@bitwarden/sdk-internal 0.2.0-main.213 → 0.2.0-main.215

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/VERSION CHANGED
@@ -1 +1 @@
1
- 025f81899ebb73fd6a24af32e449e38cdb856c71
1
+ 0cc1aede5283a376d9918f58ca3098672ab279dd
@@ -323,6 +323,7 @@ export interface EncryptionSettingsError extends Error {
323
323
  | "InvalidBase64"
324
324
  | "VaultLocked"
325
325
  | "InvalidPrivateKey"
326
+ | "InvalidSigningKey"
326
327
  | "MissingPrivateKey"
327
328
  | "UserIdAlreadySetError";
328
329
  }
@@ -437,6 +438,7 @@ export interface CryptoError extends Error {
437
438
  | "WrongKeyType"
438
439
  | "WrongCoseKeyId"
439
440
  | "InvalidNonceLength"
441
+ | "InvalidPadding"
440
442
  | "SignatureError"
441
443
  | "EncodingError";
442
444
  }
@@ -1450,6 +1452,9 @@ export class PureCrypto {
1450
1452
  static symmetric_decrypt_array_buffer(enc_bytes: Uint8Array, key: Uint8Array): Uint8Array;
1451
1453
  static symmetric_decrypt_filedata(enc_bytes: Uint8Array, key: Uint8Array): Uint8Array;
1452
1454
  static symmetric_encrypt_string(plain: string, key: Uint8Array): string;
1455
+ /**
1456
+ * DEPRECATED: Only used by send keys
1457
+ */
1453
1458
  static symmetric_encrypt_bytes(plain: Uint8Array, key: Uint8Array): string;
1454
1459
  static symmetric_encrypt_filedata(plain: Uint8Array, key: Uint8Array): Uint8Array;
1455
1460
  static decrypt_user_key_with_master_password(
@@ -2474,6 +2474,7 @@ export class PureCrypto {
2474
2474
  }
2475
2475
  }
2476
2476
  /**
2477
+ * DEPRECATED: Only used by send keys
2477
2478
  * @param {Uint8Array} plain
2478
2479
  * @param {Uint8Array} key
2479
2480
  * @returns {string}
@@ -2749,7 +2750,7 @@ export class PureCrypto {
2749
2750
  const len0 = WASM_VECTOR_LEN;
2750
2751
  const ptr1 = passArray8ToWasm0(wrapping_key, wasm.__wbindgen_malloc);
2751
2752
  const len1 = WASM_VECTOR_LEN;
2752
- wasm.purecrypto_wrap_decapsulation_key(retptr, ptr0, len0, ptr1, len1);
2753
+ wasm.purecrypto_wrap_encapsulation_key(retptr, ptr0, len0, ptr1, len1);
2753
2754
  var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
2754
2755
  var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
2755
2756
  var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
@@ -3320,7 +3321,7 @@ export function __wbg_get_b9b93047fe3cf45b(arg0, arg1) {
3320
3321
  return addHeapObject(ret);
3321
3322
  }
3322
3323
 
3323
- export function __wbg_get_d80c1589d30c292a() {
3324
+ export function __wbg_get_fad77e176f95eda1() {
3324
3325
  return handleError(function (arg0, arg1, arg2) {
3325
3326
  let deferred0_0;
3326
3327
  let deferred0_1;
@@ -3435,7 +3436,7 @@ export function __wbg_length_e2d2a49132c1b256(arg0) {
3435
3436
  return ret;
3436
3437
  }
3437
3438
 
3438
- export function __wbg_list_d11c20983c361f70() {
3439
+ export function __wbg_list_8b13bc6d05003111() {
3439
3440
  return handleError(function (arg0) {
3440
3441
  const ret = getObject(arg0).list();
3441
3442
  return addHeapObject(ret);
@@ -3612,7 +3613,7 @@ export function __wbg_randomFillSync_ac0988aba3254290() {
3612
3613
  }, arguments);
3613
3614
  }
3614
3615
 
3615
- export function __wbg_remove_212f779b207179b5() {
3616
+ export function __wbg_remove_2ed4e37784aed0c6() {
3616
3617
  return handleError(function (arg0, arg1, arg2) {
3617
3618
  let deferred0_0;
3618
3619
  let deferred0_1;
@@ -3663,7 +3664,7 @@ export function __wbg_set_65595bdd868b3009(arg0, arg1, arg2) {
3663
3664
  getObject(arg0).set(getObject(arg1), arg2 >>> 0);
3664
3665
  }
3665
3666
 
3666
- export function __wbg_set_7f4f0ad9ebd5a35e() {
3667
+ export function __wbg_set_74d0405f1648d9e9() {
3667
3668
  return handleError(function (arg0, arg1, arg2, arg3) {
3668
3669
  let deferred0_0;
3669
3670
  let deferred0_1;
@@ -3857,17 +3858,17 @@ export function __wbindgen_cb_drop(arg0) {
3857
3858
  return ret;
3858
3859
  }
3859
3860
 
3860
- export function __wbindgen_closure_wrapper2827(arg0, arg1, arg2) {
3861
+ export function __wbindgen_closure_wrapper2839(arg0, arg1, arg2) {
3861
3862
  const ret = makeMutClosure(arg0, arg1, 904, __wbg_adapter_50);
3862
3863
  return addHeapObject(ret);
3863
3864
  }
3864
3865
 
3865
- export function __wbindgen_closure_wrapper3667(arg0, arg1, arg2) {
3866
+ export function __wbindgen_closure_wrapper3679(arg0, arg1, arg2) {
3866
3867
  const ret = makeMutClosure(arg0, arg1, 988, __wbg_adapter_53);
3867
3868
  return addHeapObject(ret);
3868
3869
  }
3869
3870
 
3870
- export function __wbindgen_closure_wrapper4085(arg0, arg1, arg2) {
3871
+ export function __wbindgen_closure_wrapper4097(arg0, arg1, arg2) {
3871
3872
  const ret = makeMutClosure(arg0, arg1, 1111, __wbg_adapter_56);
3872
3873
  return addHeapObject(ret);
3873
3874
  }
Binary file
@@ -251,6 +251,13 @@ export const purecrypto_unwrap_symmetric_key: (
251
251
  d: number,
252
252
  e: number,
253
253
  ) => void;
254
+ export const purecrypto_wrap_encapsulation_key: (
255
+ a: number,
256
+ b: number,
257
+ c: number,
258
+ d: number,
259
+ e: number,
260
+ ) => void;
254
261
  export const purecrypto_wrap_decapsulation_key: (
255
262
  a: number,
256
263
  b: number,
@@ -297,13 +304,6 @@ export const purecrypto_verify_and_unwrap_signed_public_key: (
297
304
  export const generate_ssh_key: (a: number, b: number) => void;
298
305
  export const import_ssh_key: (a: number, b: number, c: number, d: number, e: number) => void;
299
306
  export const isTestError: (a: number) => number;
300
- export const purecrypto_wrap_encapsulation_key: (
301
- a: number,
302
- b: number,
303
- c: number,
304
- d: number,
305
- e: number,
306
- ) => void;
307
307
  export const purecrypto_unwrap_encapsulation_key: (
308
308
  a: number,
309
309
  b: number,