@bitwarden/commercial-sdk-internal 0.2.0-main.363 → 0.2.0-main.365
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bitwarden_wasm_internal.d.ts +133 -0
- package/bitwarden_wasm_internal_bg.js +154 -36
- package/bitwarden_wasm_internal_bg.wasm +0 -0
- package/bitwarden_wasm_internal_bg.wasm.d.ts +10 -5
- package/bitwarden_wasm_internal_bg.wasm.js +1 -1
- package/node/bitwarden_wasm_internal.d.ts +133 -0
- package/node/bitwarden_wasm_internal.js +155 -36
- package/node/bitwarden_wasm_internal_bg.wasm +0 -0
- package/node/bitwarden_wasm_internal_bg.wasm.d.ts +10 -5
- package/package.json +1 -1
|
@@ -1387,6 +1387,85 @@ export interface SecureNoteView {
|
|
|
1387
1387
|
type: SecureNoteType;
|
|
1388
1388
|
}
|
|
1389
1389
|
|
|
1390
|
+
/**
|
|
1391
|
+
* Result of checking password exposure via HIBP API.
|
|
1392
|
+
*/
|
|
1393
|
+
export type ExposedPasswordResult =
|
|
1394
|
+
| { type: "NotChecked" }
|
|
1395
|
+
| { type: "Found"; value: number }
|
|
1396
|
+
| { type: "Error"; value: string };
|
|
1397
|
+
|
|
1398
|
+
/**
|
|
1399
|
+
* Login cipher data needed for risk evaluation.
|
|
1400
|
+
*/
|
|
1401
|
+
export interface CipherLoginDetails {
|
|
1402
|
+
/**
|
|
1403
|
+
* Cipher ID to identify which cipher in results.
|
|
1404
|
+
*/
|
|
1405
|
+
id: CipherId;
|
|
1406
|
+
/**
|
|
1407
|
+
* The decrypted password to evaluate.
|
|
1408
|
+
*/
|
|
1409
|
+
password: string;
|
|
1410
|
+
/**
|
|
1411
|
+
* Username or email (login ciphers only have one field).
|
|
1412
|
+
*/
|
|
1413
|
+
username: string | undefined;
|
|
1414
|
+
}
|
|
1415
|
+
|
|
1416
|
+
/**
|
|
1417
|
+
* Password reuse map wrapper for WASM compatibility.
|
|
1418
|
+
*/
|
|
1419
|
+
export type PasswordReuseMap = Record<string, number>;
|
|
1420
|
+
|
|
1421
|
+
/**
|
|
1422
|
+
* Options for configuring risk computation.
|
|
1423
|
+
*/
|
|
1424
|
+
export interface CipherRiskOptions {
|
|
1425
|
+
/**
|
|
1426
|
+
* Pre-computed password reuse map (password → count).
|
|
1427
|
+
* If provided, enables reuse detection across ciphers.
|
|
1428
|
+
*/
|
|
1429
|
+
passwordMap?: PasswordReuseMap | undefined;
|
|
1430
|
+
/**
|
|
1431
|
+
* Whether to check passwords against Have I Been Pwned API.
|
|
1432
|
+
* When true, makes network requests to check for exposed passwords.
|
|
1433
|
+
*/
|
|
1434
|
+
checkExposed?: boolean;
|
|
1435
|
+
/**
|
|
1436
|
+
* Optional HIBP API base URL override. When None, uses the production HIBP URL.
|
|
1437
|
+
* Can be used for testing or alternative password breach checking services.
|
|
1438
|
+
*/
|
|
1439
|
+
hibpBaseUrl?: string | undefined;
|
|
1440
|
+
}
|
|
1441
|
+
|
|
1442
|
+
/**
|
|
1443
|
+
* Risk evaluation result for a single cipher.
|
|
1444
|
+
*/
|
|
1445
|
+
export interface CipherRiskResult {
|
|
1446
|
+
/**
|
|
1447
|
+
* Cipher ID matching the input CipherLoginDetails.
|
|
1448
|
+
*/
|
|
1449
|
+
id: CipherId;
|
|
1450
|
+
/**
|
|
1451
|
+
* Password strength score from 0 (weakest) to 4 (strongest).
|
|
1452
|
+
* Calculated using zxcvbn with cipher-specific context.
|
|
1453
|
+
*/
|
|
1454
|
+
password_strength: number;
|
|
1455
|
+
/**
|
|
1456
|
+
* Result of checking password exposure via HIBP API.
|
|
1457
|
+
* - `NotChecked`: check_exposed was false, or password was empty
|
|
1458
|
+
* - `Found(n)`: Successfully checked, found in n breaches
|
|
1459
|
+
* - `Error(msg)`: HIBP API request failed for this cipher with the given error message
|
|
1460
|
+
*/
|
|
1461
|
+
exposed_result: ExposedPasswordResult;
|
|
1462
|
+
/**
|
|
1463
|
+
* Number of times this password appears in the provided password_map.
|
|
1464
|
+
* None if not found or if no password_map was provided.
|
|
1465
|
+
*/
|
|
1466
|
+
reuse_count: number | undefined;
|
|
1467
|
+
}
|
|
1468
|
+
|
|
1390
1469
|
/**
|
|
1391
1470
|
* Request to add or edit a folder.
|
|
1392
1471
|
*/
|
|
@@ -1488,6 +1567,13 @@ export interface CreateFolderError extends Error {
|
|
|
1488
1567
|
|
|
1489
1568
|
export function isCreateFolderError(error: any): error is CreateFolderError;
|
|
1490
1569
|
|
|
1570
|
+
export interface CipherRiskError extends Error {
|
|
1571
|
+
name: "CipherRiskError";
|
|
1572
|
+
variant: "Reqwest";
|
|
1573
|
+
}
|
|
1574
|
+
|
|
1575
|
+
export function isCipherRiskError(error: any): error is CipherRiskError;
|
|
1576
|
+
|
|
1491
1577
|
export interface SshKeyView {
|
|
1492
1578
|
/**
|
|
1493
1579
|
* SSH private key (ed25519/rsa) in unencrypted openssh private key format [OpenSSH private key](https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.key)
|
|
@@ -1771,6 +1857,49 @@ export class BitwardenClient {
|
|
|
1771
1857
|
*/
|
|
1772
1858
|
exporters(): ExporterClient;
|
|
1773
1859
|
}
|
|
1860
|
+
/**
|
|
1861
|
+
* Client for evaluating credential risk for login ciphers.
|
|
1862
|
+
*/
|
|
1863
|
+
export class CipherRiskClient {
|
|
1864
|
+
private constructor();
|
|
1865
|
+
free(): void;
|
|
1866
|
+
/**
|
|
1867
|
+
* Build password reuse map for a list of login ciphers.
|
|
1868
|
+
*
|
|
1869
|
+
* Returns a map where keys are passwords and values are the number of times
|
|
1870
|
+
* each password appears in the provided list. This map can be passed to `compute_risk()`
|
|
1871
|
+
* to enable password reuse detection.
|
|
1872
|
+
*/
|
|
1873
|
+
password_reuse_map(login_details: CipherLoginDetails[]): PasswordReuseMap;
|
|
1874
|
+
/**
|
|
1875
|
+
* Evaluate security risks for multiple login ciphers concurrently.
|
|
1876
|
+
*
|
|
1877
|
+
* For each cipher:
|
|
1878
|
+
* 1. Calculates password strength (0-4) using zxcvbn with cipher-specific context
|
|
1879
|
+
* 2. Optionally checks if the password has been exposed via Have I Been Pwned API
|
|
1880
|
+
* 3. Counts how many times the password is reused in the provided `password_map`
|
|
1881
|
+
*
|
|
1882
|
+
* Returns a vector of `CipherRisk` results, one for each input cipher.
|
|
1883
|
+
*
|
|
1884
|
+
* ## HIBP Check Results (`exposed_result` field)
|
|
1885
|
+
*
|
|
1886
|
+
* The `exposed_result` field uses the `ExposedPasswordResult` enum with three possible states:
|
|
1887
|
+
* - `NotChecked`: Password exposure check was not performed because:
|
|
1888
|
+
* - `check_exposed` option was `false`, or
|
|
1889
|
+
* - Password was empty
|
|
1890
|
+
* - `Found(n)`: Successfully checked via HIBP API, password appears in `n` data breaches
|
|
1891
|
+
* - `Error(msg)`: HIBP API request failed with error message `msg`
|
|
1892
|
+
*
|
|
1893
|
+
* # Errors
|
|
1894
|
+
*
|
|
1895
|
+
* This method only returns `Err` for internal logic failures. HIBP API errors are
|
|
1896
|
+
* captured per-cipher in the `exposed_result` field as `ExposedPasswordResult::Error(msg)`.
|
|
1897
|
+
*/
|
|
1898
|
+
compute_risk(
|
|
1899
|
+
login_details: CipherLoginDetails[],
|
|
1900
|
+
options: CipherRiskOptions,
|
|
1901
|
+
): Promise<CipherRiskResult[]>;
|
|
1902
|
+
}
|
|
1774
1903
|
export class CiphersClient {
|
|
1775
1904
|
private constructor();
|
|
1776
1905
|
free(): void;
|
|
@@ -2290,4 +2419,8 @@ export class VaultClient {
|
|
|
2290
2419
|
* Collection related operations.
|
|
2291
2420
|
*/
|
|
2292
2421
|
collections(): CollectionsClient;
|
|
2422
|
+
/**
|
|
2423
|
+
* Cipher risk evaluation operations.
|
|
2424
|
+
*/
|
|
2425
|
+
cipher_risk(): CipherRiskClient;
|
|
2293
2426
|
}
|
|
@@ -775,6 +775,19 @@ module.exports.isCreateFolderError = function (error) {
|
|
|
775
775
|
}
|
|
776
776
|
};
|
|
777
777
|
|
|
778
|
+
/**
|
|
779
|
+
* @param {any} error
|
|
780
|
+
* @returns {boolean}
|
|
781
|
+
*/
|
|
782
|
+
module.exports.isCipherRiskError = function (error) {
|
|
783
|
+
try {
|
|
784
|
+
const ret = wasm.isCipherRiskError(addBorrowedObject(error));
|
|
785
|
+
return ret !== 0;
|
|
786
|
+
} finally {
|
|
787
|
+
heap[stack_pointer++] = undefined;
|
|
788
|
+
}
|
|
789
|
+
};
|
|
790
|
+
|
|
778
791
|
/**
|
|
779
792
|
* @param {any} error
|
|
780
793
|
* @returns {boolean}
|
|
@@ -854,9 +867,17 @@ module.exports.isEncryptFileError = function (error) {
|
|
|
854
867
|
};
|
|
855
868
|
|
|
856
869
|
function __wbg_adapter_54(arg0, arg1, arg2) {
|
|
870
|
+
wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h8322b6841f4e63be(
|
|
871
|
+
arg0,
|
|
872
|
+
arg1,
|
|
873
|
+
addHeapObject(arg2),
|
|
874
|
+
);
|
|
875
|
+
}
|
|
876
|
+
|
|
877
|
+
function __wbg_adapter_57(arg0, arg1, arg2) {
|
|
857
878
|
try {
|
|
858
879
|
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
859
|
-
wasm.
|
|
880
|
+
wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__hdee59a176c58b697(
|
|
860
881
|
retptr,
|
|
861
882
|
arg0,
|
|
862
883
|
arg1,
|
|
@@ -872,23 +893,15 @@ function __wbg_adapter_54(arg0, arg1, arg2) {
|
|
|
872
893
|
}
|
|
873
894
|
}
|
|
874
895
|
|
|
875
|
-
function __wbg_adapter_57(arg0, arg1, arg2) {
|
|
876
|
-
wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h0d7795300800d4d2(
|
|
877
|
-
arg0,
|
|
878
|
-
arg1,
|
|
879
|
-
addHeapObject(arg2),
|
|
880
|
-
);
|
|
881
|
-
}
|
|
882
|
-
|
|
883
896
|
function __wbg_adapter_60(arg0, arg1) {
|
|
884
|
-
wasm.
|
|
897
|
+
wasm._dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h1d088d25aee734e6(
|
|
885
898
|
arg0,
|
|
886
899
|
arg1,
|
|
887
900
|
);
|
|
888
901
|
}
|
|
889
902
|
|
|
890
|
-
function
|
|
891
|
-
wasm.
|
|
903
|
+
function __wbg_adapter_354(arg0, arg1, arg2, arg3) {
|
|
904
|
+
wasm.wasm_bindgen__convert__closures__invoke2_mut__h849ee2a9e4ae2f91(
|
|
892
905
|
arg0,
|
|
893
906
|
arg1,
|
|
894
907
|
addHeapObject(arg2),
|
|
@@ -1323,6 +1336,89 @@ class BitwardenClient {
|
|
|
1323
1336
|
}
|
|
1324
1337
|
module.exports.BitwardenClient = BitwardenClient;
|
|
1325
1338
|
|
|
1339
|
+
const CipherRiskClientFinalization =
|
|
1340
|
+
typeof FinalizationRegistry === "undefined"
|
|
1341
|
+
? { register: () => {}, unregister: () => {} }
|
|
1342
|
+
: new FinalizationRegistry((ptr) => wasm.__wbg_cipherriskclient_free(ptr >>> 0, 1));
|
|
1343
|
+
/**
|
|
1344
|
+
* Client for evaluating credential risk for login ciphers.
|
|
1345
|
+
*/
|
|
1346
|
+
class CipherRiskClient {
|
|
1347
|
+
static __wrap(ptr) {
|
|
1348
|
+
ptr = ptr >>> 0;
|
|
1349
|
+
const obj = Object.create(CipherRiskClient.prototype);
|
|
1350
|
+
obj.__wbg_ptr = ptr;
|
|
1351
|
+
CipherRiskClientFinalization.register(obj, obj.__wbg_ptr, obj);
|
|
1352
|
+
return obj;
|
|
1353
|
+
}
|
|
1354
|
+
|
|
1355
|
+
__destroy_into_raw() {
|
|
1356
|
+
const ptr = this.__wbg_ptr;
|
|
1357
|
+
this.__wbg_ptr = 0;
|
|
1358
|
+
CipherRiskClientFinalization.unregister(this);
|
|
1359
|
+
return ptr;
|
|
1360
|
+
}
|
|
1361
|
+
|
|
1362
|
+
free() {
|
|
1363
|
+
const ptr = this.__destroy_into_raw();
|
|
1364
|
+
wasm.__wbg_cipherriskclient_free(ptr, 0);
|
|
1365
|
+
}
|
|
1366
|
+
/**
|
|
1367
|
+
* Build password reuse map for a list of login ciphers.
|
|
1368
|
+
*
|
|
1369
|
+
* Returns a map where keys are passwords and values are the number of times
|
|
1370
|
+
* each password appears in the provided list. This map can be passed to `compute_risk()`
|
|
1371
|
+
* to enable password reuse detection.
|
|
1372
|
+
* @param {CipherLoginDetails[]} login_details
|
|
1373
|
+
* @returns {PasswordReuseMap}
|
|
1374
|
+
*/
|
|
1375
|
+
password_reuse_map(login_details) {
|
|
1376
|
+
const ptr0 = passArrayJsValueToWasm0(login_details, wasm.__wbindgen_malloc);
|
|
1377
|
+
const len0 = WASM_VECTOR_LEN;
|
|
1378
|
+
const ret = wasm.cipherriskclient_password_reuse_map(this.__wbg_ptr, ptr0, len0);
|
|
1379
|
+
return takeObject(ret);
|
|
1380
|
+
}
|
|
1381
|
+
/**
|
|
1382
|
+
* Evaluate security risks for multiple login ciphers concurrently.
|
|
1383
|
+
*
|
|
1384
|
+
* For each cipher:
|
|
1385
|
+
* 1. Calculates password strength (0-4) using zxcvbn with cipher-specific context
|
|
1386
|
+
* 2. Optionally checks if the password has been exposed via Have I Been Pwned API
|
|
1387
|
+
* 3. Counts how many times the password is reused in the provided `password_map`
|
|
1388
|
+
*
|
|
1389
|
+
* Returns a vector of `CipherRisk` results, one for each input cipher.
|
|
1390
|
+
*
|
|
1391
|
+
* ## HIBP Check Results (`exposed_result` field)
|
|
1392
|
+
*
|
|
1393
|
+
* The `exposed_result` field uses the `ExposedPasswordResult` enum with three possible states:
|
|
1394
|
+
* - `NotChecked`: Password exposure check was not performed because:
|
|
1395
|
+
* - `check_exposed` option was `false`, or
|
|
1396
|
+
* - Password was empty
|
|
1397
|
+
* - `Found(n)`: Successfully checked via HIBP API, password appears in `n` data breaches
|
|
1398
|
+
* - `Error(msg)`: HIBP API request failed with error message `msg`
|
|
1399
|
+
*
|
|
1400
|
+
* # Errors
|
|
1401
|
+
*
|
|
1402
|
+
* This method only returns `Err` for internal logic failures. HIBP API errors are
|
|
1403
|
+
* captured per-cipher in the `exposed_result` field as `ExposedPasswordResult::Error(msg)`.
|
|
1404
|
+
* @param {CipherLoginDetails[]} login_details
|
|
1405
|
+
* @param {CipherRiskOptions} options
|
|
1406
|
+
* @returns {Promise<CipherRiskResult[]>}
|
|
1407
|
+
*/
|
|
1408
|
+
compute_risk(login_details, options) {
|
|
1409
|
+
const ptr0 = passArrayJsValueToWasm0(login_details, wasm.__wbindgen_malloc);
|
|
1410
|
+
const len0 = WASM_VECTOR_LEN;
|
|
1411
|
+
const ret = wasm.cipherriskclient_compute_risk(
|
|
1412
|
+
this.__wbg_ptr,
|
|
1413
|
+
ptr0,
|
|
1414
|
+
len0,
|
|
1415
|
+
addHeapObject(options),
|
|
1416
|
+
);
|
|
1417
|
+
return takeObject(ret);
|
|
1418
|
+
}
|
|
1419
|
+
}
|
|
1420
|
+
module.exports.CipherRiskClient = CipherRiskClient;
|
|
1421
|
+
|
|
1326
1422
|
const CiphersClientFinalization =
|
|
1327
1423
|
typeof FinalizationRegistry === "undefined"
|
|
1328
1424
|
? { register: () => {}, unregister: () => {} }
|
|
@@ -4114,6 +4210,14 @@ class VaultClient {
|
|
|
4114
4210
|
const ret = wasm.vaultclient_attachments(this.__wbg_ptr);
|
|
4115
4211
|
return CollectionsClient.__wrap(ret);
|
|
4116
4212
|
}
|
|
4213
|
+
/**
|
|
4214
|
+
* Cipher risk evaluation operations.
|
|
4215
|
+
* @returns {CipherRiskClient}
|
|
4216
|
+
*/
|
|
4217
|
+
cipher_risk() {
|
|
4218
|
+
const ret = wasm.vaultclient_attachments(this.__wbg_ptr);
|
|
4219
|
+
return CipherRiskClient.__wrap(ret);
|
|
4220
|
+
}
|
|
4117
4221
|
}
|
|
4118
4222
|
module.exports.VaultClient = VaultClient;
|
|
4119
4223
|
|
|
@@ -4197,7 +4301,7 @@ module.exports.__wbg_call_7cccdd69e0791ae2 = function () {
|
|
|
4197
4301
|
}, arguments);
|
|
4198
4302
|
};
|
|
4199
4303
|
|
|
4200
|
-
module.exports.
|
|
4304
|
+
module.exports.__wbg_cipher_0354ea4980a45865 = function (arg0) {
|
|
4201
4305
|
const ret = getObject(arg0).cipher;
|
|
4202
4306
|
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
|
4203
4307
|
};
|
|
@@ -4277,11 +4381,16 @@ module.exports.__wbg_fetch_509096533071c657 = function (arg0, arg1) {
|
|
|
4277
4381
|
return addHeapObject(ret);
|
|
4278
4382
|
};
|
|
4279
4383
|
|
|
4280
|
-
module.exports.
|
|
4384
|
+
module.exports.__wbg_folder_065654789aaca86c = function (arg0) {
|
|
4281
4385
|
const ret = getObject(arg0).folder;
|
|
4282
4386
|
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
|
4283
4387
|
};
|
|
4284
4388
|
|
|
4389
|
+
module.exports.__wbg_getFullYear_17d3c9e4db748eb7 = function (arg0) {
|
|
4390
|
+
const ret = getObject(arg0).getFullYear();
|
|
4391
|
+
return ret;
|
|
4392
|
+
};
|
|
4393
|
+
|
|
4285
4394
|
module.exports.__wbg_getRandomValues_38097e921c2494c3 = function () {
|
|
4286
4395
|
return handleError(function (arg0, arg1) {
|
|
4287
4396
|
globalThis.crypto.getRandomValues(getArrayU8FromWasm0(arg0, arg1));
|
|
@@ -4299,7 +4408,7 @@ module.exports.__wbg_getTime_46267b1c24877e30 = function (arg0) {
|
|
|
4299
4408
|
return ret;
|
|
4300
4409
|
};
|
|
4301
4410
|
|
|
4302
|
-
module.exports.
|
|
4411
|
+
module.exports.__wbg_get_0c000b31aafb62a6 = function () {
|
|
4303
4412
|
return handleError(function (arg0, arg1, arg2) {
|
|
4304
4413
|
let deferred0_0;
|
|
4305
4414
|
let deferred0_1;
|
|
@@ -4326,7 +4435,7 @@ module.exports.__wbg_get_b9b93047fe3cf45b = function (arg0, arg1) {
|
|
|
4326
4435
|
return addHeapObject(ret);
|
|
4327
4436
|
};
|
|
4328
4437
|
|
|
4329
|
-
module.exports.
|
|
4438
|
+
module.exports.__wbg_get_c3b0fae9ed2d916c = function () {
|
|
4330
4439
|
return handleError(function (arg0, arg1, arg2) {
|
|
4331
4440
|
let deferred0_0;
|
|
4332
4441
|
let deferred0_1;
|
|
@@ -4341,7 +4450,7 @@ module.exports.__wbg_get_d95b1f8fc222051d = function () {
|
|
|
4341
4450
|
}, arguments);
|
|
4342
4451
|
};
|
|
4343
4452
|
|
|
4344
|
-
module.exports.
|
|
4453
|
+
module.exports.__wbg_getaccesstoken_d29c96563f3c4f7f = function (arg0) {
|
|
4345
4454
|
const ret = getObject(arg0).get_access_token();
|
|
4346
4455
|
return addHeapObject(ret);
|
|
4347
4456
|
};
|
|
@@ -4526,14 +4635,14 @@ module.exports.__wbg_length_e2d2a49132c1b256 = function (arg0) {
|
|
|
4526
4635
|
return ret;
|
|
4527
4636
|
};
|
|
4528
4637
|
|
|
4529
|
-
module.exports.
|
|
4638
|
+
module.exports.__wbg_list_5218cdfdd9081474 = function () {
|
|
4530
4639
|
return handleError(function (arg0) {
|
|
4531
4640
|
const ret = getObject(arg0).list();
|
|
4532
4641
|
return addHeapObject(ret);
|
|
4533
4642
|
}, arguments);
|
|
4534
4643
|
};
|
|
4535
4644
|
|
|
4536
|
-
module.exports.
|
|
4645
|
+
module.exports.__wbg_list_83c655ffacf926b7 = function () {
|
|
4537
4646
|
return handleError(function (arg0) {
|
|
4538
4647
|
const ret = getObject(arg0).list();
|
|
4539
4648
|
return addHeapObject(ret);
|
|
@@ -4576,7 +4685,7 @@ module.exports.__wbg_new_23a2665fac83c611 = function (arg0, arg1) {
|
|
|
4576
4685
|
const a = state0.a;
|
|
4577
4686
|
state0.a = 0;
|
|
4578
4687
|
try {
|
|
4579
|
-
return
|
|
4688
|
+
return __wbg_adapter_354(a, state0.b, arg0, arg1);
|
|
4580
4689
|
} finally {
|
|
4581
4690
|
state0.a = a;
|
|
4582
4691
|
}
|
|
@@ -4691,6 +4800,11 @@ module.exports.__wbg_node_905d3e251edff8a2 = function (arg0) {
|
|
|
4691
4800
|
return addHeapObject(ret);
|
|
4692
4801
|
};
|
|
4693
4802
|
|
|
4803
|
+
module.exports.__wbg_now_d18023d54d4e5500 = function (arg0) {
|
|
4804
|
+
const ret = getObject(arg0).now();
|
|
4805
|
+
return ret;
|
|
4806
|
+
};
|
|
4807
|
+
|
|
4694
4808
|
module.exports.__wbg_open_e0c0b2993eb596e1 = function () {
|
|
4695
4809
|
return handleError(function (arg0, arg1, arg2, arg3) {
|
|
4696
4810
|
const ret = getObject(arg0).open(getStringFromWasm0(arg1, arg2), arg3 >>> 0);
|
|
@@ -4734,7 +4848,7 @@ module.exports.__wbg_randomFillSync_ac0988aba3254290 = function () {
|
|
|
4734
4848
|
}, arguments);
|
|
4735
4849
|
};
|
|
4736
4850
|
|
|
4737
|
-
module.exports.
|
|
4851
|
+
module.exports.__wbg_remove_0e9beb59d125be57 = function () {
|
|
4738
4852
|
return handleError(function (arg0, arg1, arg2) {
|
|
4739
4853
|
let deferred0_0;
|
|
4740
4854
|
let deferred0_1;
|
|
@@ -4749,7 +4863,7 @@ module.exports.__wbg_remove_9fba740d43c47185 = function () {
|
|
|
4749
4863
|
}, arguments);
|
|
4750
4864
|
};
|
|
4751
4865
|
|
|
4752
|
-
module.exports.
|
|
4866
|
+
module.exports.__wbg_remove_6387a99bd1c07f3b = function () {
|
|
4753
4867
|
return handleError(function (arg0, arg1, arg2) {
|
|
4754
4868
|
let deferred0_0;
|
|
4755
4869
|
let deferred0_1;
|
|
@@ -4803,11 +4917,7 @@ module.exports.__wbg_set_3f1d0b984ed272ed = function (arg0, arg1, arg2) {
|
|
|
4803
4917
|
getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
|
|
4804
4918
|
};
|
|
4805
4919
|
|
|
4806
|
-
module.exports.
|
|
4807
|
-
getObject(arg0).set(getObject(arg1), arg2 >>> 0);
|
|
4808
|
-
};
|
|
4809
|
-
|
|
4810
|
-
module.exports.__wbg_set_7d6f921c2587ab5a = function () {
|
|
4920
|
+
module.exports.__wbg_set_4909636594ca7c7a = function () {
|
|
4811
4921
|
return handleError(function (arg0, arg1, arg2, arg3) {
|
|
4812
4922
|
let deferred0_0;
|
|
4813
4923
|
let deferred0_1;
|
|
@@ -4822,12 +4932,16 @@ module.exports.__wbg_set_7d6f921c2587ab5a = function () {
|
|
|
4822
4932
|
}, arguments);
|
|
4823
4933
|
};
|
|
4824
4934
|
|
|
4935
|
+
module.exports.__wbg_set_65595bdd868b3009 = function (arg0, arg1, arg2) {
|
|
4936
|
+
getObject(arg0).set(getObject(arg1), arg2 >>> 0);
|
|
4937
|
+
};
|
|
4938
|
+
|
|
4825
4939
|
module.exports.__wbg_set_8fc6bf8a5b1071d1 = function (arg0, arg1, arg2) {
|
|
4826
4940
|
const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
|
|
4827
4941
|
return addHeapObject(ret);
|
|
4828
4942
|
};
|
|
4829
4943
|
|
|
4830
|
-
module.exports.
|
|
4944
|
+
module.exports.__wbg_set_b63bcc0eff25f894 = function () {
|
|
4831
4945
|
return handleError(function (arg0, arg1, arg2, arg3) {
|
|
4832
4946
|
let deferred0_0;
|
|
4833
4947
|
let deferred0_1;
|
|
@@ -4939,6 +5053,11 @@ module.exports.__wbg_static_accessor_WINDOW_5de37043a91a9c40 = function () {
|
|
|
4939
5053
|
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
|
4940
5054
|
};
|
|
4941
5055
|
|
|
5056
|
+
module.exports.__wbg_static_accessor_performance_da77b3a901a72934 = function () {
|
|
5057
|
+
const ret = performance;
|
|
5058
|
+
return addHeapObject(ret);
|
|
5059
|
+
};
|
|
5060
|
+
|
|
4942
5061
|
module.exports.__wbg_status_f6360336ca686bf0 = function (arg0) {
|
|
4943
5062
|
const ret = getObject(arg0).status;
|
|
4944
5063
|
return ret;
|
|
@@ -5052,28 +5171,28 @@ module.exports.__wbindgen_cb_drop = function (arg0) {
|
|
|
5052
5171
|
return ret;
|
|
5053
5172
|
};
|
|
5054
5173
|
|
|
5055
|
-
module.exports.
|
|
5174
|
+
module.exports.__wbindgen_closure_wrapper198 = function (arg0, arg1, arg2) {
|
|
5056
5175
|
const ret = makeMutClosure(arg0, arg1, 7, __wbg_adapter_54);
|
|
5057
5176
|
return addHeapObject(ret);
|
|
5058
5177
|
};
|
|
5059
5178
|
|
|
5060
|
-
module.exports.
|
|
5179
|
+
module.exports.__wbindgen_closure_wrapper200 = function (arg0, arg1, arg2) {
|
|
5061
5180
|
const ret = makeMutClosure(arg0, arg1, 7, __wbg_adapter_57);
|
|
5062
5181
|
return addHeapObject(ret);
|
|
5063
5182
|
};
|
|
5064
5183
|
|
|
5065
|
-
module.exports.
|
|
5066
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
5184
|
+
module.exports.__wbindgen_closure_wrapper4257 = function (arg0, arg1, arg2) {
|
|
5185
|
+
const ret = makeMutClosure(arg0, arg1, 349, __wbg_adapter_60);
|
|
5067
5186
|
return addHeapObject(ret);
|
|
5068
5187
|
};
|
|
5069
5188
|
|
|
5070
|
-
module.exports.
|
|
5071
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
5189
|
+
module.exports.__wbindgen_closure_wrapper8229 = function (arg0, arg1, arg2) {
|
|
5190
|
+
const ret = makeMutClosure(arg0, arg1, 516, __wbg_adapter_60);
|
|
5072
5191
|
return addHeapObject(ret);
|
|
5073
5192
|
};
|
|
5074
5193
|
|
|
5075
|
-
module.exports.
|
|
5076
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
5194
|
+
module.exports.__wbindgen_closure_wrapper8612 = function (arg0, arg1, arg2) {
|
|
5195
|
+
const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_54);
|
|
5077
5196
|
return addHeapObject(ret);
|
|
5078
5197
|
};
|
|
5079
5198
|
|
|
Binary file
|
|
@@ -349,6 +349,8 @@ export const ciphersclient_move_to_organization: (
|
|
|
349
349
|
d: number,
|
|
350
350
|
) => void;
|
|
351
351
|
export const ciphersclient_decrypt_fido2_private_key: (a: number, b: number, c: number) => void;
|
|
352
|
+
export const cipherriskclient_password_reuse_map: (a: number, b: number, c: number) => number;
|
|
353
|
+
export const cipherriskclient_compute_risk: (a: number, b: number, c: number, d: number) => number;
|
|
352
354
|
export const foldersclient_encrypt: (a: number, b: number, c: number) => void;
|
|
353
355
|
export const foldersclient_decrypt: (a: number, b: number, c: number) => void;
|
|
354
356
|
export const foldersclient_decrypt_list: (a: number, b: number, c: number, d: number) => void;
|
|
@@ -383,6 +385,7 @@ export const isTotpError: (a: number) => number;
|
|
|
383
385
|
export const isGetFolderError: (a: number) => number;
|
|
384
386
|
export const isEditFolderError: (a: number) => number;
|
|
385
387
|
export const isCreateFolderError: (a: number) => number;
|
|
388
|
+
export const isCipherRiskError: (a: number) => number;
|
|
386
389
|
export const isGetCipherError: (a: number) => number;
|
|
387
390
|
export const isEditCipherError: (a: number) => number;
|
|
388
391
|
export const isCreateCipherError: (a: number) => number;
|
|
@@ -403,7 +406,9 @@ export const vaultclient_ciphers: (a: number) => number;
|
|
|
403
406
|
export const vaultclient_folders: (a: number) => number;
|
|
404
407
|
export const vaultclient_totp: (a: number) => number;
|
|
405
408
|
export const vaultclient_collections: (a: number) => number;
|
|
409
|
+
export const vaultclient_cipher_risk: (a: number) => number;
|
|
406
410
|
export const __wbg_foldersclient_free: (a: number, b: number) => void;
|
|
411
|
+
export const __wbg_cipherriskclient_free: (a: number, b: number) => void;
|
|
407
412
|
export const __wbg_ciphersclient_free: (a: number, b: number) => void;
|
|
408
413
|
export const __wbg_collectionsclient_free: (a: number, b: number) => void;
|
|
409
414
|
export const __wbg_vaultclient_free: (a: number, b: number) => void;
|
|
@@ -418,22 +423,22 @@ export const __wbindgen_exn_store: (a: number) => void;
|
|
|
418
423
|
export const __wbindgen_free: (a: number, b: number, c: number) => void;
|
|
419
424
|
export const __wbindgen_export_4: WebAssembly.Table;
|
|
420
425
|
export const __wbindgen_add_to_stack_pointer: (a: number) => number;
|
|
421
|
-
export const
|
|
426
|
+
export const _dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h8322b6841f4e63be: (
|
|
422
427
|
a: number,
|
|
423
428
|
b: number,
|
|
424
429
|
c: number,
|
|
425
|
-
d: number,
|
|
426
430
|
) => void;
|
|
427
|
-
export const
|
|
431
|
+
export const _dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__hdee59a176c58b697: (
|
|
428
432
|
a: number,
|
|
429
433
|
b: number,
|
|
430
434
|
c: number,
|
|
435
|
+
d: number,
|
|
431
436
|
) => void;
|
|
432
|
-
export const
|
|
437
|
+
export const _dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h1d088d25aee734e6: (
|
|
433
438
|
a: number,
|
|
434
439
|
b: number,
|
|
435
440
|
) => void;
|
|
436
|
-
export const
|
|
441
|
+
export const wasm_bindgen__convert__closures__invoke2_mut__h849ee2a9e4ae2f91: (
|
|
437
442
|
a: number,
|
|
438
443
|
b: number,
|
|
439
444
|
c: number,
|