@bitwarden/commercial-sdk-internal 0.2.0-main.360 → 0.2.0-main.362

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -631,11 +631,6 @@ export type UserId = Tagged<Uuid, "UserId">;
631
631
  */
632
632
  export type OrganizationId = Tagged<Uuid, "OrganizationId">;
633
633
 
634
- /**
635
- * A non-generic wrapper around `bitwarden-crypto`\'s `PasswordProtectedKeyEnvelope`.
636
- */
637
- export type PasswordProtectedKeyEnvelope = Tagged<string, "PasswordProtectedKeyEnvelope">;
638
-
639
634
  export interface MasterPasswordError extends Error {
640
635
  name: "MasterPasswordError";
641
636
  variant:
@@ -766,6 +761,10 @@ export type EncString = Tagged<string, "EncString">;
766
761
 
767
762
  export type SignedPublicKey = Tagged<string, "SignedPublicKey">;
768
763
 
764
+ export type PasswordProtectedKeyEnvelope = Tagged<string, "PasswordProtectedKeyEnvelope">;
765
+
766
+ export type DataEnvelope = Tagged<string, "DataEnvelope">;
767
+
769
768
  /**
770
769
  * The type of key / signature scheme used for signing and verifying.
771
770
  */
@@ -793,6 +792,7 @@ export interface CryptoError extends Error {
793
792
  | "MissingKey"
794
793
  | "MissingField"
795
794
  | "MissingKeyId"
795
+ | "KeyOperationNotSupported"
796
796
  | "ReadOnlyKeyStore"
797
797
  | "InsufficientKdfParameters"
798
798
  | "EncString"
@@ -1917,10 +1917,7 @@ export class CryptoClient {
1917
1917
  * Decrypts a `PasswordProtectedKeyEnvelope`, returning the user key, if successful.
1918
1918
  * This is a stop-gap solution, until initialization of the SDK is used.
1919
1919
  */
1920
- unseal_password_protected_key_envelope(
1921
- pin: string,
1922
- envelope: PasswordProtectedKeyEnvelope,
1923
- ): Uint8Array;
1920
+ unseal_password_protected_key_envelope(pin: string, envelope: string): Uint8Array;
1924
1921
  }
1925
1922
  export class ExporterClient {
1926
1923
  private constructor();
@@ -2089,7 +2089,7 @@ export class CryptoClient {
2089
2089
  * Decrypts a `PasswordProtectedKeyEnvelope`, returning the user key, if successful.
2090
2090
  * This is a stop-gap solution, until initialization of the SDK is used.
2091
2091
  * @param {string} pin
2092
- * @param {PasswordProtectedKeyEnvelope} envelope
2092
+ * @param {string} envelope
2093
2093
  * @returns {Uint8Array}
2094
2094
  */
2095
2095
  unseal_password_protected_key_envelope(pin, envelope) {
@@ -2097,12 +2097,15 @@ export class CryptoClient {
2097
2097
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2098
2098
  const ptr0 = passStringToWasm0(pin, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
2099
2099
  const len0 = WASM_VECTOR_LEN;
2100
+ const ptr1 = passStringToWasm0(envelope, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
2101
+ const len1 = WASM_VECTOR_LEN;
2100
2102
  wasm.cryptoclient_unseal_password_protected_key_envelope(
2101
2103
  retptr,
2102
2104
  this.__wbg_ptr,
2103
2105
  ptr0,
2104
2106
  len0,
2105
- addHeapObject(envelope),
2107
+ ptr1,
2108
+ len1,
2106
2109
  );
2107
2110
  var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2108
2111
  var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
@@ -2111,9 +2114,9 @@ export class CryptoClient {
2111
2114
  if (r3) {
2112
2115
  throw takeObject(r2);
2113
2116
  }
2114
- var v2 = getArrayU8FromWasm0(r0, r1).slice();
2117
+ var v3 = getArrayU8FromWasm0(r0, r1).slice();
2115
2118
  wasm.__wbindgen_free(r0, r1 * 1, 1);
2116
- return v2;
2119
+ return v3;
2117
2120
  } finally {
2118
2121
  wasm.__wbindgen_add_to_stack_pointer(16);
2119
2122
  }
@@ -4176,7 +4179,7 @@ export function __wbg_call_7cccdd69e0791ae2() {
4176
4179
  }, arguments);
4177
4180
  }
4178
4181
 
4179
- export function __wbg_cipher_6677232b251d927c(arg0) {
4182
+ export function __wbg_cipher_7efc0c02e4cb8f94(arg0) {
4180
4183
  const ret = getObject(arg0).cipher;
4181
4184
  return isLikeNone(ret) ? 0 : addHeapObject(ret);
4182
4185
  }
@@ -4256,7 +4259,7 @@ export function __wbg_fetch_509096533071c657(arg0, arg1) {
4256
4259
  return addHeapObject(ret);
4257
4260
  }
4258
4261
 
4259
- export function __wbg_folder_f2247810fcb27b63(arg0) {
4262
+ export function __wbg_folder_975aa53ef392add1(arg0) {
4260
4263
  const ret = getObject(arg0).folder;
4261
4264
  return isLikeNone(ret) ? 0 : addHeapObject(ret);
4262
4265
  }
@@ -4278,7 +4281,7 @@ export function __wbg_getTime_46267b1c24877e30(arg0) {
4278
4281
  return ret;
4279
4282
  }
4280
4283
 
4281
- export function __wbg_get_2dd153cbc4e923c1() {
4284
+ export function __wbg_get_36c752bd8ed2d344() {
4282
4285
  return handleError(function (arg0, arg1, arg2) {
4283
4286
  let deferred0_0;
4284
4287
  let deferred0_1;
@@ -4293,19 +4296,7 @@ export function __wbg_get_2dd153cbc4e923c1() {
4293
4296
  }, arguments);
4294
4297
  }
4295
4298
 
4296
- export function __wbg_get_67b2ba62fc30de12() {
4297
- return handleError(function (arg0, arg1) {
4298
- const ret = Reflect.get(getObject(arg0), getObject(arg1));
4299
- return addHeapObject(ret);
4300
- }, arguments);
4301
- }
4302
-
4303
- export function __wbg_get_b9b93047fe3cf45b(arg0, arg1) {
4304
- const ret = getObject(arg0)[arg1 >>> 0];
4305
- return addHeapObject(ret);
4306
- }
4307
-
4308
- export function __wbg_get_f25f7cf564b18916() {
4299
+ export function __wbg_get_47e036b69fc7c20b() {
4309
4300
  return handleError(function (arg0, arg1, arg2) {
4310
4301
  let deferred0_0;
4311
4302
  let deferred0_1;
@@ -4320,7 +4311,19 @@ export function __wbg_get_f25f7cf564b18916() {
4320
4311
  }, arguments);
4321
4312
  }
4322
4313
 
4323
- export function __wbg_getaccesstoken_3dd64fe006c52b5e(arg0) {
4314
+ export function __wbg_get_67b2ba62fc30de12() {
4315
+ return handleError(function (arg0, arg1) {
4316
+ const ret = Reflect.get(getObject(arg0), getObject(arg1));
4317
+ return addHeapObject(ret);
4318
+ }, arguments);
4319
+ }
4320
+
4321
+ export function __wbg_get_b9b93047fe3cf45b(arg0, arg1) {
4322
+ const ret = getObject(arg0)[arg1 >>> 0];
4323
+ return addHeapObject(ret);
4324
+ }
4325
+
4326
+ export function __wbg_getaccesstoken_8a7c8bc785845d64(arg0) {
4324
4327
  const ret = getObject(arg0).get_access_token();
4325
4328
  return addHeapObject(ret);
4326
4329
  }
@@ -4505,14 +4508,14 @@ export function __wbg_length_e2d2a49132c1b256(arg0) {
4505
4508
  return ret;
4506
4509
  }
4507
4510
 
4508
- export function __wbg_list_54fbb49308e0c5ea() {
4511
+ export function __wbg_list_129b1a2b0f3527a9() {
4509
4512
  return handleError(function (arg0) {
4510
4513
  const ret = getObject(arg0).list();
4511
4514
  return addHeapObject(ret);
4512
4515
  }, arguments);
4513
4516
  }
4514
4517
 
4515
- export function __wbg_list_ed5ce00c913de60a() {
4518
+ export function __wbg_list_92d3e92c1beb0ada() {
4516
4519
  return handleError(function (arg0) {
4517
4520
  const ret = getObject(arg0).list();
4518
4521
  return addHeapObject(ret);
@@ -4713,7 +4716,7 @@ export function __wbg_randomFillSync_ac0988aba3254290() {
4713
4716
  }, arguments);
4714
4717
  }
4715
4718
 
4716
- export function __wbg_remove_128adba3facf371f() {
4719
+ export function __wbg_remove_dec4917c5ded06e6() {
4717
4720
  return handleError(function (arg0, arg1, arg2) {
4718
4721
  let deferred0_0;
4719
4722
  let deferred0_1;
@@ -4728,7 +4731,7 @@ export function __wbg_remove_128adba3facf371f() {
4728
4731
  }, arguments);
4729
4732
  }
4730
4733
 
4731
- export function __wbg_remove_cf59e3a512377550() {
4734
+ export function __wbg_remove_e9a80a96ae97842b() {
4732
4735
  return handleError(function (arg0, arg1, arg2) {
4733
4736
  let deferred0_0;
4734
4737
  let deferred0_1;
@@ -4782,7 +4785,7 @@ export function __wbg_set_3f1d0b984ed272ed(arg0, arg1, arg2) {
4782
4785
  getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
4783
4786
  }
4784
4787
 
4785
- export function __wbg_set_527001d3cec61b77() {
4788
+ export function __wbg_set_48c1246240530f3b() {
4786
4789
  return handleError(function (arg0, arg1, arg2, arg3) {
4787
4790
  let deferred0_0;
4788
4791
  let deferred0_1;
@@ -4806,7 +4809,7 @@ export function __wbg_set_8fc6bf8a5b1071d1(arg0, arg1, arg2) {
4806
4809
  return addHeapObject(ret);
4807
4810
  }
4808
4811
 
4809
- export function __wbg_set_badf4262aabc897d() {
4812
+ export function __wbg_set_d2ea454a9e10218d() {
4810
4813
  return handleError(function (arg0, arg1, arg2, arg3) {
4811
4814
  let deferred0_0;
4812
4815
  let deferred0_1;
@@ -5041,18 +5044,18 @@ export function __wbindgen_closure_wrapper195(arg0, arg1, arg2) {
5041
5044
  return addHeapObject(ret);
5042
5045
  }
5043
5046
 
5044
- export function __wbindgen_closure_wrapper3946(arg0, arg1, arg2) {
5045
- const ret = makeMutClosure(arg0, arg1, 299, __wbg_adapter_60);
5047
+ export function __wbindgen_closure_wrapper3935(arg0, arg1, arg2) {
5048
+ const ret = makeMutClosure(arg0, arg1, 301, __wbg_adapter_60);
5046
5049
  return addHeapObject(ret);
5047
5050
  }
5048
5051
 
5049
- export function __wbindgen_closure_wrapper6420(arg0, arg1, arg2) {
5050
- const ret = makeMutClosure(arg0, arg1, 325, __wbg_adapter_60);
5052
+ export function __wbindgen_closure_wrapper6419(arg0, arg1, arg2) {
5053
+ const ret = makeMutClosure(arg0, arg1, 327, __wbg_adapter_60);
5051
5054
  return addHeapObject(ret);
5052
5055
  }
5053
5056
 
5054
- export function __wbindgen_closure_wrapper6800(arg0, arg1, arg2) {
5055
- const ret = makeMutClosure(arg0, arg1, 348, __wbg_adapter_57);
5057
+ export function __wbindgen_closure_wrapper6799(arg0, arg1, arg2) {
5058
+ const ret = makeMutClosure(arg0, arg1, 350, __wbg_adapter_57);
5056
5059
  return addHeapObject(ret);
5057
5060
  }
5058
5061
 
Binary file
@@ -213,6 +213,7 @@ export const cryptoclient_unseal_password_protected_key_envelope: (
213
213
  c: number,
214
214
  d: number,
215
215
  e: number,
216
+ f: number,
216
217
  ) => void;
217
218
  export const isMasterPasswordError: (a: number) => number;
218
219
  export const isDeriveKeyConnectorError: (a: number) => number;