@bitwarden/commercial-sdk-internal 0.2.0-main.364 → 0.2.0-main.366
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/bitwarden_wasm_internal.d.ts +141 -1
- package/bitwarden_wasm_internal_bg.js +166 -48
- package/bitwarden_wasm_internal_bg.wasm +0 -0
- package/bitwarden_wasm_internal_bg.wasm.d.ts +10 -5
- package/bitwarden_wasm_internal_bg.wasm.js +1 -1
- package/node/bitwarden_wasm_internal.d.ts +141 -1
- package/node/bitwarden_wasm_internal.js +167 -48
- package/node/bitwarden_wasm_internal_bg.wasm +0 -0
- package/node/bitwarden_wasm_internal_bg.wasm.d.ts +10 -5
- package/package.json +1 -1
|
@@ -1103,6 +1103,7 @@ export interface Cipher {
|
|
|
1103
1103
|
deletedDate: DateTime<Utc> | undefined;
|
|
1104
1104
|
revisionDate: DateTime<Utc>;
|
|
1105
1105
|
archivedDate: DateTime<Utc> | undefined;
|
|
1106
|
+
data: string | undefined;
|
|
1106
1107
|
}
|
|
1107
1108
|
|
|
1108
1109
|
export interface CipherView {
|
|
@@ -1387,6 +1388,85 @@ export interface SecureNoteView {
|
|
|
1387
1388
|
type: SecureNoteType;
|
|
1388
1389
|
}
|
|
1389
1390
|
|
|
1391
|
+
/**
|
|
1392
|
+
* Result of checking password exposure via HIBP API.
|
|
1393
|
+
*/
|
|
1394
|
+
export type ExposedPasswordResult =
|
|
1395
|
+
| { type: "NotChecked" }
|
|
1396
|
+
| { type: "Found"; value: number }
|
|
1397
|
+
| { type: "Error"; value: string };
|
|
1398
|
+
|
|
1399
|
+
/**
|
|
1400
|
+
* Login cipher data needed for risk evaluation.
|
|
1401
|
+
*/
|
|
1402
|
+
export interface CipherLoginDetails {
|
|
1403
|
+
/**
|
|
1404
|
+
* Cipher ID to identify which cipher in results.
|
|
1405
|
+
*/
|
|
1406
|
+
id: CipherId;
|
|
1407
|
+
/**
|
|
1408
|
+
* The decrypted password to evaluate.
|
|
1409
|
+
*/
|
|
1410
|
+
password: string;
|
|
1411
|
+
/**
|
|
1412
|
+
* Username or email (login ciphers only have one field).
|
|
1413
|
+
*/
|
|
1414
|
+
username: string | undefined;
|
|
1415
|
+
}
|
|
1416
|
+
|
|
1417
|
+
/**
|
|
1418
|
+
* Password reuse map wrapper for WASM compatibility.
|
|
1419
|
+
*/
|
|
1420
|
+
export type PasswordReuseMap = Record<string, number>;
|
|
1421
|
+
|
|
1422
|
+
/**
|
|
1423
|
+
* Options for configuring risk computation.
|
|
1424
|
+
*/
|
|
1425
|
+
export interface CipherRiskOptions {
|
|
1426
|
+
/**
|
|
1427
|
+
* Pre-computed password reuse map (password → count).
|
|
1428
|
+
* If provided, enables reuse detection across ciphers.
|
|
1429
|
+
*/
|
|
1430
|
+
passwordMap?: PasswordReuseMap | undefined;
|
|
1431
|
+
/**
|
|
1432
|
+
* Whether to check passwords against Have I Been Pwned API.
|
|
1433
|
+
* When true, makes network requests to check for exposed passwords.
|
|
1434
|
+
*/
|
|
1435
|
+
checkExposed?: boolean;
|
|
1436
|
+
/**
|
|
1437
|
+
* Optional HIBP API base URL override. When None, uses the production HIBP URL.
|
|
1438
|
+
* Can be used for testing or alternative password breach checking services.
|
|
1439
|
+
*/
|
|
1440
|
+
hibpBaseUrl?: string | undefined;
|
|
1441
|
+
}
|
|
1442
|
+
|
|
1443
|
+
/**
|
|
1444
|
+
* Risk evaluation result for a single cipher.
|
|
1445
|
+
*/
|
|
1446
|
+
export interface CipherRiskResult {
|
|
1447
|
+
/**
|
|
1448
|
+
* Cipher ID matching the input CipherLoginDetails.
|
|
1449
|
+
*/
|
|
1450
|
+
id: CipherId;
|
|
1451
|
+
/**
|
|
1452
|
+
* Password strength score from 0 (weakest) to 4 (strongest).
|
|
1453
|
+
* Calculated using zxcvbn with cipher-specific context.
|
|
1454
|
+
*/
|
|
1455
|
+
password_strength: number;
|
|
1456
|
+
/**
|
|
1457
|
+
* Result of checking password exposure via HIBP API.
|
|
1458
|
+
* - `NotChecked`: check_exposed was false, or password was empty
|
|
1459
|
+
* - `Found(n)`: Successfully checked, found in n breaches
|
|
1460
|
+
* - `Error(msg)`: HIBP API request failed for this cipher with the given error message
|
|
1461
|
+
*/
|
|
1462
|
+
exposed_result: ExposedPasswordResult;
|
|
1463
|
+
/**
|
|
1464
|
+
* Number of times this password appears in the provided password_map.
|
|
1465
|
+
* None if not found or if no password_map was provided.
|
|
1466
|
+
*/
|
|
1467
|
+
reuse_count: number | undefined;
|
|
1468
|
+
}
|
|
1469
|
+
|
|
1390
1470
|
/**
|
|
1391
1471
|
* Request to add or edit a folder.
|
|
1392
1472
|
*/
|
|
@@ -1488,6 +1568,13 @@ export interface CreateFolderError extends Error {
|
|
|
1488
1568
|
|
|
1489
1569
|
export function isCreateFolderError(error: any): error is CreateFolderError;
|
|
1490
1570
|
|
|
1571
|
+
export interface CipherRiskError extends Error {
|
|
1572
|
+
name: "CipherRiskError";
|
|
1573
|
+
variant: "Reqwest";
|
|
1574
|
+
}
|
|
1575
|
+
|
|
1576
|
+
export function isCipherRiskError(error: any): error is CipherRiskError;
|
|
1577
|
+
|
|
1491
1578
|
export interface SshKeyView {
|
|
1492
1579
|
/**
|
|
1493
1580
|
* SSH private key (ed25519/rsa) in unencrypted openssh private key format [OpenSSH private key](https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.key)
|
|
@@ -1616,7 +1703,13 @@ export function isCreateCipherError(error: any): error is CreateCipherError;
|
|
|
1616
1703
|
|
|
1617
1704
|
export interface CipherError extends Error {
|
|
1618
1705
|
name: "CipherError";
|
|
1619
|
-
variant:
|
|
1706
|
+
variant:
|
|
1707
|
+
| "MissingField"
|
|
1708
|
+
| "Crypto"
|
|
1709
|
+
| "Encrypt"
|
|
1710
|
+
| "AttachmentsWithoutKeys"
|
|
1711
|
+
| "Chrono"
|
|
1712
|
+
| "SerdeJson";
|
|
1620
1713
|
}
|
|
1621
1714
|
|
|
1622
1715
|
export function isCipherError(error: any): error is CipherError;
|
|
@@ -1771,6 +1864,49 @@ export class BitwardenClient {
|
|
|
1771
1864
|
*/
|
|
1772
1865
|
exporters(): ExporterClient;
|
|
1773
1866
|
}
|
|
1867
|
+
/**
|
|
1868
|
+
* Client for evaluating credential risk for login ciphers.
|
|
1869
|
+
*/
|
|
1870
|
+
export class CipherRiskClient {
|
|
1871
|
+
private constructor();
|
|
1872
|
+
free(): void;
|
|
1873
|
+
/**
|
|
1874
|
+
* Build password reuse map for a list of login ciphers.
|
|
1875
|
+
*
|
|
1876
|
+
* Returns a map where keys are passwords and values are the number of times
|
|
1877
|
+
* each password appears in the provided list. This map can be passed to `compute_risk()`
|
|
1878
|
+
* to enable password reuse detection.
|
|
1879
|
+
*/
|
|
1880
|
+
password_reuse_map(login_details: CipherLoginDetails[]): PasswordReuseMap;
|
|
1881
|
+
/**
|
|
1882
|
+
* Evaluate security risks for multiple login ciphers concurrently.
|
|
1883
|
+
*
|
|
1884
|
+
* For each cipher:
|
|
1885
|
+
* 1. Calculates password strength (0-4) using zxcvbn with cipher-specific context
|
|
1886
|
+
* 2. Optionally checks if the password has been exposed via Have I Been Pwned API
|
|
1887
|
+
* 3. Counts how many times the password is reused in the provided `password_map`
|
|
1888
|
+
*
|
|
1889
|
+
* Returns a vector of `CipherRisk` results, one for each input cipher.
|
|
1890
|
+
*
|
|
1891
|
+
* ## HIBP Check Results (`exposed_result` field)
|
|
1892
|
+
*
|
|
1893
|
+
* The `exposed_result` field uses the `ExposedPasswordResult` enum with three possible states:
|
|
1894
|
+
* - `NotChecked`: Password exposure check was not performed because:
|
|
1895
|
+
* - `check_exposed` option was `false`, or
|
|
1896
|
+
* - Password was empty
|
|
1897
|
+
* - `Found(n)`: Successfully checked via HIBP API, password appears in `n` data breaches
|
|
1898
|
+
* - `Error(msg)`: HIBP API request failed with error message `msg`
|
|
1899
|
+
*
|
|
1900
|
+
* # Errors
|
|
1901
|
+
*
|
|
1902
|
+
* This method only returns `Err` for internal logic failures. HIBP API errors are
|
|
1903
|
+
* captured per-cipher in the `exposed_result` field as `ExposedPasswordResult::Error(msg)`.
|
|
1904
|
+
*/
|
|
1905
|
+
compute_risk(
|
|
1906
|
+
login_details: CipherLoginDetails[],
|
|
1907
|
+
options: CipherRiskOptions,
|
|
1908
|
+
): Promise<CipherRiskResult[]>;
|
|
1909
|
+
}
|
|
1774
1910
|
export class CiphersClient {
|
|
1775
1911
|
private constructor();
|
|
1776
1912
|
free(): void;
|
|
@@ -2290,4 +2426,8 @@ export class VaultClient {
|
|
|
2290
2426
|
* Collection related operations.
|
|
2291
2427
|
*/
|
|
2292
2428
|
collections(): CollectionsClient;
|
|
2429
|
+
/**
|
|
2430
|
+
* Cipher risk evaluation operations.
|
|
2431
|
+
*/
|
|
2432
|
+
cipher_risk(): CipherRiskClient;
|
|
2293
2433
|
}
|
|
@@ -775,6 +775,19 @@ module.exports.isCreateFolderError = function (error) {
|
|
|
775
775
|
}
|
|
776
776
|
};
|
|
777
777
|
|
|
778
|
+
/**
|
|
779
|
+
* @param {any} error
|
|
780
|
+
* @returns {boolean}
|
|
781
|
+
*/
|
|
782
|
+
module.exports.isCipherRiskError = function (error) {
|
|
783
|
+
try {
|
|
784
|
+
const ret = wasm.isCipherRiskError(addBorrowedObject(error));
|
|
785
|
+
return ret !== 0;
|
|
786
|
+
} finally {
|
|
787
|
+
heap[stack_pointer++] = undefined;
|
|
788
|
+
}
|
|
789
|
+
};
|
|
790
|
+
|
|
778
791
|
/**
|
|
779
792
|
* @param {any} error
|
|
780
793
|
* @returns {boolean}
|
|
@@ -854,9 +867,17 @@ module.exports.isEncryptFileError = function (error) {
|
|
|
854
867
|
};
|
|
855
868
|
|
|
856
869
|
function __wbg_adapter_54(arg0, arg1, arg2) {
|
|
870
|
+
wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h8322b6841f4e63be(
|
|
871
|
+
arg0,
|
|
872
|
+
arg1,
|
|
873
|
+
addHeapObject(arg2),
|
|
874
|
+
);
|
|
875
|
+
}
|
|
876
|
+
|
|
877
|
+
function __wbg_adapter_57(arg0, arg1, arg2) {
|
|
857
878
|
try {
|
|
858
879
|
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
859
|
-
wasm.
|
|
880
|
+
wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__hdee59a176c58b697(
|
|
860
881
|
retptr,
|
|
861
882
|
arg0,
|
|
862
883
|
arg1,
|
|
@@ -872,23 +893,15 @@ function __wbg_adapter_54(arg0, arg1, arg2) {
|
|
|
872
893
|
}
|
|
873
894
|
}
|
|
874
895
|
|
|
875
|
-
function __wbg_adapter_57(arg0, arg1, arg2) {
|
|
876
|
-
wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h0d7795300800d4d2(
|
|
877
|
-
arg0,
|
|
878
|
-
arg1,
|
|
879
|
-
addHeapObject(arg2),
|
|
880
|
-
);
|
|
881
|
-
}
|
|
882
|
-
|
|
883
896
|
function __wbg_adapter_60(arg0, arg1) {
|
|
884
|
-
wasm.
|
|
897
|
+
wasm._dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h1d088d25aee734e6(
|
|
885
898
|
arg0,
|
|
886
899
|
arg1,
|
|
887
900
|
);
|
|
888
901
|
}
|
|
889
902
|
|
|
890
|
-
function
|
|
891
|
-
wasm.
|
|
903
|
+
function __wbg_adapter_354(arg0, arg1, arg2, arg3) {
|
|
904
|
+
wasm.wasm_bindgen__convert__closures__invoke2_mut__h849ee2a9e4ae2f91(
|
|
892
905
|
arg0,
|
|
893
906
|
arg1,
|
|
894
907
|
addHeapObject(arg2),
|
|
@@ -1323,6 +1336,89 @@ class BitwardenClient {
|
|
|
1323
1336
|
}
|
|
1324
1337
|
module.exports.BitwardenClient = BitwardenClient;
|
|
1325
1338
|
|
|
1339
|
+
const CipherRiskClientFinalization =
|
|
1340
|
+
typeof FinalizationRegistry === "undefined"
|
|
1341
|
+
? { register: () => {}, unregister: () => {} }
|
|
1342
|
+
: new FinalizationRegistry((ptr) => wasm.__wbg_cipherriskclient_free(ptr >>> 0, 1));
|
|
1343
|
+
/**
|
|
1344
|
+
* Client for evaluating credential risk for login ciphers.
|
|
1345
|
+
*/
|
|
1346
|
+
class CipherRiskClient {
|
|
1347
|
+
static __wrap(ptr) {
|
|
1348
|
+
ptr = ptr >>> 0;
|
|
1349
|
+
const obj = Object.create(CipherRiskClient.prototype);
|
|
1350
|
+
obj.__wbg_ptr = ptr;
|
|
1351
|
+
CipherRiskClientFinalization.register(obj, obj.__wbg_ptr, obj);
|
|
1352
|
+
return obj;
|
|
1353
|
+
}
|
|
1354
|
+
|
|
1355
|
+
__destroy_into_raw() {
|
|
1356
|
+
const ptr = this.__wbg_ptr;
|
|
1357
|
+
this.__wbg_ptr = 0;
|
|
1358
|
+
CipherRiskClientFinalization.unregister(this);
|
|
1359
|
+
return ptr;
|
|
1360
|
+
}
|
|
1361
|
+
|
|
1362
|
+
free() {
|
|
1363
|
+
const ptr = this.__destroy_into_raw();
|
|
1364
|
+
wasm.__wbg_cipherriskclient_free(ptr, 0);
|
|
1365
|
+
}
|
|
1366
|
+
/**
|
|
1367
|
+
* Build password reuse map for a list of login ciphers.
|
|
1368
|
+
*
|
|
1369
|
+
* Returns a map where keys are passwords and values are the number of times
|
|
1370
|
+
* each password appears in the provided list. This map can be passed to `compute_risk()`
|
|
1371
|
+
* to enable password reuse detection.
|
|
1372
|
+
* @param {CipherLoginDetails[]} login_details
|
|
1373
|
+
* @returns {PasswordReuseMap}
|
|
1374
|
+
*/
|
|
1375
|
+
password_reuse_map(login_details) {
|
|
1376
|
+
const ptr0 = passArrayJsValueToWasm0(login_details, wasm.__wbindgen_malloc);
|
|
1377
|
+
const len0 = WASM_VECTOR_LEN;
|
|
1378
|
+
const ret = wasm.cipherriskclient_password_reuse_map(this.__wbg_ptr, ptr0, len0);
|
|
1379
|
+
return takeObject(ret);
|
|
1380
|
+
}
|
|
1381
|
+
/**
|
|
1382
|
+
* Evaluate security risks for multiple login ciphers concurrently.
|
|
1383
|
+
*
|
|
1384
|
+
* For each cipher:
|
|
1385
|
+
* 1. Calculates password strength (0-4) using zxcvbn with cipher-specific context
|
|
1386
|
+
* 2. Optionally checks if the password has been exposed via Have I Been Pwned API
|
|
1387
|
+
* 3. Counts how many times the password is reused in the provided `password_map`
|
|
1388
|
+
*
|
|
1389
|
+
* Returns a vector of `CipherRisk` results, one for each input cipher.
|
|
1390
|
+
*
|
|
1391
|
+
* ## HIBP Check Results (`exposed_result` field)
|
|
1392
|
+
*
|
|
1393
|
+
* The `exposed_result` field uses the `ExposedPasswordResult` enum with three possible states:
|
|
1394
|
+
* - `NotChecked`: Password exposure check was not performed because:
|
|
1395
|
+
* - `check_exposed` option was `false`, or
|
|
1396
|
+
* - Password was empty
|
|
1397
|
+
* - `Found(n)`: Successfully checked via HIBP API, password appears in `n` data breaches
|
|
1398
|
+
* - `Error(msg)`: HIBP API request failed with error message `msg`
|
|
1399
|
+
*
|
|
1400
|
+
* # Errors
|
|
1401
|
+
*
|
|
1402
|
+
* This method only returns `Err` for internal logic failures. HIBP API errors are
|
|
1403
|
+
* captured per-cipher in the `exposed_result` field as `ExposedPasswordResult::Error(msg)`.
|
|
1404
|
+
* @param {CipherLoginDetails[]} login_details
|
|
1405
|
+
* @param {CipherRiskOptions} options
|
|
1406
|
+
* @returns {Promise<CipherRiskResult[]>}
|
|
1407
|
+
*/
|
|
1408
|
+
compute_risk(login_details, options) {
|
|
1409
|
+
const ptr0 = passArrayJsValueToWasm0(login_details, wasm.__wbindgen_malloc);
|
|
1410
|
+
const len0 = WASM_VECTOR_LEN;
|
|
1411
|
+
const ret = wasm.cipherriskclient_compute_risk(
|
|
1412
|
+
this.__wbg_ptr,
|
|
1413
|
+
ptr0,
|
|
1414
|
+
len0,
|
|
1415
|
+
addHeapObject(options),
|
|
1416
|
+
);
|
|
1417
|
+
return takeObject(ret);
|
|
1418
|
+
}
|
|
1419
|
+
}
|
|
1420
|
+
module.exports.CipherRiskClient = CipherRiskClient;
|
|
1421
|
+
|
|
1326
1422
|
const CiphersClientFinalization =
|
|
1327
1423
|
typeof FinalizationRegistry === "undefined"
|
|
1328
1424
|
? { register: () => {}, unregister: () => {} }
|
|
@@ -4114,6 +4210,14 @@ class VaultClient {
|
|
|
4114
4210
|
const ret = wasm.vaultclient_attachments(this.__wbg_ptr);
|
|
4115
4211
|
return CollectionsClient.__wrap(ret);
|
|
4116
4212
|
}
|
|
4213
|
+
/**
|
|
4214
|
+
* Cipher risk evaluation operations.
|
|
4215
|
+
* @returns {CipherRiskClient}
|
|
4216
|
+
*/
|
|
4217
|
+
cipher_risk() {
|
|
4218
|
+
const ret = wasm.vaultclient_attachments(this.__wbg_ptr);
|
|
4219
|
+
return CipherRiskClient.__wrap(ret);
|
|
4220
|
+
}
|
|
4117
4221
|
}
|
|
4118
4222
|
module.exports.VaultClient = VaultClient;
|
|
4119
4223
|
|
|
@@ -4197,7 +4301,7 @@ module.exports.__wbg_call_7cccdd69e0791ae2 = function () {
|
|
|
4197
4301
|
}, arguments);
|
|
4198
4302
|
};
|
|
4199
4303
|
|
|
4200
|
-
module.exports.
|
|
4304
|
+
module.exports.__wbg_cipher_96923fc2dc579d48 = function (arg0) {
|
|
4201
4305
|
const ret = getObject(arg0).cipher;
|
|
4202
4306
|
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
|
4203
4307
|
};
|
|
@@ -4277,11 +4381,16 @@ module.exports.__wbg_fetch_509096533071c657 = function (arg0, arg1) {
|
|
|
4277
4381
|
return addHeapObject(ret);
|
|
4278
4382
|
};
|
|
4279
4383
|
|
|
4280
|
-
module.exports.
|
|
4384
|
+
module.exports.__wbg_folder_c5eb50a0ebf7fa65 = function (arg0) {
|
|
4281
4385
|
const ret = getObject(arg0).folder;
|
|
4282
4386
|
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
|
4283
4387
|
};
|
|
4284
4388
|
|
|
4389
|
+
module.exports.__wbg_getFullYear_17d3c9e4db748eb7 = function (arg0) {
|
|
4390
|
+
const ret = getObject(arg0).getFullYear();
|
|
4391
|
+
return ret;
|
|
4392
|
+
};
|
|
4393
|
+
|
|
4285
4394
|
module.exports.__wbg_getRandomValues_38097e921c2494c3 = function () {
|
|
4286
4395
|
return handleError(function (arg0, arg1) {
|
|
4287
4396
|
globalThis.crypto.getRandomValues(getArrayU8FromWasm0(arg0, arg1));
|
|
@@ -4299,7 +4408,7 @@ module.exports.__wbg_getTime_46267b1c24877e30 = function (arg0) {
|
|
|
4299
4408
|
return ret;
|
|
4300
4409
|
};
|
|
4301
4410
|
|
|
4302
|
-
module.exports.
|
|
4411
|
+
module.exports.__wbg_get_2056fd6b02d0f357 = function () {
|
|
4303
4412
|
return handleError(function (arg0, arg1, arg2) {
|
|
4304
4413
|
let deferred0_0;
|
|
4305
4414
|
let deferred0_1;
|
|
@@ -4314,19 +4423,7 @@ module.exports.__wbg_get_1cef86ba4b924f78 = function () {
|
|
|
4314
4423
|
}, arguments);
|
|
4315
4424
|
};
|
|
4316
4425
|
|
|
4317
|
-
module.exports.
|
|
4318
|
-
return handleError(function (arg0, arg1) {
|
|
4319
|
-
const ret = Reflect.get(getObject(arg0), getObject(arg1));
|
|
4320
|
-
return addHeapObject(ret);
|
|
4321
|
-
}, arguments);
|
|
4322
|
-
};
|
|
4323
|
-
|
|
4324
|
-
module.exports.__wbg_get_b9b93047fe3cf45b = function (arg0, arg1) {
|
|
4325
|
-
const ret = getObject(arg0)[arg1 >>> 0];
|
|
4326
|
-
return addHeapObject(ret);
|
|
4327
|
-
};
|
|
4328
|
-
|
|
4329
|
-
module.exports.__wbg_get_c015e7c4206c8288 = function () {
|
|
4426
|
+
module.exports.__wbg_get_5c6c4bb616b5c6a4 = function () {
|
|
4330
4427
|
return handleError(function (arg0, arg1, arg2) {
|
|
4331
4428
|
let deferred0_0;
|
|
4332
4429
|
let deferred0_1;
|
|
@@ -4341,7 +4438,19 @@ module.exports.__wbg_get_c015e7c4206c8288 = function () {
|
|
|
4341
4438
|
}, arguments);
|
|
4342
4439
|
};
|
|
4343
4440
|
|
|
4344
|
-
module.exports.
|
|
4441
|
+
module.exports.__wbg_get_67b2ba62fc30de12 = function () {
|
|
4442
|
+
return handleError(function (arg0, arg1) {
|
|
4443
|
+
const ret = Reflect.get(getObject(arg0), getObject(arg1));
|
|
4444
|
+
return addHeapObject(ret);
|
|
4445
|
+
}, arguments);
|
|
4446
|
+
};
|
|
4447
|
+
|
|
4448
|
+
module.exports.__wbg_get_b9b93047fe3cf45b = function (arg0, arg1) {
|
|
4449
|
+
const ret = getObject(arg0)[arg1 >>> 0];
|
|
4450
|
+
return addHeapObject(ret);
|
|
4451
|
+
};
|
|
4452
|
+
|
|
4453
|
+
module.exports.__wbg_getaccesstoken_b35e089b44c5f7a8 = function (arg0) {
|
|
4345
4454
|
const ret = getObject(arg0).get_access_token();
|
|
4346
4455
|
return addHeapObject(ret);
|
|
4347
4456
|
};
|
|
@@ -4526,14 +4635,14 @@ module.exports.__wbg_length_e2d2a49132c1b256 = function (arg0) {
|
|
|
4526
4635
|
return ret;
|
|
4527
4636
|
};
|
|
4528
4637
|
|
|
4529
|
-
module.exports.
|
|
4638
|
+
module.exports.__wbg_list_4a3c2a6612b6cbca = function () {
|
|
4530
4639
|
return handleError(function (arg0) {
|
|
4531
4640
|
const ret = getObject(arg0).list();
|
|
4532
4641
|
return addHeapObject(ret);
|
|
4533
4642
|
}, arguments);
|
|
4534
4643
|
};
|
|
4535
4644
|
|
|
4536
|
-
module.exports.
|
|
4645
|
+
module.exports.__wbg_list_820be49c69bdcbdb = function () {
|
|
4537
4646
|
return handleError(function (arg0) {
|
|
4538
4647
|
const ret = getObject(arg0).list();
|
|
4539
4648
|
return addHeapObject(ret);
|
|
@@ -4576,7 +4685,7 @@ module.exports.__wbg_new_23a2665fac83c611 = function (arg0, arg1) {
|
|
|
4576
4685
|
const a = state0.a;
|
|
4577
4686
|
state0.a = 0;
|
|
4578
4687
|
try {
|
|
4579
|
-
return
|
|
4688
|
+
return __wbg_adapter_354(a, state0.b, arg0, arg1);
|
|
4580
4689
|
} finally {
|
|
4581
4690
|
state0.a = a;
|
|
4582
4691
|
}
|
|
@@ -4691,6 +4800,11 @@ module.exports.__wbg_node_905d3e251edff8a2 = function (arg0) {
|
|
|
4691
4800
|
return addHeapObject(ret);
|
|
4692
4801
|
};
|
|
4693
4802
|
|
|
4803
|
+
module.exports.__wbg_now_d18023d54d4e5500 = function (arg0) {
|
|
4804
|
+
const ret = getObject(arg0).now();
|
|
4805
|
+
return ret;
|
|
4806
|
+
};
|
|
4807
|
+
|
|
4694
4808
|
module.exports.__wbg_open_e0c0b2993eb596e1 = function () {
|
|
4695
4809
|
return handleError(function (arg0, arg1, arg2, arg3) {
|
|
4696
4810
|
const ret = getObject(arg0).open(getStringFromWasm0(arg1, arg2), arg3 >>> 0);
|
|
@@ -4734,7 +4848,7 @@ module.exports.__wbg_randomFillSync_ac0988aba3254290 = function () {
|
|
|
4734
4848
|
}, arguments);
|
|
4735
4849
|
};
|
|
4736
4850
|
|
|
4737
|
-
module.exports.
|
|
4851
|
+
module.exports.__wbg_remove_090e82630c550385 = function () {
|
|
4738
4852
|
return handleError(function (arg0, arg1, arg2) {
|
|
4739
4853
|
let deferred0_0;
|
|
4740
4854
|
let deferred0_1;
|
|
@@ -4749,7 +4863,7 @@ module.exports.__wbg_remove_277c5173081d0d22 = function () {
|
|
|
4749
4863
|
}, arguments);
|
|
4750
4864
|
};
|
|
4751
4865
|
|
|
4752
|
-
module.exports.
|
|
4866
|
+
module.exports.__wbg_remove_7904915df18a115f = function () {
|
|
4753
4867
|
return handleError(function (arg0, arg1, arg2) {
|
|
4754
4868
|
let deferred0_0;
|
|
4755
4869
|
let deferred0_1;
|
|
@@ -4803,11 +4917,7 @@ module.exports.__wbg_set_3f1d0b984ed272ed = function (arg0, arg1, arg2) {
|
|
|
4803
4917
|
getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
|
|
4804
4918
|
};
|
|
4805
4919
|
|
|
4806
|
-
module.exports.
|
|
4807
|
-
getObject(arg0).set(getObject(arg1), arg2 >>> 0);
|
|
4808
|
-
};
|
|
4809
|
-
|
|
4810
|
-
module.exports.__wbg_set_69e1ef203c553c6e = function () {
|
|
4920
|
+
module.exports.__wbg_set_54d3a17a54145928 = function () {
|
|
4811
4921
|
return handleError(function (arg0, arg1, arg2, arg3) {
|
|
4812
4922
|
let deferred0_0;
|
|
4813
4923
|
let deferred0_1;
|
|
@@ -4822,12 +4932,16 @@ module.exports.__wbg_set_69e1ef203c553c6e = function () {
|
|
|
4822
4932
|
}, arguments);
|
|
4823
4933
|
};
|
|
4824
4934
|
|
|
4935
|
+
module.exports.__wbg_set_65595bdd868b3009 = function (arg0, arg1, arg2) {
|
|
4936
|
+
getObject(arg0).set(getObject(arg1), arg2 >>> 0);
|
|
4937
|
+
};
|
|
4938
|
+
|
|
4825
4939
|
module.exports.__wbg_set_8fc6bf8a5b1071d1 = function (arg0, arg1, arg2) {
|
|
4826
4940
|
const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
|
|
4827
4941
|
return addHeapObject(ret);
|
|
4828
4942
|
};
|
|
4829
4943
|
|
|
4830
|
-
module.exports.
|
|
4944
|
+
module.exports.__wbg_set_9207b95f2fb1d778 = function () {
|
|
4831
4945
|
return handleError(function (arg0, arg1, arg2, arg3) {
|
|
4832
4946
|
let deferred0_0;
|
|
4833
4947
|
let deferred0_1;
|
|
@@ -4939,6 +5053,11 @@ module.exports.__wbg_static_accessor_WINDOW_5de37043a91a9c40 = function () {
|
|
|
4939
5053
|
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
|
4940
5054
|
};
|
|
4941
5055
|
|
|
5056
|
+
module.exports.__wbg_static_accessor_performance_da77b3a901a72934 = function () {
|
|
5057
|
+
const ret = performance;
|
|
5058
|
+
return addHeapObject(ret);
|
|
5059
|
+
};
|
|
5060
|
+
|
|
4942
5061
|
module.exports.__wbg_status_f6360336ca686bf0 = function (arg0) {
|
|
4943
5062
|
const ret = getObject(arg0).status;
|
|
4944
5063
|
return ret;
|
|
@@ -5052,28 +5171,28 @@ module.exports.__wbindgen_cb_drop = function (arg0) {
|
|
|
5052
5171
|
return ret;
|
|
5053
5172
|
};
|
|
5054
5173
|
|
|
5055
|
-
module.exports.
|
|
5174
|
+
module.exports.__wbindgen_closure_wrapper198 = function (arg0, arg1, arg2) {
|
|
5056
5175
|
const ret = makeMutClosure(arg0, arg1, 7, __wbg_adapter_54);
|
|
5057
5176
|
return addHeapObject(ret);
|
|
5058
5177
|
};
|
|
5059
5178
|
|
|
5060
|
-
module.exports.
|
|
5179
|
+
module.exports.__wbindgen_closure_wrapper200 = function (arg0, arg1, arg2) {
|
|
5061
5180
|
const ret = makeMutClosure(arg0, arg1, 7, __wbg_adapter_57);
|
|
5062
5181
|
return addHeapObject(ret);
|
|
5063
5182
|
};
|
|
5064
5183
|
|
|
5065
|
-
module.exports.
|
|
5066
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
5184
|
+
module.exports.__wbindgen_closure_wrapper4258 = function (arg0, arg1, arg2) {
|
|
5185
|
+
const ret = makeMutClosure(arg0, arg1, 349, __wbg_adapter_60);
|
|
5067
5186
|
return addHeapObject(ret);
|
|
5068
5187
|
};
|
|
5069
5188
|
|
|
5070
|
-
module.exports.
|
|
5071
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
5189
|
+
module.exports.__wbindgen_closure_wrapper8230 = function (arg0, arg1, arg2) {
|
|
5190
|
+
const ret = makeMutClosure(arg0, arg1, 516, __wbg_adapter_60);
|
|
5072
5191
|
return addHeapObject(ret);
|
|
5073
5192
|
};
|
|
5074
5193
|
|
|
5075
|
-
module.exports.
|
|
5076
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
5194
|
+
module.exports.__wbindgen_closure_wrapper8613 = function (arg0, arg1, arg2) {
|
|
5195
|
+
const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_54);
|
|
5077
5196
|
return addHeapObject(ret);
|
|
5078
5197
|
};
|
|
5079
5198
|
|
|
Binary file
|
|
@@ -349,6 +349,8 @@ export const ciphersclient_move_to_organization: (
|
|
|
349
349
|
d: number,
|
|
350
350
|
) => void;
|
|
351
351
|
export const ciphersclient_decrypt_fido2_private_key: (a: number, b: number, c: number) => void;
|
|
352
|
+
export const cipherriskclient_password_reuse_map: (a: number, b: number, c: number) => number;
|
|
353
|
+
export const cipherriskclient_compute_risk: (a: number, b: number, c: number, d: number) => number;
|
|
352
354
|
export const foldersclient_encrypt: (a: number, b: number, c: number) => void;
|
|
353
355
|
export const foldersclient_decrypt: (a: number, b: number, c: number) => void;
|
|
354
356
|
export const foldersclient_decrypt_list: (a: number, b: number, c: number, d: number) => void;
|
|
@@ -383,6 +385,7 @@ export const isTotpError: (a: number) => number;
|
|
|
383
385
|
export const isGetFolderError: (a: number) => number;
|
|
384
386
|
export const isEditFolderError: (a: number) => number;
|
|
385
387
|
export const isCreateFolderError: (a: number) => number;
|
|
388
|
+
export const isCipherRiskError: (a: number) => number;
|
|
386
389
|
export const isGetCipherError: (a: number) => number;
|
|
387
390
|
export const isEditCipherError: (a: number) => number;
|
|
388
391
|
export const isCreateCipherError: (a: number) => number;
|
|
@@ -403,7 +406,9 @@ export const vaultclient_ciphers: (a: number) => number;
|
|
|
403
406
|
export const vaultclient_folders: (a: number) => number;
|
|
404
407
|
export const vaultclient_totp: (a: number) => number;
|
|
405
408
|
export const vaultclient_collections: (a: number) => number;
|
|
409
|
+
export const vaultclient_cipher_risk: (a: number) => number;
|
|
406
410
|
export const __wbg_foldersclient_free: (a: number, b: number) => void;
|
|
411
|
+
export const __wbg_cipherriskclient_free: (a: number, b: number) => void;
|
|
407
412
|
export const __wbg_ciphersclient_free: (a: number, b: number) => void;
|
|
408
413
|
export const __wbg_collectionsclient_free: (a: number, b: number) => void;
|
|
409
414
|
export const __wbg_vaultclient_free: (a: number, b: number) => void;
|
|
@@ -418,22 +423,22 @@ export const __wbindgen_exn_store: (a: number) => void;
|
|
|
418
423
|
export const __wbindgen_free: (a: number, b: number, c: number) => void;
|
|
419
424
|
export const __wbindgen_export_4: WebAssembly.Table;
|
|
420
425
|
export const __wbindgen_add_to_stack_pointer: (a: number) => number;
|
|
421
|
-
export const
|
|
426
|
+
export const _dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h8322b6841f4e63be: (
|
|
422
427
|
a: number,
|
|
423
428
|
b: number,
|
|
424
429
|
c: number,
|
|
425
|
-
d: number,
|
|
426
430
|
) => void;
|
|
427
|
-
export const
|
|
431
|
+
export const _dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__hdee59a176c58b697: (
|
|
428
432
|
a: number,
|
|
429
433
|
b: number,
|
|
430
434
|
c: number,
|
|
435
|
+
d: number,
|
|
431
436
|
) => void;
|
|
432
|
-
export const
|
|
437
|
+
export const _dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h1d088d25aee734e6: (
|
|
433
438
|
a: number,
|
|
434
439
|
b: number,
|
|
435
440
|
) => void;
|
|
436
|
-
export const
|
|
441
|
+
export const wasm_bindgen__convert__closures__invoke2_mut__h849ee2a9e4ae2f91: (
|
|
437
442
|
a: number,
|
|
438
443
|
b: number,
|
|
439
444
|
c: number,
|