@bitwarden/sdk-internal 0.2.0-main.139 → 0.2.0-main.140

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/VERSION CHANGED
@@ -1 +1 @@
1
- b99e954e32588adeb2c130b4bac9010e7c973e78
1
+ 2bbba2fa4162d0cde112def37fc2ea76e113e0fe
@@ -97,6 +97,9 @@ export enum UriMatchType {
97
97
  RegularExpression = 4,
98
98
  Never = 5,
99
99
  }
100
+ /**
101
+ * State used for initializing the user cryptographic state.
102
+ */
100
103
  export interface InitUserCryptoRequest {
101
104
  /**
102
105
  * The user\'s KDF parameters, as received from the prelogin request
@@ -116,6 +119,9 @@ export interface InitUserCryptoRequest {
116
119
  method: InitUserCryptoMethod;
117
120
  }
118
121
 
122
+ /**
123
+ * The crypto method used to initialize the user cryptographic state.
124
+ */
119
125
  export type InitUserCryptoMethod =
120
126
  | { password: { password: string; user_key: string } }
121
127
  | { decryptedKey: { decrypted_user_key: string } }
@@ -130,10 +136,16 @@ export type InitUserCryptoMethod =
130
136
  }
131
137
  | { keyConnector: { master_key: string; user_key: string } };
132
138
 
139
+ /**
140
+ * Auth requests supports multiple initialization methods.
141
+ */
133
142
  export type AuthRequestMethod =
134
143
  | { userKey: { protected_user_key: AsymmetricEncString } }
135
144
  | { masterKey: { protected_master_key: AsymmetricEncString; auth_request_key: EncString } };
136
145
 
146
+ /**
147
+ * Represents the request to initialize the user\'s organizational cryptographic state.
148
+ */
137
149
  export interface InitOrgCryptoRequest {
138
150
  /**
139
151
  * The encryption keys for all the organizations the user is a part of
@@ -141,6 +153,9 @@ export interface InitOrgCryptoRequest {
141
153
  organizationKeys: Map<Uuid, AsymmetricEncString>;
142
154
  }
143
155
 
156
+ /**
157
+ * Response from the `make_key_pair` function
158
+ */
144
159
  export interface MakeKeyPairResponse {
145
160
  /**
146
161
  * The user\'s public key
@@ -152,6 +167,9 @@ export interface MakeKeyPairResponse {
152
167
  userKeyEncryptedPrivateKey: EncString;
153
168
  }
154
169
 
170
+ /**
171
+ * Request for `verify_asymmetric_keys`.
172
+ */
155
173
  export interface VerifyAsymmetricKeysRequest {
156
174
  /**
157
175
  * The user\'s user key
@@ -167,6 +185,9 @@ export interface VerifyAsymmetricKeysRequest {
167
185
  userKeyEncryptedPrivateKey: EncString;
168
186
  }
169
187
 
188
+ /**
189
+ * Response for `verify_asymmetric_keys`.
190
+ */
170
191
  export interface VerifyAsymmetricKeysResponse {
171
192
  /**
172
193
  * Whether the user\'s private key was decryptable by the user key.
Binary file