@wireapp/core-crypto 1.1.0 → 1.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json
CHANGED
|
Binary file
|
|
@@ -1,3 +1,23 @@
|
|
|
1
|
+
declare enum CredentialType {
|
|
2
|
+
/**
|
|
3
|
+
* Just a KeyPair
|
|
4
|
+
*/
|
|
5
|
+
Basic = 1,
|
|
6
|
+
/**
|
|
7
|
+
* A certificate obtained through e2e identity enrollment process
|
|
8
|
+
*/
|
|
9
|
+
X509 = 2
|
|
10
|
+
}
|
|
11
|
+
declare enum WirePolicy {
|
|
12
|
+
/**
|
|
13
|
+
* Handshake messages are never encrypted
|
|
14
|
+
*/
|
|
15
|
+
Plaintext = 1,
|
|
16
|
+
/**
|
|
17
|
+
* Handshake messages are always encrypted
|
|
18
|
+
*/
|
|
19
|
+
Ciphertext = 2
|
|
20
|
+
}
|
|
1
21
|
declare enum Ciphersuite {
|
|
2
22
|
/**
|
|
3
23
|
* DH KEM x25519 | AES-GCM 128 | SHA2-256 | Ed25519
|
|
@@ -28,26 +48,6 @@ declare enum Ciphersuite {
|
|
|
28
48
|
*/
|
|
29
49
|
MLS_256_DHKEMP384_AES256GCM_SHA384_P384 = 7
|
|
30
50
|
}
|
|
31
|
-
declare enum WirePolicy {
|
|
32
|
-
/**
|
|
33
|
-
* Handshake messages are never encrypted
|
|
34
|
-
*/
|
|
35
|
-
Plaintext = 1,
|
|
36
|
-
/**
|
|
37
|
-
* Handshake messages are always encrypted
|
|
38
|
-
*/
|
|
39
|
-
Ciphertext = 2
|
|
40
|
-
}
|
|
41
|
-
declare enum CredentialType {
|
|
42
|
-
/**
|
|
43
|
-
* Just a KeyPair
|
|
44
|
-
*/
|
|
45
|
-
Basic = 1,
|
|
46
|
-
/**
|
|
47
|
-
* A certificate obtained through e2e identity enrollment process
|
|
48
|
-
*/
|
|
49
|
-
X509 = 2
|
|
50
|
-
}
|
|
51
51
|
/**
|
|
52
52
|
* For creating a challenge.
|
|
53
53
|
* @see https://www.rfc-editor.org/rfc/rfc8555.html#section-7.5.1
|
|
@@ -148,7 +148,8 @@ function debugString(val) {
|
|
|
148
148
|
}
|
|
149
149
|
}
|
|
150
150
|
if (val instanceof Error) {
|
|
151
|
-
return `${val.name}: ${val.message}
|
|
151
|
+
return `${val.name}: ${val.message}
|
|
152
|
+
${val.stack}`;
|
|
152
153
|
}
|
|
153
154
|
return className;
|
|
154
155
|
}
|
|
@@ -244,13 +245,18 @@ function handleError(f, args) {
|
|
|
244
245
|
function __wbg_adapter_497(arg0, arg1, arg2, arg3) {
|
|
245
246
|
wasm.wasm_bindgen__convert__closures__invoke2_mut__h5053bb07030a5de3(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
|
|
246
247
|
}
|
|
247
|
-
var
|
|
248
|
-
|
|
249
|
-
|
|
250
|
-
|
|
251
|
-
|
|
252
|
-
|
|
253
|
-
|
|
248
|
+
var CoreCryptoLogLevel = Object.freeze({ Off: 1, "1": "Off", Trace: 2, "2": "Trace", Debug: 3, "3": "Debug", Info: 4, "4": "Info", Warn: 5, "5": "Warn", Error: 6, "6": "Error" });
|
|
249
|
+
var CredentialType = Object.freeze({
|
|
250
|
+
Basic: 1,
|
|
251
|
+
"1": "Basic",
|
|
252
|
+
X509: 2,
|
|
253
|
+
"2": "X509"
|
|
254
|
+
});
|
|
255
|
+
var WirePolicy = Object.freeze({
|
|
256
|
+
Plaintext: 1,
|
|
257
|
+
"1": "Plaintext",
|
|
258
|
+
Ciphertext: 2,
|
|
259
|
+
"2": "Ciphertext"
|
|
254
260
|
});
|
|
255
261
|
var Ciphersuite = Object.freeze({
|
|
256
262
|
MLS_128_DHKEMX25519_AES128GCM_SHA256_Ed25519: 1,
|
|
@@ -268,18 +274,13 @@ var Ciphersuite = Object.freeze({
|
|
|
268
274
|
MLS_256_DHKEMP384_AES256GCM_SHA384_P384: 7,
|
|
269
275
|
"7": "MLS_256_DHKEMP384_AES256GCM_SHA384_P384"
|
|
270
276
|
});
|
|
271
|
-
var
|
|
272
|
-
|
|
273
|
-
|
|
274
|
-
|
|
275
|
-
|
|
276
|
-
|
|
277
|
-
|
|
278
|
-
var CredentialType = Object.freeze({
|
|
279
|
-
Basic: 1,
|
|
280
|
-
"1": "Basic",
|
|
281
|
-
X509: 2,
|
|
282
|
-
"2": "X509"
|
|
277
|
+
var DeviceStatus = Object.freeze({
|
|
278
|
+
Valid: 1,
|
|
279
|
+
"1": "Valid",
|
|
280
|
+
Expired: 2,
|
|
281
|
+
"2": "Expired",
|
|
282
|
+
Revoked: 3,
|
|
283
|
+
"3": "Revoked"
|
|
283
284
|
});
|
|
284
285
|
var AcmeChallengeFinalization = typeof FinalizationRegistry === "undefined" ? { register: () => {
|
|
285
286
|
}, unregister: () => {
|
|
@@ -2036,38 +2037,38 @@ function __wbg_get_imports() {
|
|
|
2036
2037
|
const ret = arg0;
|
|
2037
2038
|
return addHeapObject(ret);
|
|
2038
2039
|
};
|
|
2039
|
-
imports.wbg.
|
|
2040
|
-
|
|
2041
|
-
|
|
2040
|
+
imports.wbg.__wbg_execute_039e34486627ad47 = function() {
|
|
2041
|
+
return handleError(function(arg0, arg1) {
|
|
2042
|
+
const ret = getObject(arg0).execute(CoreCryptoContext.__wrap(arg1));
|
|
2043
|
+
return addHeapObject(ret);
|
|
2044
|
+
}, arguments);
|
|
2042
2045
|
};
|
|
2043
2046
|
imports.wbg.__wbindgen_string_new = function(arg0, arg1) {
|
|
2044
2047
|
const ret = getStringFromWasm0(arg0, arg1);
|
|
2045
2048
|
return addHeapObject(ret);
|
|
2046
2049
|
};
|
|
2050
|
+
imports.wbg.__wbg_newacmeauthz_new = function(arg0) {
|
|
2051
|
+
const ret = NewAcmeAuthz.__wrap(arg0);
|
|
2052
|
+
return addHeapObject(ret);
|
|
2053
|
+
};
|
|
2047
2054
|
imports.wbg.__wbg_proteusautoprekeybundle_new = function(arg0) {
|
|
2048
2055
|
const ret = ProteusAutoPrekeyBundle.__wrap(arg0);
|
|
2049
2056
|
return addHeapObject(ret);
|
|
2050
2057
|
};
|
|
2051
|
-
imports.wbg.
|
|
2052
|
-
const ret =
|
|
2058
|
+
imports.wbg.__wbg_newacmeorder_new = function(arg0) {
|
|
2059
|
+
const ret = NewAcmeOrder.__wrap(arg0);
|
|
2053
2060
|
return addHeapObject(ret);
|
|
2054
2061
|
};
|
|
2055
|
-
imports.wbg.
|
|
2056
|
-
const ret =
|
|
2062
|
+
imports.wbg.__wbg_ffiwiree2eidentity_new = function(arg0) {
|
|
2063
|
+
const ret = FfiWireE2EIdentity.__wrap(arg0);
|
|
2057
2064
|
return addHeapObject(ret);
|
|
2058
2065
|
};
|
|
2059
|
-
imports.wbg.
|
|
2060
|
-
const ret =
|
|
2066
|
+
imports.wbg.__wbg_acmedirectory_new = function(arg0) {
|
|
2067
|
+
const ret = AcmeDirectory.__wrap(arg0);
|
|
2061
2068
|
return addHeapObject(ret);
|
|
2062
2069
|
};
|
|
2063
|
-
imports.wbg.
|
|
2064
|
-
|
|
2065
|
-
const ret = getObject(arg0).execute(CoreCryptoContext.__wrap(arg1));
|
|
2066
|
-
return addHeapObject(ret);
|
|
2067
|
-
}, arguments);
|
|
2068
|
-
};
|
|
2069
|
-
imports.wbg.__wbg_newacmeorder_new = function(arg0) {
|
|
2070
|
-
const ret = NewAcmeOrder.__wrap(arg0);
|
|
2070
|
+
imports.wbg.__wbindgen_bigint_from_u64 = function(arg0) {
|
|
2071
|
+
const ret = BigInt.asUintN(64, arg0);
|
|
2071
2072
|
return addHeapObject(ret);
|
|
2072
2073
|
};
|
|
2073
2074
|
imports.wbg.__wbg_buffereddecryptedmessage_new = function(arg0) {
|
|
@@ -2188,10 +2189,46 @@ function __wbg_get_imports() {
|
|
|
2188
2189
|
imports.wbg.__wbg_set_f975102236d3c502 = function(arg0, arg1, arg2) {
|
|
2189
2190
|
getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
|
|
2190
2191
|
};
|
|
2192
|
+
imports.wbg.__wbg_crypto_1d1f22824a6a080c = function(arg0) {
|
|
2193
|
+
const ret = getObject(arg0).crypto;
|
|
2194
|
+
return addHeapObject(ret);
|
|
2195
|
+
};
|
|
2196
|
+
imports.wbg.__wbg_process_4a72847cc503995b = function(arg0) {
|
|
2197
|
+
const ret = getObject(arg0).process;
|
|
2198
|
+
return addHeapObject(ret);
|
|
2199
|
+
};
|
|
2200
|
+
imports.wbg.__wbg_versions_f686565e586dd935 = function(arg0) {
|
|
2201
|
+
const ret = getObject(arg0).versions;
|
|
2202
|
+
return addHeapObject(ret);
|
|
2203
|
+
};
|
|
2204
|
+
imports.wbg.__wbg_node_104a2ff8d6ea03a2 = function(arg0) {
|
|
2205
|
+
const ret = getObject(arg0).node;
|
|
2206
|
+
return addHeapObject(ret);
|
|
2207
|
+
};
|
|
2191
2208
|
imports.wbg.__wbindgen_is_string = function(arg0) {
|
|
2192
2209
|
const ret = typeof getObject(arg0) === "string";
|
|
2193
2210
|
return ret;
|
|
2194
2211
|
};
|
|
2212
|
+
imports.wbg.__wbg_require_cca90b1a94a0255b = function() {
|
|
2213
|
+
return handleError(function() {
|
|
2214
|
+
const ret = module_core_crypto_ffi.require;
|
|
2215
|
+
return addHeapObject(ret);
|
|
2216
|
+
}, arguments);
|
|
2217
|
+
};
|
|
2218
|
+
imports.wbg.__wbg_msCrypto_eb05e62b530a1508 = function(arg0) {
|
|
2219
|
+
const ret = getObject(arg0).msCrypto;
|
|
2220
|
+
return addHeapObject(ret);
|
|
2221
|
+
};
|
|
2222
|
+
imports.wbg.__wbg_getRandomValues_3aa56aa6edec874c = function() {
|
|
2223
|
+
return handleError(function(arg0, arg1) {
|
|
2224
|
+
getObject(arg0).getRandomValues(getObject(arg1));
|
|
2225
|
+
}, arguments);
|
|
2226
|
+
};
|
|
2227
|
+
imports.wbg.__wbg_randomFillSync_5c9c955aa56b6049 = function() {
|
|
2228
|
+
return handleError(function(arg0, arg1) {
|
|
2229
|
+
getObject(arg0).randomFillSync(takeObject(arg1));
|
|
2230
|
+
}, arguments);
|
|
2231
|
+
};
|
|
2195
2232
|
imports.wbg.__wbg_setmultientry_a4c0f50fb1bb8977 = function(arg0, arg1) {
|
|
2196
2233
|
getObject(arg0).multiEntry = arg1 !== 0;
|
|
2197
2234
|
};
|
|
@@ -2517,42 +2554,6 @@ function __wbg_get_imports() {
|
|
|
2517
2554
|
imports.wbg.__wbg_warn_2b3adb99ce26c314 = function(arg0) {
|
|
2518
2555
|
console.warn(getObject(arg0));
|
|
2519
2556
|
};
|
|
2520
|
-
imports.wbg.__wbg_crypto_1d1f22824a6a080c = function(arg0) {
|
|
2521
|
-
const ret = getObject(arg0).crypto;
|
|
2522
|
-
return addHeapObject(ret);
|
|
2523
|
-
};
|
|
2524
|
-
imports.wbg.__wbg_process_4a72847cc503995b = function(arg0) {
|
|
2525
|
-
const ret = getObject(arg0).process;
|
|
2526
|
-
return addHeapObject(ret);
|
|
2527
|
-
};
|
|
2528
|
-
imports.wbg.__wbg_versions_f686565e586dd935 = function(arg0) {
|
|
2529
|
-
const ret = getObject(arg0).versions;
|
|
2530
|
-
return addHeapObject(ret);
|
|
2531
|
-
};
|
|
2532
|
-
imports.wbg.__wbg_node_104a2ff8d6ea03a2 = function(arg0) {
|
|
2533
|
-
const ret = getObject(arg0).node;
|
|
2534
|
-
return addHeapObject(ret);
|
|
2535
|
-
};
|
|
2536
|
-
imports.wbg.__wbg_require_cca90b1a94a0255b = function() {
|
|
2537
|
-
return handleError(function() {
|
|
2538
|
-
const ret = module_core_crypto_ffi.require;
|
|
2539
|
-
return addHeapObject(ret);
|
|
2540
|
-
}, arguments);
|
|
2541
|
-
};
|
|
2542
|
-
imports.wbg.__wbg_msCrypto_eb05e62b530a1508 = function(arg0) {
|
|
2543
|
-
const ret = getObject(arg0).msCrypto;
|
|
2544
|
-
return addHeapObject(ret);
|
|
2545
|
-
};
|
|
2546
|
-
imports.wbg.__wbg_getRandomValues_3aa56aa6edec874c = function() {
|
|
2547
|
-
return handleError(function(arg0, arg1) {
|
|
2548
|
-
getObject(arg0).getRandomValues(getObject(arg1));
|
|
2549
|
-
}, arguments);
|
|
2550
|
-
};
|
|
2551
|
-
imports.wbg.__wbg_randomFillSync_5c9c955aa56b6049 = function() {
|
|
2552
|
-
return handleError(function(arg0, arg1) {
|
|
2553
|
-
getObject(arg0).randomFillSync(takeObject(arg1));
|
|
2554
|
-
}, arguments);
|
|
2555
|
-
};
|
|
2556
2557
|
imports.wbg.__wbg_self_3093d5d1f7bcb682 = function() {
|
|
2557
2558
|
return handleError(function() {
|
|
2558
2559
|
const ret = self.self;
|
|
@@ -2834,15 +2835,15 @@ function __wbg_get_imports() {
|
|
|
2834
2835
|
return addHeapObject(ret);
|
|
2835
2836
|
};
|
|
2836
2837
|
imports.wbg.__wbindgen_closure_wrapper3447 = function(arg0, arg1, arg2) {
|
|
2837
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
2838
|
+
const ret = makeMutClosure(arg0, arg1, 751, __wbg_adapter_54);
|
|
2838
2839
|
return addHeapObject(ret);
|
|
2839
2840
|
};
|
|
2840
2841
|
imports.wbg.__wbindgen_closure_wrapper13858 = function(arg0, arg1, arg2) {
|
|
2841
2842
|
const ret = makeMutClosure(arg0, arg1, 2166, __wbg_adapter_57);
|
|
2842
2843
|
return addHeapObject(ret);
|
|
2843
2844
|
};
|
|
2844
|
-
imports.wbg.
|
|
2845
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
2845
|
+
imports.wbg.__wbindgen_closure_wrapper15358 = function(arg0, arg1, arg2) {
|
|
2846
|
+
const ret = makeMutClosure(arg0, arg1, 2287, __wbg_adapter_60);
|
|
2846
2847
|
return addHeapObject(ret);
|
|
2847
2848
|
};
|
|
2848
2849
|
return imports;
|
|
@@ -3311,7 +3312,9 @@ class CoreCryptoError extends Error {
|
|
|
3311
3312
|
return new Error(msg, ...params);
|
|
3312
3313
|
}
|
|
3313
3314
|
static build(msg, ...params) {
|
|
3314
|
-
const parts = msg.split(
|
|
3315
|
+
const parts = msg.split(`
|
|
3316
|
+
|
|
3317
|
+
`);
|
|
3315
3318
|
if (parts.length < 2) {
|
|
3316
3319
|
const cause = new Error("CoreCrypto WASM FFI Error doesn't have enough elements to build a rich error");
|
|
3317
3320
|
return this.fallback(msg, { cause }, ...params);
|