@bitwarden/sdk-internal 0.2.0-main.160 → 0.2.0-main.162

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -304,7 +304,8 @@ export interface CryptoError extends Error {
304
304
  | "ArgonError"
305
305
  | "ZeroNumber"
306
306
  | "OperationNotSupported"
307
- | "WrongKeyType";
307
+ | "WrongKeyType"
308
+ | "InvalidNonceLength";
308
309
  }
309
310
 
310
311
  export function isCryptoError(error: any): error is CryptoError;
@@ -344,6 +345,21 @@ export type UsernameGeneratorRequest =
344
345
  | { catchall: { type: AppendType; domain: string } }
345
346
  | { forwarded: { service: ForwarderServiceType; website: string | undefined } };
346
347
 
348
+ /**
349
+ * Configures the email forwarding service to use.
350
+ * For instructions on how to configure each service, see the documentation:
351
+ * <https://bitwarden.com/help/generator/#username-types>
352
+ */
353
+ export type ForwarderServiceType =
354
+ | { addyIo: { api_token: string; domain: string; base_url: string } }
355
+ | { duckDuckGo: { token: string } }
356
+ | { firefox: { api_token: string } }
357
+ | { fastmail: { api_token: string } }
358
+ | { forwardEmail: { api_token: string; domain: string } }
359
+ | { simpleLogin: { api_key: string; base_url: string } };
360
+
361
+ export type AppendType = "random" | { websiteName: { website: string } };
362
+
347
363
  export interface UsernameError extends Error {
348
364
  name: "UsernameError";
349
365
  variant: "InvalidApiKey" | "Unknown" | "ResponseContent" | "Reqwest";
@@ -1212,11 +1228,36 @@ export class OutgoingMessage {
1212
1228
  export class PureCrypto {
1213
1229
  private constructor();
1214
1230
  free(): void;
1231
+ /**
1232
+ * DEPRECATED: Use `symmetric_decrypt_string` instead.
1233
+ * Cleanup ticket: <https://bitwarden.atlassian.net/browse/PM-21247>
1234
+ */
1215
1235
  static symmetric_decrypt(enc_string: string, key: Uint8Array): string;
1216
- static symmetric_decrypt_to_bytes(enc_string: string, key: Uint8Array): Uint8Array;
1236
+ static symmetric_decrypt_string(enc_string: string, key: Uint8Array): string;
1237
+ static symmetric_decrypt_bytes(enc_string: string, key: Uint8Array): Uint8Array;
1238
+ /**
1239
+ * DEPRECATED: Use `symmetric_decrypt_filedata` instead.
1240
+ * Cleanup ticket: <https://bitwarden.atlassian.net/browse/PM-21247>
1241
+ */
1217
1242
  static symmetric_decrypt_array_buffer(enc_bytes: Uint8Array, key: Uint8Array): Uint8Array;
1218
- static symmetric_encrypt(plain: string, key: Uint8Array): string;
1219
- static symmetric_encrypt_to_array_buffer(plain: Uint8Array, key: Uint8Array): Uint8Array;
1243
+ static symmetric_decrypt_filedata(enc_bytes: Uint8Array, key: Uint8Array): Uint8Array;
1244
+ static symmetric_encrypt_string(plain: string, key: Uint8Array): string;
1245
+ static symmetric_encrypt_bytes(plain: Uint8Array, key: Uint8Array): string;
1246
+ static symmetric_encrypt_filedata(plain: Uint8Array, key: Uint8Array): Uint8Array;
1247
+ static decrypt_user_key_with_master_password(
1248
+ encrypted_user_key: string,
1249
+ master_password: string,
1250
+ email: string,
1251
+ kdf: Kdf,
1252
+ ): Uint8Array;
1253
+ static encrypt_user_key_with_master_password(
1254
+ user_key: Uint8Array,
1255
+ master_password: string,
1256
+ email: string,
1257
+ kdf: Kdf,
1258
+ ): string;
1259
+ static generate_user_key_aes256_cbc_hmac(): Uint8Array;
1260
+ static generate_user_key_xchacha20_poly1305(): Uint8Array;
1220
1261
  }
1221
1262
  export class ReceiveError {
1222
1263
  private constructor();
@@ -607,7 +607,7 @@ function __wbg_adapter_53(arg0, arg1, arg2) {
607
607
  );
608
608
  }
609
609
 
610
- function __wbg_adapter_238(arg0, arg1, arg2, arg3) {
610
+ function __wbg_adapter_245(arg0, arg1, arg2, arg3) {
611
611
  wasm.wasm_bindgen__convert__closures__invoke2_mut__h2a33b0877ef96682(
612
612
  arg0,
613
613
  arg1,
@@ -2041,6 +2041,8 @@ class PureCrypto {
2041
2041
  wasm.__wbg_purecrypto_free(ptr, 0);
2042
2042
  }
2043
2043
  /**
2044
+ * DEPRECATED: Use `symmetric_decrypt_string` instead.
2045
+ * Cleanup ticket: <https://bitwarden.atlassian.net/browse/PM-21247>
2044
2046
  * @param {string} enc_string
2045
2047
  * @param {Uint8Array} key
2046
2048
  * @returns {string}
@@ -2074,19 +2076,53 @@ class PureCrypto {
2074
2076
  wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);
2075
2077
  }
2076
2078
  }
2079
+ /**
2080
+ * @param {string} enc_string
2081
+ * @param {Uint8Array} key
2082
+ * @returns {string}
2083
+ */
2084
+ static symmetric_decrypt_string(enc_string, key) {
2085
+ let deferred4_0;
2086
+ let deferred4_1;
2087
+ try {
2088
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2089
+ const ptr0 = passStringToWasm0(enc_string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
2090
+ const len0 = WASM_VECTOR_LEN;
2091
+ const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
2092
+ const len1 = WASM_VECTOR_LEN;
2093
+ wasm.purecrypto_symmetric_decrypt_string(retptr, ptr0, len0, ptr1, len1);
2094
+ var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2095
+ var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2096
+ var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
2097
+ var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
2098
+ var ptr3 = r0;
2099
+ var len3 = r1;
2100
+ if (r3) {
2101
+ ptr3 = 0;
2102
+ len3 = 0;
2103
+ throw takeObject(r2);
2104
+ }
2105
+ deferred4_0 = ptr3;
2106
+ deferred4_1 = len3;
2107
+ return getStringFromWasm0(ptr3, len3);
2108
+ } finally {
2109
+ wasm.__wbindgen_add_to_stack_pointer(16);
2110
+ wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);
2111
+ }
2112
+ }
2077
2113
  /**
2078
2114
  * @param {string} enc_string
2079
2115
  * @param {Uint8Array} key
2080
2116
  * @returns {Uint8Array}
2081
2117
  */
2082
- static symmetric_decrypt_to_bytes(enc_string, key) {
2118
+ static symmetric_decrypt_bytes(enc_string, key) {
2083
2119
  try {
2084
2120
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2085
2121
  const ptr0 = passStringToWasm0(enc_string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
2086
2122
  const len0 = WASM_VECTOR_LEN;
2087
2123
  const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
2088
2124
  const len1 = WASM_VECTOR_LEN;
2089
- wasm.purecrypto_symmetric_decrypt_to_bytes(retptr, ptr0, len0, ptr1, len1);
2125
+ wasm.purecrypto_symmetric_decrypt_bytes(retptr, ptr0, len0, ptr1, len1);
2090
2126
  var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2091
2127
  var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2092
2128
  var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
@@ -2102,6 +2138,8 @@ class PureCrypto {
2102
2138
  }
2103
2139
  }
2104
2140
  /**
2141
+ * DEPRECATED: Use `symmetric_decrypt_filedata` instead.
2142
+ * Cleanup ticket: <https://bitwarden.atlassian.net/browse/PM-21247>
2105
2143
  * @param {Uint8Array} enc_bytes
2106
2144
  * @param {Uint8Array} key
2107
2145
  * @returns {Uint8Array}
@@ -2128,12 +2166,39 @@ class PureCrypto {
2128
2166
  wasm.__wbindgen_add_to_stack_pointer(16);
2129
2167
  }
2130
2168
  }
2169
+ /**
2170
+ * @param {Uint8Array} enc_bytes
2171
+ * @param {Uint8Array} key
2172
+ * @returns {Uint8Array}
2173
+ */
2174
+ static symmetric_decrypt_filedata(enc_bytes, key) {
2175
+ try {
2176
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2177
+ const ptr0 = passArray8ToWasm0(enc_bytes, wasm.__wbindgen_malloc);
2178
+ const len0 = WASM_VECTOR_LEN;
2179
+ const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
2180
+ const len1 = WASM_VECTOR_LEN;
2181
+ wasm.purecrypto_symmetric_decrypt_filedata(retptr, ptr0, len0, ptr1, len1);
2182
+ var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2183
+ var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2184
+ var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
2185
+ var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
2186
+ if (r3) {
2187
+ throw takeObject(r2);
2188
+ }
2189
+ var v3 = getArrayU8FromWasm0(r0, r1).slice();
2190
+ wasm.__wbindgen_free(r0, r1 * 1, 1);
2191
+ return v3;
2192
+ } finally {
2193
+ wasm.__wbindgen_add_to_stack_pointer(16);
2194
+ }
2195
+ }
2131
2196
  /**
2132
2197
  * @param {string} plain
2133
2198
  * @param {Uint8Array} key
2134
2199
  * @returns {string}
2135
2200
  */
2136
- static symmetric_encrypt(plain, key) {
2201
+ static symmetric_encrypt_string(plain, key) {
2137
2202
  let deferred4_0;
2138
2203
  let deferred4_1;
2139
2204
  try {
@@ -2142,7 +2207,41 @@ class PureCrypto {
2142
2207
  const len0 = WASM_VECTOR_LEN;
2143
2208
  const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
2144
2209
  const len1 = WASM_VECTOR_LEN;
2145
- wasm.purecrypto_symmetric_encrypt(retptr, ptr0, len0, ptr1, len1);
2210
+ wasm.purecrypto_symmetric_encrypt_string(retptr, ptr0, len0, ptr1, len1);
2211
+ var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2212
+ var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2213
+ var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
2214
+ var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
2215
+ var ptr3 = r0;
2216
+ var len3 = r1;
2217
+ if (r3) {
2218
+ ptr3 = 0;
2219
+ len3 = 0;
2220
+ throw takeObject(r2);
2221
+ }
2222
+ deferred4_0 = ptr3;
2223
+ deferred4_1 = len3;
2224
+ return getStringFromWasm0(ptr3, len3);
2225
+ } finally {
2226
+ wasm.__wbindgen_add_to_stack_pointer(16);
2227
+ wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);
2228
+ }
2229
+ }
2230
+ /**
2231
+ * @param {Uint8Array} plain
2232
+ * @param {Uint8Array} key
2233
+ * @returns {string}
2234
+ */
2235
+ static symmetric_encrypt_bytes(plain, key) {
2236
+ let deferred4_0;
2237
+ let deferred4_1;
2238
+ try {
2239
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2240
+ const ptr0 = passArray8ToWasm0(plain, wasm.__wbindgen_malloc);
2241
+ const len0 = WASM_VECTOR_LEN;
2242
+ const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
2243
+ const len1 = WASM_VECTOR_LEN;
2244
+ wasm.purecrypto_symmetric_encrypt_bytes(retptr, ptr0, len0, ptr1, len1);
2146
2245
  var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2147
2246
  var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2148
2247
  var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
@@ -2167,14 +2266,14 @@ class PureCrypto {
2167
2266
  * @param {Uint8Array} key
2168
2267
  * @returns {Uint8Array}
2169
2268
  */
2170
- static symmetric_encrypt_to_array_buffer(plain, key) {
2269
+ static symmetric_encrypt_filedata(plain, key) {
2171
2270
  try {
2172
2271
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2173
2272
  const ptr0 = passArray8ToWasm0(plain, wasm.__wbindgen_malloc);
2174
2273
  const len0 = WASM_VECTOR_LEN;
2175
2274
  const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
2176
2275
  const len1 = WASM_VECTOR_LEN;
2177
- wasm.purecrypto_symmetric_encrypt_to_array_buffer(retptr, ptr0, len0, ptr1, len1);
2276
+ wasm.purecrypto_symmetric_encrypt_filedata(retptr, ptr0, len0, ptr1, len1);
2178
2277
  var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2179
2278
  var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2180
2279
  var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
@@ -2189,6 +2288,137 @@ class PureCrypto {
2189
2288
  wasm.__wbindgen_add_to_stack_pointer(16);
2190
2289
  }
2191
2290
  }
2291
+ /**
2292
+ * @param {string} encrypted_user_key
2293
+ * @param {string} master_password
2294
+ * @param {string} email
2295
+ * @param {Kdf} kdf
2296
+ * @returns {Uint8Array}
2297
+ */
2298
+ static decrypt_user_key_with_master_password(encrypted_user_key, master_password, email, kdf) {
2299
+ try {
2300
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2301
+ const ptr0 = passStringToWasm0(
2302
+ encrypted_user_key,
2303
+ wasm.__wbindgen_malloc,
2304
+ wasm.__wbindgen_realloc,
2305
+ );
2306
+ const len0 = WASM_VECTOR_LEN;
2307
+ const ptr1 = passStringToWasm0(
2308
+ master_password,
2309
+ wasm.__wbindgen_malloc,
2310
+ wasm.__wbindgen_realloc,
2311
+ );
2312
+ const len1 = WASM_VECTOR_LEN;
2313
+ const ptr2 = passStringToWasm0(email, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
2314
+ const len2 = WASM_VECTOR_LEN;
2315
+ wasm.purecrypto_decrypt_user_key_with_master_password(
2316
+ retptr,
2317
+ ptr0,
2318
+ len0,
2319
+ ptr1,
2320
+ len1,
2321
+ ptr2,
2322
+ len2,
2323
+ addHeapObject(kdf),
2324
+ );
2325
+ var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2326
+ var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2327
+ var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
2328
+ var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
2329
+ if (r3) {
2330
+ throw takeObject(r2);
2331
+ }
2332
+ var v4 = getArrayU8FromWasm0(r0, r1).slice();
2333
+ wasm.__wbindgen_free(r0, r1 * 1, 1);
2334
+ return v4;
2335
+ } finally {
2336
+ wasm.__wbindgen_add_to_stack_pointer(16);
2337
+ }
2338
+ }
2339
+ /**
2340
+ * @param {Uint8Array} user_key
2341
+ * @param {string} master_password
2342
+ * @param {string} email
2343
+ * @param {Kdf} kdf
2344
+ * @returns {string}
2345
+ */
2346
+ static encrypt_user_key_with_master_password(user_key, master_password, email, kdf) {
2347
+ let deferred5_0;
2348
+ let deferred5_1;
2349
+ try {
2350
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2351
+ const ptr0 = passArray8ToWasm0(user_key, wasm.__wbindgen_malloc);
2352
+ const len0 = WASM_VECTOR_LEN;
2353
+ const ptr1 = passStringToWasm0(
2354
+ master_password,
2355
+ wasm.__wbindgen_malloc,
2356
+ wasm.__wbindgen_realloc,
2357
+ );
2358
+ const len1 = WASM_VECTOR_LEN;
2359
+ const ptr2 = passStringToWasm0(email, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
2360
+ const len2 = WASM_VECTOR_LEN;
2361
+ wasm.purecrypto_encrypt_user_key_with_master_password(
2362
+ retptr,
2363
+ ptr0,
2364
+ len0,
2365
+ ptr1,
2366
+ len1,
2367
+ ptr2,
2368
+ len2,
2369
+ addHeapObject(kdf),
2370
+ );
2371
+ var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2372
+ var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2373
+ var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
2374
+ var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
2375
+ var ptr4 = r0;
2376
+ var len4 = r1;
2377
+ if (r3) {
2378
+ ptr4 = 0;
2379
+ len4 = 0;
2380
+ throw takeObject(r2);
2381
+ }
2382
+ deferred5_0 = ptr4;
2383
+ deferred5_1 = len4;
2384
+ return getStringFromWasm0(ptr4, len4);
2385
+ } finally {
2386
+ wasm.__wbindgen_add_to_stack_pointer(16);
2387
+ wasm.__wbindgen_free(deferred5_0, deferred5_1, 1);
2388
+ }
2389
+ }
2390
+ /**
2391
+ * @returns {Uint8Array}
2392
+ */
2393
+ static generate_user_key_aes256_cbc_hmac() {
2394
+ try {
2395
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2396
+ wasm.purecrypto_generate_user_key_aes256_cbc_hmac(retptr);
2397
+ var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2398
+ var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2399
+ var v1 = getArrayU8FromWasm0(r0, r1).slice();
2400
+ wasm.__wbindgen_free(r0, r1 * 1, 1);
2401
+ return v1;
2402
+ } finally {
2403
+ wasm.__wbindgen_add_to_stack_pointer(16);
2404
+ }
2405
+ }
2406
+ /**
2407
+ * @returns {Uint8Array}
2408
+ */
2409
+ static generate_user_key_xchacha20_poly1305() {
2410
+ try {
2411
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2412
+ wasm.purecrypto_generate_user_key_xchacha20_poly1305(retptr);
2413
+ var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2414
+ var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2415
+ var v1 = getArrayU8FromWasm0(r0, r1).slice();
2416
+ wasm.__wbindgen_free(r0, r1 * 1, 1);
2417
+ return v1;
2418
+ } finally {
2419
+ wasm.__wbindgen_add_to_stack_pointer(16);
2420
+ }
2421
+ }
2192
2422
  }
2193
2423
  module.exports.PureCrypto = PureCrypto;
2194
2424
 
@@ -2708,7 +2938,7 @@ module.exports.__wbg_new_23a2665fac83c611 = function (arg0, arg1) {
2708
2938
  const a = state0.a;
2709
2939
  state0.a = 0;
2710
2940
  try {
2711
- return __wbg_adapter_238(a, state0.b, arg0, arg1);
2941
+ return __wbg_adapter_245(a, state0.b, arg0, arg1);
2712
2942
  } finally {
2713
2943
  state0.a = a;
2714
2944
  }
@@ -3075,13 +3305,13 @@ module.exports.__wbindgen_cb_drop = function (arg0) {
3075
3305
  return ret;
3076
3306
  };
3077
3307
 
3078
- module.exports.__wbindgen_closure_wrapper2889 = function (arg0, arg1, arg2) {
3079
- const ret = makeMutClosure(arg0, arg1, 669, __wbg_adapter_50);
3308
+ module.exports.__wbindgen_closure_wrapper3031 = function (arg0, arg1, arg2) {
3309
+ const ret = makeMutClosure(arg0, arg1, 688, __wbg_adapter_50);
3080
3310
  return addHeapObject(ret);
3081
3311
  };
3082
3312
 
3083
- module.exports.__wbindgen_closure_wrapper3282 = function (arg0, arg1, arg2) {
3084
- const ret = makeMutClosure(arg0, arg1, 791, __wbg_adapter_53);
3313
+ module.exports.__wbindgen_closure_wrapper3424 = function (arg0, arg1, arg2) {
3314
+ const ret = makeMutClosure(arg0, arg1, 810, __wbg_adapter_53);
3085
3315
  return addHeapObject(ret);
3086
3316
  };
3087
3317
 
@@ -123,7 +123,14 @@ export const purecrypto_symmetric_decrypt: (
123
123
  d: number,
124
124
  e: number,
125
125
  ) => void;
126
- export const purecrypto_symmetric_decrypt_to_bytes: (
126
+ export const purecrypto_symmetric_decrypt_string: (
127
+ a: number,
128
+ b: number,
129
+ c: number,
130
+ d: number,
131
+ e: number,
132
+ ) => void;
133
+ export const purecrypto_symmetric_decrypt_bytes: (
127
134
  a: number,
128
135
  b: number,
129
136
  c: number,
@@ -137,20 +144,56 @@ export const purecrypto_symmetric_decrypt_array_buffer: (
137
144
  d: number,
138
145
  e: number,
139
146
  ) => void;
140
- export const purecrypto_symmetric_encrypt: (
147
+ export const purecrypto_symmetric_decrypt_filedata: (
148
+ a: number,
149
+ b: number,
150
+ c: number,
151
+ d: number,
152
+ e: number,
153
+ ) => void;
154
+ export const purecrypto_symmetric_encrypt_string: (
155
+ a: number,
156
+ b: number,
157
+ c: number,
158
+ d: number,
159
+ e: number,
160
+ ) => void;
161
+ export const purecrypto_symmetric_encrypt_bytes: (
141
162
  a: number,
142
163
  b: number,
143
164
  c: number,
144
165
  d: number,
145
166
  e: number,
146
167
  ) => void;
147
- export const purecrypto_symmetric_encrypt_to_array_buffer: (
168
+ export const purecrypto_symmetric_encrypt_filedata: (
148
169
  a: number,
149
170
  b: number,
150
171
  c: number,
151
172
  d: number,
152
173
  e: number,
153
174
  ) => void;
175
+ export const purecrypto_decrypt_user_key_with_master_password: (
176
+ a: number,
177
+ b: number,
178
+ c: number,
179
+ d: number,
180
+ e: number,
181
+ f: number,
182
+ g: number,
183
+ h: number,
184
+ ) => void;
185
+ export const purecrypto_encrypt_user_key_with_master_password: (
186
+ a: number,
187
+ b: number,
188
+ c: number,
189
+ d: number,
190
+ e: number,
191
+ f: number,
192
+ g: number,
193
+ h: number,
194
+ ) => void;
195
+ export const purecrypto_generate_user_key_aes256_cbc_hmac: (a: number) => void;
196
+ export const purecrypto_generate_user_key_xchacha20_poly1305: (a: number) => void;
154
197
  export const generate_ssh_key: (a: number, b: number) => void;
155
198
  export const import_ssh_key: (a: number, b: number, c: number, d: number, e: number) => void;
156
199
  export const __wbg_attachmentsclient_free: (a: number, b: number) => void;
@@ -185,10 +228,10 @@ export const bitwardenclient_exporters: (a: number) => number;
185
228
  export const vaultclient_ciphers: (a: number) => number;
186
229
  export const vaultclient_folders: (a: number) => number;
187
230
  export const __wbg_vaultclient_free: (a: number, b: number) => void;
188
- export const __wbg_totpclient_free: (a: number, b: number) => void;
189
231
  export const __wbg_foldersclient_free: (a: number, b: number) => void;
190
232
  export const __wbg_cryptoclient_free: (a: number, b: number) => void;
191
233
  export const __wbg_ciphersclient_free: (a: number, b: number) => void;
234
+ export const __wbg_totpclient_free: (a: number, b: number) => void;
192
235
  export const __wbindgen_malloc: (a: number, b: number) => number;
193
236
  export const __wbindgen_realloc: (a: number, b: number, c: number, d: number) => number;
194
237
  export const __wbindgen_exn_store: (a: number) => void;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@bitwarden/sdk-internal",
3
- "version": "0.2.0-main.160",
3
+ "version": "0.2.0-main.162",
4
4
  "license": "GPL-3.0",
5
5
  "files": [
6
6
  "bitwarden_wasm_internal_bg.js",