@bitwarden/sdk-internal 0.2.0-main.139 → 0.2.0-main.140
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -97,6 +97,9 @@ export enum UriMatchType {
|
|
|
97
97
|
RegularExpression = 4,
|
|
98
98
|
Never = 5,
|
|
99
99
|
}
|
|
100
|
+
/**
|
|
101
|
+
* State used for initializing the user cryptographic state.
|
|
102
|
+
*/
|
|
100
103
|
export interface InitUserCryptoRequest {
|
|
101
104
|
/**
|
|
102
105
|
* The user\'s KDF parameters, as received from the prelogin request
|
|
@@ -116,6 +119,9 @@ export interface InitUserCryptoRequest {
|
|
|
116
119
|
method: InitUserCryptoMethod;
|
|
117
120
|
}
|
|
118
121
|
|
|
122
|
+
/**
|
|
123
|
+
* The crypto method used to initialize the user cryptographic state.
|
|
124
|
+
*/
|
|
119
125
|
export type InitUserCryptoMethod =
|
|
120
126
|
| { password: { password: string; user_key: string } }
|
|
121
127
|
| { decryptedKey: { decrypted_user_key: string } }
|
|
@@ -130,10 +136,16 @@ export type InitUserCryptoMethod =
|
|
|
130
136
|
}
|
|
131
137
|
| { keyConnector: { master_key: string; user_key: string } };
|
|
132
138
|
|
|
139
|
+
/**
|
|
140
|
+
* Auth requests supports multiple initialization methods.
|
|
141
|
+
*/
|
|
133
142
|
export type AuthRequestMethod =
|
|
134
143
|
| { userKey: { protected_user_key: AsymmetricEncString } }
|
|
135
144
|
| { masterKey: { protected_master_key: AsymmetricEncString; auth_request_key: EncString } };
|
|
136
145
|
|
|
146
|
+
/**
|
|
147
|
+
* Represents the request to initialize the user\'s organizational cryptographic state.
|
|
148
|
+
*/
|
|
137
149
|
export interface InitOrgCryptoRequest {
|
|
138
150
|
/**
|
|
139
151
|
* The encryption keys for all the organizations the user is a part of
|
|
@@ -141,6 +153,9 @@ export interface InitOrgCryptoRequest {
|
|
|
141
153
|
organizationKeys: Map<Uuid, AsymmetricEncString>;
|
|
142
154
|
}
|
|
143
155
|
|
|
156
|
+
/**
|
|
157
|
+
* Response from the `make_key_pair` function
|
|
158
|
+
*/
|
|
144
159
|
export interface MakeKeyPairResponse {
|
|
145
160
|
/**
|
|
146
161
|
* The user\'s public key
|
|
@@ -152,6 +167,9 @@ export interface MakeKeyPairResponse {
|
|
|
152
167
|
userKeyEncryptedPrivateKey: EncString;
|
|
153
168
|
}
|
|
154
169
|
|
|
170
|
+
/**
|
|
171
|
+
* Request for `verify_asymmetric_keys`.
|
|
172
|
+
*/
|
|
155
173
|
export interface VerifyAsymmetricKeysRequest {
|
|
156
174
|
/**
|
|
157
175
|
* The user\'s user key
|
|
@@ -167,6 +185,9 @@ export interface VerifyAsymmetricKeysRequest {
|
|
|
167
185
|
userKeyEncryptedPrivateKey: EncString;
|
|
168
186
|
}
|
|
169
187
|
|
|
188
|
+
/**
|
|
189
|
+
* Response for `verify_asymmetric_keys`.
|
|
190
|
+
*/
|
|
170
191
|
export interface VerifyAsymmetricKeysResponse {
|
|
171
192
|
/**
|
|
172
193
|
* Whether the user\'s private key was decryptable by the user key.
|
|
Binary file
|