@bitwarden/sdk-internal 0.2.0-main.364 → 0.2.0-main.365

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1387,6 +1387,85 @@ export interface SecureNoteView {
1387
1387
  type: SecureNoteType;
1388
1388
  }
1389
1389
 
1390
+ /**
1391
+ * Result of checking password exposure via HIBP API.
1392
+ */
1393
+ export type ExposedPasswordResult =
1394
+ | { type: "NotChecked" }
1395
+ | { type: "Found"; value: number }
1396
+ | { type: "Error"; value: string };
1397
+
1398
+ /**
1399
+ * Login cipher data needed for risk evaluation.
1400
+ */
1401
+ export interface CipherLoginDetails {
1402
+ /**
1403
+ * Cipher ID to identify which cipher in results.
1404
+ */
1405
+ id: CipherId;
1406
+ /**
1407
+ * The decrypted password to evaluate.
1408
+ */
1409
+ password: string;
1410
+ /**
1411
+ * Username or email (login ciphers only have one field).
1412
+ */
1413
+ username: string | undefined;
1414
+ }
1415
+
1416
+ /**
1417
+ * Password reuse map wrapper for WASM compatibility.
1418
+ */
1419
+ export type PasswordReuseMap = Record<string, number>;
1420
+
1421
+ /**
1422
+ * Options for configuring risk computation.
1423
+ */
1424
+ export interface CipherRiskOptions {
1425
+ /**
1426
+ * Pre-computed password reuse map (password → count).
1427
+ * If provided, enables reuse detection across ciphers.
1428
+ */
1429
+ passwordMap?: PasswordReuseMap | undefined;
1430
+ /**
1431
+ * Whether to check passwords against Have I Been Pwned API.
1432
+ * When true, makes network requests to check for exposed passwords.
1433
+ */
1434
+ checkExposed?: boolean;
1435
+ /**
1436
+ * Optional HIBP API base URL override. When None, uses the production HIBP URL.
1437
+ * Can be used for testing or alternative password breach checking services.
1438
+ */
1439
+ hibpBaseUrl?: string | undefined;
1440
+ }
1441
+
1442
+ /**
1443
+ * Risk evaluation result for a single cipher.
1444
+ */
1445
+ export interface CipherRiskResult {
1446
+ /**
1447
+ * Cipher ID matching the input CipherLoginDetails.
1448
+ */
1449
+ id: CipherId;
1450
+ /**
1451
+ * Password strength score from 0 (weakest) to 4 (strongest).
1452
+ * Calculated using zxcvbn with cipher-specific context.
1453
+ */
1454
+ password_strength: number;
1455
+ /**
1456
+ * Result of checking password exposure via HIBP API.
1457
+ * - `NotChecked`: check_exposed was false, or password was empty
1458
+ * - `Found(n)`: Successfully checked, found in n breaches
1459
+ * - `Error(msg)`: HIBP API request failed for this cipher with the given error message
1460
+ */
1461
+ exposed_result: ExposedPasswordResult;
1462
+ /**
1463
+ * Number of times this password appears in the provided password_map.
1464
+ * None if not found or if no password_map was provided.
1465
+ */
1466
+ reuse_count: number | undefined;
1467
+ }
1468
+
1390
1469
  /**
1391
1470
  * Request to add or edit a folder.
1392
1471
  */
@@ -1488,6 +1567,13 @@ export interface CreateFolderError extends Error {
1488
1567
 
1489
1568
  export function isCreateFolderError(error: any): error is CreateFolderError;
1490
1569
 
1570
+ export interface CipherRiskError extends Error {
1571
+ name: "CipherRiskError";
1572
+ variant: "Reqwest";
1573
+ }
1574
+
1575
+ export function isCipherRiskError(error: any): error is CipherRiskError;
1576
+
1491
1577
  export interface SshKeyView {
1492
1578
  /**
1493
1579
  * SSH private key (ed25519/rsa) in unencrypted openssh private key format [OpenSSH private key](https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.key)
@@ -1767,6 +1853,49 @@ export class BitwardenClient {
1767
1853
  */
1768
1854
  exporters(): ExporterClient;
1769
1855
  }
1856
+ /**
1857
+ * Client for evaluating credential risk for login ciphers.
1858
+ */
1859
+ export class CipherRiskClient {
1860
+ private constructor();
1861
+ free(): void;
1862
+ /**
1863
+ * Build password reuse map for a list of login ciphers.
1864
+ *
1865
+ * Returns a map where keys are passwords and values are the number of times
1866
+ * each password appears in the provided list. This map can be passed to `compute_risk()`
1867
+ * to enable password reuse detection.
1868
+ */
1869
+ password_reuse_map(login_details: CipherLoginDetails[]): PasswordReuseMap;
1870
+ /**
1871
+ * Evaluate security risks for multiple login ciphers concurrently.
1872
+ *
1873
+ * For each cipher:
1874
+ * 1. Calculates password strength (0-4) using zxcvbn with cipher-specific context
1875
+ * 2. Optionally checks if the password has been exposed via Have I Been Pwned API
1876
+ * 3. Counts how many times the password is reused in the provided `password_map`
1877
+ *
1878
+ * Returns a vector of `CipherRisk` results, one for each input cipher.
1879
+ *
1880
+ * ## HIBP Check Results (`exposed_result` field)
1881
+ *
1882
+ * The `exposed_result` field uses the `ExposedPasswordResult` enum with three possible states:
1883
+ * - `NotChecked`: Password exposure check was not performed because:
1884
+ * - `check_exposed` option was `false`, or
1885
+ * - Password was empty
1886
+ * - `Found(n)`: Successfully checked via HIBP API, password appears in `n` data breaches
1887
+ * - `Error(msg)`: HIBP API request failed with error message `msg`
1888
+ *
1889
+ * # Errors
1890
+ *
1891
+ * This method only returns `Err` for internal logic failures. HIBP API errors are
1892
+ * captured per-cipher in the `exposed_result` field as `ExposedPasswordResult::Error(msg)`.
1893
+ */
1894
+ compute_risk(
1895
+ login_details: CipherLoginDetails[],
1896
+ options: CipherRiskOptions,
1897
+ ): Promise<CipherRiskResult[]>;
1898
+ }
1770
1899
  export class CiphersClient {
1771
1900
  private constructor();
1772
1901
  free(): void;
@@ -2271,4 +2400,8 @@ export class VaultClient {
2271
2400
  * Collection related operations.
2272
2401
  */
2273
2402
  collections(): CollectionsClient;
2403
+ /**
2404
+ * Cipher risk evaluation operations.
2405
+ */
2406
+ cipher_risk(): CipherRiskClient;
2274
2407
  }
@@ -775,6 +775,19 @@ module.exports.isCreateFolderError = function (error) {
775
775
  }
776
776
  };
777
777
 
778
+ /**
779
+ * @param {any} error
780
+ * @returns {boolean}
781
+ */
782
+ module.exports.isCipherRiskError = function (error) {
783
+ try {
784
+ const ret = wasm.isCipherRiskError(addBorrowedObject(error));
785
+ return ret !== 0;
786
+ } finally {
787
+ heap[stack_pointer++] = undefined;
788
+ }
789
+ };
790
+
778
791
  /**
779
792
  * @param {any} error
780
793
  * @returns {boolean}
@@ -854,17 +867,9 @@ module.exports.isEncryptFileError = function (error) {
854
867
  };
855
868
 
856
869
  function __wbg_adapter_54(arg0, arg1, arg2) {
857
- wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h73da98aaeb1dd73e(
858
- arg0,
859
- arg1,
860
- addHeapObject(arg2),
861
- );
862
- }
863
-
864
- function __wbg_adapter_57(arg0, arg1, arg2) {
865
870
  try {
866
871
  const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
867
- wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h8ea2596275819f2b(
872
+ wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h0bf1e388b6a2a546(
868
873
  retptr,
869
874
  arg0,
870
875
  arg1,
@@ -880,15 +885,23 @@ function __wbg_adapter_57(arg0, arg1, arg2) {
880
885
  }
881
886
  }
882
887
 
888
+ function __wbg_adapter_57(arg0, arg1, arg2) {
889
+ wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h10e0c24f5f2fd803(
890
+ arg0,
891
+ arg1,
892
+ addHeapObject(arg2),
893
+ );
894
+ }
895
+
883
896
  function __wbg_adapter_60(arg0, arg1) {
884
- wasm._dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h091423ccfc08366e(
897
+ wasm._dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h1d088d25aee734e6(
885
898
  arg0,
886
899
  arg1,
887
900
  );
888
901
  }
889
902
 
890
- function __wbg_adapter_346(arg0, arg1, arg2, arg3) {
891
- wasm.wasm_bindgen__convert__closures__invoke2_mut__h54a8613170fef18e(
903
+ function __wbg_adapter_352(arg0, arg1, arg2, arg3) {
904
+ wasm.wasm_bindgen__convert__closures__invoke2_mut__h849ee2a9e4ae2f91(
892
905
  arg0,
893
906
  arg1,
894
907
  addHeapObject(arg2),
@@ -1315,6 +1328,89 @@ class BitwardenClient {
1315
1328
  }
1316
1329
  module.exports.BitwardenClient = BitwardenClient;
1317
1330
 
1331
+ const CipherRiskClientFinalization =
1332
+ typeof FinalizationRegistry === "undefined"
1333
+ ? { register: () => {}, unregister: () => {} }
1334
+ : new FinalizationRegistry((ptr) => wasm.__wbg_cipherriskclient_free(ptr >>> 0, 1));
1335
+ /**
1336
+ * Client for evaluating credential risk for login ciphers.
1337
+ */
1338
+ class CipherRiskClient {
1339
+ static __wrap(ptr) {
1340
+ ptr = ptr >>> 0;
1341
+ const obj = Object.create(CipherRiskClient.prototype);
1342
+ obj.__wbg_ptr = ptr;
1343
+ CipherRiskClientFinalization.register(obj, obj.__wbg_ptr, obj);
1344
+ return obj;
1345
+ }
1346
+
1347
+ __destroy_into_raw() {
1348
+ const ptr = this.__wbg_ptr;
1349
+ this.__wbg_ptr = 0;
1350
+ CipherRiskClientFinalization.unregister(this);
1351
+ return ptr;
1352
+ }
1353
+
1354
+ free() {
1355
+ const ptr = this.__destroy_into_raw();
1356
+ wasm.__wbg_cipherriskclient_free(ptr, 0);
1357
+ }
1358
+ /**
1359
+ * Build password reuse map for a list of login ciphers.
1360
+ *
1361
+ * Returns a map where keys are passwords and values are the number of times
1362
+ * each password appears in the provided list. This map can be passed to `compute_risk()`
1363
+ * to enable password reuse detection.
1364
+ * @param {CipherLoginDetails[]} login_details
1365
+ * @returns {PasswordReuseMap}
1366
+ */
1367
+ password_reuse_map(login_details) {
1368
+ const ptr0 = passArrayJsValueToWasm0(login_details, wasm.__wbindgen_malloc);
1369
+ const len0 = WASM_VECTOR_LEN;
1370
+ const ret = wasm.cipherriskclient_password_reuse_map(this.__wbg_ptr, ptr0, len0);
1371
+ return takeObject(ret);
1372
+ }
1373
+ /**
1374
+ * Evaluate security risks for multiple login ciphers concurrently.
1375
+ *
1376
+ * For each cipher:
1377
+ * 1. Calculates password strength (0-4) using zxcvbn with cipher-specific context
1378
+ * 2. Optionally checks if the password has been exposed via Have I Been Pwned API
1379
+ * 3. Counts how many times the password is reused in the provided `password_map`
1380
+ *
1381
+ * Returns a vector of `CipherRisk` results, one for each input cipher.
1382
+ *
1383
+ * ## HIBP Check Results (`exposed_result` field)
1384
+ *
1385
+ * The `exposed_result` field uses the `ExposedPasswordResult` enum with three possible states:
1386
+ * - `NotChecked`: Password exposure check was not performed because:
1387
+ * - `check_exposed` option was `false`, or
1388
+ * - Password was empty
1389
+ * - `Found(n)`: Successfully checked via HIBP API, password appears in `n` data breaches
1390
+ * - `Error(msg)`: HIBP API request failed with error message `msg`
1391
+ *
1392
+ * # Errors
1393
+ *
1394
+ * This method only returns `Err` for internal logic failures. HIBP API errors are
1395
+ * captured per-cipher in the `exposed_result` field as `ExposedPasswordResult::Error(msg)`.
1396
+ * @param {CipherLoginDetails[]} login_details
1397
+ * @param {CipherRiskOptions} options
1398
+ * @returns {Promise<CipherRiskResult[]>}
1399
+ */
1400
+ compute_risk(login_details, options) {
1401
+ const ptr0 = passArrayJsValueToWasm0(login_details, wasm.__wbindgen_malloc);
1402
+ const len0 = WASM_VECTOR_LEN;
1403
+ const ret = wasm.cipherriskclient_compute_risk(
1404
+ this.__wbg_ptr,
1405
+ ptr0,
1406
+ len0,
1407
+ addHeapObject(options),
1408
+ );
1409
+ return takeObject(ret);
1410
+ }
1411
+ }
1412
+ module.exports.CipherRiskClient = CipherRiskClient;
1413
+
1318
1414
  const CiphersClientFinalization =
1319
1415
  typeof FinalizationRegistry === "undefined"
1320
1416
  ? { register: () => {}, unregister: () => {} }
@@ -4038,6 +4134,14 @@ class VaultClient {
4038
4134
  const ret = wasm.vaultclient_attachments(this.__wbg_ptr);
4039
4135
  return CollectionsClient.__wrap(ret);
4040
4136
  }
4137
+ /**
4138
+ * Cipher risk evaluation operations.
4139
+ * @returns {CipherRiskClient}
4140
+ */
4141
+ cipher_risk() {
4142
+ const ret = wasm.vaultclient_attachments(this.__wbg_ptr);
4143
+ return CipherRiskClient.__wrap(ret);
4144
+ }
4041
4145
  }
4042
4146
  module.exports.VaultClient = VaultClient;
4043
4147
 
@@ -4121,7 +4225,7 @@ module.exports.__wbg_call_7cccdd69e0791ae2 = function () {
4121
4225
  }, arguments);
4122
4226
  };
4123
4227
 
4124
- module.exports.__wbg_cipher_53f05a3d4382452d = function (arg0) {
4228
+ module.exports.__wbg_cipher_0354ea4980a45865 = function (arg0) {
4125
4229
  const ret = getObject(arg0).cipher;
4126
4230
  return isLikeNone(ret) ? 0 : addHeapObject(ret);
4127
4231
  };
@@ -4201,11 +4305,16 @@ module.exports.__wbg_fetch_509096533071c657 = function (arg0, arg1) {
4201
4305
  return addHeapObject(ret);
4202
4306
  };
4203
4307
 
4204
- module.exports.__wbg_folder_fde5400eab30ad85 = function (arg0) {
4308
+ module.exports.__wbg_folder_065654789aaca86c = function (arg0) {
4205
4309
  const ret = getObject(arg0).folder;
4206
4310
  return isLikeNone(ret) ? 0 : addHeapObject(ret);
4207
4311
  };
4208
4312
 
4313
+ module.exports.__wbg_getFullYear_17d3c9e4db748eb7 = function (arg0) {
4314
+ const ret = getObject(arg0).getFullYear();
4315
+ return ret;
4316
+ };
4317
+
4209
4318
  module.exports.__wbg_getRandomValues_38097e921c2494c3 = function () {
4210
4319
  return handleError(function (arg0, arg1) {
4211
4320
  globalThis.crypto.getRandomValues(getArrayU8FromWasm0(arg0, arg1));
@@ -4223,7 +4332,7 @@ module.exports.__wbg_getTime_46267b1c24877e30 = function (arg0) {
4223
4332
  return ret;
4224
4333
  };
4225
4334
 
4226
- module.exports.__wbg_get_1cef86ba4b924f78 = function () {
4335
+ module.exports.__wbg_get_0c000b31aafb62a6 = function () {
4227
4336
  return handleError(function (arg0, arg1, arg2) {
4228
4337
  let deferred0_0;
4229
4338
  let deferred0_1;
@@ -4250,7 +4359,7 @@ module.exports.__wbg_get_b9b93047fe3cf45b = function (arg0, arg1) {
4250
4359
  return addHeapObject(ret);
4251
4360
  };
4252
4361
 
4253
- module.exports.__wbg_get_c015e7c4206c8288 = function () {
4362
+ module.exports.__wbg_get_c3b0fae9ed2d916c = function () {
4254
4363
  return handleError(function (arg0, arg1, arg2) {
4255
4364
  let deferred0_0;
4256
4365
  let deferred0_1;
@@ -4265,7 +4374,7 @@ module.exports.__wbg_get_c015e7c4206c8288 = function () {
4265
4374
  }, arguments);
4266
4375
  };
4267
4376
 
4268
- module.exports.__wbg_getaccesstoken_a82c383817948d88 = function (arg0) {
4377
+ module.exports.__wbg_getaccesstoken_d29c96563f3c4f7f = function (arg0) {
4269
4378
  const ret = getObject(arg0).get_access_token();
4270
4379
  return addHeapObject(ret);
4271
4380
  };
@@ -4450,14 +4559,14 @@ module.exports.__wbg_length_e2d2a49132c1b256 = function (arg0) {
4450
4559
  return ret;
4451
4560
  };
4452
4561
 
4453
- module.exports.__wbg_list_59934153e70ad537 = function () {
4562
+ module.exports.__wbg_list_5218cdfdd9081474 = function () {
4454
4563
  return handleError(function (arg0) {
4455
4564
  const ret = getObject(arg0).list();
4456
4565
  return addHeapObject(ret);
4457
4566
  }, arguments);
4458
4567
  };
4459
4568
 
4460
- module.exports.__wbg_list_affd0ef6131ef801 = function () {
4569
+ module.exports.__wbg_list_83c655ffacf926b7 = function () {
4461
4570
  return handleError(function (arg0) {
4462
4571
  const ret = getObject(arg0).list();
4463
4572
  return addHeapObject(ret);
@@ -4500,7 +4609,7 @@ module.exports.__wbg_new_23a2665fac83c611 = function (arg0, arg1) {
4500
4609
  const a = state0.a;
4501
4610
  state0.a = 0;
4502
4611
  try {
4503
- return __wbg_adapter_346(a, state0.b, arg0, arg1);
4612
+ return __wbg_adapter_352(a, state0.b, arg0, arg1);
4504
4613
  } finally {
4505
4614
  state0.a = a;
4506
4615
  }
@@ -4615,6 +4724,11 @@ module.exports.__wbg_node_905d3e251edff8a2 = function (arg0) {
4615
4724
  return addHeapObject(ret);
4616
4725
  };
4617
4726
 
4727
+ module.exports.__wbg_now_d18023d54d4e5500 = function (arg0) {
4728
+ const ret = getObject(arg0).now();
4729
+ return ret;
4730
+ };
4731
+
4618
4732
  module.exports.__wbg_open_e0c0b2993eb596e1 = function () {
4619
4733
  return handleError(function (arg0, arg1, arg2, arg3) {
4620
4734
  const ret = getObject(arg0).open(getStringFromWasm0(arg1, arg2), arg3 >>> 0);
@@ -4658,7 +4772,7 @@ module.exports.__wbg_randomFillSync_ac0988aba3254290 = function () {
4658
4772
  }, arguments);
4659
4773
  };
4660
4774
 
4661
- module.exports.__wbg_remove_277c5173081d0d22 = function () {
4775
+ module.exports.__wbg_remove_0e9beb59d125be57 = function () {
4662
4776
  return handleError(function (arg0, arg1, arg2) {
4663
4777
  let deferred0_0;
4664
4778
  let deferred0_1;
@@ -4673,7 +4787,7 @@ module.exports.__wbg_remove_277c5173081d0d22 = function () {
4673
4787
  }, arguments);
4674
4788
  };
4675
4789
 
4676
- module.exports.__wbg_remove_c7d0dbca35774cea = function () {
4790
+ module.exports.__wbg_remove_6387a99bd1c07f3b = function () {
4677
4791
  return handleError(function (arg0, arg1, arg2) {
4678
4792
  let deferred0_0;
4679
4793
  let deferred0_1;
@@ -4727,11 +4841,7 @@ module.exports.__wbg_set_3f1d0b984ed272ed = function (arg0, arg1, arg2) {
4727
4841
  getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
4728
4842
  };
4729
4843
 
4730
- module.exports.__wbg_set_65595bdd868b3009 = function (arg0, arg1, arg2) {
4731
- getObject(arg0).set(getObject(arg1), arg2 >>> 0);
4732
- };
4733
-
4734
- module.exports.__wbg_set_69e1ef203c553c6e = function () {
4844
+ module.exports.__wbg_set_4909636594ca7c7a = function () {
4735
4845
  return handleError(function (arg0, arg1, arg2, arg3) {
4736
4846
  let deferred0_0;
4737
4847
  let deferred0_1;
@@ -4746,12 +4856,16 @@ module.exports.__wbg_set_69e1ef203c553c6e = function () {
4746
4856
  }, arguments);
4747
4857
  };
4748
4858
 
4859
+ module.exports.__wbg_set_65595bdd868b3009 = function (arg0, arg1, arg2) {
4860
+ getObject(arg0).set(getObject(arg1), arg2 >>> 0);
4861
+ };
4862
+
4749
4863
  module.exports.__wbg_set_8fc6bf8a5b1071d1 = function (arg0, arg1, arg2) {
4750
4864
  const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
4751
4865
  return addHeapObject(ret);
4752
4866
  };
4753
4867
 
4754
- module.exports.__wbg_set_ed9a891c195e1ca6 = function () {
4868
+ module.exports.__wbg_set_b63bcc0eff25f894 = function () {
4755
4869
  return handleError(function (arg0, arg1, arg2, arg3) {
4756
4870
  let deferred0_0;
4757
4871
  let deferred0_1;
@@ -4863,6 +4977,11 @@ module.exports.__wbg_static_accessor_WINDOW_5de37043a91a9c40 = function () {
4863
4977
  return isLikeNone(ret) ? 0 : addHeapObject(ret);
4864
4978
  };
4865
4979
 
4980
+ module.exports.__wbg_static_accessor_performance_da77b3a901a72934 = function () {
4981
+ const ret = performance;
4982
+ return addHeapObject(ret);
4983
+ };
4984
+
4866
4985
  module.exports.__wbg_status_f6360336ca686bf0 = function (arg0) {
4867
4986
  const ret = getObject(arg0).status;
4868
4987
  return ret;
@@ -4976,28 +5095,28 @@ module.exports.__wbindgen_cb_drop = function (arg0) {
4976
5095
  return ret;
4977
5096
  };
4978
5097
 
4979
- module.exports.__wbindgen_closure_wrapper193 = function (arg0, arg1, arg2) {
5098
+ module.exports.__wbindgen_closure_wrapper198 = function (arg0, arg1, arg2) {
4980
5099
  const ret = makeMutClosure(arg0, arg1, 7, __wbg_adapter_54);
4981
5100
  return addHeapObject(ret);
4982
5101
  };
4983
5102
 
4984
- module.exports.__wbindgen_closure_wrapper195 = function (arg0, arg1, arg2) {
5103
+ module.exports.__wbindgen_closure_wrapper200 = function (arg0, arg1, arg2) {
4985
5104
  const ret = makeMutClosure(arg0, arg1, 7, __wbg_adapter_57);
4986
5105
  return addHeapObject(ret);
4987
5106
  };
4988
5107
 
4989
- module.exports.__wbindgen_closure_wrapper3923 = function (arg0, arg1, arg2) {
4990
- const ret = makeMutClosure(arg0, arg1, 301, __wbg_adapter_60);
5108
+ module.exports.__wbindgen_closure_wrapper4243 = function (arg0, arg1, arg2) {
5109
+ const ret = makeMutClosure(arg0, arg1, 349, __wbg_adapter_60);
4991
5110
  return addHeapObject(ret);
4992
5111
  };
4993
5112
 
4994
- module.exports.__wbindgen_closure_wrapper6409 = function (arg0, arg1, arg2) {
4995
- const ret = makeMutClosure(arg0, arg1, 327, __wbg_adapter_60);
5113
+ module.exports.__wbindgen_closure_wrapper8217 = function (arg0, arg1, arg2) {
5114
+ const ret = makeMutClosure(arg0, arg1, 516, __wbg_adapter_60);
4996
5115
  return addHeapObject(ret);
4997
5116
  };
4998
5117
 
4999
- module.exports.__wbindgen_closure_wrapper6789 = function (arg0, arg1, arg2) {
5000
- const ret = makeMutClosure(arg0, arg1, 350, __wbg_adapter_54);
5118
+ module.exports.__wbindgen_closure_wrapper8600 = function (arg0, arg1, arg2) {
5119
+ const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_57);
5001
5120
  return addHeapObject(ret);
5002
5121
  };
5003
5122
 
@@ -345,6 +345,8 @@ export const ciphersclient_move_to_organization: (
345
345
  d: number,
346
346
  ) => void;
347
347
  export const ciphersclient_decrypt_fido2_private_key: (a: number, b: number, c: number) => void;
348
+ export const cipherriskclient_password_reuse_map: (a: number, b: number, c: number) => number;
349
+ export const cipherriskclient_compute_risk: (a: number, b: number, c: number, d: number) => number;
348
350
  export const foldersclient_encrypt: (a: number, b: number, c: number) => void;
349
351
  export const foldersclient_decrypt: (a: number, b: number, c: number) => void;
350
352
  export const foldersclient_decrypt_list: (a: number, b: number, c: number, d: number) => void;
@@ -379,6 +381,7 @@ export const isTotpError: (a: number) => number;
379
381
  export const isGetFolderError: (a: number) => number;
380
382
  export const isEditFolderError: (a: number) => number;
381
383
  export const isCreateFolderError: (a: number) => number;
384
+ export const isCipherRiskError: (a: number) => number;
382
385
  export const isGetCipherError: (a: number) => number;
383
386
  export const isEditCipherError: (a: number) => number;
384
387
  export const isCreateCipherError: (a: number) => number;
@@ -399,7 +402,9 @@ export const vaultclient_ciphers: (a: number) => number;
399
402
  export const vaultclient_folders: (a: number) => number;
400
403
  export const vaultclient_totp: (a: number) => number;
401
404
  export const vaultclient_collections: (a: number) => number;
405
+ export const vaultclient_cipher_risk: (a: number) => number;
402
406
  export const __wbg_foldersclient_free: (a: number, b: number) => void;
407
+ export const __wbg_cipherriskclient_free: (a: number, b: number) => void;
403
408
  export const __wbg_ciphersclient_free: (a: number, b: number) => void;
404
409
  export const __wbg_collectionsclient_free: (a: number, b: number) => void;
405
410
  export const __wbg_vaultclient_free: (a: number, b: number) => void;
@@ -414,22 +419,22 @@ export const __wbindgen_exn_store: (a: number) => void;
414
419
  export const __wbindgen_free: (a: number, b: number, c: number) => void;
415
420
  export const __wbindgen_export_4: WebAssembly.Table;
416
421
  export const __wbindgen_add_to_stack_pointer: (a: number) => number;
417
- export const _dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h73da98aaeb1dd73e: (
422
+ export const _dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h0bf1e388b6a2a546: (
418
423
  a: number,
419
424
  b: number,
420
425
  c: number,
426
+ d: number,
421
427
  ) => void;
422
- export const _dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h8ea2596275819f2b: (
428
+ export const _dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h10e0c24f5f2fd803: (
423
429
  a: number,
424
430
  b: number,
425
431
  c: number,
426
- d: number,
427
432
  ) => void;
428
- export const _dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h091423ccfc08366e: (
433
+ export const _dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h1d088d25aee734e6: (
429
434
  a: number,
430
435
  b: number,
431
436
  ) => void;
432
- export const wasm_bindgen__convert__closures__invoke2_mut__h54a8613170fef18e: (
437
+ export const wasm_bindgen__convert__closures__invoke2_mut__h849ee2a9e4ae2f91: (
433
438
  a: number,
434
439
  b: number,
435
440
  c: number,
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@bitwarden/sdk-internal",
3
- "version": "0.2.0-main.364",
3
+ "version": "0.2.0-main.365",
4
4
  "license": "GPL-3.0",
5
5
  "repository": {
6
6
  "type": "git",