@bitwarden/sdk-internal 0.2.0-main.161 → 0.2.0-main.162
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/VERSION +1 -1
- package/bitwarden_wasm_internal.d.ts +30 -4
- package/bitwarden_wasm_internal_bg.js +242 -12
- package/bitwarden_wasm_internal_bg.wasm +0 -0
- package/bitwarden_wasm_internal_bg.wasm.d.ts +47 -4
- package/bitwarden_wasm_internal_bg.wasm.js +1 -1
- package/node/bitwarden_wasm_internal.d.ts +30 -4
- package/node/bitwarden_wasm_internal.js +242 -12
- package/node/bitwarden_wasm_internal_bg.wasm +0 -0
- package/node/bitwarden_wasm_internal_bg.wasm.d.ts +47 -4
- package/package.json +1 -1
package/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
|
|
1
|
+
bc2f2033551a3314fbb0620526ba58f21025eb10
|
|
@@ -304,7 +304,8 @@ export interface CryptoError extends Error {
|
|
|
304
304
|
| "ArgonError"
|
|
305
305
|
| "ZeroNumber"
|
|
306
306
|
| "OperationNotSupported"
|
|
307
|
-
| "WrongKeyType"
|
|
307
|
+
| "WrongKeyType"
|
|
308
|
+
| "InvalidNonceLength";
|
|
308
309
|
}
|
|
309
310
|
|
|
310
311
|
export function isCryptoError(error: any): error is CryptoError;
|
|
@@ -1227,11 +1228,36 @@ export class OutgoingMessage {
|
|
|
1227
1228
|
export class PureCrypto {
|
|
1228
1229
|
private constructor();
|
|
1229
1230
|
free(): void;
|
|
1231
|
+
/**
|
|
1232
|
+
* DEPRECATED: Use `symmetric_decrypt_string` instead.
|
|
1233
|
+
* Cleanup ticket: <https://bitwarden.atlassian.net/browse/PM-21247>
|
|
1234
|
+
*/
|
|
1230
1235
|
static symmetric_decrypt(enc_string: string, key: Uint8Array): string;
|
|
1231
|
-
static
|
|
1236
|
+
static symmetric_decrypt_string(enc_string: string, key: Uint8Array): string;
|
|
1237
|
+
static symmetric_decrypt_bytes(enc_string: string, key: Uint8Array): Uint8Array;
|
|
1238
|
+
/**
|
|
1239
|
+
* DEPRECATED: Use `symmetric_decrypt_filedata` instead.
|
|
1240
|
+
* Cleanup ticket: <https://bitwarden.atlassian.net/browse/PM-21247>
|
|
1241
|
+
*/
|
|
1232
1242
|
static symmetric_decrypt_array_buffer(enc_bytes: Uint8Array, key: Uint8Array): Uint8Array;
|
|
1233
|
-
static
|
|
1234
|
-
static
|
|
1243
|
+
static symmetric_decrypt_filedata(enc_bytes: Uint8Array, key: Uint8Array): Uint8Array;
|
|
1244
|
+
static symmetric_encrypt_string(plain: string, key: Uint8Array): string;
|
|
1245
|
+
static symmetric_encrypt_bytes(plain: Uint8Array, key: Uint8Array): string;
|
|
1246
|
+
static symmetric_encrypt_filedata(plain: Uint8Array, key: Uint8Array): Uint8Array;
|
|
1247
|
+
static decrypt_user_key_with_master_password(
|
|
1248
|
+
encrypted_user_key: string,
|
|
1249
|
+
master_password: string,
|
|
1250
|
+
email: string,
|
|
1251
|
+
kdf: Kdf,
|
|
1252
|
+
): Uint8Array;
|
|
1253
|
+
static encrypt_user_key_with_master_password(
|
|
1254
|
+
user_key: Uint8Array,
|
|
1255
|
+
master_password: string,
|
|
1256
|
+
email: string,
|
|
1257
|
+
kdf: Kdf,
|
|
1258
|
+
): string;
|
|
1259
|
+
static generate_user_key_aes256_cbc_hmac(): Uint8Array;
|
|
1260
|
+
static generate_user_key_xchacha20_poly1305(): Uint8Array;
|
|
1235
1261
|
}
|
|
1236
1262
|
export class ReceiveError {
|
|
1237
1263
|
private constructor();
|
|
@@ -613,7 +613,7 @@ function __wbg_adapter_53(arg0, arg1, arg2) {
|
|
|
613
613
|
);
|
|
614
614
|
}
|
|
615
615
|
|
|
616
|
-
function
|
|
616
|
+
function __wbg_adapter_245(arg0, arg1, arg2, arg3) {
|
|
617
617
|
wasm.wasm_bindgen__convert__closures__invoke2_mut__h2a33b0877ef96682(
|
|
618
618
|
arg0,
|
|
619
619
|
arg1,
|
|
@@ -2035,6 +2035,8 @@ export class PureCrypto {
|
|
|
2035
2035
|
wasm.__wbg_purecrypto_free(ptr, 0);
|
|
2036
2036
|
}
|
|
2037
2037
|
/**
|
|
2038
|
+
* DEPRECATED: Use `symmetric_decrypt_string` instead.
|
|
2039
|
+
* Cleanup ticket: <https://bitwarden.atlassian.net/browse/PM-21247>
|
|
2038
2040
|
* @param {string} enc_string
|
|
2039
2041
|
* @param {Uint8Array} key
|
|
2040
2042
|
* @returns {string}
|
|
@@ -2068,19 +2070,53 @@ export class PureCrypto {
|
|
|
2068
2070
|
wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);
|
|
2069
2071
|
}
|
|
2070
2072
|
}
|
|
2073
|
+
/**
|
|
2074
|
+
* @param {string} enc_string
|
|
2075
|
+
* @param {Uint8Array} key
|
|
2076
|
+
* @returns {string}
|
|
2077
|
+
*/
|
|
2078
|
+
static symmetric_decrypt_string(enc_string, key) {
|
|
2079
|
+
let deferred4_0;
|
|
2080
|
+
let deferred4_1;
|
|
2081
|
+
try {
|
|
2082
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2083
|
+
const ptr0 = passStringToWasm0(enc_string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
|
2084
|
+
const len0 = WASM_VECTOR_LEN;
|
|
2085
|
+
const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
|
|
2086
|
+
const len1 = WASM_VECTOR_LEN;
|
|
2087
|
+
wasm.purecrypto_symmetric_decrypt_string(retptr, ptr0, len0, ptr1, len1);
|
|
2088
|
+
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2089
|
+
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2090
|
+
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
2091
|
+
var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
|
|
2092
|
+
var ptr3 = r0;
|
|
2093
|
+
var len3 = r1;
|
|
2094
|
+
if (r3) {
|
|
2095
|
+
ptr3 = 0;
|
|
2096
|
+
len3 = 0;
|
|
2097
|
+
throw takeObject(r2);
|
|
2098
|
+
}
|
|
2099
|
+
deferred4_0 = ptr3;
|
|
2100
|
+
deferred4_1 = len3;
|
|
2101
|
+
return getStringFromWasm0(ptr3, len3);
|
|
2102
|
+
} finally {
|
|
2103
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2104
|
+
wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);
|
|
2105
|
+
}
|
|
2106
|
+
}
|
|
2071
2107
|
/**
|
|
2072
2108
|
* @param {string} enc_string
|
|
2073
2109
|
* @param {Uint8Array} key
|
|
2074
2110
|
* @returns {Uint8Array}
|
|
2075
2111
|
*/
|
|
2076
|
-
static
|
|
2112
|
+
static symmetric_decrypt_bytes(enc_string, key) {
|
|
2077
2113
|
try {
|
|
2078
2114
|
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2079
2115
|
const ptr0 = passStringToWasm0(enc_string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
|
2080
2116
|
const len0 = WASM_VECTOR_LEN;
|
|
2081
2117
|
const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
|
|
2082
2118
|
const len1 = WASM_VECTOR_LEN;
|
|
2083
|
-
wasm.
|
|
2119
|
+
wasm.purecrypto_symmetric_decrypt_bytes(retptr, ptr0, len0, ptr1, len1);
|
|
2084
2120
|
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2085
2121
|
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2086
2122
|
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
@@ -2096,6 +2132,8 @@ export class PureCrypto {
|
|
|
2096
2132
|
}
|
|
2097
2133
|
}
|
|
2098
2134
|
/**
|
|
2135
|
+
* DEPRECATED: Use `symmetric_decrypt_filedata` instead.
|
|
2136
|
+
* Cleanup ticket: <https://bitwarden.atlassian.net/browse/PM-21247>
|
|
2099
2137
|
* @param {Uint8Array} enc_bytes
|
|
2100
2138
|
* @param {Uint8Array} key
|
|
2101
2139
|
* @returns {Uint8Array}
|
|
@@ -2122,12 +2160,39 @@ export class PureCrypto {
|
|
|
2122
2160
|
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2123
2161
|
}
|
|
2124
2162
|
}
|
|
2163
|
+
/**
|
|
2164
|
+
* @param {Uint8Array} enc_bytes
|
|
2165
|
+
* @param {Uint8Array} key
|
|
2166
|
+
* @returns {Uint8Array}
|
|
2167
|
+
*/
|
|
2168
|
+
static symmetric_decrypt_filedata(enc_bytes, key) {
|
|
2169
|
+
try {
|
|
2170
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2171
|
+
const ptr0 = passArray8ToWasm0(enc_bytes, wasm.__wbindgen_malloc);
|
|
2172
|
+
const len0 = WASM_VECTOR_LEN;
|
|
2173
|
+
const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
|
|
2174
|
+
const len1 = WASM_VECTOR_LEN;
|
|
2175
|
+
wasm.purecrypto_symmetric_decrypt_filedata(retptr, ptr0, len0, ptr1, len1);
|
|
2176
|
+
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2177
|
+
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2178
|
+
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
2179
|
+
var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
|
|
2180
|
+
if (r3) {
|
|
2181
|
+
throw takeObject(r2);
|
|
2182
|
+
}
|
|
2183
|
+
var v3 = getArrayU8FromWasm0(r0, r1).slice();
|
|
2184
|
+
wasm.__wbindgen_free(r0, r1 * 1, 1);
|
|
2185
|
+
return v3;
|
|
2186
|
+
} finally {
|
|
2187
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2188
|
+
}
|
|
2189
|
+
}
|
|
2125
2190
|
/**
|
|
2126
2191
|
* @param {string} plain
|
|
2127
2192
|
* @param {Uint8Array} key
|
|
2128
2193
|
* @returns {string}
|
|
2129
2194
|
*/
|
|
2130
|
-
static
|
|
2195
|
+
static symmetric_encrypt_string(plain, key) {
|
|
2131
2196
|
let deferred4_0;
|
|
2132
2197
|
let deferred4_1;
|
|
2133
2198
|
try {
|
|
@@ -2136,7 +2201,41 @@ export class PureCrypto {
|
|
|
2136
2201
|
const len0 = WASM_VECTOR_LEN;
|
|
2137
2202
|
const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
|
|
2138
2203
|
const len1 = WASM_VECTOR_LEN;
|
|
2139
|
-
wasm.
|
|
2204
|
+
wasm.purecrypto_symmetric_encrypt_string(retptr, ptr0, len0, ptr1, len1);
|
|
2205
|
+
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2206
|
+
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2207
|
+
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
2208
|
+
var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
|
|
2209
|
+
var ptr3 = r0;
|
|
2210
|
+
var len3 = r1;
|
|
2211
|
+
if (r3) {
|
|
2212
|
+
ptr3 = 0;
|
|
2213
|
+
len3 = 0;
|
|
2214
|
+
throw takeObject(r2);
|
|
2215
|
+
}
|
|
2216
|
+
deferred4_0 = ptr3;
|
|
2217
|
+
deferred4_1 = len3;
|
|
2218
|
+
return getStringFromWasm0(ptr3, len3);
|
|
2219
|
+
} finally {
|
|
2220
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2221
|
+
wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);
|
|
2222
|
+
}
|
|
2223
|
+
}
|
|
2224
|
+
/**
|
|
2225
|
+
* @param {Uint8Array} plain
|
|
2226
|
+
* @param {Uint8Array} key
|
|
2227
|
+
* @returns {string}
|
|
2228
|
+
*/
|
|
2229
|
+
static symmetric_encrypt_bytes(plain, key) {
|
|
2230
|
+
let deferred4_0;
|
|
2231
|
+
let deferred4_1;
|
|
2232
|
+
try {
|
|
2233
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2234
|
+
const ptr0 = passArray8ToWasm0(plain, wasm.__wbindgen_malloc);
|
|
2235
|
+
const len0 = WASM_VECTOR_LEN;
|
|
2236
|
+
const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
|
|
2237
|
+
const len1 = WASM_VECTOR_LEN;
|
|
2238
|
+
wasm.purecrypto_symmetric_encrypt_bytes(retptr, ptr0, len0, ptr1, len1);
|
|
2140
2239
|
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2141
2240
|
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2142
2241
|
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
@@ -2161,14 +2260,14 @@ export class PureCrypto {
|
|
|
2161
2260
|
* @param {Uint8Array} key
|
|
2162
2261
|
* @returns {Uint8Array}
|
|
2163
2262
|
*/
|
|
2164
|
-
static
|
|
2263
|
+
static symmetric_encrypt_filedata(plain, key) {
|
|
2165
2264
|
try {
|
|
2166
2265
|
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2167
2266
|
const ptr0 = passArray8ToWasm0(plain, wasm.__wbindgen_malloc);
|
|
2168
2267
|
const len0 = WASM_VECTOR_LEN;
|
|
2169
2268
|
const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
|
|
2170
2269
|
const len1 = WASM_VECTOR_LEN;
|
|
2171
|
-
wasm.
|
|
2270
|
+
wasm.purecrypto_symmetric_encrypt_filedata(retptr, ptr0, len0, ptr1, len1);
|
|
2172
2271
|
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2173
2272
|
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2174
2273
|
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
@@ -2183,6 +2282,137 @@ export class PureCrypto {
|
|
|
2183
2282
|
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2184
2283
|
}
|
|
2185
2284
|
}
|
|
2285
|
+
/**
|
|
2286
|
+
* @param {string} encrypted_user_key
|
|
2287
|
+
* @param {string} master_password
|
|
2288
|
+
* @param {string} email
|
|
2289
|
+
* @param {Kdf} kdf
|
|
2290
|
+
* @returns {Uint8Array}
|
|
2291
|
+
*/
|
|
2292
|
+
static decrypt_user_key_with_master_password(encrypted_user_key, master_password, email, kdf) {
|
|
2293
|
+
try {
|
|
2294
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2295
|
+
const ptr0 = passStringToWasm0(
|
|
2296
|
+
encrypted_user_key,
|
|
2297
|
+
wasm.__wbindgen_malloc,
|
|
2298
|
+
wasm.__wbindgen_realloc,
|
|
2299
|
+
);
|
|
2300
|
+
const len0 = WASM_VECTOR_LEN;
|
|
2301
|
+
const ptr1 = passStringToWasm0(
|
|
2302
|
+
master_password,
|
|
2303
|
+
wasm.__wbindgen_malloc,
|
|
2304
|
+
wasm.__wbindgen_realloc,
|
|
2305
|
+
);
|
|
2306
|
+
const len1 = WASM_VECTOR_LEN;
|
|
2307
|
+
const ptr2 = passStringToWasm0(email, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
|
2308
|
+
const len2 = WASM_VECTOR_LEN;
|
|
2309
|
+
wasm.purecrypto_decrypt_user_key_with_master_password(
|
|
2310
|
+
retptr,
|
|
2311
|
+
ptr0,
|
|
2312
|
+
len0,
|
|
2313
|
+
ptr1,
|
|
2314
|
+
len1,
|
|
2315
|
+
ptr2,
|
|
2316
|
+
len2,
|
|
2317
|
+
addHeapObject(kdf),
|
|
2318
|
+
);
|
|
2319
|
+
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2320
|
+
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2321
|
+
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
2322
|
+
var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
|
|
2323
|
+
if (r3) {
|
|
2324
|
+
throw takeObject(r2);
|
|
2325
|
+
}
|
|
2326
|
+
var v4 = getArrayU8FromWasm0(r0, r1).slice();
|
|
2327
|
+
wasm.__wbindgen_free(r0, r1 * 1, 1);
|
|
2328
|
+
return v4;
|
|
2329
|
+
} finally {
|
|
2330
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2331
|
+
}
|
|
2332
|
+
}
|
|
2333
|
+
/**
|
|
2334
|
+
* @param {Uint8Array} user_key
|
|
2335
|
+
* @param {string} master_password
|
|
2336
|
+
* @param {string} email
|
|
2337
|
+
* @param {Kdf} kdf
|
|
2338
|
+
* @returns {string}
|
|
2339
|
+
*/
|
|
2340
|
+
static encrypt_user_key_with_master_password(user_key, master_password, email, kdf) {
|
|
2341
|
+
let deferred5_0;
|
|
2342
|
+
let deferred5_1;
|
|
2343
|
+
try {
|
|
2344
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2345
|
+
const ptr0 = passArray8ToWasm0(user_key, wasm.__wbindgen_malloc);
|
|
2346
|
+
const len0 = WASM_VECTOR_LEN;
|
|
2347
|
+
const ptr1 = passStringToWasm0(
|
|
2348
|
+
master_password,
|
|
2349
|
+
wasm.__wbindgen_malloc,
|
|
2350
|
+
wasm.__wbindgen_realloc,
|
|
2351
|
+
);
|
|
2352
|
+
const len1 = WASM_VECTOR_LEN;
|
|
2353
|
+
const ptr2 = passStringToWasm0(email, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
|
2354
|
+
const len2 = WASM_VECTOR_LEN;
|
|
2355
|
+
wasm.purecrypto_encrypt_user_key_with_master_password(
|
|
2356
|
+
retptr,
|
|
2357
|
+
ptr0,
|
|
2358
|
+
len0,
|
|
2359
|
+
ptr1,
|
|
2360
|
+
len1,
|
|
2361
|
+
ptr2,
|
|
2362
|
+
len2,
|
|
2363
|
+
addHeapObject(kdf),
|
|
2364
|
+
);
|
|
2365
|
+
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2366
|
+
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2367
|
+
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
2368
|
+
var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
|
|
2369
|
+
var ptr4 = r0;
|
|
2370
|
+
var len4 = r1;
|
|
2371
|
+
if (r3) {
|
|
2372
|
+
ptr4 = 0;
|
|
2373
|
+
len4 = 0;
|
|
2374
|
+
throw takeObject(r2);
|
|
2375
|
+
}
|
|
2376
|
+
deferred5_0 = ptr4;
|
|
2377
|
+
deferred5_1 = len4;
|
|
2378
|
+
return getStringFromWasm0(ptr4, len4);
|
|
2379
|
+
} finally {
|
|
2380
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2381
|
+
wasm.__wbindgen_free(deferred5_0, deferred5_1, 1);
|
|
2382
|
+
}
|
|
2383
|
+
}
|
|
2384
|
+
/**
|
|
2385
|
+
* @returns {Uint8Array}
|
|
2386
|
+
*/
|
|
2387
|
+
static generate_user_key_aes256_cbc_hmac() {
|
|
2388
|
+
try {
|
|
2389
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2390
|
+
wasm.purecrypto_generate_user_key_aes256_cbc_hmac(retptr);
|
|
2391
|
+
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2392
|
+
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2393
|
+
var v1 = getArrayU8FromWasm0(r0, r1).slice();
|
|
2394
|
+
wasm.__wbindgen_free(r0, r1 * 1, 1);
|
|
2395
|
+
return v1;
|
|
2396
|
+
} finally {
|
|
2397
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2398
|
+
}
|
|
2399
|
+
}
|
|
2400
|
+
/**
|
|
2401
|
+
* @returns {Uint8Array}
|
|
2402
|
+
*/
|
|
2403
|
+
static generate_user_key_xchacha20_poly1305() {
|
|
2404
|
+
try {
|
|
2405
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2406
|
+
wasm.purecrypto_generate_user_key_xchacha20_poly1305(retptr);
|
|
2407
|
+
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2408
|
+
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2409
|
+
var v1 = getArrayU8FromWasm0(r0, r1).slice();
|
|
2410
|
+
wasm.__wbindgen_free(r0, r1 * 1, 1);
|
|
2411
|
+
return v1;
|
|
2412
|
+
} finally {
|
|
2413
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2414
|
+
}
|
|
2415
|
+
}
|
|
2186
2416
|
}
|
|
2187
2417
|
|
|
2188
2418
|
const ReceiveErrorFinalization =
|
|
@@ -2697,7 +2927,7 @@ export function __wbg_new_23a2665fac83c611(arg0, arg1) {
|
|
|
2697
2927
|
const a = state0.a;
|
|
2698
2928
|
state0.a = 0;
|
|
2699
2929
|
try {
|
|
2700
|
-
return
|
|
2930
|
+
return __wbg_adapter_245(a, state0.b, arg0, arg1);
|
|
2701
2931
|
} finally {
|
|
2702
2932
|
state0.a = a;
|
|
2703
2933
|
}
|
|
@@ -3064,13 +3294,13 @@ export function __wbindgen_cb_drop(arg0) {
|
|
|
3064
3294
|
return ret;
|
|
3065
3295
|
}
|
|
3066
3296
|
|
|
3067
|
-
export function
|
|
3068
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
3297
|
+
export function __wbindgen_closure_wrapper3031(arg0, arg1, arg2) {
|
|
3298
|
+
const ret = makeMutClosure(arg0, arg1, 688, __wbg_adapter_50);
|
|
3069
3299
|
return addHeapObject(ret);
|
|
3070
3300
|
}
|
|
3071
3301
|
|
|
3072
|
-
export function
|
|
3073
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
3302
|
+
export function __wbindgen_closure_wrapper3424(arg0, arg1, arg2) {
|
|
3303
|
+
const ret = makeMutClosure(arg0, arg1, 810, __wbg_adapter_53);
|
|
3074
3304
|
return addHeapObject(ret);
|
|
3075
3305
|
}
|
|
3076
3306
|
|
|
Binary file
|
|
@@ -123,7 +123,14 @@ export const purecrypto_symmetric_decrypt: (
|
|
|
123
123
|
d: number,
|
|
124
124
|
e: number,
|
|
125
125
|
) => void;
|
|
126
|
-
export const
|
|
126
|
+
export const purecrypto_symmetric_decrypt_string: (
|
|
127
|
+
a: number,
|
|
128
|
+
b: number,
|
|
129
|
+
c: number,
|
|
130
|
+
d: number,
|
|
131
|
+
e: number,
|
|
132
|
+
) => void;
|
|
133
|
+
export const purecrypto_symmetric_decrypt_bytes: (
|
|
127
134
|
a: number,
|
|
128
135
|
b: number,
|
|
129
136
|
c: number,
|
|
@@ -137,20 +144,56 @@ export const purecrypto_symmetric_decrypt_array_buffer: (
|
|
|
137
144
|
d: number,
|
|
138
145
|
e: number,
|
|
139
146
|
) => void;
|
|
140
|
-
export const
|
|
147
|
+
export const purecrypto_symmetric_decrypt_filedata: (
|
|
148
|
+
a: number,
|
|
149
|
+
b: number,
|
|
150
|
+
c: number,
|
|
151
|
+
d: number,
|
|
152
|
+
e: number,
|
|
153
|
+
) => void;
|
|
154
|
+
export const purecrypto_symmetric_encrypt_string: (
|
|
155
|
+
a: number,
|
|
156
|
+
b: number,
|
|
157
|
+
c: number,
|
|
158
|
+
d: number,
|
|
159
|
+
e: number,
|
|
160
|
+
) => void;
|
|
161
|
+
export const purecrypto_symmetric_encrypt_bytes: (
|
|
141
162
|
a: number,
|
|
142
163
|
b: number,
|
|
143
164
|
c: number,
|
|
144
165
|
d: number,
|
|
145
166
|
e: number,
|
|
146
167
|
) => void;
|
|
147
|
-
export const
|
|
168
|
+
export const purecrypto_symmetric_encrypt_filedata: (
|
|
148
169
|
a: number,
|
|
149
170
|
b: number,
|
|
150
171
|
c: number,
|
|
151
172
|
d: number,
|
|
152
173
|
e: number,
|
|
153
174
|
) => void;
|
|
175
|
+
export const purecrypto_decrypt_user_key_with_master_password: (
|
|
176
|
+
a: number,
|
|
177
|
+
b: number,
|
|
178
|
+
c: number,
|
|
179
|
+
d: number,
|
|
180
|
+
e: number,
|
|
181
|
+
f: number,
|
|
182
|
+
g: number,
|
|
183
|
+
h: number,
|
|
184
|
+
) => void;
|
|
185
|
+
export const purecrypto_encrypt_user_key_with_master_password: (
|
|
186
|
+
a: number,
|
|
187
|
+
b: number,
|
|
188
|
+
c: number,
|
|
189
|
+
d: number,
|
|
190
|
+
e: number,
|
|
191
|
+
f: number,
|
|
192
|
+
g: number,
|
|
193
|
+
h: number,
|
|
194
|
+
) => void;
|
|
195
|
+
export const purecrypto_generate_user_key_aes256_cbc_hmac: (a: number) => void;
|
|
196
|
+
export const purecrypto_generate_user_key_xchacha20_poly1305: (a: number) => void;
|
|
154
197
|
export const generate_ssh_key: (a: number, b: number) => void;
|
|
155
198
|
export const import_ssh_key: (a: number, b: number, c: number, d: number, e: number) => void;
|
|
156
199
|
export const __wbg_attachmentsclient_free: (a: number, b: number) => void;
|
|
@@ -185,10 +228,10 @@ export const bitwardenclient_exporters: (a: number) => number;
|
|
|
185
228
|
export const vaultclient_ciphers: (a: number) => number;
|
|
186
229
|
export const vaultclient_folders: (a: number) => number;
|
|
187
230
|
export const __wbg_vaultclient_free: (a: number, b: number) => void;
|
|
188
|
-
export const __wbg_totpclient_free: (a: number, b: number) => void;
|
|
189
231
|
export const __wbg_foldersclient_free: (a: number, b: number) => void;
|
|
190
232
|
export const __wbg_cryptoclient_free: (a: number, b: number) => void;
|
|
191
233
|
export const __wbg_ciphersclient_free: (a: number, b: number) => void;
|
|
234
|
+
export const __wbg_totpclient_free: (a: number, b: number) => void;
|
|
192
235
|
export const __wbindgen_malloc: (a: number, b: number) => number;
|
|
193
236
|
export const __wbindgen_realloc: (a: number, b: number, c: number, d: number) => number;
|
|
194
237
|
export const __wbindgen_exn_store: (a: number) => void;
|