = getInt32Memory0()[retptr / 4 + 0];
|
|
2475
2541
|
var r1 = getInt32Memory0()[retptr / 4 + 1];
|
|
2476
2542
|
deferred1_0 = r0;
|
|
@@ -2482,11 +2548,11 @@ class WireIdentity {
|
|
|
2482
2548
|
}
|
|
2483
2549
|
}
|
|
2484
2550
|
get not_before() {
|
|
2485
|
-
const ret = wasm.
|
|
2551
|
+
const ret = wasm.wireidentity_not_before(this.__wbg_ptr);
|
|
2486
2552
|
return BigInt.asUintN(64, ret);
|
|
2487
2553
|
}
|
|
2488
2554
|
get not_after() {
|
|
2489
|
-
const ret = wasm.
|
|
2555
|
+
const ret = wasm.wireidentity_not_after(this.__wbg_ptr);
|
|
2490
2556
|
return BigInt.asUintN(64, ret);
|
|
2491
2557
|
}
|
|
2492
2558
|
}
|
|
@@ -2581,7 +2647,7 @@ var mapWireIdentity = (ffiIdentity) => {
|
|
|
2581
2647
|
displayName: ffiIdentity.display_name,
|
|
2582
2648
|
domain: ffiIdentity.domain,
|
|
2583
2649
|
certificate: ffiIdentity.certificate,
|
|
2584
|
-
status: ffiIdentity.status,
|
|
2650
|
+
status: DeviceStatus2[ffiIdentity.status],
|
|
2585
2651
|
thumbprint: ffiIdentity.thumbprint,
|
|
2586
2652
|
serialNumber: ffiIdentity.serial_number,
|
|
2587
2653
|
notBefore: ffiIdentity.not_before,
|
|
@@ -2590,9 +2656,9 @@ var mapWireIdentity = (ffiIdentity) => {
|
|
|
2590
2656
|
};
|
|
2591
2657
|
var DeviceStatus2;
|
|
2592
2658
|
(function(DeviceStatus3) {
|
|
2593
|
-
DeviceStatus3[DeviceStatus3["Valid"] =
|
|
2594
|
-
DeviceStatus3[DeviceStatus3["Expired"] =
|
|
2595
|
-
DeviceStatus3[DeviceStatus3["Revoked"] =
|
|
2659
|
+
DeviceStatus3[DeviceStatus3["Valid"] = 1] = "Valid";
|
|
2660
|
+
DeviceStatus3[DeviceStatus3["Expired"] = 2] = "Expired";
|
|
2661
|
+
DeviceStatus3[DeviceStatus3["Revoked"] = 3] = "Revoked";
|
|
2596
2662
|
})(DeviceStatus2 || (DeviceStatus2 = {}));
|
|
2597
2663
|
var ProposalType;
|
|
2598
2664
|
(function(ProposalType2) {
|
|
@@ -3009,6 +3075,12 @@ class CoreCrypto2 {
|
|
|
3009
3075
|
async e2eiMlsInitOnly(enrollment, certificateChain, nbKeyPackage) {
|
|
3010
3076
|
return await this.#cc.e2ei_mls_init_only(enrollment.inner(), certificateChain, nbKeyPackage);
|
|
3011
3077
|
}
|
|
3078
|
+
async e2eiDumpPKIEnv() {
|
|
3079
|
+
return await this.#cc.e2ei_dump_pki_env();
|
|
3080
|
+
}
|
|
3081
|
+
async e2eiIsPKIEnvSetup() {
|
|
3082
|
+
return await this.#cc.e2ei_is_pki_env_setup();
|
|
3083
|
+
}
|
|
3012
3084
|
async e2eiRegisterAcmeCA(trustAnchorPEM) {
|
|
3013
3085
|
return await this.#cc.e2ei_register_acme_ca(trustAnchorPEM);
|
|
3014
3086
|
}
|
|
@@ -3037,7 +3109,7 @@ class CoreCrypto2 {
|
|
|
3037
3109
|
}
|
|
3038
3110
|
async e2eiConversationState(conversationId) {
|
|
3039
3111
|
let state = await CoreCryptoError.asyncMapErr(this.#cc.e2ei_conversation_state(conversationId));
|
|
3040
|
-
return E2eiConversationState[
|
|
3112
|
+
return E2eiConversationState[state];
|
|
3041
3113
|
}
|
|
3042
3114
|
async e2eiIsEnabled(ciphersuite) {
|
|
3043
3115
|
return await CoreCryptoError.asyncMapErr(this.#cc.e2ei_is_enabled(ciphersuite));
|
|
@@ -3059,7 +3131,7 @@ class CoreCrypto2 {
|
|
|
3059
3131
|
}
|
|
3060
3132
|
async getCredentialInUse(groupInfo, credentialType = CredentialType2.X509) {
|
|
3061
3133
|
let state = await CoreCryptoError.asyncMapErr(this.#cc.get_credential_in_use(groupInfo, credentialType));
|
|
3062
|
-
return E2eiConversationState[
|
|
3134
|
+
return E2eiConversationState[state];
|
|
3063
3135
|
}
|
|
3064
3136
|
static version() {
|
|
3065
3137
|
this.#assertModuleLoaded();
|
|
@@ -3151,6 +3223,7 @@ export {
|
|
|
3151
3223
|
GroupInfoEncryptionType,
|
|
3152
3224
|
ExternalProposalType,
|
|
3153
3225
|
E2eiEnrollment,
|
|
3226
|
+
E2eiDumpedPkiEnv,
|
|
3154
3227
|
E2eiConversationState,
|
|
3155
3228
|
DeviceStatus2 as DeviceStatus,
|
|
3156
3229
|
CredentialType2 as CredentialType,
|