@bitwarden/sdk-internal 0.2.0-main.200 → 0.2.0-main.202
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/VERSION +1 -1
- package/bitwarden_wasm_internal.d.ts +130 -1
- package/bitwarden_wasm_internal_bg.js +151 -9
- package/bitwarden_wasm_internal_bg.wasm +0 -0
- package/bitwarden_wasm_internal_bg.wasm.d.ts +24 -5
- package/bitwarden_wasm_internal_bg.wasm.js +1 -1
- package/node/bitwarden_wasm_internal.d.ts +130 -1
- package/node/bitwarden_wasm_internal.js +151 -9
- package/node/bitwarden_wasm_internal_bg.wasm +0 -0
- package/node/bitwarden_wasm_internal_bg.wasm.d.ts +24 -5
- package/package.json +1 -1
|
@@ -117,6 +117,10 @@ export interface InitUserCryptoRequest {
|
|
|
117
117
|
* The user\'s encrypted private key
|
|
118
118
|
*/
|
|
119
119
|
privateKey: EncString;
|
|
120
|
+
/**
|
|
121
|
+
* The user\'s signing key
|
|
122
|
+
*/
|
|
123
|
+
signingKey: EncString | undefined;
|
|
120
124
|
/**
|
|
121
125
|
* The initialization method to use
|
|
122
126
|
*/
|
|
@@ -157,6 +161,56 @@ export interface InitOrgCryptoRequest {
|
|
|
157
161
|
organizationKeys: Map<Uuid, UnsignedSharedKey>;
|
|
158
162
|
}
|
|
159
163
|
|
|
164
|
+
/**
|
|
165
|
+
* Response from the `update_password` function
|
|
166
|
+
*/
|
|
167
|
+
export interface UpdatePasswordResponse {
|
|
168
|
+
/**
|
|
169
|
+
* Hash of the new password
|
|
170
|
+
*/
|
|
171
|
+
passwordHash: string;
|
|
172
|
+
/**
|
|
173
|
+
* User key, encrypted with the new password
|
|
174
|
+
*/
|
|
175
|
+
newKey: EncString;
|
|
176
|
+
}
|
|
177
|
+
|
|
178
|
+
/**
|
|
179
|
+
* Request for deriving a pin protected user key
|
|
180
|
+
*/
|
|
181
|
+
export interface DerivePinKeyResponse {
|
|
182
|
+
/**
|
|
183
|
+
* [UserKey] protected by PIN
|
|
184
|
+
*/
|
|
185
|
+
pinProtectedUserKey: EncString;
|
|
186
|
+
/**
|
|
187
|
+
* PIN protected by [UserKey]
|
|
188
|
+
*/
|
|
189
|
+
encryptedPin: EncString;
|
|
190
|
+
}
|
|
191
|
+
|
|
192
|
+
/**
|
|
193
|
+
* Request for migrating an account from password to key connector.
|
|
194
|
+
*/
|
|
195
|
+
export interface DeriveKeyConnectorRequest {
|
|
196
|
+
/**
|
|
197
|
+
* Encrypted user key, used to validate the master key
|
|
198
|
+
*/
|
|
199
|
+
userKeyEncrypted: EncString;
|
|
200
|
+
/**
|
|
201
|
+
* The user\'s master password
|
|
202
|
+
*/
|
|
203
|
+
password: string;
|
|
204
|
+
/**
|
|
205
|
+
* The KDF parameters used to derive the master key
|
|
206
|
+
*/
|
|
207
|
+
kdf: Kdf;
|
|
208
|
+
/**
|
|
209
|
+
* The user\'s email address
|
|
210
|
+
*/
|
|
211
|
+
email: string;
|
|
212
|
+
}
|
|
213
|
+
|
|
160
214
|
/**
|
|
161
215
|
* Response from the `make_key_pair` function
|
|
162
216
|
*/
|
|
@@ -203,11 +257,50 @@ export interface VerifyAsymmetricKeysResponse {
|
|
|
203
257
|
validPrivateKey: boolean;
|
|
204
258
|
}
|
|
205
259
|
|
|
260
|
+
/**
|
|
261
|
+
* A new signing key pair along with the signed public key
|
|
262
|
+
*/
|
|
263
|
+
export interface MakeUserSigningKeysResponse {
|
|
264
|
+
/**
|
|
265
|
+
* Base64 encoded verifying key
|
|
266
|
+
*/
|
|
267
|
+
verifyingKey: string;
|
|
268
|
+
/**
|
|
269
|
+
* Signing key, encrypted with the user\'s symmetric key
|
|
270
|
+
*/
|
|
271
|
+
signingKey: EncString;
|
|
272
|
+
/**
|
|
273
|
+
* The user\'s public key, signed by the signing key
|
|
274
|
+
*/
|
|
275
|
+
signedPublicKey: SignedPublicKey;
|
|
276
|
+
}
|
|
277
|
+
|
|
206
278
|
/**
|
|
207
279
|
* NewType wrapper for `OrganizationId`
|
|
208
280
|
*/
|
|
209
281
|
export type OrganizationId = Tagged<Uuid, "OrganizationId">;
|
|
210
282
|
|
|
283
|
+
export interface DeriveKeyConnectorError extends Error {
|
|
284
|
+
name: "DeriveKeyConnectorError";
|
|
285
|
+
variant: "WrongPassword" | "Crypto";
|
|
286
|
+
}
|
|
287
|
+
|
|
288
|
+
export function isDeriveKeyConnectorError(error: any): error is DeriveKeyConnectorError;
|
|
289
|
+
|
|
290
|
+
export interface EnrollAdminPasswordResetError extends Error {
|
|
291
|
+
name: "EnrollAdminPasswordResetError";
|
|
292
|
+
variant: "VaultLocked" | "Crypto" | "InvalidBase64";
|
|
293
|
+
}
|
|
294
|
+
|
|
295
|
+
export function isEnrollAdminPasswordResetError(error: any): error is EnrollAdminPasswordResetError;
|
|
296
|
+
|
|
297
|
+
export interface CryptoClientError extends Error {
|
|
298
|
+
name: "CryptoClientError";
|
|
299
|
+
variant: "NotAuthenticated" | "VaultLocked" | "Crypto";
|
|
300
|
+
}
|
|
301
|
+
|
|
302
|
+
export function isCryptoClientError(error: any): error is CryptoClientError;
|
|
303
|
+
|
|
211
304
|
export interface EncryptionSettingsError extends Error {
|
|
212
305
|
name: "EncryptionSettingsError";
|
|
213
306
|
variant:
|
|
@@ -289,6 +382,13 @@ export type UnsignedSharedKey = string;
|
|
|
289
382
|
|
|
290
383
|
export type EncString = string;
|
|
291
384
|
|
|
385
|
+
export type SignedPublicKey = string;
|
|
386
|
+
|
|
387
|
+
/**
|
|
388
|
+
* The type of key / signature scheme used for signing and verifying.
|
|
389
|
+
*/
|
|
390
|
+
export type SignatureAlgorithm = "ed25519";
|
|
391
|
+
|
|
292
392
|
/**
|
|
293
393
|
* Key Derivation Function for Bitwarden Account
|
|
294
394
|
*
|
|
@@ -320,7 +420,10 @@ export interface CryptoError extends Error {
|
|
|
320
420
|
| "ZeroNumber"
|
|
321
421
|
| "OperationNotSupported"
|
|
322
422
|
| "WrongKeyType"
|
|
323
|
-
| "
|
|
423
|
+
| "WrongCoseKeyId"
|
|
424
|
+
| "InvalidNonceLength"
|
|
425
|
+
| "SignatureError"
|
|
426
|
+
| "EncodingError";
|
|
324
427
|
}
|
|
325
428
|
|
|
326
429
|
export function isCryptoError(error: any): error is CryptoError;
|
|
@@ -1069,6 +1172,9 @@ export class CiphersClient {
|
|
|
1069
1172
|
move_to_organization(cipher_view: CipherView, organization_id: OrganizationId): CipherView;
|
|
1070
1173
|
decrypt_fido2_private_key(cipher_view: CipherView): string;
|
|
1071
1174
|
}
|
|
1175
|
+
/**
|
|
1176
|
+
* A client for the crypto operations.
|
|
1177
|
+
*/
|
|
1072
1178
|
export class CryptoClient {
|
|
1073
1179
|
private constructor();
|
|
1074
1180
|
free(): void;
|
|
@@ -1093,6 +1199,10 @@ export class CryptoClient {
|
|
|
1093
1199
|
* Crypto initialization not required.
|
|
1094
1200
|
*/
|
|
1095
1201
|
verify_asymmetric_keys(request: VerifyAsymmetricKeysRequest): VerifyAsymmetricKeysResponse;
|
|
1202
|
+
/**
|
|
1203
|
+
* Makes a new signing key pair and signs the public key for the user
|
|
1204
|
+
*/
|
|
1205
|
+
make_user_signing_keys_for_enrollment(): MakeUserSigningKeysResponse;
|
|
1096
1206
|
}
|
|
1097
1207
|
export class ExporterClient {
|
|
1098
1208
|
private constructor();
|
|
@@ -1337,6 +1447,25 @@ export class PureCrypto {
|
|
|
1337
1447
|
encapsulated_key: string,
|
|
1338
1448
|
decapsulation_key: Uint8Array,
|
|
1339
1449
|
): Uint8Array;
|
|
1450
|
+
/**
|
|
1451
|
+
* Given a wrapped signing key and the symmetric key it is wrapped with, this returns
|
|
1452
|
+
* the corresponding verifying key.
|
|
1453
|
+
*/
|
|
1454
|
+
static verifying_key_for_signing_key(signing_key: string, wrapping_key: Uint8Array): Uint8Array;
|
|
1455
|
+
/**
|
|
1456
|
+
* Returns the algorithm used for the given verifying key.
|
|
1457
|
+
*/
|
|
1458
|
+
static key_algorithm_for_verifying_key(verifying_key: Uint8Array): SignatureAlgorithm;
|
|
1459
|
+
/**
|
|
1460
|
+
* For a given signing identity (verifying key), this function verifies that the signing
|
|
1461
|
+
* identity claimed ownership of the public key. This is a one-sided claim and merely shows
|
|
1462
|
+
* that the signing identity has the intent to receive messages encrypted to the public
|
|
1463
|
+
* key.
|
|
1464
|
+
*/
|
|
1465
|
+
static verify_and_unwrap_signed_public_key(
|
|
1466
|
+
signed_public_key: Uint8Array,
|
|
1467
|
+
verifying_key: Uint8Array,
|
|
1468
|
+
): Uint8Array;
|
|
1340
1469
|
}
|
|
1341
1470
|
export class TotpClient {
|
|
1342
1471
|
private constructor();
|
|
@@ -245,6 +245,45 @@ function addBorrowedObject(obj) {
|
|
|
245
245
|
heap[--stack_pointer] = obj;
|
|
246
246
|
return stack_pointer;
|
|
247
247
|
}
|
|
248
|
+
/**
|
|
249
|
+
* @param {any} error
|
|
250
|
+
* @returns {boolean}
|
|
251
|
+
*/
|
|
252
|
+
module.exports.isDeriveKeyConnectorError = function (error) {
|
|
253
|
+
try {
|
|
254
|
+
const ret = wasm.isDeriveKeyConnectorError(addBorrowedObject(error));
|
|
255
|
+
return ret !== 0;
|
|
256
|
+
} finally {
|
|
257
|
+
heap[stack_pointer++] = undefined;
|
|
258
|
+
}
|
|
259
|
+
};
|
|
260
|
+
|
|
261
|
+
/**
|
|
262
|
+
* @param {any} error
|
|
263
|
+
* @returns {boolean}
|
|
264
|
+
*/
|
|
265
|
+
module.exports.isEnrollAdminPasswordResetError = function (error) {
|
|
266
|
+
try {
|
|
267
|
+
const ret = wasm.isEnrollAdminPasswordResetError(addBorrowedObject(error));
|
|
268
|
+
return ret !== 0;
|
|
269
|
+
} finally {
|
|
270
|
+
heap[stack_pointer++] = undefined;
|
|
271
|
+
}
|
|
272
|
+
};
|
|
273
|
+
|
|
274
|
+
/**
|
|
275
|
+
* @param {any} error
|
|
276
|
+
* @returns {boolean}
|
|
277
|
+
*/
|
|
278
|
+
module.exports.isCryptoClientError = function (error) {
|
|
279
|
+
try {
|
|
280
|
+
const ret = wasm.isCryptoClientError(addBorrowedObject(error));
|
|
281
|
+
return ret !== 0;
|
|
282
|
+
} finally {
|
|
283
|
+
heap[stack_pointer++] = undefined;
|
|
284
|
+
}
|
|
285
|
+
};
|
|
286
|
+
|
|
248
287
|
/**
|
|
249
288
|
* @param {any} error
|
|
250
289
|
* @returns {boolean}
|
|
@@ -666,7 +705,7 @@ function __wbg_adapter_56(arg0, arg1, arg2) {
|
|
|
666
705
|
);
|
|
667
706
|
}
|
|
668
707
|
|
|
669
|
-
function
|
|
708
|
+
function __wbg_adapter_260(arg0, arg1, arg2, arg3) {
|
|
670
709
|
wasm.wasm_bindgen__convert__closures__invoke2_mut__h334034c47a371f71(
|
|
671
710
|
arg0,
|
|
672
711
|
arg1,
|
|
@@ -1193,7 +1232,9 @@ const CryptoClientFinalization =
|
|
|
1193
1232
|
typeof FinalizationRegistry === "undefined"
|
|
1194
1233
|
? { register: () => {}, unregister: () => {} }
|
|
1195
1234
|
: new FinalizationRegistry((ptr) => wasm.__wbg_cryptoclient_free(ptr >>> 0, 1));
|
|
1196
|
-
|
|
1235
|
+
/**
|
|
1236
|
+
* A client for the crypto operations.
|
|
1237
|
+
*/
|
|
1197
1238
|
class CryptoClient {
|
|
1198
1239
|
static __wrap(ptr) {
|
|
1199
1240
|
ptr = ptr >>> 0;
|
|
@@ -1279,6 +1320,25 @@ class CryptoClient {
|
|
|
1279
1320
|
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
1280
1321
|
}
|
|
1281
1322
|
}
|
|
1323
|
+
/**
|
|
1324
|
+
* Makes a new signing key pair and signs the public key for the user
|
|
1325
|
+
* @returns {MakeUserSigningKeysResponse}
|
|
1326
|
+
*/
|
|
1327
|
+
make_user_signing_keys_for_enrollment() {
|
|
1328
|
+
try {
|
|
1329
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
1330
|
+
wasm.cryptoclient_make_user_signing_keys_for_enrollment(retptr, this.__wbg_ptr);
|
|
1331
|
+
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
1332
|
+
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
1333
|
+
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
1334
|
+
if (r2) {
|
|
1335
|
+
throw takeObject(r1);
|
|
1336
|
+
}
|
|
1337
|
+
return takeObject(r0);
|
|
1338
|
+
} finally {
|
|
1339
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
1340
|
+
}
|
|
1341
|
+
}
|
|
1282
1342
|
}
|
|
1283
1343
|
module.exports.CryptoClient = CryptoClient;
|
|
1284
1344
|
|
|
@@ -2796,6 +2856,88 @@ class PureCrypto {
|
|
|
2796
2856
|
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2797
2857
|
}
|
|
2798
2858
|
}
|
|
2859
|
+
/**
|
|
2860
|
+
* Given a wrapped signing key and the symmetric key it is wrapped with, this returns
|
|
2861
|
+
* the corresponding verifying key.
|
|
2862
|
+
* @param {string} signing_key
|
|
2863
|
+
* @param {Uint8Array} wrapping_key
|
|
2864
|
+
* @returns {Uint8Array}
|
|
2865
|
+
*/
|
|
2866
|
+
static verifying_key_for_signing_key(signing_key, wrapping_key) {
|
|
2867
|
+
try {
|
|
2868
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2869
|
+
const ptr0 = passStringToWasm0(signing_key, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
|
|
2870
|
+
const len0 = WASM_VECTOR_LEN;
|
|
2871
|
+
const ptr1 = passArray8ToWasm0(wrapping_key, wasm.__wbindgen_malloc);
|
|
2872
|
+
const len1 = WASM_VECTOR_LEN;
|
|
2873
|
+
wasm.purecrypto_verifying_key_for_signing_key(retptr, ptr0, len0, ptr1, len1);
|
|
2874
|
+
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2875
|
+
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2876
|
+
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
2877
|
+
var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
|
|
2878
|
+
if (r3) {
|
|
2879
|
+
throw takeObject(r2);
|
|
2880
|
+
}
|
|
2881
|
+
var v3 = getArrayU8FromWasm0(r0, r1).slice();
|
|
2882
|
+
wasm.__wbindgen_free(r0, r1 * 1, 1);
|
|
2883
|
+
return v3;
|
|
2884
|
+
} finally {
|
|
2885
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2886
|
+
}
|
|
2887
|
+
}
|
|
2888
|
+
/**
|
|
2889
|
+
* Returns the algorithm used for the given verifying key.
|
|
2890
|
+
* @param {Uint8Array} verifying_key
|
|
2891
|
+
* @returns {SignatureAlgorithm}
|
|
2892
|
+
*/
|
|
2893
|
+
static key_algorithm_for_verifying_key(verifying_key) {
|
|
2894
|
+
try {
|
|
2895
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2896
|
+
const ptr0 = passArray8ToWasm0(verifying_key, wasm.__wbindgen_malloc);
|
|
2897
|
+
const len0 = WASM_VECTOR_LEN;
|
|
2898
|
+
wasm.purecrypto_key_algorithm_for_verifying_key(retptr, ptr0, len0);
|
|
2899
|
+
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2900
|
+
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2901
|
+
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
2902
|
+
if (r2) {
|
|
2903
|
+
throw takeObject(r1);
|
|
2904
|
+
}
|
|
2905
|
+
return takeObject(r0);
|
|
2906
|
+
} finally {
|
|
2907
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2908
|
+
}
|
|
2909
|
+
}
|
|
2910
|
+
/**
|
|
2911
|
+
* For a given signing identity (verifying key), this function verifies that the signing
|
|
2912
|
+
* identity claimed ownership of the public key. This is a one-sided claim and merely shows
|
|
2913
|
+
* that the signing identity has the intent to receive messages encrypted to the public
|
|
2914
|
+
* key.
|
|
2915
|
+
* @param {Uint8Array} signed_public_key
|
|
2916
|
+
* @param {Uint8Array} verifying_key
|
|
2917
|
+
* @returns {Uint8Array}
|
|
2918
|
+
*/
|
|
2919
|
+
static verify_and_unwrap_signed_public_key(signed_public_key, verifying_key) {
|
|
2920
|
+
try {
|
|
2921
|
+
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
2922
|
+
const ptr0 = passArray8ToWasm0(signed_public_key, wasm.__wbindgen_malloc);
|
|
2923
|
+
const len0 = WASM_VECTOR_LEN;
|
|
2924
|
+
const ptr1 = passArray8ToWasm0(verifying_key, wasm.__wbindgen_malloc);
|
|
2925
|
+
const len1 = WASM_VECTOR_LEN;
|
|
2926
|
+
wasm.purecrypto_verify_and_unwrap_signed_public_key(retptr, ptr0, len0, ptr1, len1);
|
|
2927
|
+
var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
|
|
2928
|
+
var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
|
|
2929
|
+
var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
|
|
2930
|
+
var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
|
|
2931
|
+
if (r3) {
|
|
2932
|
+
throw takeObject(r2);
|
|
2933
|
+
}
|
|
2934
|
+
var v3 = getArrayU8FromWasm0(r0, r1).slice();
|
|
2935
|
+
wasm.__wbindgen_free(r0, r1 * 1, 1);
|
|
2936
|
+
return v3;
|
|
2937
|
+
} finally {
|
|
2938
|
+
wasm.__wbindgen_add_to_stack_pointer(16);
|
|
2939
|
+
}
|
|
2940
|
+
}
|
|
2799
2941
|
}
|
|
2800
2942
|
module.exports.PureCrypto = PureCrypto;
|
|
2801
2943
|
|
|
@@ -3198,7 +3340,7 @@ module.exports.__wbg_new_23a2665fac83c611 = function (arg0, arg1) {
|
|
|
3198
3340
|
const a = state0.a;
|
|
3199
3341
|
state0.a = 0;
|
|
3200
3342
|
try {
|
|
3201
|
-
return
|
|
3343
|
+
return __wbg_adapter_260(a, state0.b, arg0, arg1);
|
|
3202
3344
|
} finally {
|
|
3203
3345
|
state0.a = a;
|
|
3204
3346
|
}
|
|
@@ -3555,18 +3697,18 @@ module.exports.__wbindgen_cb_drop = function (arg0) {
|
|
|
3555
3697
|
return ret;
|
|
3556
3698
|
};
|
|
3557
3699
|
|
|
3558
|
-
module.exports.
|
|
3559
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
3700
|
+
module.exports.__wbindgen_closure_wrapper2472 = function (arg0, arg1, arg2) {
|
|
3701
|
+
const ret = makeMutClosure(arg0, arg1, 709, __wbg_adapter_50);
|
|
3560
3702
|
return addHeapObject(ret);
|
|
3561
3703
|
};
|
|
3562
3704
|
|
|
3563
|
-
module.exports.
|
|
3564
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
3705
|
+
module.exports.__wbindgen_closure_wrapper3311 = function (arg0, arg1, arg2) {
|
|
3706
|
+
const ret = makeMutClosure(arg0, arg1, 793, __wbg_adapter_53);
|
|
3565
3707
|
return addHeapObject(ret);
|
|
3566
3708
|
};
|
|
3567
3709
|
|
|
3568
|
-
module.exports.
|
|
3569
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
3710
|
+
module.exports.__wbindgen_closure_wrapper3724 = function (arg0, arg1, arg2) {
|
|
3711
|
+
const ret = makeMutClosure(arg0, arg1, 916, __wbg_adapter_56);
|
|
3570
3712
|
return addHeapObject(ret);
|
|
3571
3713
|
};
|
|
3572
3714
|
|
|
Binary file
|
|
@@ -1,6 +1,15 @@
|
|
|
1
1
|
/* tslint:disable */
|
|
2
2
|
/* eslint-disable */
|
|
3
3
|
export const memory: WebAssembly.Memory;
|
|
4
|
+
export const __wbg_cryptoclient_free: (a: number, b: number) => void;
|
|
5
|
+
export const cryptoclient_initialize_user_crypto: (a: number, b: number) => number;
|
|
6
|
+
export const cryptoclient_initialize_org_crypto: (a: number, b: number) => number;
|
|
7
|
+
export const cryptoclient_make_key_pair: (a: number, b: number, c: number, d: number) => void;
|
|
8
|
+
export const cryptoclient_verify_asymmetric_keys: (a: number, b: number, c: number) => void;
|
|
9
|
+
export const cryptoclient_make_user_signing_keys_for_enrollment: (a: number, b: number) => void;
|
|
10
|
+
export const isDeriveKeyConnectorError: (a: number) => number;
|
|
11
|
+
export const isEnrollAdminPasswordResetError: (a: number) => number;
|
|
12
|
+
export const isCryptoClientError: (a: number) => number;
|
|
4
13
|
export const isEncryptionSettingsError: (a: number) => number;
|
|
5
14
|
export const isCryptoError: (a: number) => number;
|
|
6
15
|
export const __wbg_exporterclient_free: (a: number, b: number) => void;
|
|
@@ -142,11 +151,6 @@ export const bitwardenclient_version: (a: number, b: number) => void;
|
|
|
142
151
|
export const bitwardenclient_throw: (a: number, b: number, c: number, d: number) => void;
|
|
143
152
|
export const bitwardenclient_http_get: (a: number, b: number, c: number) => number;
|
|
144
153
|
export const bitwardenclient_crypto: (a: number) => number;
|
|
145
|
-
export const __wbg_cryptoclient_free: (a: number, b: number) => void;
|
|
146
|
-
export const cryptoclient_initialize_user_crypto: (a: number, b: number) => number;
|
|
147
|
-
export const cryptoclient_initialize_org_crypto: (a: number, b: number) => number;
|
|
148
|
-
export const cryptoclient_make_key_pair: (a: number, b: number, c: number, d: number) => void;
|
|
149
|
-
export const cryptoclient_verify_asymmetric_keys: (a: number, b: number, c: number) => void;
|
|
150
154
|
export const set_log_level: (a: number) => void;
|
|
151
155
|
export const init_sdk: (a: number) => void;
|
|
152
156
|
export const __wbg_purecrypto_free: (a: number, b: number) => void;
|
|
@@ -270,6 +274,21 @@ export const purecrypto_decapsulate_key_unsigned: (
|
|
|
270
274
|
d: number,
|
|
271
275
|
e: number,
|
|
272
276
|
) => void;
|
|
277
|
+
export const purecrypto_verifying_key_for_signing_key: (
|
|
278
|
+
a: number,
|
|
279
|
+
b: number,
|
|
280
|
+
c: number,
|
|
281
|
+
d: number,
|
|
282
|
+
e: number,
|
|
283
|
+
) => void;
|
|
284
|
+
export const purecrypto_key_algorithm_for_verifying_key: (a: number, b: number, c: number) => void;
|
|
285
|
+
export const purecrypto_verify_and_unwrap_signed_public_key: (
|
|
286
|
+
a: number,
|
|
287
|
+
b: number,
|
|
288
|
+
c: number,
|
|
289
|
+
d: number,
|
|
290
|
+
e: number,
|
|
291
|
+
) => void;
|
|
273
292
|
export const generate_ssh_key: (a: number, b: number) => void;
|
|
274
293
|
export const import_ssh_key: (a: number, b: number, c: number, d: number, e: number) => void;
|
|
275
294
|
export const isTestError: (a: number) => number;
|