@bitwarden/commercial-sdk-internal 0.2.0-main.364 → 0.2.0-main.365
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bitwarden_wasm_internal.d.ts +133 -0
- package/bitwarden_wasm_internal_bg.js +154 -36
- package/bitwarden_wasm_internal_bg.wasm +0 -0
- package/bitwarden_wasm_internal_bg.wasm.d.ts +10 -5
- package/bitwarden_wasm_internal_bg.wasm.js +1 -1
- package/node/bitwarden_wasm_internal.d.ts +133 -0
- package/node/bitwarden_wasm_internal.js +155 -36
- package/node/bitwarden_wasm_internal_bg.wasm +0 -0
- package/node/bitwarden_wasm_internal_bg.wasm.d.ts +10 -5
- package/package.json +1 -1
|
@@ -1387,6 +1387,85 @@ export interface SecureNoteView {
|
|
|
1387
1387
|
type: SecureNoteType;
|
|
1388
1388
|
}
|
|
1389
1389
|
|
|
1390
|
+
/**
|
|
1391
|
+
* Result of checking password exposure via HIBP API.
|
|
1392
|
+
*/
|
|
1393
|
+
export type ExposedPasswordResult =
|
|
1394
|
+
| { type: "NotChecked" }
|
|
1395
|
+
| { type: "Found"; value: number }
|
|
1396
|
+
| { type: "Error"; value: string };
|
|
1397
|
+
|
|
1398
|
+
/**
|
|
1399
|
+
* Login cipher data needed for risk evaluation.
|
|
1400
|
+
*/
|
|
1401
|
+
export interface CipherLoginDetails {
|
|
1402
|
+
/**
|
|
1403
|
+
* Cipher ID to identify which cipher in results.
|
|
1404
|
+
*/
|
|
1405
|
+
id: CipherId;
|
|
1406
|
+
/**
|
|
1407
|
+
* The decrypted password to evaluate.
|
|
1408
|
+
*/
|
|
1409
|
+
password: string;
|
|
1410
|
+
/**
|
|
1411
|
+
* Username or email (login ciphers only have one field).
|
|
1412
|
+
*/
|
|
1413
|
+
username: string | undefined;
|
|
1414
|
+
}
|
|
1415
|
+
|
|
1416
|
+
/**
|
|
1417
|
+
* Password reuse map wrapper for WASM compatibility.
|
|
1418
|
+
*/
|
|
1419
|
+
export type PasswordReuseMap = Record<string, number>;
|
|
1420
|
+
|
|
1421
|
+
/**
|
|
1422
|
+
* Options for configuring risk computation.
|
|
1423
|
+
*/
|
|
1424
|
+
export interface CipherRiskOptions {
|
|
1425
|
+
/**
|
|
1426
|
+
* Pre-computed password reuse map (password → count).
|
|
1427
|
+
* If provided, enables reuse detection across ciphers.
|
|
1428
|
+
*/
|
|
1429
|
+
passwordMap?: PasswordReuseMap | undefined;
|
|
1430
|
+
/**
|
|
1431
|
+
* Whether to check passwords against Have I Been Pwned API.
|
|
1432
|
+
* When true, makes network requests to check for exposed passwords.
|
|
1433
|
+
*/
|
|
1434
|
+
checkExposed?: boolean;
|
|
1435
|
+
/**
|
|
1436
|
+
* Optional HIBP API base URL override. When None, uses the production HIBP URL.
|
|
1437
|
+
* Can be used for testing or alternative password breach checking services.
|
|
1438
|
+
*/
|
|
1439
|
+
hibpBaseUrl?: string | undefined;
|
|
1440
|
+
}
|
|
1441
|
+
|
|
1442
|
+
/**
|
|
1443
|
+
* Risk evaluation result for a single cipher.
|
|
1444
|
+
*/
|
|
1445
|
+
export interface CipherRiskResult {
|
|
1446
|
+
/**
|
|
1447
|
+
* Cipher ID matching the input CipherLoginDetails.
|
|
1448
|
+
*/
|
|
1449
|
+
id: CipherId;
|
|
1450
|
+
/**
|
|
1451
|
+
* Password strength score from 0 (weakest) to 4 (strongest).
|
|
1452
|
+
* Calculated using zxcvbn with cipher-specific context.
|
|
1453
|
+
*/
|
|
1454
|
+
password_strength: number;
|
|
1455
|
+
/**
|
|
1456
|
+
* Result of checking password exposure via HIBP API.
|
|
1457
|
+
* - `NotChecked`: check_exposed was false, or password was empty
|
|
1458
|
+
* - `Found(n)`: Successfully checked, found in n breaches
|
|
1459
|
+
* - `Error(msg)`: HIBP API request failed for this cipher with the given error message
|
|
1460
|
+
*/
|
|
1461
|
+
exposed_result: ExposedPasswordResult;
|
|
1462
|
+
/**
|
|
1463
|
+
* Number of times this password appears in the provided password_map.
|
|
1464
|
+
* None if not found or if no password_map was provided.
|
|
1465
|
+
*/
|
|
1466
|
+
reuse_count: number | undefined;
|
|
1467
|
+
}
|
|
1468
|
+
|
|
1390
1469
|
/**
|
|
1391
1470
|
* Request to add or edit a folder.
|
|
1392
1471
|
*/
|
|
@@ -1488,6 +1567,13 @@ export interface CreateFolderError extends Error {
|
|
|
1488
1567
|
|
|
1489
1568
|
export function isCreateFolderError(error: any): error is CreateFolderError;
|
|
1490
1569
|
|
|
1570
|
+
export interface CipherRiskError extends Error {
|
|
1571
|
+
name: "CipherRiskError";
|
|
1572
|
+
variant: "Reqwest";
|
|
1573
|
+
}
|
|
1574
|
+
|
|
1575
|
+
export function isCipherRiskError(error: any): error is CipherRiskError;
|
|
1576
|
+
|
|
1491
1577
|
export interface SshKeyView {
|
|
1492
1578
|
/**
|
|
1493
1579
|
* SSH private key (ed25519/rsa) in unencrypted openssh private key format [OpenSSH private key](https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.key)
|
|
@@ -1771,6 +1857,49 @@ export class BitwardenClient {
|
|
|
1771
1857
|
*/
|
|
1772
1858
|
exporters(): ExporterClient;
|
|
1773
1859
|
}
|
|
1860
|
+
/**
|
|
1861
|
+
* Client for evaluating credential risk for login ciphers.
|
|
1862
|
+
*/
|
|
1863
|
+
export class CipherRiskClient {
|
|
1864
|
+
private constructor();
|
|
1865
|
+
free(): void;
|
|
1866
|
+
/**
|
|
1867
|
+
* Build password reuse map for a list of login ciphers.
|
|
1868
|
+
*
|
|
1869
|
+
* Returns a map where keys are passwords and values are the number of times
|
|
1870
|
+
* each password appears in the provided list. This map can be passed to `compute_risk()`
|
|
1871
|
+
* to enable password reuse detection.
|
|
1872
|
+
*/
|
|
1873
|
+
password_reuse_map(login_details: CipherLoginDetails[]): PasswordReuseMap;
|
|
1874
|
+
/**
|
|
1875
|
+
* Evaluate security risks for multiple login ciphers concurrently.
|
|
1876
|
+
*
|
|
1877
|
+
* For each cipher:
|
|
1878
|
+
* 1. Calculates password strength (0-4) using zxcvbn with cipher-specific context
|
|
1879
|
+
* 2. Optionally checks if the password has been exposed via Have I Been Pwned API
|
|
1880
|
+
* 3. Counts how many times the password is reused in the provided `password_map`
|
|
1881
|
+
*
|
|
1882
|
+
* Returns a vector of `CipherRisk` results, one for each input cipher.
|
|
1883
|
+
*
|
|
1884
|
+
* ## HIBP Check Results (`exposed_result` field)
|
|
1885
|
+
*
|
|
1886
|
+
* The `exposed_result` field uses the `ExposedPasswordResult` enum with three possible states:
|
|
1887
|
+
* - `NotChecked`: Password exposure check was not performed because:
|
|
1888
|
+
* - `check_exposed` option was `false`, or
|
|
1889
|
+
* - Password was empty
|
|
1890
|
+
* - `Found(n)`: Successfully checked via HIBP API, password appears in `n` data breaches
|
|
1891
|
+
* - `Error(msg)`: HIBP API request failed with error message `msg`
|
|
1892
|
+
*
|
|
1893
|
+
* # Errors
|
|
1894
|
+
*
|
|
1895
|
+
* This method only returns `Err` for internal logic failures. HIBP API errors are
|
|
1896
|
+
* captured per-cipher in the `exposed_result` field as `ExposedPasswordResult::Error(msg)`.
|
|
1897
|
+
*/
|
|
1898
|
+
compute_risk(
|
|
1899
|
+
login_details: CipherLoginDetails[],
|
|
1900
|
+
options: CipherRiskOptions,
|
|
1901
|
+
): Promise<CipherRiskResult[]>;
|
|
1902
|
+
}
|
|
1774
1903
|
export class CiphersClient {
|
|
1775
1904
|
private constructor();
|
|
1776
1905
|
free(): void;
|
|
@@ -2290,4 +2419,8 @@ export class VaultClient {
|
|
|
2290
2419
|
* Collection related operations.
|
|
2291
2420
|
*/
|
|
2292
2421
|
collections(): CollectionsClient;
|
|
2422
|
+
/**
|
|
2423
|
+
* Cipher risk evaluation operations.
|
|
2424
|
+
*/
|
|
2425
|
+
cipher_risk(): CipherRiskClient;
|
|
2293
2426
|
}
|
|
@@ -781,6 +781,19 @@ export function isCreateFolderError(error) {
|
|
|
781
781
|
}
|
|
782
782
|
}
|
|
783
783
|
|
|
784
|
+
/**
|
|
785
|
+
* @param {any} error
|
|
786
|
+
* @returns {boolean}
|
|
787
|
+
*/
|
|
788
|
+
export function isCipherRiskError(error) {
|
|
789
|
+
try {
|
|
790
|
+
const ret = wasm.isCipherRiskError(addBorrowedObject(error));
|
|
791
|
+
return ret !== 0;
|
|
792
|
+
} finally {
|
|
793
|
+
heap[stack_pointer++] = undefined;
|
|
794
|
+
}
|
|
795
|
+
}
|
|
796
|
+
|
|
784
797
|
/**
|
|
785
798
|
* @param {any} error
|
|
786
799
|
* @returns {boolean}
|
|
@@ -860,9 +873,17 @@ export function isEncryptFileError(error) {
|
|
|
860
873
|
}
|
|
861
874
|
|
|
862
875
|
function __wbg_adapter_54(arg0, arg1, arg2) {
|
|
876
|
+
wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h8322b6841f4e63be(
|
|
877
|
+
arg0,
|
|
878
|
+
arg1,
|
|
879
|
+
addHeapObject(arg2),
|
|
880
|
+
);
|
|
881
|
+
}
|
|
882
|
+
|
|
883
|
+
function __wbg_adapter_57(arg0, arg1, arg2) {
|
|
863
884
|
try {
|
|
864
885
|
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
865
|
-
wasm.
|
|
886
|
+
wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__hdee59a176c58b697(
|
|
866
887
|
retptr,
|
|
867
888
|
arg0,
|
|
868
889
|
arg1,
|
|
@@ -878,23 +899,15 @@ function __wbg_adapter_54(arg0, arg1, arg2) {
|
|
|
878
899
|
}
|
|
879
900
|
}
|
|
880
901
|
|
|
881
|
-
function __wbg_adapter_57(arg0, arg1, arg2) {
|
|
882
|
-
wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h0d7795300800d4d2(
|
|
883
|
-
arg0,
|
|
884
|
-
arg1,
|
|
885
|
-
addHeapObject(arg2),
|
|
886
|
-
);
|
|
887
|
-
}
|
|
888
|
-
|
|
889
902
|
function __wbg_adapter_60(arg0, arg1) {
|
|
890
|
-
wasm.
|
|
903
|
+
wasm._dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h1d088d25aee734e6(
|
|
891
904
|
arg0,
|
|
892
905
|
arg1,
|
|
893
906
|
);
|
|
894
907
|
}
|
|
895
908
|
|
|
896
|
-
function
|
|
897
|
-
wasm.
|
|
909
|
+
function __wbg_adapter_354(arg0, arg1, arg2, arg3) {
|
|
910
|
+
wasm.wasm_bindgen__convert__closures__invoke2_mut__h849ee2a9e4ae2f91(
|
|
898
911
|
arg0,
|
|
899
912
|
arg1,
|
|
900
913
|
addHeapObject(arg2),
|
|
@@ -1326,6 +1339,88 @@ export class BitwardenClient {
|
|
|
1326
1339
|
}
|
|
1327
1340
|
}
|
|
1328
1341
|
|
|
1342
|
+
const CipherRiskClientFinalization =
|
|
1343
|
+
typeof FinalizationRegistry === "undefined"
|
|
1344
|
+
? { register: () => {}, unregister: () => {} }
|
|
1345
|
+
: new FinalizationRegistry((ptr) => wasm.__wbg_cipherriskclient_free(ptr >>> 0, 1));
|
|
1346
|
+
/**
|
|
1347
|
+
* Client for evaluating credential risk for login ciphers.
|
|
1348
|
+
*/
|
|
1349
|
+
export class CipherRiskClient {
|
|
1350
|
+
static __wrap(ptr) {
|
|
1351
|
+
ptr = ptr >>> 0;
|
|
1352
|
+
const obj = Object.create(CipherRiskClient.prototype);
|
|
1353
|
+
obj.__wbg_ptr = ptr;
|
|
1354
|
+
CipherRiskClientFinalization.register(obj, obj.__wbg_ptr, obj);
|
|
1355
|
+
return obj;
|
|
1356
|
+
}
|
|
1357
|
+
|
|
1358
|
+
__destroy_into_raw() {
|
|
1359
|
+
const ptr = this.__wbg_ptr;
|
|
1360
|
+
this.__wbg_ptr = 0;
|
|
1361
|
+
CipherRiskClientFinalization.unregister(this);
|
|
1362
|
+
return ptr;
|
|
1363
|
+
}
|
|
1364
|
+
|
|
1365
|
+
free() {
|
|
1366
|
+
const ptr = this.__destroy_into_raw();
|
|
1367
|
+
wasm.__wbg_cipherriskclient_free(ptr, 0);
|
|
1368
|
+
}
|
|
1369
|
+
/**
|
|
1370
|
+
* Build password reuse map for a list of login ciphers.
|
|
1371
|
+
*
|
|
1372
|
+
* Returns a map where keys are passwords and values are the number of times
|
|
1373
|
+
* each password appears in the provided list. This map can be passed to `compute_risk()`
|
|
1374
|
+
* to enable password reuse detection.
|
|
1375
|
+
* @param {CipherLoginDetails[]} login_details
|
|
1376
|
+
* @returns {PasswordReuseMap}
|
|
1377
|
+
*/
|
|
1378
|
+
password_reuse_map(login_details) {
|
|
1379
|
+
const ptr0 = passArrayJsValueToWasm0(login_details, wasm.__wbindgen_malloc);
|
|
1380
|
+
const len0 = WASM_VECTOR_LEN;
|
|
1381
|
+
const ret = wasm.cipherriskclient_password_reuse_map(this.__wbg_ptr, ptr0, len0);
|
|
1382
|
+
return takeObject(ret);
|
|
1383
|
+
}
|
|
1384
|
+
/**
|
|
1385
|
+
* Evaluate security risks for multiple login ciphers concurrently.
|
|
1386
|
+
*
|
|
1387
|
+
* For each cipher:
|
|
1388
|
+
* 1. Calculates password strength (0-4) using zxcvbn with cipher-specific context
|
|
1389
|
+
* 2. Optionally checks if the password has been exposed via Have I Been Pwned API
|
|
1390
|
+
* 3. Counts how many times the password is reused in the provided `password_map`
|
|
1391
|
+
*
|
|
1392
|
+
* Returns a vector of `CipherRisk` results, one for each input cipher.
|
|
1393
|
+
*
|
|
1394
|
+
* ## HIBP Check Results (`exposed_result` field)
|
|
1395
|
+
*
|
|
1396
|
+
* The `exposed_result` field uses the `ExposedPasswordResult` enum with three possible states:
|
|
1397
|
+
* - `NotChecked`: Password exposure check was not performed because:
|
|
1398
|
+
* - `check_exposed` option was `false`, or
|
|
1399
|
+
* - Password was empty
|
|
1400
|
+
* - `Found(n)`: Successfully checked via HIBP API, password appears in `n` data breaches
|
|
1401
|
+
* - `Error(msg)`: HIBP API request failed with error message `msg`
|
|
1402
|
+
*
|
|
1403
|
+
* # Errors
|
|
1404
|
+
*
|
|
1405
|
+
* This method only returns `Err` for internal logic failures. HIBP API errors are
|
|
1406
|
+
* captured per-cipher in the `exposed_result` field as `ExposedPasswordResult::Error(msg)`.
|
|
1407
|
+
* @param {CipherLoginDetails[]} login_details
|
|
1408
|
+
* @param {CipherRiskOptions} options
|
|
1409
|
+
* @returns {Promise<CipherRiskResult[]>}
|
|
1410
|
+
*/
|
|
1411
|
+
compute_risk(login_details, options) {
|
|
1412
|
+
const ptr0 = passArrayJsValueToWasm0(login_details, wasm.__wbindgen_malloc);
|
|
1413
|
+
const len0 = WASM_VECTOR_LEN;
|
|
1414
|
+
const ret = wasm.cipherriskclient_compute_risk(
|
|
1415
|
+
this.__wbg_ptr,
|
|
1416
|
+
ptr0,
|
|
1417
|
+
len0,
|
|
1418
|
+
addHeapObject(options),
|
|
1419
|
+
);
|
|
1420
|
+
return takeObject(ret);
|
|
1421
|
+
}
|
|
1422
|
+
}
|
|
1423
|
+
|
|
1329
1424
|
const CiphersClientFinalization =
|
|
1330
1425
|
typeof FinalizationRegistry === "undefined"
|
|
1331
1426
|
? { register: () => {}, unregister: () => {} }
|
|
@@ -4097,6 +4192,14 @@ export class VaultClient {
|
|
|
4097
4192
|
const ret = wasm.vaultclient_attachments(this.__wbg_ptr);
|
|
4098
4193
|
return CollectionsClient.__wrap(ret);
|
|
4099
4194
|
}
|
|
4195
|
+
/**
|
|
4196
|
+
* Cipher risk evaluation operations.
|
|
4197
|
+
* @returns {CipherRiskClient}
|
|
4198
|
+
*/
|
|
4199
|
+
cipher_risk() {
|
|
4200
|
+
const ret = wasm.vaultclient_attachments(this.__wbg_ptr);
|
|
4201
|
+
return CipherRiskClient.__wrap(ret);
|
|
4202
|
+
}
|
|
4100
4203
|
}
|
|
4101
4204
|
|
|
4102
4205
|
export function __wbg_String_8f0eb39a4a4c2f66(arg0, arg1) {
|
|
@@ -4179,7 +4282,7 @@ export function __wbg_call_7cccdd69e0791ae2() {
|
|
|
4179
4282
|
}, arguments);
|
|
4180
4283
|
}
|
|
4181
4284
|
|
|
4182
|
-
export function
|
|
4285
|
+
export function __wbg_cipher_0354ea4980a45865(arg0) {
|
|
4183
4286
|
const ret = getObject(arg0).cipher;
|
|
4184
4287
|
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
|
4185
4288
|
}
|
|
@@ -4259,11 +4362,16 @@ export function __wbg_fetch_509096533071c657(arg0, arg1) {
|
|
|
4259
4362
|
return addHeapObject(ret);
|
|
4260
4363
|
}
|
|
4261
4364
|
|
|
4262
|
-
export function
|
|
4365
|
+
export function __wbg_folder_065654789aaca86c(arg0) {
|
|
4263
4366
|
const ret = getObject(arg0).folder;
|
|
4264
4367
|
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
|
4265
4368
|
}
|
|
4266
4369
|
|
|
4370
|
+
export function __wbg_getFullYear_17d3c9e4db748eb7(arg0) {
|
|
4371
|
+
const ret = getObject(arg0).getFullYear();
|
|
4372
|
+
return ret;
|
|
4373
|
+
}
|
|
4374
|
+
|
|
4267
4375
|
export function __wbg_getRandomValues_38097e921c2494c3() {
|
|
4268
4376
|
return handleError(function (arg0, arg1) {
|
|
4269
4377
|
globalThis.crypto.getRandomValues(getArrayU8FromWasm0(arg0, arg1));
|
|
@@ -4281,7 +4389,7 @@ export function __wbg_getTime_46267b1c24877e30(arg0) {
|
|
|
4281
4389
|
return ret;
|
|
4282
4390
|
}
|
|
4283
4391
|
|
|
4284
|
-
export function
|
|
4392
|
+
export function __wbg_get_0c000b31aafb62a6() {
|
|
4285
4393
|
return handleError(function (arg0, arg1, arg2) {
|
|
4286
4394
|
let deferred0_0;
|
|
4287
4395
|
let deferred0_1;
|
|
@@ -4308,7 +4416,7 @@ export function __wbg_get_b9b93047fe3cf45b(arg0, arg1) {
|
|
|
4308
4416
|
return addHeapObject(ret);
|
|
4309
4417
|
}
|
|
4310
4418
|
|
|
4311
|
-
export function
|
|
4419
|
+
export function __wbg_get_c3b0fae9ed2d916c() {
|
|
4312
4420
|
return handleError(function (arg0, arg1, arg2) {
|
|
4313
4421
|
let deferred0_0;
|
|
4314
4422
|
let deferred0_1;
|
|
@@ -4323,7 +4431,7 @@ export function __wbg_get_c015e7c4206c8288() {
|
|
|
4323
4431
|
}, arguments);
|
|
4324
4432
|
}
|
|
4325
4433
|
|
|
4326
|
-
export function
|
|
4434
|
+
export function __wbg_getaccesstoken_d29c96563f3c4f7f(arg0) {
|
|
4327
4435
|
const ret = getObject(arg0).get_access_token();
|
|
4328
4436
|
return addHeapObject(ret);
|
|
4329
4437
|
}
|
|
@@ -4508,14 +4616,14 @@ export function __wbg_length_e2d2a49132c1b256(arg0) {
|
|
|
4508
4616
|
return ret;
|
|
4509
4617
|
}
|
|
4510
4618
|
|
|
4511
|
-
export function
|
|
4619
|
+
export function __wbg_list_5218cdfdd9081474() {
|
|
4512
4620
|
return handleError(function (arg0) {
|
|
4513
4621
|
const ret = getObject(arg0).list();
|
|
4514
4622
|
return addHeapObject(ret);
|
|
4515
4623
|
}, arguments);
|
|
4516
4624
|
}
|
|
4517
4625
|
|
|
4518
|
-
export function
|
|
4626
|
+
export function __wbg_list_83c655ffacf926b7() {
|
|
4519
4627
|
return handleError(function (arg0) {
|
|
4520
4628
|
const ret = getObject(arg0).list();
|
|
4521
4629
|
return addHeapObject(ret);
|
|
@@ -4558,7 +4666,7 @@ export function __wbg_new_23a2665fac83c611(arg0, arg1) {
|
|
|
4558
4666
|
const a = state0.a;
|
|
4559
4667
|
state0.a = 0;
|
|
4560
4668
|
try {
|
|
4561
|
-
return
|
|
4669
|
+
return __wbg_adapter_354(a, state0.b, arg0, arg1);
|
|
4562
4670
|
} finally {
|
|
4563
4671
|
state0.a = a;
|
|
4564
4672
|
}
|
|
@@ -4673,6 +4781,11 @@ export function __wbg_node_905d3e251edff8a2(arg0) {
|
|
|
4673
4781
|
return addHeapObject(ret);
|
|
4674
4782
|
}
|
|
4675
4783
|
|
|
4784
|
+
export function __wbg_now_d18023d54d4e5500(arg0) {
|
|
4785
|
+
const ret = getObject(arg0).now();
|
|
4786
|
+
return ret;
|
|
4787
|
+
}
|
|
4788
|
+
|
|
4676
4789
|
export function __wbg_open_e0c0b2993eb596e1() {
|
|
4677
4790
|
return handleError(function (arg0, arg1, arg2, arg3) {
|
|
4678
4791
|
const ret = getObject(arg0).open(getStringFromWasm0(arg1, arg2), arg3 >>> 0);
|
|
@@ -4716,7 +4829,7 @@ export function __wbg_randomFillSync_ac0988aba3254290() {
|
|
|
4716
4829
|
}, arguments);
|
|
4717
4830
|
}
|
|
4718
4831
|
|
|
4719
|
-
export function
|
|
4832
|
+
export function __wbg_remove_0e9beb59d125be57() {
|
|
4720
4833
|
return handleError(function (arg0, arg1, arg2) {
|
|
4721
4834
|
let deferred0_0;
|
|
4722
4835
|
let deferred0_1;
|
|
@@ -4731,7 +4844,7 @@ export function __wbg_remove_277c5173081d0d22() {
|
|
|
4731
4844
|
}, arguments);
|
|
4732
4845
|
}
|
|
4733
4846
|
|
|
4734
|
-
export function
|
|
4847
|
+
export function __wbg_remove_6387a99bd1c07f3b() {
|
|
4735
4848
|
return handleError(function (arg0, arg1, arg2) {
|
|
4736
4849
|
let deferred0_0;
|
|
4737
4850
|
let deferred0_1;
|
|
@@ -4785,11 +4898,7 @@ export function __wbg_set_3f1d0b984ed272ed(arg0, arg1, arg2) {
|
|
|
4785
4898
|
getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
|
|
4786
4899
|
}
|
|
4787
4900
|
|
|
4788
|
-
export function
|
|
4789
|
-
getObject(arg0).set(getObject(arg1), arg2 >>> 0);
|
|
4790
|
-
}
|
|
4791
|
-
|
|
4792
|
-
export function __wbg_set_69e1ef203c553c6e() {
|
|
4901
|
+
export function __wbg_set_4909636594ca7c7a() {
|
|
4793
4902
|
return handleError(function (arg0, arg1, arg2, arg3) {
|
|
4794
4903
|
let deferred0_0;
|
|
4795
4904
|
let deferred0_1;
|
|
@@ -4804,12 +4913,16 @@ export function __wbg_set_69e1ef203c553c6e() {
|
|
|
4804
4913
|
}, arguments);
|
|
4805
4914
|
}
|
|
4806
4915
|
|
|
4916
|
+
export function __wbg_set_65595bdd868b3009(arg0, arg1, arg2) {
|
|
4917
|
+
getObject(arg0).set(getObject(arg1), arg2 >>> 0);
|
|
4918
|
+
}
|
|
4919
|
+
|
|
4807
4920
|
export function __wbg_set_8fc6bf8a5b1071d1(arg0, arg1, arg2) {
|
|
4808
4921
|
const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
|
|
4809
4922
|
return addHeapObject(ret);
|
|
4810
4923
|
}
|
|
4811
4924
|
|
|
4812
|
-
export function
|
|
4925
|
+
export function __wbg_set_b63bcc0eff25f894() {
|
|
4813
4926
|
return handleError(function (arg0, arg1, arg2, arg3) {
|
|
4814
4927
|
let deferred0_0;
|
|
4815
4928
|
let deferred0_1;
|
|
@@ -4921,6 +5034,11 @@ export function __wbg_static_accessor_WINDOW_5de37043a91a9c40() {
|
|
|
4921
5034
|
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
|
4922
5035
|
}
|
|
4923
5036
|
|
|
5037
|
+
export function __wbg_static_accessor_performance_da77b3a901a72934() {
|
|
5038
|
+
const ret = performance;
|
|
5039
|
+
return addHeapObject(ret);
|
|
5040
|
+
}
|
|
5041
|
+
|
|
4924
5042
|
export function __wbg_status_f6360336ca686bf0(arg0) {
|
|
4925
5043
|
const ret = getObject(arg0).status;
|
|
4926
5044
|
return ret;
|
|
@@ -5034,28 +5152,28 @@ export function __wbindgen_cb_drop(arg0) {
|
|
|
5034
5152
|
return ret;
|
|
5035
5153
|
}
|
|
5036
5154
|
|
|
5037
|
-
export function
|
|
5155
|
+
export function __wbindgen_closure_wrapper198(arg0, arg1, arg2) {
|
|
5038
5156
|
const ret = makeMutClosure(arg0, arg1, 7, __wbg_adapter_54);
|
|
5039
5157
|
return addHeapObject(ret);
|
|
5040
5158
|
}
|
|
5041
5159
|
|
|
5042
|
-
export function
|
|
5160
|
+
export function __wbindgen_closure_wrapper200(arg0, arg1, arg2) {
|
|
5043
5161
|
const ret = makeMutClosure(arg0, arg1, 7, __wbg_adapter_57);
|
|
5044
5162
|
return addHeapObject(ret);
|
|
5045
5163
|
}
|
|
5046
5164
|
|
|
5047
|
-
export function
|
|
5048
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
5165
|
+
export function __wbindgen_closure_wrapper4257(arg0, arg1, arg2) {
|
|
5166
|
+
const ret = makeMutClosure(arg0, arg1, 349, __wbg_adapter_60);
|
|
5049
5167
|
return addHeapObject(ret);
|
|
5050
5168
|
}
|
|
5051
5169
|
|
|
5052
|
-
export function
|
|
5053
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
5170
|
+
export function __wbindgen_closure_wrapper8229(arg0, arg1, arg2) {
|
|
5171
|
+
const ret = makeMutClosure(arg0, arg1, 516, __wbg_adapter_60);
|
|
5054
5172
|
return addHeapObject(ret);
|
|
5055
5173
|
}
|
|
5056
5174
|
|
|
5057
|
-
export function
|
|
5058
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
5175
|
+
export function __wbindgen_closure_wrapper8612(arg0, arg1, arg2) {
|
|
5176
|
+
const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_54);
|
|
5059
5177
|
return addHeapObject(ret);
|
|
5060
5178
|
}
|
|
5061
5179
|
|
|
Binary file
|
|
@@ -349,6 +349,8 @@ export const ciphersclient_move_to_organization: (
|
|
|
349
349
|
d: number,
|
|
350
350
|
) => void;
|
|
351
351
|
export const ciphersclient_decrypt_fido2_private_key: (a: number, b: number, c: number) => void;
|
|
352
|
+
export const cipherriskclient_password_reuse_map: (a: number, b: number, c: number) => number;
|
|
353
|
+
export const cipherriskclient_compute_risk: (a: number, b: number, c: number, d: number) => number;
|
|
352
354
|
export const foldersclient_encrypt: (a: number, b: number, c: number) => void;
|
|
353
355
|
export const foldersclient_decrypt: (a: number, b: number, c: number) => void;
|
|
354
356
|
export const foldersclient_decrypt_list: (a: number, b: number, c: number, d: number) => void;
|
|
@@ -383,6 +385,7 @@ export const isTotpError: (a: number) => number;
|
|
|
383
385
|
export const isGetFolderError: (a: number) => number;
|
|
384
386
|
export const isEditFolderError: (a: number) => number;
|
|
385
387
|
export const isCreateFolderError: (a: number) => number;
|
|
388
|
+
export const isCipherRiskError: (a: number) => number;
|
|
386
389
|
export const isGetCipherError: (a: number) => number;
|
|
387
390
|
export const isEditCipherError: (a: number) => number;
|
|
388
391
|
export const isCreateCipherError: (a: number) => number;
|
|
@@ -403,7 +406,9 @@ export const vaultclient_ciphers: (a: number) => number;
|
|
|
403
406
|
export const vaultclient_folders: (a: number) => number;
|
|
404
407
|
export const vaultclient_totp: (a: number) => number;
|
|
405
408
|
export const vaultclient_collections: (a: number) => number;
|
|
409
|
+
export const vaultclient_cipher_risk: (a: number) => number;
|
|
406
410
|
export const __wbg_foldersclient_free: (a: number, b: number) => void;
|
|
411
|
+
export const __wbg_cipherriskclient_free: (a: number, b: number) => void;
|
|
407
412
|
export const __wbg_ciphersclient_free: (a: number, b: number) => void;
|
|
408
413
|
export const __wbg_collectionsclient_free: (a: number, b: number) => void;
|
|
409
414
|
export const __wbg_vaultclient_free: (a: number, b: number) => void;
|
|
@@ -418,22 +423,22 @@ export const __wbindgen_exn_store: (a: number) => void;
|
|
|
418
423
|
export const __wbindgen_free: (a: number, b: number, c: number) => void;
|
|
419
424
|
export const __wbindgen_export_4: WebAssembly.Table;
|
|
420
425
|
export const __wbindgen_add_to_stack_pointer: (a: number) => number;
|
|
421
|
-
export const
|
|
426
|
+
export const _dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h8322b6841f4e63be: (
|
|
422
427
|
a: number,
|
|
423
428
|
b: number,
|
|
424
429
|
c: number,
|
|
425
|
-
d: number,
|
|
426
430
|
) => void;
|
|
427
|
-
export const
|
|
431
|
+
export const _dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__hdee59a176c58b697: (
|
|
428
432
|
a: number,
|
|
429
433
|
b: number,
|
|
430
434
|
c: number,
|
|
435
|
+
d: number,
|
|
431
436
|
) => void;
|
|
432
|
-
export const
|
|
437
|
+
export const _dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h1d088d25aee734e6: (
|
|
433
438
|
a: number,
|
|
434
439
|
b: number,
|
|
435
440
|
) => void;
|
|
436
|
-
export const
|
|
441
|
+
export const wasm_bindgen__convert__closures__invoke2_mut__h849ee2a9e4ae2f91: (
|
|
437
442
|
a: number,
|
|
438
443
|
b: number,
|
|
439
444
|
c: number,
|