@bitwarden/sdk-internal 0.2.0-main.161 → 0.2.0-main.163

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/VERSION CHANGED
@@ -1 +1 @@
1
- b185bc6e7ec090c68ecd8c130c2772f567890192
1
+ 90c331a251bedfcade5ed03f45656f3506453ab4
@@ -304,7 +304,8 @@ export interface CryptoError extends Error {
304
304
  | "ArgonError"
305
305
  | "ZeroNumber"
306
306
  | "OperationNotSupported"
307
- | "WrongKeyType";
307
+ | "WrongKeyType"
308
+ | "InvalidNonceLength";
308
309
  }
309
310
 
310
311
  export function isCryptoError(error: any): error is CryptoError;
@@ -1227,11 +1228,36 @@ export class OutgoingMessage {
1227
1228
  export class PureCrypto {
1228
1229
  private constructor();
1229
1230
  free(): void;
1231
+ /**
1232
+ * DEPRECATED: Use `symmetric_decrypt_string` instead.
1233
+ * Cleanup ticket: <https://bitwarden.atlassian.net/browse/PM-21247>
1234
+ */
1230
1235
  static symmetric_decrypt(enc_string: string, key: Uint8Array): string;
1231
- static symmetric_decrypt_to_bytes(enc_string: string, key: Uint8Array): Uint8Array;
1236
+ static symmetric_decrypt_string(enc_string: string, key: Uint8Array): string;
1237
+ static symmetric_decrypt_bytes(enc_string: string, key: Uint8Array): Uint8Array;
1238
+ /**
1239
+ * DEPRECATED: Use `symmetric_decrypt_filedata` instead.
1240
+ * Cleanup ticket: <https://bitwarden.atlassian.net/browse/PM-21247>
1241
+ */
1232
1242
  static symmetric_decrypt_array_buffer(enc_bytes: Uint8Array, key: Uint8Array): Uint8Array;
1233
- static symmetric_encrypt(plain: string, key: Uint8Array): string;
1234
- static symmetric_encrypt_to_array_buffer(plain: Uint8Array, key: Uint8Array): Uint8Array;
1243
+ static symmetric_decrypt_filedata(enc_bytes: Uint8Array, key: Uint8Array): Uint8Array;
1244
+ static symmetric_encrypt_string(plain: string, key: Uint8Array): string;
1245
+ static symmetric_encrypt_bytes(plain: Uint8Array, key: Uint8Array): string;
1246
+ static symmetric_encrypt_filedata(plain: Uint8Array, key: Uint8Array): Uint8Array;
1247
+ static decrypt_user_key_with_master_password(
1248
+ encrypted_user_key: string,
1249
+ master_password: string,
1250
+ email: string,
1251
+ kdf: Kdf,
1252
+ ): Uint8Array;
1253
+ static encrypt_user_key_with_master_password(
1254
+ user_key: Uint8Array,
1255
+ master_password: string,
1256
+ email: string,
1257
+ kdf: Kdf,
1258
+ ): string;
1259
+ static generate_user_key_aes256_cbc_hmac(): Uint8Array;
1260
+ static generate_user_key_xchacha20_poly1305(): Uint8Array;
1235
1261
  }
1236
1262
  export class ReceiveError {
1237
1263
  private constructor();
@@ -613,7 +613,7 @@ function __wbg_adapter_53(arg0, arg1, arg2) {
613
613
  );
614
614
  }
615
615
 
616
- function __wbg_adapter_238(arg0, arg1, arg2, arg3) {
616
+ function __wbg_adapter_245(arg0, arg1, arg2, arg3) {
617
617
  wasm.wasm_bindgen__convert__closures__invoke2_mut__h2a33b0877ef96682(
618
618
  arg0,
619
619
  arg1,
@@ -2035,6 +2035,8 @@ export class PureCrypto {
2035
2035
  wasm.__wbg_purecrypto_free(ptr, 0);
2036
2036
  }
2037
2037
  /**
2038
+ * DEPRECATED: Use `symmetric_decrypt_string` instead.
2039
+ * Cleanup ticket: <https://bitwarden.atlassian.net/browse/PM-21247>
2038
2040
  * @param {string} enc_string
2039
2041
  * @param {Uint8Array} key
2040
2042
  * @returns {string}
@@ -2068,19 +2070,53 @@ export class PureCrypto {
2068
2070
  wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);
2069
2071
  }
2070
2072
  }
2073
+ /**
2074
+ * @param {string} enc_string
2075
+ * @param {Uint8Array} key
2076
+ * @returns {string}
2077
+ */
2078
+ static symmetric_decrypt_string(enc_string, key) {
2079
+ let deferred4_0;
2080
+ let deferred4_1;
2081
+ try {
2082
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2083
+ const ptr0 = passStringToWasm0(enc_string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
2084
+ const len0 = WASM_VECTOR_LEN;
2085
+ const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
2086
+ const len1 = WASM_VECTOR_LEN;
2087
+ wasm.purecrypto_symmetric_decrypt_string(retptr, ptr0, len0, ptr1, len1);
2088
+ var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2089
+ var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2090
+ var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
2091
+ var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
2092
+ var ptr3 = r0;
2093
+ var len3 = r1;
2094
+ if (r3) {
2095
+ ptr3 = 0;
2096
+ len3 = 0;
2097
+ throw takeObject(r2);
2098
+ }
2099
+ deferred4_0 = ptr3;
2100
+ deferred4_1 = len3;
2101
+ return getStringFromWasm0(ptr3, len3);
2102
+ } finally {
2103
+ wasm.__wbindgen_add_to_stack_pointer(16);
2104
+ wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);
2105
+ }
2106
+ }
2071
2107
  /**
2072
2108
  * @param {string} enc_string
2073
2109
  * @param {Uint8Array} key
2074
2110
  * @returns {Uint8Array}
2075
2111
  */
2076
- static symmetric_decrypt_to_bytes(enc_string, key) {
2112
+ static symmetric_decrypt_bytes(enc_string, key) {
2077
2113
  try {
2078
2114
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2079
2115
  const ptr0 = passStringToWasm0(enc_string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
2080
2116
  const len0 = WASM_VECTOR_LEN;
2081
2117
  const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
2082
2118
  const len1 = WASM_VECTOR_LEN;
2083
- wasm.purecrypto_symmetric_decrypt_to_bytes(retptr, ptr0, len0, ptr1, len1);
2119
+ wasm.purecrypto_symmetric_decrypt_bytes(retptr, ptr0, len0, ptr1, len1);
2084
2120
  var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2085
2121
  var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2086
2122
  var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
@@ -2096,6 +2132,8 @@ export class PureCrypto {
2096
2132
  }
2097
2133
  }
2098
2134
  /**
2135
+ * DEPRECATED: Use `symmetric_decrypt_filedata` instead.
2136
+ * Cleanup ticket: <https://bitwarden.atlassian.net/browse/PM-21247>
2099
2137
  * @param {Uint8Array} enc_bytes
2100
2138
  * @param {Uint8Array} key
2101
2139
  * @returns {Uint8Array}
@@ -2122,12 +2160,39 @@ export class PureCrypto {
2122
2160
  wasm.__wbindgen_add_to_stack_pointer(16);
2123
2161
  }
2124
2162
  }
2163
+ /**
2164
+ * @param {Uint8Array} enc_bytes
2165
+ * @param {Uint8Array} key
2166
+ * @returns {Uint8Array}
2167
+ */
2168
+ static symmetric_decrypt_filedata(enc_bytes, key) {
2169
+ try {
2170
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2171
+ const ptr0 = passArray8ToWasm0(enc_bytes, wasm.__wbindgen_malloc);
2172
+ const len0 = WASM_VECTOR_LEN;
2173
+ const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
2174
+ const len1 = WASM_VECTOR_LEN;
2175
+ wasm.purecrypto_symmetric_decrypt_filedata(retptr, ptr0, len0, ptr1, len1);
2176
+ var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2177
+ var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2178
+ var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
2179
+ var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
2180
+ if (r3) {
2181
+ throw takeObject(r2);
2182
+ }
2183
+ var v3 = getArrayU8FromWasm0(r0, r1).slice();
2184
+ wasm.__wbindgen_free(r0, r1 * 1, 1);
2185
+ return v3;
2186
+ } finally {
2187
+ wasm.__wbindgen_add_to_stack_pointer(16);
2188
+ }
2189
+ }
2125
2190
  /**
2126
2191
  * @param {string} plain
2127
2192
  * @param {Uint8Array} key
2128
2193
  * @returns {string}
2129
2194
  */
2130
- static symmetric_encrypt(plain, key) {
2195
+ static symmetric_encrypt_string(plain, key) {
2131
2196
  let deferred4_0;
2132
2197
  let deferred4_1;
2133
2198
  try {
@@ -2136,7 +2201,41 @@ export class PureCrypto {
2136
2201
  const len0 = WASM_VECTOR_LEN;
2137
2202
  const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
2138
2203
  const len1 = WASM_VECTOR_LEN;
2139
- wasm.purecrypto_symmetric_encrypt(retptr, ptr0, len0, ptr1, len1);
2204
+ wasm.purecrypto_symmetric_encrypt_string(retptr, ptr0, len0, ptr1, len1);
2205
+ var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2206
+ var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2207
+ var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
2208
+ var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
2209
+ var ptr3 = r0;
2210
+ var len3 = r1;
2211
+ if (r3) {
2212
+ ptr3 = 0;
2213
+ len3 = 0;
2214
+ throw takeObject(r2);
2215
+ }
2216
+ deferred4_0 = ptr3;
2217
+ deferred4_1 = len3;
2218
+ return getStringFromWasm0(ptr3, len3);
2219
+ } finally {
2220
+ wasm.__wbindgen_add_to_stack_pointer(16);
2221
+ wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);
2222
+ }
2223
+ }
2224
+ /**
2225
+ * @param {Uint8Array} plain
2226
+ * @param {Uint8Array} key
2227
+ * @returns {string}
2228
+ */
2229
+ static symmetric_encrypt_bytes(plain, key) {
2230
+ let deferred4_0;
2231
+ let deferred4_1;
2232
+ try {
2233
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2234
+ const ptr0 = passArray8ToWasm0(plain, wasm.__wbindgen_malloc);
2235
+ const len0 = WASM_VECTOR_LEN;
2236
+ const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
2237
+ const len1 = WASM_VECTOR_LEN;
2238
+ wasm.purecrypto_symmetric_encrypt_bytes(retptr, ptr0, len0, ptr1, len1);
2140
2239
  var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2141
2240
  var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2142
2241
  var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
@@ -2161,14 +2260,14 @@ export class PureCrypto {
2161
2260
  * @param {Uint8Array} key
2162
2261
  * @returns {Uint8Array}
2163
2262
  */
2164
- static symmetric_encrypt_to_array_buffer(plain, key) {
2263
+ static symmetric_encrypt_filedata(plain, key) {
2165
2264
  try {
2166
2265
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2167
2266
  const ptr0 = passArray8ToWasm0(plain, wasm.__wbindgen_malloc);
2168
2267
  const len0 = WASM_VECTOR_LEN;
2169
2268
  const ptr1 = passArray8ToWasm0(key, wasm.__wbindgen_malloc);
2170
2269
  const len1 = WASM_VECTOR_LEN;
2171
- wasm.purecrypto_symmetric_encrypt_to_array_buffer(retptr, ptr0, len0, ptr1, len1);
2270
+ wasm.purecrypto_symmetric_encrypt_filedata(retptr, ptr0, len0, ptr1, len1);
2172
2271
  var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2173
2272
  var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2174
2273
  var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
@@ -2183,6 +2282,137 @@ export class PureCrypto {
2183
2282
  wasm.__wbindgen_add_to_stack_pointer(16);
2184
2283
  }
2185
2284
  }
2285
+ /**
2286
+ * @param {string} encrypted_user_key
2287
+ * @param {string} master_password
2288
+ * @param {string} email
2289
+ * @param {Kdf} kdf
2290
+ * @returns {Uint8Array}
2291
+ */
2292
+ static decrypt_user_key_with_master_password(encrypted_user_key, master_password, email, kdf) {
2293
+ try {
2294
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2295
+ const ptr0 = passStringToWasm0(
2296
+ encrypted_user_key,
2297
+ wasm.__wbindgen_malloc,
2298
+ wasm.__wbindgen_realloc,
2299
+ );
2300
+ const len0 = WASM_VECTOR_LEN;
2301
+ const ptr1 = passStringToWasm0(
2302
+ master_password,
2303
+ wasm.__wbindgen_malloc,
2304
+ wasm.__wbindgen_realloc,
2305
+ );
2306
+ const len1 = WASM_VECTOR_LEN;
2307
+ const ptr2 = passStringToWasm0(email, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
2308
+ const len2 = WASM_VECTOR_LEN;
2309
+ wasm.purecrypto_decrypt_user_key_with_master_password(
2310
+ retptr,
2311
+ ptr0,
2312
+ len0,
2313
+ ptr1,
2314
+ len1,
2315
+ ptr2,
2316
+ len2,
2317
+ addHeapObject(kdf),
2318
+ );
2319
+ var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2320
+ var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2321
+ var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
2322
+ var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
2323
+ if (r3) {
2324
+ throw takeObject(r2);
2325
+ }
2326
+ var v4 = getArrayU8FromWasm0(r0, r1).slice();
2327
+ wasm.__wbindgen_free(r0, r1 * 1, 1);
2328
+ return v4;
2329
+ } finally {
2330
+ wasm.__wbindgen_add_to_stack_pointer(16);
2331
+ }
2332
+ }
2333
+ /**
2334
+ * @param {Uint8Array} user_key
2335
+ * @param {string} master_password
2336
+ * @param {string} email
2337
+ * @param {Kdf} kdf
2338
+ * @returns {string}
2339
+ */
2340
+ static encrypt_user_key_with_master_password(user_key, master_password, email, kdf) {
2341
+ let deferred5_0;
2342
+ let deferred5_1;
2343
+ try {
2344
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2345
+ const ptr0 = passArray8ToWasm0(user_key, wasm.__wbindgen_malloc);
2346
+ const len0 = WASM_VECTOR_LEN;
2347
+ const ptr1 = passStringToWasm0(
2348
+ master_password,
2349
+ wasm.__wbindgen_malloc,
2350
+ wasm.__wbindgen_realloc,
2351
+ );
2352
+ const len1 = WASM_VECTOR_LEN;
2353
+ const ptr2 = passStringToWasm0(email, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
2354
+ const len2 = WASM_VECTOR_LEN;
2355
+ wasm.purecrypto_encrypt_user_key_with_master_password(
2356
+ retptr,
2357
+ ptr0,
2358
+ len0,
2359
+ ptr1,
2360
+ len1,
2361
+ ptr2,
2362
+ len2,
2363
+ addHeapObject(kdf),
2364
+ );
2365
+ var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2366
+ var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2367
+ var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
2368
+ var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
2369
+ var ptr4 = r0;
2370
+ var len4 = r1;
2371
+ if (r3) {
2372
+ ptr4 = 0;
2373
+ len4 = 0;
2374
+ throw takeObject(r2);
2375
+ }
2376
+ deferred5_0 = ptr4;
2377
+ deferred5_1 = len4;
2378
+ return getStringFromWasm0(ptr4, len4);
2379
+ } finally {
2380
+ wasm.__wbindgen_add_to_stack_pointer(16);
2381
+ wasm.__wbindgen_free(deferred5_0, deferred5_1, 1);
2382
+ }
2383
+ }
2384
+ /**
2385
+ * @returns {Uint8Array}
2386
+ */
2387
+ static generate_user_key_aes256_cbc_hmac() {
2388
+ try {
2389
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2390
+ wasm.purecrypto_generate_user_key_aes256_cbc_hmac(retptr);
2391
+ var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2392
+ var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2393
+ var v1 = getArrayU8FromWasm0(r0, r1).slice();
2394
+ wasm.__wbindgen_free(r0, r1 * 1, 1);
2395
+ return v1;
2396
+ } finally {
2397
+ wasm.__wbindgen_add_to_stack_pointer(16);
2398
+ }
2399
+ }
2400
+ /**
2401
+ * @returns {Uint8Array}
2402
+ */
2403
+ static generate_user_key_xchacha20_poly1305() {
2404
+ try {
2405
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
2406
+ wasm.purecrypto_generate_user_key_xchacha20_poly1305(retptr);
2407
+ var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2408
+ var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2409
+ var v1 = getArrayU8FromWasm0(r0, r1).slice();
2410
+ wasm.__wbindgen_free(r0, r1 * 1, 1);
2411
+ return v1;
2412
+ } finally {
2413
+ wasm.__wbindgen_add_to_stack_pointer(16);
2414
+ }
2415
+ }
2186
2416
  }
2187
2417
 
2188
2418
  const ReceiveErrorFinalization =
@@ -2697,7 +2927,7 @@ export function __wbg_new_23a2665fac83c611(arg0, arg1) {
2697
2927
  const a = state0.a;
2698
2928
  state0.a = 0;
2699
2929
  try {
2700
- return __wbg_adapter_238(a, state0.b, arg0, arg1);
2930
+ return __wbg_adapter_245(a, state0.b, arg0, arg1);
2701
2931
  } finally {
2702
2932
  state0.a = a;
2703
2933
  }
@@ -3064,13 +3294,13 @@ export function __wbindgen_cb_drop(arg0) {
3064
3294
  return ret;
3065
3295
  }
3066
3296
 
3067
- export function __wbindgen_closure_wrapper2889(arg0, arg1, arg2) {
3068
- const ret = makeMutClosure(arg0, arg1, 669, __wbg_adapter_50);
3297
+ export function __wbindgen_closure_wrapper3031(arg0, arg1, arg2) {
3298
+ const ret = makeMutClosure(arg0, arg1, 688, __wbg_adapter_50);
3069
3299
  return addHeapObject(ret);
3070
3300
  }
3071
3301
 
3072
- export function __wbindgen_closure_wrapper3282(arg0, arg1, arg2) {
3073
- const ret = makeMutClosure(arg0, arg1, 791, __wbg_adapter_53);
3302
+ export function __wbindgen_closure_wrapper3424(arg0, arg1, arg2) {
3303
+ const ret = makeMutClosure(arg0, arg1, 810, __wbg_adapter_53);
3074
3304
  return addHeapObject(ret);
3075
3305
  }
3076
3306
 
Binary file
@@ -123,7 +123,14 @@ export const purecrypto_symmetric_decrypt: (
123
123
  d: number,
124
124
  e: number,
125
125
  ) => void;
126
- export const purecrypto_symmetric_decrypt_to_bytes: (
126
+ export const purecrypto_symmetric_decrypt_string: (
127
+ a: number,
128
+ b: number,
129
+ c: number,
130
+ d: number,
131
+ e: number,
132
+ ) => void;
133
+ export const purecrypto_symmetric_decrypt_bytes: (
127
134
  a: number,
128
135
  b: number,
129
136
  c: number,
@@ -137,20 +144,56 @@ export const purecrypto_symmetric_decrypt_array_buffer: (
137
144
  d: number,
138
145
  e: number,
139
146
  ) => void;
140
- export const purecrypto_symmetric_encrypt: (
147
+ export const purecrypto_symmetric_decrypt_filedata: (
148
+ a: number,
149
+ b: number,
150
+ c: number,
151
+ d: number,
152
+ e: number,
153
+ ) => void;
154
+ export const purecrypto_symmetric_encrypt_string: (
155
+ a: number,
156
+ b: number,
157
+ c: number,
158
+ d: number,
159
+ e: number,
160
+ ) => void;
161
+ export const purecrypto_symmetric_encrypt_bytes: (
141
162
  a: number,
142
163
  b: number,
143
164
  c: number,
144
165
  d: number,
145
166
  e: number,
146
167
  ) => void;
147
- export const purecrypto_symmetric_encrypt_to_array_buffer: (
168
+ export const purecrypto_symmetric_encrypt_filedata: (
148
169
  a: number,
149
170
  b: number,
150
171
  c: number,
151
172
  d: number,
152
173
  e: number,
153
174
  ) => void;
175
+ export const purecrypto_decrypt_user_key_with_master_password: (
176
+ a: number,
177
+ b: number,
178
+ c: number,
179
+ d: number,
180
+ e: number,
181
+ f: number,
182
+ g: number,
183
+ h: number,
184
+ ) => void;
185
+ export const purecrypto_encrypt_user_key_with_master_password: (
186
+ a: number,
187
+ b: number,
188
+ c: number,
189
+ d: number,
190
+ e: number,
191
+ f: number,
192
+ g: number,
193
+ h: number,
194
+ ) => void;
195
+ export const purecrypto_generate_user_key_aes256_cbc_hmac: (a: number) => void;
196
+ export const purecrypto_generate_user_key_xchacha20_poly1305: (a: number) => void;
154
197
  export const generate_ssh_key: (a: number, b: number) => void;
155
198
  export const import_ssh_key: (a: number, b: number, c: number, d: number, e: number) => void;
156
199
  export const __wbg_attachmentsclient_free: (a: number, b: number) => void;
@@ -185,10 +228,10 @@ export const bitwardenclient_exporters: (a: number) => number;
185
228
  export const vaultclient_ciphers: (a: number) => number;
186
229
  export const vaultclient_folders: (a: number) => number;
187
230
  export const __wbg_vaultclient_free: (a: number, b: number) => void;
188
- export const __wbg_totpclient_free: (a: number, b: number) => void;
189
231
  export const __wbg_foldersclient_free: (a: number, b: number) => void;
190
232
  export const __wbg_cryptoclient_free: (a: number, b: number) => void;
191
233
  export const __wbg_ciphersclient_free: (a: number, b: number) => void;
234
+ export const __wbg_totpclient_free: (a: number, b: number) => void;
192
235
  export const __wbindgen_malloc: (a: number, b: number) => number;
193
236
  export const __wbindgen_realloc: (a: number, b: number, c: number, d: number) => number;
194
237
  export const __wbindgen_exn_store: (a: number) => void;