@unwanted/matrix-sdk-mini 34.12.0-2 → 34.12.0-4

Sign up to get free protection for your applications and to get access to all the features.
Files changed (492) hide show
  1. package/git-revision.txt +1 -1
  2. package/lib/@types/global.d.js +0 -2
  3. package/lib/@types/global.d.js.map +1 -1
  4. package/lib/browser-index.d.ts.map +1 -1
  5. package/lib/browser-index.js +0 -11
  6. package/lib/browser-index.js.map +1 -1
  7. package/lib/client.d.ts +2 -1221
  8. package/lib/client.d.ts.map +1 -1
  9. package/lib/client.js +331 -2821
  10. package/lib/client.js.map +1 -1
  11. package/lib/embedded.d.ts +0 -22
  12. package/lib/embedded.d.ts.map +1 -1
  13. package/lib/embedded.js +24 -166
  14. package/lib/embedded.js.map +1 -1
  15. package/lib/event-mapper.d.ts.map +1 -1
  16. package/lib/event-mapper.js +0 -4
  17. package/lib/event-mapper.js.map +1 -1
  18. package/lib/matrix.d.ts +0 -19
  19. package/lib/matrix.d.ts.map +1 -1
  20. package/lib/matrix.js +1 -26
  21. package/lib/matrix.js.map +1 -1
  22. package/lib/models/MSC3089Branch.d.ts.map +1 -1
  23. package/lib/models/MSC3089Branch.js +0 -3
  24. package/lib/models/MSC3089Branch.js.map +1 -1
  25. package/lib/models/event.d.ts +0 -94
  26. package/lib/models/event.d.ts.map +1 -1
  27. package/lib/models/event.js +0 -274
  28. package/lib/models/event.js.map +1 -1
  29. package/lib/models/poll.d.ts.map +1 -1
  30. package/lib/models/poll.js +1 -5
  31. package/lib/models/poll.js.map +1 -1
  32. package/lib/models/relations-container.d.ts.map +1 -1
  33. package/lib/models/relations-container.js +1 -7
  34. package/lib/models/relations-container.js.map +1 -1
  35. package/lib/models/relations.d.ts +0 -1
  36. package/lib/models/relations.d.ts.map +1 -1
  37. package/lib/models/relations.js +0 -8
  38. package/lib/models/relations.js.map +1 -1
  39. package/lib/models/room-state.d.ts.map +1 -1
  40. package/lib/models/room-state.js +10 -26
  41. package/lib/models/room-state.js.map +1 -1
  42. package/lib/models/room.d.ts +0 -18
  43. package/lib/models/room.d.ts.map +1 -1
  44. package/lib/models/room.js +94 -148
  45. package/lib/models/room.js.map +1 -1
  46. package/lib/models/thread.d.ts.map +1 -1
  47. package/lib/models/thread.js +0 -1
  48. package/lib/models/thread.js.map +1 -1
  49. package/lib/sliding-sync-sdk.d.ts +2 -3
  50. package/lib/sliding-sync-sdk.d.ts.map +1 -1
  51. package/lib/sliding-sync-sdk.js +41 -90
  52. package/lib/sliding-sync-sdk.js.map +1 -1
  53. package/lib/sync.d.ts +0 -12
  54. package/lib/sync.d.ts.map +1 -1
  55. package/lib/sync.js +1 -73
  56. package/lib/sync.js.map +1 -1
  57. package/lib/testing.d.ts +0 -48
  58. package/lib/testing.d.ts.map +1 -1
  59. package/lib/testing.js +0 -105
  60. package/lib/testing.js.map +1 -1
  61. package/lib/types.d.ts +0 -1
  62. package/lib/types.d.ts.map +1 -1
  63. package/lib/types.js.map +1 -1
  64. package/package.json +1 -3
  65. package/src/@types/global.d.ts +0 -3
  66. package/src/browser-index.ts +0 -11
  67. package/src/client.ts +60 -2882
  68. package/src/embedded.ts +3 -130
  69. package/src/event-mapper.ts +0 -4
  70. package/src/matrix.ts +0 -28
  71. package/src/models/MSC3089Branch.ts +0 -3
  72. package/src/models/event.ts +0 -289
  73. package/src/models/poll.ts +0 -6
  74. package/src/models/relations-container.ts +1 -8
  75. package/src/models/relations.ts +0 -8
  76. package/src/models/room-state.ts +2 -8
  77. package/src/models/room.ts +0 -62
  78. package/src/models/thread.ts +0 -1
  79. package/src/sliding-sync-sdk.ts +2 -72
  80. package/src/sync.ts +1 -98
  81. package/src/testing.ts +0 -108
  82. package/src/types.ts +0 -1
  83. package/CHANGELOG.md +0 -5910
  84. package/lib/@types/AESEncryptedSecretStoragePayload.d.ts +0 -14
  85. package/lib/@types/AESEncryptedSecretStoragePayload.d.ts.map +0 -1
  86. package/lib/@types/AESEncryptedSecretStoragePayload.js +0 -1
  87. package/lib/@types/AESEncryptedSecretStoragePayload.js.map +0 -1
  88. package/lib/@types/crypto.d.ts +0 -47
  89. package/lib/@types/crypto.d.ts.map +0 -1
  90. package/lib/@types/crypto.js +0 -1
  91. package/lib/@types/crypto.js.map +0 -1
  92. package/lib/@types/matrix-sdk-crypto-wasm.d.js +0 -1
  93. package/lib/@types/matrix-sdk-crypto-wasm.d.js.map +0 -1
  94. package/lib/common-crypto/CryptoBackend.d.ts +0 -240
  95. package/lib/common-crypto/CryptoBackend.d.ts.map +0 -1
  96. package/lib/common-crypto/CryptoBackend.js +0 -73
  97. package/lib/common-crypto/CryptoBackend.js.map +0 -1
  98. package/lib/common-crypto/key-passphrase.d.ts +0 -14
  99. package/lib/common-crypto/key-passphrase.d.ts.map +0 -1
  100. package/lib/common-crypto/key-passphrase.js +0 -33
  101. package/lib/common-crypto/key-passphrase.js.map +0 -1
  102. package/lib/crypto/CrossSigning.d.ts +0 -184
  103. package/lib/crypto/CrossSigning.d.ts.map +0 -1
  104. package/lib/crypto/CrossSigning.js +0 -718
  105. package/lib/crypto/CrossSigning.js.map +0 -1
  106. package/lib/crypto/DeviceList.d.ts +0 -216
  107. package/lib/crypto/DeviceList.d.ts.map +0 -1
  108. package/lib/crypto/DeviceList.js +0 -892
  109. package/lib/crypto/DeviceList.js.map +0 -1
  110. package/lib/crypto/EncryptionSetup.d.ts +0 -152
  111. package/lib/crypto/EncryptionSetup.d.ts.map +0 -1
  112. package/lib/crypto/EncryptionSetup.js +0 -356
  113. package/lib/crypto/EncryptionSetup.js.map +0 -1
  114. package/lib/crypto/OlmDevice.d.ts +0 -457
  115. package/lib/crypto/OlmDevice.d.ts.map +0 -1
  116. package/lib/crypto/OlmDevice.js +0 -1241
  117. package/lib/crypto/OlmDevice.js.map +0 -1
  118. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts +0 -109
  119. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts.map +0 -1
  120. package/lib/crypto/OutgoingRoomKeyRequestManager.js +0 -415
  121. package/lib/crypto/OutgoingRoomKeyRequestManager.js.map +0 -1
  122. package/lib/crypto/RoomList.d.ts +0 -26
  123. package/lib/crypto/RoomList.d.ts.map +0 -1
  124. package/lib/crypto/RoomList.js +0 -71
  125. package/lib/crypto/RoomList.js.map +0 -1
  126. package/lib/crypto/SecretSharing.d.ts +0 -24
  127. package/lib/crypto/SecretSharing.d.ts.map +0 -1
  128. package/lib/crypto/SecretSharing.js +0 -194
  129. package/lib/crypto/SecretSharing.js.map +0 -1
  130. package/lib/crypto/SecretStorage.d.ts +0 -55
  131. package/lib/crypto/SecretStorage.d.ts.map +0 -1
  132. package/lib/crypto/SecretStorage.js +0 -118
  133. package/lib/crypto/SecretStorage.js.map +0 -1
  134. package/lib/crypto/aes.d.ts +0 -6
  135. package/lib/crypto/aes.d.ts.map +0 -1
  136. package/lib/crypto/aes.js +0 -24
  137. package/lib/crypto/aes.js.map +0 -1
  138. package/lib/crypto/algorithms/base.d.ts +0 -156
  139. package/lib/crypto/algorithms/base.d.ts.map +0 -1
  140. package/lib/crypto/algorithms/base.js +0 -187
  141. package/lib/crypto/algorithms/base.js.map +0 -1
  142. package/lib/crypto/algorithms/index.d.ts +0 -4
  143. package/lib/crypto/algorithms/index.d.ts.map +0 -1
  144. package/lib/crypto/algorithms/index.js +0 -20
  145. package/lib/crypto/algorithms/index.js.map +0 -1
  146. package/lib/crypto/algorithms/megolm.d.ts +0 -385
  147. package/lib/crypto/algorithms/megolm.d.ts.map +0 -1
  148. package/lib/crypto/algorithms/megolm.js +0 -1822
  149. package/lib/crypto/algorithms/megolm.js.map +0 -1
  150. package/lib/crypto/algorithms/olm.d.ts +0 -5
  151. package/lib/crypto/algorithms/olm.d.ts.map +0 -1
  152. package/lib/crypto/algorithms/olm.js +0 -299
  153. package/lib/crypto/algorithms/olm.js.map +0 -1
  154. package/lib/crypto/api.d.ts +0 -32
  155. package/lib/crypto/api.d.ts.map +0 -1
  156. package/lib/crypto/api.js +0 -22
  157. package/lib/crypto/api.js.map +0 -1
  158. package/lib/crypto/backup.d.ts +0 -227
  159. package/lib/crypto/backup.d.ts.map +0 -1
  160. package/lib/crypto/backup.js +0 -824
  161. package/lib/crypto/backup.js.map +0 -1
  162. package/lib/crypto/crypto.d.ts +0 -3
  163. package/lib/crypto/crypto.d.ts.map +0 -1
  164. package/lib/crypto/crypto.js +0 -19
  165. package/lib/crypto/crypto.js.map +0 -1
  166. package/lib/crypto/dehydration.d.ts +0 -34
  167. package/lib/crypto/dehydration.d.ts.map +0 -1
  168. package/lib/crypto/dehydration.js +0 -252
  169. package/lib/crypto/dehydration.js.map +0 -1
  170. package/lib/crypto/device-converter.d.ts +0 -9
  171. package/lib/crypto/device-converter.d.ts.map +0 -1
  172. package/lib/crypto/device-converter.js +0 -42
  173. package/lib/crypto/device-converter.js.map +0 -1
  174. package/lib/crypto/deviceinfo.d.ts +0 -99
  175. package/lib/crypto/deviceinfo.d.ts.map +0 -1
  176. package/lib/crypto/deviceinfo.js +0 -148
  177. package/lib/crypto/deviceinfo.js.map +0 -1
  178. package/lib/crypto/index.d.ts +0 -1209
  179. package/lib/crypto/index.d.ts.map +0 -1
  180. package/lib/crypto/index.js +0 -4097
  181. package/lib/crypto/index.js.map +0 -1
  182. package/lib/crypto/key_passphrase.d.ts +0 -14
  183. package/lib/crypto/key_passphrase.d.ts.map +0 -1
  184. package/lib/crypto/key_passphrase.js +0 -44
  185. package/lib/crypto/key_passphrase.js.map +0 -1
  186. package/lib/crypto/keybackup.d.ts +0 -18
  187. package/lib/crypto/keybackup.d.ts.map +0 -1
  188. package/lib/crypto/keybackup.js +0 -1
  189. package/lib/crypto/keybackup.js.map +0 -1
  190. package/lib/crypto/olmlib.d.ts +0 -129
  191. package/lib/crypto/olmlib.d.ts.map +0 -1
  192. package/lib/crypto/olmlib.js +0 -492
  193. package/lib/crypto/olmlib.js.map +0 -1
  194. package/lib/crypto/recoverykey.d.ts +0 -2
  195. package/lib/crypto/recoverykey.d.ts.map +0 -1
  196. package/lib/crypto/recoverykey.js +0 -19
  197. package/lib/crypto/recoverykey.js.map +0 -1
  198. package/lib/crypto/store/base.d.ts +0 -252
  199. package/lib/crypto/store/base.d.ts.map +0 -1
  200. package/lib/crypto/store/base.js +0 -64
  201. package/lib/crypto/store/base.js.map +0 -1
  202. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts +0 -187
  203. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts.map +0 -1
  204. package/lib/crypto/store/indexeddb-crypto-store-backend.js +0 -1145
  205. package/lib/crypto/store/indexeddb-crypto-store-backend.js.map +0 -1
  206. package/lib/crypto/store/indexeddb-crypto-store.d.ts +0 -432
  207. package/lib/crypto/store/indexeddb-crypto-store.d.ts.map +0 -1
  208. package/lib/crypto/store/indexeddb-crypto-store.js +0 -728
  209. package/lib/crypto/store/indexeddb-crypto-store.js.map +0 -1
  210. package/lib/crypto/store/localStorage-crypto-store.d.ts +0 -119
  211. package/lib/crypto/store/localStorage-crypto-store.d.ts.map +0 -1
  212. package/lib/crypto/store/localStorage-crypto-store.js +0 -531
  213. package/lib/crypto/store/localStorage-crypto-store.js.map +0 -1
  214. package/lib/crypto/store/memory-crypto-store.d.ts +0 -215
  215. package/lib/crypto/store/memory-crypto-store.d.ts.map +0 -1
  216. package/lib/crypto/store/memory-crypto-store.js +0 -622
  217. package/lib/crypto/store/memory-crypto-store.js.map +0 -1
  218. package/lib/crypto/verification/Base.d.ts +0 -105
  219. package/lib/crypto/verification/Base.d.ts.map +0 -1
  220. package/lib/crypto/verification/Base.js +0 -372
  221. package/lib/crypto/verification/Base.js.map +0 -1
  222. package/lib/crypto/verification/Error.d.ts +0 -35
  223. package/lib/crypto/verification/Error.d.ts.map +0 -1
  224. package/lib/crypto/verification/Error.js +0 -86
  225. package/lib/crypto/verification/Error.js.map +0 -1
  226. package/lib/crypto/verification/IllegalMethod.d.ts +0 -15
  227. package/lib/crypto/verification/IllegalMethod.d.ts.map +0 -1
  228. package/lib/crypto/verification/IllegalMethod.js +0 -43
  229. package/lib/crypto/verification/IllegalMethod.js.map +0 -1
  230. package/lib/crypto/verification/QRCode.d.ts +0 -51
  231. package/lib/crypto/verification/QRCode.d.ts.map +0 -1
  232. package/lib/crypto/verification/QRCode.js +0 -277
  233. package/lib/crypto/verification/QRCode.js.map +0 -1
  234. package/lib/crypto/verification/SAS.d.ts +0 -27
  235. package/lib/crypto/verification/SAS.d.ts.map +0 -1
  236. package/lib/crypto/verification/SAS.js +0 -485
  237. package/lib/crypto/verification/SAS.js.map +0 -1
  238. package/lib/crypto/verification/SASDecimal.d.ts +0 -8
  239. package/lib/crypto/verification/SASDecimal.d.ts.map +0 -1
  240. package/lib/crypto/verification/SASDecimal.js +0 -34
  241. package/lib/crypto/verification/SASDecimal.js.map +0 -1
  242. package/lib/crypto/verification/request/Channel.d.ts +0 -18
  243. package/lib/crypto/verification/request/Channel.d.ts.map +0 -1
  244. package/lib/crypto/verification/request/Channel.js +0 -1
  245. package/lib/crypto/verification/request/Channel.js.map +0 -1
  246. package/lib/crypto/verification/request/InRoomChannel.d.ts +0 -113
  247. package/lib/crypto/verification/request/InRoomChannel.d.ts.map +0 -1
  248. package/lib/crypto/verification/request/InRoomChannel.js +0 -351
  249. package/lib/crypto/verification/request/InRoomChannel.js.map +0 -1
  250. package/lib/crypto/verification/request/ToDeviceChannel.d.ts +0 -105
  251. package/lib/crypto/verification/request/ToDeviceChannel.d.ts.map +0 -1
  252. package/lib/crypto/verification/request/ToDeviceChannel.js +0 -328
  253. package/lib/crypto/verification/request/ToDeviceChannel.js.map +0 -1
  254. package/lib/crypto/verification/request/VerificationRequest.d.ts +0 -227
  255. package/lib/crypto/verification/request/VerificationRequest.d.ts.map +0 -1
  256. package/lib/crypto/verification/request/VerificationRequest.js +0 -937
  257. package/lib/crypto/verification/request/VerificationRequest.js.map +0 -1
  258. package/lib/crypto-api/CryptoEvent.d.ts +0 -69
  259. package/lib/crypto-api/CryptoEvent.d.ts.map +0 -1
  260. package/lib/crypto-api/CryptoEvent.js +0 -33
  261. package/lib/crypto-api/CryptoEvent.js.map +0 -1
  262. package/lib/crypto-api/CryptoEventHandlerMap.d.ts +0 -16
  263. package/lib/crypto-api/CryptoEventHandlerMap.d.ts.map +0 -1
  264. package/lib/crypto-api/CryptoEventHandlerMap.js +0 -22
  265. package/lib/crypto-api/CryptoEventHandlerMap.js.map +0 -1
  266. package/lib/crypto-api/index.d.ts +0 -978
  267. package/lib/crypto-api/index.d.ts.map +0 -1
  268. package/lib/crypto-api/index.js +0 -304
  269. package/lib/crypto-api/index.js.map +0 -1
  270. package/lib/crypto-api/key-passphrase.d.ts +0 -11
  271. package/lib/crypto-api/key-passphrase.d.ts.map +0 -1
  272. package/lib/crypto-api/key-passphrase.js +0 -51
  273. package/lib/crypto-api/key-passphrase.js.map +0 -1
  274. package/lib/crypto-api/keybackup.d.ts +0 -88
  275. package/lib/crypto-api/keybackup.d.ts.map +0 -1
  276. package/lib/crypto-api/keybackup.js +0 -1
  277. package/lib/crypto-api/keybackup.js.map +0 -1
  278. package/lib/crypto-api/recovery-key.d.ts +0 -11
  279. package/lib/crypto-api/recovery-key.d.ts.map +0 -1
  280. package/lib/crypto-api/recovery-key.js +0 -65
  281. package/lib/crypto-api/recovery-key.js.map +0 -1
  282. package/lib/crypto-api/verification.d.ts +0 -344
  283. package/lib/crypto-api/verification.d.ts.map +0 -1
  284. package/lib/crypto-api/verification.js +0 -91
  285. package/lib/crypto-api/verification.js.map +0 -1
  286. package/lib/rendezvous/MSC4108SignInWithQR.d.ts +0 -112
  287. package/lib/rendezvous/MSC4108SignInWithQR.d.ts.map +0 -1
  288. package/lib/rendezvous/MSC4108SignInWithQR.js +0 -392
  289. package/lib/rendezvous/MSC4108SignInWithQR.js.map +0 -1
  290. package/lib/rendezvous/RendezvousChannel.d.ts +0 -27
  291. package/lib/rendezvous/RendezvousChannel.d.ts.map +0 -1
  292. package/lib/rendezvous/RendezvousChannel.js +0 -1
  293. package/lib/rendezvous/RendezvousChannel.js.map +0 -1
  294. package/lib/rendezvous/RendezvousCode.d.ts +0 -9
  295. package/lib/rendezvous/RendezvousCode.d.ts.map +0 -1
  296. package/lib/rendezvous/RendezvousCode.js +0 -1
  297. package/lib/rendezvous/RendezvousCode.js.map +0 -1
  298. package/lib/rendezvous/RendezvousError.d.ts +0 -6
  299. package/lib/rendezvous/RendezvousError.d.ts.map +0 -1
  300. package/lib/rendezvous/RendezvousError.js +0 -23
  301. package/lib/rendezvous/RendezvousError.js.map +0 -1
  302. package/lib/rendezvous/RendezvousFailureReason.d.ts +0 -31
  303. package/lib/rendezvous/RendezvousFailureReason.d.ts.map +0 -1
  304. package/lib/rendezvous/RendezvousFailureReason.js +0 -38
  305. package/lib/rendezvous/RendezvousFailureReason.js.map +0 -1
  306. package/lib/rendezvous/RendezvousIntent.d.ts +0 -5
  307. package/lib/rendezvous/RendezvousIntent.d.ts.map +0 -1
  308. package/lib/rendezvous/RendezvousIntent.js +0 -22
  309. package/lib/rendezvous/RendezvousIntent.js.map +0 -1
  310. package/lib/rendezvous/RendezvousTransport.d.ts +0 -36
  311. package/lib/rendezvous/RendezvousTransport.d.ts.map +0 -1
  312. package/lib/rendezvous/RendezvousTransport.js +0 -1
  313. package/lib/rendezvous/RendezvousTransport.js.map +0 -1
  314. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts +0 -58
  315. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts.map +0 -1
  316. package/lib/rendezvous/channels/MSC4108SecureChannel.js +0 -246
  317. package/lib/rendezvous/channels/MSC4108SecureChannel.js.map +0 -1
  318. package/lib/rendezvous/channels/index.d.ts +0 -2
  319. package/lib/rendezvous/channels/index.d.ts.map +0 -1
  320. package/lib/rendezvous/channels/index.js +0 -18
  321. package/lib/rendezvous/channels/index.js.map +0 -1
  322. package/lib/rendezvous/index.d.ts +0 -10
  323. package/lib/rendezvous/index.d.ts.map +0 -1
  324. package/lib/rendezvous/index.js +0 -23
  325. package/lib/rendezvous/index.js.map +0 -1
  326. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts +0 -61
  327. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts.map +0 -1
  328. package/lib/rendezvous/transports/MSC4108RendezvousSession.js +0 -253
  329. package/lib/rendezvous/transports/MSC4108RendezvousSession.js.map +0 -1
  330. package/lib/rendezvous/transports/index.d.ts +0 -2
  331. package/lib/rendezvous/transports/index.d.ts.map +0 -1
  332. package/lib/rendezvous/transports/index.js +0 -18
  333. package/lib/rendezvous/transports/index.js.map +0 -1
  334. package/lib/rust-crypto/CrossSigningIdentity.d.ts +0 -33
  335. package/lib/rust-crypto/CrossSigningIdentity.d.ts.map +0 -1
  336. package/lib/rust-crypto/CrossSigningIdentity.js +0 -157
  337. package/lib/rust-crypto/CrossSigningIdentity.js.map +0 -1
  338. package/lib/rust-crypto/DehydratedDeviceManager.d.ts +0 -98
  339. package/lib/rust-crypto/DehydratedDeviceManager.d.ts.map +0 -1
  340. package/lib/rust-crypto/DehydratedDeviceManager.js +0 -285
  341. package/lib/rust-crypto/DehydratedDeviceManager.js.map +0 -1
  342. package/lib/rust-crypto/KeyClaimManager.d.ts +0 -33
  343. package/lib/rust-crypto/KeyClaimManager.d.ts.map +0 -1
  344. package/lib/rust-crypto/KeyClaimManager.js +0 -82
  345. package/lib/rust-crypto/KeyClaimManager.js.map +0 -1
  346. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts +0 -43
  347. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts.map +0 -1
  348. package/lib/rust-crypto/OutgoingRequestProcessor.js +0 -195
  349. package/lib/rust-crypto/OutgoingRequestProcessor.js.map +0 -1
  350. package/lib/rust-crypto/OutgoingRequestsManager.d.ts +0 -47
  351. package/lib/rust-crypto/OutgoingRequestsManager.d.ts.map +0 -1
  352. package/lib/rust-crypto/OutgoingRequestsManager.js +0 -148
  353. package/lib/rust-crypto/OutgoingRequestsManager.js.map +0 -1
  354. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts +0 -120
  355. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts.map +0 -1
  356. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js +0 -467
  357. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js.map +0 -1
  358. package/lib/rust-crypto/RoomEncryptor.d.ts +0 -98
  359. package/lib/rust-crypto/RoomEncryptor.d.ts.map +0 -1
  360. package/lib/rust-crypto/RoomEncryptor.js +0 -299
  361. package/lib/rust-crypto/RoomEncryptor.js.map +0 -1
  362. package/lib/rust-crypto/backup.d.ts +0 -254
  363. package/lib/rust-crypto/backup.d.ts.map +0 -1
  364. package/lib/rust-crypto/backup.js +0 -837
  365. package/lib/rust-crypto/backup.js.map +0 -1
  366. package/lib/rust-crypto/constants.d.ts +0 -3
  367. package/lib/rust-crypto/constants.d.ts.map +0 -1
  368. package/lib/rust-crypto/constants.js +0 -19
  369. package/lib/rust-crypto/constants.js.map +0 -1
  370. package/lib/rust-crypto/device-converter.d.ts +0 -28
  371. package/lib/rust-crypto/device-converter.d.ts.map +0 -1
  372. package/lib/rust-crypto/device-converter.js +0 -123
  373. package/lib/rust-crypto/device-converter.js.map +0 -1
  374. package/lib/rust-crypto/index.d.ts +0 -61
  375. package/lib/rust-crypto/index.d.ts.map +0 -1
  376. package/lib/rust-crypto/index.js +0 -152
  377. package/lib/rust-crypto/index.js.map +0 -1
  378. package/lib/rust-crypto/libolm_migration.d.ts +0 -81
  379. package/lib/rust-crypto/libolm_migration.d.ts.map +0 -1
  380. package/lib/rust-crypto/libolm_migration.js +0 -459
  381. package/lib/rust-crypto/libolm_migration.js.map +0 -1
  382. package/lib/rust-crypto/rust-crypto.d.ts +0 -556
  383. package/lib/rust-crypto/rust-crypto.d.ts.map +0 -1
  384. package/lib/rust-crypto/rust-crypto.js +0 -2016
  385. package/lib/rust-crypto/rust-crypto.js.map +0 -1
  386. package/lib/rust-crypto/secret-storage.d.ts +0 -22
  387. package/lib/rust-crypto/secret-storage.d.ts.map +0 -1
  388. package/lib/rust-crypto/secret-storage.js +0 -63
  389. package/lib/rust-crypto/secret-storage.js.map +0 -1
  390. package/lib/rust-crypto/verification.d.ts +0 -319
  391. package/lib/rust-crypto/verification.d.ts.map +0 -1
  392. package/lib/rust-crypto/verification.js +0 -816
  393. package/lib/rust-crypto/verification.js.map +0 -1
  394. package/lib/secret-storage.d.ts +0 -370
  395. package/lib/secret-storage.d.ts.map +0 -1
  396. package/lib/secret-storage.js +0 -466
  397. package/lib/secret-storage.js.map +0 -1
  398. package/lib/utils/decryptAESSecretStorageItem.d.ts +0 -12
  399. package/lib/utils/decryptAESSecretStorageItem.d.ts.map +0 -1
  400. package/lib/utils/decryptAESSecretStorageItem.js +0 -50
  401. package/lib/utils/decryptAESSecretStorageItem.js.map +0 -1
  402. package/lib/utils/encryptAESSecretStorageItem.d.ts +0 -16
  403. package/lib/utils/encryptAESSecretStorageItem.d.ts.map +0 -1
  404. package/lib/utils/encryptAESSecretStorageItem.js +0 -68
  405. package/lib/utils/encryptAESSecretStorageItem.js.map +0 -1
  406. package/lib/utils/internal/deriveKeys.d.ts +0 -10
  407. package/lib/utils/internal/deriveKeys.d.ts.map +0 -1
  408. package/lib/utils/internal/deriveKeys.js +0 -60
  409. package/lib/utils/internal/deriveKeys.js.map +0 -1
  410. package/src/@types/AESEncryptedSecretStoragePayload.ts +0 -29
  411. package/src/@types/crypto.ts +0 -73
  412. package/src/@types/matrix-sdk-crypto-wasm.d.ts +0 -44
  413. package/src/common-crypto/CryptoBackend.ts +0 -302
  414. package/src/common-crypto/README.md +0 -4
  415. package/src/common-crypto/key-passphrase.ts +0 -43
  416. package/src/crypto/CrossSigning.ts +0 -773
  417. package/src/crypto/DeviceList.ts +0 -989
  418. package/src/crypto/EncryptionSetup.ts +0 -351
  419. package/src/crypto/OlmDevice.ts +0 -1500
  420. package/src/crypto/OutgoingRoomKeyRequestManager.ts +0 -485
  421. package/src/crypto/RoomList.ts +0 -70
  422. package/src/crypto/SecretSharing.ts +0 -240
  423. package/src/crypto/SecretStorage.ts +0 -136
  424. package/src/crypto/aes.ts +0 -23
  425. package/src/crypto/algorithms/base.ts +0 -236
  426. package/src/crypto/algorithms/index.ts +0 -20
  427. package/src/crypto/algorithms/megolm.ts +0 -2216
  428. package/src/crypto/algorithms/olm.ts +0 -381
  429. package/src/crypto/api.ts +0 -70
  430. package/src/crypto/backup.ts +0 -922
  431. package/src/crypto/crypto.ts +0 -18
  432. package/src/crypto/dehydration.ts +0 -272
  433. package/src/crypto/device-converter.ts +0 -45
  434. package/src/crypto/deviceinfo.ts +0 -158
  435. package/src/crypto/index.ts +0 -4414
  436. package/src/crypto/key_passphrase.ts +0 -42
  437. package/src/crypto/keybackup.ts +0 -47
  438. package/src/crypto/olmlib.ts +0 -539
  439. package/src/crypto/recoverykey.ts +0 -18
  440. package/src/crypto/store/base.ts +0 -348
  441. package/src/crypto/store/indexeddb-crypto-store-backend.ts +0 -1250
  442. package/src/crypto/store/indexeddb-crypto-store.ts +0 -845
  443. package/src/crypto/store/localStorage-crypto-store.ts +0 -579
  444. package/src/crypto/store/memory-crypto-store.ts +0 -680
  445. package/src/crypto/verification/Base.ts +0 -409
  446. package/src/crypto/verification/Error.ts +0 -76
  447. package/src/crypto/verification/IllegalMethod.ts +0 -50
  448. package/src/crypto/verification/QRCode.ts +0 -310
  449. package/src/crypto/verification/SAS.ts +0 -494
  450. package/src/crypto/verification/SASDecimal.ts +0 -37
  451. package/src/crypto/verification/request/Channel.ts +0 -34
  452. package/src/crypto/verification/request/InRoomChannel.ts +0 -371
  453. package/src/crypto/verification/request/ToDeviceChannel.ts +0 -354
  454. package/src/crypto/verification/request/VerificationRequest.ts +0 -976
  455. package/src/crypto-api/CryptoEvent.ts +0 -93
  456. package/src/crypto-api/CryptoEventHandlerMap.ts +0 -32
  457. package/src/crypto-api/index.ts +0 -1175
  458. package/src/crypto-api/key-passphrase.ts +0 -58
  459. package/src/crypto-api/keybackup.ts +0 -115
  460. package/src/crypto-api/recovery-key.ts +0 -69
  461. package/src/crypto-api/verification.ts +0 -408
  462. package/src/rendezvous/MSC4108SignInWithQR.ts +0 -444
  463. package/src/rendezvous/RendezvousChannel.ts +0 -48
  464. package/src/rendezvous/RendezvousCode.ts +0 -25
  465. package/src/rendezvous/RendezvousError.ts +0 -26
  466. package/src/rendezvous/RendezvousFailureReason.ts +0 -49
  467. package/src/rendezvous/RendezvousIntent.ts +0 -20
  468. package/src/rendezvous/RendezvousTransport.ts +0 -58
  469. package/src/rendezvous/channels/MSC4108SecureChannel.ts +0 -270
  470. package/src/rendezvous/channels/index.ts +0 -17
  471. package/src/rendezvous/index.ts +0 -25
  472. package/src/rendezvous/transports/MSC4108RendezvousSession.ts +0 -270
  473. package/src/rendezvous/transports/index.ts +0 -17
  474. package/src/rust-crypto/CrossSigningIdentity.ts +0 -183
  475. package/src/rust-crypto/DehydratedDeviceManager.ts +0 -306
  476. package/src/rust-crypto/KeyClaimManager.ts +0 -86
  477. package/src/rust-crypto/OutgoingRequestProcessor.ts +0 -236
  478. package/src/rust-crypto/OutgoingRequestsManager.ts +0 -143
  479. package/src/rust-crypto/PerSessionKeyBackupDownloader.ts +0 -501
  480. package/src/rust-crypto/RoomEncryptor.ts +0 -352
  481. package/src/rust-crypto/backup.ts +0 -881
  482. package/src/rust-crypto/constants.ts +0 -18
  483. package/src/rust-crypto/device-converter.ts +0 -128
  484. package/src/rust-crypto/index.ts +0 -237
  485. package/src/rust-crypto/libolm_migration.ts +0 -530
  486. package/src/rust-crypto/rust-crypto.ts +0 -2205
  487. package/src/rust-crypto/secret-storage.ts +0 -60
  488. package/src/rust-crypto/verification.ts +0 -830
  489. package/src/secret-storage.ts +0 -693
  490. package/src/utils/decryptAESSecretStorageItem.ts +0 -54
  491. package/src/utils/encryptAESSecretStorageItem.ts +0 -73
  492. package/src/utils/internal/deriveKeys.ts +0 -63
@@ -1,1241 +0,0 @@
1
- import _asyncToGenerator from "@babel/runtime/helpers/asyncToGenerator";
2
- import _defineProperty from "@babel/runtime/helpers/defineProperty";
3
- /*
4
- Copyright 2016 - 2021 The Matrix.org Foundation C.I.C.
5
-
6
- Licensed under the Apache License, Version 2.0 (the "License");
7
- you may not use this file except in compliance with the License.
8
- You may obtain a copy of the License at
9
-
10
- http://www.apache.org/licenses/LICENSE-2.0
11
-
12
- Unless required by applicable law or agreed to in writing, software
13
- distributed under the License is distributed on an "AS IS" BASIS,
14
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15
- See the License for the specific language governing permissions and
16
- limitations under the License.
17
- */
18
-
19
- import { logger } from "../logger.js";
20
- import { IndexedDBCryptoStore } from "./store/indexeddb-crypto-store.js";
21
- import { DecryptionFailureCode } from "../crypto-api/index.js";
22
- import { DecryptionError } from "../common-crypto/CryptoBackend.js";
23
-
24
- // The maximum size of an event is 65K, and we base64 the content, so this is a
25
- // reasonable approximation to the biggest plaintext we can encrypt.
26
- var MAX_PLAINTEXT_LENGTH = 65536 * 3 / 4;
27
- export class PayloadTooLargeError extends Error {
28
- constructor() {
29
- super(...arguments);
30
- _defineProperty(this, "data", {
31
- errcode: "M_TOO_LARGE",
32
- error: "Payload too large for encrypted message"
33
- });
34
- }
35
- }
36
- function checkPayloadLength(payloadString) {
37
- if (payloadString === undefined) {
38
- throw new Error("payloadString undefined");
39
- }
40
- if (payloadString.length > MAX_PLAINTEXT_LENGTH) {
41
- // might as well fail early here rather than letting the olm library throw
42
- // a cryptic memory allocation error.
43
- //
44
- // Note that even if we manage to do the encryption, the message send may fail,
45
- // because by the time we've wrapped the ciphertext in the event object, it may
46
- // exceed 65K. But at least we won't just fail with "abort()" in that case.
47
- throw new PayloadTooLargeError("Message too long (".concat(payloadString.length, " bytes). ") + "The maximum for an encrypted message is ".concat(MAX_PLAINTEXT_LENGTH, " bytes."));
48
- }
49
- }
50
-
51
- /** data stored in the session store about an inbound group session */
52
-
53
- /* eslint-disable camelcase */
54
-
55
- /* eslint-enable camelcase */
56
-
57
- /**
58
- * Manages the olm cryptography functions. Each OlmDevice has a single
59
- * OlmAccount and a number of OlmSessions.
60
- *
61
- * Accounts and sessions are kept pickled in the cryptoStore.
62
- */
63
- export class OlmDevice {
64
- // set by consumers
65
-
66
- constructor(cryptoStore) {
67
- this.cryptoStore = cryptoStore;
68
- _defineProperty(this, "pickleKey", "DEFAULT_KEY");
69
- // set by consumers
70
- /** Curve25519 key for the account, unknown until we load the account from storage in init() */
71
- _defineProperty(this, "deviceCurve25519Key", null);
72
- /** Ed25519 key for the account, unknown until we load the account from storage in init() */
73
- _defineProperty(this, "deviceEd25519Key", null);
74
- _defineProperty(this, "maxOneTimeKeys", null);
75
- // we don't bother stashing outboundgroupsessions in the cryptoStore -
76
- // instead we keep them here.
77
- _defineProperty(this, "outboundGroupSessionStore", {});
78
- // Store a set of decrypted message indexes for each group session.
79
- // This partially mitigates a replay attack where a MITM resends a group
80
- // message into the room.
81
- //
82
- // When we decrypt a message and the message index matches a previously
83
- // decrypted message, one possible cause of that is that we are decrypting
84
- // the same event, and may not indicate an actual replay attack. For
85
- // example, this could happen if we receive events, forget about them, and
86
- // then re-fetch them when we backfill. So we store the event ID and
87
- // timestamp corresponding to each message index when we first decrypt it,
88
- // and compare these against the event ID and timestamp every time we use
89
- // that same index. If they match, then we're probably decrypting the same
90
- // event and we don't consider it a replay attack.
91
- //
92
- // Keys are strings of form "<senderKey>|<session_id>|<message_index>"
93
- // Values are objects of the form "{id: <event id>, timestamp: <ts>}"
94
- _defineProperty(this, "inboundGroupSessionMessageIndexes", {});
95
- // Keep track of sessions that we're starting, so that we don't start
96
- // multiple sessions for the same device at the same time.
97
- _defineProperty(this, "sessionsInProgress", {});
98
- // set by consumers
99
- // Used by olm to serialise prekey message decryptions
100
- _defineProperty(this, "olmPrekeyPromise", Promise.resolve());
101
- }
102
-
103
- /**
104
- * @returns The version of Olm.
105
- */
106
- static getOlmVersion() {
107
- return globalThis.Olm.get_library_version();
108
- }
109
-
110
- /**
111
- * Initialise the OlmAccount. This must be called before any other operations
112
- * on the OlmDevice.
113
- *
114
- * Data from an exported Olm device can be provided
115
- * in order to re-create this device.
116
- *
117
- * Attempts to load the OlmAccount from the crypto store, or creates one if none is
118
- * found.
119
- *
120
- * Reads the device keys from the OlmAccount object.
121
- *
122
- * @param IInitOpts - opts to initialise the OlmAccount with
123
- */
124
- init() {
125
- var _arguments = arguments,
126
- _this = this;
127
- return _asyncToGenerator(function* () {
128
- var {
129
- pickleKey,
130
- fromExportedDevice
131
- } = _arguments.length > 0 && _arguments[0] !== undefined ? _arguments[0] : {};
132
- var e2eKeys;
133
- var account = new globalThis.Olm.Account();
134
- try {
135
- if (fromExportedDevice) {
136
- if (pickleKey) {
137
- logger.warn("ignoring opts.pickleKey" + " because opts.fromExportedDevice is present.");
138
- }
139
- _this.pickleKey = fromExportedDevice.pickleKey;
140
- yield _this.initialiseFromExportedDevice(fromExportedDevice, account);
141
- } else {
142
- if (pickleKey) {
143
- _this.pickleKey = pickleKey;
144
- }
145
- yield _this.initialiseAccount(account);
146
- }
147
- e2eKeys = JSON.parse(account.identity_keys());
148
- _this.maxOneTimeKeys = account.max_number_of_one_time_keys();
149
- } finally {
150
- account.free();
151
- }
152
- _this.deviceCurve25519Key = e2eKeys.curve25519;
153
- _this.deviceEd25519Key = e2eKeys.ed25519;
154
- })();
155
- }
156
-
157
- /**
158
- * Populates the crypto store using data that was exported from an existing device.
159
- * Note that for now only the “account” and “sessions” stores are populated;
160
- * Other stores will be as with a new device.
161
- *
162
- * @param exportedData - Data exported from another device
163
- * through the “export” method.
164
- * @param account - an olm account to initialize
165
- */
166
- initialiseFromExportedDevice(exportedData, account) {
167
- var _this2 = this;
168
- return _asyncToGenerator(function* () {
169
- yield _this2.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT, IndexedDBCryptoStore.STORE_SESSIONS], txn => {
170
- _this2.cryptoStore.storeAccount(txn, exportedData.pickledAccount);
171
- exportedData.sessions.forEach(session => {
172
- var {
173
- deviceKey,
174
- sessionId
175
- } = session;
176
- var sessionInfo = {
177
- session: session.session,
178
- lastReceivedMessageTs: session.lastReceivedMessageTs
179
- };
180
- _this2.cryptoStore.storeEndToEndSession(deviceKey, sessionId, sessionInfo, txn);
181
- });
182
- });
183
- account.unpickle(_this2.pickleKey, exportedData.pickledAccount);
184
- })();
185
- }
186
- initialiseAccount(account) {
187
- var _this3 = this;
188
- return _asyncToGenerator(function* () {
189
- yield _this3.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], txn => {
190
- _this3.cryptoStore.getAccount(txn, pickledAccount => {
191
- if (pickledAccount !== null) {
192
- account.unpickle(_this3.pickleKey, pickledAccount);
193
- } else {
194
- account.create();
195
- pickledAccount = account.pickle(_this3.pickleKey);
196
- _this3.cryptoStore.storeAccount(txn, pickledAccount);
197
- }
198
- });
199
- });
200
- })();
201
- }
202
-
203
- /**
204
- * extract our OlmAccount from the crypto store and call the given function
205
- * with the account object
206
- * The `account` object is usable only within the callback passed to this
207
- * function and will be freed as soon the callback returns. It is *not*
208
- * usable for the rest of the lifetime of the transaction.
209
- * This function requires a live transaction object from cryptoStore.doTxn()
210
- * and therefore may only be called in a doTxn() callback.
211
- *
212
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
213
- * @internal
214
- */
215
- getAccount(txn, func) {
216
- this.cryptoStore.getAccount(txn, pickledAccount => {
217
- var account = new globalThis.Olm.Account();
218
- try {
219
- account.unpickle(this.pickleKey, pickledAccount);
220
- func(account);
221
- } finally {
222
- account.free();
223
- }
224
- });
225
- }
226
-
227
- /*
228
- * Saves an account to the crypto store.
229
- * This function requires a live transaction object from cryptoStore.doTxn()
230
- * and therefore may only be called in a doTxn() callback.
231
- *
232
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
233
- * @param Olm.Account object
234
- * @internal
235
- */
236
- storeAccount(txn, account) {
237
- this.cryptoStore.storeAccount(txn, account.pickle(this.pickleKey));
238
- }
239
-
240
- /**
241
- * Export data for re-creating the Olm device later.
242
- * TODO export data other than just account and (P2P) sessions.
243
- *
244
- * @returns The exported data
245
- */
246
- export() {
247
- var _this4 = this;
248
- return _asyncToGenerator(function* () {
249
- var result = {
250
- pickleKey: _this4.pickleKey
251
- };
252
- yield _this4.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_ACCOUNT, IndexedDBCryptoStore.STORE_SESSIONS], txn => {
253
- _this4.cryptoStore.getAccount(txn, pickledAccount => {
254
- result.pickledAccount = pickledAccount;
255
- });
256
- result.sessions = [];
257
- // Note that the pickledSession object we get in the callback
258
- // is not exactly the same thing you get in method _getSession
259
- // see documentation of IndexedDBCryptoStore.getAllEndToEndSessions
260
- _this4.cryptoStore.getAllEndToEndSessions(txn, pickledSession => {
261
- result.sessions.push(pickledSession);
262
- });
263
- });
264
- return result;
265
- })();
266
- }
267
-
268
- /**
269
- * extract an OlmSession from the session store and call the given function
270
- * The session is usable only within the callback passed to this
271
- * function and will be freed as soon the callback returns. It is *not*
272
- * usable for the rest of the lifetime of the transaction.
273
- *
274
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
275
- * @internal
276
- */
277
- getSession(deviceKey, sessionId, txn, func) {
278
- this.cryptoStore.getEndToEndSession(deviceKey, sessionId, txn, sessionInfo => {
279
- this.unpickleSession(sessionInfo, func);
280
- });
281
- }
282
-
283
- /**
284
- * Creates a session object from a session pickle and executes the given
285
- * function with it. The session object is destroyed once the function
286
- * returns.
287
- *
288
- * @internal
289
- */
290
- unpickleSession(sessionInfo, func) {
291
- var session = new globalThis.Olm.Session();
292
- try {
293
- session.unpickle(this.pickleKey, sessionInfo.session);
294
- var unpickledSessInfo = Object.assign({}, sessionInfo, {
295
- session
296
- });
297
- func(unpickledSessInfo);
298
- } finally {
299
- session.free();
300
- }
301
- }
302
-
303
- /**
304
- * store our OlmSession in the session store
305
- *
306
- * @param sessionInfo - `{session: OlmSession, lastReceivedMessageTs: int}`
307
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
308
- * @internal
309
- */
310
- saveSession(deviceKey, sessionInfo, txn) {
311
- var sessionId = sessionInfo.session.session_id();
312
- logger.debug("Saving Olm session ".concat(sessionId, " with device ").concat(deviceKey, ": ").concat(sessionInfo.session.describe()));
313
-
314
- // Why do we re-use the input object for this, overwriting the same key with a different
315
- // type? Is it because we want to erase the unpickled session to enforce that it's no longer
316
- // used? A comment would be great.
317
- var pickledSessionInfo = Object.assign(sessionInfo, {
318
- session: sessionInfo.session.pickle(this.pickleKey)
319
- });
320
- this.cryptoStore.storeEndToEndSession(deviceKey, sessionId, pickledSessionInfo, txn);
321
- }
322
-
323
- /**
324
- * get an OlmUtility and call the given function
325
- *
326
- * @returns result of func
327
- * @internal
328
- */
329
- getUtility(func) {
330
- var utility = new globalThis.Olm.Utility();
331
- try {
332
- return func(utility);
333
- } finally {
334
- utility.free();
335
- }
336
- }
337
-
338
- /**
339
- * Signs a message with the ed25519 key for this account.
340
- *
341
- * @param message - message to be signed
342
- * @returns base64-encoded signature
343
- */
344
- sign(message) {
345
- var _this5 = this;
346
- return _asyncToGenerator(function* () {
347
- var result;
348
- yield _this5.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_ACCOUNT], txn => {
349
- _this5.getAccount(txn, account => {
350
- result = account.sign(message);
351
- });
352
- });
353
- return result;
354
- })();
355
- }
356
-
357
- /**
358
- * Get the current (unused, unpublished) one-time keys for this account.
359
- *
360
- * @returns one time keys; an object with the single property
361
- * <tt>curve25519</tt>, which is itself an object mapping key id to Curve25519
362
- * key.
363
- */
364
- getOneTimeKeys() {
365
- var _this6 = this;
366
- return _asyncToGenerator(function* () {
367
- var result;
368
- yield _this6.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_ACCOUNT], txn => {
369
- _this6.getAccount(txn, account => {
370
- result = JSON.parse(account.one_time_keys());
371
- });
372
- });
373
- return result;
374
- })();
375
- }
376
-
377
- /**
378
- * Get the maximum number of one-time keys we can store.
379
- *
380
- * @returns number of keys
381
- */
382
- maxNumberOfOneTimeKeys() {
383
- var _this$maxOneTimeKeys;
384
- return (_this$maxOneTimeKeys = this.maxOneTimeKeys) !== null && _this$maxOneTimeKeys !== void 0 ? _this$maxOneTimeKeys : -1;
385
- }
386
-
387
- /**
388
- * Marks all of the one-time keys as published.
389
- */
390
- markKeysAsPublished() {
391
- var _this7 = this;
392
- return _asyncToGenerator(function* () {
393
- yield _this7.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], txn => {
394
- _this7.getAccount(txn, account => {
395
- account.mark_keys_as_published();
396
- _this7.storeAccount(txn, account);
397
- });
398
- });
399
- })();
400
- }
401
-
402
- /**
403
- * Generate some new one-time keys
404
- *
405
- * @param numKeys - number of keys to generate
406
- * @returns Resolved once the account is saved back having generated the keys
407
- */
408
- generateOneTimeKeys(numKeys) {
409
- return this.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], txn => {
410
- this.getAccount(txn, account => {
411
- account.generate_one_time_keys(numKeys);
412
- this.storeAccount(txn, account);
413
- });
414
- });
415
- }
416
-
417
- /**
418
- * Generate a new fallback keys
419
- *
420
- * @returns Resolved once the account is saved back having generated the key
421
- */
422
- generateFallbackKey() {
423
- var _this8 = this;
424
- return _asyncToGenerator(function* () {
425
- yield _this8.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], txn => {
426
- _this8.getAccount(txn, account => {
427
- account.generate_fallback_key();
428
- _this8.storeAccount(txn, account);
429
- });
430
- });
431
- })();
432
- }
433
- getFallbackKey() {
434
- var _this9 = this;
435
- return _asyncToGenerator(function* () {
436
- var result;
437
- yield _this9.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_ACCOUNT], txn => {
438
- _this9.getAccount(txn, account => {
439
- result = JSON.parse(account.unpublished_fallback_key());
440
- });
441
- });
442
- return result;
443
- })();
444
- }
445
- forgetOldFallbackKey() {
446
- var _this10 = this;
447
- return _asyncToGenerator(function* () {
448
- yield _this10.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT], txn => {
449
- _this10.getAccount(txn, account => {
450
- account.forget_old_fallback_key();
451
- _this10.storeAccount(txn, account);
452
- });
453
- });
454
- })();
455
- }
456
-
457
- /**
458
- * Generate a new outbound session
459
- *
460
- * The new session will be stored in the cryptoStore.
461
- *
462
- * @param theirIdentityKey - remote user's Curve25519 identity key
463
- * @param theirOneTimeKey - remote user's one-time Curve25519 key
464
- * @returns sessionId for the outbound session.
465
- */
466
- createOutboundSession(theirIdentityKey, theirOneTimeKey) {
467
- var _this11 = this;
468
- return _asyncToGenerator(function* () {
469
- var newSessionId;
470
- yield _this11.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT, IndexedDBCryptoStore.STORE_SESSIONS], txn => {
471
- _this11.getAccount(txn, account => {
472
- var session = new globalThis.Olm.Session();
473
- try {
474
- session.create_outbound(account, theirIdentityKey, theirOneTimeKey);
475
- newSessionId = session.session_id();
476
- _this11.storeAccount(txn, account);
477
- var sessionInfo = {
478
- session,
479
- // Pretend we've received a message at this point, otherwise
480
- // if we try to send a message to the device, it won't use
481
- // this session
482
- lastReceivedMessageTs: Date.now()
483
- };
484
- _this11.saveSession(theirIdentityKey, sessionInfo, txn);
485
- } finally {
486
- session.free();
487
- }
488
- });
489
- }, logger.getChild("[createOutboundSession]"));
490
- return newSessionId;
491
- })();
492
- }
493
-
494
- /**
495
- * Generate a new inbound session, given an incoming message
496
- *
497
- * @param theirDeviceIdentityKey - remote user's Curve25519 identity key
498
- * @param messageType - messageType field from the received message (must be 0)
499
- * @param ciphertext - base64-encoded body from the received message
500
- *
501
- * @returns decrypted payload, and
502
- * session id of new session
503
- *
504
- * @throws Error if the received message was not valid (for instance, it didn't use a valid one-time key).
505
- */
506
- createInboundSession(theirDeviceIdentityKey, messageType, ciphertext) {
507
- var _this12 = this;
508
- return _asyncToGenerator(function* () {
509
- if (messageType !== 0) {
510
- throw new Error("Need messageType == 0 to create inbound session");
511
- }
512
- var result; // eslint-disable-line camelcase
513
- yield _this12.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_ACCOUNT, IndexedDBCryptoStore.STORE_SESSIONS], txn => {
514
- _this12.getAccount(txn, account => {
515
- var session = new globalThis.Olm.Session();
516
- try {
517
- session.create_inbound_from(account, theirDeviceIdentityKey, ciphertext);
518
- account.remove_one_time_keys(session);
519
- _this12.storeAccount(txn, account);
520
- var payloadString = session.decrypt(messageType, ciphertext);
521
- var sessionInfo = {
522
- session,
523
- // this counts as a received message: set last received message time
524
- // to now
525
- lastReceivedMessageTs: Date.now()
526
- };
527
- _this12.saveSession(theirDeviceIdentityKey, sessionInfo, txn);
528
- result = {
529
- payload: payloadString,
530
- session_id: session.session_id()
531
- };
532
- } finally {
533
- session.free();
534
- }
535
- });
536
- }, logger.getChild("[createInboundSession]"));
537
- return result;
538
- })();
539
- }
540
-
541
- /**
542
- * Get a list of known session IDs for the given device
543
- *
544
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
545
- * remote device
546
- * @returns a list of known session ids for the device
547
- */
548
- getSessionIdsForDevice(theirDeviceIdentityKey) {
549
- var _this13 = this;
550
- return _asyncToGenerator(function* () {
551
- var log = logger.getChild("[getSessionIdsForDevice]");
552
- if (theirDeviceIdentityKey in _this13.sessionsInProgress) {
553
- log.debug("Waiting for Olm session for ".concat(theirDeviceIdentityKey, " to be created"));
554
- try {
555
- yield _this13.sessionsInProgress[theirDeviceIdentityKey];
556
- } catch (_unused) {
557
- // if the session failed to be created, just fall through and
558
- // return an empty result
559
- }
560
- }
561
- var sessionIds;
562
- yield _this13.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_SESSIONS], txn => {
563
- _this13.cryptoStore.getEndToEndSessions(theirDeviceIdentityKey, txn, sessions => {
564
- sessionIds = Object.keys(sessions);
565
- });
566
- }, log);
567
- return sessionIds;
568
- })();
569
- }
570
-
571
- /**
572
- * Get the right olm session id for encrypting messages to the given identity key
573
- *
574
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
575
- * remote device
576
- * @param nowait - Don't wait for an in-progress session to complete.
577
- * This should only be set to true of the calling function is the function
578
- * that marked the session as being in-progress.
579
- * @param log - A possibly customised log
580
- * @returns session id, or null if no established session
581
- */
582
- getSessionIdForDevice(theirDeviceIdentityKey) {
583
- var _arguments2 = arguments,
584
- _this14 = this;
585
- return _asyncToGenerator(function* () {
586
- var nowait = _arguments2.length > 1 && _arguments2[1] !== undefined ? _arguments2[1] : false;
587
- var log = _arguments2.length > 2 ? _arguments2[2] : undefined;
588
- var sessionInfos = yield _this14.getSessionInfoForDevice(theirDeviceIdentityKey, nowait, log);
589
- if (sessionInfos.length === 0) {
590
- return null;
591
- }
592
- // Use the session that has most recently received a message
593
- var idxOfBest = 0;
594
- for (var i = 1; i < sessionInfos.length; i++) {
595
- var thisSessInfo = sessionInfos[i];
596
- var thisLastReceived = thisSessInfo.lastReceivedMessageTs === undefined ? 0 : thisSessInfo.lastReceivedMessageTs;
597
- var bestSessInfo = sessionInfos[idxOfBest];
598
- var bestLastReceived = bestSessInfo.lastReceivedMessageTs === undefined ? 0 : bestSessInfo.lastReceivedMessageTs;
599
- if (thisLastReceived > bestLastReceived || thisLastReceived === bestLastReceived && thisSessInfo.sessionId < bestSessInfo.sessionId) {
600
- idxOfBest = i;
601
- }
602
- }
603
- return sessionInfos[idxOfBest].sessionId;
604
- })();
605
- }
606
-
607
- /**
608
- * Get information on the active Olm sessions for a device.
609
- * <p>
610
- * Returns an array, with an entry for each active session. The first entry in
611
- * the result will be the one used for outgoing messages. Each entry contains
612
- * the keys 'hasReceivedMessage' (true if the session has received an incoming
613
- * message and is therefore past the pre-key stage), and 'sessionId'.
614
- *
615
- * @param deviceIdentityKey - Curve25519 identity key for the device
616
- * @param nowait - Don't wait for an in-progress session to complete.
617
- * This should only be set to true of the calling function is the function
618
- * that marked the session as being in-progress.
619
- * @param log - A possibly customised log
620
- */
621
- getSessionInfoForDevice(deviceIdentityKey) {
622
- var _arguments3 = arguments,
623
- _this15 = this;
624
- return _asyncToGenerator(function* () {
625
- var nowait = _arguments3.length > 1 && _arguments3[1] !== undefined ? _arguments3[1] : false;
626
- var log = _arguments3.length > 2 && _arguments3[2] !== undefined ? _arguments3[2] : logger;
627
- log = log.getChild("[getSessionInfoForDevice]");
628
- if (deviceIdentityKey in _this15.sessionsInProgress && !nowait) {
629
- log.debug("Waiting for Olm session for ".concat(deviceIdentityKey, " to be created"));
630
- try {
631
- yield _this15.sessionsInProgress[deviceIdentityKey];
632
- } catch (_unused2) {
633
- // if the session failed to be created, then just fall through and
634
- // return an empty result
635
- }
636
- }
637
- var info = [];
638
- yield _this15.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_SESSIONS], txn => {
639
- _this15.cryptoStore.getEndToEndSessions(deviceIdentityKey, txn, sessions => {
640
- var sessionIds = Object.keys(sessions).sort();
641
- var _loop = function _loop(sessionId) {
642
- _this15.unpickleSession(sessions[sessionId], sessInfo => {
643
- info.push({
644
- lastReceivedMessageTs: sessInfo.lastReceivedMessageTs,
645
- hasReceivedMessage: sessInfo.session.has_received_message(),
646
- sessionId
647
- });
648
- });
649
- };
650
- for (var sessionId of sessionIds) {
651
- _loop(sessionId);
652
- }
653
- });
654
- }, log);
655
- return info;
656
- })();
657
- }
658
-
659
- /**
660
- * Encrypt an outgoing message using an existing session
661
- *
662
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
663
- * remote device
664
- * @param sessionId - the id of the active session
665
- * @param payloadString - payload to be encrypted and sent
666
- *
667
- * @returns ciphertext
668
- */
669
- encryptMessage(theirDeviceIdentityKey, sessionId, payloadString) {
670
- var _this16 = this;
671
- return _asyncToGenerator(function* () {
672
- checkPayloadLength(payloadString);
673
- var res;
674
- yield _this16.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_SESSIONS], txn => {
675
- _this16.getSession(theirDeviceIdentityKey, sessionId, txn, sessionInfo => {
676
- var sessionDesc = sessionInfo.session.describe();
677
- logger.log("encryptMessage: Olm Session ID " + sessionId + " to " + theirDeviceIdentityKey + ": " + sessionDesc);
678
- res = sessionInfo.session.encrypt(payloadString);
679
- _this16.saveSession(theirDeviceIdentityKey, sessionInfo, txn);
680
- });
681
- }, logger.getChild("[encryptMessage]"));
682
- return res;
683
- })();
684
- }
685
-
686
- /**
687
- * Decrypt an incoming message using an existing session
688
- *
689
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
690
- * remote device
691
- * @param sessionId - the id of the active session
692
- * @param messageType - messageType field from the received message
693
- * @param ciphertext - base64-encoded body from the received message
694
- *
695
- * @returns decrypted payload.
696
- */
697
- decryptMessage(theirDeviceIdentityKey, sessionId, messageType, ciphertext) {
698
- var _this17 = this;
699
- return _asyncToGenerator(function* () {
700
- var payloadString;
701
- yield _this17.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_SESSIONS], txn => {
702
- _this17.getSession(theirDeviceIdentityKey, sessionId, txn, sessionInfo => {
703
- var sessionDesc = sessionInfo.session.describe();
704
- logger.log("decryptMessage: Olm Session ID " + sessionId + " from " + theirDeviceIdentityKey + ": " + sessionDesc);
705
- payloadString = sessionInfo.session.decrypt(messageType, ciphertext);
706
- sessionInfo.lastReceivedMessageTs = Date.now();
707
- _this17.saveSession(theirDeviceIdentityKey, sessionInfo, txn);
708
- });
709
- }, logger.getChild("[decryptMessage]"));
710
- return payloadString;
711
- })();
712
- }
713
-
714
- /**
715
- * Determine if an incoming messages is a prekey message matching an existing session
716
- *
717
- * @param theirDeviceIdentityKey - Curve25519 identity key for the
718
- * remote device
719
- * @param sessionId - the id of the active session
720
- * @param messageType - messageType field from the received message
721
- * @param ciphertext - base64-encoded body from the received message
722
- *
723
- * @returns true if the received message is a prekey message which matches
724
- * the given session.
725
- */
726
- matchesSession(theirDeviceIdentityKey, sessionId, messageType, ciphertext) {
727
- var _this18 = this;
728
- return _asyncToGenerator(function* () {
729
- if (messageType !== 0) {
730
- return false;
731
- }
732
- var matches;
733
- yield _this18.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_SESSIONS], txn => {
734
- _this18.getSession(theirDeviceIdentityKey, sessionId, txn, sessionInfo => {
735
- matches = sessionInfo.session.matches_inbound(ciphertext);
736
- });
737
- }, logger.getChild("[matchesSession]"));
738
- return matches;
739
- })();
740
- }
741
- recordSessionProblem(deviceKey, type, fixed) {
742
- var _this19 = this;
743
- return _asyncToGenerator(function* () {
744
- logger.info("Recording problem on olm session with ".concat(deviceKey, " of type ").concat(type, ". Recreating: ").concat(fixed));
745
- yield _this19.cryptoStore.storeEndToEndSessionProblem(deviceKey, type, fixed);
746
- })();
747
- }
748
- sessionMayHaveProblems(deviceKey, timestamp) {
749
- return this.cryptoStore.getEndToEndSessionProblem(deviceKey, timestamp);
750
- }
751
- filterOutNotifiedErrorDevices(devices) {
752
- return this.cryptoStore.filterOutNotifiedErrorDevices(devices);
753
- }
754
-
755
- // Outbound group session
756
- // ======================
757
-
758
- /**
759
- * store an OutboundGroupSession in outboundGroupSessionStore
760
- *
761
- * @internal
762
- */
763
- saveOutboundGroupSession(session) {
764
- this.outboundGroupSessionStore[session.session_id()] = session.pickle(this.pickleKey);
765
- }
766
-
767
- /**
768
- * extract an OutboundGroupSession from outboundGroupSessionStore and call the
769
- * given function
770
- *
771
- * @returns result of func
772
- * @internal
773
- */
774
- getOutboundGroupSession(sessionId, func) {
775
- var pickled = this.outboundGroupSessionStore[sessionId];
776
- if (pickled === undefined) {
777
- throw new Error("Unknown outbound group session " + sessionId);
778
- }
779
- var session = new globalThis.Olm.OutboundGroupSession();
780
- try {
781
- session.unpickle(this.pickleKey, pickled);
782
- return func(session);
783
- } finally {
784
- session.free();
785
- }
786
- }
787
-
788
- /**
789
- * Generate a new outbound group session
790
- *
791
- * @returns sessionId for the outbound session.
792
- */
793
- createOutboundGroupSession() {
794
- var session = new globalThis.Olm.OutboundGroupSession();
795
- try {
796
- session.create();
797
- this.saveOutboundGroupSession(session);
798
- return session.session_id();
799
- } finally {
800
- session.free();
801
- }
802
- }
803
-
804
- /**
805
- * Encrypt an outgoing message with an outbound group session
806
- *
807
- * @param sessionId - the id of the outboundgroupsession
808
- * @param payloadString - payload to be encrypted and sent
809
- *
810
- * @returns ciphertext
811
- */
812
- encryptGroupMessage(sessionId, payloadString) {
813
- logger.log("encrypting msg with megolm session ".concat(sessionId));
814
- checkPayloadLength(payloadString);
815
- return this.getOutboundGroupSession(sessionId, session => {
816
- var res = session.encrypt(payloadString);
817
- this.saveOutboundGroupSession(session);
818
- return res;
819
- });
820
- }
821
-
822
- /**
823
- * Get the session keys for an outbound group session
824
- *
825
- * @param sessionId - the id of the outbound group session
826
- *
827
- * @returns current chain index, and
828
- * base64-encoded secret key.
829
- */
830
- getOutboundGroupSessionKey(sessionId) {
831
- return this.getOutboundGroupSession(sessionId, function (session) {
832
- return {
833
- chain_index: session.message_index(),
834
- key: session.session_key()
835
- };
836
- });
837
- }
838
-
839
- // Inbound group session
840
- // =====================
841
-
842
- /**
843
- * Unpickle a session from a sessionData object and invoke the given function.
844
- * The session is valid only until func returns.
845
- *
846
- * @param sessionData - Object describing the session.
847
- * @param func - Invoked with the unpickled session
848
- * @returns result of func
849
- */
850
- unpickleInboundGroupSession(sessionData, func) {
851
- var session = new globalThis.Olm.InboundGroupSession();
852
- try {
853
- session.unpickle(this.pickleKey, sessionData.session);
854
- return func(session);
855
- } finally {
856
- session.free();
857
- }
858
- }
859
-
860
- /**
861
- * extract an InboundGroupSession from the crypto store and call the given function
862
- *
863
- * @param roomId - The room ID to extract the session for, or null to fetch
864
- * sessions for any room.
865
- * @param txn - Opaque transaction object from cryptoStore.doTxn()
866
- * @param func - function to call.
867
- *
868
- * @internal
869
- */
870
- getInboundGroupSession(roomId, senderKey, sessionId, txn, func) {
871
- this.cryptoStore.getEndToEndInboundGroupSession(senderKey, sessionId, txn, (sessionData, withheld) => {
872
- if (sessionData === null) {
873
- func(null, null, withheld);
874
- return;
875
- }
876
-
877
- // if we were given a room ID, check that the it matches the original one for the session. This stops
878
- // the HS pretending a message was targeting a different room.
879
- if (roomId !== null && roomId !== sessionData.room_id) {
880
- throw new Error("Mismatched room_id for inbound group session (expected " + sessionData.room_id + ", was " + roomId + ")");
881
- }
882
- this.unpickleInboundGroupSession(sessionData, session => {
883
- func(session, sessionData, withheld);
884
- });
885
- });
886
- }
887
-
888
- /**
889
- * Add an inbound group session to the session store
890
- *
891
- * @param roomId - room in which this session will be used
892
- * @param senderKey - base64-encoded curve25519 key of the sender
893
- * @param forwardingCurve25519KeyChain - Devices involved in forwarding
894
- * this session to us.
895
- * @param sessionId - session identifier
896
- * @param sessionKey - base64-encoded secret key
897
- * @param keysClaimed - Other keys the sender claims.
898
- * @param exportFormat - true if the megolm keys are in export format
899
- * (ie, they lack an ed25519 signature)
900
- * @param extraSessionData - any other data to be include with the session
901
- */
902
- addInboundGroupSession(roomId, senderKey, forwardingCurve25519KeyChain, sessionId, sessionKey, keysClaimed, exportFormat) {
903
- var _arguments4 = arguments,
904
- _this20 = this;
905
- return _asyncToGenerator(function* () {
906
- var extraSessionData = _arguments4.length > 7 && _arguments4[7] !== undefined ? _arguments4[7] : {};
907
- yield _this20.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS, IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD, IndexedDBCryptoStore.STORE_SHARED_HISTORY_INBOUND_GROUP_SESSIONS], txn => {
908
- /* if we already have this session, consider updating it */
909
- _this20.getInboundGroupSession(roomId, senderKey, sessionId, txn, (existingSession, existingSessionData) => {
910
- // new session.
911
- var session = new globalThis.Olm.InboundGroupSession();
912
- try {
913
- if (exportFormat) {
914
- session.import_session(sessionKey);
915
- } else {
916
- session.create(sessionKey);
917
- }
918
- if (sessionId != session.session_id()) {
919
- throw new Error("Mismatched group session ID from senderKey: " + senderKey);
920
- }
921
- if (existingSession) {
922
- logger.log("Update for megolm session ".concat(senderKey, "|").concat(sessionId));
923
- if (existingSession.first_known_index() <= session.first_known_index()) {
924
- if (!existingSessionData.untrusted || extraSessionData.untrusted) {
925
- // existing session has less-than-or-equal index
926
- // (i.e. can decrypt at least as much), and the
927
- // new session's trust does not win over the old
928
- // session's trust, so keep it
929
- logger.log("Keeping existing megolm session ".concat(senderKey, "|").concat(sessionId));
930
- return;
931
- }
932
- if (existingSession.first_known_index() < session.first_known_index()) {
933
- // We want to upgrade the existing session's trust,
934
- // but we can't just use the new session because we'll
935
- // lose the lower index. Check that the sessions connect
936
- // properly, and then manually set the existing session
937
- // as trusted.
938
- if (existingSession.export_session(session.first_known_index()) === session.export_session(session.first_known_index())) {
939
- logger.info("Upgrading trust of existing megolm session " + "".concat(senderKey, "|").concat(sessionId, " based on newly-received trusted session"));
940
- existingSessionData.untrusted = false;
941
- _this20.cryptoStore.storeEndToEndInboundGroupSession(senderKey, sessionId, existingSessionData, txn);
942
- } else {
943
- logger.warn("Newly-received megolm session ".concat(senderKey, "|$sessionId}") + " does not match existing session! Keeping existing session");
944
- }
945
- return;
946
- }
947
- // If the sessions have the same index, go ahead and store the new trusted one.
948
- }
949
- }
950
- logger.debug("Storing megolm session ".concat(senderKey, "|").concat(sessionId, " with first index ") + session.first_known_index());
951
- var sessionData = Object.assign({}, extraSessionData, {
952
- room_id: roomId,
953
- session: session.pickle(_this20.pickleKey),
954
- keysClaimed: keysClaimed,
955
- forwardingCurve25519KeyChain: forwardingCurve25519KeyChain
956
- });
957
- _this20.cryptoStore.storeEndToEndInboundGroupSession(senderKey, sessionId, sessionData, txn);
958
- if (!existingSession && extraSessionData.sharedHistory) {
959
- _this20.cryptoStore.addSharedHistoryInboundGroupSession(roomId, senderKey, sessionId, txn);
960
- }
961
- } finally {
962
- session.free();
963
- }
964
- });
965
- }, logger.getChild("[addInboundGroupSession]"));
966
- })();
967
- }
968
-
969
- /**
970
- * Record in the data store why an inbound group session was withheld.
971
- *
972
- * @param roomId - room that the session belongs to
973
- * @param senderKey - base64-encoded curve25519 key of the sender
974
- * @param sessionId - session identifier
975
- * @param code - reason code
976
- * @param reason - human-readable version of `code`
977
- */
978
- addInboundGroupSessionWithheld(roomId, senderKey, sessionId, code, reason) {
979
- var _this21 = this;
980
- return _asyncToGenerator(function* () {
981
- yield _this21.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD], txn => {
982
- _this21.cryptoStore.storeEndToEndInboundGroupSessionWithheld(senderKey, sessionId, {
983
- room_id: roomId,
984
- code: code,
985
- reason: reason
986
- }, txn);
987
- });
988
- })();
989
- }
990
-
991
- /**
992
- * Decrypt a received message with an inbound group session
993
- *
994
- * @param roomId - room in which the message was received
995
- * @param senderKey - base64-encoded curve25519 key of the sender
996
- * @param sessionId - session identifier
997
- * @param body - base64-encoded body of the encrypted message
998
- * @param eventId - ID of the event being decrypted
999
- * @param timestamp - timestamp of the event being decrypted
1000
- *
1001
- * @returns null if the sessionId is unknown
1002
- */
1003
- decryptGroupMessage(roomId, senderKey, sessionId, body, eventId, timestamp) {
1004
- var _this22 = this;
1005
- return _asyncToGenerator(function* () {
1006
- var result = null;
1007
- // when the localstorage crypto store is used as an indexeddb backend,
1008
- // exceptions thrown from within the inner function are not passed through
1009
- // to the top level, so we store exceptions in a variable and raise them at
1010
- // the end
1011
- var error;
1012
- yield _this22.cryptoStore.doTxn("readwrite", [IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS, IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD], txn => {
1013
- _this22.getInboundGroupSession(roomId, senderKey, sessionId, txn, (session, sessionData, withheld) => {
1014
- if (session === null || sessionData === null) {
1015
- if (withheld) {
1016
- var failureCode = withheld.code === "m.unverified" ? DecryptionFailureCode.MEGOLM_KEY_WITHHELD_FOR_UNVERIFIED_DEVICE : DecryptionFailureCode.MEGOLM_KEY_WITHHELD;
1017
- error = new DecryptionError(failureCode, calculateWithheldMessage(withheld), {
1018
- session: senderKey + "|" + sessionId
1019
- });
1020
- }
1021
- result = null;
1022
- return;
1023
- }
1024
- var res;
1025
- try {
1026
- res = session.decrypt(body);
1027
- } catch (e) {
1028
- if ((e === null || e === void 0 ? void 0 : e.message) === "OLM.UNKNOWN_MESSAGE_INDEX" && withheld) {
1029
- var _failureCode = withheld.code === "m.unverified" ? DecryptionFailureCode.MEGOLM_KEY_WITHHELD_FOR_UNVERIFIED_DEVICE : DecryptionFailureCode.MEGOLM_KEY_WITHHELD;
1030
- error = new DecryptionError(_failureCode, calculateWithheldMessage(withheld), {
1031
- session: senderKey + "|" + sessionId
1032
- });
1033
- } else {
1034
- error = e;
1035
- }
1036
- return;
1037
- }
1038
- var plaintext = res.plaintext;
1039
- if (plaintext === undefined) {
1040
- // @ts-ignore - Compatibility for older olm versions.
1041
- plaintext = res;
1042
- } else {
1043
- // Check if we have seen this message index before to detect replay attacks.
1044
- // If the event ID and timestamp are specified, and the match the event ID
1045
- // and timestamp from the last time we used this message index, then we
1046
- // don't consider it a replay attack.
1047
- var messageIndexKey = senderKey + "|" + sessionId + "|" + res.message_index;
1048
- if (messageIndexKey in _this22.inboundGroupSessionMessageIndexes) {
1049
- var msgInfo = _this22.inboundGroupSessionMessageIndexes[messageIndexKey];
1050
- if (msgInfo.id !== eventId || msgInfo.timestamp !== timestamp) {
1051
- error = new Error("Duplicate message index, possible replay attack: " + messageIndexKey);
1052
- return;
1053
- }
1054
- }
1055
- _this22.inboundGroupSessionMessageIndexes[messageIndexKey] = {
1056
- id: eventId,
1057
- timestamp: timestamp
1058
- };
1059
- }
1060
- sessionData.session = session.pickle(_this22.pickleKey);
1061
- _this22.cryptoStore.storeEndToEndInboundGroupSession(senderKey, sessionId, sessionData, txn);
1062
- result = {
1063
- result: plaintext,
1064
- keysClaimed: sessionData.keysClaimed || {},
1065
- senderKey: senderKey,
1066
- forwardingCurve25519KeyChain: sessionData.forwardingCurve25519KeyChain || [],
1067
- untrusted: !!sessionData.untrusted
1068
- };
1069
- });
1070
- }, logger.getChild("[decryptGroupMessage]"));
1071
- if (error) {
1072
- throw error;
1073
- }
1074
- return result;
1075
- })();
1076
- }
1077
-
1078
- /**
1079
- * Determine if we have the keys for a given megolm session
1080
- *
1081
- * @param roomId - room in which the message was received
1082
- * @param senderKey - base64-encoded curve25519 key of the sender
1083
- * @param sessionId - session identifier
1084
- *
1085
- * @returns true if we have the keys to this session
1086
- */
1087
- hasInboundSessionKeys(roomId, senderKey, sessionId) {
1088
- var _this23 = this;
1089
- return _asyncToGenerator(function* () {
1090
- var result;
1091
- yield _this23.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS, IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD], txn => {
1092
- _this23.cryptoStore.getEndToEndInboundGroupSession(senderKey, sessionId, txn, sessionData => {
1093
- if (sessionData === null) {
1094
- result = false;
1095
- return;
1096
- }
1097
- if (roomId !== sessionData.room_id) {
1098
- logger.warn("requested keys for inbound group session ".concat(senderKey, "|") + "".concat(sessionId, ", with incorrect room_id ") + "(expected ".concat(sessionData.room_id, ", ") + "was ".concat(roomId, ")"));
1099
- result = false;
1100
- } else {
1101
- result = true;
1102
- }
1103
- });
1104
- }, logger.getChild("[hasInboundSessionKeys]"));
1105
- return result;
1106
- })();
1107
- }
1108
-
1109
- /**
1110
- * Extract the keys to a given megolm session, for sharing
1111
- *
1112
- * @param roomId - room in which the message was received
1113
- * @param senderKey - base64-encoded curve25519 key of the sender
1114
- * @param sessionId - session identifier
1115
- * @param chainIndex - The chain index at which to export the session.
1116
- * If omitted, export at the first index we know about.
1117
- *
1118
- * @returns
1119
- * details of the session key. The key is a base64-encoded megolm key in
1120
- * export format.
1121
- *
1122
- * @throws Error If the given chain index could not be obtained from the known
1123
- * index (ie. the given chain index is before the first we have).
1124
- */
1125
- getInboundGroupSessionKey(roomId, senderKey, sessionId, chainIndex) {
1126
- var _this24 = this;
1127
- return _asyncToGenerator(function* () {
1128
- var result = null;
1129
- yield _this24.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS, IndexedDBCryptoStore.STORE_INBOUND_GROUP_SESSIONS_WITHHELD], txn => {
1130
- _this24.getInboundGroupSession(roomId, senderKey, sessionId, txn, (session, sessionData) => {
1131
- if (session === null || sessionData === null) {
1132
- result = null;
1133
- return;
1134
- }
1135
- if (chainIndex === undefined) {
1136
- chainIndex = session.first_known_index();
1137
- }
1138
- var exportedSession = session.export_session(chainIndex);
1139
- var claimedKeys = sessionData.keysClaimed || {};
1140
- var senderEd25519Key = claimedKeys.ed25519 || null;
1141
- var forwardingKeyChain = sessionData.forwardingCurve25519KeyChain || [];
1142
- // older forwarded keys didn't set the "untrusted"
1143
- // property, but can be identified by having a
1144
- // non-empty forwarding key chain. These keys should
1145
- // be marked as untrusted since we don't know that they
1146
- // can be trusted
1147
- var untrusted = "untrusted" in sessionData ? sessionData.untrusted : forwardingKeyChain.length > 0;
1148
- result = {
1149
- chain_index: chainIndex,
1150
- key: exportedSession,
1151
- forwarding_curve25519_key_chain: forwardingKeyChain,
1152
- sender_claimed_ed25519_key: senderEd25519Key,
1153
- shared_history: sessionData.sharedHistory || false,
1154
- untrusted: untrusted
1155
- };
1156
- });
1157
- }, logger.getChild("[getInboundGroupSessionKey]"));
1158
- return result;
1159
- })();
1160
- }
1161
-
1162
- /**
1163
- * Export an inbound group session
1164
- *
1165
- * @param senderKey - base64-encoded curve25519 key of the sender
1166
- * @param sessionId - session identifier
1167
- * @param sessionData - The session object from the store
1168
- * @returns exported session data
1169
- */
1170
- exportInboundGroupSession(senderKey, sessionId, sessionData) {
1171
- return this.unpickleInboundGroupSession(sessionData, session => {
1172
- var messageIndex = session.first_known_index();
1173
- return {
1174
- "sender_key": senderKey,
1175
- "sender_claimed_keys": sessionData.keysClaimed,
1176
- "room_id": sessionData.room_id,
1177
- "session_id": sessionId,
1178
- "session_key": session.export_session(messageIndex),
1179
- "forwarding_curve25519_key_chain": sessionData.forwardingCurve25519KeyChain || [],
1180
- "first_known_index": session.first_known_index(),
1181
- "org.matrix.msc3061.shared_history": sessionData.sharedHistory || false
1182
- };
1183
- });
1184
- }
1185
- getSharedHistoryInboundGroupSessions(roomId) {
1186
- var _this25 = this;
1187
- return _asyncToGenerator(function* () {
1188
- var result;
1189
- yield _this25.cryptoStore.doTxn("readonly", [IndexedDBCryptoStore.STORE_SHARED_HISTORY_INBOUND_GROUP_SESSIONS], txn => {
1190
- result = _this25.cryptoStore.getSharedHistoryInboundGroupSessions(roomId, txn);
1191
- }, logger.getChild("[getSharedHistoryInboundGroupSessionsForRoom]"));
1192
- return result;
1193
- })();
1194
- }
1195
-
1196
- // Utilities
1197
- // =========
1198
-
1199
- /**
1200
- * Verify an ed25519 signature.
1201
- *
1202
- * @param key - ed25519 key
1203
- * @param message - message which was signed
1204
- * @param signature - base64-encoded signature to be checked
1205
- *
1206
- * @throws Error if there is a problem with the verification. If the key was
1207
- * too small then the message will be "OLM.INVALID_BASE64". If the signature
1208
- * was invalid then the message will be "OLM.BAD_MESSAGE_MAC".
1209
- */
1210
- verifySignature(key, message, signature) {
1211
- this.getUtility(function (util) {
1212
- util.ed25519_verify(key, message, signature);
1213
- });
1214
- }
1215
- }
1216
- export var WITHHELD_MESSAGES = {
1217
- "m.unverified": "The sender has disabled encrypting to unverified devices.",
1218
- "m.blacklisted": "The sender has blocked you.",
1219
- "m.unauthorised": "You are not authorised to read the message.",
1220
- "m.no_olm": "Unable to establish a secure channel."
1221
- };
1222
-
1223
- /**
1224
- * Calculate the message to use for the exception when a session key is withheld.
1225
- *
1226
- * @param withheld - An object that describes why the key was withheld.
1227
- *
1228
- * @returns the message
1229
- *
1230
- * @internal
1231
- */
1232
- function calculateWithheldMessage(withheld) {
1233
- if (withheld.code && withheld.code in WITHHELD_MESSAGES) {
1234
- return WITHHELD_MESSAGES[withheld.code];
1235
- } else if (withheld.reason) {
1236
- return withheld.reason;
1237
- } else {
1238
- return "decryption key withheld";
1239
- }
1240
- }
1241
- //# sourceMappingURL=OlmDevice.js.map