@bitwarden/commercial-sdk-internal 0.2.0-main.437 → 0.2.0-main.439

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -180,51 +180,57 @@ export interface TokenProvider {
180
180
  get_access_token(): Promise<string | undefined>;
181
181
  }
182
182
 
183
- export interface IndexedDbConfiguration {
184
- db_name: string;
185
- }
186
-
187
183
  export interface Repositories {
188
184
  cipher: Repository<Cipher> | null;
189
185
  folder: Repository<Folder> | null;
190
186
  }
191
187
 
188
+ export interface IndexedDbConfiguration {
189
+ db_name: string;
190
+ }
191
+
192
192
  /**
193
193
  * Active feature flags for the SDK.
194
194
  */
195
195
  export interface FeatureFlags extends Map<string, boolean> {}
196
196
 
197
197
  /**
198
- * The credentials used for send access requests.
198
+ * Credentials for sending an OTP to the user\'s email address.
199
+ * This is used when the send requires email verification with an OTP.
199
200
  */
200
- export type SendAccessCredentials =
201
- | SendPasswordCredentials
202
- | SendEmailOtpCredentials
203
- | SendEmailCredentials;
201
+ export interface SendEmailCredentials {
202
+ /**
203
+ * The email address to which the OTP will be sent.
204
+ */
205
+ email: string;
206
+ }
204
207
 
205
208
  /**
206
- * A request structure for requesting a send access token from the API.
209
+ * Credentials for getting a send access token using an email and OTP.
207
210
  */
208
- export interface SendAccessTokenRequest {
211
+ export interface SendEmailOtpCredentials {
209
212
  /**
210
- * The id of the send for which the access token is requested.
213
+ * The email address to which the OTP will be sent.
211
214
  */
212
- sendId: string;
215
+ email: string;
213
216
  /**
214
- * The optional send access credentials.
217
+ * The one-time password (OTP) that the user has received via email.
215
218
  */
216
- sendAccessCredentials?: SendAccessCredentials;
219
+ otp: string;
217
220
  }
218
221
 
219
222
  /**
220
- * Credentials for sending an OTP to the user\'s email address.
221
- * This is used when the send requires email verification with an OTP.
223
+ * A request structure for requesting a send access token from the API.
222
224
  */
223
- export interface SendEmailCredentials {
225
+ export interface SendAccessTokenRequest {
224
226
  /**
225
- * The email address to which the OTP will be sent.
227
+ * The id of the send for which the access token is requested.
226
228
  */
227
- email: string;
229
+ sendId: string;
230
+ /**
231
+ * The optional send access credentials.
232
+ */
233
+ sendAccessCredentials?: SendAccessCredentials;
228
234
  }
229
235
 
230
236
  /**
@@ -240,18 +246,12 @@ export interface SendPasswordCredentials {
240
246
  }
241
247
 
242
248
  /**
243
- * Credentials for getting a send access token using an email and OTP.
249
+ * The credentials used for send access requests.
244
250
  */
245
- export interface SendEmailOtpCredentials {
246
- /**
247
- * The email address to which the OTP will be sent.
248
- */
249
- email: string;
250
- /**
251
- * The one-time password (OTP) that the user has received via email.
252
- */
253
- otp: string;
254
- }
251
+ export type SendAccessCredentials =
252
+ | SendPasswordCredentials
253
+ | SendEmailOtpCredentials
254
+ | SendEmailCredentials;
255
255
 
256
256
  /**
257
257
  * A send access token which can be used to access a send.
@@ -267,14 +267,6 @@ export interface SendAccessTokenResponse {
267
267
  expiresAt: number;
268
268
  }
269
269
 
270
- /**
271
- * Represents errors that can occur when requesting a send access token.
272
- * It includes expected and unexpected API errors.
273
- */
274
- export type SendAccessTokenError =
275
- | { kind: "unexpected"; data: UnexpectedIdentityError }
276
- | { kind: "expected"; data: SendAccessTokenApiErrorResponse };
277
-
278
270
  /**
279
271
  * Any unexpected error that occurs when making requests to identity. This could be
280
272
  * local/transport/decoding failure from the HTTP client (DNS/TLS/connect/read timeout,
@@ -286,14 +278,21 @@ export type SendAccessTokenError =
286
278
  export type UnexpectedIdentityError = string;
287
279
 
288
280
  /**
289
- * Invalid grant errors - typically due to invalid credentials.
281
+ * Represents errors that can occur when requesting a send access token.
282
+ * It includes expected and unexpected API errors.
290
283
  */
291
- export type SendAccessTokenInvalidGrantError =
292
- | "send_id_invalid"
293
- | "password_hash_b64_invalid"
294
- | "email_invalid"
295
- | "otp_invalid"
296
- | "otp_generation_failed"
284
+ export type SendAccessTokenError =
285
+ | { kind: "unexpected"; data: UnexpectedIdentityError }
286
+ | { kind: "expected"; data: SendAccessTokenApiErrorResponse };
287
+
288
+ /**
289
+ * Invalid request errors - typically due to missing parameters.
290
+ */
291
+ export type SendAccessTokenInvalidRequestError =
292
+ | "send_id_required"
293
+ | "password_hash_b64_required"
294
+ | "email_required"
295
+ | "email_and_otp_required_otp_sent"
297
296
  | "unknown";
298
297
 
299
298
  /**
@@ -317,15 +316,68 @@ export type SendAccessTokenApiErrorResponse =
317
316
  | { error: "invalid_target"; error_description?: string };
318
317
 
319
318
  /**
320
- * Invalid request errors - typically due to missing parameters.
319
+ * Invalid grant errors - typically due to invalid credentials.
321
320
  */
322
- export type SendAccessTokenInvalidRequestError =
323
- | "send_id_required"
324
- | "password_hash_b64_required"
325
- | "email_required"
326
- | "email_and_otp_required_otp_sent"
321
+ export type SendAccessTokenInvalidGrantError =
322
+ | "send_id_invalid"
323
+ | "password_hash_b64_invalid"
324
+ | "email_invalid"
325
+ | "otp_invalid"
326
+ | "otp_generation_failed"
327
327
  | "unknown";
328
328
 
329
+ /**
330
+ * Result of TDE registration process.
331
+ */
332
+ export interface TdeRegistrationResponse {
333
+ /**
334
+ * The account cryptographic state of the user
335
+ */
336
+ account_cryptographic_state: WrappedAccountCryptographicState;
337
+ /**
338
+ * The device key
339
+ */
340
+ device_key: B64;
341
+ /**
342
+ * The decrypted user key. This can be used to get the consuming client to an unlocked state.
343
+ */
344
+ user_key: B64;
345
+ }
346
+
347
+ export interface RegistrationError extends Error {
348
+ name: "RegistrationError";
349
+ variant: "Api" | "Crypto";
350
+ }
351
+
352
+ export function isRegistrationError(error: any): error is RegistrationError;
353
+
354
+ /**
355
+ * Request parameters for TDE (Trusted Device Encryption) registration.
356
+ */
357
+ export interface TdeRegistrationRequest {
358
+ /**
359
+ * Organization ID to enroll in
360
+ */
361
+ org_id: OrganizationId;
362
+ /**
363
+ * Organization\'s public key for encrypting the reset password key. This should be verified by
364
+ * the client and not verifying may compromise the security of the user\'s account.
365
+ */
366
+ org_public_key: B64;
367
+ /**
368
+ * User ID for the account being initialized
369
+ */
370
+ user_id: UserId;
371
+ /**
372
+ * Device identifier for TDE enrollment
373
+ */
374
+ device_identifier: string;
375
+ /**
376
+ * Whether to trust this device for TDE
377
+ */
378
+ trust_device: boolean;
379
+ }
380
+
329
381
  /**
330
382
  * NewType wrapper for `CollectionId`
331
383
  */
@@ -560,6 +612,13 @@ export interface VerifyAsymmetricKeysRequest {
560
612
  userKeyEncryptedPrivateKey: EncString;
561
613
  }
562
614
 
615
+ export interface MakeKeysError extends Error {
616
+ name: "MakeKeysError";
617
+ variant: "AccountCryptographyInitialization" | "RequestModelCreation" | "Crypto";
618
+ }
619
+
620
+ export function isMakeKeysError(error: any): error is MakeKeysError;
621
+
563
622
  /**
564
623
  * Response for the `make_keys_for_user_crypto_v2`, containing a set of keys for a user
565
624
  */
@@ -790,6 +849,25 @@ export type UnsignedSharedKey = Tagged<string, "UnsignedSharedKey">;
790
849
 
791
850
  export type EncString = Tagged<string, "EncString">;
792
851
 
852
+ export interface TrustDeviceResponse {
853
+ /**
854
+ * Base64 encoded device key
855
+ */
856
+ device_key: B64;
857
+ /**
858
+ * UserKey encrypted with DevicePublicKey
859
+ */
860
+ protected_user_key: UnsignedSharedKey;
861
+ /**
862
+ * DevicePrivateKey encrypted with [DeviceKey]
863
+ */
864
+ protected_device_private_key: EncString;
865
+ /**
866
+ * DevicePublicKey encrypted with [UserKey](super::UserKey)
867
+ */
868
+ protected_device_public_key: EncString;
869
+ }
870
+
793
871
  export type SignedPublicKey = Tagged<string, "SignedPublicKey">;
794
872
 
795
873
  /**
@@ -2532,6 +2610,11 @@ export class RegistrationClient {
2532
2610
  private constructor();
2533
2611
  free(): void;
2534
2612
  [Symbol.dispose](): void;
2613
+ /**
2614
+ * Initializes a new cryptographic state for a user and posts it to the server; enrolls in
2615
+ * admin password reset and finally enrolls the user to TDE unlock.
2616
+ */
2617
+ post_keys_for_tde_registration(request: TdeRegistrationRequest): Promise<TdeRegistrationResponse>;
2535
2618
  }
2536
2619
  /**
2537
2620
  * The `SendAccessClient` is used to interact with the Bitwarden API to get send access tokens.
@@ -215,16 +215,6 @@ function getArrayU8FromWasm0(ptr, len) {
215
215
  return getUint8ArrayMemory0().subarray(ptr / 1, ptr / 1 + len);
216
216
  }
217
217
 
218
- function getArrayJsValueFromWasm0(ptr, len) {
219
- ptr = ptr >>> 0;
220
- const mem = getDataViewMemory0();
221
- const result = [];
222
- for (let i = ptr; i < ptr + 4 * len; i += 4) {
223
- result.push(takeObject(mem.getUint32(i, true)));
224
- }
225
- return result;
226
- }
227
-
228
218
  const CLOSURE_DTORS =
229
219
  typeof FinalizationRegistry === "undefined"
230
220
  ? { register: () => {}, unregister: () => {} }
@@ -257,6 +247,16 @@ function makeMutClosure(arg0, arg1, dtor, f) {
257
247
  return real;
258
248
  }
259
249
 
250
+ function getArrayJsValueFromWasm0(ptr, len) {
251
+ ptr = ptr >>> 0;
252
+ const mem = getDataViewMemory0();
253
+ const result = [];
254
+ for (let i = ptr; i < ptr + 4 * len; i += 4) {
255
+ result.push(takeObject(mem.getUint32(i, true)));
256
+ }
257
+ return result;
258
+ }
259
+
260
260
  function passArray8ToWasm0(arg, malloc) {
261
261
  const ptr = malloc(arg.length * 1, 1) >>> 0;
262
262
  getUint8ArrayMemory0().set(arg, ptr / 1);
@@ -358,6 +358,19 @@ export function isTestError(error) {
358
358
  }
359
359
  }
360
360
 
361
+ /**
362
+ * @param {any} error
363
+ * @returns {boolean}
364
+ */
365
+ export function isRegistrationError(error) {
366
+ try {
367
+ const ret = wasm.isRegistrationError(addBorrowedObject(error));
368
+ return ret !== 0;
369
+ } finally {
370
+ heap[stack_pointer++] = undefined;
371
+ }
372
+ }
373
+
361
374
  /**
362
375
  * @param {any} error
363
376
  * @returns {boolean}
@@ -436,6 +449,19 @@ export function isDeriveKeyConnectorError(error) {
436
449
  }
437
450
  }
438
451
 
452
+ /**
453
+ * @param {any} error
454
+ * @returns {boolean}
455
+ */
456
+ export function isMakeKeysError(error) {
457
+ try {
458
+ const ret = wasm.isMakeKeysError(addBorrowedObject(error));
459
+ return ret !== 0;
460
+ } finally {
461
+ heap[stack_pointer++] = undefined;
462
+ }
463
+ }
464
+
439
465
  /**
440
466
  * @param {any} error
441
467
  * @returns {boolean}
@@ -882,10 +908,18 @@ export function isGetFolderError(error) {
882
908
  }
883
909
  }
884
910
 
885
- function wasm_bindgen__convert__closures_____invoke__h4186fc9839e7cab3(arg0, arg1, arg2) {
911
+ function wasm_bindgen__convert__closures_____invoke__h08b1457fc8a42f9a(arg0, arg1, arg2) {
912
+ wasm.wasm_bindgen__convert__closures_____invoke__h08b1457fc8a42f9a(
913
+ arg0,
914
+ arg1,
915
+ addHeapObject(arg2),
916
+ );
917
+ }
918
+
919
+ function wasm_bindgen__convert__closures_____invoke__h9df016712e97254d(arg0, arg1, arg2) {
886
920
  try {
887
921
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
888
- wasm.wasm_bindgen__convert__closures_____invoke__h4186fc9839e7cab3(
922
+ wasm.wasm_bindgen__convert__closures_____invoke__h9df016712e97254d(
889
923
  retptr,
890
924
  arg0,
891
925
  arg1,
@@ -905,14 +939,6 @@ function wasm_bindgen__convert__closures_____invoke__h62b881a194105b80(arg0, arg
905
939
  wasm.wasm_bindgen__convert__closures_____invoke__h62b881a194105b80(arg0, arg1);
906
940
  }
907
941
 
908
- function wasm_bindgen__convert__closures_____invoke__h3ee6e6da36ea79fd(arg0, arg1, arg2) {
909
- wasm.wasm_bindgen__convert__closures_____invoke__h3ee6e6da36ea79fd(
910
- arg0,
911
- arg1,
912
- addHeapObject(arg2),
913
- );
914
- }
915
-
916
942
  function wasm_bindgen__convert__closures_____invoke__h92667cd2c3a9eee2(arg0, arg1, arg2, arg3) {
917
943
  wasm.wasm_bindgen__convert__closures_____invoke__h92667cd2c3a9eee2(
918
944
  arg0,
@@ -4263,6 +4289,19 @@ export class RegistrationClient {
4263
4289
  const ptr = this.__destroy_into_raw();
4264
4290
  wasm.__wbg_registrationclient_free(ptr, 0);
4265
4291
  }
4292
+ /**
4293
+ * Initializes a new cryptographic state for a user and posts it to the server; enrolls in
4294
+ * admin password reset and finally enrolls the user to TDE unlock.
4295
+ * @param {TdeRegistrationRequest} request
4296
+ * @returns {Promise<TdeRegistrationResponse>}
4297
+ */
4298
+ post_keys_for_tde_registration(request) {
4299
+ const ret = wasm.registrationclient_post_keys_for_tde_registration(
4300
+ this.__wbg_ptr,
4301
+ addHeapObject(request),
4302
+ );
4303
+ return takeObject(ret);
4304
+ }
4266
4305
  }
4267
4306
  if (Symbol.dispose)
4268
4307
  RegistrationClient.prototype[Symbol.dispose] = RegistrationClient.prototype.free;
@@ -4681,7 +4720,7 @@ export function __wbg_call_e762c39fa8ea36bf() {
4681
4720
  }, arguments);
4682
4721
  }
4683
4722
 
4684
- export function __wbg_cipher_0c36627f8f30cc7e(arg0) {
4723
+ export function __wbg_cipher_d8856dd2ce7150aa(arg0) {
4685
4724
  const ret = getObject(arg0).cipher;
4686
4725
  return isLikeNone(ret) ? 0 : addHeapObject(ret);
4687
4726
  }
@@ -4774,7 +4813,7 @@ export function __wbg_fetch_f8ba0e29a9d6de0d(arg0, arg1) {
4774
4813
  return addHeapObject(ret);
4775
4814
  }
4776
4815
 
4777
- export function __wbg_folder_10fbce592672ac71(arg0) {
4816
+ export function __wbg_folder_9c099dc41053c5a6(arg0) {
4778
4817
  const ret = getObject(arg0).folder;
4779
4818
  return isLikeNone(ret) ? 0 : addHeapObject(ret);
4780
4819
  }
@@ -4807,7 +4846,7 @@ export function __wbg_getTime_14776bfb48a1bff9(arg0) {
4807
4846
  return ret;
4808
4847
  }
4809
4848
 
4810
- export function __wbg_get_2a39e9542c1cdc94() {
4849
+ export function __wbg_get_72f445e17ec1aa21() {
4811
4850
  return handleError(function (arg0, arg1, arg2) {
4812
4851
  let deferred0_0;
4813
4852
  let deferred0_1;
@@ -4827,7 +4866,12 @@ export function __wbg_get_7bed016f185add81(arg0, arg1) {
4827
4866
  return addHeapObject(ret);
4828
4867
  }
4829
4868
 
4830
- export function __wbg_get_a500a1cf45d12e9b() {
4869
+ export function __wbg_get_access_token_4c961c3c68d8878a(arg0) {
4870
+ const ret = getObject(arg0).get_access_token();
4871
+ return addHeapObject(ret);
4872
+ }
4873
+
4874
+ export function __wbg_get_d96fcc610ee6c044() {
4831
4875
  return handleError(function (arg0, arg1, arg2) {
4832
4876
  let deferred0_0;
4833
4877
  let deferred0_1;
@@ -4842,11 +4886,6 @@ export function __wbg_get_a500a1cf45d12e9b() {
4842
4886
  }, arguments);
4843
4887
  }
4844
4888
 
4845
- export function __wbg_get_access_token_acb10922a5e768ad(arg0) {
4846
- const ret = getObject(arg0).get_access_token();
4847
- return addHeapObject(ret);
4848
- }
4849
-
4850
4889
  export function __wbg_get_efcb449f58ec27c2() {
4851
4890
  return handleError(function (arg0, arg1) {
4852
4891
  const ret = Reflect.get(getObject(arg0), getObject(arg1));
@@ -5038,14 +5077,14 @@ export function __wbg_length_cdd215e10d9dd507(arg0) {
5038
5077
  return ret;
5039
5078
  }
5040
5079
 
5041
- export function __wbg_list_87882139240c53e2() {
5080
+ export function __wbg_list_8b9cc57047c9d5a0() {
5042
5081
  return handleError(function (arg0) {
5043
5082
  const ret = getObject(arg0).list();
5044
5083
  return addHeapObject(ret);
5045
5084
  }, arguments);
5046
5085
  }
5047
5086
 
5048
- export function __wbg_list_cabbe4a6d3e09c15() {
5087
+ export function __wbg_list_99b0aedbac169079() {
5049
5088
  return handleError(function (arg0) {
5050
5089
  const ret = getObject(arg0).list();
5051
5090
  return addHeapObject(ret);
@@ -5289,7 +5328,7 @@ export function __wbg_randomFillSync_ac0988aba3254290() {
5289
5328
  }, arguments);
5290
5329
  }
5291
5330
 
5292
- export function __wbg_remove_491c4cc200722fdc() {
5331
+ export function __wbg_remove_30835cf5f8b44c8a() {
5293
5332
  return handleError(function (arg0, arg1, arg2) {
5294
5333
  let deferred0_0;
5295
5334
  let deferred0_1;
@@ -5304,7 +5343,7 @@ export function __wbg_remove_491c4cc200722fdc() {
5304
5343
  }, arguments);
5305
5344
  }
5306
5345
 
5307
- export function __wbg_remove_ca1a2c33e546529e() {
5346
+ export function __wbg_remove_4dc0918671fbf62d() {
5308
5347
  return handleError(function (arg0, arg1, arg2) {
5309
5348
  let deferred0_0;
5310
5349
  let deferred0_1;
@@ -5359,6 +5398,21 @@ export function __wbg_set_907fb406c34a251d(arg0, arg1, arg2) {
5359
5398
  return addHeapObject(ret);
5360
5399
  }
5361
5400
 
5401
+ export function __wbg_set_9bbfa30b630bbb2e() {
5402
+ return handleError(function (arg0, arg1, arg2, arg3) {
5403
+ let deferred0_0;
5404
+ let deferred0_1;
5405
+ try {
5406
+ deferred0_0 = arg1;
5407
+ deferred0_1 = arg2;
5408
+ const ret = getObject(arg0).set(getStringFromWasm0(arg1, arg2), takeObject(arg3));
5409
+ return addHeapObject(ret);
5410
+ } finally {
5411
+ wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);
5412
+ }
5413
+ }, arguments);
5414
+ }
5415
+
5362
5416
  export function __wbg_set_body_3c365989753d61f4(arg0, arg1) {
5363
5417
  getObject(arg0).body = getObject(arg1);
5364
5418
  }
@@ -5378,22 +5432,7 @@ export function __wbg_set_credentials_f621cd2d85c0c228(arg0, arg1) {
5378
5432
  getObject(arg0).credentials = __wbindgen_enum_RequestCredentials[arg1];
5379
5433
  }
5380
5434
 
5381
- export function __wbg_set_dd61f32bc8ce7525() {
5382
- return handleError(function (arg0, arg1, arg2, arg3) {
5383
- let deferred0_0;
5384
- let deferred0_1;
5385
- try {
5386
- deferred0_0 = arg1;
5387
- deferred0_1 = arg2;
5388
- const ret = getObject(arg0).set(getStringFromWasm0(arg1, arg2), takeObject(arg3));
5389
- return addHeapObject(ret);
5390
- } finally {
5391
- wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);
5392
- }
5393
- }, arguments);
5394
- }
5395
-
5396
- export function __wbg_set_f3daacef771cf194() {
5435
+ export function __wbg_set_ea5d171269c04495() {
5397
5436
  return handleError(function (arg0, arg1, arg2, arg3) {
5398
5437
  let deferred0_0;
5399
5438
  let deferred0_1;
@@ -5584,25 +5623,25 @@ export function __wbindgen_cast_4625c577ab2ec9ee(arg0) {
5584
5623
  return addHeapObject(ret);
5585
5624
  }
5586
5625
 
5587
- export function __wbindgen_cast_5fea77eff9dd275c(arg0, arg1) {
5588
- var v0 = getArrayJsValueFromWasm0(arg0, arg1).slice();
5589
- wasm.__wbindgen_free(arg0, arg1 * 4, 4);
5590
- // Cast intrinsic for `Vector(NamedExternref("CipherRiskResult")) -> Externref`.
5591
- const ret = v0;
5592
- return addHeapObject(ret);
5593
- }
5594
-
5595
- export function __wbindgen_cast_66b9b6fddd3159a0(arg0, arg1) {
5596
- // Cast intrinsic for `Closure(Closure { dtor_idx: 301, function: Function { arguments: [Externref], shim_idx: 46, ret: Unit, inner_ret: Some(Unit) }, mutable: true }) -> Externref`.
5626
+ export function __wbindgen_cast_484dfa9f464c1222(arg0, arg1) {
5627
+ // Cast intrinsic for `Closure(Closure { dtor_idx: 311, function: Function { arguments: [Externref], shim_idx: 46, ret: Unit, inner_ret: Some(Unit) }, mutable: true }) -> Externref`.
5597
5628
  const ret = makeMutClosure(
5598
5629
  arg0,
5599
5630
  arg1,
5600
5631
  wasm.wasm_bindgen__closure__destroy__h4e2596d1eeea1ddd,
5601
- wasm_bindgen__convert__closures_____invoke__h3ee6e6da36ea79fd,
5632
+ wasm_bindgen__convert__closures_____invoke__h08b1457fc8a42f9a,
5602
5633
  );
5603
5634
  return addHeapObject(ret);
5604
5635
  }
5605
5636
 
5637
+ export function __wbindgen_cast_5fea77eff9dd275c(arg0, arg1) {
5638
+ var v0 = getArrayJsValueFromWasm0(arg0, arg1).slice();
5639
+ wasm.__wbindgen_free(arg0, arg1 * 4, 4);
5640
+ // Cast intrinsic for `Vector(NamedExternref("CipherRiskResult")) -> Externref`.
5641
+ const ret = v0;
5642
+ return addHeapObject(ret);
5643
+ }
5644
+
5606
5645
  export function __wbindgen_cast_7a6d185652cd8149(arg0, arg1) {
5607
5646
  var v0 = getArrayJsValueFromWasm0(arg0, arg1).slice();
5608
5647
  wasm.__wbindgen_free(arg0, arg1 * 4, 4);
@@ -5617,12 +5656,12 @@ export function __wbindgen_cast_9ae0607507abb057(arg0) {
5617
5656
  return addHeapObject(ret);
5618
5657
  }
5619
5658
 
5620
- export function __wbindgen_cast_b70019a15f201a96(arg0, arg1) {
5621
- // Cast intrinsic for `Closure(Closure { dtor_idx: 552, function: Function { arguments: [], shim_idx: 302, ret: Unit, inner_ret: Some(Unit) }, mutable: true }) -> Externref`.
5659
+ export function __wbindgen_cast_ab87f469c2c8c8ee(arg0, arg1) {
5660
+ // Cast intrinsic for `Closure(Closure { dtor_idx: 311, function: Function { arguments: [], shim_idx: 312, ret: Unit, inner_ret: Some(Unit) }, mutable: true }) -> Externref`.
5622
5661
  const ret = makeMutClosure(
5623
5662
  arg0,
5624
5663
  arg1,
5625
- wasm.wasm_bindgen__closure__destroy__he95e920b8d9de938,
5664
+ wasm.wasm_bindgen__closure__destroy__h4e2596d1eeea1ddd,
5626
5665
  wasm_bindgen__convert__closures_____invoke__h62b881a194105b80,
5627
5666
  );
5628
5667
  return addHeapObject(ret);
@@ -5639,8 +5678,8 @@ export function __wbindgen_cast_d3c442d81884e8e4(arg0, arg1) {
5639
5678
  const ret = makeMutClosure(
5640
5679
  arg0,
5641
5680
  arg1,
5642
- wasm.wasm_bindgen__closure__destroy__h03764d3cf8644af3,
5643
- wasm_bindgen__convert__closures_____invoke__h4186fc9839e7cab3,
5681
+ wasm.wasm_bindgen__closure__destroy__h176866a126b2a406,
5682
+ wasm_bindgen__convert__closures_____invoke__h9df016712e97254d,
5644
5683
  );
5645
5684
  return addHeapObject(ret);
5646
5685
  }
@@ -5656,18 +5695,18 @@ export function __wbindgen_cast_d9da8617cf4d65f6(arg0, arg1) {
5656
5695
  const ret = makeMutClosure(
5657
5696
  arg0,
5658
5697
  arg1,
5659
- wasm.wasm_bindgen__closure__destroy__h03764d3cf8644af3,
5660
- wasm_bindgen__convert__closures_____invoke__h3ee6e6da36ea79fd,
5698
+ wasm.wasm_bindgen__closure__destroy__h176866a126b2a406,
5699
+ wasm_bindgen__convert__closures_____invoke__h08b1457fc8a42f9a,
5661
5700
  );
5662
5701
  return addHeapObject(ret);
5663
5702
  }
5664
5703
 
5665
- export function __wbindgen_cast_e1b8613407289e9c(arg0, arg1) {
5666
- // Cast intrinsic for `Closure(Closure { dtor_idx: 301, function: Function { arguments: [], shim_idx: 302, ret: Unit, inner_ret: Some(Unit) }, mutable: true }) -> Externref`.
5704
+ export function __wbindgen_cast_ebf67f1bd70fb06c(arg0, arg1) {
5705
+ // Cast intrinsic for `Closure(Closure { dtor_idx: 561, function: Function { arguments: [], shim_idx: 312, ret: Unit, inner_ret: Some(Unit) }, mutable: true }) -> Externref`.
5667
5706
  const ret = makeMutClosure(
5668
5707
  arg0,
5669
5708
  arg1,
5670
- wasm.wasm_bindgen__closure__destroy__h4e2596d1eeea1ddd,
5709
+ wasm.wasm_bindgen__closure__destroy__he95e920b8d9de938,
5671
5710
  wasm_bindgen__convert__closures_____invoke__h62b881a194105b80,
5672
5711
  );
5673
5712
  return addHeapObject(ret);
Binary file
@@ -200,6 +200,8 @@ export const stateclient_register_folder_repository: (a: number, b: number) => v
200
200
  export const __wbg_authclient_free: (a: number, b: number) => void;
201
201
  export const __wbg_identityclient_free: (a: number, b: number) => void;
202
202
  export const authclient_identity: (a: number) => number;
203
+ export const isRegistrationError: (a: number) => number;
204
+ export const registrationclient_post_keys_for_tde_registration: (a: number, b: number) => number;
203
205
  export const sendaccessclient_request_send_access_token: (a: number, b: number) => number;
204
206
  export const isCollectionDecryptError: (a: number) => number;
205
207
  export const __wbg_commercialvaultclient_free: (a: number, b: number) => void;
@@ -236,6 +238,7 @@ export const isCryptoClientError: (a: number) => number;
236
238
  export const isDeriveKeyConnectorError: (a: number) => number;
237
239
  export const isEncryptionSettingsError: (a: number) => number;
238
240
  export const isEnrollAdminPasswordResetError: (a: number) => number;
241
+ export const isMakeKeysError: (a: number) => number;
239
242
  export const isMasterPasswordError: (a: number) => number;
240
243
  export const isStatefulCryptoError: (a: number) => number;
241
244
  export const isCryptoError: (a: number) => number;
@@ -443,6 +446,7 @@ export const vaultclient_ciphers: (a: number) => number;
443
446
  export const vaultclient_collections: (a: number) => number;
444
447
  export const vaultclient_folders: (a: number) => number;
445
448
  export const vaultclient_totp: (a: number) => number;
449
+ export const __wbg_registrationclient_free: (a: number, b: number) => void;
446
450
  export const __wbg_sendaccessclient_free: (a: number, b: number) => void;
447
451
  export const __wbg_cipherriskclient_free: (a: number, b: number) => void;
448
452
  export const __wbg_ciphersclient_free: (a: number, b: number) => void;
@@ -451,27 +455,26 @@ export const __wbg_foldersclient_free: (a: number, b: number) => void;
451
455
  export const __wbg_totpclient_free: (a: number, b: number) => void;
452
456
  export const __wbg_vaultclient_free: (a: number, b: number) => void;
453
457
  export const __wbg_get_outgoingmessage_destination: (a: number) => number;
454
- export const __wbg_registrationclient_free: (a: number, b: number) => void;
455
458
  export const __wbg_set_outgoingmessage_destination: (a: number, b: number) => void;
456
459
  export const __wbg_cryptoclient_free: (a: number, b: number) => void;
457
- export const wasm_bindgen__convert__closures_____invoke__h4186fc9839e7cab3: (
460
+ export const wasm_bindgen__convert__closures_____invoke__h08b1457fc8a42f9a: (
458
461
  a: number,
459
462
  b: number,
460
463
  c: number,
461
- d: number,
462
464
  ) => void;
463
- export const wasm_bindgen__closure__destroy__h03764d3cf8644af3: (a: number, b: number) => void;
464
- export const wasm_bindgen__convert__closures_____invoke__h62b881a194105b80: (
465
+ export const wasm_bindgen__closure__destroy__h176866a126b2a406: (a: number, b: number) => void;
466
+ export const wasm_bindgen__closure__destroy__h4e2596d1eeea1ddd: (a: number, b: number) => void;
467
+ export const wasm_bindgen__convert__closures_____invoke__h9df016712e97254d: (
465
468
  a: number,
466
469
  b: number,
470
+ c: number,
471
+ d: number,
467
472
  ) => void;
468
- export const wasm_bindgen__closure__destroy__he95e920b8d9de938: (a: number, b: number) => void;
469
- export const wasm_bindgen__convert__closures_____invoke__h3ee6e6da36ea79fd: (
473
+ export const wasm_bindgen__convert__closures_____invoke__h62b881a194105b80: (
470
474
  a: number,
471
475
  b: number,
472
- c: number,
473
476
  ) => void;
474
- export const wasm_bindgen__closure__destroy__h4e2596d1eeea1ddd: (a: number, b: number) => void;
477
+ export const wasm_bindgen__closure__destroy__he95e920b8d9de938: (a: number, b: number) => void;
475
478
  export const wasm_bindgen__convert__closures_____invoke__h92667cd2c3a9eee2: (
476
479
  a: number,
477
480
  b: number,