@unwanted/matrix-sdk-mini 34.12.0-2 → 34.12.0-3

Sign up to get free protection for your applications and to get access to all the features.
Files changed (467) hide show
  1. package/git-revision.txt +1 -1
  2. package/lib/@types/global.d.js +0 -2
  3. package/lib/@types/global.d.js.map +1 -1
  4. package/lib/browser-index.d.ts.map +1 -1
  5. package/lib/browser-index.js +0 -11
  6. package/lib/browser-index.js.map +1 -1
  7. package/lib/client.d.ts +2 -1176
  8. package/lib/client.d.ts.map +1 -1
  9. package/lib/client.js +346 -2717
  10. package/lib/client.js.map +1 -1
  11. package/lib/embedded.d.ts +0 -22
  12. package/lib/embedded.d.ts.map +1 -1
  13. package/lib/embedded.js +24 -166
  14. package/lib/embedded.js.map +1 -1
  15. package/lib/event-mapper.d.ts.map +1 -1
  16. package/lib/event-mapper.js +0 -4
  17. package/lib/event-mapper.js.map +1 -1
  18. package/lib/matrix.d.ts +0 -19
  19. package/lib/matrix.d.ts.map +1 -1
  20. package/lib/matrix.js +1 -26
  21. package/lib/matrix.js.map +1 -1
  22. package/lib/models/MSC3089Branch.d.ts.map +1 -1
  23. package/lib/models/MSC3089Branch.js +0 -3
  24. package/lib/models/MSC3089Branch.js.map +1 -1
  25. package/lib/models/event.d.ts +0 -94
  26. package/lib/models/event.d.ts.map +1 -1
  27. package/lib/models/event.js +0 -274
  28. package/lib/models/event.js.map +1 -1
  29. package/lib/models/poll.d.ts.map +1 -1
  30. package/lib/models/poll.js +1 -5
  31. package/lib/models/poll.js.map +1 -1
  32. package/lib/models/relations-container.d.ts.map +1 -1
  33. package/lib/models/relations-container.js +1 -7
  34. package/lib/models/relations-container.js.map +1 -1
  35. package/lib/models/relations.d.ts +0 -1
  36. package/lib/models/relations.d.ts.map +1 -1
  37. package/lib/models/relations.js +0 -8
  38. package/lib/models/relations.js.map +1 -1
  39. package/lib/models/room-state.d.ts.map +1 -1
  40. package/lib/models/room-state.js +10 -26
  41. package/lib/models/room-state.js.map +1 -1
  42. package/lib/models/room.d.ts +0 -18
  43. package/lib/models/room.d.ts.map +1 -1
  44. package/lib/models/room.js +94 -148
  45. package/lib/models/room.js.map +1 -1
  46. package/lib/models/thread.d.ts.map +1 -1
  47. package/lib/models/thread.js +0 -1
  48. package/lib/models/thread.js.map +1 -1
  49. package/lib/sliding-sync-sdk.d.ts +2 -3
  50. package/lib/sliding-sync-sdk.d.ts.map +1 -1
  51. package/lib/sliding-sync-sdk.js +41 -90
  52. package/lib/sliding-sync-sdk.js.map +1 -1
  53. package/lib/sync.d.ts +0 -12
  54. package/lib/sync.d.ts.map +1 -1
  55. package/lib/sync.js +1 -73
  56. package/lib/sync.js.map +1 -1
  57. package/lib/testing.d.ts +0 -48
  58. package/lib/testing.d.ts.map +1 -1
  59. package/lib/testing.js +0 -105
  60. package/lib/testing.js.map +1 -1
  61. package/package.json +1 -3
  62. package/src/@types/global.d.ts +0 -3
  63. package/src/browser-index.ts +0 -11
  64. package/src/client.ts +57 -2732
  65. package/src/embedded.ts +3 -130
  66. package/src/event-mapper.ts +0 -4
  67. package/src/matrix.ts +0 -28
  68. package/src/models/MSC3089Branch.ts +0 -3
  69. package/src/models/event.ts +0 -289
  70. package/src/models/poll.ts +0 -6
  71. package/src/models/relations-container.ts +1 -8
  72. package/src/models/relations.ts +0 -8
  73. package/src/models/room-state.ts +2 -8
  74. package/src/models/room.ts +0 -62
  75. package/src/models/thread.ts +0 -1
  76. package/src/sliding-sync-sdk.ts +2 -72
  77. package/src/sync.ts +1 -98
  78. package/src/testing.ts +0 -108
  79. package/lib/@types/crypto.d.ts +0 -47
  80. package/lib/@types/crypto.d.ts.map +0 -1
  81. package/lib/@types/crypto.js +0 -1
  82. package/lib/@types/crypto.js.map +0 -1
  83. package/lib/@types/matrix-sdk-crypto-wasm.d.js +0 -1
  84. package/lib/@types/matrix-sdk-crypto-wasm.d.js.map +0 -1
  85. package/lib/common-crypto/CryptoBackend.d.ts +0 -240
  86. package/lib/common-crypto/CryptoBackend.d.ts.map +0 -1
  87. package/lib/common-crypto/CryptoBackend.js +0 -73
  88. package/lib/common-crypto/CryptoBackend.js.map +0 -1
  89. package/lib/common-crypto/key-passphrase.d.ts +0 -14
  90. package/lib/common-crypto/key-passphrase.d.ts.map +0 -1
  91. package/lib/common-crypto/key-passphrase.js +0 -33
  92. package/lib/common-crypto/key-passphrase.js.map +0 -1
  93. package/lib/crypto/CrossSigning.d.ts +0 -184
  94. package/lib/crypto/CrossSigning.d.ts.map +0 -1
  95. package/lib/crypto/CrossSigning.js +0 -718
  96. package/lib/crypto/CrossSigning.js.map +0 -1
  97. package/lib/crypto/DeviceList.d.ts +0 -216
  98. package/lib/crypto/DeviceList.d.ts.map +0 -1
  99. package/lib/crypto/DeviceList.js +0 -892
  100. package/lib/crypto/DeviceList.js.map +0 -1
  101. package/lib/crypto/EncryptionSetup.d.ts +0 -152
  102. package/lib/crypto/EncryptionSetup.d.ts.map +0 -1
  103. package/lib/crypto/EncryptionSetup.js +0 -356
  104. package/lib/crypto/EncryptionSetup.js.map +0 -1
  105. package/lib/crypto/OlmDevice.d.ts +0 -457
  106. package/lib/crypto/OlmDevice.d.ts.map +0 -1
  107. package/lib/crypto/OlmDevice.js +0 -1241
  108. package/lib/crypto/OlmDevice.js.map +0 -1
  109. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts +0 -109
  110. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts.map +0 -1
  111. package/lib/crypto/OutgoingRoomKeyRequestManager.js +0 -415
  112. package/lib/crypto/OutgoingRoomKeyRequestManager.js.map +0 -1
  113. package/lib/crypto/RoomList.d.ts +0 -26
  114. package/lib/crypto/RoomList.d.ts.map +0 -1
  115. package/lib/crypto/RoomList.js +0 -71
  116. package/lib/crypto/RoomList.js.map +0 -1
  117. package/lib/crypto/SecretSharing.d.ts +0 -24
  118. package/lib/crypto/SecretSharing.d.ts.map +0 -1
  119. package/lib/crypto/SecretSharing.js +0 -194
  120. package/lib/crypto/SecretSharing.js.map +0 -1
  121. package/lib/crypto/SecretStorage.d.ts +0 -55
  122. package/lib/crypto/SecretStorage.d.ts.map +0 -1
  123. package/lib/crypto/SecretStorage.js +0 -118
  124. package/lib/crypto/SecretStorage.js.map +0 -1
  125. package/lib/crypto/aes.d.ts +0 -6
  126. package/lib/crypto/aes.d.ts.map +0 -1
  127. package/lib/crypto/aes.js +0 -24
  128. package/lib/crypto/aes.js.map +0 -1
  129. package/lib/crypto/algorithms/base.d.ts +0 -156
  130. package/lib/crypto/algorithms/base.d.ts.map +0 -1
  131. package/lib/crypto/algorithms/base.js +0 -187
  132. package/lib/crypto/algorithms/base.js.map +0 -1
  133. package/lib/crypto/algorithms/index.d.ts +0 -4
  134. package/lib/crypto/algorithms/index.d.ts.map +0 -1
  135. package/lib/crypto/algorithms/index.js +0 -20
  136. package/lib/crypto/algorithms/index.js.map +0 -1
  137. package/lib/crypto/algorithms/megolm.d.ts +0 -385
  138. package/lib/crypto/algorithms/megolm.d.ts.map +0 -1
  139. package/lib/crypto/algorithms/megolm.js +0 -1822
  140. package/lib/crypto/algorithms/megolm.js.map +0 -1
  141. package/lib/crypto/algorithms/olm.d.ts +0 -5
  142. package/lib/crypto/algorithms/olm.d.ts.map +0 -1
  143. package/lib/crypto/algorithms/olm.js +0 -299
  144. package/lib/crypto/algorithms/olm.js.map +0 -1
  145. package/lib/crypto/api.d.ts +0 -32
  146. package/lib/crypto/api.d.ts.map +0 -1
  147. package/lib/crypto/api.js +0 -22
  148. package/lib/crypto/api.js.map +0 -1
  149. package/lib/crypto/backup.d.ts +0 -227
  150. package/lib/crypto/backup.d.ts.map +0 -1
  151. package/lib/crypto/backup.js +0 -824
  152. package/lib/crypto/backup.js.map +0 -1
  153. package/lib/crypto/crypto.d.ts +0 -3
  154. package/lib/crypto/crypto.d.ts.map +0 -1
  155. package/lib/crypto/crypto.js +0 -19
  156. package/lib/crypto/crypto.js.map +0 -1
  157. package/lib/crypto/dehydration.d.ts +0 -34
  158. package/lib/crypto/dehydration.d.ts.map +0 -1
  159. package/lib/crypto/dehydration.js +0 -252
  160. package/lib/crypto/dehydration.js.map +0 -1
  161. package/lib/crypto/device-converter.d.ts +0 -9
  162. package/lib/crypto/device-converter.d.ts.map +0 -1
  163. package/lib/crypto/device-converter.js +0 -42
  164. package/lib/crypto/device-converter.js.map +0 -1
  165. package/lib/crypto/deviceinfo.d.ts +0 -99
  166. package/lib/crypto/deviceinfo.d.ts.map +0 -1
  167. package/lib/crypto/deviceinfo.js +0 -148
  168. package/lib/crypto/deviceinfo.js.map +0 -1
  169. package/lib/crypto/index.d.ts +0 -1209
  170. package/lib/crypto/index.d.ts.map +0 -1
  171. package/lib/crypto/index.js +0 -4097
  172. package/lib/crypto/index.js.map +0 -1
  173. package/lib/crypto/key_passphrase.d.ts +0 -14
  174. package/lib/crypto/key_passphrase.d.ts.map +0 -1
  175. package/lib/crypto/key_passphrase.js +0 -44
  176. package/lib/crypto/key_passphrase.js.map +0 -1
  177. package/lib/crypto/keybackup.d.ts +0 -18
  178. package/lib/crypto/keybackup.d.ts.map +0 -1
  179. package/lib/crypto/keybackup.js +0 -1
  180. package/lib/crypto/keybackup.js.map +0 -1
  181. package/lib/crypto/olmlib.d.ts +0 -129
  182. package/lib/crypto/olmlib.d.ts.map +0 -1
  183. package/lib/crypto/olmlib.js +0 -492
  184. package/lib/crypto/olmlib.js.map +0 -1
  185. package/lib/crypto/recoverykey.d.ts +0 -2
  186. package/lib/crypto/recoverykey.d.ts.map +0 -1
  187. package/lib/crypto/recoverykey.js +0 -19
  188. package/lib/crypto/recoverykey.js.map +0 -1
  189. package/lib/crypto/store/base.d.ts +0 -252
  190. package/lib/crypto/store/base.d.ts.map +0 -1
  191. package/lib/crypto/store/base.js +0 -64
  192. package/lib/crypto/store/base.js.map +0 -1
  193. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts +0 -187
  194. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts.map +0 -1
  195. package/lib/crypto/store/indexeddb-crypto-store-backend.js +0 -1145
  196. package/lib/crypto/store/indexeddb-crypto-store-backend.js.map +0 -1
  197. package/lib/crypto/store/indexeddb-crypto-store.d.ts +0 -432
  198. package/lib/crypto/store/indexeddb-crypto-store.d.ts.map +0 -1
  199. package/lib/crypto/store/indexeddb-crypto-store.js +0 -728
  200. package/lib/crypto/store/indexeddb-crypto-store.js.map +0 -1
  201. package/lib/crypto/store/localStorage-crypto-store.d.ts +0 -119
  202. package/lib/crypto/store/localStorage-crypto-store.d.ts.map +0 -1
  203. package/lib/crypto/store/localStorage-crypto-store.js +0 -531
  204. package/lib/crypto/store/localStorage-crypto-store.js.map +0 -1
  205. package/lib/crypto/store/memory-crypto-store.d.ts +0 -215
  206. package/lib/crypto/store/memory-crypto-store.d.ts.map +0 -1
  207. package/lib/crypto/store/memory-crypto-store.js +0 -622
  208. package/lib/crypto/store/memory-crypto-store.js.map +0 -1
  209. package/lib/crypto/verification/Base.d.ts +0 -105
  210. package/lib/crypto/verification/Base.d.ts.map +0 -1
  211. package/lib/crypto/verification/Base.js +0 -372
  212. package/lib/crypto/verification/Base.js.map +0 -1
  213. package/lib/crypto/verification/Error.d.ts +0 -35
  214. package/lib/crypto/verification/Error.d.ts.map +0 -1
  215. package/lib/crypto/verification/Error.js +0 -86
  216. package/lib/crypto/verification/Error.js.map +0 -1
  217. package/lib/crypto/verification/IllegalMethod.d.ts +0 -15
  218. package/lib/crypto/verification/IllegalMethod.d.ts.map +0 -1
  219. package/lib/crypto/verification/IllegalMethod.js +0 -43
  220. package/lib/crypto/verification/IllegalMethod.js.map +0 -1
  221. package/lib/crypto/verification/QRCode.d.ts +0 -51
  222. package/lib/crypto/verification/QRCode.d.ts.map +0 -1
  223. package/lib/crypto/verification/QRCode.js +0 -277
  224. package/lib/crypto/verification/QRCode.js.map +0 -1
  225. package/lib/crypto/verification/SAS.d.ts +0 -27
  226. package/lib/crypto/verification/SAS.d.ts.map +0 -1
  227. package/lib/crypto/verification/SAS.js +0 -485
  228. package/lib/crypto/verification/SAS.js.map +0 -1
  229. package/lib/crypto/verification/SASDecimal.d.ts +0 -8
  230. package/lib/crypto/verification/SASDecimal.d.ts.map +0 -1
  231. package/lib/crypto/verification/SASDecimal.js +0 -34
  232. package/lib/crypto/verification/SASDecimal.js.map +0 -1
  233. package/lib/crypto/verification/request/Channel.d.ts +0 -18
  234. package/lib/crypto/verification/request/Channel.d.ts.map +0 -1
  235. package/lib/crypto/verification/request/Channel.js +0 -1
  236. package/lib/crypto/verification/request/Channel.js.map +0 -1
  237. package/lib/crypto/verification/request/InRoomChannel.d.ts +0 -113
  238. package/lib/crypto/verification/request/InRoomChannel.d.ts.map +0 -1
  239. package/lib/crypto/verification/request/InRoomChannel.js +0 -351
  240. package/lib/crypto/verification/request/InRoomChannel.js.map +0 -1
  241. package/lib/crypto/verification/request/ToDeviceChannel.d.ts +0 -105
  242. package/lib/crypto/verification/request/ToDeviceChannel.d.ts.map +0 -1
  243. package/lib/crypto/verification/request/ToDeviceChannel.js +0 -328
  244. package/lib/crypto/verification/request/ToDeviceChannel.js.map +0 -1
  245. package/lib/crypto/verification/request/VerificationRequest.d.ts +0 -227
  246. package/lib/crypto/verification/request/VerificationRequest.d.ts.map +0 -1
  247. package/lib/crypto/verification/request/VerificationRequest.js +0 -937
  248. package/lib/crypto/verification/request/VerificationRequest.js.map +0 -1
  249. package/lib/crypto-api/CryptoEvent.d.ts +0 -69
  250. package/lib/crypto-api/CryptoEvent.d.ts.map +0 -1
  251. package/lib/crypto-api/CryptoEvent.js +0 -33
  252. package/lib/crypto-api/CryptoEvent.js.map +0 -1
  253. package/lib/crypto-api/CryptoEventHandlerMap.d.ts +0 -16
  254. package/lib/crypto-api/CryptoEventHandlerMap.d.ts.map +0 -1
  255. package/lib/crypto-api/CryptoEventHandlerMap.js +0 -22
  256. package/lib/crypto-api/CryptoEventHandlerMap.js.map +0 -1
  257. package/lib/crypto-api/index.d.ts +0 -978
  258. package/lib/crypto-api/index.d.ts.map +0 -1
  259. package/lib/crypto-api/index.js +0 -304
  260. package/lib/crypto-api/index.js.map +0 -1
  261. package/lib/crypto-api/key-passphrase.d.ts +0 -11
  262. package/lib/crypto-api/key-passphrase.d.ts.map +0 -1
  263. package/lib/crypto-api/key-passphrase.js +0 -51
  264. package/lib/crypto-api/key-passphrase.js.map +0 -1
  265. package/lib/crypto-api/keybackup.d.ts +0 -88
  266. package/lib/crypto-api/keybackup.d.ts.map +0 -1
  267. package/lib/crypto-api/keybackup.js +0 -1
  268. package/lib/crypto-api/keybackup.js.map +0 -1
  269. package/lib/crypto-api/recovery-key.d.ts +0 -11
  270. package/lib/crypto-api/recovery-key.d.ts.map +0 -1
  271. package/lib/crypto-api/recovery-key.js +0 -65
  272. package/lib/crypto-api/recovery-key.js.map +0 -1
  273. package/lib/crypto-api/verification.d.ts +0 -344
  274. package/lib/crypto-api/verification.d.ts.map +0 -1
  275. package/lib/crypto-api/verification.js +0 -91
  276. package/lib/crypto-api/verification.js.map +0 -1
  277. package/lib/rendezvous/MSC4108SignInWithQR.d.ts +0 -112
  278. package/lib/rendezvous/MSC4108SignInWithQR.d.ts.map +0 -1
  279. package/lib/rendezvous/MSC4108SignInWithQR.js +0 -392
  280. package/lib/rendezvous/MSC4108SignInWithQR.js.map +0 -1
  281. package/lib/rendezvous/RendezvousChannel.d.ts +0 -27
  282. package/lib/rendezvous/RendezvousChannel.d.ts.map +0 -1
  283. package/lib/rendezvous/RendezvousChannel.js +0 -1
  284. package/lib/rendezvous/RendezvousChannel.js.map +0 -1
  285. package/lib/rendezvous/RendezvousCode.d.ts +0 -9
  286. package/lib/rendezvous/RendezvousCode.d.ts.map +0 -1
  287. package/lib/rendezvous/RendezvousCode.js +0 -1
  288. package/lib/rendezvous/RendezvousCode.js.map +0 -1
  289. package/lib/rendezvous/RendezvousError.d.ts +0 -6
  290. package/lib/rendezvous/RendezvousError.d.ts.map +0 -1
  291. package/lib/rendezvous/RendezvousError.js +0 -23
  292. package/lib/rendezvous/RendezvousError.js.map +0 -1
  293. package/lib/rendezvous/RendezvousFailureReason.d.ts +0 -31
  294. package/lib/rendezvous/RendezvousFailureReason.d.ts.map +0 -1
  295. package/lib/rendezvous/RendezvousFailureReason.js +0 -38
  296. package/lib/rendezvous/RendezvousFailureReason.js.map +0 -1
  297. package/lib/rendezvous/RendezvousIntent.d.ts +0 -5
  298. package/lib/rendezvous/RendezvousIntent.d.ts.map +0 -1
  299. package/lib/rendezvous/RendezvousIntent.js +0 -22
  300. package/lib/rendezvous/RendezvousIntent.js.map +0 -1
  301. package/lib/rendezvous/RendezvousTransport.d.ts +0 -36
  302. package/lib/rendezvous/RendezvousTransport.d.ts.map +0 -1
  303. package/lib/rendezvous/RendezvousTransport.js +0 -1
  304. package/lib/rendezvous/RendezvousTransport.js.map +0 -1
  305. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts +0 -58
  306. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts.map +0 -1
  307. package/lib/rendezvous/channels/MSC4108SecureChannel.js +0 -246
  308. package/lib/rendezvous/channels/MSC4108SecureChannel.js.map +0 -1
  309. package/lib/rendezvous/channels/index.d.ts +0 -2
  310. package/lib/rendezvous/channels/index.d.ts.map +0 -1
  311. package/lib/rendezvous/channels/index.js +0 -18
  312. package/lib/rendezvous/channels/index.js.map +0 -1
  313. package/lib/rendezvous/index.d.ts +0 -10
  314. package/lib/rendezvous/index.d.ts.map +0 -1
  315. package/lib/rendezvous/index.js +0 -23
  316. package/lib/rendezvous/index.js.map +0 -1
  317. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts +0 -61
  318. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts.map +0 -1
  319. package/lib/rendezvous/transports/MSC4108RendezvousSession.js +0 -253
  320. package/lib/rendezvous/transports/MSC4108RendezvousSession.js.map +0 -1
  321. package/lib/rendezvous/transports/index.d.ts +0 -2
  322. package/lib/rendezvous/transports/index.d.ts.map +0 -1
  323. package/lib/rendezvous/transports/index.js +0 -18
  324. package/lib/rendezvous/transports/index.js.map +0 -1
  325. package/lib/rust-crypto/CrossSigningIdentity.d.ts +0 -33
  326. package/lib/rust-crypto/CrossSigningIdentity.d.ts.map +0 -1
  327. package/lib/rust-crypto/CrossSigningIdentity.js +0 -157
  328. package/lib/rust-crypto/CrossSigningIdentity.js.map +0 -1
  329. package/lib/rust-crypto/DehydratedDeviceManager.d.ts +0 -98
  330. package/lib/rust-crypto/DehydratedDeviceManager.d.ts.map +0 -1
  331. package/lib/rust-crypto/DehydratedDeviceManager.js +0 -285
  332. package/lib/rust-crypto/DehydratedDeviceManager.js.map +0 -1
  333. package/lib/rust-crypto/KeyClaimManager.d.ts +0 -33
  334. package/lib/rust-crypto/KeyClaimManager.d.ts.map +0 -1
  335. package/lib/rust-crypto/KeyClaimManager.js +0 -82
  336. package/lib/rust-crypto/KeyClaimManager.js.map +0 -1
  337. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts +0 -43
  338. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts.map +0 -1
  339. package/lib/rust-crypto/OutgoingRequestProcessor.js +0 -195
  340. package/lib/rust-crypto/OutgoingRequestProcessor.js.map +0 -1
  341. package/lib/rust-crypto/OutgoingRequestsManager.d.ts +0 -47
  342. package/lib/rust-crypto/OutgoingRequestsManager.d.ts.map +0 -1
  343. package/lib/rust-crypto/OutgoingRequestsManager.js +0 -148
  344. package/lib/rust-crypto/OutgoingRequestsManager.js.map +0 -1
  345. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts +0 -120
  346. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts.map +0 -1
  347. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js +0 -467
  348. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js.map +0 -1
  349. package/lib/rust-crypto/RoomEncryptor.d.ts +0 -98
  350. package/lib/rust-crypto/RoomEncryptor.d.ts.map +0 -1
  351. package/lib/rust-crypto/RoomEncryptor.js +0 -299
  352. package/lib/rust-crypto/RoomEncryptor.js.map +0 -1
  353. package/lib/rust-crypto/backup.d.ts +0 -254
  354. package/lib/rust-crypto/backup.d.ts.map +0 -1
  355. package/lib/rust-crypto/backup.js +0 -837
  356. package/lib/rust-crypto/backup.js.map +0 -1
  357. package/lib/rust-crypto/constants.d.ts +0 -3
  358. package/lib/rust-crypto/constants.d.ts.map +0 -1
  359. package/lib/rust-crypto/constants.js +0 -19
  360. package/lib/rust-crypto/constants.js.map +0 -1
  361. package/lib/rust-crypto/device-converter.d.ts +0 -28
  362. package/lib/rust-crypto/device-converter.d.ts.map +0 -1
  363. package/lib/rust-crypto/device-converter.js +0 -123
  364. package/lib/rust-crypto/device-converter.js.map +0 -1
  365. package/lib/rust-crypto/index.d.ts +0 -61
  366. package/lib/rust-crypto/index.d.ts.map +0 -1
  367. package/lib/rust-crypto/index.js +0 -152
  368. package/lib/rust-crypto/index.js.map +0 -1
  369. package/lib/rust-crypto/libolm_migration.d.ts +0 -81
  370. package/lib/rust-crypto/libolm_migration.d.ts.map +0 -1
  371. package/lib/rust-crypto/libolm_migration.js +0 -459
  372. package/lib/rust-crypto/libolm_migration.js.map +0 -1
  373. package/lib/rust-crypto/rust-crypto.d.ts +0 -556
  374. package/lib/rust-crypto/rust-crypto.d.ts.map +0 -1
  375. package/lib/rust-crypto/rust-crypto.js +0 -2016
  376. package/lib/rust-crypto/rust-crypto.js.map +0 -1
  377. package/lib/rust-crypto/secret-storage.d.ts +0 -22
  378. package/lib/rust-crypto/secret-storage.d.ts.map +0 -1
  379. package/lib/rust-crypto/secret-storage.js +0 -63
  380. package/lib/rust-crypto/secret-storage.js.map +0 -1
  381. package/lib/rust-crypto/verification.d.ts +0 -319
  382. package/lib/rust-crypto/verification.d.ts.map +0 -1
  383. package/lib/rust-crypto/verification.js +0 -816
  384. package/lib/rust-crypto/verification.js.map +0 -1
  385. package/lib/secret-storage.d.ts +0 -370
  386. package/lib/secret-storage.d.ts.map +0 -1
  387. package/lib/secret-storage.js +0 -466
  388. package/lib/secret-storage.js.map +0 -1
  389. package/src/@types/crypto.ts +0 -73
  390. package/src/@types/matrix-sdk-crypto-wasm.d.ts +0 -44
  391. package/src/common-crypto/CryptoBackend.ts +0 -302
  392. package/src/common-crypto/README.md +0 -4
  393. package/src/common-crypto/key-passphrase.ts +0 -43
  394. package/src/crypto/CrossSigning.ts +0 -773
  395. package/src/crypto/DeviceList.ts +0 -989
  396. package/src/crypto/EncryptionSetup.ts +0 -351
  397. package/src/crypto/OlmDevice.ts +0 -1500
  398. package/src/crypto/OutgoingRoomKeyRequestManager.ts +0 -485
  399. package/src/crypto/RoomList.ts +0 -70
  400. package/src/crypto/SecretSharing.ts +0 -240
  401. package/src/crypto/SecretStorage.ts +0 -136
  402. package/src/crypto/aes.ts +0 -23
  403. package/src/crypto/algorithms/base.ts +0 -236
  404. package/src/crypto/algorithms/index.ts +0 -20
  405. package/src/crypto/algorithms/megolm.ts +0 -2216
  406. package/src/crypto/algorithms/olm.ts +0 -381
  407. package/src/crypto/api.ts +0 -70
  408. package/src/crypto/backup.ts +0 -922
  409. package/src/crypto/crypto.ts +0 -18
  410. package/src/crypto/dehydration.ts +0 -272
  411. package/src/crypto/device-converter.ts +0 -45
  412. package/src/crypto/deviceinfo.ts +0 -158
  413. package/src/crypto/index.ts +0 -4414
  414. package/src/crypto/key_passphrase.ts +0 -42
  415. package/src/crypto/keybackup.ts +0 -47
  416. package/src/crypto/olmlib.ts +0 -539
  417. package/src/crypto/recoverykey.ts +0 -18
  418. package/src/crypto/store/base.ts +0 -348
  419. package/src/crypto/store/indexeddb-crypto-store-backend.ts +0 -1250
  420. package/src/crypto/store/indexeddb-crypto-store.ts +0 -845
  421. package/src/crypto/store/localStorage-crypto-store.ts +0 -579
  422. package/src/crypto/store/memory-crypto-store.ts +0 -680
  423. package/src/crypto/verification/Base.ts +0 -409
  424. package/src/crypto/verification/Error.ts +0 -76
  425. package/src/crypto/verification/IllegalMethod.ts +0 -50
  426. package/src/crypto/verification/QRCode.ts +0 -310
  427. package/src/crypto/verification/SAS.ts +0 -494
  428. package/src/crypto/verification/SASDecimal.ts +0 -37
  429. package/src/crypto/verification/request/Channel.ts +0 -34
  430. package/src/crypto/verification/request/InRoomChannel.ts +0 -371
  431. package/src/crypto/verification/request/ToDeviceChannel.ts +0 -354
  432. package/src/crypto/verification/request/VerificationRequest.ts +0 -976
  433. package/src/crypto-api/CryptoEvent.ts +0 -93
  434. package/src/crypto-api/CryptoEventHandlerMap.ts +0 -32
  435. package/src/crypto-api/index.ts +0 -1175
  436. package/src/crypto-api/key-passphrase.ts +0 -58
  437. package/src/crypto-api/keybackup.ts +0 -115
  438. package/src/crypto-api/recovery-key.ts +0 -69
  439. package/src/crypto-api/verification.ts +0 -408
  440. package/src/rendezvous/MSC4108SignInWithQR.ts +0 -444
  441. package/src/rendezvous/RendezvousChannel.ts +0 -48
  442. package/src/rendezvous/RendezvousCode.ts +0 -25
  443. package/src/rendezvous/RendezvousError.ts +0 -26
  444. package/src/rendezvous/RendezvousFailureReason.ts +0 -49
  445. package/src/rendezvous/RendezvousIntent.ts +0 -20
  446. package/src/rendezvous/RendezvousTransport.ts +0 -58
  447. package/src/rendezvous/channels/MSC4108SecureChannel.ts +0 -270
  448. package/src/rendezvous/channels/index.ts +0 -17
  449. package/src/rendezvous/index.ts +0 -25
  450. package/src/rendezvous/transports/MSC4108RendezvousSession.ts +0 -270
  451. package/src/rendezvous/transports/index.ts +0 -17
  452. package/src/rust-crypto/CrossSigningIdentity.ts +0 -183
  453. package/src/rust-crypto/DehydratedDeviceManager.ts +0 -306
  454. package/src/rust-crypto/KeyClaimManager.ts +0 -86
  455. package/src/rust-crypto/OutgoingRequestProcessor.ts +0 -236
  456. package/src/rust-crypto/OutgoingRequestsManager.ts +0 -143
  457. package/src/rust-crypto/PerSessionKeyBackupDownloader.ts +0 -501
  458. package/src/rust-crypto/RoomEncryptor.ts +0 -352
  459. package/src/rust-crypto/backup.ts +0 -881
  460. package/src/rust-crypto/constants.ts +0 -18
  461. package/src/rust-crypto/device-converter.ts +0 -128
  462. package/src/rust-crypto/index.ts +0 -237
  463. package/src/rust-crypto/libolm_migration.ts +0 -530
  464. package/src/rust-crypto/rust-crypto.ts +0 -2205
  465. package/src/rust-crypto/secret-storage.ts +0 -60
  466. package/src/rust-crypto/verification.ts +0 -830
  467. package/src/secret-storage.ts +0 -693
@@ -1,1500 +0,0 @@
1
- /*
2
- Copyright 2016 - 2021 The Matrix.org Foundation C.I.C.
3
-
4
- Licensed under the Apache License, Version 2.0 (the "License");
5
- you may not use this file except in compliance with the License.
6
- You may obtain a copy of the License at
7
-
8
- http://www.apache.org/licenses/LICENSE-2.0
9
-
10
- Unless required by applicable law or agreed to in writing, software
11
- distributed under the License is distributed on an "AS IS" BASIS,
12
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
- See the License for the specific language governing permissions and
14
- limitations under the License.
15
- */
16
-
17
- import { Account, InboundGroupSession, OutboundGroupSession, Session, Utility } from "@matrix-org/olm";
18
-
19
- import { logger, Logger } from "../logger.ts";
20
- import { IndexedDBCryptoStore } from "./store/indexeddb-crypto-store.ts";
21
- import { CryptoStore, IProblem, ISessionInfo, IWithheld } from "./store/base.ts";
22
- import { IOlmDevice, IOutboundGroupSessionKey } from "./algorithms/megolm.ts";
23
- import { IMegolmSessionData, OlmGroupSessionExtraData } from "../@types/crypto.ts";
24
- import { IMessage } from "./algorithms/olm.ts";
25
- import { DecryptionFailureCode } from "../crypto-api/index.ts";
26
- import { DecryptionError } from "../common-crypto/CryptoBackend.ts";
27
-
28
- // The maximum size of an event is 65K, and we base64 the content, so this is a
29
- // reasonable approximation to the biggest plaintext we can encrypt.
30
- const MAX_PLAINTEXT_LENGTH = (65536 * 3) / 4;
31
-
32
- export class PayloadTooLargeError extends Error {
33
- public readonly data = {
34
- errcode: "M_TOO_LARGE",
35
- error: "Payload too large for encrypted message",
36
- };
37
- }
38
-
39
- function checkPayloadLength(payloadString: string): void {
40
- if (payloadString === undefined) {
41
- throw new Error("payloadString undefined");
42
- }
43
-
44
- if (payloadString.length > MAX_PLAINTEXT_LENGTH) {
45
- // might as well fail early here rather than letting the olm library throw
46
- // a cryptic memory allocation error.
47
- //
48
- // Note that even if we manage to do the encryption, the message send may fail,
49
- // because by the time we've wrapped the ciphertext in the event object, it may
50
- // exceed 65K. But at least we won't just fail with "abort()" in that case.
51
- throw new PayloadTooLargeError(
52
- `Message too long (${payloadString.length} bytes). ` +
53
- `The maximum for an encrypted message is ${MAX_PLAINTEXT_LENGTH} bytes.`,
54
- );
55
- }
56
- }
57
-
58
- interface IInitOpts {
59
- /**
60
- * (Optional) data from exported device that must be re-created.
61
- * If present, opts.pickleKey is ignored (exported data already provides a pickle key)
62
- */
63
- fromExportedDevice?: IExportedDevice;
64
- /**
65
- * (Optional) pickle key to set instead of default one
66
- */
67
- pickleKey?: string;
68
- }
69
-
70
- /** data stored in the session store about an inbound group session */
71
- export interface InboundGroupSessionData {
72
- room_id: string; // eslint-disable-line camelcase
73
- /** pickled Olm.InboundGroupSession */
74
- session: string;
75
- keysClaimed?: Record<string, string>;
76
- /** Devices involved in forwarding this session to us (normally empty). */
77
- forwardingCurve25519KeyChain: string[];
78
- /** whether this session is untrusted. */
79
- untrusted?: boolean;
80
- /** whether this session exists during the room being set to shared history. */
81
- sharedHistory?: boolean;
82
- }
83
-
84
- export interface IDecryptedGroupMessage {
85
- result: string;
86
- keysClaimed: Record<string, string>;
87
- senderKey: string;
88
- forwardingCurve25519KeyChain: string[];
89
- untrusted: boolean;
90
- }
91
-
92
- export interface IInboundSession {
93
- payload: string;
94
- session_id: string;
95
- }
96
-
97
- export interface IExportedDevice {
98
- pickleKey: string;
99
- pickledAccount: string;
100
- sessions: ISessionInfo[];
101
- }
102
-
103
- interface IUnpickledSessionInfo extends Omit<ISessionInfo, "session"> {
104
- session: Session;
105
- }
106
-
107
- /* eslint-disable camelcase */
108
- interface IInboundGroupSessionKey {
109
- chain_index: number;
110
- key: string;
111
- forwarding_curve25519_key_chain: string[];
112
- sender_claimed_ed25519_key: string | null;
113
- shared_history: boolean;
114
- untrusted?: boolean;
115
- }
116
- /* eslint-enable camelcase */
117
-
118
- type OneTimeKeys = { curve25519: { [keyId: string]: string } };
119
-
120
- /**
121
- * Manages the olm cryptography functions. Each OlmDevice has a single
122
- * OlmAccount and a number of OlmSessions.
123
- *
124
- * Accounts and sessions are kept pickled in the cryptoStore.
125
- */
126
- export class OlmDevice {
127
- public pickleKey = "DEFAULT_KEY"; // set by consumers
128
-
129
- /** Curve25519 key for the account, unknown until we load the account from storage in init() */
130
- public deviceCurve25519Key: string | null = null;
131
- /** Ed25519 key for the account, unknown until we load the account from storage in init() */
132
- public deviceEd25519Key: string | null = null;
133
- private maxOneTimeKeys: number | null = null;
134
-
135
- // we don't bother stashing outboundgroupsessions in the cryptoStore -
136
- // instead we keep them here.
137
- private outboundGroupSessionStore: Record<string, string> = {};
138
-
139
- // Store a set of decrypted message indexes for each group session.
140
- // This partially mitigates a replay attack where a MITM resends a group
141
- // message into the room.
142
- //
143
- // When we decrypt a message and the message index matches a previously
144
- // decrypted message, one possible cause of that is that we are decrypting
145
- // the same event, and may not indicate an actual replay attack. For
146
- // example, this could happen if we receive events, forget about them, and
147
- // then re-fetch them when we backfill. So we store the event ID and
148
- // timestamp corresponding to each message index when we first decrypt it,
149
- // and compare these against the event ID and timestamp every time we use
150
- // that same index. If they match, then we're probably decrypting the same
151
- // event and we don't consider it a replay attack.
152
- //
153
- // Keys are strings of form "<senderKey>|<session_id>|<message_index>"
154
- // Values are objects of the form "{id: <event id>, timestamp: <ts>}"
155
- private inboundGroupSessionMessageIndexes: Record<string, { id: string; timestamp: number }> = {};
156
-
157
- // Keep track of sessions that we're starting, so that we don't start
158
- // multiple sessions for the same device at the same time.
159
- public sessionsInProgress: Record<string, Promise<void>> = {}; // set by consumers
160
-
161
- // Used by olm to serialise prekey message decryptions
162
- public olmPrekeyPromise: Promise<any> = Promise.resolve(); // set by consumers
163
-
164
- public constructor(private readonly cryptoStore: CryptoStore) {}
165
-
166
- /**
167
- * @returns The version of Olm.
168
- */
169
- public static getOlmVersion(): [number, number, number] {
170
- return globalThis.Olm.get_library_version();
171
- }
172
-
173
- /**
174
- * Initialise the OlmAccount. This must be called before any other operations
175
- * on the OlmDevice.
176
- *
177
- * Data from an exported Olm device can be provided
178
- * in order to re-create this device.
179
- *
180
- * Attempts to load the OlmAccount from the crypto store, or creates one if none is
181
- * found.
182
- *
183
- * Reads the device keys from the OlmAccount object.
184
- *
185
- * @param IInitOpts - opts to initialise the OlmAccount with
186
- */
187
- public async init({ pickleKey, fromExportedDevice }: IInitOpts = {}): Promise<void> {
188
- let e2eKeys;
189
- const account = new globalThis.Olm.Account();
190
-
191
- try {
192
- if (fromExportedDevice) {
193
- if (pickleKey) {
194
- logger.warn("ignoring opts.pickleKey" + " because opts.fromExportedDevice is present.");
195
- }
196
- this.pickleKey = fromExportedDevice.pickleKey;
197
- await this.initialiseFromExportedDevice(fromExportedDevice, account);
198
- } else {
199
- if (pickleKey) {
200
- this.pickleKey = pickleKey;
201
- }
202
- await this.initialiseAccount(account);
203
- }
204
- e2eKeys = JSON.parse(account.identity_keys());
205
-
206
- this.maxOneTimeKeys = account.max_number_of_one_time_keys();
207
- } finally {
208
- account.free();
209
- }
210
-
211
- this.deviceCurve25519Key = e2eKeys.curve25519;
212
- this.deviceEd25519Key = e2eKeys.ed25519;
213
- }
214
-
215
- /**
216
- * Populates the crypto store using data that was exported from an existing device.
217
- * Note that for now only the “account” and “sessions” stores are populated;
218
- * Other stores will be as with a new device.
219
- *
220
- * @param exportedData - Data exported from another device
221
- * through the “export” method.
222
- * @param account - an olm account to initialize
223
- */
224
- private async initialiseFromExportedDevice(exportedData: IExportedDevice, account: Account): Promise<void> {
225
- await this.cryptoStore.doTxn(
226
- "readwrite",
227
- [IndexedDBCryptoStore.STORE_ACCOUNT, IndexedDBCryptoStore.STORE_SESSIONS],
228
- (txn) => {
229
- this.cryptoStore.storeAccount(txn, exportedData.pickledAccount);
230
- exportedData.sessions.forEach((session) => {
231
- const { deviceKey, sessionId } = session;
232
- const sessionInfo = {
233
- session: session.session,
234
- lastReceivedMessageTs: session.lastReceivedMessageTs,
235
- };
236
- this.cryptoStore.storeEndToEndSession(deviceKey!, sessionId!, sessionInfo, txn);
237
- });
238
- },
239
- );
240
- account.unpickle(this.pickleKey, exportedData.pickledAccount);
241
- }
242
-
243
- private async initialiseAccount(account: Account): Promise<void> {
244
- await this.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
245
- this.cryptoStore.getAccount(txn, (pickledAccount) => {
246
- if (pickledAccount !== null) {
247
- account.unpickle(this.pickleKey, pickledAccount);
248
- } else {
249
- account.create();
250
- pickledAccount = account.pickle(this.pickleKey);
251
- this.cryptoStore.storeAccount(txn, pickledAccount);
252
- }
253
- });
254
- });
255
- }
256
-
257
- /**
258
- * extract our OlmAccount from the crypto store and call the given function
259
- * with the account object
260
- * The `account` object is usable only within the callback passed to this
261
- * function and will be freed as soon the callback returns. It is *not*
262
- * usable for the rest of the lifetime of the transaction.
263
- * This function requires a live transaction object from cryptoStore.doTxn()
264
- * and therefore may only be called in a doTxn() callback.
265
- *
266
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
267
- * @internal
268
- */
269
- private getAccount(txn: unknown, func: (account: Account) => void): void {
270
- this.cryptoStore.getAccount(txn, (pickledAccount: string | null) => {
271
- const account = new globalThis.Olm.Account();
272
- try {
273
- account.unpickle(this.pickleKey, pickledAccount!);
274
- func(account);
275
- } finally {
276
- account.free();
277
- }
278
- });
279
- }
280
-
281
- /*
282
- * Saves an account to the crypto store.
283
- * This function requires a live transaction object from cryptoStore.doTxn()
284
- * and therefore may only be called in a doTxn() callback.
285
- *
286
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
287
- * @param Olm.Account object
288
- * @internal
289
- */
290
- private storeAccount(txn: unknown, account: Account): void {
291
- this.cryptoStore.storeAccount(txn, account.pickle(this.pickleKey));
292
- }
293
-
294
- /**
295
- * Export data for re-creating the Olm device later.
296
- * TODO export data other than just account and (P2P) sessions.
297
- *
298
- * @returns The exported data
299
- */
300
- public async export(): Promise<IExportedDevice> {
301
- const result: Partial<IExportedDevice> = {
302
- pickleKey: this.pickleKey,
303
- };
304
-
305
- await this.cryptoStore.doTxn(
306
- "readonly",
307
- [IndexedDBCryptoStore.STORE_ACCOUNT, IndexedDBCryptoStore.STORE_SESSIONS],
308
- (txn) => {
309
- this.cryptoStore.getAccount(txn, (pickledAccount: string | null) => {
310
- result.pickledAccount = pickledAccount!;
311
- });
312
- result.sessions = [];
313
- // Note that the pickledSession object we get in the callback
314
- // is not exactly the same thing you get in method _getSession
315
- // see documentation of IndexedDBCryptoStore.getAllEndToEndSessions
316
- this.cryptoStore.getAllEndToEndSessions(txn, (pickledSession) => {
317
- result.sessions!.push(pickledSession!);
318
- });
319
- },
320
- );
321
- return result as IExportedDevice;
322
- }
323
-
324
- /**
325
- * extract an OlmSession from the session store and call the given function
326
- * The session is usable only within the callback passed to this
327
- * function and will be freed as soon the callback returns. It is *not*
328
- * usable for the rest of the lifetime of the transaction.
329
- *
330
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
331
- * @internal
332
- */
333
- private getSession(
334
- deviceKey: string,
335
- sessionId: string,
336
- txn: unknown,
337
- func: (unpickledSessionInfo: IUnpickledSessionInfo) => void,
338
- ): void {
339
- this.cryptoStore.getEndToEndSession(deviceKey, sessionId, txn, (sessionInfo: ISessionInfo | null) => {
340
- this.unpickleSession(sessionInfo!, func);
341
- });
342
- }
343
-
344
- /**
345
- * Creates a session object from a session pickle and executes the given
346
- * function with it. The session object is destroyed once the function
347
- * returns.
348
- *
349
- * @internal
350
- */
351
- private unpickleSession(
352
- sessionInfo: ISessionInfo,
353
- func: (unpickledSessionInfo: IUnpickledSessionInfo) => void,
354
- ): void {
355
- const session = new globalThis.Olm.Session();
356
- try {
357
- session.unpickle(this.pickleKey, sessionInfo.session!);
358
- const unpickledSessInfo: IUnpickledSessionInfo = Object.assign({}, sessionInfo, { session });
359
-
360
- func(unpickledSessInfo);
361
- } finally {
362
- session.free();
363
- }
364
- }
365
-
366
- /**
367
- * store our OlmSession in the session store
368
- *
369
- * @param sessionInfo - `{session: OlmSession, lastReceivedMessageTs: int}`
370
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
371
- * @internal
372
- */
373
- private saveSession(deviceKey: string, sessionInfo: IUnpickledSessionInfo, txn: unknown): void {
374
- const sessionId = sessionInfo.session.session_id();
375
- logger.debug(`Saving Olm session ${sessionId} with device ${deviceKey}: ${sessionInfo.session.describe()}`);
376
-
377
- // Why do we re-use the input object for this, overwriting the same key with a different
378
- // type? Is it because we want to erase the unpickled session to enforce that it's no longer
379
- // used? A comment would be great.
380
- const pickledSessionInfo = Object.assign(sessionInfo, {
381
- session: sessionInfo.session.pickle(this.pickleKey),
382
- });
383
- this.cryptoStore.storeEndToEndSession(deviceKey, sessionId, pickledSessionInfo, txn);
384
- }
385
-
386
- /**
387
- * get an OlmUtility and call the given function
388
- *
389
- * @returns result of func
390
- * @internal
391
- */
392
- private getUtility<T>(func: (utility: Utility) => T): T {
393
- const utility = new globalThis.Olm.Utility();
394
- try {
395
- return func(utility);
396
- } finally {
397
- utility.free();
398
- }
399
- }
400
-
401
- /**
402
- * Signs a message with the ed25519 key for this account.
403
- *
404
- * @param message - message to be signed
405
- * @returns base64-encoded signature
406
- */
407
- public async sign(message: string): Promise<string> {
408
- let result: string;
409
- await this.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
410
- this.getAccount(txn, (account: Account) => {
411
- result = account.sign(message);
412
- });
413
- });
414
- return result!;
415
- }
416
-
417
- /**
418
- * Get the current (unused, unpublished) one-time keys for this account.
419
- *
420
- * @returns one time keys; an object with the single property
421
- * <tt>curve25519</tt>, which is itself an object mapping key id to Curve25519
422
- * key.
423
- */
424
- public async getOneTimeKeys(): Promise<OneTimeKeys> {
425
- let result: OneTimeKeys;
426
- await this.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
427
- this.getAccount(txn, (account) => {
428
- result = JSON.parse(account.one_time_keys());
429
- });
430
- });
431
-
432
- return result!;
433
- }
434
-
435
- /**
436
- * Get the maximum number of one-time keys we can store.
437
- *
438
- * @returns number of keys
439
- */
440
- public maxNumberOfOneTimeKeys(): number {
441
- return this.maxOneTimeKeys ?? -1;
442
- }
443
-
444
- /**
445
- * Marks all of the one-time keys as published.
446
- */
447
- public async markKeysAsPublished(): Promise<void> {
448
- await this.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
449
- this.getAccount(txn, (account: Account) => {
450
- account.mark_keys_as_published();
451
- this.storeAccount(txn, account);
452
- });
453
- });
454
- }
455
-
456
- /**
457
- * Generate some new one-time keys
458
- *
459
- * @param numKeys - number of keys to generate
460
- * @returns Resolved once the account is saved back having generated the keys
461
- */
462
- public generateOneTimeKeys(numKeys: number): Promise<void> {
463
- return this.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
464
- this.getAccount(txn, (account) => {
465
- account.generate_one_time_keys(numKeys);
466
- this.storeAccount(txn, account);
467
- });
468
- });
469
- }
470
-
471
- /**
472
- * Generate a new fallback keys
473
- *
474
- * @returns Resolved once the account is saved back having generated the key
475
- */
476
- public async generateFallbackKey(): Promise<void> {
477
- await this.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
478
- this.getAccount(txn, (account) => {
479
- account.generate_fallback_key();
480
- this.storeAccount(txn, account);
481
- });
482
- });
483
- }
484
-
485
- public async getFallbackKey(): Promise<Record<string, Record<string, string>>> {
486
- let result: Record<string, Record<string, string>>;
487
- await this.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
488
- this.getAccount(txn, (account: Account) => {
489
- result = JSON.parse(account.unpublished_fallback_key());
490
- });
491
- });
492
- return result!;
493
- }
494
-
495
- public async forgetOldFallbackKey(): Promise<void> {
496
- await this.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], (txn) => {
497
- this.getAccount(txn, (account: Account) => {
498
- account.forget_old_fallback_key();
499
- this.storeAccount(txn, account);
500
- });
501
- });
502
- }
503
-
504
- /**
505
- * Generate a new outbound session
506
- *
507
- * The new session will be stored in the cryptoStore.
508
- *
509
- * @param theirIdentityKey - remote user's Curve25519 identity key
510
- * @param theirOneTimeKey - remote user's one-time Curve25519 key
511
- * @returns sessionId for the outbound session.
512
- */
513
- public async createOutboundSession(theirIdentityKey: string, theirOneTimeKey: string): Promise<string> {
514
- let newSessionId: string;
515
- await this.cryptoStore.doTxn(
516
- "readwrite",
517
- [IndexedDBCryptoStore.STORE_ACCOUNT, IndexedDBCryptoStore.STORE_SESSIONS],
518
- (txn) => {
519
- this.getAccount(txn, (account: Account) => {
520
- const session = new globalThis.Olm.Session();
521
- try {
522
- session.create_outbound(account, theirIdentityKey, theirOneTimeKey);
523
- newSessionId = session.session_id();
524
- this.storeAccount(txn, account);
525
- const sessionInfo: IUnpickledSessionInfo = {
526
- session,
527
- // Pretend we've received a message at this point, otherwise
528
- // if we try to send a message to the device, it won't use
529
- // this session
530
- lastReceivedMessageTs: Date.now(),
531
- };
532
- this.saveSession(theirIdentityKey, sessionInfo, txn);
533
- } finally {
534
- session.free();
535
- }
536
- });
537
- },
538
- logger.getChild("[createOutboundSession]"),
539
- );
540
- return newSessionId!;
541
- }
542
-
543
- /**
544
- * Generate a new inbound session, given an incoming message
545
- *
546
- * @param theirDeviceIdentityKey - remote user's Curve25519 identity key
547
- * @param messageType - messageType field from the received message (must be 0)
548
- * @param ciphertext - base64-encoded body from the received message
549
- *
550
- * @returns decrypted payload, and
551
- * session id of new session
552
- *
553
- * @throws Error if the received message was not valid (for instance, it didn't use a valid one-time key).
554
- */
555
- public async createInboundSession(
556
- theirDeviceIdentityKey: string,
557
- messageType: number,
558
- ciphertext: string,
559
- ): Promise<IInboundSession> {
560
- if (messageType !== 0) {
561
- throw new Error("Need messageType == 0 to create inbound session");
562
- }
563
-
564
- let result: { payload: string; session_id: string }; // eslint-disable-line camelcase
565
- await this.cryptoStore.doTxn(
566
- "readwrite",
567
- [IndexedDBCryptoStore.STORE_ACCOUNT, IndexedDBCryptoStore.STORE_SESSIONS],
568
- (txn) => {
569
- this.getAccount(txn, (account: Account) => {
570
- const session = new globalThis.Olm.Session();
571
- try {
572
- session.create_inbound_from(account, theirDeviceIdentityKey, ciphertext);
573
- account.remove_one_time_keys(session);
574
- this.storeAccount(txn, account);
575
-
576
- const payloadString = session.decrypt(messageType, ciphertext);
577
-
578
- const sessionInfo: IUnpickledSessionInfo = {
579
- session,
580
- // this counts as a received message: set last received message time
581
- // to now
582
- lastReceivedMessageTs: Date.now(),
583
- };
584
- this.saveSession(theirDeviceIdentityKey, sessionInfo, txn);
585
-
586
- result = {
587
- payload: payloadString,
588
- session_id: session.session_id(),
589
- };
590
- } finally {
591
- session.free();
592
- }
593
- });
594
- },
595
- logger.getChild("[createInboundSession]"),
596
- );
597
-
598
- return result!;
599
- }
600
-
601
- /**
602
- * Get a list of known session IDs for the given device
603
- *
604
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
605
- * remote device
606
- * @returns a list of known session ids for the device
607
- */
608
- public async getSessionIdsForDevice(theirDeviceIdentityKey: string): Promise<string[]> {
609
- const log = logger.getChild("[getSessionIdsForDevice]");
610
-
611
- if (theirDeviceIdentityKey in this.sessionsInProgress) {
612
- log.debug(`Waiting for Olm session for ${theirDeviceIdentityKey} to be created`);
613
- try {
614
- await this.sessionsInProgress[theirDeviceIdentityKey];
615
- } catch {
616
- // if the session failed to be created, just fall through and
617
- // return an empty result
618
- }
619
- }
620
- let sessionIds: string[];
621
- await this.cryptoStore.doTxn(
622
- "readonly",
623
- [IndexedDBCryptoStore.STORE_SESSIONS],
624
- (txn) => {
625
- this.cryptoStore.getEndToEndSessions(theirDeviceIdentityKey, txn, (sessions) => {
626
- sessionIds = Object.keys(sessions);
627
- });
628
- },
629
- log,
630
- );
631
-
632
- return sessionIds!;
633
- }
634
-
635
- /**
636
- * Get the right olm session id for encrypting messages to the given identity key
637
- *
638
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
639
- * remote device
640
- * @param nowait - Don't wait for an in-progress session to complete.
641
- * This should only be set to true of the calling function is the function
642
- * that marked the session as being in-progress.
643
- * @param log - A possibly customised log
644
- * @returns session id, or null if no established session
645
- */
646
- public async getSessionIdForDevice(
647
- theirDeviceIdentityKey: string,
648
- nowait = false,
649
- log?: Logger,
650
- ): Promise<string | null> {
651
- const sessionInfos = await this.getSessionInfoForDevice(theirDeviceIdentityKey, nowait, log);
652
-
653
- if (sessionInfos.length === 0) {
654
- return null;
655
- }
656
- // Use the session that has most recently received a message
657
- let idxOfBest = 0;
658
- for (let i = 1; i < sessionInfos.length; i++) {
659
- const thisSessInfo = sessionInfos[i];
660
- const thisLastReceived =
661
- thisSessInfo.lastReceivedMessageTs === undefined ? 0 : thisSessInfo.lastReceivedMessageTs;
662
-
663
- const bestSessInfo = sessionInfos[idxOfBest];
664
- const bestLastReceived =
665
- bestSessInfo.lastReceivedMessageTs === undefined ? 0 : bestSessInfo.lastReceivedMessageTs;
666
- if (
667
- thisLastReceived > bestLastReceived ||
668
- (thisLastReceived === bestLastReceived && thisSessInfo.sessionId < bestSessInfo.sessionId)
669
- ) {
670
- idxOfBest = i;
671
- }
672
- }
673
- return sessionInfos[idxOfBest].sessionId;
674
- }
675
-
676
- /**
677
- * Get information on the active Olm sessions for a device.
678
- * <p>
679
- * Returns an array, with an entry for each active session. The first entry in
680
- * the result will be the one used for outgoing messages. Each entry contains
681
- * the keys 'hasReceivedMessage' (true if the session has received an incoming
682
- * message and is therefore past the pre-key stage), and 'sessionId'.
683
- *
684
- * @param deviceIdentityKey - Curve25519 identity key for the device
685
- * @param nowait - Don't wait for an in-progress session to complete.
686
- * This should only be set to true of the calling function is the function
687
- * that marked the session as being in-progress.
688
- * @param log - A possibly customised log
689
- */
690
- public async getSessionInfoForDevice(
691
- deviceIdentityKey: string,
692
- nowait = false,
693
- log: Logger = logger,
694
- ): Promise<{ sessionId: string; lastReceivedMessageTs: number; hasReceivedMessage: boolean }[]> {
695
- log = log.getChild("[getSessionInfoForDevice]");
696
-
697
- if (deviceIdentityKey in this.sessionsInProgress && !nowait) {
698
- log.debug(`Waiting for Olm session for ${deviceIdentityKey} to be created`);
699
- try {
700
- await this.sessionsInProgress[deviceIdentityKey];
701
- } catch {
702
- // if the session failed to be created, then just fall through and
703
- // return an empty result
704
- }
705
- }
706
- const info: {
707
- lastReceivedMessageTs: number;
708
- hasReceivedMessage: boolean;
709
- sessionId: string;
710
- }[] = [];
711
-
712
- await this.cryptoStore.doTxn(
713
- "readonly",
714
- [IndexedDBCryptoStore.STORE_SESSIONS],
715
- (txn) => {
716
- this.cryptoStore.getEndToEndSessions(deviceIdentityKey, txn, (sessions) => {
717
- const sessionIds = Object.keys(sessions).sort();
718
- for (const sessionId of sessionIds) {
719
- this.unpickleSession(sessions[sessionId], (sessInfo: IUnpickledSessionInfo) => {
720
- info.push({
721
- lastReceivedMessageTs: sessInfo.lastReceivedMessageTs!,
722
- hasReceivedMessage: sessInfo.session.has_received_message(),
723
- sessionId,
724
- });
725
- });
726
- }
727
- });
728
- },
729
- log,
730
- );
731
-
732
- return info;
733
- }
734
-
735
- /**
736
- * Encrypt an outgoing message using an existing session
737
- *
738
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
739
- * remote device
740
- * @param sessionId - the id of the active session
741
- * @param payloadString - payload to be encrypted and sent
742
- *
743
- * @returns ciphertext
744
- */
745
- public async encryptMessage(
746
- theirDeviceIdentityKey: string,
747
- sessionId: string,
748
- payloadString: string,
749
- ): Promise<IMessage> {
750
- checkPayloadLength(payloadString);
751
-
752
- let res: IMessage;
753
- await this.cryptoStore.doTxn(
754
- "readwrite",
755
- [IndexedDBCryptoStore.STORE_SESSIONS],
756
- (txn) => {
757
- this.getSession(theirDeviceIdentityKey, sessionId, txn, (sessionInfo) => {
758
- const sessionDesc = sessionInfo.session.describe();
759
- logger.log(
760
- "encryptMessage: Olm Session ID " +
761
- sessionId +
762
- " to " +
763
- theirDeviceIdentityKey +
764
- ": " +
765
- sessionDesc,
766
- );
767
- res = sessionInfo.session.encrypt(payloadString);
768
- this.saveSession(theirDeviceIdentityKey, sessionInfo, txn);
769
- });
770
- },
771
- logger.getChild("[encryptMessage]"),
772
- );
773
- return res!;
774
- }
775
-
776
- /**
777
- * Decrypt an incoming message using an existing session
778
- *
779
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
780
- * remote device
781
- * @param sessionId - the id of the active session
782
- * @param messageType - messageType field from the received message
783
- * @param ciphertext - base64-encoded body from the received message
784
- *
785
- * @returns decrypted payload.
786
- */
787
- public async decryptMessage(
788
- theirDeviceIdentityKey: string,
789
- sessionId: string,
790
- messageType: number,
791
- ciphertext: string,
792
- ): Promise<string> {
793
- let payloadString: string;
794
- await this.cryptoStore.doTxn(
795
- "readwrite",
796
- [IndexedDBCryptoStore.STORE_SESSIONS],
797
- (txn) => {
798
- this.getSession(theirDeviceIdentityKey, sessionId, txn, (sessionInfo: IUnpickledSessionInfo) => {
799
- const sessionDesc = sessionInfo.session.describe();
800
- logger.log(
801
- "decryptMessage: Olm Session ID " +
802
- sessionId +
803
- " from " +
804
- theirDeviceIdentityKey +
805
- ": " +
806
- sessionDesc,
807
- );
808
- payloadString = sessionInfo.session.decrypt(messageType, ciphertext);
809
- sessionInfo.lastReceivedMessageTs = Date.now();
810
- this.saveSession(theirDeviceIdentityKey, sessionInfo, txn);
811
- });
812
- },
813
- logger.getChild("[decryptMessage]"),
814
- );
815
- return payloadString!;
816
- }
817
-
818
- /**
819
- * Determine if an incoming messages is a prekey message matching an existing session
820
- *
821
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
822
- * remote device
823
- * @param sessionId - the id of the active session
824
- * @param messageType - messageType field from the received message
825
- * @param ciphertext - base64-encoded body from the received message
826
- *
827
- * @returns true if the received message is a prekey message which matches
828
- * the given session.
829
- */
830
- public async matchesSession(
831
- theirDeviceIdentityKey: string,
832
- sessionId: string,
833
- messageType: number,
834
- ciphertext: string,
835
- ): Promise<boolean> {
836
- if (messageType !== 0) {
837
- return false;
838
- }
839
-
840
- let matches: boolean;
841
- await this.cryptoStore.doTxn(
842
- "readonly",
843
- [IndexedDBCryptoStore.STORE_SESSIONS],
844
- (txn) => {
845
- this.getSession(theirDeviceIdentityKey, sessionId, txn, (sessionInfo) => {
846
- matches = sessionInfo.session.matches_inbound(ciphertext);
847
- });
848
- },
849
- logger.getChild("[matchesSession]"),
850
- );
851
- return matches!;
852
- }
853
-
854
- public async recordSessionProblem(deviceKey: string, type: string, fixed: boolean): Promise<void> {
855
- logger.info(`Recording problem on olm session with ${deviceKey} of type ${type}. Recreating: ${fixed}`);
856
- await this.cryptoStore.storeEndToEndSessionProblem(deviceKey, type, fixed);
857
- }
858
-
859
- public sessionMayHaveProblems(deviceKey: string, timestamp: number): Promise<IProblem | null> {
860
- return this.cryptoStore.getEndToEndSessionProblem(deviceKey, timestamp);
861
- }
862
-
863
- public filterOutNotifiedErrorDevices(devices: IOlmDevice[]): Promise<IOlmDevice[]> {
864
- return this.cryptoStore.filterOutNotifiedErrorDevices(devices);
865
- }
866
-
867
- // Outbound group session
868
- // ======================
869
-
870
- /**
871
- * store an OutboundGroupSession in outboundGroupSessionStore
872
- *
873
- * @internal
874
- */
875
- private saveOutboundGroupSession(session: OutboundGroupSession): void {
876
- this.outboundGroupSessionStore[session.session_id()] = session.pickle(this.pickleKey);
877
- }
878
-
879
- /**
880
- * extract an OutboundGroupSession from outboundGroupSessionStore and call the
881
- * given function
882
- *
883
- * @returns result of func
884
- * @internal
885
- */
886
- private getOutboundGroupSession<T>(sessionId: string, func: (session: OutboundGroupSession) => T): T {
887
- const pickled = this.outboundGroupSessionStore[sessionId];
888
- if (pickled === undefined) {
889
- throw new Error("Unknown outbound group session " + sessionId);
890
- }
891
-
892
- const session = new globalThis.Olm.OutboundGroupSession();
893
- try {
894
- session.unpickle(this.pickleKey, pickled);
895
- return func(session);
896
- } finally {
897
- session.free();
898
- }
899
- }
900
-
901
- /**
902
- * Generate a new outbound group session
903
- *
904
- * @returns sessionId for the outbound session.
905
- */
906
- public createOutboundGroupSession(): string {
907
- const session = new globalThis.Olm.OutboundGroupSession();
908
- try {
909
- session.create();
910
- this.saveOutboundGroupSession(session);
911
- return session.session_id();
912
- } finally {
913
- session.free();
914
- }
915
- }
916
-
917
- /**
918
- * Encrypt an outgoing message with an outbound group session
919
- *
920
- * @param sessionId - the id of the outboundgroupsession
921
- * @param payloadString - payload to be encrypted and sent
922
- *
923
- * @returns ciphertext
924
- */
925
- public encryptGroupMessage(sessionId: string, payloadString: string): string {
926
- logger.log(`encrypting msg with megolm session ${sessionId}`);
927
-
928
- checkPayloadLength(payloadString);
929
-
930
- return this.getOutboundGroupSession(sessionId, (session: OutboundGroupSession) => {
931
- const res = session.encrypt(payloadString);
932
- this.saveOutboundGroupSession(session);
933
- return res;
934
- });
935
- }
936
-
937
- /**
938
- * Get the session keys for an outbound group session
939
- *
940
- * @param sessionId - the id of the outbound group session
941
- *
942
- * @returns current chain index, and
943
- * base64-encoded secret key.
944
- */
945
- public getOutboundGroupSessionKey(sessionId: string): IOutboundGroupSessionKey {
946
- return this.getOutboundGroupSession(sessionId, function (session: OutboundGroupSession) {
947
- return {
948
- chain_index: session.message_index(),
949
- key: session.session_key(),
950
- };
951
- });
952
- }
953
-
954
- // Inbound group session
955
- // =====================
956
-
957
- /**
958
- * Unpickle a session from a sessionData object and invoke the given function.
959
- * The session is valid only until func returns.
960
- *
961
- * @param sessionData - Object describing the session.
962
- * @param func - Invoked with the unpickled session
963
- * @returns result of func
964
- */
965
- private unpickleInboundGroupSession<T>(
966
- sessionData: InboundGroupSessionData,
967
- func: (session: InboundGroupSession) => T,
968
- ): T {
969
- const session = new globalThis.Olm.InboundGroupSession();
970
- try {
971
- session.unpickle(this.pickleKey, sessionData.session);
972
- return func(session);
973
- } finally {
974
- session.free();
975
- }
976
- }
977
-
978
- /**
979
- * extract an InboundGroupSession from the crypto store and call the given function
980
- *
981
- * @param roomId - The room ID to extract the session for, or null to fetch
982
- * sessions for any room.
983
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
984
- * @param func - function to call.
985
- *
986
- * @internal
987
- */
988
- private getInboundGroupSession(
989
- roomId: string,
990
- senderKey: string,
991
- sessionId: string,
992
- txn: unknown,
993
- func: (
994
- session: InboundGroupSession | null,
995
- data: InboundGroupSessionData | null,
996
- withheld: IWithheld | null,
997
- ) => void,
998
- ): void {
999
- this.cryptoStore.getEndToEndInboundGroupSession(
1000
- senderKey,
1001
- sessionId,
1002
- txn,
1003
- (sessionData: InboundGroupSessionData | null, withheld: IWithheld | null) => {
1004
- if (sessionData === null) {
1005
- func(null, null, withheld);
1006
- return;
1007
- }
1008
-
1009
- // if we were given a room ID, check that the it matches the original one for the session. This stops
1010
- // the HS pretending a message was targeting a different room.
1011
- if (roomId !== null && roomId !== sessionData.room_id) {
1012
- throw new Error(
1013
- "Mismatched room_id for inbound group session (expected " +
1014
- sessionData.room_id +
1015
- ", was " +
1016
- roomId +
1017
- ")",
1018
- );
1019
- }
1020
-
1021
- this.unpickleInboundGroupSession(sessionData, (session: InboundGroupSession) => {
1022
- func(session, sessionData, withheld);
1023
- });
1024
- },
1025
- );
1026
- }
1027
-
1028
- /**
1029
- * Add an inbound group session to the session store
1030
- *
1031
- * @param roomId - room in which this session will be used
1032
- * @param senderKey - base64-encoded curve25519 key of the sender
1033
- * @param forwardingCurve25519KeyChain - Devices involved in forwarding
1034
- * this session to us.
1035
- * @param sessionId - session identifier
1036
- * @param sessionKey - base64-encoded secret key
1037
- * @param keysClaimed - Other keys the sender claims.
1038
- * @param exportFormat - true if the megolm keys are in export format
1039
- * (ie, they lack an ed25519 signature)
1040
- * @param extraSessionData - any other data to be include with the session
1041
- */
1042
- public async addInboundGroupSession(
1043
- roomId: string,
1044
- senderKey: string,
1045
- forwardingCurve25519KeyChain: string[],
1046
- sessionId: string,
1047
- sessionKey: string,
1048
- keysClaimed: Record<string, string>,
1049
- exportFormat: boolean,
1050
- extraSessionData: OlmGroupSessionExtraData = {},
1051
- ): Promise<void> {
1052
- await this.cryptoStore.doTxn(
1053
- "readwrite",
1054
- [
1055
- IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS,
1056
- IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD,
1057
- IndexedDBCryptoStore.STORE_SHARED_HISTORY_INBOUND_GROUP_SESSIONS,
1058
- ],
1059
- (txn) => {
1060
- /* if we already have this session, consider updating it */
1061
- this.getInboundGroupSession(
1062
- roomId,
1063
- senderKey,
1064
- sessionId,
1065
- txn,
1066
- (
1067
- existingSession: InboundGroupSession | null,
1068
- existingSessionData: InboundGroupSessionData | null,
1069
- ) => {
1070
- // new session.
1071
- const session = new globalThis.Olm.InboundGroupSession();
1072
- try {
1073
- if (exportFormat) {
1074
- session.import_session(sessionKey);
1075
- } else {
1076
- session.create(sessionKey);
1077
- }
1078
- if (sessionId != session.session_id()) {
1079
- throw new Error("Mismatched group session ID from senderKey: " + senderKey);
1080
- }
1081
-
1082
- if (existingSession) {
1083
- logger.log(`Update for megolm session ${senderKey}|${sessionId}`);
1084
- if (existingSession.first_known_index() <= session.first_known_index()) {
1085
- if (!existingSessionData!.untrusted || extraSessionData.untrusted) {
1086
- // existing session has less-than-or-equal index
1087
- // (i.e. can decrypt at least as much), and the
1088
- // new session's trust does not win over the old
1089
- // session's trust, so keep it
1090
- logger.log(`Keeping existing megolm session ${senderKey}|${sessionId}`);
1091
- return;
1092
- }
1093
- if (existingSession.first_known_index() < session.first_known_index()) {
1094
- // We want to upgrade the existing session's trust,
1095
- // but we can't just use the new session because we'll
1096
- // lose the lower index. Check that the sessions connect
1097
- // properly, and then manually set the existing session
1098
- // as trusted.
1099
- if (
1100
- existingSession.export_session(session.first_known_index()) ===
1101
- session.export_session(session.first_known_index())
1102
- ) {
1103
- logger.info(
1104
- "Upgrading trust of existing megolm session " +
1105
- `${senderKey}|${sessionId} based on newly-received trusted session`,
1106
- );
1107
- existingSessionData!.untrusted = false;
1108
- this.cryptoStore.storeEndToEndInboundGroupSession(
1109
- senderKey,
1110
- sessionId,
1111
- existingSessionData!,
1112
- txn,
1113
- );
1114
- } else {
1115
- logger.warn(
1116
- `Newly-received megolm session ${senderKey}|$sessionId}` +
1117
- " does not match existing session! Keeping existing session",
1118
- );
1119
- }
1120
- return;
1121
- }
1122
- // If the sessions have the same index, go ahead and store the new trusted one.
1123
- }
1124
- }
1125
-
1126
- logger.debug(
1127
- `Storing megolm session ${senderKey}|${sessionId} with first index ` +
1128
- session.first_known_index(),
1129
- );
1130
-
1131
- const sessionData = Object.assign({}, extraSessionData, {
1132
- room_id: roomId,
1133
- session: session.pickle(this.pickleKey),
1134
- keysClaimed: keysClaimed,
1135
- forwardingCurve25519KeyChain: forwardingCurve25519KeyChain,
1136
- });
1137
-
1138
- this.cryptoStore.storeEndToEndInboundGroupSession(senderKey, sessionId, sessionData, txn);
1139
-
1140
- if (!existingSession && extraSessionData.sharedHistory) {
1141
- this.cryptoStore.addSharedHistoryInboundGroupSession(roomId, senderKey, sessionId, txn);
1142
- }
1143
- } finally {
1144
- session.free();
1145
- }
1146
- },
1147
- );
1148
- },
1149
- logger.getChild("[addInboundGroupSession]"),
1150
- );
1151
- }
1152
-
1153
- /**
1154
- * Record in the data store why an inbound group session was withheld.
1155
- *
1156
- * @param roomId - room that the session belongs to
1157
- * @param senderKey - base64-encoded curve25519 key of the sender
1158
- * @param sessionId - session identifier
1159
- * @param code - reason code
1160
- * @param reason - human-readable version of `code`
1161
- */
1162
- public async addInboundGroupSessionWithheld(
1163
- roomId: string,
1164
- senderKey: string,
1165
- sessionId: string,
1166
- code: string,
1167
- reason: string,
1168
- ): Promise<void> {
1169
- await this.cryptoStore.doTxn(
1170
- "readwrite",
1171
- [IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD],
1172
- (txn) => {
1173
- this.cryptoStore.storeEndToEndInboundGroupSessionWithheld(
1174
- senderKey,
1175
- sessionId,
1176
- {
1177
- room_id: roomId,
1178
- code: code,
1179
- reason: reason,
1180
- },
1181
- txn,
1182
- );
1183
- },
1184
- );
1185
- }
1186
-
1187
- /**
1188
- * Decrypt a received message with an inbound group session
1189
- *
1190
- * @param roomId - room in which the message was received
1191
- * @param senderKey - base64-encoded curve25519 key of the sender
1192
- * @param sessionId - session identifier
1193
- * @param body - base64-encoded body of the encrypted message
1194
- * @param eventId - ID of the event being decrypted
1195
- * @param timestamp - timestamp of the event being decrypted
1196
- *
1197
- * @returns null if the sessionId is unknown
1198
- */
1199
- public async decryptGroupMessage(
1200
- roomId: string,
1201
- senderKey: string,
1202
- sessionId: string,
1203
- body: string,
1204
- eventId: string,
1205
- timestamp: number,
1206
- ): Promise<IDecryptedGroupMessage | null> {
1207
- let result: IDecryptedGroupMessage | null = null;
1208
- // when the localstorage crypto store is used as an indexeddb backend,
1209
- // exceptions thrown from within the inner function are not passed through
1210
- // to the top level, so we store exceptions in a variable and raise them at
1211
- // the end
1212
- let error: Error;
1213
-
1214
- await this.cryptoStore.doTxn(
1215
- "readwrite",
1216
- [
1217
- IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS,
1218
- IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD,
1219
- ],
1220
- (txn) => {
1221
- this.getInboundGroupSession(roomId, senderKey, sessionId, txn, (session, sessionData, withheld) => {
1222
- if (session === null || sessionData === null) {
1223
- if (withheld) {
1224
- const failureCode =
1225
- withheld.code === "m.unverified"
1226
- ? DecryptionFailureCode.MEGOLM_KEY_WITHHELD_FOR_UNVERIFIED_DEVICE
1227
- : DecryptionFailureCode.MEGOLM_KEY_WITHHELD;
1228
- error = new DecryptionError(failureCode, calculateWithheldMessage(withheld), {
1229
- session: senderKey + "|" + sessionId,
1230
- });
1231
- }
1232
- result = null;
1233
- return;
1234
- }
1235
- let res: ReturnType<InboundGroupSession["decrypt"]>;
1236
- try {
1237
- res = session.decrypt(body);
1238
- } catch (e) {
1239
- if ((<Error>e)?.message === "OLM.UNKNOWN_MESSAGE_INDEX" && withheld) {
1240
- const failureCode =
1241
- withheld.code === "m.unverified"
1242
- ? DecryptionFailureCode.MEGOLM_KEY_WITHHELD_FOR_UNVERIFIED_DEVICE
1243
- : DecryptionFailureCode.MEGOLM_KEY_WITHHELD;
1244
- error = new DecryptionError(failureCode, calculateWithheldMessage(withheld), {
1245
- session: senderKey + "|" + sessionId,
1246
- });
1247
- } else {
1248
- error = <Error>e;
1249
- }
1250
- return;
1251
- }
1252
-
1253
- let plaintext: string = res.plaintext;
1254
- if (plaintext === undefined) {
1255
- // @ts-ignore - Compatibility for older olm versions.
1256
- plaintext = res as string;
1257
- } else {
1258
- // Check if we have seen this message index before to detect replay attacks.
1259
- // If the event ID and timestamp are specified, and the match the event ID
1260
- // and timestamp from the last time we used this message index, then we
1261
- // don't consider it a replay attack.
1262
- const messageIndexKey = senderKey + "|" + sessionId + "|" + res.message_index;
1263
- if (messageIndexKey in this.inboundGroupSessionMessageIndexes) {
1264
- const msgInfo = this.inboundGroupSessionMessageIndexes[messageIndexKey];
1265
- if (msgInfo.id !== eventId || msgInfo.timestamp !== timestamp) {
1266
- error = new Error(
1267
- "Duplicate message index, possible replay attack: " + messageIndexKey,
1268
- );
1269
- return;
1270
- }
1271
- }
1272
- this.inboundGroupSessionMessageIndexes[messageIndexKey] = {
1273
- id: eventId,
1274
- timestamp: timestamp,
1275
- };
1276
- }
1277
-
1278
- sessionData.session = session.pickle(this.pickleKey);
1279
- this.cryptoStore.storeEndToEndInboundGroupSession(senderKey, sessionId, sessionData, txn);
1280
- result = {
1281
- result: plaintext,
1282
- keysClaimed: sessionData.keysClaimed || {},
1283
- senderKey: senderKey,
1284
- forwardingCurve25519KeyChain: sessionData.forwardingCurve25519KeyChain || [],
1285
- untrusted: !!sessionData.untrusted,
1286
- };
1287
- });
1288
- },
1289
- logger.getChild("[decryptGroupMessage]"),
1290
- );
1291
-
1292
- if (error!) {
1293
- throw error;
1294
- }
1295
- return result!;
1296
- }
1297
-
1298
- /**
1299
- * Determine if we have the keys for a given megolm session
1300
- *
1301
- * @param roomId - room in which the message was received
1302
- * @param senderKey - base64-encoded curve25519 key of the sender
1303
- * @param sessionId - session identifier
1304
- *
1305
- * @returns true if we have the keys to this session
1306
- */
1307
- public async hasInboundSessionKeys(roomId: string, senderKey: string, sessionId: string): Promise<boolean> {
1308
- let result: boolean;
1309
- await this.cryptoStore.doTxn(
1310
- "readonly",
1311
- [
1312
- IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS,
1313
- IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD,
1314
- ],
1315
- (txn) => {
1316
- this.cryptoStore.getEndToEndInboundGroupSession(senderKey, sessionId, txn, (sessionData) => {
1317
- if (sessionData === null) {
1318
- result = false;
1319
- return;
1320
- }
1321
-
1322
- if (roomId !== sessionData.room_id) {
1323
- logger.warn(
1324
- `requested keys for inbound group session ${senderKey}|` +
1325
- `${sessionId}, with incorrect room_id ` +
1326
- `(expected ${sessionData.room_id}, ` +
1327
- `was ${roomId})`,
1328
- );
1329
- result = false;
1330
- } else {
1331
- result = true;
1332
- }
1333
- });
1334
- },
1335
- logger.getChild("[hasInboundSessionKeys]"),
1336
- );
1337
-
1338
- return result!;
1339
- }
1340
-
1341
- /**
1342
- * Extract the keys to a given megolm session, for sharing
1343
- *
1344
- * @param roomId - room in which the message was received
1345
- * @param senderKey - base64-encoded curve25519 key of the sender
1346
- * @param sessionId - session identifier
1347
- * @param chainIndex - The chain index at which to export the session.
1348
- * If omitted, export at the first index we know about.
1349
- *
1350
- * @returns
1351
- * details of the session key. The key is a base64-encoded megolm key in
1352
- * export format.
1353
- *
1354
- * @throws Error If the given chain index could not be obtained from the known
1355
- * index (ie. the given chain index is before the first we have).
1356
- */
1357
- public async getInboundGroupSessionKey(
1358
- roomId: string,
1359
- senderKey: string,
1360
- sessionId: string,
1361
- chainIndex?: number,
1362
- ): Promise<IInboundGroupSessionKey | null> {
1363
- let result: IInboundGroupSessionKey | null = null;
1364
- await this.cryptoStore.doTxn(
1365
- "readonly",
1366
- [
1367
- IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS,
1368
- IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD,
1369
- ],
1370
- (txn) => {
1371
- this.getInboundGroupSession(roomId, senderKey, sessionId, txn, (session, sessionData) => {
1372
- if (session === null || sessionData === null) {
1373
- result = null;
1374
- return;
1375
- }
1376
-
1377
- if (chainIndex === undefined) {
1378
- chainIndex = session.first_known_index();
1379
- }
1380
-
1381
- const exportedSession = session.export_session(chainIndex);
1382
-
1383
- const claimedKeys = sessionData.keysClaimed || {};
1384
- const senderEd25519Key = claimedKeys.ed25519 || null;
1385
-
1386
- const forwardingKeyChain = sessionData.forwardingCurve25519KeyChain || [];
1387
- // older forwarded keys didn't set the "untrusted"
1388
- // property, but can be identified by having a
1389
- // non-empty forwarding key chain. These keys should
1390
- // be marked as untrusted since we don't know that they
1391
- // can be trusted
1392
- const untrusted =
1393
- "untrusted" in sessionData ? sessionData.untrusted : forwardingKeyChain.length > 0;
1394
-
1395
- result = {
1396
- chain_index: chainIndex,
1397
- key: exportedSession,
1398
- forwarding_curve25519_key_chain: forwardingKeyChain,
1399
- sender_claimed_ed25519_key: senderEd25519Key,
1400
- shared_history: sessionData.sharedHistory || false,
1401
- untrusted: untrusted,
1402
- };
1403
- });
1404
- },
1405
- logger.getChild("[getInboundGroupSessionKey]"),
1406
- );
1407
-
1408
- return result;
1409
- }
1410
-
1411
- /**
1412
- * Export an inbound group session
1413
- *
1414
- * @param senderKey - base64-encoded curve25519 key of the sender
1415
- * @param sessionId - session identifier
1416
- * @param sessionData - The session object from the store
1417
- * @returns exported session data
1418
- */
1419
- public exportInboundGroupSession(
1420
- senderKey: string,
1421
- sessionId: string,
1422
- sessionData: InboundGroupSessionData,
1423
- ): IMegolmSessionData {
1424
- return this.unpickleInboundGroupSession(sessionData, (session) => {
1425
- const messageIndex = session.first_known_index();
1426
-
1427
- return {
1428
- "sender_key": senderKey,
1429
- "sender_claimed_keys": sessionData.keysClaimed,
1430
- "room_id": sessionData.room_id,
1431
- "session_id": sessionId,
1432
- "session_key": session.export_session(messageIndex),
1433
- "forwarding_curve25519_key_chain": sessionData.forwardingCurve25519KeyChain || [],
1434
- "first_known_index": session.first_known_index(),
1435
- "org.matrix.msc3061.shared_history": sessionData.sharedHistory || false,
1436
- } as IMegolmSessionData;
1437
- });
1438
- }
1439
-
1440
- public async getSharedHistoryInboundGroupSessions(
1441
- roomId: string,
1442
- ): Promise<[senderKey: string, sessionId: string][]> {
1443
- let result: Promise<[senderKey: string, sessionId: string][]>;
1444
- await this.cryptoStore.doTxn(
1445
- "readonly",
1446
- [IndexedDBCryptoStore.STORE_SHARED_HISTORY_INBOUND_GROUP_SESSIONS],
1447
- (txn) => {
1448
- result = this.cryptoStore.getSharedHistoryInboundGroupSessions(roomId, txn);
1449
- },
1450
- logger.getChild("[getSharedHistoryInboundGroupSessionsForRoom]"),
1451
- );
1452
- return result!;
1453
- }
1454
-
1455
- // Utilities
1456
- // =========
1457
-
1458
- /**
1459
- * Verify an ed25519 signature.
1460
- *
1461
- * @param key - ed25519 key
1462
- * @param message - message which was signed
1463
- * @param signature - base64-encoded signature to be checked
1464
- *
1465
- * @throws Error if there is a problem with the verification. If the key was
1466
- * too small then the message will be "OLM.INVALID_BASE64". If the signature
1467
- * was invalid then the message will be "OLM.BAD_MESSAGE_MAC".
1468
- */
1469
- public verifySignature(key: string, message: string, signature: string): void {
1470
- this.getUtility(function (util: Utility) {
1471
- util.ed25519_verify(key, message, signature);
1472
- });
1473
- }
1474
- }
1475
-
1476
- export const WITHHELD_MESSAGES: Record<string, string> = {
1477
- "m.unverified": "The sender has disabled encrypting to unverified devices.",
1478
- "m.blacklisted": "The sender has blocked you.",
1479
- "m.unauthorised": "You are not authorised to read the message.",
1480
- "m.no_olm": "Unable to establish a secure channel.",
1481
- };
1482
-
1483
- /**
1484
- * Calculate the message to use for the exception when a session key is withheld.
1485
- *
1486
- * @param withheld - An object that describes why the key was withheld.
1487
- *
1488
- * @returns the message
1489
- *
1490
- * @internal
1491
- */
1492
- function calculateWithheldMessage(withheld: IWithheld): string {
1493
- if (withheld.code && withheld.code in WITHHELD_MESSAGES) {
1494
- return WITHHELD_MESSAGES[withheld.code];
1495
- } else if (withheld.reason) {
1496
- return withheld.reason;
1497
- } else {
1498
- return "decryption key withheld";
1499
- }
1500
- }