@bitwarden/commercial-sdk-internal 0.2.0-main.363 → 0.2.0-main.365

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1387,6 +1387,85 @@ export interface SecureNoteView {
1387
1387
  type: SecureNoteType;
1388
1388
  }
1389
1389
 
1390
+ /**
1391
+ * Result of checking password exposure via HIBP API.
1392
+ */
1393
+ export type ExposedPasswordResult =
1394
+ | { type: "NotChecked" }
1395
+ | { type: "Found"; value: number }
1396
+ | { type: "Error"; value: string };
1397
+
1398
+ /**
1399
+ * Login cipher data needed for risk evaluation.
1400
+ */
1401
+ export interface CipherLoginDetails {
1402
+ /**
1403
+ * Cipher ID to identify which cipher in results.
1404
+ */
1405
+ id: CipherId;
1406
+ /**
1407
+ * The decrypted password to evaluate.
1408
+ */
1409
+ password: string;
1410
+ /**
1411
+ * Username or email (login ciphers only have one field).
1412
+ */
1413
+ username: string | undefined;
1414
+ }
1415
+
1416
+ /**
1417
+ * Password reuse map wrapper for WASM compatibility.
1418
+ */
1419
+ export type PasswordReuseMap = Record<string, number>;
1420
+
1421
+ /**
1422
+ * Options for configuring risk computation.
1423
+ */
1424
+ export interface CipherRiskOptions {
1425
+ /**
1426
+ * Pre-computed password reuse map (password → count).
1427
+ * If provided, enables reuse detection across ciphers.
1428
+ */
1429
+ passwordMap?: PasswordReuseMap | undefined;
1430
+ /**
1431
+ * Whether to check passwords against Have I Been Pwned API.
1432
+ * When true, makes network requests to check for exposed passwords.
1433
+ */
1434
+ checkExposed?: boolean;
1435
+ /**
1436
+ * Optional HIBP API base URL override. When None, uses the production HIBP URL.
1437
+ * Can be used for testing or alternative password breach checking services.
1438
+ */
1439
+ hibpBaseUrl?: string | undefined;
1440
+ }
1441
+
1442
+ /**
1443
+ * Risk evaluation result for a single cipher.
1444
+ */
1445
+ export interface CipherRiskResult {
1446
+ /**
1447
+ * Cipher ID matching the input CipherLoginDetails.
1448
+ */
1449
+ id: CipherId;
1450
+ /**
1451
+ * Password strength score from 0 (weakest) to 4 (strongest).
1452
+ * Calculated using zxcvbn with cipher-specific context.
1453
+ */
1454
+ password_strength: number;
1455
+ /**
1456
+ * Result of checking password exposure via HIBP API.
1457
+ * - `NotChecked`: check_exposed was false, or password was empty
1458
+ * - `Found(n)`: Successfully checked, found in n breaches
1459
+ * - `Error(msg)`: HIBP API request failed for this cipher with the given error message
1460
+ */
1461
+ exposed_result: ExposedPasswordResult;
1462
+ /**
1463
+ * Number of times this password appears in the provided password_map.
1464
+ * None if not found or if no password_map was provided.
1465
+ */
1466
+ reuse_count: number | undefined;
1467
+ }
1468
+
1390
1469
  /**
1391
1470
  * Request to add or edit a folder.
1392
1471
  */
@@ -1488,6 +1567,13 @@ export interface CreateFolderError extends Error {
1488
1567
 
1489
1568
  export function isCreateFolderError(error: any): error is CreateFolderError;
1490
1569
 
1570
+ export interface CipherRiskError extends Error {
1571
+ name: "CipherRiskError";
1572
+ variant: "Reqwest";
1573
+ }
1574
+
1575
+ export function isCipherRiskError(error: any): error is CipherRiskError;
1576
+
1491
1577
  export interface SshKeyView {
1492
1578
  /**
1493
1579
  * SSH private key (ed25519/rsa) in unencrypted openssh private key format [OpenSSH private key](https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.key)
@@ -1771,6 +1857,49 @@ export class BitwardenClient {
1771
1857
  */
1772
1858
  exporters(): ExporterClient;
1773
1859
  }
1860
+ /**
1861
+ * Client for evaluating credential risk for login ciphers.
1862
+ */
1863
+ export class CipherRiskClient {
1864
+ private constructor();
1865
+ free(): void;
1866
+ /**
1867
+ * Build password reuse map for a list of login ciphers.
1868
+ *
1869
+ * Returns a map where keys are passwords and values are the number of times
1870
+ * each password appears in the provided list. This map can be passed to `compute_risk()`
1871
+ * to enable password reuse detection.
1872
+ */
1873
+ password_reuse_map(login_details: CipherLoginDetails[]): PasswordReuseMap;
1874
+ /**
1875
+ * Evaluate security risks for multiple login ciphers concurrently.
1876
+ *
1877
+ * For each cipher:
1878
+ * 1. Calculates password strength (0-4) using zxcvbn with cipher-specific context
1879
+ * 2. Optionally checks if the password has been exposed via Have I Been Pwned API
1880
+ * 3. Counts how many times the password is reused in the provided `password_map`
1881
+ *
1882
+ * Returns a vector of `CipherRisk` results, one for each input cipher.
1883
+ *
1884
+ * ## HIBP Check Results (`exposed_result` field)
1885
+ *
1886
+ * The `exposed_result` field uses the `ExposedPasswordResult` enum with three possible states:
1887
+ * - `NotChecked`: Password exposure check was not performed because:
1888
+ * - `check_exposed` option was `false`, or
1889
+ * - Password was empty
1890
+ * - `Found(n)`: Successfully checked via HIBP API, password appears in `n` data breaches
1891
+ * - `Error(msg)`: HIBP API request failed with error message `msg`
1892
+ *
1893
+ * # Errors
1894
+ *
1895
+ * This method only returns `Err` for internal logic failures. HIBP API errors are
1896
+ * captured per-cipher in the `exposed_result` field as `ExposedPasswordResult::Error(msg)`.
1897
+ */
1898
+ compute_risk(
1899
+ login_details: CipherLoginDetails[],
1900
+ options: CipherRiskOptions,
1901
+ ): Promise<CipherRiskResult[]>;
1902
+ }
1774
1903
  export class CiphersClient {
1775
1904
  private constructor();
1776
1905
  free(): void;
@@ -2290,4 +2419,8 @@ export class VaultClient {
2290
2419
  * Collection related operations.
2291
2420
  */
2292
2421
  collections(): CollectionsClient;
2422
+ /**
2423
+ * Cipher risk evaluation operations.
2424
+ */
2425
+ cipher_risk(): CipherRiskClient;
2293
2426
  }
@@ -775,6 +775,19 @@ module.exports.isCreateFolderError = function (error) {
775
775
  }
776
776
  };
777
777
 
778
+ /**
779
+ * @param {any} error
780
+ * @returns {boolean}
781
+ */
782
+ module.exports.isCipherRiskError = function (error) {
783
+ try {
784
+ const ret = wasm.isCipherRiskError(addBorrowedObject(error));
785
+ return ret !== 0;
786
+ } finally {
787
+ heap[stack_pointer++] = undefined;
788
+ }
789
+ };
790
+
778
791
  /**
779
792
  * @param {any} error
780
793
  * @returns {boolean}
@@ -854,9 +867,17 @@ module.exports.isEncryptFileError = function (error) {
854
867
  };
855
868
 
856
869
  function __wbg_adapter_54(arg0, arg1, arg2) {
870
+ wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h8322b6841f4e63be(
871
+ arg0,
872
+ arg1,
873
+ addHeapObject(arg2),
874
+ );
875
+ }
876
+
877
+ function __wbg_adapter_57(arg0, arg1, arg2) {
857
878
  try {
858
879
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
859
- wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h2c1223667a93fd6c(
880
+ wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__hdee59a176c58b697(
860
881
  retptr,
861
882
  arg0,
862
883
  arg1,
@@ -872,23 +893,15 @@ function __wbg_adapter_54(arg0, arg1, arg2) {
872
893
  }
873
894
  }
874
895
 
875
- function __wbg_adapter_57(arg0, arg1, arg2) {
876
- wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h0d7795300800d4d2(
877
- arg0,
878
- arg1,
879
- addHeapObject(arg2),
880
- );
881
- }
882
-
883
896
  function __wbg_adapter_60(arg0, arg1) {
884
- wasm._dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h091423ccfc08366e(
897
+ wasm._dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h1d088d25aee734e6(
885
898
  arg0,
886
899
  arg1,
887
900
  );
888
901
  }
889
902
 
890
- function __wbg_adapter_348(arg0, arg1, arg2, arg3) {
891
- wasm.wasm_bindgen__convert__closures__invoke2_mut__h54a8613170fef18e(
903
+ function __wbg_adapter_354(arg0, arg1, arg2, arg3) {
904
+ wasm.wasm_bindgen__convert__closures__invoke2_mut__h849ee2a9e4ae2f91(
892
905
  arg0,
893
906
  arg1,
894
907
  addHeapObject(arg2),
@@ -1323,6 +1336,89 @@ class BitwardenClient {
1323
1336
  }
1324
1337
  module.exports.BitwardenClient = BitwardenClient;
1325
1338
 
1339
+ const CipherRiskClientFinalization =
1340
+ typeof FinalizationRegistry === "undefined"
1341
+ ? { register: () => {}, unregister: () => {} }
1342
+ : new FinalizationRegistry((ptr) => wasm.__wbg_cipherriskclient_free(ptr >>> 0, 1));
1343
+ /**
1344
+ * Client for evaluating credential risk for login ciphers.
1345
+ */
1346
+ class CipherRiskClient {
1347
+ static __wrap(ptr) {
1348
+ ptr = ptr >>> 0;
1349
+ const obj = Object.create(CipherRiskClient.prototype);
1350
+ obj.__wbg_ptr = ptr;
1351
+ CipherRiskClientFinalization.register(obj, obj.__wbg_ptr, obj);
1352
+ return obj;
1353
+ }
1354
+
1355
+ __destroy_into_raw() {
1356
+ const ptr = this.__wbg_ptr;
1357
+ this.__wbg_ptr = 0;
1358
+ CipherRiskClientFinalization.unregister(this);
1359
+ return ptr;
1360
+ }
1361
+
1362
+ free() {
1363
+ const ptr = this.__destroy_into_raw();
1364
+ wasm.__wbg_cipherriskclient_free(ptr, 0);
1365
+ }
1366
+ /**
1367
+ * Build password reuse map for a list of login ciphers.
1368
+ *
1369
+ * Returns a map where keys are passwords and values are the number of times
1370
+ * each password appears in the provided list. This map can be passed to `compute_risk()`
1371
+ * to enable password reuse detection.
1372
+ * @param {CipherLoginDetails[]} login_details
1373
+ * @returns {PasswordReuseMap}
1374
+ */
1375
+ password_reuse_map(login_details) {
1376
+ const ptr0 = passArrayJsValueToWasm0(login_details, wasm.__wbindgen_malloc);
1377
+ const len0 = WASM_VECTOR_LEN;
1378
+ const ret = wasm.cipherriskclient_password_reuse_map(this.__wbg_ptr, ptr0, len0);
1379
+ return takeObject(ret);
1380
+ }
1381
+ /**
1382
+ * Evaluate security risks for multiple login ciphers concurrently.
1383
+ *
1384
+ * For each cipher:
1385
+ * 1. Calculates password strength (0-4) using zxcvbn with cipher-specific context
1386
+ * 2. Optionally checks if the password has been exposed via Have I Been Pwned API
1387
+ * 3. Counts how many times the password is reused in the provided `password_map`
1388
+ *
1389
+ * Returns a vector of `CipherRisk` results, one for each input cipher.
1390
+ *
1391
+ * ## HIBP Check Results (`exposed_result` field)
1392
+ *
1393
+ * The `exposed_result` field uses the `ExposedPasswordResult` enum with three possible states:
1394
+ * - `NotChecked`: Password exposure check was not performed because:
1395
+ * - `check_exposed` option was `false`, or
1396
+ * - Password was empty
1397
+ * - `Found(n)`: Successfully checked via HIBP API, password appears in `n` data breaches
1398
+ * - `Error(msg)`: HIBP API request failed with error message `msg`
1399
+ *
1400
+ * # Errors
1401
+ *
1402
+ * This method only returns `Err` for internal logic failures. HIBP API errors are
1403
+ * captured per-cipher in the `exposed_result` field as `ExposedPasswordResult::Error(msg)`.
1404
+ * @param {CipherLoginDetails[]} login_details
1405
+ * @param {CipherRiskOptions} options
1406
+ * @returns {Promise<CipherRiskResult[]>}
1407
+ */
1408
+ compute_risk(login_details, options) {
1409
+ const ptr0 = passArrayJsValueToWasm0(login_details, wasm.__wbindgen_malloc);
1410
+ const len0 = WASM_VECTOR_LEN;
1411
+ const ret = wasm.cipherriskclient_compute_risk(
1412
+ this.__wbg_ptr,
1413
+ ptr0,
1414
+ len0,
1415
+ addHeapObject(options),
1416
+ );
1417
+ return takeObject(ret);
1418
+ }
1419
+ }
1420
+ module.exports.CipherRiskClient = CipherRiskClient;
1421
+
1326
1422
  const CiphersClientFinalization =
1327
1423
  typeof FinalizationRegistry === "undefined"
1328
1424
  ? { register: () => {}, unregister: () => {} }
@@ -4114,6 +4210,14 @@ class VaultClient {
4114
4210
  const ret = wasm.vaultclient_attachments(this.__wbg_ptr);
4115
4211
  return CollectionsClient.__wrap(ret);
4116
4212
  }
4213
+ /**
4214
+ * Cipher risk evaluation operations.
4215
+ * @returns {CipherRiskClient}
4216
+ */
4217
+ cipher_risk() {
4218
+ const ret = wasm.vaultclient_attachments(this.__wbg_ptr);
4219
+ return CipherRiskClient.__wrap(ret);
4220
+ }
4117
4221
  }
4118
4222
  module.exports.VaultClient = VaultClient;
4119
4223
 
@@ -4197,7 +4301,7 @@ module.exports.__wbg_call_7cccdd69e0791ae2 = function () {
4197
4301
  }, arguments);
4198
4302
  };
4199
4303
 
4200
- module.exports.__wbg_cipher_ca883e6380fad369 = function (arg0) {
4304
+ module.exports.__wbg_cipher_0354ea4980a45865 = function (arg0) {
4201
4305
  const ret = getObject(arg0).cipher;
4202
4306
  return isLikeNone(ret) ? 0 : addHeapObject(ret);
4203
4307
  };
@@ -4277,11 +4381,16 @@ module.exports.__wbg_fetch_509096533071c657 = function (arg0, arg1) {
4277
4381
  return addHeapObject(ret);
4278
4382
  };
4279
4383
 
4280
- module.exports.__wbg_folder_19d1d56c0ecd965b = function (arg0) {
4384
+ module.exports.__wbg_folder_065654789aaca86c = function (arg0) {
4281
4385
  const ret = getObject(arg0).folder;
4282
4386
  return isLikeNone(ret) ? 0 : addHeapObject(ret);
4283
4387
  };
4284
4388
 
4389
+ module.exports.__wbg_getFullYear_17d3c9e4db748eb7 = function (arg0) {
4390
+ const ret = getObject(arg0).getFullYear();
4391
+ return ret;
4392
+ };
4393
+
4285
4394
  module.exports.__wbg_getRandomValues_38097e921c2494c3 = function () {
4286
4395
  return handleError(function (arg0, arg1) {
4287
4396
  globalThis.crypto.getRandomValues(getArrayU8FromWasm0(arg0, arg1));
@@ -4299,7 +4408,7 @@ module.exports.__wbg_getTime_46267b1c24877e30 = function (arg0) {
4299
4408
  return ret;
4300
4409
  };
4301
4410
 
4302
- module.exports.__wbg_get_0624ae11c93ed9ad = function () {
4411
+ module.exports.__wbg_get_0c000b31aafb62a6 = function () {
4303
4412
  return handleError(function (arg0, arg1, arg2) {
4304
4413
  let deferred0_0;
4305
4414
  let deferred0_1;
@@ -4326,7 +4435,7 @@ module.exports.__wbg_get_b9b93047fe3cf45b = function (arg0, arg1) {
4326
4435
  return addHeapObject(ret);
4327
4436
  };
4328
4437
 
4329
- module.exports.__wbg_get_d95b1f8fc222051d = function () {
4438
+ module.exports.__wbg_get_c3b0fae9ed2d916c = function () {
4330
4439
  return handleError(function (arg0, arg1, arg2) {
4331
4440
  let deferred0_0;
4332
4441
  let deferred0_1;
@@ -4341,7 +4450,7 @@ module.exports.__wbg_get_d95b1f8fc222051d = function () {
4341
4450
  }, arguments);
4342
4451
  };
4343
4452
 
4344
- module.exports.__wbg_getaccesstoken_e0e71336d6e1a169 = function (arg0) {
4453
+ module.exports.__wbg_getaccesstoken_d29c96563f3c4f7f = function (arg0) {
4345
4454
  const ret = getObject(arg0).get_access_token();
4346
4455
  return addHeapObject(ret);
4347
4456
  };
@@ -4526,14 +4635,14 @@ module.exports.__wbg_length_e2d2a49132c1b256 = function (arg0) {
4526
4635
  return ret;
4527
4636
  };
4528
4637
 
4529
- module.exports.__wbg_list_48d8811c54cfb757 = function () {
4638
+ module.exports.__wbg_list_5218cdfdd9081474 = function () {
4530
4639
  return handleError(function (arg0) {
4531
4640
  const ret = getObject(arg0).list();
4532
4641
  return addHeapObject(ret);
4533
4642
  }, arguments);
4534
4643
  };
4535
4644
 
4536
- module.exports.__wbg_list_be12328464daeb26 = function () {
4645
+ module.exports.__wbg_list_83c655ffacf926b7 = function () {
4537
4646
  return handleError(function (arg0) {
4538
4647
  const ret = getObject(arg0).list();
4539
4648
  return addHeapObject(ret);
@@ -4576,7 +4685,7 @@ module.exports.__wbg_new_23a2665fac83c611 = function (arg0, arg1) {
4576
4685
  const a = state0.a;
4577
4686
  state0.a = 0;
4578
4687
  try {
4579
- return __wbg_adapter_348(a, state0.b, arg0, arg1);
4688
+ return __wbg_adapter_354(a, state0.b, arg0, arg1);
4580
4689
  } finally {
4581
4690
  state0.a = a;
4582
4691
  }
@@ -4691,6 +4800,11 @@ module.exports.__wbg_node_905d3e251edff8a2 = function (arg0) {
4691
4800
  return addHeapObject(ret);
4692
4801
  };
4693
4802
 
4803
+ module.exports.__wbg_now_d18023d54d4e5500 = function (arg0) {
4804
+ const ret = getObject(arg0).now();
4805
+ return ret;
4806
+ };
4807
+
4694
4808
  module.exports.__wbg_open_e0c0b2993eb596e1 = function () {
4695
4809
  return handleError(function (arg0, arg1, arg2, arg3) {
4696
4810
  const ret = getObject(arg0).open(getStringFromWasm0(arg1, arg2), arg3 >>> 0);
@@ -4734,7 +4848,7 @@ module.exports.__wbg_randomFillSync_ac0988aba3254290 = function () {
4734
4848
  }, arguments);
4735
4849
  };
4736
4850
 
4737
- module.exports.__wbg_remove_9fba740d43c47185 = function () {
4851
+ module.exports.__wbg_remove_0e9beb59d125be57 = function () {
4738
4852
  return handleError(function (arg0, arg1, arg2) {
4739
4853
  let deferred0_0;
4740
4854
  let deferred0_1;
@@ -4749,7 +4863,7 @@ module.exports.__wbg_remove_9fba740d43c47185 = function () {
4749
4863
  }, arguments);
4750
4864
  };
4751
4865
 
4752
- module.exports.__wbg_remove_a6f457773feb1919 = function () {
4866
+ module.exports.__wbg_remove_6387a99bd1c07f3b = function () {
4753
4867
  return handleError(function (arg0, arg1, arg2) {
4754
4868
  let deferred0_0;
4755
4869
  let deferred0_1;
@@ -4803,11 +4917,7 @@ module.exports.__wbg_set_3f1d0b984ed272ed = function (arg0, arg1, arg2) {
4803
4917
  getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
4804
4918
  };
4805
4919
 
4806
- module.exports.__wbg_set_65595bdd868b3009 = function (arg0, arg1, arg2) {
4807
- getObject(arg0).set(getObject(arg1), arg2 >>> 0);
4808
- };
4809
-
4810
- module.exports.__wbg_set_7d6f921c2587ab5a = function () {
4920
+ module.exports.__wbg_set_4909636594ca7c7a = function () {
4811
4921
  return handleError(function (arg0, arg1, arg2, arg3) {
4812
4922
  let deferred0_0;
4813
4923
  let deferred0_1;
@@ -4822,12 +4932,16 @@ module.exports.__wbg_set_7d6f921c2587ab5a = function () {
4822
4932
  }, arguments);
4823
4933
  };
4824
4934
 
4935
+ module.exports.__wbg_set_65595bdd868b3009 = function (arg0, arg1, arg2) {
4936
+ getObject(arg0).set(getObject(arg1), arg2 >>> 0);
4937
+ };
4938
+
4825
4939
  module.exports.__wbg_set_8fc6bf8a5b1071d1 = function (arg0, arg1, arg2) {
4826
4940
  const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
4827
4941
  return addHeapObject(ret);
4828
4942
  };
4829
4943
 
4830
- module.exports.__wbg_set_bdbb7d27f1b5f069 = function () {
4944
+ module.exports.__wbg_set_b63bcc0eff25f894 = function () {
4831
4945
  return handleError(function (arg0, arg1, arg2, arg3) {
4832
4946
  let deferred0_0;
4833
4947
  let deferred0_1;
@@ -4939,6 +5053,11 @@ module.exports.__wbg_static_accessor_WINDOW_5de37043a91a9c40 = function () {
4939
5053
  return isLikeNone(ret) ? 0 : addHeapObject(ret);
4940
5054
  };
4941
5055
 
5056
+ module.exports.__wbg_static_accessor_performance_da77b3a901a72934 = function () {
5057
+ const ret = performance;
5058
+ return addHeapObject(ret);
5059
+ };
5060
+
4942
5061
  module.exports.__wbg_status_f6360336ca686bf0 = function (arg0) {
4943
5062
  const ret = getObject(arg0).status;
4944
5063
  return ret;
@@ -5052,28 +5171,28 @@ module.exports.__wbindgen_cb_drop = function (arg0) {
5052
5171
  return ret;
5053
5172
  };
5054
5173
 
5055
- module.exports.__wbindgen_closure_wrapper193 = function (arg0, arg1, arg2) {
5174
+ module.exports.__wbindgen_closure_wrapper198 = function (arg0, arg1, arg2) {
5056
5175
  const ret = makeMutClosure(arg0, arg1, 7, __wbg_adapter_54);
5057
5176
  return addHeapObject(ret);
5058
5177
  };
5059
5178
 
5060
- module.exports.__wbindgen_closure_wrapper195 = function (arg0, arg1, arg2) {
5179
+ module.exports.__wbindgen_closure_wrapper200 = function (arg0, arg1, arg2) {
5061
5180
  const ret = makeMutClosure(arg0, arg1, 7, __wbg_adapter_57);
5062
5181
  return addHeapObject(ret);
5063
5182
  };
5064
5183
 
5065
- module.exports.__wbindgen_closure_wrapper3935 = function (arg0, arg1, arg2) {
5066
- const ret = makeMutClosure(arg0, arg1, 301, __wbg_adapter_60);
5184
+ module.exports.__wbindgen_closure_wrapper4257 = function (arg0, arg1, arg2) {
5185
+ const ret = makeMutClosure(arg0, arg1, 349, __wbg_adapter_60);
5067
5186
  return addHeapObject(ret);
5068
5187
  };
5069
5188
 
5070
- module.exports.__wbindgen_closure_wrapper6421 = function (arg0, arg1, arg2) {
5071
- const ret = makeMutClosure(arg0, arg1, 327, __wbg_adapter_60);
5189
+ module.exports.__wbindgen_closure_wrapper8229 = function (arg0, arg1, arg2) {
5190
+ const ret = makeMutClosure(arg0, arg1, 516, __wbg_adapter_60);
5072
5191
  return addHeapObject(ret);
5073
5192
  };
5074
5193
 
5075
- module.exports.__wbindgen_closure_wrapper6801 = function (arg0, arg1, arg2) {
5076
- const ret = makeMutClosure(arg0, arg1, 350, __wbg_adapter_57);
5194
+ module.exports.__wbindgen_closure_wrapper8612 = function (arg0, arg1, arg2) {
5195
+ const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_54);
5077
5196
  return addHeapObject(ret);
5078
5197
  };
5079
5198
 
@@ -349,6 +349,8 @@ export const ciphersclient_move_to_organization: (
349
349
  d: number,
350
350
  ) => void;
351
351
  export const ciphersclient_decrypt_fido2_private_key: (a: number, b: number, c: number) => void;
352
+ export const cipherriskclient_password_reuse_map: (a: number, b: number, c: number) => number;
353
+ export const cipherriskclient_compute_risk: (a: number, b: number, c: number, d: number) => number;
352
354
  export const foldersclient_encrypt: (a: number, b: number, c: number) => void;
353
355
  export const foldersclient_decrypt: (a: number, b: number, c: number) => void;
354
356
  export const foldersclient_decrypt_list: (a: number, b: number, c: number, d: number) => void;
@@ -383,6 +385,7 @@ export const isTotpError: (a: number) => number;
383
385
  export const isGetFolderError: (a: number) => number;
384
386
  export const isEditFolderError: (a: number) => number;
385
387
  export const isCreateFolderError: (a: number) => number;
388
+ export const isCipherRiskError: (a: number) => number;
386
389
  export const isGetCipherError: (a: number) => number;
387
390
  export const isEditCipherError: (a: number) => number;
388
391
  export const isCreateCipherError: (a: number) => number;
@@ -403,7 +406,9 @@ export const vaultclient_ciphers: (a: number) => number;
403
406
  export const vaultclient_folders: (a: number) => number;
404
407
  export const vaultclient_totp: (a: number) => number;
405
408
  export const vaultclient_collections: (a: number) => number;
409
+ export const vaultclient_cipher_risk: (a: number) => number;
406
410
  export const __wbg_foldersclient_free: (a: number, b: number) => void;
411
+ export const __wbg_cipherriskclient_free: (a: number, b: number) => void;
407
412
  export const __wbg_ciphersclient_free: (a: number, b: number) => void;
408
413
  export const __wbg_collectionsclient_free: (a: number, b: number) => void;
409
414
  export const __wbg_vaultclient_free: (a: number, b: number) => void;
@@ -418,22 +423,22 @@ export const __wbindgen_exn_store: (a: number) => void;
418
423
  export const __wbindgen_free: (a: number, b: number, c: number) => void;
419
424
  export const __wbindgen_export_4: WebAssembly.Table;
420
425
  export const __wbindgen_add_to_stack_pointer: (a: number) => number;
421
- export const _dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h2c1223667a93fd6c: (
426
+ export const _dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h8322b6841f4e63be: (
422
427
  a: number,
423
428
  b: number,
424
429
  c: number,
425
- d: number,
426
430
  ) => void;
427
- export const _dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h0d7795300800d4d2: (
431
+ export const _dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__hdee59a176c58b697: (
428
432
  a: number,
429
433
  b: number,
430
434
  c: number,
435
+ d: number,
431
436
  ) => void;
432
- export const _dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h091423ccfc08366e: (
437
+ export const _dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h1d088d25aee734e6: (
433
438
  a: number,
434
439
  b: number,
435
440
  ) => void;
436
- export const wasm_bindgen__convert__closures__invoke2_mut__h54a8613170fef18e: (
441
+ export const wasm_bindgen__convert__closures__invoke2_mut__h849ee2a9e4ae2f91: (
437
442
  a: number,
438
443
  b: number,
439
444
  c: number,
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@bitwarden/commercial-sdk-internal",
3
- "version": "0.2.0-main.363",
3
+ "version": "0.2.0-main.365",
4
4
  "license": "BITWARDEN SOFTWARE DEVELOPMENT KIT LICENSE AGREEMENT",
5
5
  "repository": {
6
6
  "type": "git",