@bitwarden/sdk-internal 0.2.0-main.364 → 0.2.0-main.366
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/VERSION +1 -1
- package/bitwarden_wasm_internal.d.ts +141 -1
- package/bitwarden_wasm_internal_bg.js +166 -48
- package/bitwarden_wasm_internal_bg.wasm +0 -0
- package/bitwarden_wasm_internal_bg.wasm.d.ts +10 -5
- package/bitwarden_wasm_internal_bg.wasm.js +1 -1
- package/node/bitwarden_wasm_internal.d.ts +141 -1
- package/node/bitwarden_wasm_internal.js +167 -48
- package/node/bitwarden_wasm_internal_bg.wasm +0 -0
- package/node/bitwarden_wasm_internal_bg.wasm.d.ts +10 -5
- package/package.json +1 -1
package/VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
|
|
1
|
+
21432b51684f9c08c0fdb4febd80cc1d0f575bcd
|
|
@@ -1103,6 +1103,7 @@ export interface Cipher {
|
|
|
1103
1103
|
deletedDate: DateTime<Utc> | undefined;
|
|
1104
1104
|
revisionDate: DateTime<Utc>;
|
|
1105
1105
|
archivedDate: DateTime<Utc> | undefined;
|
|
1106
|
+
data: string | undefined;
|
|
1106
1107
|
}
|
|
1107
1108
|
|
|
1108
1109
|
export interface CipherView {
|
|
@@ -1387,6 +1388,85 @@ export interface SecureNoteView {
|
|
|
1387
1388
|
type: SecureNoteType;
|
|
1388
1389
|
}
|
|
1389
1390
|
|
|
1391
|
+
/**
|
|
1392
|
+
* Result of checking password exposure via HIBP API.
|
|
1393
|
+
*/
|
|
1394
|
+
export type ExposedPasswordResult =
|
|
1395
|
+
| { type: "NotChecked" }
|
|
1396
|
+
| { type: "Found"; value: number }
|
|
1397
|
+
| { type: "Error"; value: string };
|
|
1398
|
+
|
|
1399
|
+
/**
|
|
1400
|
+
* Login cipher data needed for risk evaluation.
|
|
1401
|
+
*/
|
|
1402
|
+
export interface CipherLoginDetails {
|
|
1403
|
+
/**
|
|
1404
|
+
* Cipher ID to identify which cipher in results.
|
|
1405
|
+
*/
|
|
1406
|
+
id: CipherId;
|
|
1407
|
+
/**
|
|
1408
|
+
* The decrypted password to evaluate.
|
|
1409
|
+
*/
|
|
1410
|
+
password: string;
|
|
1411
|
+
/**
|
|
1412
|
+
* Username or email (login ciphers only have one field).
|
|
1413
|
+
*/
|
|
1414
|
+
username: string | undefined;
|
|
1415
|
+
}
|
|
1416
|
+
|
|
1417
|
+
/**
|
|
1418
|
+
* Password reuse map wrapper for WASM compatibility.
|
|
1419
|
+
*/
|
|
1420
|
+
export type PasswordReuseMap = Record<string, number>;
|
|
1421
|
+
|
|
1422
|
+
/**
|
|
1423
|
+
* Options for configuring risk computation.
|
|
1424
|
+
*/
|
|
1425
|
+
export interface CipherRiskOptions {
|
|
1426
|
+
/**
|
|
1427
|
+
* Pre-computed password reuse map (password → count).
|
|
1428
|
+
* If provided, enables reuse detection across ciphers.
|
|
1429
|
+
*/
|
|
1430
|
+
passwordMap?: PasswordReuseMap | undefined;
|
|
1431
|
+
/**
|
|
1432
|
+
* Whether to check passwords against Have I Been Pwned API.
|
|
1433
|
+
* When true, makes network requests to check for exposed passwords.
|
|
1434
|
+
*/
|
|
1435
|
+
checkExposed?: boolean;
|
|
1436
|
+
/**
|
|
1437
|
+
* Optional HIBP API base URL override. When None, uses the production HIBP URL.
|
|
1438
|
+
* Can be used for testing or alternative password breach checking services.
|
|
1439
|
+
*/
|
|
1440
|
+
hibpBaseUrl?: string | undefined;
|
|
1441
|
+
}
|
|
1442
|
+
|
|
1443
|
+
/**
|
|
1444
|
+
* Risk evaluation result for a single cipher.
|
|
1445
|
+
*/
|
|
1446
|
+
export interface CipherRiskResult {
|
|
1447
|
+
/**
|
|
1448
|
+
* Cipher ID matching the input CipherLoginDetails.
|
|
1449
|
+
*/
|
|
1450
|
+
id: CipherId;
|
|
1451
|
+
/**
|
|
1452
|
+
* Password strength score from 0 (weakest) to 4 (strongest).
|
|
1453
|
+
* Calculated using zxcvbn with cipher-specific context.
|
|
1454
|
+
*/
|
|
1455
|
+
password_strength: number;
|
|
1456
|
+
/**
|
|
1457
|
+
* Result of checking password exposure via HIBP API.
|
|
1458
|
+
* - `NotChecked`: check_exposed was false, or password was empty
|
|
1459
|
+
* - `Found(n)`: Successfully checked, found in n breaches
|
|
1460
|
+
* - `Error(msg)`: HIBP API request failed for this cipher with the given error message
|
|
1461
|
+
*/
|
|
1462
|
+
exposed_result: ExposedPasswordResult;
|
|
1463
|
+
/**
|
|
1464
|
+
* Number of times this password appears in the provided password_map.
|
|
1465
|
+
* None if not found or if no password_map was provided.
|
|
1466
|
+
*/
|
|
1467
|
+
reuse_count: number | undefined;
|
|
1468
|
+
}
|
|
1469
|
+
|
|
1390
1470
|
/**
|
|
1391
1471
|
* Request to add or edit a folder.
|
|
1392
1472
|
*/
|
|
@@ -1488,6 +1568,13 @@ export interface CreateFolderError extends Error {
|
|
|
1488
1568
|
|
|
1489
1569
|
export function isCreateFolderError(error: any): error is CreateFolderError;
|
|
1490
1570
|
|
|
1571
|
+
export interface CipherRiskError extends Error {
|
|
1572
|
+
name: "CipherRiskError";
|
|
1573
|
+
variant: "Reqwest";
|
|
1574
|
+
}
|
|
1575
|
+
|
|
1576
|
+
export function isCipherRiskError(error: any): error is CipherRiskError;
|
|
1577
|
+
|
|
1491
1578
|
export interface SshKeyView {
|
|
1492
1579
|
/**
|
|
1493
1580
|
* SSH private key (ed25519/rsa) in unencrypted openssh private key format [OpenSSH private key](https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.key)
|
|
@@ -1616,7 +1703,13 @@ export function isCreateCipherError(error: any): error is CreateCipherError;
|
|
|
1616
1703
|
|
|
1617
1704
|
export interface CipherError extends Error {
|
|
1618
1705
|
name: "CipherError";
|
|
1619
|
-
variant:
|
|
1706
|
+
variant:
|
|
1707
|
+
| "MissingField"
|
|
1708
|
+
| "Crypto"
|
|
1709
|
+
| "Encrypt"
|
|
1710
|
+
| "AttachmentsWithoutKeys"
|
|
1711
|
+
| "Chrono"
|
|
1712
|
+
| "SerdeJson";
|
|
1620
1713
|
}
|
|
1621
1714
|
|
|
1622
1715
|
export function isCipherError(error: any): error is CipherError;
|
|
@@ -1767,6 +1860,49 @@ export class BitwardenClient {
|
|
|
1767
1860
|
*/
|
|
1768
1861
|
exporters(): ExporterClient;
|
|
1769
1862
|
}
|
|
1863
|
+
/**
|
|
1864
|
+
* Client for evaluating credential risk for login ciphers.
|
|
1865
|
+
*/
|
|
1866
|
+
export class CipherRiskClient {
|
|
1867
|
+
private constructor();
|
|
1868
|
+
free(): void;
|
|
1869
|
+
/**
|
|
1870
|
+
* Build password reuse map for a list of login ciphers.
|
|
1871
|
+
*
|
|
1872
|
+
* Returns a map where keys are passwords and values are the number of times
|
|
1873
|
+
* each password appears in the provided list. This map can be passed to `compute_risk()`
|
|
1874
|
+
* to enable password reuse detection.
|
|
1875
|
+
*/
|
|
1876
|
+
password_reuse_map(login_details: CipherLoginDetails[]): PasswordReuseMap;
|
|
1877
|
+
/**
|
|
1878
|
+
* Evaluate security risks for multiple login ciphers concurrently.
|
|
1879
|
+
*
|
|
1880
|
+
* For each cipher:
|
|
1881
|
+
* 1. Calculates password strength (0-4) using zxcvbn with cipher-specific context
|
|
1882
|
+
* 2. Optionally checks if the password has been exposed via Have I Been Pwned API
|
|
1883
|
+
* 3. Counts how many times the password is reused in the provided `password_map`
|
|
1884
|
+
*
|
|
1885
|
+
* Returns a vector of `CipherRisk` results, one for each input cipher.
|
|
1886
|
+
*
|
|
1887
|
+
* ## HIBP Check Results (`exposed_result` field)
|
|
1888
|
+
*
|
|
1889
|
+
* The `exposed_result` field uses the `ExposedPasswordResult` enum with three possible states:
|
|
1890
|
+
* - `NotChecked`: Password exposure check was not performed because:
|
|
1891
|
+
* - `check_exposed` option was `false`, or
|
|
1892
|
+
* - Password was empty
|
|
1893
|
+
* - `Found(n)`: Successfully checked via HIBP API, password appears in `n` data breaches
|
|
1894
|
+
* - `Error(msg)`: HIBP API request failed with error message `msg`
|
|
1895
|
+
*
|
|
1896
|
+
* # Errors
|
|
1897
|
+
*
|
|
1898
|
+
* This method only returns `Err` for internal logic failures. HIBP API errors are
|
|
1899
|
+
* captured per-cipher in the `exposed_result` field as `ExposedPasswordResult::Error(msg)`.
|
|
1900
|
+
*/
|
|
1901
|
+
compute_risk(
|
|
1902
|
+
login_details: CipherLoginDetails[],
|
|
1903
|
+
options: CipherRiskOptions,
|
|
1904
|
+
): Promise<CipherRiskResult[]>;
|
|
1905
|
+
}
|
|
1770
1906
|
export class CiphersClient {
|
|
1771
1907
|
private constructor();
|
|
1772
1908
|
free(): void;
|
|
@@ -2271,4 +2407,8 @@ export class VaultClient {
|
|
|
2271
2407
|
* Collection related operations.
|
|
2272
2408
|
*/
|
|
2273
2409
|
collections(): CollectionsClient;
|
|
2410
|
+
/**
|
|
2411
|
+
* Cipher risk evaluation operations.
|
|
2412
|
+
*/
|
|
2413
|
+
cipher_risk(): CipherRiskClient;
|
|
2274
2414
|
}
|
|
@@ -781,6 +781,19 @@ export function isCreateFolderError(error) {
|
|
|
781
781
|
}
|
|
782
782
|
}
|
|
783
783
|
|
|
784
|
+
/**
|
|
785
|
+
* @param {any} error
|
|
786
|
+
* @returns {boolean}
|
|
787
|
+
*/
|
|
788
|
+
export function isCipherRiskError(error) {
|
|
789
|
+
try {
|
|
790
|
+
const ret = wasm.isCipherRiskError(addBorrowedObject(error));
|
|
791
|
+
return ret !== 0;
|
|
792
|
+
} finally {
|
|
793
|
+
heap[stack_pointer++] = undefined;
|
|
794
|
+
}
|
|
795
|
+
}
|
|
796
|
+
|
|
784
797
|
/**
|
|
785
798
|
* @param {any} error
|
|
786
799
|
* @returns {boolean}
|
|
@@ -860,17 +873,9 @@ export function isEncryptFileError(error) {
|
|
|
860
873
|
}
|
|
861
874
|
|
|
862
875
|
function __wbg_adapter_54(arg0, arg1, arg2) {
|
|
863
|
-
wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h73da98aaeb1dd73e(
|
|
864
|
-
arg0,
|
|
865
|
-
arg1,
|
|
866
|
-
addHeapObject(arg2),
|
|
867
|
-
);
|
|
868
|
-
}
|
|
869
|
-
|
|
870
|
-
function __wbg_adapter_57(arg0, arg1, arg2) {
|
|
871
876
|
try {
|
|
872
877
|
const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
|
|
873
|
-
wasm.
|
|
878
|
+
wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h0bf1e388b6a2a546(
|
|
874
879
|
retptr,
|
|
875
880
|
arg0,
|
|
876
881
|
arg1,
|
|
@@ -886,15 +891,23 @@ function __wbg_adapter_57(arg0, arg1, arg2) {
|
|
|
886
891
|
}
|
|
887
892
|
}
|
|
888
893
|
|
|
894
|
+
function __wbg_adapter_57(arg0, arg1, arg2) {
|
|
895
|
+
wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h10e0c24f5f2fd803(
|
|
896
|
+
arg0,
|
|
897
|
+
arg1,
|
|
898
|
+
addHeapObject(arg2),
|
|
899
|
+
);
|
|
900
|
+
}
|
|
901
|
+
|
|
889
902
|
function __wbg_adapter_60(arg0, arg1) {
|
|
890
|
-
wasm.
|
|
903
|
+
wasm._dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h1d088d25aee734e6(
|
|
891
904
|
arg0,
|
|
892
905
|
arg1,
|
|
893
906
|
);
|
|
894
907
|
}
|
|
895
908
|
|
|
896
|
-
function
|
|
897
|
-
wasm.
|
|
909
|
+
function __wbg_adapter_352(arg0, arg1, arg2, arg3) {
|
|
910
|
+
wasm.wasm_bindgen__convert__closures__invoke2_mut__h849ee2a9e4ae2f91(
|
|
898
911
|
arg0,
|
|
899
912
|
arg1,
|
|
900
913
|
addHeapObject(arg2),
|
|
@@ -1318,6 +1331,88 @@ export class BitwardenClient {
|
|
|
1318
1331
|
}
|
|
1319
1332
|
}
|
|
1320
1333
|
|
|
1334
|
+
const CipherRiskClientFinalization =
|
|
1335
|
+
typeof FinalizationRegistry === "undefined"
|
|
1336
|
+
? { register: () => {}, unregister: () => {} }
|
|
1337
|
+
: new FinalizationRegistry((ptr) => wasm.__wbg_cipherriskclient_free(ptr >>> 0, 1));
|
|
1338
|
+
/**
|
|
1339
|
+
* Client for evaluating credential risk for login ciphers.
|
|
1340
|
+
*/
|
|
1341
|
+
export class CipherRiskClient {
|
|
1342
|
+
static __wrap(ptr) {
|
|
1343
|
+
ptr = ptr >>> 0;
|
|
1344
|
+
const obj = Object.create(CipherRiskClient.prototype);
|
|
1345
|
+
obj.__wbg_ptr = ptr;
|
|
1346
|
+
CipherRiskClientFinalization.register(obj, obj.__wbg_ptr, obj);
|
|
1347
|
+
return obj;
|
|
1348
|
+
}
|
|
1349
|
+
|
|
1350
|
+
__destroy_into_raw() {
|
|
1351
|
+
const ptr = this.__wbg_ptr;
|
|
1352
|
+
this.__wbg_ptr = 0;
|
|
1353
|
+
CipherRiskClientFinalization.unregister(this);
|
|
1354
|
+
return ptr;
|
|
1355
|
+
}
|
|
1356
|
+
|
|
1357
|
+
free() {
|
|
1358
|
+
const ptr = this.__destroy_into_raw();
|
|
1359
|
+
wasm.__wbg_cipherriskclient_free(ptr, 0);
|
|
1360
|
+
}
|
|
1361
|
+
/**
|
|
1362
|
+
* Build password reuse map for a list of login ciphers.
|
|
1363
|
+
*
|
|
1364
|
+
* Returns a map where keys are passwords and values are the number of times
|
|
1365
|
+
* each password appears in the provided list. This map can be passed to `compute_risk()`
|
|
1366
|
+
* to enable password reuse detection.
|
|
1367
|
+
* @param {CipherLoginDetails[]} login_details
|
|
1368
|
+
* @returns {PasswordReuseMap}
|
|
1369
|
+
*/
|
|
1370
|
+
password_reuse_map(login_details) {
|
|
1371
|
+
const ptr0 = passArrayJsValueToWasm0(login_details, wasm.__wbindgen_malloc);
|
|
1372
|
+
const len0 = WASM_VECTOR_LEN;
|
|
1373
|
+
const ret = wasm.cipherriskclient_password_reuse_map(this.__wbg_ptr, ptr0, len0);
|
|
1374
|
+
return takeObject(ret);
|
|
1375
|
+
}
|
|
1376
|
+
/**
|
|
1377
|
+
* Evaluate security risks for multiple login ciphers concurrently.
|
|
1378
|
+
*
|
|
1379
|
+
* For each cipher:
|
|
1380
|
+
* 1. Calculates password strength (0-4) using zxcvbn with cipher-specific context
|
|
1381
|
+
* 2. Optionally checks if the password has been exposed via Have I Been Pwned API
|
|
1382
|
+
* 3. Counts how many times the password is reused in the provided `password_map`
|
|
1383
|
+
*
|
|
1384
|
+
* Returns a vector of `CipherRisk` results, one for each input cipher.
|
|
1385
|
+
*
|
|
1386
|
+
* ## HIBP Check Results (`exposed_result` field)
|
|
1387
|
+
*
|
|
1388
|
+
* The `exposed_result` field uses the `ExposedPasswordResult` enum with three possible states:
|
|
1389
|
+
* - `NotChecked`: Password exposure check was not performed because:
|
|
1390
|
+
* - `check_exposed` option was `false`, or
|
|
1391
|
+
* - Password was empty
|
|
1392
|
+
* - `Found(n)`: Successfully checked via HIBP API, password appears in `n` data breaches
|
|
1393
|
+
* - `Error(msg)`: HIBP API request failed with error message `msg`
|
|
1394
|
+
*
|
|
1395
|
+
* # Errors
|
|
1396
|
+
*
|
|
1397
|
+
* This method only returns `Err` for internal logic failures. HIBP API errors are
|
|
1398
|
+
* captured per-cipher in the `exposed_result` field as `ExposedPasswordResult::Error(msg)`.
|
|
1399
|
+
* @param {CipherLoginDetails[]} login_details
|
|
1400
|
+
* @param {CipherRiskOptions} options
|
|
1401
|
+
* @returns {Promise<CipherRiskResult[]>}
|
|
1402
|
+
*/
|
|
1403
|
+
compute_risk(login_details, options) {
|
|
1404
|
+
const ptr0 = passArrayJsValueToWasm0(login_details, wasm.__wbindgen_malloc);
|
|
1405
|
+
const len0 = WASM_VECTOR_LEN;
|
|
1406
|
+
const ret = wasm.cipherriskclient_compute_risk(
|
|
1407
|
+
this.__wbg_ptr,
|
|
1408
|
+
ptr0,
|
|
1409
|
+
len0,
|
|
1410
|
+
addHeapObject(options),
|
|
1411
|
+
);
|
|
1412
|
+
return takeObject(ret);
|
|
1413
|
+
}
|
|
1414
|
+
}
|
|
1415
|
+
|
|
1321
1416
|
const CiphersClientFinalization =
|
|
1322
1417
|
typeof FinalizationRegistry === "undefined"
|
|
1323
1418
|
? { register: () => {}, unregister: () => {} }
|
|
@@ -4023,6 +4118,14 @@ export class VaultClient {
|
|
|
4023
4118
|
const ret = wasm.vaultclient_attachments(this.__wbg_ptr);
|
|
4024
4119
|
return CollectionsClient.__wrap(ret);
|
|
4025
4120
|
}
|
|
4121
|
+
/**
|
|
4122
|
+
* Cipher risk evaluation operations.
|
|
4123
|
+
* @returns {CipherRiskClient}
|
|
4124
|
+
*/
|
|
4125
|
+
cipher_risk() {
|
|
4126
|
+
const ret = wasm.vaultclient_attachments(this.__wbg_ptr);
|
|
4127
|
+
return CipherRiskClient.__wrap(ret);
|
|
4128
|
+
}
|
|
4026
4129
|
}
|
|
4027
4130
|
|
|
4028
4131
|
export function __wbg_String_8f0eb39a4a4c2f66(arg0, arg1) {
|
|
@@ -4105,7 +4208,7 @@ export function __wbg_call_7cccdd69e0791ae2() {
|
|
|
4105
4208
|
}, arguments);
|
|
4106
4209
|
}
|
|
4107
4210
|
|
|
4108
|
-
export function
|
|
4211
|
+
export function __wbg_cipher_96923fc2dc579d48(arg0) {
|
|
4109
4212
|
const ret = getObject(arg0).cipher;
|
|
4110
4213
|
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
|
4111
4214
|
}
|
|
@@ -4185,11 +4288,16 @@ export function __wbg_fetch_509096533071c657(arg0, arg1) {
|
|
|
4185
4288
|
return addHeapObject(ret);
|
|
4186
4289
|
}
|
|
4187
4290
|
|
|
4188
|
-
export function
|
|
4291
|
+
export function __wbg_folder_c5eb50a0ebf7fa65(arg0) {
|
|
4189
4292
|
const ret = getObject(arg0).folder;
|
|
4190
4293
|
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
|
4191
4294
|
}
|
|
4192
4295
|
|
|
4296
|
+
export function __wbg_getFullYear_17d3c9e4db748eb7(arg0) {
|
|
4297
|
+
const ret = getObject(arg0).getFullYear();
|
|
4298
|
+
return ret;
|
|
4299
|
+
}
|
|
4300
|
+
|
|
4193
4301
|
export function __wbg_getRandomValues_38097e921c2494c3() {
|
|
4194
4302
|
return handleError(function (arg0, arg1) {
|
|
4195
4303
|
globalThis.crypto.getRandomValues(getArrayU8FromWasm0(arg0, arg1));
|
|
@@ -4207,7 +4315,7 @@ export function __wbg_getTime_46267b1c24877e30(arg0) {
|
|
|
4207
4315
|
return ret;
|
|
4208
4316
|
}
|
|
4209
4317
|
|
|
4210
|
-
export function
|
|
4318
|
+
export function __wbg_get_2056fd6b02d0f357() {
|
|
4211
4319
|
return handleError(function (arg0, arg1, arg2) {
|
|
4212
4320
|
let deferred0_0;
|
|
4213
4321
|
let deferred0_1;
|
|
@@ -4222,19 +4330,7 @@ export function __wbg_get_1cef86ba4b924f78() {
|
|
|
4222
4330
|
}, arguments);
|
|
4223
4331
|
}
|
|
4224
4332
|
|
|
4225
|
-
export function
|
|
4226
|
-
return handleError(function (arg0, arg1) {
|
|
4227
|
-
const ret = Reflect.get(getObject(arg0), getObject(arg1));
|
|
4228
|
-
return addHeapObject(ret);
|
|
4229
|
-
}, arguments);
|
|
4230
|
-
}
|
|
4231
|
-
|
|
4232
|
-
export function __wbg_get_b9b93047fe3cf45b(arg0, arg1) {
|
|
4233
|
-
const ret = getObject(arg0)[arg1 >>> 0];
|
|
4234
|
-
return addHeapObject(ret);
|
|
4235
|
-
}
|
|
4236
|
-
|
|
4237
|
-
export function __wbg_get_c015e7c4206c8288() {
|
|
4333
|
+
export function __wbg_get_5c6c4bb616b5c6a4() {
|
|
4238
4334
|
return handleError(function (arg0, arg1, arg2) {
|
|
4239
4335
|
let deferred0_0;
|
|
4240
4336
|
let deferred0_1;
|
|
@@ -4249,7 +4345,19 @@ export function __wbg_get_c015e7c4206c8288() {
|
|
|
4249
4345
|
}, arguments);
|
|
4250
4346
|
}
|
|
4251
4347
|
|
|
4252
|
-
export function
|
|
4348
|
+
export function __wbg_get_67b2ba62fc30de12() {
|
|
4349
|
+
return handleError(function (arg0, arg1) {
|
|
4350
|
+
const ret = Reflect.get(getObject(arg0), getObject(arg1));
|
|
4351
|
+
return addHeapObject(ret);
|
|
4352
|
+
}, arguments);
|
|
4353
|
+
}
|
|
4354
|
+
|
|
4355
|
+
export function __wbg_get_b9b93047fe3cf45b(arg0, arg1) {
|
|
4356
|
+
const ret = getObject(arg0)[arg1 >>> 0];
|
|
4357
|
+
return addHeapObject(ret);
|
|
4358
|
+
}
|
|
4359
|
+
|
|
4360
|
+
export function __wbg_getaccesstoken_b35e089b44c5f7a8(arg0) {
|
|
4253
4361
|
const ret = getObject(arg0).get_access_token();
|
|
4254
4362
|
return addHeapObject(ret);
|
|
4255
4363
|
}
|
|
@@ -4434,14 +4542,14 @@ export function __wbg_length_e2d2a49132c1b256(arg0) {
|
|
|
4434
4542
|
return ret;
|
|
4435
4543
|
}
|
|
4436
4544
|
|
|
4437
|
-
export function
|
|
4545
|
+
export function __wbg_list_4a3c2a6612b6cbca() {
|
|
4438
4546
|
return handleError(function (arg0) {
|
|
4439
4547
|
const ret = getObject(arg0).list();
|
|
4440
4548
|
return addHeapObject(ret);
|
|
4441
4549
|
}, arguments);
|
|
4442
4550
|
}
|
|
4443
4551
|
|
|
4444
|
-
export function
|
|
4552
|
+
export function __wbg_list_820be49c69bdcbdb() {
|
|
4445
4553
|
return handleError(function (arg0) {
|
|
4446
4554
|
const ret = getObject(arg0).list();
|
|
4447
4555
|
return addHeapObject(ret);
|
|
@@ -4484,7 +4592,7 @@ export function __wbg_new_23a2665fac83c611(arg0, arg1) {
|
|
|
4484
4592
|
const a = state0.a;
|
|
4485
4593
|
state0.a = 0;
|
|
4486
4594
|
try {
|
|
4487
|
-
return
|
|
4595
|
+
return __wbg_adapter_352(a, state0.b, arg0, arg1);
|
|
4488
4596
|
} finally {
|
|
4489
4597
|
state0.a = a;
|
|
4490
4598
|
}
|
|
@@ -4599,6 +4707,11 @@ export function __wbg_node_905d3e251edff8a2(arg0) {
|
|
|
4599
4707
|
return addHeapObject(ret);
|
|
4600
4708
|
}
|
|
4601
4709
|
|
|
4710
|
+
export function __wbg_now_d18023d54d4e5500(arg0) {
|
|
4711
|
+
const ret = getObject(arg0).now();
|
|
4712
|
+
return ret;
|
|
4713
|
+
}
|
|
4714
|
+
|
|
4602
4715
|
export function __wbg_open_e0c0b2993eb596e1() {
|
|
4603
4716
|
return handleError(function (arg0, arg1, arg2, arg3) {
|
|
4604
4717
|
const ret = getObject(arg0).open(getStringFromWasm0(arg1, arg2), arg3 >>> 0);
|
|
@@ -4642,7 +4755,7 @@ export function __wbg_randomFillSync_ac0988aba3254290() {
|
|
|
4642
4755
|
}, arguments);
|
|
4643
4756
|
}
|
|
4644
4757
|
|
|
4645
|
-
export function
|
|
4758
|
+
export function __wbg_remove_090e82630c550385() {
|
|
4646
4759
|
return handleError(function (arg0, arg1, arg2) {
|
|
4647
4760
|
let deferred0_0;
|
|
4648
4761
|
let deferred0_1;
|
|
@@ -4657,7 +4770,7 @@ export function __wbg_remove_277c5173081d0d22() {
|
|
|
4657
4770
|
}, arguments);
|
|
4658
4771
|
}
|
|
4659
4772
|
|
|
4660
|
-
export function
|
|
4773
|
+
export function __wbg_remove_7904915df18a115f() {
|
|
4661
4774
|
return handleError(function (arg0, arg1, arg2) {
|
|
4662
4775
|
let deferred0_0;
|
|
4663
4776
|
let deferred0_1;
|
|
@@ -4711,11 +4824,7 @@ export function __wbg_set_3f1d0b984ed272ed(arg0, arg1, arg2) {
|
|
|
4711
4824
|
getObject(arg0)[takeObject(arg1)] = takeObject(arg2);
|
|
4712
4825
|
}
|
|
4713
4826
|
|
|
4714
|
-
export function
|
|
4715
|
-
getObject(arg0).set(getObject(arg1), arg2 >>> 0);
|
|
4716
|
-
}
|
|
4717
|
-
|
|
4718
|
-
export function __wbg_set_69e1ef203c553c6e() {
|
|
4827
|
+
export function __wbg_set_54d3a17a54145928() {
|
|
4719
4828
|
return handleError(function (arg0, arg1, arg2, arg3) {
|
|
4720
4829
|
let deferred0_0;
|
|
4721
4830
|
let deferred0_1;
|
|
@@ -4730,12 +4839,16 @@ export function __wbg_set_69e1ef203c553c6e() {
|
|
|
4730
4839
|
}, arguments);
|
|
4731
4840
|
}
|
|
4732
4841
|
|
|
4842
|
+
export function __wbg_set_65595bdd868b3009(arg0, arg1, arg2) {
|
|
4843
|
+
getObject(arg0).set(getObject(arg1), arg2 >>> 0);
|
|
4844
|
+
}
|
|
4845
|
+
|
|
4733
4846
|
export function __wbg_set_8fc6bf8a5b1071d1(arg0, arg1, arg2) {
|
|
4734
4847
|
const ret = getObject(arg0).set(getObject(arg1), getObject(arg2));
|
|
4735
4848
|
return addHeapObject(ret);
|
|
4736
4849
|
}
|
|
4737
4850
|
|
|
4738
|
-
export function
|
|
4851
|
+
export function __wbg_set_9207b95f2fb1d778() {
|
|
4739
4852
|
return handleError(function (arg0, arg1, arg2, arg3) {
|
|
4740
4853
|
let deferred0_0;
|
|
4741
4854
|
let deferred0_1;
|
|
@@ -4847,6 +4960,11 @@ export function __wbg_static_accessor_WINDOW_5de37043a91a9c40() {
|
|
|
4847
4960
|
return isLikeNone(ret) ? 0 : addHeapObject(ret);
|
|
4848
4961
|
}
|
|
4849
4962
|
|
|
4963
|
+
export function __wbg_static_accessor_performance_da77b3a901a72934() {
|
|
4964
|
+
const ret = performance;
|
|
4965
|
+
return addHeapObject(ret);
|
|
4966
|
+
}
|
|
4967
|
+
|
|
4850
4968
|
export function __wbg_status_f6360336ca686bf0(arg0) {
|
|
4851
4969
|
const ret = getObject(arg0).status;
|
|
4852
4970
|
return ret;
|
|
@@ -4960,28 +5078,28 @@ export function __wbindgen_cb_drop(arg0) {
|
|
|
4960
5078
|
return ret;
|
|
4961
5079
|
}
|
|
4962
5080
|
|
|
4963
|
-
export function
|
|
5081
|
+
export function __wbindgen_closure_wrapper198(arg0, arg1, arg2) {
|
|
4964
5082
|
const ret = makeMutClosure(arg0, arg1, 7, __wbg_adapter_54);
|
|
4965
5083
|
return addHeapObject(ret);
|
|
4966
5084
|
}
|
|
4967
5085
|
|
|
4968
|
-
export function
|
|
5086
|
+
export function __wbindgen_closure_wrapper200(arg0, arg1, arg2) {
|
|
4969
5087
|
const ret = makeMutClosure(arg0, arg1, 7, __wbg_adapter_57);
|
|
4970
5088
|
return addHeapObject(ret);
|
|
4971
5089
|
}
|
|
4972
5090
|
|
|
4973
|
-
export function
|
|
4974
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
5091
|
+
export function __wbindgen_closure_wrapper4244(arg0, arg1, arg2) {
|
|
5092
|
+
const ret = makeMutClosure(arg0, arg1, 349, __wbg_adapter_60);
|
|
4975
5093
|
return addHeapObject(ret);
|
|
4976
5094
|
}
|
|
4977
5095
|
|
|
4978
|
-
export function
|
|
4979
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
5096
|
+
export function __wbindgen_closure_wrapper8218(arg0, arg1, arg2) {
|
|
5097
|
+
const ret = makeMutClosure(arg0, arg1, 516, __wbg_adapter_60);
|
|
4980
5098
|
return addHeapObject(ret);
|
|
4981
5099
|
}
|
|
4982
5100
|
|
|
4983
|
-
export function
|
|
4984
|
-
const ret = makeMutClosure(arg0, arg1,
|
|
5101
|
+
export function __wbindgen_closure_wrapper8601(arg0, arg1, arg2) {
|
|
5102
|
+
const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_57);
|
|
4985
5103
|
return addHeapObject(ret);
|
|
4986
5104
|
}
|
|
4987
5105
|
|
|
Binary file
|
|
@@ -345,6 +345,8 @@ export const ciphersclient_move_to_organization: (
|
|
|
345
345
|
d: number,
|
|
346
346
|
) => void;
|
|
347
347
|
export const ciphersclient_decrypt_fido2_private_key: (a: number, b: number, c: number) => void;
|
|
348
|
+
export const cipherriskclient_password_reuse_map: (a: number, b: number, c: number) => number;
|
|
349
|
+
export const cipherriskclient_compute_risk: (a: number, b: number, c: number, d: number) => number;
|
|
348
350
|
export const foldersclient_encrypt: (a: number, b: number, c: number) => void;
|
|
349
351
|
export const foldersclient_decrypt: (a: number, b: number, c: number) => void;
|
|
350
352
|
export const foldersclient_decrypt_list: (a: number, b: number, c: number, d: number) => void;
|
|
@@ -379,6 +381,7 @@ export const isTotpError: (a: number) => number;
|
|
|
379
381
|
export const isGetFolderError: (a: number) => number;
|
|
380
382
|
export const isEditFolderError: (a: number) => number;
|
|
381
383
|
export const isCreateFolderError: (a: number) => number;
|
|
384
|
+
export const isCipherRiskError: (a: number) => number;
|
|
382
385
|
export const isGetCipherError: (a: number) => number;
|
|
383
386
|
export const isEditCipherError: (a: number) => number;
|
|
384
387
|
export const isCreateCipherError: (a: number) => number;
|
|
@@ -399,7 +402,9 @@ export const vaultclient_ciphers: (a: number) => number;
|
|
|
399
402
|
export const vaultclient_folders: (a: number) => number;
|
|
400
403
|
export const vaultclient_totp: (a: number) => number;
|
|
401
404
|
export const vaultclient_collections: (a: number) => number;
|
|
405
|
+
export const vaultclient_cipher_risk: (a: number) => number;
|
|
402
406
|
export const __wbg_foldersclient_free: (a: number, b: number) => void;
|
|
407
|
+
export const __wbg_cipherriskclient_free: (a: number, b: number) => void;
|
|
403
408
|
export const __wbg_ciphersclient_free: (a: number, b: number) => void;
|
|
404
409
|
export const __wbg_collectionsclient_free: (a: number, b: number) => void;
|
|
405
410
|
export const __wbg_vaultclient_free: (a: number, b: number) => void;
|
|
@@ -414,22 +419,22 @@ export const __wbindgen_exn_store: (a: number) => void;
|
|
|
414
419
|
export const __wbindgen_free: (a: number, b: number, c: number) => void;
|
|
415
420
|
export const __wbindgen_export_4: WebAssembly.Table;
|
|
416
421
|
export const __wbindgen_add_to_stack_pointer: (a: number) => number;
|
|
417
|
-
export const
|
|
422
|
+
export const _dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h0bf1e388b6a2a546: (
|
|
418
423
|
a: number,
|
|
419
424
|
b: number,
|
|
420
425
|
c: number,
|
|
426
|
+
d: number,
|
|
421
427
|
) => void;
|
|
422
|
-
export const
|
|
428
|
+
export const _dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h10e0c24f5f2fd803: (
|
|
423
429
|
a: number,
|
|
424
430
|
b: number,
|
|
425
431
|
c: number,
|
|
426
|
-
d: number,
|
|
427
432
|
) => void;
|
|
428
|
-
export const
|
|
433
|
+
export const _dyn_core__ops__function__FnMut_____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h1d088d25aee734e6: (
|
|
429
434
|
a: number,
|
|
430
435
|
b: number,
|
|
431
436
|
) => void;
|
|
432
|
-
export const
|
|
437
|
+
export const wasm_bindgen__convert__closures__invoke2_mut__h849ee2a9e4ae2f91: (
|
|
433
438
|
a: number,
|
|
434
439
|
b: number,
|
|
435
440
|
c: number,
|