@bitwarden/sdk-internal 0.2.0-main.364 → 0.2.0-main.365
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/VERSION +1 -1
- package/bitwarden_wasm_internal.d.ts +133 -0
- package/bitwarden_wasm_internal_bg.js +154 -36
- package/bitwarden_wasm_internal_bg.wasm +0 -0
- package/bitwarden_wasm_internal_bg.wasm.d.ts +10 -5
- package/bitwarden_wasm_internal_bg.wasm.js +1 -1
- package/node/bitwarden_wasm_internal.d.ts +133 -0
- package/node/bitwarden_wasm_internal.js +155 -36
- package/node/bitwarden_wasm_internal_bg.wasm +0 -0
- package/node/bitwarden_wasm_internal_bg.wasm.d.ts +10 -5
- package/package.json +1 -1
|
@@ -1387,6 +1387,85 @@ export interface SecureNoteView {
|
|
|
1387
1387
|
type: SecureNoteType;
|
|
1388
1388
|
}
|
|
1389
1389
|
|
|
1390
|
+
/**
|
|
1391
|
+
* Result of checking password exposure via HIBP API.
|
|
1392
|
+
*/
|
|
1393
|
+
export type ExposedPasswordResult =
|
|
1394
|
+
| { type: "NotChecked" }
|
|
1395
|
+
| { type: "Found"; value: number }
|
|
1396
|
+
| { type: "Error"; value: string };
|
|
1397
|
+
|
|
1398
|
+
/**
|
|
1399
|
+
* Login cipher data needed for risk evaluation.
|
|
1400
|
+
*/
|
|
1401
|
+
export interface CipherLoginDetails {
|
|
1402
|
+
/**
|
|
1403
|
+
* Cipher ID to identify which cipher in results.
|
|
1404
|
+
*/
|
|
1405
|
+
id: CipherId;
|
|
1406
|
+
/**
|
|
1407
|
+
* The decrypted password to evaluate.
|
|
1408
|
+
*/
|
|
1409
|
+
password: string;
|
|
1410
|
+
/**
|
|
1411
|
+
* Username or email (login ciphers only have one field).
|
|
1412
|
+
*/
|
|
1413
|
+
username: string | undefined;
|
|
1414
|
+
}
|
|
1415
|
+
|
|
1416
|
+
/**
|
|
1417
|
+
* Password reuse map wrapper for WASM compatibility.
|
|
1418
|
+
*/
|
|
1419
|
+
export type PasswordReuseMap = Record<string, number>;
|
|
1420
|
+
|
|
1421
|
+
/**
|
|
1422
|
+
* Options for configuring risk computation.
|
|
1423
|
+
*/
|
|
1424
|
+
export interface CipherRiskOptions {
|
|
1425
|
+
/**
|
|
1426
|
+
* Pre-computed password reuse map (password → count).
|
|
1427
|
+
* If provided, enables reuse detection across ciphers.
|
|
1428
|
+
*/
|
|
1429
|
+
passwordMap?: PasswordReuseMap | undefined;
|
|
1430
|
+
/**
|
|
1431
|
+
* Whether to check passwords against Have I Been Pwned API.
|
|
1432
|
+
* When true, makes network requests to check for exposed passwords.
|
|
1433
|
+
*/
|
|
1434
|
+
checkExposed?: boolean;
|
|
1435
|
+
/**
|
|
1436
|
+
* Optional HIBP API base URL override. When None, uses the production HIBP URL.
|
|
1437
|
+
* Can be used for testing or alternative password breach checking services.
|
|
1438
|
+
*/
|
|
1439
|
+
hibpBaseUrl?: string | undefined;
|
|
1440
|
+
}
|
|
1441
|
+
|
|
1442
|
+
/**
|
|
1443
|
+
* Risk evaluation result for a single cipher.
|
|
1444
|
+
*/
|
|
1445
|
+
export interface CipherRiskResult {
|
|
1446
|
+
/**
|
|
1447
|
+
* Cipher ID matching the input CipherLoginDetails.
|
|
1448
|
+
*/
|
|
1449
|
+
id: CipherId;
|
|
1450
|
+
/**
|
|
1451
|
+
* Password strength score from 0 (weakest) to 4 (strongest).
|
|
1452
|
+
* Calculated using zxcvbn with cipher-specific context.
|
|
1453
|
+
*/
|
|
1454
|
+
password_strength: number;
|
|
1455
|
+
/**
|
|
1456
|
+
* Result of checking password exposure via HIBP API.
|
|
1457
|
+
* - `NotChecked`: check_exposed was false, or password was empty
|
|
1458
|
+
* - `Found(n)`: Successfully checked, found in n breaches
|
|
1459
|
+
* - `Error(msg)`: HIBP API request failed for this cipher with the given error message
|
|
1460
|
+
*/
|
|
1461
|
+
exposed_result: ExposedPasswordResult;
|
|
1462
|
+
/**
|
|
1463
|
+
* Number of times this password appears in the provided password_map.
|
|
1464
|
+
* None if not found or if no password_map was provided.
|
|
1465
|
+
*/
|
|
1466
|
+
reuse_count: number | undefined;
|
|
1467
|
+
}
|
|
1468
|
+
|
|
1390
1469
|
/**
|
|
1391
1470
|
* Request to add or edit a folder.
|
|
1392
1471
|
*/
|
|
@@ -1488,6 +1567,13 @@ export interface CreateFolderError extends Error {
|
|
|
1488
1567
|
|
|
1489
1568
|
export function isCreateFolderError(error: any): error is CreateFolderError;
|
|
1490
1569
|
|
|
1570
|
+
export interface CipherRiskError extends Error {
|
|
1571
|
+
name: "CipherRiskError";
|
|
1572
|
+
variant: "Reqwest";
|
|
1573
|
+
}
|
|
1574
|
+
|
|
1575
|
+
export function isCipherRiskError(error: any): error is CipherRiskError;
|
|
1576
|
+
|
|
1491
1577
|
export interface SshKeyView {
|
|
1492
1578
|
/**
|
|
1493
1579
|
* SSH private key (ed25519/rsa) in unencrypted openssh private key format [OpenSSH private key](https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.key)
|
|
@@ -1767,6 +1853,49 @@ export class BitwardenClient {
|
|
|
1767
1853
|
*/
|
|
1768
1854
|
exporters(): ExporterClient;
|
|
1769
1855
|
}
|
|
1856
|
+
/**
|
|
1857
|
+
* Client for evaluating credential risk for login ciphers.
|
|
1858
|
+
*/
|
|
1859
|
+
export class CipherRiskClient {
|
|
1860
|
+
private constructor();
|
|
1861
|
+
free(): void;
|
|
1862
|
+
/**
|
|
1863
|
+
* Build password reuse map for a list of login ciphers.
|
|
1864
|
+
*
|
|
1865
|
+
* Returns a map where keys are passwords and values are the number of times
|
|
1866
|
+
* each password appears in the provided list. This map can be passed to `compute_risk()`
|
|
1867
|
+
* to enable password reuse detection.
|
|
1868
|
+
*/
|
|
1869
|
+
password_reuse_map(login_details: CipherLoginDetails[]): PasswordReuseMap;
|
|
1870
|
+
/**
|
|
1871
|
+
* Evaluate security risks for multiple login ciphers concurrently.
|
|
1872
|
+
*
|
|
1873
|
+
* For each cipher:
|
|
1874
|
+
* 1. Calculates password strength (0-4) using zxcvbn with cipher-specific context
|
|
1875
|
+
* 2. Optionally checks if the password has been exposed via Have I Been Pwned API
|
|
1876
|
+
* 3. Counts how many times the password is reused in the provided `password_map`
|
|
1877
|
+
*
|
|
1878
|
+
* Returns a vector of `CipherRisk` results, one for each input cipher.
|
|
1879
|
+
*
|
|
1880
|
+
* ## HIBP Check Results (`exposed_result` field)
|
|
1881
|
+
*
|
|
1882
|
+
* The `exposed_result` field uses the `ExposedPasswordResult` enum with three possible states:
|
|
1883
|
+
* - `NotChecked`: Password exposure check was not performed because:
|
|
1884
|
+
* - `check_exposed` option was `false`, or
|
|
1885
|
+
* - Password was empty
|
|
1886
|
+
* - `Found(n)`: Successfully checked via HIBP API, password appears in `n` data breaches
|
|
1887
|
+
* - `Error(msg)`: HIBP API request failed with error message `msg`
|
|
1888
|
+
*
|
|
1889
|
+
* # Errors
|
|
1890
|
+
*
|
|
1891
|
+
* This method only returns `Err` for internal logic failures. HIBP API errors are
|
|
1892
|
+
* captured per-cipher in the `exposed_result` field as `ExposedPasswordResult::Error(msg)`.
|
|
1893
|
+
*/
|
|
1894
|
+
compute_risk(
|
|
1895
|
+
login_details: CipherLoginDetails[],
|
|
1896
|
+
options: CipherRiskOptions,
|
|
1897
|
+
): Promise<CipherRiskResult[]>;
|
|
1898
|
+
}
|
|
1770
1899
|
export class CiphersClient {
|
|
1771
1900
|
private constructor();
|
|
1772
1901
|
free(): void;
|
|
@@ -2271,4 +2400,8 @@ export class VaultClient {
|
|
|
2271
2400
|
* Collection related operations.
|
|
2272
2401
|
*/
|
|
2273
2402
|
collections(): CollectionsClient;
|
|
2403
|
+
/**
|
|
2404
|
+
* Cipher risk evaluation operations.
|
|
2405
|
+
*/
|
|
2406
|
+
cipher_risk(): CipherRiskClient;
|
|
2274
2407
|
}
|
|
@@ -775,6 +775,19 @@ module.exports.isCreateFolderError = function (error) {
|
|
|
775
775
|
}
|
|
776
776
|
};
|
|
777
777
|
|
|
778
|
+
/**
|
|
779
|
+
* @param {any} error
|
|
780
|
+
* @returns {boolean}
|
|
781
|
+
*/
|
|
782
|
+
module.exports.isCipherRiskError = function (error) {
|
|
783
|
+
try {
|
|
784
|
+
const ret = wasm.isCipherRiskError(addBorrowedObject(error));
|
|
785
|
+
return ret !== 0;
|
|
786
|
+
} finally {
|
|
787
|
+
heap[stack_pointer++] = undefined;
|
|
788
|
+
}
|
|
789
|
+
};
|
|
790
|
+
|
|
778
791
|
/**
|
|
779
792
|
* @param {any} error
|
|
780
793
|
* @returns {boolean}
|
|
@@ -854,17 +867,9 @@ module.exports.isEncryptFileError = function (error) {
|
|
|
854
867
|
};
|
|
855
868
|
|
|
856
869
|
function __wbg_adapter_54(arg0, arg1, arg2) {
|
|
857
|
-
wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h73da98aaeb1dd73e(
|
|
858
|
-
arg0,
|
|
859
|
-
arg1,
|
|
860
|
-
addHeapObject(arg2),
|
|
861
|
-
);
|
|
862
|
-
}
|
|
863
|
-
|
|
864
|
-
function __wbg_adapter_57(arg0, arg1, arg2) {
|
|
865
870
|
try {
|
|
866
871
|
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
867
|
-
wasm.
|
|
872
|
+
wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h0bf1e388b6a2a546(
|
|
868
873
|
retptr,
|
|
869
874
|
arg0,
|
|
870
875
|
arg1,
|
|
@@ -880,15 +885,23 @@ function __wbg_adapter_57(arg0, arg1, arg2) {
|
|
|
880
885
|
}
|
|
881
886
|
}
|
|
882
887
|
|
|
888
|
+
function __wbg_adapter_57(arg0, arg1, arg2) {
|
|
889
|
+
wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h10e0c24f5f2fd803(
|
|
890
|
+
arg0,
|
|
891
|
+
arg1,
|
|
892
|
+
addHeapObject(arg2),
|
|
893
|
+
);
|
|
894
|
+
}
|
|
895
|
+
|
|
883
896
|
function __wbg_adapter_60(arg0, arg1) {
|
|
884
|
-
wasm.
|
|
897
|
+
wasm._dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h1d088d25aee734e6(
|
|
885
898
|
arg0,
|
|
886
899
|
arg1,
|
|
887
900
|
);
|
|
888
901
|
}
|
|
889
902
|
|
|
890
|
-
function
|
|
891
|
-
wasm.
|
|
903
|
+
function __wbg_adapter_352(arg0, arg1, arg2, arg3) {
|
|
904
|
+
wasm.wasm_bindgen__convert__closures__invoke2_mut__h849ee2a9e4ae2f91(
|
|
892
905
|
arg0,
|
|
893
906
|
arg1,
|
|
894
907
|
addHeapObject(arg2),
|
|
@@ -1315,6 +1328,89 @@ class BitwardenClient {
|
|
|
1315
1328
|
}
|
|
1316
1329
|
module.exports.BitwardenClient = BitwardenClient;
|
|
1317
1330
|
|
|
1331
|
+
const CipherRiskClientFinalization =
|
|
1332
|
+
typeof FinalizationRegistry === "undefined"
|
|
1333
|
+
? { register: () => {}, unregister: () => {} }
|
|
1334
|
+
: new FinalizationRegistry((ptr) => wasm.__wbg_cipherriskclient_free(ptr >>> 0, 1));
|
|
1335
|
+
/**
|
|
1336
|
+
* Client for evaluating credential risk for login ciphers.
|
|
1337
|
+
*/
|
|
1338
|
+
class CipherRiskClient {
|
|
1339
|
+
static __wrap(ptr) {
|
|
1340
|
+
ptr = ptr >>> 0;
|
|
1341
|
+
const obj = Object.create(CipherRiskClient.prototype);
|
|
1342
|
+
obj.__wbg_ptr = ptr;
|
|
1343
|
+
CipherRiskClientFinalization.register(obj, obj.__wbg_ptr, obj);
|
|
1344
|
+
return obj;
|
|
1345
|
+
}
|
|
1346
|
+
|
|
1347
|
+
__destroy_into_raw() {
|
|
1348
|
+
const ptr = this.__wbg_ptr;
|
|
1349
|
+
this.__wbg_ptr = 0;
|
|
1350
|
+
CipherRiskClientFinalization.unregister(this);
|
|
1351
|
+
return ptr;
|
|
1352
|
+
}
|
|
1353
|
+
|
|
1354
|
+
free() {
|
|
1355
|
+
const ptr = this.__destroy_into_raw();
|
|
1356
|
+
wasm.__wbg_cipherriskclient_free(ptr, 0);
|
|
1357
|
+
}
|
|
1358
|
+
/**
|
|
1359
|
+
* Build password reuse map for a list of login ciphers.
|
|
1360
|
+
*
|
|
1361
|
+
* Returns a map where keys are passwords and values are the number of times
|
|
1362
|
+
* each password appears in the provided list. This map can be passed to `compute_risk()`
|
|
1363
|
+
* to enable password reuse detection.
|
|
1364
|
+
* @param {CipherLoginDetails[]} login_details
|
|
1365
|
+
* @returns {PasswordReuseMap}
|
|
1366
|
+
*/
|
|
1367
|
+
password_reuse_map(login_details) {
|
|
1368
|
+
const ptr0 = passArrayJsValueToWasm0(login_details, wasm.__wbindgen_malloc);
|
|
1369
|
+
const len0 = WASM_VECTOR_LEN;
|
|
1370
|
+
const ret = wasm.cipherriskclient_password_reuse_map(this.__wbg_ptr, ptr0, len0);
|
|
1371
|
+
return takeObject(ret);
|
|
1372
|
+
}
|
|
1373
|
+
/**
|
|
1374
|
+
* Evaluate security risks for multiple login ciphers concurrently.
|
|
1375
|
+
*
|
|
1376
|
+
* For each cipher:
|
|
1377
|
+
* 1. Calculates password strength (0-4) using zxcvbn with cipher-specific context
|
|
1378
|
+
* 2. Optionally checks if the password has been exposed via Have I Been Pwned API
|
|
1379
|
+
* 3. Counts how many times the password is reused in the provided `password_map`
|
|
1380
|
+
*
|
|
1381
|
+
* Returns a vector of `CipherRisk` results, one for each input cipher.
|
|
1382
|
+
*
|
|
1383
|
+
* ## HIBP Check Results (`exposed_result` field)
|
|
1384
|
+
*
|
|
1385
|
+
* The `exposed_result` field uses the `ExposedPasswordResult` enum with three possible states:
|
|
1386
|
+
* - `NotChecked`: Password exposure check was not performed because:
|
|
1387
|
+
* - `check_exposed` option was `false`, or
|
|
1388
|
+
* - Password was empty
|
|
1389
|
+
* - `Found(n)`: Successfully checked via HIBP API, password appears in `n` data breaches
|
|
1390
|
+
* - `Error(msg)`: HIBP API request failed with error message `msg`
|
|
1391
|
+
*
|
|
1392
|
+
* # Errors
|
|
1393
|
+
*
|
|
1394
|
+
* This method only returns `Err` for internal logic failures. HIBP API errors are
|
|
1395
|
+
* captured per-cipher in the `exposed_result` field as `ExposedPasswordResult::Error(msg)`.
|
|
1396
|
+
* @param {CipherLoginDetails[]} login_details
|
|
1397
|
+
* @param {CipherRiskOptions} options
|
|
1398
|
+
* @returns {Promise<CipherRiskResult[]>}
|
|
1399
|
+
*/
|
|
1400
|
+
compute_risk(login_details, options) {
|
|
1401
|
+
const ptr0 = passArrayJsValueToWasm0(login_details, wasm.__wbindgen_malloc);
|
|
1402
|
+
const len0 = WASM_VECTOR_LEN;
|
|
1403
|
+
const ret = wasm.cipherriskclient_compute_risk(
|
|
1404
|
+
this.__wbg_ptr,
|
|
1405
|
+
ptr0,
|
|
1406
|
+
len0,
|
|
1407
|
+
addHeapObject(options),
|
|
1408
|
+
);
|
|
1409
|
+
return takeObject(ret);
|
|
1410
|
+
}
|
|
1411
|
+
}
|
|
1412
|
+
module.exports.CipherRiskClient = CipherRiskClient;
|
|
1413
|
+
|
|
1318
1414
|
const CiphersClientFinalization =
|
|
1319
1415
|
typeof FinalizationRegistry === "undefined"
|
|
1320
1416
|
? { register: () => {}, unregister: () => {} }
|
|
@@ -4038,6 +4134,14 @@ class VaultClient {
|
|
|
4038
4134
|
const ret = wasm.vaultclient_attachments(this.__wbg_ptr);
|
|
4039
4135
|
return CollectionsClient.__wrap(ret);
|
|
4040
4136
|
}
|
|
4137
|
+
/**
|
|
4138
|
+
* Cipher risk evaluation operations.
|
|
4139
|
+
* @returns {CipherRiskClient}
|
|
4140
|
+
*/
|
|
4141
|
+
cipher_risk() {
|
|
4142
|
+
const ret = wasm.vaultclient_attachments(this.__wbg_ptr);
|
|
4143
|
+
return CipherRiskClient.__wrap(ret);
|
|
4144
|
+
}
|
|
4041
4145
|
}
|
|
4042
4146
|
module.exports.VaultClient = VaultClient;
|
|
4043
4147
|
|
|
@@ -4121,7 +4225,7 @@ module.exports.__wbg_call_7cccdd69e0791ae2 = function () {
|
|
|
4121
4225
|
}, arguments);
|
|
4122
4226
|
};
|
|
4123
4227
|
|
|
4124
|
-
module.exports.
|
|
4228
|
+
module.exports.__wbg_cipher_0354ea4980a45865 = function (arg0) {
|
|
4125
4229
|
const ret = getObject(arg0).cipher;
|
|
4126
4230
|
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
|
4127
4231
|
};
|
|
@@ -4201,11 +4305,16 @@ module.exports.__wbg_fetch_509096533071c657 = function (arg0, arg1) {
|
|
|
4201
4305
|
return addHeapObject(ret);
|
|
4202
4306
|
};
|
|
4203
4307
|
|
|
4204
|
-
module.exports.
|
|
4308
|
+
module.exports.__wbg_folder_065654789aaca86c = function (arg0) {
|
|
4205
4309
|
const ret = getObject(arg0).folder;
|
|
4206
4310
|
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
|
4207
4311
|
};
|
|
4208
4312
|
|
|
4313
|
+
module.exports.__wbg_getFullYear_17d3c9e4db748eb7 = function (arg0) {
|
|
4314
|
+
const ret = getObject(arg0).getFullYear();
|
|
4315
|
+
return ret;
|
|
4316
|
+
};
|
|
4317
|
+
|
|
4209
4318
|
module.exports.__wbg_getRandomValues_38097e921c2494c3 = function () {
|
|
4210
4319
|
return handleError(function (arg0, arg1) {
|
|
4211
4320
|
globalThis.crypto.getRandomValues(getArrayU8FromWasm0(arg0, arg1));
|
|
@@ -4223,7 +4332,7 @@ module.exports.__wbg_getTime_46267b1c24877e30 = function (arg0) {
|
|
|
4223
4332
|
return ret;
|
|
4224
4333
|
};
|
|
4225
4334
|
|
|
4226
|
-
module.exports.
|
|
4335
|
+
module.exports.__wbg_get_0c000b31aafb62a6 = function () {
|
|
4227
4336
|
return handleError(function (arg0, arg1, arg2) {
|
|
4228
4337
|
let deferred0_0;
|
|
4229
4338
|
let deferred0_1;
|
|
@@ -4250,7 +4359,7 @@ module.exports.__wbg_get_b9b93047fe3cf45b = function (arg0, arg1) {
|
|
|
4250
4359
|
return addHeapObject(ret);
|
|
4251
4360
|
};
|
|
4252
4361
|
|
|
4253
|
-
module.exports.
|
|
4362
|
+
module.exports.__wbg_get_c3b0fae9ed2d916c = function () {
|
|
4254
4363
|
return handleError(function (arg0, arg1, arg2) {
|
|
4255
4364
|
let deferred0_0;
|
|
4256
4365
|
let deferred0_1;
|
|
@@ -4265,7 +4374,7 @@ module.exports.__wbg_get_c015e7c4206c8288 = function () {
|
|
|
4265
4374
|
}, arguments);
|
|
4266
4375
|
};
|
|
4267
4376
|
|
|
4268
|
-
module.exports.
|
|
4377
|
+
module.exports.__wbg_getaccesstoken_d29c96563f3c4f7f = function (arg0) {
|
|
4269
4378
|
const ret = getObject(arg0).get_access_token();
|
|
4270
4379
|
return addHeapObject(ret);
|
|
4271
4380
|
};
|
|
@@ -4450,14 +4559,14 @@ module.exports.__wbg_length_e2d2a49132c1b256 = function (arg0) {
|
|
|
4450
4559
|
return ret;
|
|
4451
4560
|
};
|
|
4452
4561
|
|
|
4453
|
-
module.exports.
|
|
4562
|
+
module.exports.__wbg_list_5218cdfdd9081474 = function () {
|
|
4454
4563
|
return handleError(function (arg0) {
|
|
4455
4564
|
const ret = getObject(arg0).list();
|
|
4456
4565
|
return addHeapObject(ret);
|
|
4457
4566
|
}, arguments);
|
|
4458
4567
|
};
|
|
4459
4568
|
|
|
4460
|
-
module.exports.
|
|
4569
|
+
module.exports.__wbg_list_83c655ffacf926b7 = function () {
|
|
4461
4570
|
return handleError(function (arg0) {
|
|
4462
4571
|
const ret = getObject(arg0).list();
|
|
4463
4572
|
return addHeapObject(ret);
|
|
@@ -4500,7 +4609,7 @@ module.exports.__wbg_new_23a2665fac83c611 = function (arg0, arg1) {
|
|
|
4500
4609
|
const a = state0.a;
|
|
4501
4610
|
state0.a = 0;
|
|
4502
4611
|
try {
|
|
4503
|
-
return
|
|
4612
|
+
return __wbg_adapter_352(a, state0.b, arg0, arg1);
|
|
4504
4613
|
} finally {
|
|
4505
4614
|
state0.a = a;
|
|
4506
4615
|
}
|
|
@@ -4615,6 +4724,11 @@ module.exports.__wbg_node_905d3e251edff8a2 = function (arg0) {
|
|
|
4615
4724
|
return addHeapObject(ret);
|
|
4616
4725
|
};
|
|
4617
4726
|
|
|
4727
|
+
module.exports.__wbg_now_d18023d54d4e5500 = function (arg0) {
|
|
4728
|
+
const ret = getObject(arg0).now();
|
|
4729
|
+
return ret;
|
|
4730
|
+
};
|
|
4731
|
+
|
|
4618
4732
|
module.exports.__wbg_open_e0c0b2993eb596e1 = function () {
|
|
4619
4733
|
return handleError(function (arg0, arg1, arg2, arg3) {
|
|
4620
4734
|
const ret = getObject(arg0).open(getStringFromWasm0(arg1, arg2), arg3 >>> 0);
|
|
@@ -4658,7 +4772,7 @@ module.exports.__wbg_randomFillSync_ac0988aba3254290 = function () {
|
|
|
4658
4772
|
}, arguments);
|
|
4659
4773
|
};
|
|
4660
4774
|
|
|
4661
|
-
module.exports.
|
|
4775
|
+
module.exports.__wbg_remove_0e9beb59d125be57 = function () {
|
|
4662
4776
|
return handleError(function (arg0, arg1, arg2) {
|
|
4663
4777
|
let deferred0_0;
|
|
4664
4778
|
let deferred0_1;
|
|
@@ -4673,7 +4787,7 @@ module.exports.__wbg_remove_277c5173081d0d22 = function () {
|
|
|
4673
4787
|
}, arguments);
|
|
4674
4788
|
};
|
|
4675
4789
|
|
|
4676
|
-
module.exports.
|
|
4790
|
+
module.exports.__wbg_remove_6387a99bd1c07f3b = function () {
|
|
4677
4791
|
return handleError(function (arg0, arg1, arg2) {
|
|
4678
4792
|
let deferred0_0;
|
|
4679
4793
|
let deferred0_1;
|
|
@@ -4727,11 +4841,7 @@ module.exports.__wbg_set_3f1d0b984ed272ed = function (arg0, arg1, arg2) {
|
|
|
4727
4841
|
getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
|
|
4728
4842
|
};
|
|
4729
4843
|
|
|
4730
|
-
module.exports.
|
|
4731
|
-
getObject(arg0).set(getObject(arg1), arg2 >>> 0);
|
|
4732
|
-
};
|
|
4733
|
-
|
|
4734
|
-
module.exports.__wbg_set_69e1ef203c553c6e = function () {
|
|
4844
|
+
module.exports.__wbg_set_4909636594ca7c7a = function () {
|
|
4735
4845
|
return handleError(function (arg0, arg1, arg2, arg3) {
|
|
4736
4846
|
let deferred0_0;
|
|
4737
4847
|
let deferred0_1;
|
|
@@ -4746,12 +4856,16 @@ module.exports.__wbg_set_69e1ef203c553c6e = function () {
|
|
|
4746
4856
|
}, arguments);
|
|
4747
4857
|
};
|
|
4748
4858
|
|
|
4859
|
+
module.exports.__wbg_set_65595bdd868b3009 = function (arg0, arg1, arg2) {
|
|
4860
|
+
getObject(arg0).set(getObject(arg1), arg2 >>> 0);
|
|
4861
|
+
};
|
|
4862
|
+
|
|
4749
4863
|
module.exports.__wbg_set_8fc6bf8a5b1071d1 = function (arg0, arg1, arg2) {
|
|
4750
4864
|
const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
|
|
4751
4865
|
return addHeapObject(ret);
|
|
4752
4866
|
};
|
|
4753
4867
|
|
|
4754
|
-
module.exports.
|
|
4868
|
+
module.exports.__wbg_set_b63bcc0eff25f894 = function () {
|
|
4755
4869
|
return handleError(function (arg0, arg1, arg2, arg3) {
|
|
4756
4870
|
let deferred0_0;
|
|
4757
4871
|
let deferred0_1;
|
|
@@ -4863,6 +4977,11 @@ module.exports.__wbg_static_accessor_WINDOW_5de37043a91a9c40 = function () {
|
|
|
4863
4977
|
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
|
4864
4978
|
};
|
|
4865
4979
|
|
|
4980
|
+
module.exports.__wbg_static_accessor_performance_da77b3a901a72934 = function () {
|
|
4981
|
+
const ret = performance;
|
|
4982
|
+
return addHeapObject(ret);
|
|
4983
|
+
};
|
|
4984
|
+
|
|
4866
4985
|
module.exports.__wbg_status_f6360336ca686bf0 = function (arg0) {
|
|
4867
4986
|
const ret = getObject(arg0).status;
|
|
4868
4987
|
return ret;
|
|
@@ -4976,28 +5095,28 @@ module.exports.__wbindgen_cb_drop = function (arg0) {
|
|
|
4976
5095
|
return ret;
|
|
4977
5096
|
};
|
|
4978
5097
|
|
|
4979
|
-
module.exports.
|
|
5098
|
+
module.exports.__wbindgen_closure_wrapper198 = function (arg0, arg1, arg2) {
|
|
4980
5099
|
const ret = makeMutClosure(arg0, arg1, 7, __wbg_adapter_54);
|
|
4981
5100
|
return addHeapObject(ret);
|
|
4982
5101
|
};
|
|
4983
5102
|
|
|
4984
|
-
module.exports.
|
|
5103
|
+
module.exports.__wbindgen_closure_wrapper200 = function (arg0, arg1, arg2) {
|
|
4985
5104
|
const ret = makeMutClosure(arg0, arg1, 7, __wbg_adapter_57);
|
|
4986
5105
|
return addHeapObject(ret);
|
|
4987
5106
|
};
|
|
4988
5107
|
|
|
4989
|
-
module.exports.
|
|
4990
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
5108
|
+
module.exports.__wbindgen_closure_wrapper4243 = function (arg0, arg1, arg2) {
|
|
5109
|
+
const ret = makeMutClosure(arg0, arg1, 349, __wbg_adapter_60);
|
|
4991
5110
|
return addHeapObject(ret);
|
|
4992
5111
|
};
|
|
4993
5112
|
|
|
4994
|
-
module.exports.
|
|
4995
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
5113
|
+
module.exports.__wbindgen_closure_wrapper8217 = function (arg0, arg1, arg2) {
|
|
5114
|
+
const ret = makeMutClosure(arg0, arg1, 516, __wbg_adapter_60);
|
|
4996
5115
|
return addHeapObject(ret);
|
|
4997
5116
|
};
|
|
4998
5117
|
|
|
4999
|
-
module.exports.
|
|
5000
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
5118
|
+
module.exports.__wbindgen_closure_wrapper8600 = function (arg0, arg1, arg2) {
|
|
5119
|
+
const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_57);
|
|
5001
5120
|
return addHeapObject(ret);
|
|
5002
5121
|
};
|
|
5003
5122
|
|
|
Binary file
|
|
@@ -345,6 +345,8 @@ export const ciphersclient_move_to_organization: (
|
|
|
345
345
|
d: number,
|
|
346
346
|
) => void;
|
|
347
347
|
export const ciphersclient_decrypt_fido2_private_key: (a: number, b: number, c: number) => void;
|
|
348
|
+
export const cipherriskclient_password_reuse_map: (a: number, b: number, c: number) => number;
|
|
349
|
+
export const cipherriskclient_compute_risk: (a: number, b: number, c: number, d: number) => number;
|
|
348
350
|
export const foldersclient_encrypt: (a: number, b: number, c: number) => void;
|
|
349
351
|
export const foldersclient_decrypt: (a: number, b: number, c: number) => void;
|
|
350
352
|
export const foldersclient_decrypt_list: (a: number, b: number, c: number, d: number) => void;
|
|
@@ -379,6 +381,7 @@ export const isTotpError: (a: number) => number;
|
|
|
379
381
|
export const isGetFolderError: (a: number) => number;
|
|
380
382
|
export const isEditFolderError: (a: number) => number;
|
|
381
383
|
export const isCreateFolderError: (a: number) => number;
|
|
384
|
+
export const isCipherRiskError: (a: number) => number;
|
|
382
385
|
export const isGetCipherError: (a: number) => number;
|
|
383
386
|
export const isEditCipherError: (a: number) => number;
|
|
384
387
|
export const isCreateCipherError: (a: number) => number;
|
|
@@ -399,7 +402,9 @@ export const vaultclient_ciphers: (a: number) => number;
|
|
|
399
402
|
export const vaultclient_folders: (a: number) => number;
|
|
400
403
|
export const vaultclient_totp: (a: number) => number;
|
|
401
404
|
export const vaultclient_collections: (a: number) => number;
|
|
405
|
+
export const vaultclient_cipher_risk: (a: number) => number;
|
|
402
406
|
export const __wbg_foldersclient_free: (a: number, b: number) => void;
|
|
407
|
+
export const __wbg_cipherriskclient_free: (a: number, b: number) => void;
|
|
403
408
|
export const __wbg_ciphersclient_free: (a: number, b: number) => void;
|
|
404
409
|
export const __wbg_collectionsclient_free: (a: number, b: number) => void;
|
|
405
410
|
export const __wbg_vaultclient_free: (a: number, b: number) => void;
|
|
@@ -414,22 +419,22 @@ export const __wbindgen_exn_store: (a: number) => void;
|
|
|
414
419
|
export const __wbindgen_free: (a: number, b: number, c: number) => void;
|
|
415
420
|
export const __wbindgen_export_4: WebAssembly.Table;
|
|
416
421
|
export const __wbindgen_add_to_stack_pointer: (a: number) => number;
|
|
417
|
-
export const
|
|
422
|
+
export const _dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h0bf1e388b6a2a546: (
|
|
418
423
|
a: number,
|
|
419
424
|
b: number,
|
|
420
425
|
c: number,
|
|
426
|
+
d: number,
|
|
421
427
|
) => void;
|
|
422
|
-
export const
|
|
428
|
+
export const _dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h10e0c24f5f2fd803: (
|
|
423
429
|
a: number,
|
|
424
430
|
b: number,
|
|
425
431
|
c: number,
|
|
426
|
-
d: number,
|
|
427
432
|
) => void;
|
|
428
|
-
export const
|
|
433
|
+
export const _dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h1d088d25aee734e6: (
|
|
429
434
|
a: number,
|
|
430
435
|
b: number,
|
|
431
436
|
) => void;
|
|
432
|
-
export const
|
|
437
|
+
export const wasm_bindgen__convert__closures__invoke2_mut__h849ee2a9e4ae2f91: (
|
|
433
438
|
a: number,
|
|
434
439
|
b: number,
|
|
435
440
|
c: number,
|