@bitwarden/sdk-internal 0.2.0-main.161 → 0.2.0-main.162
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/VERSION +1 -1
- package/bitwarden_wasm_internal.d.ts +30 -4
- package/bitwarden_wasm_internal_bg.js +242 -12
- package/bitwarden_wasm_internal_bg.wasm +0 -0
- package/bitwarden_wasm_internal_bg.wasm.d.ts +47 -4
- package/bitwarden_wasm_internal_bg.wasm.js +1 -1
- package/node/bitwarden_wasm_internal.d.ts +30 -4
- package/node/bitwarden_wasm_internal.js +242 -12
- package/node/bitwarden_wasm_internal_bg.wasm +0 -0
- package/node/bitwarden_wasm_internal_bg.wasm.d.ts +47 -4
- package/package.json +1 -1
|
@@ -304,7 +304,8 @@ export interface CryptoError extends Error {
|
|
|
304
304
|
| "ArgonError"
|
|
305
305
|
| "ZeroNumber"
|
|
306
306
|
| "OperationNotSupported"
|
|
307
|
-
| "WrongKeyType"
|
|
307
|
+
| "WrongKeyType"
|
|
308
|
+
| "InvalidNonceLength";
|
|
308
309
|
}
|
|
309
310
|
|
|
310
311
|
export function isCryptoError(error: any): error is CryptoError;
|
|
@@ -1227,11 +1228,36 @@ export class OutgoingMessage {
|
|
|
1227
1228
|
export class PureCrypto {
|
|
1228
1229
|
private constructor();
|
|
1229
1230
|
free(): void;
|
|
1231
|
+
/**
|
|
1232
|
+
* DEPRECATED: Use `symmetric_decrypt_string` instead.
|
|
1233
|
+
* Cleanup ticket: <https://bitwarden.atlassian.net/browse/PM-21247>
|
|
1234
|
+
*/
|
|
1230
1235
|
static symmetric_decrypt(enc_string: string, key: Uint8Array): string;
|
|
1231
|
-
static
|
|
1236
|
+
static symmetric_decrypt_string(enc_string: string, key: Uint8Array): string;
|
|
1237
|
+
static symmetric_decrypt_bytes(enc_string: string, key: Uint8Array): Uint8Array;
|
|
1238
|
+
/**
|
|
1239
|
+
* DEPRECATED: Use `symmetric_decrypt_filedata` instead.
|
|
1240
|
+
* Cleanup ticket: <https://bitwarden.atlassian.net/browse/PM-21247>
|
|
1241
|
+
*/
|
|
1232
1242
|
static symmetric_decrypt_array_buffer(enc_bytes: Uint8Array, key: Uint8Array): Uint8Array;
|
|
1233
|
-
static
|
|
1234
|
-
static
|
|
1243
|
+
static symmetric_decrypt_filedata(enc_bytes: Uint8Array, key: Uint8Array): Uint8Array;
|
|
1244
|
+
static symmetric_encrypt_string(plain: string, key: Uint8Array): string;
|
|
1245
|
+
static symmetric_encrypt_bytes(plain: Uint8Array, key: Uint8Array): string;
|
|
1246
|
+
static symmetric_encrypt_filedata(plain: Uint8Array, key: Uint8Array): Uint8Array;
|
|
1247
|
+
static decrypt_user_key_with_master_password(
|
|
1248
|
+
encrypted_user_key: string,
|
|
1249
|
+
master_password: string,
|
|
1250
|
+
email: string,
|
|
1251
|
+
kdf: Kdf,
|
|
1252
|
+
): Uint8Array;
|
|
1253
|
+
static encrypt_user_key_with_master_password(
|
|
1254
|
+
user_key: Uint8Array,
|
|
1255
|
+
master_password: string,
|
|
1256
|
+
email: string,
|
|
1257
|
+
kdf: Kdf,
|
|
1258
|
+
): string;
|
|
1259
|
+
static generate_user_key_aes256_cbc_hmac(): Uint8Array;
|
|
1260
|
+
static generate_user_key_xchacha20_poly1305(): Uint8Array;
|
|
1235
1261
|
}
|
|
1236
1262
|
export class ReceiveError {
|
|
1237
1263
|
private constructor();
|
|
@@ -607,7 +607,7 @@ function __wbg_adapter_53(arg0, arg1, arg2) {
|
|
|
607
607
|
);
|
|
608
608
|
}
|
|
609
609
|
|
|
610
|
-
function
|
|
610
|
+
function __wbg_adapter_245(arg0, arg1, arg2, arg3) {
|
|
611
611
|
wasm.wasm_bindgen__convert__closures__invoke2_mut__h2a33b0877ef96682(
|
|
612
612
|
arg0,
|
|
613
613
|
arg1,
|
|
@@ -2041,6 +2041,8 @@ class PureCrypto {
|
|
|
2041
2041
|
wasm.__wbg_purecrypto_free(ptr, 0);
|
|
2042
2042
|
}
|
|
2043
2043
|
/**
|
|
2044
|
+
* DEPRECATED: Use `symmetric_decrypt_string` instead.
|
|
2045
|
+
* Cleanup ticket: <https://bitwarden.atlassian.net/browse/PM-21247>
|
|
2044
2046
|
* @param {string} enc_string
|
|
2045
2047
|
* @param {Uint8Array} key
|
|
2046
2048
|
* @returns {string}
|
|
@@ -2074,19 +2076,53 @@ class PureCrypto {
|
|
|
2074
2076
|
wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);
|
|
2075
2077
|
}
|
|
2076
2078
|
}
|
|
2079
|
+
/**
|
|
2080
|
+
* @param {string} enc_string
|
|
2081
|
+
* @param {Uint8Array} key
|
|
2082
|
+
* @returns {string}
|
|
2083
|
+
*/
|
|
2084
|
+
static symmetric_decrypt_string(enc_string, key) {
|
|
2085
|
+
let deferred4_0;
|
|
2086
|
+
let deferred4_1;
|
|
2087
|
+
try {
|
|
2088
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2089
|
+
const ptr0 = passStringToWasm0(enc_string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
|
2090
|
+
const len0 = WASM_VECTOR_LEN;
|
|
2091
|
+
const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
|
|
2092
|
+
const len1 = WASM_VECTOR_LEN;
|
|
2093
|
+
wasm.purecrypto_symmetric_decrypt_string(retptr, ptr0, len0, ptr1, len1);
|
|
2094
|
+
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2095
|
+
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2096
|
+
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
2097
|
+
var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
|
|
2098
|
+
var ptr3 = r0;
|
|
2099
|
+
var len3 = r1;
|
|
2100
|
+
if (r3) {
|
|
2101
|
+
ptr3 = 0;
|
|
2102
|
+
len3 = 0;
|
|
2103
|
+
throw takeObject(r2);
|
|
2104
|
+
}
|
|
2105
|
+
deferred4_0 = ptr3;
|
|
2106
|
+
deferred4_1 = len3;
|
|
2107
|
+
return getStringFromWasm0(ptr3, len3);
|
|
2108
|
+
} finally {
|
|
2109
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2110
|
+
wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);
|
|
2111
|
+
}
|
|
2112
|
+
}
|
|
2077
2113
|
/**
|
|
2078
2114
|
* @param {string} enc_string
|
|
2079
2115
|
* @param {Uint8Array} key
|
|
2080
2116
|
* @returns {Uint8Array}
|
|
2081
2117
|
*/
|
|
2082
|
-
static
|
|
2118
|
+
static symmetric_decrypt_bytes(enc_string, key) {
|
|
2083
2119
|
try {
|
|
2084
2120
|
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2085
2121
|
const ptr0 = passStringToWasm0(enc_string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
|
2086
2122
|
const len0 = WASM_VECTOR_LEN;
|
|
2087
2123
|
const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
|
|
2088
2124
|
const len1 = WASM_VECTOR_LEN;
|
|
2089
|
-
wasm.
|
|
2125
|
+
wasm.purecrypto_symmetric_decrypt_bytes(retptr, ptr0, len0, ptr1, len1);
|
|
2090
2126
|
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2091
2127
|
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2092
2128
|
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
@@ -2102,6 +2138,8 @@ class PureCrypto {
|
|
|
2102
2138
|
}
|
|
2103
2139
|
}
|
|
2104
2140
|
/**
|
|
2141
|
+
* DEPRECATED: Use `symmetric_decrypt_filedata` instead.
|
|
2142
|
+
* Cleanup ticket: <https://bitwarden.atlassian.net/browse/PM-21247>
|
|
2105
2143
|
* @param {Uint8Array} enc_bytes
|
|
2106
2144
|
* @param {Uint8Array} key
|
|
2107
2145
|
* @returns {Uint8Array}
|
|
@@ -2128,12 +2166,39 @@ class PureCrypto {
|
|
|
2128
2166
|
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2129
2167
|
}
|
|
2130
2168
|
}
|
|
2169
|
+
/**
|
|
2170
|
+
* @param {Uint8Array} enc_bytes
|
|
2171
|
+
* @param {Uint8Array} key
|
|
2172
|
+
* @returns {Uint8Array}
|
|
2173
|
+
*/
|
|
2174
|
+
static symmetric_decrypt_filedata(enc_bytes, key) {
|
|
2175
|
+
try {
|
|
2176
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2177
|
+
const ptr0 = passArray8ToWasm0(enc_bytes, wasm.__wbindgen_malloc);
|
|
2178
|
+
const len0 = WASM_VECTOR_LEN;
|
|
2179
|
+
const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
|
|
2180
|
+
const len1 = WASM_VECTOR_LEN;
|
|
2181
|
+
wasm.purecrypto_symmetric_decrypt_filedata(retptr, ptr0, len0, ptr1, len1);
|
|
2182
|
+
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2183
|
+
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2184
|
+
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
2185
|
+
var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
|
|
2186
|
+
if (r3) {
|
|
2187
|
+
throw takeObject(r2);
|
|
2188
|
+
}
|
|
2189
|
+
var v3 = getArrayU8FromWasm0(r0, r1).slice();
|
|
2190
|
+
wasm.__wbindgen_free(r0, r1 * 1, 1);
|
|
2191
|
+
return v3;
|
|
2192
|
+
} finally {
|
|
2193
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2194
|
+
}
|
|
2195
|
+
}
|
|
2131
2196
|
/**
|
|
2132
2197
|
* @param {string} plain
|
|
2133
2198
|
* @param {Uint8Array} key
|
|
2134
2199
|
* @returns {string}
|
|
2135
2200
|
*/
|
|
2136
|
-
static
|
|
2201
|
+
static symmetric_encrypt_string(plain, key) {
|
|
2137
2202
|
let deferred4_0;
|
|
2138
2203
|
let deferred4_1;
|
|
2139
2204
|
try {
|
|
@@ -2142,7 +2207,41 @@ class PureCrypto {
|
|
|
2142
2207
|
const len0 = WASM_VECTOR_LEN;
|
|
2143
2208
|
const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
|
|
2144
2209
|
const len1 = WASM_VECTOR_LEN;
|
|
2145
|
-
wasm.
|
|
2210
|
+
wasm.purecrypto_symmetric_encrypt_string(retptr, ptr0, len0, ptr1, len1);
|
|
2211
|
+
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2212
|
+
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2213
|
+
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
2214
|
+
var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
|
|
2215
|
+
var ptr3 = r0;
|
|
2216
|
+
var len3 = r1;
|
|
2217
|
+
if (r3) {
|
|
2218
|
+
ptr3 = 0;
|
|
2219
|
+
len3 = 0;
|
|
2220
|
+
throw takeObject(r2);
|
|
2221
|
+
}
|
|
2222
|
+
deferred4_0 = ptr3;
|
|
2223
|
+
deferred4_1 = len3;
|
|
2224
|
+
return getStringFromWasm0(ptr3, len3);
|
|
2225
|
+
} finally {
|
|
2226
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2227
|
+
wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);
|
|
2228
|
+
}
|
|
2229
|
+
}
|
|
2230
|
+
/**
|
|
2231
|
+
* @param {Uint8Array} plain
|
|
2232
|
+
* @param {Uint8Array} key
|
|
2233
|
+
* @returns {string}
|
|
2234
|
+
*/
|
|
2235
|
+
static symmetric_encrypt_bytes(plain, key) {
|
|
2236
|
+
let deferred4_0;
|
|
2237
|
+
let deferred4_1;
|
|
2238
|
+
try {
|
|
2239
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2240
|
+
const ptr0 = passArray8ToWasm0(plain, wasm.__wbindgen_malloc);
|
|
2241
|
+
const len0 = WASM_VECTOR_LEN;
|
|
2242
|
+
const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
|
|
2243
|
+
const len1 = WASM_VECTOR_LEN;
|
|
2244
|
+
wasm.purecrypto_symmetric_encrypt_bytes(retptr, ptr0, len0, ptr1, len1);
|
|
2146
2245
|
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2147
2246
|
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2148
2247
|
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
@@ -2167,14 +2266,14 @@ class PureCrypto {
|
|
|
2167
2266
|
* @param {Uint8Array} key
|
|
2168
2267
|
* @returns {Uint8Array}
|
|
2169
2268
|
*/
|
|
2170
|
-
static
|
|
2269
|
+
static symmetric_encrypt_filedata(plain, key) {
|
|
2171
2270
|
try {
|
|
2172
2271
|
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2173
2272
|
const ptr0 = passArray8ToWasm0(plain, wasm.__wbindgen_malloc);
|
|
2174
2273
|
const len0 = WASM_VECTOR_LEN;
|
|
2175
2274
|
const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
|
|
2176
2275
|
const len1 = WASM_VECTOR_LEN;
|
|
2177
|
-
wasm.
|
|
2276
|
+
wasm.purecrypto_symmetric_encrypt_filedata(retptr, ptr0, len0, ptr1, len1);
|
|
2178
2277
|
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2179
2278
|
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2180
2279
|
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
@@ -2189,6 +2288,137 @@ class PureCrypto {
|
|
|
2189
2288
|
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2190
2289
|
}
|
|
2191
2290
|
}
|
|
2291
|
+
/**
|
|
2292
|
+
* @param {string} encrypted_user_key
|
|
2293
|
+
* @param {string} master_password
|
|
2294
|
+
* @param {string} email
|
|
2295
|
+
* @param {Kdf} kdf
|
|
2296
|
+
* @returns {Uint8Array}
|
|
2297
|
+
*/
|
|
2298
|
+
static decrypt_user_key_with_master_password(encrypted_user_key, master_password, email, kdf) {
|
|
2299
|
+
try {
|
|
2300
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2301
|
+
const ptr0 = passStringToWasm0(
|
|
2302
|
+
encrypted_user_key,
|
|
2303
|
+
wasm.__wbindgen_malloc,
|
|
2304
|
+
wasm.__wbindgen_realloc,
|
|
2305
|
+
);
|
|
2306
|
+
const len0 = WASM_VECTOR_LEN;
|
|
2307
|
+
const ptr1 = passStringToWasm0(
|
|
2308
|
+
master_password,
|
|
2309
|
+
wasm.__wbindgen_malloc,
|
|
2310
|
+
wasm.__wbindgen_realloc,
|
|
2311
|
+
);
|
|
2312
|
+
const len1 = WASM_VECTOR_LEN;
|
|
2313
|
+
const ptr2 = passStringToWasm0(email, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
|
2314
|
+
const len2 = WASM_VECTOR_LEN;
|
|
2315
|
+
wasm.purecrypto_decrypt_user_key_with_master_password(
|
|
2316
|
+
retptr,
|
|
2317
|
+
ptr0,
|
|
2318
|
+
len0,
|
|
2319
|
+
ptr1,
|
|
2320
|
+
len1,
|
|
2321
|
+
ptr2,
|
|
2322
|
+
len2,
|
|
2323
|
+
addHeapObject(kdf),
|
|
2324
|
+
);
|
|
2325
|
+
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2326
|
+
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2327
|
+
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
2328
|
+
var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
|
|
2329
|
+
if (r3) {
|
|
2330
|
+
throw takeObject(r2);
|
|
2331
|
+
}
|
|
2332
|
+
var v4 = getArrayU8FromWasm0(r0, r1).slice();
|
|
2333
|
+
wasm.__wbindgen_free(r0, r1 * 1, 1);
|
|
2334
|
+
return v4;
|
|
2335
|
+
} finally {
|
|
2336
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2337
|
+
}
|
|
2338
|
+
}
|
|
2339
|
+
/**
|
|
2340
|
+
* @param {Uint8Array} user_key
|
|
2341
|
+
* @param {string} master_password
|
|
2342
|
+
* @param {string} email
|
|
2343
|
+
* @param {Kdf} kdf
|
|
2344
|
+
* @returns {string}
|
|
2345
|
+
*/
|
|
2346
|
+
static encrypt_user_key_with_master_password(user_key, master_password, email, kdf) {
|
|
2347
|
+
let deferred5_0;
|
|
2348
|
+
let deferred5_1;
|
|
2349
|
+
try {
|
|
2350
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2351
|
+
const ptr0 = passArray8ToWasm0(user_key, wasm.__wbindgen_malloc);
|
|
2352
|
+
const len0 = WASM_VECTOR_LEN;
|
|
2353
|
+
const ptr1 = passStringToWasm0(
|
|
2354
|
+
master_password,
|
|
2355
|
+
wasm.__wbindgen_malloc,
|
|
2356
|
+
wasm.__wbindgen_realloc,
|
|
2357
|
+
);
|
|
2358
|
+
const len1 = WASM_VECTOR_LEN;
|
|
2359
|
+
const ptr2 = passStringToWasm0(email, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
|
2360
|
+
const len2 = WASM_VECTOR_LEN;
|
|
2361
|
+
wasm.purecrypto_encrypt_user_key_with_master_password(
|
|
2362
|
+
retptr,
|
|
2363
|
+
ptr0,
|
|
2364
|
+
len0,
|
|
2365
|
+
ptr1,
|
|
2366
|
+
len1,
|
|
2367
|
+
ptr2,
|
|
2368
|
+
len2,
|
|
2369
|
+
addHeapObject(kdf),
|
|
2370
|
+
);
|
|
2371
|
+
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2372
|
+
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2373
|
+
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
2374
|
+
var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
|
|
2375
|
+
var ptr4 = r0;
|
|
2376
|
+
var len4 = r1;
|
|
2377
|
+
if (r3) {
|
|
2378
|
+
ptr4 = 0;
|
|
2379
|
+
len4 = 0;
|
|
2380
|
+
throw takeObject(r2);
|
|
2381
|
+
}
|
|
2382
|
+
deferred5_0 = ptr4;
|
|
2383
|
+
deferred5_1 = len4;
|
|
2384
|
+
return getStringFromWasm0(ptr4, len4);
|
|
2385
|
+
} finally {
|
|
2386
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2387
|
+
wasm.__wbindgen_free(deferred5_0, deferred5_1, 1);
|
|
2388
|
+
}
|
|
2389
|
+
}
|
|
2390
|
+
/**
|
|
2391
|
+
* @returns {Uint8Array}
|
|
2392
|
+
*/
|
|
2393
|
+
static generate_user_key_aes256_cbc_hmac() {
|
|
2394
|
+
try {
|
|
2395
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2396
|
+
wasm.purecrypto_generate_user_key_aes256_cbc_hmac(retptr);
|
|
2397
|
+
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2398
|
+
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2399
|
+
var v1 = getArrayU8FromWasm0(r0, r1).slice();
|
|
2400
|
+
wasm.__wbindgen_free(r0, r1 * 1, 1);
|
|
2401
|
+
return v1;
|
|
2402
|
+
} finally {
|
|
2403
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2404
|
+
}
|
|
2405
|
+
}
|
|
2406
|
+
/**
|
|
2407
|
+
* @returns {Uint8Array}
|
|
2408
|
+
*/
|
|
2409
|
+
static generate_user_key_xchacha20_poly1305() {
|
|
2410
|
+
try {
|
|
2411
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2412
|
+
wasm.purecrypto_generate_user_key_xchacha20_poly1305(retptr);
|
|
2413
|
+
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2414
|
+
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2415
|
+
var v1 = getArrayU8FromWasm0(r0, r1).slice();
|
|
2416
|
+
wasm.__wbindgen_free(r0, r1 * 1, 1);
|
|
2417
|
+
return v1;
|
|
2418
|
+
} finally {
|
|
2419
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2420
|
+
}
|
|
2421
|
+
}
|
|
2192
2422
|
}
|
|
2193
2423
|
module.exports.PureCrypto = PureCrypto;
|
|
2194
2424
|
|
|
@@ -2708,7 +2938,7 @@ module.exports.__wbg_new_23a2665fac83c611 = function (arg0, arg1) {
|
|
|
2708
2938
|
const a = state0.a;
|
|
2709
2939
|
state0.a = 0;
|
|
2710
2940
|
try {
|
|
2711
|
-
return
|
|
2941
|
+
return __wbg_adapter_245(a, state0.b, arg0, arg1);
|
|
2712
2942
|
} finally {
|
|
2713
2943
|
state0.a = a;
|
|
2714
2944
|
}
|
|
@@ -3075,13 +3305,13 @@ module.exports.__wbindgen_cb_drop = function (arg0) {
|
|
|
3075
3305
|
return ret;
|
|
3076
3306
|
};
|
|
3077
3307
|
|
|
3078
|
-
module.exports.
|
|
3079
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
3308
|
+
module.exports.__wbindgen_closure_wrapper3031 = function (arg0, arg1, arg2) {
|
|
3309
|
+
const ret = makeMutClosure(arg0, arg1, 688, __wbg_adapter_50);
|
|
3080
3310
|
return addHeapObject(ret);
|
|
3081
3311
|
};
|
|
3082
3312
|
|
|
3083
|
-
module.exports.
|
|
3084
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
3313
|
+
module.exports.__wbindgen_closure_wrapper3424 = function (arg0, arg1, arg2) {
|
|
3314
|
+
const ret = makeMutClosure(arg0, arg1, 810, __wbg_adapter_53);
|
|
3085
3315
|
return addHeapObject(ret);
|
|
3086
3316
|
};
|
|
3087
3317
|
|
|
Binary file
|
|
@@ -123,7 +123,14 @@ export const purecrypto_symmetric_decrypt: (
|
|
|
123
123
|
d: number,
|
|
124
124
|
e: number,
|
|
125
125
|
) => void;
|
|
126
|
-
export const
|
|
126
|
+
export const purecrypto_symmetric_decrypt_string: (
|
|
127
|
+
a: number,
|
|
128
|
+
b: number,
|
|
129
|
+
c: number,
|
|
130
|
+
d: number,
|
|
131
|
+
e: number,
|
|
132
|
+
) => void;
|
|
133
|
+
export const purecrypto_symmetric_decrypt_bytes: (
|
|
127
134
|
a: number,
|
|
128
135
|
b: number,
|
|
129
136
|
c: number,
|
|
@@ -137,20 +144,56 @@ export const purecrypto_symmetric_decrypt_array_buffer: (
|
|
|
137
144
|
d: number,
|
|
138
145
|
e: number,
|
|
139
146
|
) => void;
|
|
140
|
-
export const
|
|
147
|
+
export const purecrypto_symmetric_decrypt_filedata: (
|
|
148
|
+
a: number,
|
|
149
|
+
b: number,
|
|
150
|
+
c: number,
|
|
151
|
+
d: number,
|
|
152
|
+
e: number,
|
|
153
|
+
) => void;
|
|
154
|
+
export const purecrypto_symmetric_encrypt_string: (
|
|
155
|
+
a: number,
|
|
156
|
+
b: number,
|
|
157
|
+
c: number,
|
|
158
|
+
d: number,
|
|
159
|
+
e: number,
|
|
160
|
+
) => void;
|
|
161
|
+
export const purecrypto_symmetric_encrypt_bytes: (
|
|
141
162
|
a: number,
|
|
142
163
|
b: number,
|
|
143
164
|
c: number,
|
|
144
165
|
d: number,
|
|
145
166
|
e: number,
|
|
146
167
|
) => void;
|
|
147
|
-
export const
|
|
168
|
+
export const purecrypto_symmetric_encrypt_filedata: (
|
|
148
169
|
a: number,
|
|
149
170
|
b: number,
|
|
150
171
|
c: number,
|
|
151
172
|
d: number,
|
|
152
173
|
e: number,
|
|
153
174
|
) => void;
|
|
175
|
+
export const purecrypto_decrypt_user_key_with_master_password: (
|
|
176
|
+
a: number,
|
|
177
|
+
b: number,
|
|
178
|
+
c: number,
|
|
179
|
+
d: number,
|
|
180
|
+
e: number,
|
|
181
|
+
f: number,
|
|
182
|
+
g: number,
|
|
183
|
+
h: number,
|
|
184
|
+
) => void;
|
|
185
|
+
export const purecrypto_encrypt_user_key_with_master_password: (
|
|
186
|
+
a: number,
|
|
187
|
+
b: number,
|
|
188
|
+
c: number,
|
|
189
|
+
d: number,
|
|
190
|
+
e: number,
|
|
191
|
+
f: number,
|
|
192
|
+
g: number,
|
|
193
|
+
h: number,
|
|
194
|
+
) => void;
|
|
195
|
+
export const purecrypto_generate_user_key_aes256_cbc_hmac: (a: number) => void;
|
|
196
|
+
export const purecrypto_generate_user_key_xchacha20_poly1305: (a: number) => void;
|
|
154
197
|
export const generate_ssh_key: (a: number, b: number) => void;
|
|
155
198
|
export const import_ssh_key: (a: number, b: number, c: number, d: number, e: number) => void;
|
|
156
199
|
export const __wbg_attachmentsclient_free: (a: number, b: number) => void;
|
|
@@ -185,10 +228,10 @@ export const bitwardenclient_exporters: (a: number) => number;
|
|
|
185
228
|
export const vaultclient_ciphers: (a: number) => number;
|
|
186
229
|
export const vaultclient_folders: (a: number) => number;
|
|
187
230
|
export const __wbg_vaultclient_free: (a: number, b: number) => void;
|
|
188
|
-
export const __wbg_totpclient_free: (a: number, b: number) => void;
|
|
189
231
|
export const __wbg_foldersclient_free: (a: number, b: number) => void;
|
|
190
232
|
export const __wbg_cryptoclient_free: (a: number, b: number) => void;
|
|
191
233
|
export const __wbg_ciphersclient_free: (a: number, b: number) => void;
|
|
234
|
+
export const __wbg_totpclient_free: (a: number, b: number) => void;
|
|
192
235
|
export const __wbindgen_malloc: (a: number, b: number) => number;
|
|
193
236
|
export const __wbindgen_realloc: (a: number, b: number, c: number, d: number) => number;
|
|
194
237
|
export const __wbindgen_exn_store: (a: number) => void;
|